¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190308
Ðû²¼Ê±¼ä 2019-03-08
ÔÎÄÁ´½Ó£º
https://securelist.com/financial-cyberthreats-in-2018/89788/2¡¢ÐÂÍøÂçÌØ¹¤×éÖ¯Whitefly£¬£¬£¬ÓëÐÂ¼ÓÆÂ¶à¸ö¹¥»÷»î¶¯ÓйØ
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore3¡¢Ñо¿ÍŶӷ¢Ã÷2Ô·ÝÀÕË÷Èí¼þShadeµÄ¹¥»÷»î¶¯ìÉý
Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷ÀÕË÷Èí¼þTroldesh£¨ÓÖÃûShade£©ÔÚ2018ÄêQ4µ½2019ÄêQ1ʱ´úµÄ¼ì²âÊýÄ¿¼±¾çÔöÌí¡£¡£¡£¡£¡£Shadeͨ³£Í¨¹ý´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬£¬£¬Æä¸½¼þÊǰüÀ¨Javascript¾ç±¾µÄzipÎļþ¡£¡£¡£¡£¡£ShadeµÄÖ÷Òª¹¥»÷Ä¿µÄÊÇWindowsϵͳ£¬£¬£¬Æä½ÓÄÉAES 256 CBCËã·¨¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£²¿·ÖShadeµÄ±äÖÖ±£´æÃâ·ÑµÄ½âÃܹ¤¾ß£¬£¬£¬Óû§¿ÉÔÚNoMoreRansom.orgÍøÕ¾ÉÏÕÒµ½ËüÃÇ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/4¡¢Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack API¾ÙÐÐͨѶµÄSLUBºóÃÅ
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack APIͨѶµÄ¶ñÒâÈí¼þSLUBºóÃÅ¡£¡£¡£¡£¡£SLUBÊÇÒ»¸öÓÃC++±àдµÄ×Ô½ç˵ºóÃÅ£¬£¬£¬Æä°üÀ¨¾²Ì¬Á´½Ó¿âcurl£¨ÓÃÓÚÖ´ÐÐHTTPÇëÇ󣩡¢boost£¨ÓÃÓÚ´ÓgistƬ¶ÏÖÐÌáÈ¡ÏÂÁºÍJsonCpp£¨ÓÃÓÚÆÊÎöslackͨѶ£©¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýË®¿Ó¹¥»÷Èö²¥£¬£¬£¬²¢ÇÒʹÓÃÁË΢ÈíÔÚ2018Äê5ÔÂÐÞ¸´µÄVBScriptÒýÇæÎó²î£¨CVE-2018-8174£©¾ÙÐÐѬȾ¡£¡£¡£¡£¡£¸ÃºóÃÅ»¹»á´ÓGithubÉÏÏÂÔØÒ»¸öÌØ¶¨µÄgistƬ¶Ï²¢ÌáÈ¡Ïà¹ØÏÂÁî¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/5¡¢ÐÂľÂíPirate Matryoshka£¬£¬£¬Ê¹Óú£µÁÍå¾ÙÐзַ¢

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷¹¥»÷ÕßʹÓú£µÁÍå·Ö·¢ÐÂľÂíPirate Matryoshka¡£¡£¡£¡£¡£¸ÃľÂíαװ³ÉÆÆ½âÈí¼þµÄ×°ÖÃÎļþ£¬£¬£¬µ±Óû§ÔËÐиÃÎļþʱ£¬£¬£¬½«»áÏÔʾһ¸öαÔìµÄº£µÁÍåµÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÕË»§ÃûºÍÃÜÂ룬£¬£¬¹¥»÷Õ߾ͻáÐ®ÖÆÓû§µÄÕË»§²¢ÉÏ´«¸ü¶àµÄ¶ñÒâÎļþ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬×°ÖÃÎļþ»¹Ä¬ÈÏÀ¦°óÁËÆäËüÈí¼þ£¬£¬£¬ÆäÖÐÎå·ÖÖ®Ò»ÊÇ¹ã¸æÈí¼þ¡¢Ð®ÖÆä¯ÀÀÆ÷Ö÷Ò³µÄ¶ñÒâÈí¼þÒÔ¼°Ä¾ÂíµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.kaspersky.com/blog/pirate-matryoshka-malware/25905/6¡¢Ë¼¿ÆÐÞ¸´Nexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î
˼¿Æ±¾ÖÜÐÞ¸´ÁËNexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î£¬£¬£¬Îó²î¹æÄ£°üÀ¨DoS¡¢í§Òâ´úÂëÖ´ÐкÍȨÏÞÌáÉýµÈ¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËTetration AnalyticsÊðÀí¡¢LDAP¡¢Óû§ÕÊ»§ÖÎÀí½çÃæ¡¢ÏÂÁîÐнçÃæ£¨CLI£©µÈ×é¼þ£¬£¬£¬¶à¸öÎó²î¿ÉÔÊÐíÍâµØ¹¥»÷Õß¾ÙÐÐÌáȨ¡¢ÒÔrootÉí·ÝÖ´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ¡¢»ñÈ¡Ö÷ÒªÉèÖÃÎļþµÄ»á¼ûȨÏÞ»ò¾ÙÐÐÊÜÏÞshellÌÓÒÝ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ë¼¿Æ»¹½¨ÒéÓû§½ÓÄɲ½·¥±£»£»£»£»£»£»¤°²ÅÅÁËPOAPµÄÍøÂç»ò½ûÓøù¦Ð§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82120/breaking-news/cisco-nexus-flaws-2.htmlÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ