Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-06-30

1¡¢Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷

¾ÝýÌå6ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Á¢ÌÕÍðµÄ¹ú¼Ò˰Îñ¼à²ì¾Ö(STI)ºÍ»á¼ÆÐ§ÀÍÌṩÉÌB1.ltµÈ¶à¸ö×éÖ¯Ôâµ½ÁËKillnetÍÅ»ïµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NKSC)֤ʵ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁ˹ú¼ÒÇå¾²Êý¾Ý´«ÊäÍøÂçÒÔ¼°Ë½ÓªºÍ¹«¹²²¿·ÖµÄ×éÖ¯¡£¡£¡£¡£¡£²¢ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜ»áÒ»Á¬¼¸Ì죬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÕë¶ÔͨѶ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¡£¡£¡£¡£¡£KillnetÔÚÒ»¶ÎÊÓÆµÖÐÉù³Æ¶Ô´ËÊÂÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢Ôö²¹ËµËûÃÇÒѾ­¹¥»÷ÁË1652¸öÍøÂç×ÊÔ´£¬£¬£¬£¬£¬£¬£¬ÔÚ39СʱÄÚʵÏÖÁ˶ÔÁ¢ÌÕÍð70%µÄÍøÂç»ù´¡ÉèÊ©µÄ¸ôÀë¡£¡£¡£¡£¡£

https://www.hackread.com/russia-killnet-group-lithuania-sites-ddos-attacks/


2¡¢Service Fabric±£´æÎó²îFabricScape£¨CVE-2022-30137)

6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬Unit 42Åû¶ÁË΢ÈíService FabricÖеÄÎó²îFabricScape£¨CVE-2022-30137)µÄÏêÇé¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÕï¶ÏÍøÂçÊðÀí(DCA)×é¼þÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÉèÖÃΪ¾ßÓÐÔËÐÐʱ»á¼ûȨÏÞµÄÈÝÆ÷Éϱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬ËäÈ»±£´æÓÚÁ½¸ö²Ù×÷ϵͳƽ̨ÉÏ£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÄÜÔÚLinuxÉϱ»Ê¹Óᣡ£¡£¡£¡£Î¢Èí͸¶³Æ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»ÓÃÀ´ÌáȨ£¬£¬£¬£¬£¬£¬£¬²¢»ñµÃ¶Ô×ÊÔ´Ö÷»úSF½ÚµãºÍÕû¸ö¼¯ÈºµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔÚService Fabric 9.0ÀÛ»ý¸üÐÂÖлñµÃÐÞ¸´¡£¡£¡£¡£¡£   

https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137/


3¡¢Zscaler·¢Ã÷EvilnumÍÅ»ï»ØºÏ²¢Õë¶ÔÓ¢¹úºÍÅ·ÖÞµØÇø

ZscalerÔÚ6ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬£¬EvilnumÍÅ»ïÒѾ­»Ø¹é£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËеÄÕ½Êõ¡¢ÊÖÒպͳÌÐò¡£¡£¡£¡£¡£½ñÄê3Ô£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÆäÄ¿µÄÑ¡ÔñÓÐÖØ´ó±ä»»£¬£¬£¬£¬£¬£¬£¬ÓÉÔ­À´µÄ½ðÈڿƼ¼ÁìÓòµÄ×é֯ת±äΪ´¦Öóͷ£¹ú¼ÊÒÆÃñЧÀ͵ÄÕþ¸®¼ä×éÖ¯¡£¡£¡£¡£¡£¹¥»÷ʹÓõÄÓÕ¶üÎļþͨ³£¶¼°üÀ¨ºÏ¹æ£¨compliance£©Ò»´Ê£¬£¬£¬£¬£¬£¬£¬ÆäÄ£°å×¢Èë½×¶ÎʹÓõĻùÓÚºêµÄÎĵµÊ¹ÓÃÁËVBA code stompingÊÖÒÕÀ´Èƹý¾²Ì¬ÆÊÎö²¢±ÜÃâÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÑÏÖØ»ìÏýµÄJavaScriptÀ´½âÃܲ¢×°ÖÃpayload¡£¡£¡£¡£¡£

https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets

4¡¢Cyble³ÆÓÐÁè¼Ý90Íò¸öÉèÖùýʧµÄKubernetes̻¶ÔÚÍøÉÏ

¾Ý6ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬CybleµÄÒ»ÏîÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý900000¸öKubernetes̻¶ÔÚÍøÉÏ¡£¡£¡£¡£¡£KubernetesÊÇÒ»¸ö¸ß¶ÈͨÓõĿªÔ´ÈÝÆ÷±àÅÅϵͳ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÉèÖò»×¼È·£¬£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õß»á¼ûÄÚ²¿×ÊÔ´ºÍ˽ÓÐ×ʲú¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÓë¹¥»÷ÕßÀàËÆµÄɨÃ蹤¾ßºÍËÑË÷ÅÌÎÊÀ´¶¨Î»Ì»Â¶µÄKubernetesʵÀý£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐ65%£¨585000̨£©Î»ÓÚÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬9%λÓڵ¹ú£¬£¬£¬£¬£¬£¬£¬¶øºÉÀ¼ºÍ°®¶ûÀ¼¸÷Õ¼6%£»£»£»£»£»Ì»Â¶×î¶àµÄTCP¶Ë¿ÚÊÇ443£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǶ˿Ú10250ºÍ6443¡£¡£¡£¡£¡£

https://www.infosecurity-magazine.com/news/misconfigured-kubernetes-exposed/

5¡¢ÐÂľÂíZuoRATÖ÷ÒªÕë¶ÔλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷

Lumen Black Lotus LabsÔÚ6ÔÂ28ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÐµĶ༶Զ³Ì»á¼ûľÂíZuoRATÒѱ»ÓÃÓÚͨ¹ýλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷¹¥»÷Ô¶³ÌÊÂÇéÖ°Ô±¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýɨÃèÒÑÖªµÄδÐÞ²¹Îó²î¶Ô·ÓÉÆ÷µÄ¾ÙÐгõʼ»á¼û£¬£¬£¬£¬£¬£¬£¬È»ºó×°ÖÃCobalt Strike beacons£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°2¸ö×Ô½ç˵ºóÃÅ£º»ùÓÚC++µÄCBeacon£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔWindowsϵͳ£»£»£»£»£»»ùÓÚGoµÄGoBeacon£¬£¬£¬£¬£¬£¬£¬Õë¶ÔLinuxºÍMacϵͳ¡£¡£¡£¡£¡£ZuoRAT»¹¿ÉÒÔ¼à¿ØDNSºÍHTTPSÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬À´Ð®ÖÆÇëÇó²¢Ê¹ÓÃÌìÉúµÄÔ¤Éè¹æÔò½«Ä¿µÄÖØ¶¨Ïòµ½¶ñÒâÓò£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÌÈÅȡ֤ÆÊÎö¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/new-zuorat-malware-targets-soho-routers-in-north-america-europe/

6¡¢SymantecÐû²¼¹ØÓÚ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ

6ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬SymantecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòBumblebeeµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Í¨Ì«¹ýÎö×î½üÉæ¼°BumblebeeµÄ¹¥»÷ÖÐʹÓÃµÄÆäËüÈý¸ö¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«ÆäÓëConti¡¢QuantumºÍMountlocker ÔÚÄÚµÄÐí¶àÀÕË÷ÍÅ»ïÁªÏµÆðÀ´¡£¡£¡£¡£¡£Æ¾Ö¤ÕâЩ½ÏÔçµÄ¹¥»÷ÖÐʹÓõÄTTPsÍÆ²â£¬£¬£¬£¬£¬£¬£¬Bumblebee¿ÉÄÜÊÇ×÷ΪTrickbotºÍBazarLoaderµÄÌæ»»¼ÓÔØ³ÌÐòÍÆ³öµÄ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÕâЩ±»ÊÓ²ìµÄ¹¥»÷µÄÁíÒ»¸öÅäºÏµãÊÇÕýµ±Èí¼þʹÓõÄÔöÌí£¬£¬£¬£¬£¬£¬£¬ConnectWise¡¢Atera¡¢SplashtopºÍAnyDeskµÈÔ¶³Ì×ÀÃæ¹¤¾ß¾­³£·ºÆðÔÚ´ËÀ๥»÷ÖС£¡£¡£¡£¡£

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime