ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker £¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª £»£»£» £»£»£»Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢Èë £¬£¬¿ÉÈëÇÖÆäGitHub¿â

Ðû²¼Ê±¼ä 2021-01-29

1.ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker £¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª


1.png


ÔÚÅ·ÖÞÐ̾¯×éÖ¯ÆÆ»ñEmotet½©Ê¬ÍøÂçµÄͳһÌì £¬£¬ÃÀ¹úºÍ±£¼ÓÀûÑÇÕþ¸®ÁªºÏµ·»ÙÁË2020Äê×î»îÔ¾µÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»NetWalkerµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£´Ë´ÎÐж¯¾Ð²¶ÁËÒ»Ãû¼ÓÄôóÏÓÒÉÈËVachon Desjardins £¬£¬»¹½É»ñÁËÍйÜ×ÅÊý¾ÝÐ¹Â¶ÍøÕ¾µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¾ÝÃÀ¹úÕþ¸®³Æ £¬£¬NetWalkerÒѹ¥»÷ÁËÀ´×Ô27¸ö²î±ð¹ú¼ÒµÄÖÁÉÙ305ÃûÊܺ¦Õß¡£¡£¡£¡£¡£McAfee³ÆNetWalkerÒÑÓ¯ÀûÁè¼Ý2500ÍòÃÀÔª £¬£¬¶øÇø¿éÁ´ÆÊÎö¹«Ë¾ChainalysisÌåÏÖNetWalker 2020ÄêÓ¯Àû¿ÉÄÜÁè¼Ý4600ÍòÃÀÔª £¬£¬½ö´ÎÓÚRyuk¡¢Maze¡¢DoppelpaymerºÍSodinokibi¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113944/cyber-crime/netwalker-ransowmare-dismantled.html


2.TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â


2.png


AT£¦TµÄÑо¿Ö°Ô±·¢Ã÷TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£TeamTNTÒÔ»ùÓÚÔÆµÄ¹¥»÷¶øÖøÃû £¬£¬ÀýÈçʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©Æ¾Ö¤À´ÇÖÈëÔÆ £¬£¬²¢ÓÃÆäÀ´ÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¿£¿£¿ £¿£¿£¿ªÔ´¹¤¾ßlibprocesshiderÊÇ2014Äê±»·ÅÔÚGithubÉ쵀 £¬£¬¿ÉʹÓÃldÔ¤¼ÓÔØÆ÷ÔÚLinuxÏÂÒþ²ØÀú³Ì¡£¡£¡£¡£¡£ºÚ¿Í½ÓÄÉbase64±àÂëµÄ¾ç±¾ £¬£¬½«¸Ã¹¤¾ßÒþ²ØÔÚTeamTNT cryptominerµÄ¶þ½øÖÆÎļþÖÐ £¬£¬Ö¼ÔÚ´ÓÀú³ÌÐÅÏ¢³ÌÐò£¨ÀýÈçpsºÍlsof£©ÖÐÒþ²Ø¶ñÒâÀú³ÌÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/teamtnt-cloaks-malware-open-source-tool/163414/


3.Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢Èë £¬£¬¿ÉÈëÇÖÆäGitHub¿â


3.png


Ñо¿Ö°Ô±RyotaKÅû¶VS Code±£´æ´úÂë×¢ÈëÎó²î £¬£¬¿ÉÈëÇÖÆäGitHub¿â¡£¡£¡£¡£¡£¸ÃÎó²îλÓÚVS CodeµÄÒ»Á¬¼¯³É£¨CI£©¾ç±¾µÄvscode-github-triage-actions´æ´¢¿âÖÐ £¬£¬ÓÉÓÚÔÚclosedWithÏÂÁîÖÐȱÉÙÉí·ÝÑéÖ¤¼ì²é £¬£¬²¢ÇÒÓÃÓÚÑéÖ¤¹Ø±Õ×¢Ê͵ÄÕýÔò±í´ïʽ±£´æÈ±ÏÝ £¬£¬µ¼ÖÂÈκÎÈ˶¼¿ÉÒÔÔÚclosewithÖµÖÐ×¢Èë´úÂë¡£¡£¡£¡£¡£RyotaK·¢Ã÷¿ÉʹÓøÃÎó²î»ñµÃVS Code GitHub´æ´¢¿âµÄÊÚȨÁîÅÆ £¬£¬²¢ÄÜ¶ÔÆä¾ÙÐжÁд¡£¡£¡£¡£¡£RyotaKÒÑÏòMicrosoft±¨¸æÁ˸ÃÎó²î £¬£¬²¢Ðû²¼ÁËÎó²îµÄPoC¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/


4.ClearskyÅû¶Àè°ÍÄÛCedar APTÕë¶ÔÈ«ÇòISPµÄÌØ¹¤»î¶¯


4.png


ClearskyÅû¶Àè°ÍÄÛCedar APT×éÖ¯Õë¶ÔÈ«ÇòµçÐÅÔËÓªÉ̺ÍISPµÄÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ2020ÄêÍ· £¬£¬ºÚ¿Í¹¥»÷ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢°£¼°¡¢ÒÔÉ«ÁС¢Àè°ÍÄÛ¡¢Ô¼µ©¡¢°ÍÀÕ˹̹¡¢É³Ìذ¢À­²®ºÍ°¢ÁªÇõµÄ»¥ÁªÍøÐ§ÀÍÔËÓªÉÌ £¬£¬Ö¼ÔÚÍøÂçÇ鱨ºÍÇÔÈ¡¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÿªÔ´¹¤¾ßɨÃèInternetÉÏδ´ò²¹¶¡µÄAtlassianºÍOracleЧÀÍÆ÷ £¬£¬È»ºóʹÓÃÎó²îÀ´»á¼ûЧÀÍÆ÷²¢°²ÅÅWeb Shell £¬£¬Ö÷ҪʹÓÃÁË3¸ö1ÈÕÎó²îCVE-2019-3396¡¢CVE-2019-11581ºÍCVE-2012-3152¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113975/apt/lebanese-cedar-apt-attacks.html


5.NetscoutÐû²¼ÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


5.png


NetscoutÐû²¼ÁËÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö £¬£¬Ð§ÀÍÌṩÉÌÍøÂç³ÉΪÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷µÄÖØµã £¬£¬µçÐÅÌṩÉÌÔÚ2020ÉϰëÄêÔâµ½492807´Î¹¥»÷ £¬£¬±È2019ÄêͬÆÚÔöÌíÁË25£¥¡£¡£¡£¡£¡£±ðµÄ £¬£¬DDoS¹¥»÷ǰÑÔµÄÖØ´óÐÔÒ²ÔÚÔöÌí £¬£¬×Ô2017ÄêÒÔÀ´ £¬£¬Ê¹ÓÃ15¸öÒÔÉÏǰÑԵĹ¥»÷ÊýÄ¿ÔöÌíÁË2851£¥¡£¡£¡£¡£¡£¶ø2020ÄêÉϰëÄê¹¥»÷µÄÍÌÍÂÁ¿£¨pps£©±È2019ÄêÔöÌíÁË31£¥ £¬£¬¹¥»÷Ò»Á¬Ê±¼äïÔÌ­ÁË51£¥¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/blog/service-provider-ddos-attacks-are-rise


6.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ


6.png


¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼ÁËCOVID-19ÒÔÀ´ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷ £¬£¬ÔÚ2020Äê1ÔÂÖÁ4ÔÂÖÐ×ܹ²¼ì²âµ½ÁËԼĪ907000ÌõÀ¬»øÓʼþ £¬£¬737ÆðÓë¶ñÒâÈí¼þÓйصÄÊÂÎñºÍ48000¸öÓëCOVID-19ÓйصÄURL¡£¡£¡£¡£¡£2020Äê2ÔÂÖÁ3Ô £¬£¬¶ñÒâÓòÃû×¢²áÊýÄ¿ÔöÌíÁË569£¥ £¬£¬¶øÒÉËÆ¶ñÒâÓòÃûµÄ×¢²áÊýÄ¿ÔòÔöÌíÁË788£¥¡£¡£¡£¡£¡£±¨¸æ»¹Ö¸³öÍøÂç·¸·¨·Ö×ÓʹÓÃÁËÓÉCOVID-19Ôì³ÉµÄÉç»á²»ÎȹÌÐԺ;­¼ÃÐÎÊÆÔì³ÉµÄ¿Ö¾åºÍ²»È·¶¨ÐÔ £¬£¬ÕýÔÚÒÔ¾ªÈ˵ÄËÙÂÊÉú³¤¹¥»÷¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19