°®¶ûÀ¼°ä²¼¡¶2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ¡·£»×êÑÐÍŶӳÆAPT20¿ÉÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ
°ä²¼¹¦·ò 2020-01-02
1.ÐǰͿËÔ±¹¤ÉÏ´«APIÃÜÔ¿µ½GitHubÉÏ£¬¿É½Ó¼ûÄÚ²¿ÏµÍ³
°²È«×¨¼ÒVinoth KumarÔÚÒ»¸ö¹«¿ª¿ÉÓõÄGithub´æ´¢¿âÖз¢ÏÖÐǰͿ˵ÄÒ»¸öAPIÃÜÔ¿ÔÚÏß¶³ö£¬¹¥»÷ÕßÄܹ»ÀûÓøÃÃÜÔ¿À´½Ó¼û¹«Ë¾µÄÄÚ²¿ÏµÍ³²¢´Û¸ÄÊÚȨÓû§ÁÐ±í¡£¸ÃÃÜÔ¿¿ÉÓÃÓÚ½Ó¼ûÐǰͿËJumpCloud API£¬JumpCloudÊÇÒ»¸öActive DirectoryÖÎÀíÆ½Ì¨£¬ÌṩÓû§ÖÎÀí¡¢WebÀûÓ÷¨Ê½µ¥µãµÇ¼£¨SSO£©½Ó¼û½ÚÔìºÍÇáÐÍĿ¼½Ó¼ûºÍ̸£¨LDAP£©·þÎñ¡£Kumar»¹ÌṩÁ˸ÃÎÊÌâµÄPoC´úÂ룬ÑÝʾÁËÈôºÎÁгöϵͳºÍÓû§¡¢½ÚÔìAWSÕÊ»§¡¢ÔÚϵͳÉÏÖ´ÐкÅÁîÒÔ¼°Ôö³¤»òɾ³ýÓÐȨ½Ó¼ûÄÚ²¿ÏµÍ³µÄÓû§¡£ÐǰͿËÈ·ÈÏÁËÕâÒ»ÎÊÌⲢѸ¿ì³·ÏúÁ˸ÃÃÜÔ¿¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95826/security/starbucks-api-key-exposed-online.html
2.ChromeÀ©´óShitcoin WalletÇÔÈ¡¼ÓÃÜÇ®°ü˽Կ
Ò»¸öChromeÀ©´ó·¨Ê½±»·¢´Ë¿ÌÍøÒ³ÉÏ×¢ÈëJavaScript´úÂëÒÔ´Ó¼ÓÃÜÇ®±ÒÇ®°üºÍ¼ÓÃÜÇ®±ÒÃÅ»§ÍøÕ¾ÇÔÈ¡ÃÜÂëºÍ˽Կ¡£¸ÃÀ©´óÃûΪShitcoin Wallet£¨ChromeÀ©´óID£ºckkgmccefffnbbalkmbbgebbojjogffn£©£¬ÓÚ12ÔÂ9ÈÕ°ä²¼¡£¸ÃÀ©´óÐû³ÆÄܹ»Ô®ÊÖÓû§ÖÎÀíETHºÍERC20£¬µ«×êÑÐÈËÔ±·¢ÏÖ¸ÃÀ©´ó»á½«Í¨¹ýÆä½Ó¿Ú´´½¨»òÖÎÀíµÄËùÓÐÇ®°üµÄ˽Կ·¢Ë͵½µÚÈý·½ÍøÕ¾erc20wallet[.]tk£¬Æä´Î£¬µ±Óû§½Ó¼ûÖ÷Á÷µÄ5¸ö¼ÓÃÜÇ®±ÒÖÎÀíÆ½Ì¨Ê±£¬¸ÃÀ©´ó»¹Äܹ»×Ô¶¯×¢Èë¶ñÒâJavaScript´úÂ룬ÒÔÇÔÈ¡µÇ¼ʹ´¦ºÍ˽Կ²¢·¢ËÍÖÁÍ³Ò»ÍøÕ¾¡£Ä¿Ç°¸ÃÀ©´óÈÔ¿Éͨ¹ý¹Ù·½Chrome Web StoreÏÂÔØ£¬ÆäÏÂÔØÁ¿Îª625´Î¡£Ä¿Ç°Éв»Ã÷ÏÔShitcoin WalletÍŶÓÊÇ·ñÓ¦¶Ô¶ñÒâ´úÂëÕÆ¹Ü£¬»òÊǸÃÀ©´óÔâµ½µÚÈý·½ÉøÈëºÍ·ÛËé¡£Shitcoin WalletÍŶÓÉÐδ¶Ô´Ë½øÐлØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/chrome-extension-caught-stealing-crypto-wallet-private-keys/
3.ÀÕË÷Èí¼þZeppelinÀûÓÃÔ¶¿Ø¹¤¾ßScreenConnect½øÐд«²¼
ºÚ¿ÍÔÚÀûÓÃÔ¶³ÌÖÎÀíÈí¼þScreenConnectÇÔÈ¡Êý¾Ý²¢´«²¼ÀÕË÷Èí¼þZeppelin¡£Ò»¼Ò´óÐÍ·¿µØ²ú¹«Ë¾µÄ¹¤×÷Õ¾±»×°ÖÃÁËScreenConnect¿Í»§¶Ë£¬¸ÃScreenConnect.ClientService.exeÒ»ÏòÔÚºó¶ÜÔËÐв¢ÆÚ´ýÔ¶³ÌÖÎÀíÏνӡ£¸Ã¶ñÒâÈí¼þÄܹ»Ö´ÐкܶàºÅÁÔ̺¬´Ó±¸·ÝϵͳÖÐÍøÂçÊý¾Ý²¢×°ÖöñÒâÈí¼þ¡¢Í¨¹ý½ûÓü¸ÖÖ°²È«»úÔìÀ´×èÖ¹Windows Defender¡¢Ö´ÐÐPowerShellºÅÁîÒÔÎļþ´ó¾ÖÏÂÔØZeppelinµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2019/12/zeppelin-is-back-ransomware-stealing.html
4.±±¿¨ÂÞÀ³ÄÉÖÝͶƱϵͳ2016ÄêÖжϲ¢·ÇÍøÂç¹¥»÷ÒýÆð
ƾ¾Ý½üÆÚÃÀ¹úDHS°ä²¼µÄÒ»·Ýµ÷²é»ã±¨£¬2016Äê±±¿¨ÂÞÀ´ÄÉÖÝͶƱϵͳµÄÖжÏÊÂÎñ²¢·ÇÓÉÍøÂç¹¥»÷µ¼Ö¡£¶Ô´ïÀÕÄ·¿¤Ä³Ð©µØÓòÃñÆø¿¼ÊÔÈËÔ±µÄ±Ê¼Ç±¾µçÄÔ½øÐзÖÎöÏÔʾ£¬2016Äê11ÔÂÑ¡¾ÙÈÕµÄÑ¡¾ÙÊý¾Ý³öÏÖÁËһЩÒì³££¬ÔÚijЩÇé¿öÏÂÑ¡ÃñûÓеõ½ÕýÈ·µÄ¼ø±ð£¬Ò»Ð©±»¼ø±ðΪÒÑͶƱ£¬¶øÁíһЩ±»¼ø±ðΪδע²á¡£Ó°ÏìVR Systemsµç×ÓͶƱ²¾µÄÃýÎóÆÈʹ¹ÙÔ±¸ÄÓÃÖ½ÕŽøÐÐ×¢²áµÇ¼Ç£¬Õû¸öͶƱµÄ³ÖÐø¹¦·ò±»µ¢¸é¡£¸Ãµ÷²é¶Ô21̨ÓÃÓÚÑ¡ÃñÑéÖ¤ºÍר¼ÒʹÓõÄÍÆËã»ú½øÐÐÁ˲鳣¬µ«Ã»ÓÐÕÒµ½ÈκζñÒâÈí¼þ»òÔ¶³Ì½Ó¼ûµÄÖ¤¾Ý¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95805/hacking/north-carolina-voting-systems-investigation.html
5.×êÑÐÍŶӳÆAPT20¿ÉÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ
ºÉÀ¼°²È«³§ÉÌFox-IT³ÆAPT20ÔÚ×î½üµÄ¹¥»÷ÖÐÄÜÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ¡£¾Ýµ÷²éÔâ·ê¹¥»÷µÄÆóÒµ±é²¼10¸ö·ÖÆçµÄ¹ú¶ÈºÍÐÐÒµ£¬ÆäÖÐÔ̺¬µÂ¹ú¡¢Ó¢¹ú¡¢·¨¹ú¡¢ÃÀ¹úºÍÖйú¡£ÊÜÓ°ÏìµÄÐÐÒµÔ̺¬º½¿Õ¡¢¹¹Öþ¡¢ÒøÐÓ×¢µçÁ¦¡¢°²È«¡¢ÔËÊäºÍÈËÁ¦×ÊÔ´·þÎñµÈ¡£µ«¹¥»÷²¢Î´Ó°Ïìͨ³£¹«¹²£¬ÓÉÓÚÆäÖ¸±êÖØÒªÊÇÆóÒµ¡£Ôڳɹ¦Í»ÆÆÑéÖ¤¹ý³ÌÖ®ºó£¬APT20Äܹ»½Ó¼ûһЩµ±¾Ö»ú¹¹¡¢¹«Ë¾Êý¾Ý¿âºÍ¸÷¸öÐÐÒµµÄ·þÎñÆ÷Êý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2019/12/hackers-bypass-2-step-verification-to.html
6.°®¶ûÀ¼µ±¾Ö°ä²¼2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ
°®¶ûÀ¼µ±¾Ö°ä²¼ÁË¡¶2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ¡·£¬ÕâÊǸùúÓÚ2015Äê°ä²¼µÄÊ׸ö°²È«Õ½ÊõµÄ¸üа汾¡£¸ÃÕ½Êõ»ã±¨¸ÅÊöÁ˵±¾Ö½«ÈôºÎ³ÖÐøÍÆ½ø¸Ã¹úÍÆËã»úÍøÂçºÍÓйػù´¡ÉèÊ©µÄ°²È«¡£»ã±¨ÖвûÁËÈ»µ±¾Ö¶Ô°²È«ºÍ¿¿µÃסµÄÍøÂç¿Õ¼äµÄÔ¸¾°ÒÔ¼°½«²ÉÈ¡µÄÐж¯£¬Ô̺¬³ÖÐøÌá¸ß¹Ø¼ü»ù´¡¼Ü¹¹ºÍ¹«¹²·þÎñÖеÄÍøÂ絯ÐÔ£»Ìá¸ßÆóÒµºÍ¹«Ãñ¶ÔÍøÂ簲ȫ³ÁÒªÐÔµÄÒâʶ£»Í¨¹ýÓë½ÌÓýϵͳ¡¢ÐÐÒµºÍѧÊõ½çµÄºÏ×÷£¬½øÒ»²½·¢Õ¹È«Éç»áµÄÍøÂ簲ȫÎÄ»¯£»³ÖÐø¼áÈͰ®¶ûÀ¼×÷Ϊ¼¼ÊõºÍÐÅÏ¢°²È«ÖÐÐĵÄÈ«ÇòÃûÓþ£¬²¢Ô®ÊÖÍÆ½ø°®¶ûÀ¼³ÉΪICTÆóÒµµÄÊ×Ñ¡µØÖ·¡£¸Ã»ã±¨»¹¶½ÍƽøÐж¦ÐÂÒÔ±£»¤¹Ø¼ü»ù´¡¼Ü¹¹ÃâÊܳÁ´óÍøÂçÍþвµÄÓ°Ï죬ͬʱ»¹ÖÒ¸æ³Æ±í¹ú¿ÉÄÜ»á¹ýÎʰ®¶ûÀ¼µÄÑ¡¾Ù¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95825/laws-and-regulations/irish-national-cyber-security-strategy.html


¾©¹«Íø°²±¸11010802024551ºÅ