¾Ýͳ¼Æ2019ÄêÃÀ¹úÒÑÓжà´ï500ËùѧÌÃÔâÀÕË÷Èí¼þ¹¥»÷£»×êÑÐÍŶӰ䲼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼
°ä²¼¹¦·ò 2019-09-25
ƾ¾ÝÔÆ°²È«¹«Ë¾ArmorµÄµ÷ÑУ¬ÃÀ¹úÒÑÓÐ49¸öÑ§ÇøµÄ½ÌÓý»ú¹¹Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬Ê¹µÃ½ÌÓýÐÐÒµ³ÉΪ½ö´ÎÓÚ´¦Ëùµ±¾ÖµÄµÚ¶þ´óÒ×Êܹ¥»÷Ö¸±ê¡£¸Ã¹«Ë¾·ÖÎöÁË×Ô2019Äê1ÔÂÒÔÀ´¹«¿ª±¨Â·µÄ¹¥»÷£¬·¢´Ë¿Ì2019Äêǰ9¸öÔÂÒÑÓжà´ï500ËùK-12ѧÌÃÔâµ½¹¥»÷£¬¶øÈ¥ÄêÖ»ÓÐ11ËùѧÌ᣽öÔÚ9ÔÂÖÐÑ®µÄÒ»Öܶ๦·òÀï¾ÍÓÐ9¸öÐÂÑ§ÇøºÍ1Ëù´óѧÊܵ½¹¥»÷£¬²¨¼°Ô¼100ËùK-12ѧÌ᣿µÄùµÒ¸ñÖݵÄÑ§ÇøÊܵ½µÄÍþв×îΪÑϳÁ£¬¸ÃÖݹ²Ôâ·êÁË7´Î¹¥»÷£¬º¸Ç104ËùѧÌá£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/hundreds-of-us-schools-hit-by/2.ÃÀ¹ú17¼Ò¹«¹²·þÎñ»ú×é³ÉΪд¹µö»î¶¯µÄ¹¥»÷Ö¸±ê
Proofpoint»ã±¨³ÆÒ»¸öÓɹú¶ÈÔÞÖúµÄºÚ¿Í×éÖ¯ÔÚ4ÔÂ5ÈÕÖÁ8ÔÂ29ÈÕÆÚ¼ä½«ÖÁÉÙ17¼ÒÃÀ¹ú¹«¹²·þÎñ»ú¹¹×÷Ϊ´¹µö¹¥»÷Ö¸±ê¡£¸Ã¹¥»÷³ÖÐøÁ˳¤´ï5¸öԵŦ·ò£¬´¹µöÓʼþµÄÖ÷ÕÅÊÇÏòÕâЩ»ú¹¹µÄÔ±¹¤·Ö·¢Ô¶¿ØÄ¾ÂíLookBack¡£Ä¿Ç°ÉÐδ¶Ô¸Ã¹¥»÷»î¶¯½øÐÐÕýʽµÄ¹éÒò£¬µ«»ùÓÚһЩ³ÁÓõĴúÂ룬×êÑÐÈËÔ±ÒÔΪ¸Ã¹¥»÷»î¶¯ÓëAPT10Óйء£LookBackÊÇÒ»¸öÓÃC++±àдµÄÔ¶¿ØÄ¾Âí£¬ÆäÖ°ÄÜÔ̺¬·þÎñö¾Ù¡¢²é¿´Êý¾Ý¡¢É¾³ýÎļþ¡¢Ö´ÐкÅÁî¡¢½ØÈ¡ÆÁÄ»ÒÔ¼°×ÔÎÒɾ³ýµÈ¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬DeGrippoÍŶӷ¢ÏÖ¹¥»÷ÕßÔÚÌáÒé´¹µö¹¥»÷֮ǰ»¹É¨ÃèÁËÖ¸±ê»ú¹¹µÄ445¶Ë¿Ú£¨SMBºÍ̸£©¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/17-us-utility-firms-targeted-by-mysterious-state-sponsored-group/3.×êÑÐÍŶӰ䲼¹ØÁª2000¶à¸ö¶ñÒâÑù±¾µÄ¶íÂÞ˹APTµØÍ¼
ΪÁ˸üºÃµØ×¢Ã÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïµÄ·¸×ï»î¶¯¼°Æä¹ØÁª£¬IntezerºÍCheck Point×êÑÐÈËÔ±¹²Í¬°ä²¼Á˶íÂÞ˹APTµØÍ¼¡£¸ÃµØÍ¼È«ÃæÂÛÊöÁ˶íÂÞ˹·ÖÆçAPTµÄ¶ñÒâÈí¼þÑù±¾¡¢¶ñÒâÈí¼þ¼Ò×åÒÔ¼°¹¥»÷ÕßÖ®¼äµÄ¹ØÁª¡£×êÑÐÈËÔ±¹²ÍøÂç¡¢¹éÀàºÍ·ÖÎöÁË2000¶à¸ö¶ñÒâÈí¼þÑù±¾£¬²¢Æ¾¾ÝËüÃÇÖ®¼ä¹²ÏíµÄ385ÍòÌõ´úÂë»æÔìÁ˽ü2.2Íò¸öÏνӡ£¸ÃµØÍ¼»¹ÏÔʾ£¬Ö»¹Ü´óÎÞÊýºÚ¿Í×éÖ¯¶¼ÔÚ¸÷×Ô·ÖÆçµÄ¹¤¾ßºÍ¿ò¼ÜÖгÁ¸´Ê¹ÓÃ×Ô¼ºµÄ´úÂ룬µ«·ÖÆçµÄ×éÖ¯¼äȴûÓй²ÓôúÂ룬Õâ¿ÉÄÜÊÇΪÁËÔ¤·À¹ØÁªÂ¶³ö¡£×êÑÐÈËÔ±»¹¹«¿ªÁ˸õØÍ¼¼°ÆäÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/09/russia-hacking-groups-map.html4.Zebrocy APTÀûÓûùÓÚGolangµÄкóÃÅϰȾָ±ê
×êÑÐÈËÔ±¹Û²ìµ½Zebrocy APTÔÚ×î½üµÄ¹¥»÷»î¶¯ÖÐÀûÓûùÓÚGolangµÄºóÃÅÇÔȡָ±êÓû§µÄÐÅÏ¢¡£ZebrocyÓë¶íÂÞ˹·¸×ïÍÅ»ïSednit£¨¼´APT28£©Óйء£ÔÚ¾¹ýÒ»¶Î¹¦·òµÄƧ¾²ÆÚºó£¬¶à¼Ò°²È«¹«Ë¾µÄ×êÑÐÈËÔ±¹Û²ìµ½Zebrocy¹¥»÷ÕßÓÚ8ÔÂ20ÈÕ»ÖлîÆÃ£¬Æä¹¥»÷Ö¸±êÒÀÈ»ÊǶ«Å·ºÍÖÐÑǹú¶ÈµÄʹ¹ÝºÍ±í½»²¿¡£ZebrocyµÄ×îлÊÇ8ÔÂ22ÈÕÌáÒéµÄ£¬Æä´¹µöÓʼþµÄ¸½¼þÎĵµÄÚÈÝΪ¿Õȱ£¬µ«Ô̺¬¶ÔÔ¶³ÌpayloadµÄÒýÓᣴ˻µÄÒ»¸öÁÁµãÊÇʹÓÃDropboxÍйܶñÒâÄ£°å-wordData.dotm¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zebrocy-infects-targets-with-new-golang-based-backdoor-via-dropbox/
5.×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÓ¡¶ÈµÄжñÒâÈí¼þATMDtrack
¿¨°Í˹»ù×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔÓ¡¶ÈµÄеÄATM¶ñÒâÈí¼þATMDtrack¡£¸Ã¶ñÒâÈí¼þÓ볯ÏÊAPT×éÖ¯Lazarus APTÓйء£ATMDtrackÓÚ2018ÄêÏļ¾Ä©ÆðÍ·ÔÚÓ¡¶ÈµÄÒøÐÐÍøÂçÖб»·¢ÏÖ£¬¿¨°Í˹»ù³ÆÔÚ2019Äê9Ô³õ¹Û²ìµ½Á˸öñÒâÈí¼þµÄ×îй¥»÷»î¶¯¡£¸Ã¶ñÒâÈí¼þµÄÖ°ÄÜÔ̺¬¼üÅ̼ͼ¡¢¼ìË÷ä¯ÀÀÆ÷º¹Çà¼Í¼¡¢ÍøÂçIPµØÖ·¼°»î¶¯µÄÍøÂçÏνӡ¢¹ý³Ìö¾Ù¡¢Îļþö¾ÙµÈ¡£¿¨°Í˹»ùÔڻ㱨ÖÐÁгöÁ˸ù¥»÷µÄIoCµÈ¼¼Êõϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91643/malware/north-korea-atmdtrack-malware.html
6.×êÑÐÈËÔ±Åû¶vBulletinÖеÄ佨²¹0day¼°PoC
һλÄäÃû°²È«×êÑÐÈËÔ±ÔÚÊÜÓ½ÓµÄÂÛ̳Èí¼þvBulletinÖз¢ÏÖ佨²¹µÄ0day²¢Åû¶ÁËÓйØPoC¡£Æ¾¾Ý¶ÔÒѰ䲼´úÂëµÄ·ÖÎö£¬¸Ã0dayÔÊÐí¹¥»÷ÕßÔÚÔËÐÐvBulletinÊ·ýµÄ·þÎñÆ÷ÉÏÖ´ÐÐShellºÅÁî¶øÎÞÐèÓµÓÐÖ¸±êÂÛ̳µÄÕË»§¡£ÕâÖÖ·ì϶±»³ÆÎª¡°Ô¤Éí·ÝÑéÖ¤Ô¶³Ì´úÂëÖ´ÐÓ×±·ì϶£¬ºÃÐÂÎÅÊÇ£¬¸Ã·ì϶ֻӰÏìÁËvBulletin°æ±¾5.0.0µ½×îеÄ5.5.4¡£ÓÉÓÚvBulletin±»³¬¹ý10Íò¸öÔÚÏßÍøÕ¾ËùʹÓã¬Òò¶ø¸Ã·ì϶µÄDZÔÚÓ°ÏìÁìÓò¼«´ó£¬vBulletin¿ª·¢ÍŶÓÉÐδ¶Ô´ËÊÂÎñ½øÐлØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91689/hacking/unpatched-critical-0-day-vbulletin.html


¾©¹«Íø°²±¸11010802024551ºÅ