Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯

°ä²¼¹¦·ò 2022-03-03

Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯


2ÔÂ28ÈÕ £¬Symantec°ä²¼Ò»·Ý»ã±¨ÏêÊöÁËSlugÍÅ»ïÀûÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯ ¡£DaxinÊÇÒ»¸öWindowsÄÚºËÇý¶¯·¨Ê½ £¬×Ô2019Äê11ÔÂÆðÍ·±»ÓÃÓÚ¹¥»÷»î¶¯ £¬×êÑÐÈËÔ±ÔÚ2021Äê11Ô¹۲쵽Æä×î½üÒ»´Î¹¥»÷»î¶¯ £¬Õë¶ÔµçÐÅ¡¢½»Í¨ºÍÔì×÷ÐÐÒµ ¡£¸ÃºóÃÅÓµÓÐÇÔÈ¡Êý¾Ý¡¢Ö´ÐкÅÁî»òÏÂÔØºÍ×°ÖÃÆäËü¶ñÒâÈí¼þµÄÖ°ÄÜ £»Äܹ»½Ù³ÖºÏ·¨µÄTCP/IPÏνӽøÐÐͨѶ £¬ÒÔÈÆ¹ý¼ì²â £»»¹ÄÜÔÚÖ¸±êÖÐ×°ÖÃÆäËü×é¼þÀ´¼ÓÇ¿ÄÚÖÃÖ°ÄÜ £¬²¢Ê¹ÓÃÃûΪ\\.\Tcp4µÄÉ豸Ϊ´ËÀà×é¼þÌṩרÓÃͨѶ»úÔì ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage



¼ÑÄܵÄ×Ó¹«Ë¾AxisÔâµ½¹¥»÷µ¼Ö²¿ÃÅϵÍÂäÙʱÖжÏ


¾ÝýÌå2ÔÂ28ÈÕ±¨Â· £¬Èðµä¹«Ë¾Axis CommunicationsÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅϵͳÖжÏ ¡£AxisÊǼÑÄܵÄ×Ó¹«Ë¾ £¬2019Äê½»Ò×ÊÕÈ볬¹ý12.35ÒÚÃÀÔª ¡£¹¥»÷²úÉúÓÚ2021Äê2ÔÂ20ÈÕ £¬¸Ã¹«Ë¾µ±¼´¶Ô´ËÊ·¢Õ¹µ÷²é ¡£µ÷²éÓÚ2ÔÂ27ÈÕʵÏÖ £¬Á˾ÖÏÔʾûÓзþÎñÆ÷±»¼ÓÃÜ £¬Ò²Ã»Óпͻ§ÐÅÏ¢Êܵ½Ó°Ïì £¬¹¥»÷Õßͨ¹ýÉ繤¹¥»÷½ÚÔìÁËÒ»ÃûÔ±¹¤µÄÕË»§ £¬²¢ÔÚûÓд¥·¢Èκξ¯±¨µÄÇé¿öÏÂÈëÇÖÁËϵͳ ¡£Ä¿Ç° £¬¸Ã¹«Ë¾µÄ²Ù×÷ϵͳºÍÀûÓ÷¨Ê½ÈÔ´¦ÓÚÀëÏß״̬ £¬Camera StationÐí¿ÉϵͳҲÎÞ·¨Ê¹Óà ¡£


https://www.bleepingcomputer.com/news/security/axis-communications-shares-details-on-disruptive-cyberattack/



CISA°ä²¼Éæ¼°Ê©ÄÍµÂµçÆøÖжà¸ö·ì϶µÄICS°²È«¹«¸æ


CISAÓÚ2ÔÂ24ÈÕ°ä²¼ÁËÒ»ÔòICS°²È«¹«¸æ £¬Éæ¼°Ê©ÄÍµÂµçÆøEasergyÖеĶà¸ö·ì϶ ¡£ÕâЩ·ì϶Ô̺¬Ó²±àÂëÆ¾Ö¤Ê¹Ó÷ì϶£¨CVE-2022-22722£©»ººÍ³åÇøÒç¶Âí½Å£¨CVE-2022-22723ºÍCVE-2022-22725£© ¡£¹«¸æ³Æ £¬³É¹¦ÀûÓÃÕâЩ·ì϶¿ÉÄÜ»áй¶É豸ʹ´¦¡¢µ¼ÖÂDoS״̬¡¢É豸³ÁÆô»òÔÊÐí¹¥»÷Õ߯ëÈ«½ÚÔìÖмÌ ¡£Ê©ÄÍµÂµçÆøÔÚ2022Äê1ÔÂ11ÈÕÍÆ³öµÄ¸üÐÂÖн¨¸´ÁËÕâЩ·ì϶ ¡£


https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-03



ÒÁÀÊUNC3313ÀûÓÃ2¸öкóÃŹ¥»÷Öж«µÄijµ±¾Ö»ú¹¹


MandiantÔÚ2ÔÂ24ÈÕ°ä²¼µÄ»ã±¨Åû¶ÁËÒÁÀÊUNC3313ʹÓõÄ2¸öкóÃŵÄϸ½Ú ¡£×êÑÐÈËÔ±ÔÚ2021Äê11Ô¼ì²âµ½UNC3313Õë¶ÔÖж«Ä³µ±¾Ö»ú¹¹µÄ¹¥»÷ £¬²¢ÔÚµ÷²é¹ý³ÌÖз¢ÏÖÁËеĶñÒâÈí¼þGRAMDOORºÍSTARWHALE ¡£ÆäÖÐ £¬STARWHALEÊÇÒ»¸öWindows¾ç±¾Îļþ(.WSF) £¬Ö´ÐдÓÓ²±àÂëC2·þÎñÆ÷½Ó¹Üµ½µÄºÅÁî £»GRAMDOOR±»²¿ÊðΪNSIS×°Ö÷¨Ê½ £¬²¢Í¨¹ýÉèÖÃWindows Run×¢²á±íÏîʵÏÖÓÆ¾ÃÐÔ ¡£


https://www.mandiant.com/resources/telegram-malware-iranian-espionage



¼ÓÖÝÂÉʦЭ»áState BarµÄ26ÍòÆð°¸¼þ¼Í¼й¶


ýÌå2ÔÂ28ÈÕ±¨Â·³Æ £¬¼ÓÀû¸£ÄáÑÇÖÝÂÉʦЭ»áState BarÔ¼26Íò·Ý·Ç¹«¿ªµÄ°¸¼þ¼Í¼±»°ä²¼ÔÚJudyrecords.com ¡£¸Ã¾ÛºÏÍøÕ¾´Ó¶à¸ö˾·¨»ú¹¹Êý¾Ý¿âÍøÂ繫¿ªµÄ·¨Í¥¼Í¼ £¬»ã¼¯Á˳¬¹ý6.3Òڷݼͼ ¡£¾ÝϤ £¬Õâ´Îй¶ÊÂÎñÔ´ÓÚ°¸¼þÖÎÀíϵͳÖдæÔÚÒ»¸ö°²È«·ì϶ £¬µ¼ÖÂJudyrecordsÔÚ½Ó¼û¹«¹²¼Í¼ʱÎÞÒâÖÐץȡµ½Á˷ǹ«¿ª¼Í¼ ¡£Ä¿Ç° £¬ÕâЩÎļþÒѱ»´ÓÍøÕ¾ÖÐɾ³ý ¡£


https://www.theregister.com/2022/02/28/ca_legal_leak/



Akamai·¢ÏÖÐÂDDoS¹¥»÷ģʽ¿É·Å´ó65±¶


3ÔÂ1ÈÕ £¬Akamai°ä²¼»ã±¨³Æ¼ì²âµ½ÐÂDDoS¹¥»÷ģʽTCP Middlebox Reflection¿É·Å´ó65±¶ ¡£´ËÀ๥»÷Õë¶ÔÊý¾Ý°ü²é³­ºÍÄÚÈݹýÂËÉ豸 £¬ÓµÓÐ33×Ö½ÚpayloadµÄSYNÊý¾Ý°ü¿É´¥·¢2156×Ö½ÚµÄÏìÓ¦ £¬·Å´óÁË6533% ¡£AkamaiÔÚÕë¶ÔÒøÐÓ×¢ÓÎÀÀ¡¢ÓÎÏ·¡¢Ã½ÌåºÍWeb ÍйܷþÎñÌṩÉ̵ĻÖж¼¼ì²âµ½ÁË´ËÀ๥»÷ ¡£×êÑÐÈËÔ±ÒÔΪ £¬Ö»¹ÜĿǰ´ËÀ๥»÷µÄ¹æÄ£ÉÐÐ ¡£¨·åֵΪ11GbpsºÍ1.5Mpps£© £¬µ«¹¥»÷ÕßÔÚ½øÐÐ΢µ÷ºóÕÒµ½×î¼Ñ·´ÉäģʽֻÊǹ¦·òÎÊÌâ ¡£


https://www.akamai.com/blog/security/tcp-middlebox-reflection#.Yh41hIhUsH0.twitter




°²È«¹¤¾ß


Katoolin3 


Äܹ»½« Kali Linux ÖпÉÓõÄËùÓз¨Ê½´øµ½ Debian ºÍ Ubuntu ¡£


https://github.com/s-h-3-l-l/katoolin3



openSquat 


ÊÇÒ»ÖÖ¿ªÔ´µý±¨ (OSINT) °²È«¹¤¾ß £¬ÓÃÓÚ¼ø±ð¶ÔÌØ¶¨¹«Ë¾»òÓòµÄÇÀ×¢Íþв ¡£


https://github.com/atenreiro/opensquat



CloudGraph


ÊǺÏÓÃÓÚ AWS¡¢Azure¡¢GCP ºÍ K8s µÄÃâ·Ñ¿ªÔ´Í¨Óà GraphQL API ºÍÔÆ°²È«×´Ì¬ÖÎÀí (CSPM) ¹¤¾ß ¡£


https://github.com/cloudgraphdev/cli



Nimcrypt2


Óà Nim ±àдµÄ .NET¡¢PE ºÍԭʼ Shellcode ´ò°ü·¨Ê½/¼ÓÔØ·¨Ê½ ¡£


https://github.com/icyguider/Nimcrypt2



moonwalk


ͨ¹ýÔÚϵͳÈÕÖ¾ºÍÎļþϵͳ¹¦·ò´ÁÉ϶ϸùºÛ¼£ £¬ÔÚ Linux ·ì϶ÀûÓÃ/ÉøÈë²âÊÔÆÚ¼ä¸²¸Ç×ÙÓ° ¡£


https://github.com/mufeedvh/moonwalk




°²È«·ÖÎö


ÎÚ¿ËÀ¼×êÑÐÈËÔ±ÐÂäįÕË÷Èí¼þ Conti µÄÔ´´úÂë


https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/



ÀÕË÷Èí¼þ BlackCat ·ÖÎö»ã±¨


https://cybersecurity.att.com/blogs/labs-research/blackcat-ransomware



Namecheap ÖÕֹΪ¶íÂÞ˹×éÖ¯Ìṩ·þÎñ £¬ÒªÇóËûÃÇ×ªÒÆÓòÃû


https://www.bleepingcomputer.com/news/technology/namecheap-terminates-services-for-russians-asks-them-to-move-domains/



΢Èí£ºÎÚ¿ËÀ¼ÔÚÈëÇÖǰÊýÓ±¾Ç®ÍÔâ·êÁËÐ嵀 FoxBlade ¶ñÒâÈí¼þ¹¥»÷


https://securityaffairs.co/wordpress/128538/cyber-warfare-2/foxblade-malware-used-hours-before-invasion.html



CISAºÍFBÖÒ¸æÕë¶ÔÎÚ¿ËÀ¼µÄÊý¾Ý²Á³ý¹¥»÷¿ÉÄÜ»áÊæÕ¹µ½ÆäËü¹ú¶È


https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-potential-data-wiping-attacks-spillover/



Emotet µÄ³ÁÉú£º½©Ê¬ÍøÂçµÄÐÂÖ°Äܼ°Æä¼ì²â²½Öè


https://thehackernews.com/2022/02/reborn-of-emotet-new-features-of-botnet.html