ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬¿ÉÈëÇÖÆäGitHub¿â
Ðû²¼Ê±¼ä 2021-01-291.ÃÀ¹úºÍ±£¼ÓÀûÑÇÁªºÏµ·»ÙNetWalker£¬£¬ÖÁÉÙÓ¯Àû2760ÍòÃÀÔª

ÔÚÅ·ÖÞÐ̾¯×éÖ¯ÆÆ»ñEmotet½©Ê¬ÍøÂçµÄͳһÌ죬£¬ÃÀ¹úºÍ±£¼ÓÀûÑÇÕþ¸®ÁªºÏµ·»ÙÁË2020Äê×î»îÔ¾µÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»NetWalkerµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£´Ë´ÎÐж¯¾Ð²¶ÁËÒ»Ãû¼ÓÄôóÏÓÒÉÈËVachon Desjardins£¬£¬»¹½É»ñÁËÍйÜ×ÅÊý¾ÝÐ¹Â¶ÍøÕ¾µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¾ÝÃÀ¹úÕþ¸®³Æ£¬£¬NetWalkerÒѹ¥»÷ÁËÀ´×Ô27¸ö²î±ð¹ú¼ÒµÄÖÁÉÙ305ÃûÊܺ¦Õß¡£¡£¡£¡£¡£McAfee³ÆNetWalkerÒÑÓ¯ÀûÁè¼Ý2500ÍòÃÀÔª£¬£¬¶øÇø¿éÁ´ÆÊÎö¹«Ë¾ChainalysisÌåÏÖNetWalker 2020ÄêÓ¯Àû¿ÉÄÜÁè¼Ý4600ÍòÃÀÔª£¬£¬½ö´ÎÓÚRyuk¡¢Maze¡¢DoppelpaymerºÍSodinokibi¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/113944/cyber-crime/netwalker-ransowmare-dismantled.html
2.TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â

AT£¦TµÄÑо¿Ö°Ô±·¢Ã÷TeamTNTʹÓÿªÔ´Èí¼þlibprocesshiderÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£TeamTNTÒÔ»ùÓÚÔÆµÄ¹¥»÷¶øÖøÃû£¬£¬ÀýÈçʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©Æ¾Ö¤À´ÇÖÈëÔÆ£¬£¬²¢ÓÃÆäÀ´ÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ªÔ´¹¤¾ßlibprocesshiderÊÇ2014Äê±»·ÅÔÚGithubÉϵ쬣¬¿ÉʹÓÃldÔ¤¼ÓÔØÆ÷ÔÚLinuxÏÂÒþ²ØÀú³Ì¡£¡£¡£¡£¡£ºÚ¿Í½ÓÄÉbase64±àÂëµÄ¾ç±¾£¬£¬½«¸Ã¹¤¾ßÒþ²ØÔÚTeamTNT cryptominerµÄ¶þ½øÖÆÎļþÖУ¬£¬Ö¼ÔÚ´ÓÀú³ÌÐÅÏ¢³ÌÐò£¨ÀýÈçpsºÍlsof£©ÖÐÒþ²Ø¶ñÒâÀú³ÌÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/teamtnt-cloaks-malware-open-source-tool/163414/
3.Ñо¿Ö°Ô±Åû¶VS Code±£´æ´úÂë×¢È룬£¬¿ÉÈëÇÖÆäGitHub¿â

Ñо¿Ö°Ô±RyotaKÅû¶VS Code±£´æ´úÂë×¢ÈëÎó²î£¬£¬¿ÉÈëÇÖÆäGitHub¿â¡£¡£¡£¡£¡£¸ÃÎó²îλÓÚVS CodeµÄÒ»Á¬¼¯³É£¨CI£©¾ç±¾µÄvscode-github-triage-actions´æ´¢¿âÖУ¬£¬ÓÉÓÚÔÚclosedWithÏÂÁîÖÐȱÉÙÉí·ÝÑéÖ¤¼ì²é£¬£¬²¢ÇÒÓÃÓÚÑéÖ¤¹Ø±Õ×¢Ê͵ÄÕýÔò±í´ïʽ±£´æÈ±ÏÝ£¬£¬µ¼ÖÂÈκÎÈ˶¼¿ÉÒÔÔÚclosewithÖµÖÐ×¢Èë´úÂë¡£¡£¡£¡£¡£RyotaK·¢Ã÷¿ÉʹÓøÃÎó²î»ñµÃVS Code GitHub´æ´¢¿âµÄÊÚȨÁîÅÆ£¬£¬²¢ÄÜ¶ÔÆä¾ÙÐжÁд¡£¡£¡£¡£¡£RyotaKÒÑÏòMicrosoft±¨¸æÁ˸ÃÎó²î£¬£¬²¢Ðû²¼ÁËÎó²îµÄPoC¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/
4.ClearskyÅû¶Àè°ÍÄÛCedar APTÕë¶ÔÈ«ÇòISPµÄÌØ¹¤»î¶¯

ClearskyÅû¶Àè°ÍÄÛCedar APT×éÖ¯Õë¶ÔÈ«ÇòµçÐÅÔËÓªÉ̺ÍISPµÄÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ2020ÄêÍ·£¬£¬ºÚ¿Í¹¥»÷ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢°£¼°¡¢ÒÔÉ«ÁС¢Àè°ÍÄÛ¡¢Ô¼µ©¡¢°ÍÀÕ˹̹¡¢É³Ìذ¢À²®ºÍ°¢ÁªÇõµÄ»¥ÁªÍøÐ§ÀÍÔËÓªÉÌ£¬£¬Ö¼ÔÚÍøÂçÇ鱨ºÍÇÔÈ¡¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÿªÔ´¹¤¾ßɨÃèInternetÉÏδ´ò²¹¶¡µÄAtlassianºÍOracleЧÀÍÆ÷£¬£¬È»ºóʹÓÃÎó²îÀ´»á¼ûЧÀÍÆ÷²¢°²ÅÅWeb Shell£¬£¬Ö÷ҪʹÓÃÁË3¸ö1ÈÕÎó²îCVE-2019-3396¡¢CVE-2019-11581ºÍCVE-2012-3152¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/113975/apt/lebanese-cedar-apt-attacks.html
5.NetscoutÐû²¼ÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ

NetscoutÐû²¼ÁËÓйØDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬Ð§ÀÍÌṩÉÌÍøÂç³ÉΪÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷µÄÖØµã£¬£¬µçÐÅÌṩÉÌÔÚ2020ÉϰëÄêÔâµ½492807´Î¹¥»÷£¬£¬±È2019ÄêͬÆÚÔöÌíÁË25£¥¡£¡£¡£¡£¡£±ðµÄ£¬£¬DDoS¹¥»÷ǰÑÔµÄÖØ´óÐÔÒ²ÔÚÔöÌí£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬Ê¹ÓÃ15¸öÒÔÉÏǰÑԵĹ¥»÷ÊýÄ¿ÔöÌíÁË2851£¥¡£¡£¡£¡£¡£¶ø2020ÄêÉϰëÄê¹¥»÷µÄÍÌÍÂÁ¿£¨pps£©±È2019ÄêÔöÌíÁË31£¥£¬£¬¹¥»÷Ò»Á¬Ê±¼äïÔÌÁË51£¥¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.netscout.com/blog/service-provider-ddos-attacks-are-rise
6.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ

¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼ÁËCOVID-19ÒÔÀ´ÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬ÔÚ2020Äê1ÔÂÖÁ4ÔÂÖÐ×ܹ²¼ì²âµ½ÁËԼĪ907000ÌõÀ¬»øÓʼþ£¬£¬737ÆðÓë¶ñÒâÈí¼þÓйصÄÊÂÎñºÍ48000¸öÓëCOVID-19ÓйصÄURL¡£¡£¡£¡£¡£2020Äê2ÔÂÖÁ3Ô£¬£¬¶ñÒâÓòÃû×¢²áÊýÄ¿ÔöÌíÁË569£¥£¬£¬¶øÒÉËÆ¶ñÒâÓòÃûµÄ×¢²áÊýÄ¿ÔòÔöÌíÁË788£¥¡£¡£¡£¡£¡£±¨¸æ»¹Ö¸³öÍøÂç·¸·¨·Ö×ÓʹÓÃÁËÓÉCOVID-19Ôì³ÉµÄÉç»á²»ÎȹÌÐԺ;¼ÃÐÎÊÆÔì³ÉµÄ¿Ö¾åºÍ²»È·¶¨ÐÔ£¬£¬ÕýÔÚÒÔ¾ªÈ˵ÄËÙÂÊÉú³¤¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19


¾©¹«Íø°²±¸11010802024551ºÅ