µ¤ÂóÖÐÑëÒøÐÐºÍÆäËü7¼Ò˽ÈËÒøÐеÄÍøÕ¾Ôâµ½DDoS¹¥»÷

Ðû²¼Ê±¼ä 2023-01-12
1¡¢µ¤ÂóÖÐÑëÒøÐÐºÍÆäËü7¼Ò˽ÈËÒøÐеÄÍøÕ¾Ôâµ½DDoS¹¥»÷

      

·͸Éç1ÔÂ11ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬µ¤ÂóÖÐÑëÒøÐкÍΪ½ðÈÚÐÐÒµ¿ª·¢IT½â¾ö¼Æ»®µÄ¹«Ë¾BankdataµÄÍøÕ¾Ôâµ½DDoS¹¥»÷¡£¡£¡£¡£ ¡£ÑëÐн²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÔÚÖܶþÏÂÖçÕý³£ÔËÐУ¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷²¢Î´Ó°Ïì¸ÃÒøÐÐµÄÆäËüϵͳ»òÒ»Ñùƽ³£ÔËÓª¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÔÚBankdataÔâµ½DDoS¹¥»÷ºó£¬£¬£¬£¬£¬£¬ÆäËü7¼Ò˽ÈËÒøÐÐÍøÕ¾µÄ»á¼ûÔÚÖܶþÒ²Êܵ½ÁËÏÞÖÆ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨µ¤Âó×î´óµÄÁ½¼ÒÒøÐÐJyske Bank(JYSK.CO)ºÍSydbank(SYDB.CO)¡£¡£¡£¡£ ¡£


https://www.reuters.com/technology/denmarks-central-bank-website-hit-by-cyberattack-2023-01-10/


2¡¢ESET·¢Ã÷StrongPityÍÅ»ï·Ö·¢Ä¾Âí»¯TelegramµÄ»î¶¯

      

1ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯StrongPityµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¸Ã»î¶¯×Ô2021Äê11ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬Í¨¹ýÒ»¸öð³äShagleµÄÍøÕ¾·Ö·¢¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£ ¡£ShagleÊÇÒ»¸öÕýµ±µÄËæ»úÊÓÆµÌ¸ÌìÆ½Ì¨£¬£¬£¬£¬£¬£¬µ«Ëü²¢Ã»ÓÐÒÆ¶¯Ó¦ÓóÌÐò¡£¡£¡£¡£ ¡£¶ñÒâÓ¦ÓÃÊÇÒ»¸öÃûΪvideo.apkµÄAPKÎļþ£¬£¬£¬£¬£¬£¬ÕâÊÇÕýµ±TelegramÓ¦ÓõÄľÂí»¯°æ±¾£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËStrongPityºóÃÅ´úÂëÖØÐ´ò°üÀ´Ã°³äShagleÒÆ¶¯Ó¦Óᣡ£¡£¡£ ¡£×°Öú󣬣¬£¬£¬£¬£¬´ËÓ¦ÓÿɾÙÐжàÖÖÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬°üÀ¨¼à¿Øµç»°¡¢ÍøÂç¶ÌÐźͻñÈ¡ÁªÏµÈËÁбí¡£¡£¡£¡£ ¡£


https://www.welivesecurity.com/2023/01/10/strongpity-espionage-campaign-targeting-android-users/


3¡¢ÐµÄDark PinkÍÅ»ïʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¹¥»÷¾üÕþ×éÖ¯

      

Group-IBÓÚ1ÔÂ11ÈÕÅû¶ÁËеÄAPT×éÖ¯Dark PinkÕë¶ÔÑÇÌ«ºÍÅ·ÖÞµØÇøµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¸Ã»î¶¯Ê¼ÓÚÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÆäʹÓõÄ×Ô½ç˵¹¤¾ß°ü¿ÉÓÃÓÚÇÔÊØÐÅÏ¢²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹Í¨¹ýDLL²à¼ÓÔØºÍÊÂÎñ´¥·¢µÄÒªÁ죬£¬£¬£¬£¬£¬ÔÚ±»Ñ¬È¾µÄϵͳÉÏÔËÐÐÆäpayload¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷µÄ½¹µãÊÇÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÄ¿µÄµÄ×°±¸ºÍÍøÂçÖÐÇÔÈ¡Îļþ¡¢Âó¿Ë·çÒôƵºÍmessengerÊý¾Ý¡£¡£¡£¡£ ¡£Group-IB³Æ¸ÃÍÅ»ïÔÚ2022Äê6ÔÂ12ÔÂÒÑÌᳫÖÁÉÙ7´ÎÀֳɵĹ¥»÷¡£¡£¡£¡£ ¡£


https://www.group-ib.com/media-center/press-releases/dark-pink-apt/


4¡¢Áè¼Ý1300¸öÓòð³äAnyDeskÍøÕ¾·Ö·¢Vidar Stealer

      

¾ÝýÌå1ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ò»³¡Ê¹ÓÃÁË1300¶à¸öÓòð³äAnyDesk¹Ù·½ÍøÕ¾µÄ´ó¹æÄ£»£»£»î¶¯ÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£ ¡£ÕâЩÓò¶¼½«Óû§Öض¨Ïòµ½Í³Ò»¸öDropboxÁ´½Ó£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏÂÔØVidar stealer£¬£¬£¬£¬£¬£¬ÇÒËùÓÐÓò¶¼ÆÊÎöΪÏàͬµÄIPµØµã185.149.120[.]9¡£¡£¡£¡£ ¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬´ó´ó¶¼ÓòÈÔÈ»ÔÚÏߣ¬£¬£¬£¬£¬£¬¶øÆäËüÓòÒѱ»×¢²áÉ̱¨¸æ²¢ÏÂÏß»ò±»AV¹¤¾ß×èÖ¹¡£¡£¡£¡£ ¡£ÓÉÓÚAnyDeskµÄÊ¢ÐÐÐÔ£¬£¬£¬£¬£¬£¬Æä¾­³£±»ÀÄÓÃÀ´·Ö·¢¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬CybleÔÚ2022Äê10ÔÂÒ²Ôø·¢Ã÷ͨ¹ýAnyDesk´¹ÂÚÍøÕ¾·Ö·¢Mitsu StealerµÄ»î¶¯¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/over-1-300-fake-anydesk-sites-push-vidar-info-stealing-malware/


5¡¢UptycsÅû¶Õë¶ÔÒâ´óÀûµÄInfostealer¶ñÒâÈí¼þ»î¶¯

      

UptycsÔÚ1ÔÂ6ÈÕÐû²¼ÁËÕë¶ÔÒâ´óÀûµÄInfostealer¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¹¥»÷»î¶¯µÄ¶à½×¶ÎѬȾÁ´´ÓÒÔ·¢Æ±ÎªÖ÷ÌâµÄ´¹ÂÚÓʼþ×îÏÈ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÁ´½Ó£¬£¬£¬£¬£¬£¬µã»÷Á´½Ó»áÏÂÔØÒ»¸öÊÜÃÜÂë±£»£»£»¤µÄZIP´æµµÎļþ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸ö.LNKÎļþºÍÒ»¸ö.BATÎļþ¡£¡£¡£¡£ ¡£Åú´¦Öóͷ£¾ç±¾»á´ÓGitHub´æ´¢¿âÖÐ×°ÖöñÒâÈí¼þpayload¡£¡£¡£¡£ ¡£×°Öú󣬣¬£¬£¬£¬£¬»ùÓÚC#µÄ¶ñÒâÈí¼þ»áÇÔȡϵͳÐÅÏ¢¡¢¼ÓÃÜÇ®°ü¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢cookieÒÔ¼°¼ÓÃÜÇ®°üµÄƾ֤µÈ¡£¡£¡£¡£ ¡£


https://www.uptycs.com/blog/infostealer-malware-attacks-targeting-italian-region/


6¡¢CiscoÌáÐѿͻ§×¢ÖØEoL·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î

      

1ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬CiscoÐû²¼Ç徲ͨ¸æÌáÐѿͻ§×¢ÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2023-20025£©¡£¡£¡£¡£ ¡£¸ÃÎó²î»áÓ°Ïì¶à¸öÒÑÖÐÖ¹Ö§³Ö(EoL)µÄVPN·ÓÉÆ÷£¬£¬£¬£¬£¬£¬°üÀ¨Cisco Small Business RV016¡¢RV042¡¢RV042GºÍRV082·ÓÉÆ÷¡£¡£¡£¡£ ¡£ÀÖ³ÉʹÓøÃÎó²î¿É»ñµÃroot»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬½«ÆäÓëÁíÒ»¸öÎó²î£¨CVE-2023-2002£©Á¬ÏµÊ¹ÓÿÉÔڵײã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£ ¡£ÏÖÔÚÒÑÔÚÒ°Íâ·¢Ã÷¿ÉÓõĿ´·¨ÑéÖ¤Îó²îʹÓôúÂ룬£¬£¬£¬£¬£¬ÖÎÀíÔ±¿ÉÒÔͨ¹ý½ûÓÃÔ¶³ÌÖÎÀí²¢×èÖ¹¶Ô¶Ë¿Ú443ºÍ60443µÄ»á¼ûÀ´»º½âÎó²î¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-of-auth-bypass-bug-with-public-exploit-in-eol-routers/