ºÚ¿ÍÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеĺóÃÅ£»Cisco Talos·¢ÏÖAPT×éSideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹
°ä²¼¹¦·ò 2021-07-091.ºÚ¿ÍÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеĺóÃÅ

Malwarebytes×êÑÐÈËÔ±·¢ÏÖºÚ¿ÍÕýÀûÓô¹µö»î¶¯·Ö·¢¼Ù×°³ÉKaseya VSA°²È«¸üеÄCobalt StrikeºóÃÅ¡£Õâ´Î»î¶¯ÖеĶñÒâÓʼþÔ̺¬Ò»¸öÃûΪSecurityUpdates.exeµÄ¸½¼þ£¬ÒÔ¼°Ò»¸ö¼Ù×°³É΢Èí°²È«¸üеÄÁ´½Ó¡£Ä¿Ç°¹ÌÈ»Malwarebytes»¹Ã»ÓÐÈ·¶¨Õâ´Î´¹µö»î¶¯±³ºóµÄÖ÷ÕÅÊÇʲô£¬µ«ÓÐȤµÄÊÇ£¬Õâ¸öCobalt Strike payloadÍйÜÔÚÒ»¸öÖ¼ÔÚ·Ö·¢DridexÒøÐÐľÂíµÄ»î¶¯Ê¹ÓõÄIPµØÖ·ÉÏ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fake-kaseya-vsa-security-update-backdoors-networks-with-cobalt-strike/
2.Cisco Talos·¢ÏÖAPT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹

Cisco Talos·¢ÏÖÁËAPT×éÖ¯SideCopyÕë¶ÔÓ¡¶È¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡£¸ÃAPTÖÁÉÙ×Ô2019ÄêÒÔÀ´¾ÍÆðÍ·»îÔ¾£¬ËƺõÒ»ÏòרһÓÚÍøÂç¼äµý»î¶¯¡£SideCopyµÄϰȾÁ´Ê¼ÓÚÒ»¸ö¶ñÒâLNKÎļþ£¬¶øºóÉæ¼°¶à¸öHTAºÍ¼ÓÔØ·¨Ê½DLLÒÔÌṩ×îÖÕµÄpayload¡£Talos³Æ£¬SideCopyµÄ¹¥»÷»î¶¯ÒÑ´Ó×°ÖûùÓÚC#µÄCetaRAT¡¢AllakoreľÂíºÍnjRAT£¬À©´óµ½Ê¹ÓÃ4¸öÐµĶ¨ÔìľÂíºÍ2¸öÉÌÓÃRATLilithºÍEpicenter¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/sidecopy-cybercriminals-use-custom-trojans-in-india-attacks/
3.×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öNuGetÈí¼þ°ü´æÔÚÒ×±»ÀûÓõķì϶

ReversingLabsµÄ×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öNuGetÈí¼þ°ü´æÔÚÒ×±»ÀûÓõķì϶¡£NuGetÊÇMicrosoftÖ§³ÖµÄ.NETƽ̨»úÔ죬×÷ΪÖÎÀíÆ÷£¬Ö¼ÔÚʹ¿ª·¢ÈËÔ±¿ÉÄܹ²Ïí¿É³ÁÓõĴúÂë¡£×êÑÐÈËÔ±¶ÔÍйÜÔÚNuGet´æ´¢¿âÉϵÄÈí¼þ°üµÄ½øÐзÖÎö£¬·¢ÏÖÓÐ51¸öÈí¼þ°üÒ×Êܵ½¸ßÑϳÁÐÔ·ì϶µÄ¹¥»÷£¬ÀýÈçÔ¶³Ì·þÎñÆ÷ÎļþÖÎÀí¿âWinSCPHelper£¬Ê¹ÓÃÁËWinSCP°æ±¾5.11.2£¬´æÔÚËÁÒâ´úÂëÖ´Ðзì϶(CVE-2021-3331)¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/07/dozens-of-vulnerable-nuget-packages.html
4.ÃÀ¹úÑÇÀ°ÍÂíÖÝWiregrassµçÁ¦¹«Ë¾³ÆÔâµ½ÀÕË÷¹¥»÷

ÃÀ¹úÑÇÀ°ÍÂíÖݵĵçÁ¦¹«Ë¾Wiregrass³ÆÔâµ½ÀÕË÷¹¥»÷¡£¸Ã¹«Ë¾³Æ£¬ÆäÔÚÉÏÖÜÁù·¢ÏÖÁËÕâ´Î¹¥»÷£¬¸Ã¹¥»÷Ö»Ó°ÏìÁËһ̨·þÎñÆ÷£¬µ¼ÖÂÆä¿Í»§ÁÙʱÎÞ·¨½Ó¼ûÕÊ»§£¬ÆäÕýÖÂÁ¦¸´ÔÊÜÓ°ÏìµÄϵͳ¡£µ«ÊÇĿǰÉÐδ·¢ÏÖ´æÔÚÊý¾Ýй¶ÎÊÌ⣬¹©µç·þÎñҲδÊܵ½Ó°Ï죬¶ø¸Ã¹«Ë¾Ã»Óа´ÒªÇóÖ§¸¶Êê½ð¡£´Ë±í£¬¸Ã¹«Ë¾°µÊ¾£¬ÆäÔÚ¹¥»÷²úÉúǰµÄÒ»ÖÜÉý¼¶ÁËÍÆËã»úϵͳ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/119827/cyber-crime/wiregrass-electric-cooperative-attack.html
5.Rapid7×êÑÐÈËÔ±Åû¶Sage X3 ERPƽ̨ÖеĶà¸ö·ì϶

Rapid7µÄ×êÑÐÈËÔ±Åû¶Sage X3ÆóÒµ×ÊÔ´¹æ»®(ERP)ƽ̨ÖеÄ4¸ö·ì϶¡£ÆäÖÐ×îΪÑϳÁµÄÊÇÔ¶³ÌºÅÁîÖ´Ðзì϶£¨CVE-2020-7388£©£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ×î¸ßµÄNT AUTHORITY/SYSTEMÓû§È¨ÏÞÔÚ·þÎñÆ÷ÉÏÖ´ÐкÅÁî¡£ÆäËûΪÐÅϢй¶·ì϶£¨CVE-2020-7387£©¡¢Éí·ÝÑéÖ¤²»¼°·ì϶£¨CVE-2020-7389£©ºÍÓÆ¾ÃÐÔ¿çÕ¾¾ç±¾·ì϶£¨CVE-2020-7390£©¡£ÆäÖУ¬½áºÏʹÓÃCVE-2020-7387ºÍCVE-2020-7388¿ÉÆëÈ«½ÚÔìÖ¸±êϵͳ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-sage-x3-rce-bug-allows-full-system-takeovers/167612/
6.Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäÔâµ½¹¥»÷¿Í»§ÐÅϢй¶

Ͷ×ʹ«Ë¾Morgan Stanley³ÆÆäµÚÈý·½¹©¸øÉ̵ÄAccellion FTAÔâµ½¹¥»÷£¬µ¼ÖÂÊý¾Ýй¶¡£Morgan StanleyÊÇÒ»¼Òµ±ÏȵĽðÈÚ·þÎñ¹«Ë¾£¬ÔÚÈ«ÇòÁìÓòÄÚÌṩͶ×ÊÒøÐÓע֤ȯ¡¢²Æ¸»ºÍͶ×ÊÖÎÀí·þÎñ¡£ÎªÆäÌṩÕË»§ÊØ»¤·þÎñµÄ¹©¸øÉÌGuidehouseÓÚ2021Äê1Ô·ÝÔâµ½¹¥»÷£¬²¢ÓÚ5Ô½«´ËÊÂ֪ͨÁËÕâ¼ÒͶ×ʹ«Ë¾¡£Õâ´Îй¶ÐÅÏ¢Ô̺¬Æä¿Í»§µÄÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂëºÍ·¨È˹«Ë¾Ãû³ÆµÈ¡£´Ë±í£¬¸Ã¹«Ë¾µÄһЩ¼ÓÃÜÎļþÁ¬Í¬½âÃÜÃÜÔ¿¶¼Ò»Â·±»µÁ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/morgan-stanley-reports-data-breach-after-vendor-accellion-hack/


¾©¹«Íø°²±¸11010802024551ºÅ