ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬£¬£¬£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬£¬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â

Ðû²¼Ê±¼ä 2021-01-29

1.ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬£¬£¬£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª


1.png


ÔÚÅ·ÖÞÐ̾¯×éÖ¯ÆÆ»ñEmotet½©Ê¬ÍøÂçµÄͳһÌ죬£¬£¬£¬£¬£¬ÃÀ¹úºÍ±£¼ÓÀûÑÇÕþ¸®ÁªºÏµ·»ÙÁË2020Äê×î»îÔ¾µÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»NetWalkerµÄ»ù´¡ÉèÊ©¡£¡£¡£´Ë´ÎÐж¯¾Ð²¶ÁËÒ»Ãû¼ÓÄôóÏÓÒÉÈËVachon Desjardins£¬£¬£¬£¬£¬£¬»¹½É»ñÁËÍйÜ×ÅÊý¾ÝÐ¹Â¶ÍøÕ¾µÄЧÀÍÆ÷¡£¡£¡£¾ÝÃÀ¹úÕþ¸®³Æ£¬£¬£¬£¬£¬£¬NetWalkerÒѹ¥»÷ÁËÀ´×Ô27¸ö²î±ð¹ú¼ÒµÄÖÁÉÙ305ÃûÊܺ¦Õß¡£¡£¡£McAfee³ÆNetWalkerÒÑÓ¯ÀûÁè¼Ý2500ÍòÃÀÔª£¬£¬£¬£¬£¬£¬¶øÇø¿éÁ´ÆÊÎö¹«Ë¾ChainalysisÌåÏÖNetWalker 2020ÄêÓ¯Àû¿ÉÄÜÁè¼Ý4600ÍòÃÀÔª£¬£¬£¬£¬£¬£¬½ö´ÎÓÚRyuk¡¢Maze¡¢DoppelpaymerºÍSodinokibi¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113944/cyber-crime/netwalker-ransowmare-dismantled.html


2.TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â


2.png


AT£¦TµÄÑо¿Ö°Ô±·¢Ã÷TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â¡£¡£¡£TeamTNTÒÔ»ùÓÚÔÆµÄ¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬£¬ÀýÈçʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©Æ¾Ö¤À´ÇÖÈëÔÆ£¬£¬£¬£¬£¬£¬²¢ÓÃÆäÀ´ÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ªÔ´¹¤¾ßlibprocesshiderÊÇ2014Äê±»·ÅÔÚGithubÉϵÄ£¬£¬£¬£¬£¬£¬¿ÉʹÓÃldÔ¤¼ÓÔØÆ÷ÔÚLinuxÏÂÒþ²ØÀú³Ì¡£¡£¡£ºÚ¿Í½ÓÄÉbase64±àÂëµÄ¾ç±¾£¬£¬£¬£¬£¬£¬½«¸Ã¹¤¾ßÒþ²ØÔÚTeamTNT cryptominerµÄ¶þ½øÖÆÎļþÖУ¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÀú³ÌÐÅÏ¢³ÌÐò£¨ÀýÈçpsºÍlsof£©ÖÐÒþ²Ø¶ñÒâÀú³ÌÒÔÈÆ¹ý¼ì²â¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/teamtnt-cloaks-malware-open-source-tool/163414/


3.Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬£¬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â


3.png


Ñо¿Ö°Ô±RyotaKÅû¶VS Code±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈëÇÖÆäGitHub¿â¡£¡£¡£¸ÃÎó²îλÓÚVS CodeµÄÒ»Á¬¼¯³É£¨CI£©¾ç±¾µÄvscode-github-triage-actions´æ´¢¿âÖУ¬£¬£¬£¬£¬£¬ÓÉÓÚÔÚclosedWithÏÂÁîÖÐȱÉÙÉí·ÝÑéÖ¤¼ì²é£¬£¬£¬£¬£¬£¬²¢ÇÒÓÃÓÚÑéÖ¤¹Ø±Õ×¢Ê͵ÄÕýÔò±í´ïʽ±£´æÈ±ÏÝ£¬£¬£¬£¬£¬£¬µ¼ÖÂÈκÎÈ˶¼¿ÉÒÔÔÚclosewithÖµÖÐ×¢Èë´úÂë¡£¡£¡£RyotaK·¢Ã÷¿ÉʹÓøÃÎó²î»ñµÃVS Code GitHub´æ´¢¿âµÄÊÚȨÁîÅÆ£¬£¬£¬£¬£¬£¬²¢ÄÜ¶ÔÆä¾ÙÐжÁд¡£¡£¡£RyotaKÒÑÏòMicrosoft±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÎó²îµÄPoC¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/


4.ClearskyÅû¶Àè°ÍÄÛCedar APTÕë¶ÔÈ«ÇòISPµÄÌØ¹¤»î¶¯


4.png


ClearskyÅû¶Àè°ÍÄÛCedar APT×éÖ¯Õë¶ÔÈ«ÇòµçÐÅÔËÓªÉ̺ÍISPµÄÌØ¹¤»î¶¯¡£¡£¡£¹¥»÷ʼÓÚ2020ÄêÍ·£¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢°£¼°¡¢ÒÔÉ«ÁС¢Àè°ÍÄÛ¡¢Ô¼µ©¡¢°ÍÀÕ˹̹¡¢É³Ìذ¢À­²®ºÍ°¢ÁªÇõµÄ»¥ÁªÍøÐ§ÀÍÔËÓªÉÌ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÍøÂçÇ鱨ºÍÇÔÈ¡¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£¡£¹¥»÷ÕßʹÓÿªÔ´¹¤¾ßɨÃèInternetÉÏδ´ò²¹¶¡µÄAtlassianºÍOracleЧÀÍÆ÷£¬£¬£¬£¬£¬£¬È»ºóʹÓÃÎó²îÀ´»á¼ûЧÀÍÆ÷²¢°²ÅÅWeb Shell£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓÃÁË3¸ö1ÈÕÎó²îCVE-2019-3396¡¢CVE-2019-11581ºÍCVE-2012-3152¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113975/apt/lebanese-cedar-apt-attacks.html


5.NetscoutÐû²¼ÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


5.png


NetscoutÐû²¼ÁËÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Ð§ÀÍÌṩÉÌÍøÂç³ÉΪÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷µÄÖØµã£¬£¬£¬£¬£¬£¬µçÐÅÌṩÉÌÔÚ2020ÉϰëÄêÔâµ½492807´Î¹¥»÷£¬£¬£¬£¬£¬£¬±È2019ÄêͬÆÚÔöÌíÁË25£¥¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬DDoS¹¥»÷ǰÑÔµÄÖØ´óÐÔÒ²ÔÚÔöÌí£¬£¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Ê¹ÓÃ15¸öÒÔÉÏǰÑԵĹ¥»÷ÊýÄ¿ÔöÌíÁË2851£¥¡£¡£¡£¶ø2020ÄêÉϰëÄê¹¥»÷µÄÍÌÍÂÁ¿£¨pps£©±È2019ÄêÔöÌíÁË31£¥£¬£¬£¬£¬£¬£¬¹¥»÷Ò»Á¬Ê±¼äïÔÌ­ÁË51£¥¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/blog/service-provider-ddos-attacks-are-rise


6.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ


6.png


¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼ÁËCOVID-19ÒÔÀ´ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2020Äê1ÔÂÖÁ4ÔÂÖÐ×ܹ²¼ì²âµ½ÁËԼĪ907000ÌõÀ¬»øÓʼþ£¬£¬£¬£¬£¬£¬737ÆðÓë¶ñÒâÈí¼þÓйصÄÊÂÎñºÍ48000¸öÓëCOVID-19ÓйصÄURL¡£¡£¡£2020Äê2ÔÂÖÁ3Ô£¬£¬£¬£¬£¬£¬¶ñÒâÓòÃû×¢²áÊýÄ¿ÔöÌíÁË569£¥£¬£¬£¬£¬£¬£¬¶øÒÉËÆ¶ñÒâÓòÃûµÄ×¢²áÊýÄ¿ÔòÔöÌíÁË788£¥¡£¡£¡£±¨¸æ»¹Ö¸³öÍøÂç·¸·¨·Ö×ÓʹÓÃÁËÓÉCOVID-19Ôì³ÉµÄÉç»á²»ÎȹÌÐԺ;­¼ÃÐÎÊÆÔì³ÉµÄ¿Ö¾åºÍ²»È·¶¨ÐÔ£¬£¬£¬£¬£¬£¬ÕýÔÚÒÔ¾ªÈ˵ÄËÙÂÊÉú³¤¹¥»÷¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19