ÃÀ¹úÒѲé·âNOBELIUMÔÚÕë¶ÔUSAIDµÄ¹¥»÷ÖÐʹÓõÄÓòÃû£»ºÚ¿ÍÒÔ35ÍòÃÀÔªµÄÆðÅļÛÖµÏúÊÛDDoS-GuardµÄÔ´´úÂë
°ä²¼¹¦·ò 2021-06-031.ÃÀ¹úÒѲé·âNOBELIUMÔÚÕë¶ÔUSAIDµÄ¹¥»÷ÖÐʹÓõÄÓòÃû

ÃÀ¹ú˾·¨²¿ÒѲé·âNOBELIUMÔÚÕë¶ÔÃÀ¹ú¹ú¼Ê¿ª·¢Êð (USAID) µÄ¹¥»÷ÖÐʹÓõÄÓòÃû¡£Î¢ÈíÓÚÉÏÖÜËijõ´ÎÅû¶ÁËÕâ´Î´¹µö¹¥»÷£¬´ÓÊôÓÚ¶íÂÞ˹µý±¨»ú¹¹SVRµÄNOBELIUM£¨±ðÃûAPT29£©¼ÙÒâUSAID£¬ Ïò150 ¶à¸ö×éÖ¯·¢ËÍÁË3000¶à·â´¹µöÓʼþ¡£Õâ´Î²é·âµÄÁ½¸öÓòÃû±ðÀëΪtheyardservice[.]comºÍworldhomeoutlet[.]com£¬ÖØÒªÓÃÓڽӹܴÓÊܺ¦ÕßÄÇÀïй¶µÄÊý¾Ý£¬²¢·¢ËͺÅÁî¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-seizes-domains-used-by-apt29-in-recent-usaid-phishing-attacks/
2.ºÚ¿ÍÒÔ35ÍòÃÀÔªµÄÆðÅļÛÖµÏúÊÛDDoS-GuardµÄÔ´´úÂë

Group-IB·¢ÏÖºÚ¿ÍÔÚ°µÍøÏúÊÛDDoS-GuardµÄÊý¾Ý¿â¡£DDoS-GuardÊǶíÂÞ˹µÄÒ»¼ÒÔÚÏß»ù´¡ÉèÊ©·þÎñÌṩÉÌ£¬ÔøÔÚ½ñÄê1ÔÂÔ®ÊÖ±»AWSƽ̨»Ø¾øµÄÉç½»ÀûÓÃParler³ÁÐÂÉÏÏß¡£ºÚ¿ÍÓÚ5ÔÂ26ÈÕÔÚºÚ¿ÍÂÛ̳exploit[.]inÏúÊÛ¸ÃÊý¾Ý¿â£¬³ÆÔ̺¬DDoS-Guard¿Í»§µÄÐÅÏ¢£¬ÈçÐÕÃû¡¢IP µØÖ·ºÍ¸¶¿îÐÅÏ¢µÈ£¬ÒÔ¼°DDoS-Guard »ù´¡ÉèÊ©µÄÔ´´úÂë¡£×î³õµÄÆðÅļÛΪ50ÍòÃÀÔª£¬ºóÓÖ½µÎª35ÍòÃÀÔª¡£
ÔÎÄÁ´½Ó£º
https://www.group-ib.com/media/ddos-guard-database/
3.×êÑÐÈËÔ±¼ì²âµ½ÀûÓÃFancyProductDesignerÖÐ0dayµÄ¹¥»÷

Wordfence×êÑÐÈËÔ±¼ì²âµ½ÀûÓÃFancy Product Designer²å¼þÖÐ0dayµÄ¹¥»÷»î¶¯¡£¸ÃÀûÓÃÊÇWordPress¡¢WooCommerceºÍShopifyµÄ¿ÉÊÓ»¯²úÆ·ÅäÖòå¼þ£¬ÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄͼÐκÍÄÚÈÝ×Ô½ç˵²úÆ·¡£¸Ã·ì϶ÊÇÔ¶³Ì´úÂëÖ´Ðзì϶£¬¿ÉÓÃÀ´Èƹý×èÖ¹¶ñÒâÎļþÉÏ´«µÄÄÚÖòé³ÔÚÍøÕ¾ÉÏÖ´ÐÐPHPÎļþ¡£×êÑÐÈËÔ±³ÆÕâ´Î¹¥»÷»î¶¯ÓÚ2021Äê1ÔÂ30ÈÕÆðÍ·£¬ºÚ¿ÍÒÔµçÉÌÍøÕ¾ÎªÖ¸±ê£¬ÊÔͼÇÔÈ¡ÆäÊý¾Ý¿âÖеĶ©µ¥ÐÅÏ¢£¬½¨ÒéÓû§µ±¼´×°ÖÃ6ÔÂ2ÈÕ°ä²¼µÄ²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-wordpress-plugin-zero-day-under-active-exploitation/
4.ÈÕ±¾¸»Ê¿½ºÆ¬¹«Ë¾FujiFilm³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷

ÈÕ±¾¸»Ê¿½ºÆ¬¹«Ë¾£¨FujiFilm£©³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬ÓʼþºÍµç»°ÏµÍ³Öжϡ£FujiFilm×î³õÒÔ¹âѧ½ºÆ¬ºÍÏà»úΪÖ÷£¬ºóÓÖÉæ¼°Ò©Æ·¡¢´æ´¢É豸¡¢¸´Ó¡»úºÍ´òÓ¡»ú (XEROX) ÒÔ¼°ÊýÂëÏà»úµÈ²úÆ·£¬2020ÊÕÈëΪ201ÒÚÃÀÔª¡£¸Ã¹«Ë¾³Æ¹¥»÷²úÉúÔÚ6ÔÂ1ÈÕÍíÉÏ£¬Ö®ºóµ±¼´Ðµ÷È«ÇòµÄ·Ö¹«Ë¾²¢¹Ø¹ØÁËËùÓÐÊÜÓ°Ïìϵͳ¡£FUJIFILM²¢Î´Ö¸³öÀÕË÷ÍÅ»ïµÄÃû³Æ£¬µ«Advanced Intel°µÊ¾FUJIFILMÓÚ5ÔÂ15ÈÕϰȾÁËQbotľÂí£¬Òò¶øÕâ´Î¹¥»÷¿ÉÄÜÓëREvilÓйء£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fujifilm-shuts-down-network-after-suspected-ransomware-attack/
5.°×¹¬Ö¤ÊµJBSÔâµ½µÄ¹¥»÷Óë¶íÂÞ˹Óйأ¬±¸·ÝϵͳδÊÜÓ°Ïì

°×¹¬Ö¤ÊµJBSÔÚ5ÔÂ30ÈÕÔâµ½µÄ¹¥»÷Óë¶íÂÞ˹Óйء£Õâ´Î¹¥»÷¶ÔJBSµÄÔËÓª²úÉúÁ˾޴óµÄÓ°Ï죬¾Ýͳ¼Æ£¬Å£µÄÍÀÔ×Á¿±ÈÉÏÖܽµÂäÁË22%£¬¶øÖíµÄÍÀÔ×Á¿Ôò½µÂäÁË20%¡£¸Ã¹«Ë¾°µÊ¾£¬±¸·Ý·þÎñÆ÷²¢Î´Êܵ½Ó°Ï죬ÆäÔÚÓëµÚÈý·½ºÏ×÷ÒÔ¾¡¿ì¸´ÔÊÜÓ°Ïìϵͳ£¬Ô¤¼Æ´ó²¿Ãʤ³§ÔÚ6ÔÂ3ÈÕÓ¦¸ÃÄܹ»ÔËÐС£Ä¿Ç°£¬FBIÒÑÈ·¶¨Õâ´Î¹¥»÷¿É¹éÒòÓÚREvilÍŻ
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118490/cyber-crime/jbs-attack-russian-origin.html
6.Threatpost°ä²¼2021ÄêÀÕË÷Èí¼þµÄÑݱäÇ÷ÏòµÄ»ã±¨

Threatpost°ä²¼ÁË2021ÄêÀÕË÷Èí¼þµÄÑݱäÇ÷ÏòµÄ»ã±¨¡£ÀÕË÷Èí¼þÊÇÒ»ÖÖÈÕÒæÑϳÁµÄÍþв£¬×î½ü¼¸¸öÔ£¬´ËÀàÍøÂç·¸×ïµÄ¸´ÔÓÐԺʹ´ÐÂˮƽ²»ÐÝÌá¸ß¡£¸Ã»ã±¨´Ó6¸ö·½Ã棺ÀÕË÷Èí¼þµÄÐÂÇ÷Ïò¡¢ÀÕË÷Èí¼þ¾¼Ã¸ÅÀ¨¡¢ÀÕË÷Èí¼þ¹¥»÷µÄ³É±¾¡¢ÍøÂç±£ÏÕÖú³¤ÀÕË÷Èí¼þÖ§¸¶¼¤Ôö¡¢48Ó×ʱÀÕË÷Èí¼þ¹¥»÷ÈÕÖ¾ºÍÔ¤·ÀÀÕË÷Èí¼þµÄʵÓÃÖ¸ÄÏ£¬·ÖÎöÁ˽üÆÚÀÕË÷Èí¼þ·¢Õ¹µÄÐÂÇ÷Ïò¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ