AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý

°ä²¼¹¦·ò 2022-04-21
1¡¢AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý


4ÔÂ19ÈÕ£¬Unit 42°ä²¼»ã±¨³ÆAWSµÄ¶à¸öLog4ShellÈȲ¹¶¡ÖдæÔÚÑϳÁµÄÎÊÌâ ¡£½«²¹¶¡×°Öõ½·þÎñÆ÷»ò¼¯Èººó£¬¸Ã»·¾³ÖеÄÿ¸öÈÝÆ÷¶¼Äܹ»ÀûÓÃÆäÀ´ÊÕÊܵײãÖ÷»ú£¬ÀýÈ磬Kubernetes¼¯ÈºÖеÄÈÝÆ÷¶¼Äܹ»ÌÓÒÝ£¬·ÇÌØÈ¨¹ý³ÌÒ²Äܹ»ÀûÓøò¹¶¡À´ÌáȨ ¡£Ä¿Ç°£¬ÕâЩ·ì϶׷×ÙΪCVE-2021-3100¡¢CVE-2021-3101¡¢CVE-2022-0070ºÍCVE-2022-0071£¬CVSSÆÀ·Ö¾ùΪ8.8 ¡£×êÑÐÈËÔ±ÓÚÈ¥Äê12ÔÂ21Èջ㱨¸Ã·ì϶£¬ÑÇÂíÑ·ÓÚ4ÔÂ19ÈÕ½¨¸´ ¡£


https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/


2¡¢×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçBotenaGoÆðÍ·¹¥»÷LilinµÄDVR


ýÌå4ÔÂ20ÈÕ±¨Â·£¬Nozomi Networks Labs·¢ÏÖ½©Ê¬ÍøÂçBotenaGoµÄÐÂÑù±¾¹¥»÷LilinµÄDVR ¡£BotenaGoÊÇÓÃGolang±àдµÄÏà¶Ô½ÏеĶñÒâÈí¼þ£¬AV¼ì²âÂʽϵÍ(6/62)£¬Ô´´úÂëÓÚ2021 Äê10Ô¹«¿ª ¡£×êÑÐÈËÔ±³Æ£¬ÐÂÑù±¾ËƺõÔ´×Ô¹«¿ªµÄÔ´´úÂ룬±»¶¨ÃûΪ¡°Lillin scanner¡±£¬ÆäÒ»¸öÏÔÖøÌØµãÊDz»»á±»VirusTotalɨÃèÆ½Ì¨¼ì²âµ½ ¡£¾ÝϤ£¬¿ª·¢Õßɾ³ýÁËBotenaGoԭʼ´úÂëÖÐÏÕЩȫÊýµÄ·ì϶ÀûÓã¬×¨Ò»ÓÚLilin DVRÖеÄRCE·ì϶ ¡£


https://securityaffairs.co/wordpress/130383/malware/botenago-botnet-targets-dvr.html


3¡¢Funky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥


¾ÝýÌå4ÔÂ19ÈÕ±¨Â·£¬ÀñÎ│ÁãÊÛÉÌFunky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥ ¡£¸Ã¹«Ë¾°µÊ¾£¬ËûÃÇÔÚÉÏÖÜËÄ·¢ÏÖ¸ÃÊÂÎñºó£¬µ±¼´¶Ô´ËÊ·¢Õ¹µ÷²é£¬È·¶¨Óû§Êý¾Ý±»½Ó¼ûµÄˮƽ£¬²¢½«ÏµÍ³ÀëÏß ¡£Ö±µ½±¾ÖÜÒ»£¬Æä¹ÙÍøÈÔÔÚÌáÐÑ£¬ÓÉÓÚÓöµ½ÁËһЩÎÊÌ⣬ĿǰÎÞ·¨½ÓÊÜж©µ¥ ¡£Funky PigeonûÓзÖÏí¸ü¶à¹ØÓÚ¹¥»÷ÐÔÖÊ»ò¹¥»÷Õß»ñµÃ¹«Ë¾ÏµÍ³½Ó¼ûȨÏÞµÄϸ½ÚÐÅÏ¢ ¡£


https://www.infosecurity-magazine.com/news/funky-pigeon-cyber-attack/


4¡¢CheckPoint³ÆÁìÓ¢ÊÇ2022ÄêQ1Öб»ÀûÓÃ×î¶àµÄÆ·ÅÆ


4ÔÂ19ÈÕ£¬Check Point Research°ä²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÆ·ÅÆÍøÂç´¹µöµÄ·ÖÎö»ã±¨ ¡£LinkedInÒѳÉΪ´¹µö¹¥»÷ÖÐ×î±»·ÂÕÕ×î¶àµÄÆ·ÅÆ£¬Õ¼È«ÇòËùÓдËÀàÊÂÎñµÄ52%ÒÔÉÏ£¬ÉÏÒ»¼¾¶ÈÆäÅÅÃûµÚÎ壬½öÓë8%µÄ´¹µö¹¥»÷ÓйØ ¡£»ã±¨Ç¿µ÷Á˹¥»÷ÕßÀûÓÃÉç½»ÍøÂçµÄÐÂÇ÷Ïò£¬Éç½»ÍøÂç´Ë¿ÌÒѳ¬¹ý¸÷ÀຽÔ˹«Ë¾ºÍ¹È¸èµÈ¿Æ¼¼¹«Ë¾£¬³ÉΪµÚÒ»´óÀà±ð ¡£Æä´ÎÊÇ¿ìµÝ¹«Ë¾DHL(Õ¼±È14%)£¬ÒÔ¼°¹È¸è(7%)¡¢Î¢Èí(6%)ºÍÁª¹ú¿ìµÝ(6%) ¡£


https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/


5¡¢VaronisÅû¶Æä¿Í»§Ï°È¾HiveÀÕË÷Èí¼þµÄ¾ßÌåÐÅÏ¢


4ÔÂ19ÈÕ£¬°²È«ºÍ·ÖÎö¹«Ë¾VaronisÅû¶ÁËÆäÒ»¸ö¿Í»§Ôâµ½µÄHiveÀÕË÷¹¥»÷µÄ¾ßÌåÐÅÏ¢ ¡£Æäȡ֤ÍŶӳÆ£¬Ö¸±êϵͳÔÚ72Ó×ʱÄÚ±»¼ÓÃÜ ¡£·ÖÎö»ã±¨Ö¸³ö£¬¹¥»÷¹ý³Ì×ܹ²Ô̺¬ÁË5¸ö½×¶Î£ºÀûÓÃProxyShell×°ÖúóÃÅ£»ÀûÓÃPowerShellÏÂÔØCobalt Strike stager£»ÀûÓÃSYSTEMȨÏÞ´´½¨ÏµÍ³ÖÎÀíÔ±Óû§¡°user¡±£¬²¢Å²ÓÃMimikatzת´¢Æ¾Ö¤£»ÀûÓÃÇáÁ¿¼¶¹¤¾ßSoftPerfectɨÃèÃô¸ÐÐÅÏ¢£»Í¨¹ýÃûΪ¡°Windows.exe¡±µÄpayload×°ÖÃÀÕË÷Èí¼þ ¡£


https://www.varonis.com/blog/hive-ransomware-analysis


6¡¢Kaspersky°ä²¼¹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄ·ÖÎö»ã±¨


KasperskyÔÚ4ÔÂ19ÈÕ°ä²¼Á˹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄ·ÖÎö»ã±¨ ¡£»ã±¨Ö¸³ö£¬´ËÀà»î¶¯ÔÚÒ»¸öÔÂÄÚÔö³¤ÁË10±¶£¬´Ó2022Äê2ÔµÄÔ¼3000·âÔö³¤µ½3ÔµÄÔ¼30000·â ¡£¸Ã»î¶¯ÖØÒª·Ö·¢¶ñÒâÈí¼þEmotetºÍQbot£¬²¢ÒÔÆóÒµ¹«Ë¾ÎªÖ¸±ê ¡£µ½Ä¿Ç°ÎªÖ¹£¬¼ì²âµ½ÕâЩÓʼþÖÐʹÓõÄ˵»°Ô̺¬Ó¢Óï¡¢·¨Óï¡¢ÐÙÑÀÀûÓï¡¢Òâ´óÀûÓŲÍþÓï¡¢²¨À¼Óï¡¢¶íÓ˹ÂåÎÄÄáÑÇÓï¡¢Î÷°àÑÀÓïºÍÖÐÎÄ ¡£Cryptolaemus°µÊ¾£¬EmotetÆðͷʹÓÃ64λ¼ÓÔØ·¨Ê½ºÍÇÔȡģ¿é ¡£


https://usa.kaspersky.com/about/press-releases/2022_kaspersky-finds-malicious-spam-campaign-targeting-organizations-grows-10-fold-in-a-month-spreads-qbot-and-emotet-malware