¾Ýͳ¼Æ2019ÄêÃÀ¹úÒÑÓжà´ï500ËùѧУÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»£»£»£»Ñо¿ÍŶÓÐû²¼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼

Ðû²¼Ê±¼ä 2019-09-25
1.¾Ýͳ¼Æ2019ÄêÃÀ¹úÒÑÓжà´ï500ËùѧУÔâÀÕË÷Èí¼þ¹¥»÷

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Æ¾Ö¤ÔÆÇå¾²¹«Ë¾ArmorµÄµ÷ÑУ¬£¬£¬ÃÀ¹úÒÑÓÐ49¸öÑ§ÇøµÄ½ÌÓý»ú¹¹Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Ê¹µÃ½ÌÓýÐÐÒµ³ÉΪ½ö´ÎÓڵط½Õþ¸®µÄµÚ¶þ´óÒ×Êܹ¥»÷Ä¿µÄ¡£¡£¡£¸Ã¹«Ë¾ÆÊÎöÁË×Ô2019Äê1ÔÂÒÔÀ´¹ûÕæ±¨µÀµÄ¹¥»÷£¬£¬£¬·¢Ã÷ÔÚ2019Äêǰ9¸öÔÂÒÑÓжà´ï500ËùK-12ѧУÔâµ½¹¥»÷£¬£¬£¬¶øÈ¥ÄêÖ»ÓÐ11ËùѧУ¡£¡£¡£½öÔÚ9ÔÂÖÐÑ®µÄÒ»Öܶàʱ¼äÀï¾ÍÓÐ9¸öÐÂÑ§ÇøºÍ1Ëù´óѧÊܵ½¹¥»÷£¬£¬£¬²¨¼°Ô¼100ËùK-12ѧУ¡£¡£¡£¿£¿£¿£¿£¿£¿µÄùµÒ¸ñÖݵÄÑ§ÇøÊܵ½µÄÍþв×îΪÑÏÖØ£¬£¬£¬¸ÃÖݹ²ÔâÓöÁË7´Î¹¥»÷£¬£¬£¬º­¸Ç104ËùѧУ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/hundreds-of-us-schools-hit-by/

2.ÃÀ¹ú17¼Ò¹«¹²Ð§ÀÍ»ú×é³ÉΪд¹ÂڻµÄ¹¥»÷Ä¿µÄ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Proofpoint±¨¸æ³ÆÒ»¸öÓɹú¼Ò×ÊÖúµÄºÚ¿Í×éÖ¯ÔÚ4ÔÂ5ÈÕÖÁ8ÔÂ29ÈÕʱ´ú½«ÖÁÉÙ17¼ÒÃÀ¹ú¹«¹²Ð§ÀÍ»ú¹¹×÷Ϊ´¹ÂÚ¹¥»÷Ä¿µÄ¡£¡£¡£¸Ã¹¥»÷Ò»Á¬Á˳¤´ï5¸öÔµÄʱ¼ä£¬£¬£¬´¹ÂÚÓʼþµÄÄ¿µÄÊÇÏòÕâЩ»ú¹¹µÄÔ±¹¤·Ö·¢Ô¶¿ØÄ¾ÂíLookBack¡£¡£¡£ÏÖÔÚÉÐδ¶Ô¸Ã¹¥»÷»î¶¯¾ÙÐÐÕýʽµÄ¹éÒò£¬£¬£¬µ«»ùÓÚÒ»Ð©ÖØÓõĴúÂ룬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷»î¶¯ÓëAPT10ÓйØ¡£¡£¡£LookBackÊÇÒ»¸öÓÃC++±àдµÄÔ¶¿ØÄ¾Âí£¬£¬£¬Æä¹¦Ð§°üÀ¨Ð§ÀÍö¾Ù¡¢Éó²éÊý¾Ý¡¢É¾³ýÎļþ¡¢Ö´ÐÐÏÂÁî¡¢½ØÈ¡ÆÁÄ»ÒÔ¼°×ÔÎÒɾ³ýµÈ¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬£¬£¬DeGrippoÍŶӷ¢Ã÷¹¥»÷ÕßÔÚÌᳫ´¹ÂÚ¹¥»÷֮ǰ»¹É¨ÃèÁËÄ¿µÄ»ú¹¹µÄ445¶Ë¿Ú£¨SMBЭÒ飩¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/17-us-utility-firms-targeted-by-mysterious-state-sponsored-group/

3.Ñо¿ÍŶÓÐû²¼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ΪÁ˸üºÃµØËµÃ÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïµÄ·¸·¨»î¶¯¼°Æä¹ØÁª£¬£¬£¬IntezerºÍCheck PointÑо¿Ö°Ô±ÅäºÏÐû²¼Á˶íÂÞ˹APTµØÍ¼¡£¡£¡£¸ÃµØÍ¼ÖÜÈ«ÐðÊöÁ˶íÂÞ˹²î±ðAPTµÄ¶ñÒâÈí¼þÑù±¾¡¢¶ñÒâÈí¼þ¼Ò×åÒÔ¼°¹¥»÷ÕßÖ®¼äµÄ¹ØÁª¡£¡£¡£Ñо¿Ö°Ô±¹²ÍøÂç¡¢¹éÀàºÍÆÊÎöÁË2000¶à¸ö¶ñÒâÈí¼þÑù±¾£¬£¬£¬²¢Æ¾Ö¤ËüÃÇÖ®¼ä¹²ÏíµÄ385ÍòÌõ´úÂë»æÖÆÁ˽ü2.2Íò¸öÅþÁ¬¡£¡£¡£¸ÃµØÍ¼»¹ÏÔʾ£¬£¬£¬Ö»¹Ü´ó´ó¶¼ºÚ¿Í×éÖ¯¶¼ÔÚ¸÷×Ô²î±ðµÄ¹¤¾ßºÍ¿ò¼ÜÖÐÖØ¸´Ê¹ÓÃ×Ô¼ºµÄ´úÂ룬£¬£¬µ«²î±ðµÄ×éÖ¯¼äȴûÓй²ÓôúÂ룬£¬£¬Õâ¿ÉÄÜÊÇΪÁË×èÖ¹¹ØÁªÌ»Â¶¡£¡£¡£Ñо¿Ö°Ô±»¹¹ûÕæÁ˸õØÍ¼¼°ÆäÊý¾Ý¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/09/russia-hacking-groups-map.html

4.Zebrocy APTʹÓûùÓÚGolangµÄкóÃÅѬȾĿµÄ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Ñо¿Ö°Ô±ÊӲ쵽Zebrocy APTÔÚ×î½üµÄ¹¥»÷»î¶¯ÖÐʹÓûùÓÚGolangµÄºóÃÅÇÔȡĿµÄÓû§µÄÐÅÏ¢¡£¡£¡£ZebrocyÓë¶íÂÞ˹·¸·¨ÍÅ»ïSednit£¨¼´APT28£©ÓйØ¡£¡£¡£ÔÚ¾­ÓÉÒ»¶Îʱ¼äµÄÇÄÈ»ÆÚºó£¬£¬£¬¶à¼ÒÇå¾²¹«Ë¾µÄÑо¿Ö°Ô±ÊӲ쵽Zebrocy¹¥»÷ÕßÓÚ8ÔÂ20ÈÕ»Ö¸´Éú¶¯£¬£¬£¬Æä¹¥»÷Ä¿µÄÈÔÈ»ÊǶ«Å·ºÍÖÐÑǹú¼ÒµÄʹ¹ÝºÍÍâ½»²¿¡£¡£¡£ZebrocyµÄ×îлÊÇ8ÔÂ22ÈÕÌᳫµÄ£¬£¬£¬Æä´¹ÂÚÓʼþµÄ¸½¼þÎĵµÄÚÈÝΪ¿Õȱ£¬£¬£¬µ«°üÀ¨¶ÔÔ¶³ÌpayloadµÄÒýÓᣡ£¡£´Ë»î¶¯µÄÒ»¸öÁÁµãÊÇʹÓÃDropboxÍйܶñÒâÄ£°å-wordData.dotm¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zebrocy-infects-targets-with-new-golang-based-backdoor-via-dropbox/

5.Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÓ¡¶ÈµÄжñÒâÈí¼þATMDtrack

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷Ò»¸öÕë¶ÔÓ¡¶ÈµÄеÄATM¶ñÒâÈí¼þATMDtrack¡£¡£¡£¸Ã¶ñÒâÈí¼þÓ볯ÏÊAPT×éÖ¯Lazarus APTÓйØ¡£¡£¡£ATMDtrackÓÚ2018ÄêÏÄÈÕÄ©×îÏÈÔÚÓ¡¶ÈµÄÒøÐÐÍøÂçÖб»·¢Ã÷£¬£¬£¬¿¨°Í˹»ù³ÆÔÚ2019Äê9Ô³õÊӲ쵽Á˸öñÒâÈí¼þµÄ×îй¥»÷»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§°üÀ¨¼üÅ̼ͼ¡¢¼ìË÷ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÍøÂçIPµØµã¼°»î¶¯µÄÍøÂçÅþÁ¬¡¢Àú³Ìö¾Ù¡¢Îļþö¾ÙµÈ¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùÔÚ±¨¸æÖÐÁгöÁ˸ù¥»÷µÄIoCµÈÊÖÒÕϸ½Ú¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91643/malware/north-korea-atmdtrack-malware.html

6.Ñо¿Ö°Ô±Åû¶vBulletinÖеÄδÐÞ²¹0day¼°PoC

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

һλÄäÃûÇå¾²Ñо¿Ö°Ô±ÔÚÊܽӴýµÄÂÛ̳Èí¼þvBulletinÖз¢Ã÷δÐÞ²¹µÄ0day²¢Åû¶ÁËÏà¹ØPoC¡£¡£¡£Æ¾Ö¤¶ÔÒÑÐû²¼´úÂëµÄÆÊÎö£¬£¬£¬¸Ã0dayÔÊÐí¹¥»÷ÕßÔÚÔËÐÐvBulletinʵÀýµÄЧÀÍÆ÷ÉÏÖ´ÐÐShellÏÂÁî¶øÎÞÐè¾ßÓÐÄ¿µÄÂÛ̳µÄÕË»§¡£¡£¡£ÕâÖÖÎó²î±»³ÆÎª¡°Ô¤Éí·ÝÑéÖ¤Ô¶³Ì´úÂëÖ´ÐС±Îó²î£¬£¬£¬ºÃÐÂÎÅÊÇ£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÁËvBulletin°æ±¾5.0.0µ½×îеÄ5.5.4¡£¡£¡£ÓÉÓÚvBulletin±»Áè¼Ý10Íò¸öÔÚÏßÍøÕ¾ËùʹÓ㬣¬£¬Òò´Ë¸ÃÎó²îµÄDZÔÚÓ°Ïì¹æÄ£¼«´ó£¬£¬£¬vBulletin¿ª·¢ÍŶÓÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/91689/hacking/unpatched-critical-0-day-vbulletin.html