SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247

Ðû²¼Ê±¼ä 2022-01-26

SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬SolarWindsÐÞ¸´ÁËServ-UÖÐÒѱ»ÔÚҰʹÓõÄÊäÈëÑéÖ¤Îó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-35247£¬£¬£¬ £¬£¬£¬£¬ÓÉ΢ÈíÑо¿Ö°Ô±Jonathan Bar OrÔÚ¼à¿ØÊ¹ÓÃLog4j¿âÖеÄÎó²î¾ÙÐеĹ¥»÷ʱ·¢Ã÷¡£¡£¡£¡£¡£¡ £¿£¿£¿£¿ £¿£¿£¿É±»ÓÃÀ´ÔÚ¸ø¶¨Ò»Ð©ÊäÈëµÄÇéÐÎϹ¹½¨Ò»¸öÅÌÎÊ£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚδ¾­´¦Öóͷ£µÄÇéÐÎÏÂͨ¹ýÍøÂç·¢Ë͸ÃÅÌÎÊ¡£¡£¡£¡£¡£¡£SolarWindsͨ¸æ³Æ£¬£¬£¬ £¬£¬£¬£¬LDAPÈÏÖ¤µÄServ-U webµÇ¼½çÃæÔÊÐí½ÓÊÜûÓгä·Ö¹ýÂ˵Ä×Ö·û£¬£¬£¬ £¬£¬£¬£¬¸ÃÎÊÌâÔÚServ-U 15.3Öнâ¾ö¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126933/security/solarwinds-serv-u-flaw.html



ASEC·¢Ã÷ͨ¹ýº«¹úWebHardƽ̨Èö²¥µÄDDoS IRC Bot


AhnLabÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ(ASEC)ÔÚ1ÔÂ19ÈÕÐû²¼µÄ±¨¸æÖÐÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬DDoS IRC BotÕýͨ¹ýº«¹úWebHardƽ̨Èö²¥¡£¡£¡£¡£¡£¡£»£»£»£»£»î¶¯½«´øÓжñÒâÈí¼þµÄÓÎÏ·ÒÔZIPÎļþµÄÐÎʽÉÏ´«µ½ÍøÂçÓ²ÅÌ£¬£¬£¬ £¬£¬£¬£¬¸ÃÎļþÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ£¨¡°Game_Open.exe¡±£©£¬£¬£¬ £¬£¬£¬£¬Ëü³ýÁË¿ÉÒÔÆô¶¯ÓÎÏ·Í⣬£¬£¬ £¬£¬£¬£¬»¹»áÔËÐжñÒâÈí¼þpayload¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÊÇ»ùÓÚGoLangµÄDDoS IRC Bot£¬£¬£¬ £¬£¬£¬£¬±»ÓÃÓÚÌᳫÕë¶Ôº«¹úµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/01/ddos-irc-bot-malware-spreading-through.html



ÓªÏú¹«Ë¾RR Donnelly³ÆÆäÔâµ½ContiµÄÀÕË÷¹¥»÷


ýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬ÓªÏú¹«Ë¾RR Donnelly(RRD)ÈÏ¿ÉÆäÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£12ÔÂ27ÈÕ£¬£¬£¬ £¬£¬£¬£¬RRDÏòSECÌá½»8-K±í¸ñ³ÆËûÃǵÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬ÆäÒѹرÕϵͳ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£1ÔÂ15ÈÕ£¬£¬£¬ £¬£¬£¬£¬ContiÍÅ»ïÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬²¢ÒÑ´ÓRRDÇÔÈ¡ÁË2.5GBÊý¾Ý¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬£¬£¬£¬ContiÔÚÓëRRD¾ÙÐÐ̸Åк󣬣¬£¬ £¬£¬£¬£¬Òѽ«ÕâЩÊý¾Ýɾ³ý¡£¡£¡£¡£¡£¡£1ÔÂ18ÈÕ£¬£¬£¬ £¬£¬£¬£¬RRDÓÖÐû²¼ÁËÒ»·Ý8-KÎļþ£¬£¬£¬ £¬£¬£¬£¬ÈÏ¿ÉÆäÊý¾ÝÒÑÔÚ¹¥»÷ʱ´ú±»µÁ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/marketing-giant-rrd-confirms-data-theft-in-conti-ransomware-attack/



ÁÔÓ¥Ðж¯IIÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬¹ú¼ÊÐ̾¯×é֯Эµ÷µÄÁÔÓ¥Ðж¯IIÒÑÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨»î¶¯¿ªÕ¹ÓÚ2021Äê12ÔÂ12ÈÕÖÁ22ÈÕ£¬£¬£¬ £¬£¬£¬£¬ÊÇ2020ÄêÁÔÓ¥Ðж¯IÖ®ºó¶ÔÌØ¶¨×éÖ¯µÄµÚ¶þ´Î¹¥»÷¡£¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯µÄͨ¸æ³Æ£¬£¬£¬ £¬£¬£¬£¬±»²¶µÄÏÓÒÉÈË¿ÉÄÜÒѹ¥»÷50000¶à¸öÄ¿µÄ£¬£¬£¬ £¬£¬£¬£¬ÆäÖÐÒ»È˵ÄÌõ¼Ç±¾ÉÏÓÐÁè¼Ý800000¸öDZÔÚÄ¿µÄÓòµÄƾ֤¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÒÔΪ£¬£¬£¬ £¬£¬£¬£¬²¿·Ö±»²¶ÕßÊôÓÚBECÍÅ»ïSilverTerrier£¨ÓÖÃûTMT£©¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/operation-falcon-ii-silverterrier-nigerian-bec/



Ñо¿ÍŶÓÔÚÒ°·¢Ã÷Õë¶Ô¼ÓÃÜÇ®±ÒµÄжñÒâÈí¼þBHUNT


BitdefenderÓÚ1ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬£¬ £¬£¬£¬£¬Åû¶Ð¶ñÒâÈí¼þBHUNTµÄϸ½Ú¡£¡£¡£¡£¡£¡£BHUNTÊÇÒ»¸öÓÃ.NET ±àдµÄÄ £¿£¿£¿£¿ £¿£¿£¿é»¯ÇÔÈ¡³ÌÐò£¬£¬£¬ £¬£¬£¬£¬Äܹ»ÇÔÈ¡¼ÓÃÜÇ®°ü£¨Exodus¡¢Electrum¡¢Atomic¡¢JaxxºÍEthereumµÈ£©ÖеÄÄÚÈÝ¡¢´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂëÒÔ¼°´Ó¼ôÌù°åÖв¶»ñµÄÃÜÂë¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Éæ¼°°Ä´óÀûÑÇ¡¢°£¼°¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÈÕ±¾¡¢ÂíÀ´Î÷ÑÇ¡¢Å²Íþ¡¢ÐÂ¼ÓÆÂ¡¢ÄÏ·Ç¡¢Î÷°àÑÀºÍÃÀ¹ú£¬£¬£¬ £¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÆÆ½âÈí¼þ×°ÖóÌÐò¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£


https://www.bitdefender.com/blog/labs/poking-holes-in-crypto-wallets-a-short-analysis-of-bhunt-stealer/



Crypto.com½ü500¸öÕË»§±»ºÚ£¬£¬£¬ £¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ


ýÌå1ÔÂ20Èճƣ¬£¬£¬ £¬£¬£¬£¬ÐÂ¼ÓÆÂCrypto.comÐû²¼µÄÉùÃ÷ÌåÏÖÆä483¸öÕË»§±»ºÚ£¬£¬£¬ £¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£×î³õ£¬£¬£¬ £¬£¬£¬£¬²¿·ÖÓû§±¨¸æÆäÕÊ»§±£´æ¿ÉÒÉÉúÒ⣬£¬£¬ £¬£¬£¬£¬Ö»¹ÜÊܵ½2FA±£»£»£»£»£»¤µ«ÈÔÓÐÊýǧÃÀÔªETH±»µÁ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ1ÔÂ17ÈÕÊ״μì²âµ½¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÆäʱÉÙÊýÓû§µÄÕÊ»§Éϱ£´æÎ´¾­ÊÚȨµÄÌá¿î¡£¡£¡£¡£¡£¡£Ö®ºó¹«Ë¾ÔÝÍ£ÁËËùÓÐÌá¿îÉúÒ⣬£¬£¬ £¬£¬£¬£¬ÔÚ¾­ÓÉÇå¾²¼Ó¹Ìºó£¬£¬£¬ £¬£¬£¬£¬Ìá¿îЧÀÍÓÚ1ÔÂ18ÈÕÏÂÖç5:46×óÓÒ»Ö¸´¡£¡£¡£¡£¡£¡£Crypto.comÌåÏÖÒÑ×èÖ¹´ó²¿·Öδ¾­ÊÚȨµÄÌá¿î£¬£¬£¬ £¬£¬£¬£¬²¢½«ÎªÊÜÓ°Ïì¿Í»§È«¶î±¨Ïú¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/



Çå¾²¹¤¾ß


Raven


ÊǼò»¯¡¢¿É¶¨ÖÆÇÒÏìӦѸËٵĸ߼¶ÍøÂçÍþвͼ¡£¡£¡£¡£¡£¡£


https://github.com/qeeqbox/raven


Espoofer


ÊÇÒ»ÖÖ¿ªÔ´²âÊÔ¹¤¾ß£¬£¬£¬ £¬£¬£¬£¬¿ÉÈÆ¹ýµç×ÓÓʼþϵͳÖÐµÄ SPF¡¢DKIM ºÍ DMARC Éí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£


https://github.com/chenjj/espoofer


pip-audit


ÊÇÒ»ÖÖÓÃÓÚɨÃè Python ÇéÐÎÒÔ²éÕÒ¾ßÓÐÒÑÖªÎó²îµÄ°üµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£


https://github.com/trailofbits/pip-audit


Çå¾²ÆÊÎö


Õë¶ÔÎÚ¿ËÀ¼¹Ù·½ÍøÕ¾µÄ¶ñÒâÈí¼þWhisperGateÆÊÎö


1ÔÂ13ÈÕÎÚ¿ËÀ¼´ó×ڵĹٷ½ÍøÕ¾±»¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÎÄÕÂÆÊÎöÁ˸ÃÊÂÎñÖжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3


2021 ÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö


´ÓÒ»Ö±Éú³¤µÄÀÕË÷Èí¼þÉú̬ϵͳµ½Õë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÈüÃÅÌú¿Ë»ØÊ×ÁË 2021 ÄêµÄÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021



Ó¢¹úNCSCÐû²¼×éÖ¯µÖÓùµç»°ºÍ¶ÌÐÅڲƭ»î¶¯µÄÖ¸ÄÏ


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC) Ðû²¼Á˵ÄÖ¸ÄÏÖ¼ÔÚ±£»£»£»£»£»¤¿Í»§ÃâÊÜڲƭ»î¶¯µÄ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬Í¬Ê±È·±£ËûÃÇµÄ SMS ºÍµç»°ÐÂÎſɿ¿¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126916/security/ncsc-guidance-communications-with-customers.html