NSAµÈ»ú¹¹ÁªºÏÐû²¼ÔõÑùÉèÖÃºÍ¼à¿ØPowerShellµÄÖ¸ÄÏ

Ðû²¼Ê±¼ä 2022-06-24
1¡¢NSAµÈ»ú¹¹ÁªºÏÐû²¼ÔõÑùÉèÖÃºÍ¼à¿ØPowerShellµÄÖ¸ÄÏ


6ÔÂ22ÈÕ£¬ £¬£¬£¬£¬ £¬£¬ÃÀ¹úCISA¡¢ÐÂÎ÷À¼NZ NCSCºÍÓ¢¹úNCSC-UKÐû²¼ÁËÒ»·ÝÁªºÏÍøÂçÇå¾²ÐÅÏ¢±í(CIS) ¡£¡£¡£ ¡£ÕâЩ»ú¹¹½¨ÒéÊʵ±µÄÉèÖÃºÍ¼à¿ØPowerShell£¬ £¬£¬£¬£¬ £¬£¬¶ø²»ÊÇÓÉÓÚ¹¥»÷Õß»áÔÚ»á¼ûÍøÂçºóʹÓÃËü¶øÍêȫɾ³ý»ò½ûÓÃËü ¡£¡£¡£ ¡£Ö¸ÄϽ¨Ò飬 £¬£¬£¬£¬ £¬£¬Ê¹Óÿò¼ÜÖеĹ¦Ð§£¬ £¬£¬£¬£¬ £¬£¬ÀýÈçPowerShellÔ¶³Ì´¦Öóͷ££»£»£»£»¹ØÓÚÔ¶³ÌÅþÁ¬£¬ £¬£¬£¬£¬ £¬£¬Ê¹ÓÃPowerShell 7ÖÐÖ§³ÖµÄSSH£¬ £¬£¬£¬£¬ £¬£¬ÒÔÔöÌí¹«Ô¿Éí·ÝÑéÖ¤µÄ±ãµ±ÐÔºÍÇå¾²ÐÔ£»£»£»£»ÔÚAppLocker»òWindows DefenderÓ¦ÓóÌÐò¿ØÖÆ(WDAC)µÄ×ÊÖúÏÂïÔÌ­PowerShellµÄ²Ù×÷£¬ £¬£¬£¬£¬ £¬£¬½«¹¤¾ßÉèÖÃΪÊÜÏÞÓïÑÔģʽ(CLM)£¬ £¬£¬£¬£¬ £¬£¬´Ó¶ø¾Ü¾øÖÎÀíÔ±½ç˵µÄÕ½ÂÔÖ®ÍâµÄ²Ù×÷ ¡£¡£¡£ ¡£ 


https://www.cisa.gov/uscert/ncas/current-activity/2022/06/22/keeping-powershell-measures-use-and-embrace


2¡¢Cyber Spetsnaz½«Ã¬Í·Ãé×¼Á¢ÌÕÍðµÄÒªº¦»ù´¡ÉèÊ©


¾ÝýÌå6ÔÂ22ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬£¬Cyber Spetsnaz×îÏÈÕë¶ÔÁ¢ÌÕÍðµÄÕþ¸®»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ© ¡£¡£¡£ ¡£ÔÚÁ¢ÌÕÍðÐû²¼¶Ô¶íÂÞ˹ʵÑé¡°½ûÔËÁºó£¬ £¬£¬£¬£¬ £¬£¬¸ÃÍÅ»ïÐû²¼ÁËЭµ÷DDoS¹¥»÷µÄ¶à¸öÄ¿µÄ£¬ £¬£¬£¬£¬ £¬£¬ÆäÖÐÉæ¼°ÎïÁ÷¹«Ë¾¡¢½»Í¨»ù´¡ÉèÊ©¡¢Ö÷Òª½ðÈÚ»ú¹¹¡¢ISP¡¢»ú³¡¡¢ÄÜÔ´¹«Ë¾¡¢Ö÷ҪýÌåºÍÕþ¸®µÄÍøÕ¾ ¡£¡£¡£ ¡£¾Ý6ÔÂ23ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬£¬Á¢ÌÕÍð¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NKSC)Ðû²¼ÁËÒ»Ôòͨ¸æ£¬ £¬£¬£¬£¬ £¬£¬³ÆÕë¶Ô¸Ã¹úÕþ¸®µÄDDoS¹¥»÷¼±¾çÔöÌí£¬ £¬£¬£¬£¬ £¬£¬µ¼ÖÂÁ¢ÌÕÍðµÄÔËÊ乫˾¡¢½ðÈÚ»ú¹¹ºÍÆäËü´óÐÍʵÌå¶¼±¬·¢Á˶ÌÔݵÄЧÀÍÖÐÖ¹ ¡£¡£¡£ ¡£


https://securityaffairs.co/wordpress/132518/hacktivism/lithuania-under-cyber-attack.html


3¡¢Check PointÅû¶Tropic Trooper½üÆÚ¹¥»÷µÄÏêÇé


Check PointÔÚ6ÔÂ22ÈÕÐû²¼Á˹ØÓÚTropic Trooper¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ ¡£¡£¡£ ¡£´Ë´Î»î¶¯Ê¹ÓÃÁËеļÓÔØ³ÌÐòNimbdaºÍľÂíYahoyahµÄбäÖÖ ¡£¡£¡£ ¡£Ñ¬È¾Á´Ê¼ÓÚ¶ñÒâ°æ±¾µÄSMS Bomber£¬ £¬£¬£¬£¬ £¬£¬ËüÏÖʵÉÏÊÇNimbda¼ÓÔØ³ÌÐò£¬ £¬£¬£¬£¬ £¬£¬µ«Ê¹ÓÃÁËSMS Bomberͼ±ê£¬ £¬£¬£¬£¬ £¬£¬²¢°üÀ¨SMS Bomber×÷ΪǶÈëµÄ¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬£¬ £¬£¬¼ÓÔØºó»á×°ÖÃYahoyah±äÌå²¢ÍøÂçÖ÷»úµÄÊý¾Ý ¡£¡£¡£ ¡£×îÖÕµÄpayloadÓÉYahoyahÏÂÔØ£¬ £¬£¬£¬£¬ £¬£¬²¢Ê¹ÓÃÒþдÊÖÒÕ±àÂëΪJPGͼÏñ£¬ £¬£¬£¬£¬ £¬£¬Check Point½«Æäʶ±ðΪTClient£¬ £¬£¬£¬£¬ £¬£¬ÊÇTropic TrooperÔÚÒÑÍù»î¶¯ÖÐÔøÊ¹ÓùýµÄºóÃÅ ¡£¡£¡£ ¡£±ðµÄ£¬ £¬£¬£¬£¬ £¬£¬ÓÃÓÚ°ü×°YahoyahµÄ¼ÓÃÜÊÇAESµÄ×Ô½ç˵ʵÏÖ£¬ £¬£¬£¬£¬ £¬£¬ËüÖ´ÐÐÁËÁ½´Îµ¹ÐòµÄÂÖ²Ù×÷£¬ £¬£¬£¬£¬ £¬£¬Ê¹ÑùÌìÖ°Îö±äµÃºÜÊÇÄÑÌâ ¡£¡£¡£ ¡£


https://research.checkpoint.com/2022/chinese-actor-takes-aim-armed-with-nim-language-and-bizarro-aes/


4¡¢QNAPÐÞ¸´Òѱ£´æÈýÄêµÄPHPÎó²îCVE-2019-11043


6ÔÂ22ÈÕ£¬ £¬£¬£¬£¬ £¬£¬QNAPÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬ £¬£¬ÐÞ¸´ÁËÒ»¸öÒѱ£´æÈýÄêÖ®¾ÃµÄPHPÎó²î£¨CVE-2019-11043£© ¡£¡£¡£ ¡£QNAPÔÚͨ¸æÖÐÚ¹ÊÍ£¬ £¬£¬£¬£¬ £¬£¬Îó²î»áÓ°ÏìµÍÓÚ7.1.33µÄPHP°æ±¾7.1.x¡¢µÍÓÚ7.2.24µÄ7.2.xºÍµÍÓÚ7.3.11µÄ7.3.x£¬ £¬£¬£¬£¬ £¬£¬ÈôÊDZ»Ê¹Ó㬠£¬£¬£¬£¬ £¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂë ¡£¡£¡£ ¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.8£¬ £¬£¬£¬£¬ £¬£¬Ó°ÏìÁËQNAPµÄ¶à¸ö°æ±¾µÄQTS¡¢QuTS heroºÍQuTScloud×°±¸ ¡£¡£¡£ ¡£¸Ã¹«Ë¾½¨ÒéÓû§Á¬Ã¦¸üе½×îеİ汾£¬ £¬£¬£¬£¬ £¬£¬ÒÔÐÞ¸´´ËÎó²î ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/critical-php-flaw-exposes-qnap-nas-devices-to-rce-attacks/


5¡¢ProofpointÐû²¼2022ÄêÉç»á¹¤³ÌµÄ¹¥»÷»î¶¯±¨¸æ


ProofpointÔÚ6ÔÂ22ÈÕÐû²¼ÁË×îеÄÉç»á¹¤³Ìѧ±¨¸æ ¡£¡£¡£ ¡£±¨¸æÆÊÎöÁËÉç»á¹¤³ÌµÄÖ÷ÒªÇ÷ÊÆºÍÐÐΪ£¬ £¬£¬£¬£¬ £¬£¬°üÀ¨£¬ £¬£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ýÑÓÉì¶Ô»°ÓëÄ¿µÄ½¨ÉèÐÅÈΡ¢À©´óÁ˶ÔÓÐÓÃÕ½ÂÔµÄÀÄÓã¨ÈçʹÓÃÊÜÐÅÈι«Ë¾µÄЧÀÍ£©¡¢ÔÚÆä¹¥»÷Á´ÖÐʹÓÃÕý½»ÊÖÒÕ£¨Èçµç»°£©¡¢ÖªµÀ²¢Ê¹ÓÃͬÊÂÖ®¼äÏÖÓеĶԻ°¡¢Ê¹ÓÃÈÈÃźÍÓëÉç»áÏà¹ØµÄÖ÷ÌâµÈ ¡£¡£¡£ ¡£±ðµÄ£¬ £¬£¬£¬£¬ £¬£¬¸Ã±¨¸æ»¹×ÅÑÛÓÚ¾­³£±»ÀÄÓõÄЧÀÍ£¬ £¬£¬£¬£¬ £¬£¬ºÃ±È¹È¸èDriveºÍDiscord ¡£¡£¡£ ¡£


https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-hijack-attention-2022-social-engineering-report


6¡¢ÈÕ±¾Æû³µÁã¼þÖÆÔìÉÌNichirin³ÆÆäÔâµ½ÀÕË÷¹¥»÷

      

¾Ý6ÔÂ23ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬£¬ÈÕ±¾Æû³µºÍĦÍгµÈí¹ÜÖÆÔìÉÌNichirinµÄ×Ó¹«Ë¾Nichirin-Flex USAÔâµ½ÁËÀÕË÷¹¥»÷£¬ £¬£¬£¬£¬ £¬£¬µ¼Ö¸ù«Ë¾µÄÍøÂçÖÐÖ¹ ¡£¡£¡£ ¡£¹¥»÷±¬·¢ÔÚ6ÔÂ14ÈÕ£¬ £¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÔÚ¼ì²âµ½ÆäÍøÂçÉÏδ¾­ÊÚȨµÄ»á¼ûºóÁ¬Ã¦½«²Ù×÷Çл»µ½ÊÖ¶¯Ä£Ê½ ¡£¡£¡£ ¡£ÓÉÓÚÍøÂç¹¥»÷Ò²Ó°ÏìÁ˲úÆ··ÖÏú£¬ £¬£¬£¬£¬ £¬£¬²¢ÇÒ¶©µ¥ÊÇÊÖ¶¯Íê³ÉµÄ£¬ £¬£¬£¬£¬ £¬£¬Òò´Ë¿Í»§µÄ¶©µ¥Ó¦¸Ã»áÑÓ³Ù ¡£¡£¡£ ¡£¸Ã¹«Ë¾µÄÉùÃ÷ÌåÏÖ£¬ £¬£¬£¬£¬ £¬£¬»Ö¸´ÏµÍ³ÒѳÉΪ»Ö¸´ÓªÒµÔËÓªµÄÓÅÏÈÊÂÏ £¬£¬£¬£¬ £¬£¬ÆäÏÖÔÚÕýÔÚÊÓ²ìδ¾­ÊÚȨµÄ»á¼ûÊÇÔõÑù±¬·¢µÄ£¬ £¬£¬£¬£¬ £¬£¬²¢ÊÔͼȷ¶¨ÐÅϢй¶µÄÓ°Ïì ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/