Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
Ðû²¼Ê±¼ä 2022-04-06Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯
3ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬FortinetÐû²¼±¨¸æ³ÆÆä¼ì²âµ½APT×éÖ¯Deep PandaµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÍÅ»ïʹÓÃLog4ShellÎó²î¹¥»÷VMware HorizonЧÀÍÆ÷£¬£¬£¬£¬£¬£¬×îÖÕÖ¼ÔÚ×°ÖÃÒ»¸öÃûΪFire ChiliµÄÐÂÐÍrootkit¡£¡£¡£¡£¸ÃrootkitʹÓÃFrostburn Studios£¨ÓÎÏ·¿ª·¢ÉÌ£©ºÍComodo£¨Çå¾²Èí¼þ£©µÄÖ¤Êé¾ÙÐÐÊý×ÖÊðÃû£¬£¬£¬£¬£¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£ÊÓ²ìDeep Panda»î¶¯Ê±£¬£¬£¬£¬£¬£¬Fortinet·¢Ã÷ÆäÓëWinntiÓÐÖØµþ¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶Ô½ðÈÚ¡¢Ñ§Êõ¡¢»¯×±Æ·ºÍÂÃÓÎÐÐÒµ¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits
Kaspersky³ÆLazarusʹÓÃľÂí»¯DeFi Wallet·Ö·¢ºóÃÅ
KasperskyÔÚ3ÔÂ31ÈÕÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍÍÅ»ïLazarusÕýÔÚʹÓÃľÂí»¯DeFiÓ¦Ó÷ַ¢ºóÃÅ¡£¡£¡£¡£Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Ò»¸öľÂí»¯DeFi Wallet£¬£¬£¬£¬£¬£¬±àÒëÈÕÆÚΪ2021Äê11Ô£¬£¬£¬£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄϵͳÉÏ×°ÖÃÒ»¸ö¹¦Ð§ÆëÈ«µÄºóÃÅ£¬£¬£¬£¬£¬£¬¸ÃºóÃÅαװ³ÉÁËGoogle Chromeä¯ÀÀÆ÷¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÓ¦Óõķַ¢ÒªÁ죬£¬£¬£¬£¬£¬ÍƲâ¿ÉÄÜÊÇ´¹ÂÚÓʼþ»òͨ¹ýÉ罻ýÌå¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËλÓÚº«¹úµÄЧÀÍÆ÷ÓëºóÞÙÐÐͨѶ¡£¡£¡£¡£
https://securelist.com/lazarus-trojanized-defi-app/106195/
INKYÔÚ½üÆÚ·¢Ã÷ÐÂÒ»ÂÖʹÓÃCalendlyµÄ´¹ÂÚ¹¥»÷»î¶¯
¾ÝýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬INKYÑо¿ÍŶӷ¢Ã÷ʹÓÃCalendlyµÄ´¹Âڻ¡£¡£¡£¡£CalendlyÊÇÒ»¿îÊ¢ÐеÄÃâ·ÑÈÕÀúÓ¦Ó㬣¬£¬£¬£¬£¬¼¯³ÉÁËZoom£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ°²ÅžۻáºÍÔ¼»á¡£¡£¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ2ÔÂ⣬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýCalendlyƽ̨ÌìÉú´¹ÂÚÓʼþ¡£¡£¡£¡£Ê×ÏÈʹÓÃCalendlyÌí¼Ó×Ô½ç˵Á´½ÓµÄ¹¦Ð§²åÈë¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬¸ÃÁ´½ÓǶÈëÔÚÉó²éÎĵµ°´¼üÖУ¬£¬£¬£¬£¬£¬Óû§µã»÷ºó»á±»Öض¨Ïòµ½´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬£¬×îÖÕÇÔȡĿµÄµÄMicrosoftµÇ¼ƾ֤¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-microsoft-credentials-phishing/
PaloAlto Networks¶Ô¿Í»§ÌṩµÄÊÖÒÕÖ§³ÖÐÅÏ¢ÒâÍâй¶
ýÌå3ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬PaloAlto Networks(PAN) Ö§³ÖϵͳÖÐÉèÖùýʧµ¼Ö¿ͻ§µÄÃô¸ÐÐÅϢй¶¡£¡£¡£¡£¸ÃÎÊÌâÓÉPANµÄÒ»¸ö¿Í»§ÔÚ±¾Ô·¢Ã÷£¬£¬£¬£¬£¬£¬Ëû³Æ¿ÉÒÔ¿´µ½Ô¼Äª1989¸ö²»ÊôÓÚËûÃǵÄ×éÖ¯µÄÊÖÒÕÖ§³ÖÊÂÎñ¼Í¼£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚɨ³ý¹ýʧµÄ·À»ðǽÈÕÖ¾¡¢ÉèÖÃת´¢ºÍÍøÂçÇå¾²×é(NSG)½á¹¹µÈ¡£¡£¡£¡£PANÌåÏÖûÓÐÈκÎÊý¾Ý±»ÏÂÔØ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ´Ë´Îй¶ÊÂÎñµÄ¹æÄ£½öÏÞÓÚһλ¿Í»§¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâµÄÐÞ¸´Ô¼ÄªÐèÒª8Ììʱ¼ä¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/palo-alto-networks-error-exposed-customer-support-cases-attachments/
AquaÐû²¼Õë¶ÔJupyter NotebookµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ
Aqua SecurityÓÚ3ÔÂ29ÈÕÐû²¼ÁËÕë¶ÔJupyterµÄ»ùÓÚPythonµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Jupyter NotebookÊÇÊý¾ÝרҵְԱÓÃÀ´´¦Öóͷ£Êý¾Ý¡¢±àдºÍÖ´ÐдúÂëÒÔ¼°¿ÉÊÓ»¯Ð§¹ûµÄ¿ªÔ´WebÓ¦Óᣡ£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÉèÖùýʧµÄÓ¦Óûá¼ûЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÏÂÔØÓÃÓÚ¹¥»÷µÄ¿âºÍ¹¤¾ß£¨ÀýÈç¼ÓÃܳÌÐò£©£¬£¬£¬£¬£¬£¬È»ºóͨ¹ýÕ³ÌùPython´úÂë²¢Ö´Ðо籾ÊÖ¶¯½¨ÉèÀÕË÷Èí¼þ¡£¡£¡£¡£¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¿ÉÄÜÓë¶íÂÞ˹µÄºÚ¿ÍÍÅ»ïÓйء£¡£¡£¡£
https://blog.aquasec.com/python-ransomware-jupyter-notebook
Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ
4ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪProcess ManagerµÄ¶ñÒâAPK¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬£¬Ëü»áʹÓóÝÂÖÐÎͼ±êÒþ²ØÔÚAndroid×°±¸ÉÏ£¬£¬£¬£¬£¬£¬Î±×°³Éϵͳ×é¼þ£¬£¬£¬£¬£¬£¬²¢ÒªÇó»ñȡװ±¸µÄλÖᢷ¢ËͺÍÔĶÁÎı¾¡¢»á¼û´æ´¢¡¢Ê¹ÓÃÏà»úÕÕÏàÒÔ¼°Â¼ÖÆÒôƵµÈ18ÏîȨÏÞ¡£¡£¡£¡£Ëü»¹»áÏÂÔØÆäËüµÄpayload£¬£¬£¬£¬£¬£¬ÀýÈçRoz Dhan£¬£¬£¬£¬£¬£¬¸ÃÌØ¹¤Èí¼þ¿ÉÄÜ»áͨ¹ý´ËÖÖ·½·¨£¬£¬£¬£¬£¬£¬×¬È¡ÍƼöÓ¦ÓõÄÓ¶½ð¡£¡£¡£¡£
https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
Çå¾²¹¤¾ß
Socid-Extractor
´ÓСÎÒ˽¼Ò×ÊÁÏÍøÒ³/API ÏìÓ¦ÖÐÌáÈ¡ÓйØÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢½«ÆäÉúÑÄΪ»úе¿É¶ÁÃûÌᣡ£¡£¡£
https://github.com/soxoj/socid-extractor
GitBleed Tools
ÓÃÓÚ´Ó¾µÏñ git ´æ´¢¿âÖÐÌáÈ¡Êý¾Ý¡£¡£¡£¡£
https://github.com/nightwatchcybersecurity/gitbleed_tools
ggshield
ÊÇÒ»¸ö CLI Ó¦ÓóÌÐò£¬£¬£¬£¬£¬£¬¼ì²âÔ´´úÂëÖеÄÃÜÂë¡£¡£¡£¡£
https://github.com/GitGuardian/ggshield
PackMyPayload
ÓÃÓÚ½«payload´ò°üµ½×÷Ϊ´æµµ/ÈÝÆ÷µÄÊä³öÎļþÖС£¡£¡£¡£
https://securityonline.info/packmypayload-packages-payloads-into-output-containers/
Çå¾²ÆÊÎö
ºÚ¿ÍÂÛ̳ÉϳöÊÛµÄРBlackGuard ÃÜÂëÇÔÈ¡¶ñÒâÈí¼þ
https://www.bleepingcomputer.com/news/security/new-blackguard-password-stealing-malware-sold-on-hacker-forums/
FORCEDENTRY£ºÉ³ºÐÌÓÒÝ
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html
Microsoft Build ½«ÓÚ 5 Ô 24 ÈÕÆô¶¯
https://news.softpedia.com/news/microsoft-build-will-kick-off-on-may-24-535139.shtml
Atento³ÆÈ¥ÄêµÄLockBitÀÕË÷¹¥»÷Ôì³É4200ÍòÃÀÔªËðʧ
https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/
Anonymous¹¥»÷¶íÂÞ˹Ͷ×ʹ«Ë¾Thozis Corp
https://securityaffairs.co/wordpress/129651/hacktivism/anonymous-hacked-thozis-corp.html
ÍøÂç´¹ÂÚʹÓà Azure ¾²Ì¬ÍøÒ³Ã°³ä΢Èí
https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-web-pages-to-impersonate-microsoft/