ÖÇÀû½ðÈÚÊг¡Î¯Ô±»áExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC£»£»SentinelOne·¢Ã÷Õë¶ÔiOS¿ª·¢Ö°Ô±µÄ¹©Ó¦Á´¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-03-19

1.ÖÇÀû½ðÈÚÊг¡Î¯Ô±»áExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC


1.jpg


ÖÇÀû½ðÈÚÊг¡Î¯Ô±»á£¨CMF£©³ÆÆäExchangeÔâµ½¹¥»÷²¢¹²ÏíIOC¡£¡£¡£¡£¡£¡£CMFÊôÓÚÖÇÀû²ÆÎñ²¿ £¬£¬£¬£¬£¬£¬ÊÇÖÇÀûÒøÐкͽðÈÚ»ú¹¹µÄî¿ÏµÕߺͼì²éÔ±¡£¡£¡£¡£¡£¡£CMFÓÚ3ÔÂ17ÈÕÐû²¼±¨¸æ £¬£¬£¬£¬£¬£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÅû¶µÄMicrosoft ExchangeЧÀÍÆ÷ÖеÄProxyLogonÎó²î×°ÖÃWeb Shell²¢ÊÔͼÇÔȡƾ֤֮ºó¡£¡£¡£¡£¡£¡£ÎªÁË×ÊÖúÑо¿Ö°Ô±ºÍÆäËûMicrosoft ExchangeÖÎÀíÔ± £¬£¬£¬£¬£¬£¬CMF»¹Ðû²¼ÁËWeb ShellµÄIOCºÍÔÚÔâµ½¹¥»÷µÄЧÀÍÆ÷ÉÏÕÒµ½µÄÅú´¦Öóͷ£Îļþ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/chiles-bank-regulator-shares-iocs-after-microsoft-exchange-hack/


2.SentinelOne·¢Ã÷Õë¶ÔiOS¿ª·¢Ö°Ô±µÄ¹©Ó¦Á´¹¥»÷»î¶¯


2.jpg


Çå¾²¹«Ë¾SentinelOne·¢Ã÷ÁËÐµĹ©Ó¦Á´¹¥»÷»î¶¯ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÃûΪXcodeSpyµÄ¶ñÒâXcodeÏîÄ¿Õë¶ÔiOS¿ª·¢Ö°Ô±¡£¡£¡£¡£¡£¡£XcodeÊÇApple½¨ÉèµÄ¼¯³É¿ª·¢ÇéÐΣ¨IDE£© £¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±¿ÉʹÓÃÆä½¨ÉèmacOS¡¢iOS¡¢tvOSºÍwatchOSÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Ôڸù¥»÷ÖÐ £¬£¬£¬£¬£¬£¬ºÚ¿Í¿Ë¡ÁËÕýµ±µÄTabBarInteractionÏîÄ¿ £¬£¬£¬£¬£¬£¬²¢Ìí¼ÓÁËÄ£ºýµÄ¶ñÒâRun¾ç±¾XcodeSpy £¬£¬£¬£¬£¬£¬ÒÔ½«¹¥»÷ÕßµÄC2ЧÀÍÆ÷ÅþÁ¬µ½¿ª·¢Ö°Ô±µÄÏîÄ¿¡£¡£¡£¡£¡£¡£XcodeSpyÓÚ9ÔÂ4ÈÕÊ״α»ÉÏ´«µ½VirusTotal £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÏÓÒÉÕâÊǹ¥»÷ÕßΪ²âÊÔ¼ì²âÂʶø×Ô¼ºÉÏ´«µÄÑù±¾¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-xcodespy-malware-targets-ios-devs-in-supply-chain-attack/


3.Ñо¿Ö°Ô±·¢Ã÷Ö¼ÔÚÇÔÈ¡5GÏà¹ØÊÖÒÕµÄDi¨¤nx¨´nÐж¯


3.jpg


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔµçÐŹ«Ë¾µÄDi¨¤nx¨´nÐж¯ £¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡5GÊÖÒÕÏà¹ØµÄÃô¸ÐÊý¾ÝºÍÉÌÒµÉñÃØ¡£¡£¡£¡£¡£¡£ÔÚ²¿·Ö¹¥»÷ÖÐ £¬£¬£¬£¬£¬£¬ºÚ¿Í´î½¨ÁËÒ»¸öαÔì³É»ªÎªÖ°ÒµÒ³ÃæµÄÐéÎ±ÍøÕ¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯ËùʹÓõÄÕ½Êõ¡¢ÊÖÒպͳÌÐò£¨TTP£©ÓëAPT×éÖ¯RedDeltaºÍÒ°Mustang PandaµÄÐж¯ÏàËÆ¡£¡£¡£¡£¡£¡£McAfee ATRÍŶÓÌåÏÖ×î³õµÄѬȾǰÑÔÉв»ÍêÈ«ÇåÎú £¬£¬£¬£¬£¬£¬µ«ÆäÍÆ²âºÚ¿Í¿ÉÄÜʹÓô¹ÂÚÍøÕ¾À´·Ö·¢¶ñÒâÈí¼þ £¬£¬£¬£¬£¬£¬²¢ÔÚ¹¥»÷µÄµÚ¶þ½×¶ÎʹÓûùÓÚFlashµÄ¹¤¼þ¶ñÒâÈí¼þÔÚÊܺ¦ÕßµÄϵͳÉÏÖ´ÐÐ.NET¸ºÔØ¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115693/apt/chinese-hackers-5g.html


4.ŦԼÖݶà¸öÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Êý¾Ý»òÒÑй¶


4.jpg


ŦԼÖݵݶû°ÍÄá¡¢ÈøÀ­ÍмӺÍÂ×˹ÀÕµÈÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Êý¾Ý»òÒÑй¶¡£¡£¡£¡£¡£¡£°Â¶û°ÍÄáÏØ¾¯³¤°ì¹«ÊÒÌåÏÖ¹¥»÷±¬·¢ÔÚ±¾ÖܶþÍíÉÏ9µã30·Ö×óÓÒ £¬£¬£¬£¬£¬£¬ÌØÀïÏØ¹«¹²Çå¾²ÍøÂçѬȾÁËÀÕË÷Èí¼þ £¬£¬£¬£¬£¬£¬Ó°ÏìÁ˶à¸öÏØ³Ç¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ £¬£¬£¬£¬£¬£¬Computer Aidedµ÷Àí£¨CAD£©Ð§ÀÍÊܵ½ÁËÓ°Ïì £¬£¬£¬£¬£¬£¬ÆäÕýÔÚͨ¹ý±¸·Ý¾ÙÐÐÖØÐÞ¡£¡£¡£¡£¡£¡£¸ÃÏØ¹ÙÔ±ÌåÏÖ £¬£¬£¬£¬£¬£¬ÏÖÔÚ±¸ÓÃϵͳÈÔÕý³£ÔËÐв¢ÇÒ¿ÉÒÔΪÌṩ911ЧÀÍ £¬£¬£¬£¬£¬£¬¿ÉÊDz¿·ÖÊý¾Ý¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.news10.com/news/tri-county-sheriff-dispatch-hit-with-ransomware-attack/


5.ÈÕ¾­ÖйúÏã¸Û·Ö¹«Ë¾³ÆÆäÔâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢¿ÉÄÜй¶


5.jpg


ÈÕ¾­(Nikkei)±¾ÖÜÈýÌåÏÖÆäÖйúÏã¸Û·Ö¹«Ë¾Ôâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ2020Äê10Ô £¬£¬£¬£¬£¬£¬¸Ã·Ö¹«Ë¾µÄ²¿·Öµç×ÓÓʼþÕË»§Ô⵽δ¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£ÈÕ¾­¹ú¼Ê°æ¡¢ÍøÂç°æºÍÈÕ¾­ÑÇÖÞ°æ¡¢ÈÕ¾­ÖйúµÄÍâÑó¶©»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶ £¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¹«Ë¾Ãû³Æ¡¢µØµãºÍµç»°ºÅÂë £¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬ÈÕ¾­Öйú¹«Ë¾Òѽ«´ËÊÂÎñ±¨¸æ¸øÏã¸ÛµÄСÎÒ˽¼ÒÐÅÏ¢±£»£»¤Õþ¸®¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://asia.nikkei.com/Business/Companies/Nikkei-s-Hong-Kong-affiliate-hit-by-unauthorized-access


6.Unit42Ðû²¼2021ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


6.jpg


Unit42Ðû²¼ÁË2021ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬Ö¼ÔÚÆÀ¹ÀÀÕË÷Èí¼þ¹¥»÷µÄ¹æÄ£²¢Ìṩ¿É½µµÍΣº¦µÄ²Ù×÷°ì·¨¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬£¬£¬Æ½¾ùÊê½ð´Ó2019ÄêµÄ115123ÃÀÔªÔöÌíµ½2020ÄêµÄ312493ÃÀÔª £¬£¬£¬£¬£¬£¬×î¸ßÊê½ð´Ó1500ÍòÃÀÔªÔöÌíµ½3000ÍòÃÀÔª£»£»ºÚ¿ÍÖ÷ÒªÕë¶ÔÒ½ÁƱ£½¡²¿·Ö£»£»Ë«ÖØÀÕË÷µÄÇéÐÎÓÐËùÔöÌí £¬£¬£¬£¬£¬£¬Áè¼Ý16ÖÖ²î±ðµÄÀÕË÷Èí¼þ±äÖÖ¶¼ÔÚʹÓÃÕâÖÖÒªÁì £¬£¬£¬£¬£¬£¬ÆäÖÐNetwalkerÕ¼±È×î´ó £¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÒ»°Ù¶àÃûÊܺ¦ÕßµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/ransomware-threat-assessments/