SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247

Ðû²¼Ê±¼ä 2022-01-26

SolarWindsÐÞ¸´Serv-UÖÐÊäÈëÑéÖ¤Îó²îCVE-2021-35247


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬SolarWindsÐÞ¸´ÁËServ-UÖÐÒѱ»ÔÚҰʹÓõÄÊäÈëÑéÖ¤Îó²î ¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-35247£¬£¬£¬£¬£¬£¬ÓÉ΢ÈíÑо¿Ö°Ô±Jonathan Bar OrÔÚ¼à¿ØÊ¹ÓÃLog4j¿âÖеÄÎó²î¾ÙÐеĹ¥»÷ʱ·¢Ã÷ ¡£¡£¡£¡ £¿£¿£¿ £¿£¿£¿É±»ÓÃÀ´ÔÚ¸ø¶¨Ò»Ð©ÊäÈëµÄÇéÐÎϹ¹½¨Ò»¸öÅÌÎÊ£¬£¬£¬£¬£¬£¬²¢ÔÚδ¾­´¦Öóͷ£µÄÇéÐÎÏÂͨ¹ýÍøÂç·¢Ë͸ÃÅÌÎÊ ¡£¡£¡£¡£SolarWindsͨ¸æ³Æ£¬£¬£¬£¬£¬£¬LDAPÈÏÖ¤µÄServ-U webµÇ¼½çÃæÔÊÐí½ÓÊÜûÓгä·Ö¹ýÂ˵Ä×Ö·û£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÔÚServ-U 15.3Öнâ¾ö ¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126933/security/solarwinds-serv-u-flaw.html



ASEC·¢Ã÷ͨ¹ýº«¹úWebHardƽ̨Èö²¥µÄDDoS IRC Bot


AhnLabÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ(ASEC)ÔÚ1ÔÂ19ÈÕÐû²¼µÄ±¨¸æÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬DDoS IRC BotÕýͨ¹ýº«¹úWebHardƽ̨Èö²¥ ¡£¡£¡£¡£»£»£»î¶¯½«´øÓжñÒâÈí¼þµÄÓÎÏ·ÒÔZIPÎļþµÄÐÎʽÉÏ´«µ½ÍøÂçÓ²ÅÌ£¬£¬£¬£¬£¬£¬¸ÃÎļþÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ£¨¡°Game_Open.exe¡±£©£¬£¬£¬£¬£¬£¬Ëü³ýÁË¿ÉÒÔÆô¶¯ÓÎÏ·Í⣬£¬£¬£¬£¬£¬»¹»áÔËÐжñÒâÈí¼þpayload ¡£¡£¡£¡£¶ñÒâÈí¼þÊÇ»ùÓÚGoLangµÄDDoS IRC Bot£¬£¬£¬£¬£¬£¬±»ÓÃÓÚÌᳫÕë¶Ôº«¹úµÄDDoS¹¥»÷ ¡£¡£¡£¡£


https://thehackernews.com/2022/01/ddos-irc-bot-malware-spreading-through.html



ÓªÏú¹«Ë¾RR Donnelly³ÆÆäÔâµ½ContiµÄÀÕË÷¹¥»÷


ýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÓªÏú¹«Ë¾RR Donnelly(RRD)ÈÏ¿ÉÆäÔâµ½¹¥»÷ ¡£¡£¡£¡£12ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬RRDÏòSECÌá½»8-K±í¸ñ³ÆËûÃǵÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬ÆäÒѹرÕϵͳ±ÜÃâ¹¥»÷ÉìÕÅ ¡£¡£¡£¡£1ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ContiÍÅ»ïÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬£¬²¢ÒÑ´ÓRRDÇÔÈ¡ÁË2.5GBÊý¾Ý ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ContiÔÚÓëRRD¾ÙÐÐ̸Åк󣬣¬£¬£¬£¬£¬Òѽ«ÕâЩÊý¾Ýɾ³ý ¡£¡£¡£¡£1ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬RRDÓÖÐû²¼ÁËÒ»·Ý8-KÎļþ£¬£¬£¬£¬£¬£¬ÈÏ¿ÉÆäÊý¾ÝÒÑÔÚ¹¥»÷ʱ´ú±»µÁ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/marketing-giant-rrd-confirms-data-theft-in-conti-ransomware-attack/



ÁÔÓ¥Ðж¯IIÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ±


¾ÝýÌå1ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×é֯Эµ÷µÄÁÔÓ¥Ðж¯IIÒÑÀֳɾв¶ÄáÈÕÀûÑÇBECÍÅ»ïµÄ11¸ö³ÉÔ± ¡£¡£¡£¡£´Ë´ÎÖ´·¨»î¶¯¿ªÕ¹ÓÚ2021Äê12ÔÂ12ÈÕÖÁ22ÈÕ£¬£¬£¬£¬£¬£¬ÊÇ2020ÄêÁÔÓ¥Ðж¯IÖ®ºó¶ÔÌØ¶¨×éÖ¯µÄµÚ¶þ´Î¹¥»÷ ¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯µÄͨ¸æ³Æ£¬£¬£¬£¬£¬£¬±»²¶µÄÏÓÒÉÈË¿ÉÄÜÒѹ¥»÷50000¶à¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»È˵ÄÌõ¼Ç±¾ÉÏÓÐÁè¼Ý800000¸öDZÔÚÄ¿µÄÓòµÄƾ֤ ¡£¡£¡£¡£¸Ã»ú¹¹ÒÔΪ£¬£¬£¬£¬£¬£¬²¿·Ö±»²¶ÕßÊôÓÚBECÍÅ»ïSilverTerrier£¨ÓÖÃûTMT£© ¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/operation-falcon-ii-silverterrier-nigerian-bec/



Ñо¿ÍŶÓÔÚÒ°·¢Ã÷Õë¶Ô¼ÓÃÜÇ®±ÒµÄжñÒâÈí¼þBHUNT


BitdefenderÓÚ1ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬Åû¶Ð¶ñÒâÈí¼þBHUNTµÄϸ½Ú ¡£¡£¡£¡£BHUNTÊÇÒ»¸öÓÃ.NET ±àдµÄÄ £¿£¿£¿ £¿£¿£¿é»¯ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬Äܹ»ÇÔÈ¡¼ÓÃÜÇ®°ü£¨Exodus¡¢Electrum¡¢Atomic¡¢JaxxºÍEthereumµÈ£©ÖеÄÄÚÈÝ¡¢´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂëÒÔ¼°´Ó¼ôÌù°åÖв¶»ñµÄÃÜÂë ¡£¡£¡£¡£´Ë´Î»î¶¯Éæ¼°°Ä´óÀûÑÇ¡¢°£¼°¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÈÕ±¾¡¢ÂíÀ´Î÷ÑÇ¡¢Å²Íþ¡¢ÐÂ¼ÓÆÂ¡¢ÄÏ·Ç¡¢Î÷°àÑÀºÍÃÀ¹ú£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÆÆ½âÈí¼þ×°ÖóÌÐò¾ÙÐзַ¢ ¡£¡£¡£¡£


https://www.bitdefender.com/blog/labs/poking-holes-in-crypto-wallets-a-short-analysis-of-bhunt-stealer/



Crypto.com½ü500¸öÕË»§±»ºÚ£¬£¬£¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ


ýÌå1ÔÂ20Èճƣ¬£¬£¬£¬£¬£¬ÐÂ¼ÓÆÂCrypto.comÐû²¼µÄÉùÃ÷ÌåÏÖÆä483¸öÕË»§±»ºÚ£¬£¬£¬£¬£¬£¬Ôì³É3400ÍòÃÀÔªËðʧ ¡£¡£¡£¡£×î³õ£¬£¬£¬£¬£¬£¬²¿·ÖÓû§±¨¸æÆäÕÊ»§±£´æ¿ÉÒÉÉúÒ⣬£¬£¬£¬£¬£¬Ö»¹ÜÊܵ½2FA±£»£»£»¤µ«ÈÔÓÐÊýǧÃÀÔªETH±»µÁ ¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ1ÔÂ17ÈÕÊ״μì²âµ½¹¥»÷£¬£¬£¬£¬£¬£¬ÆäʱÉÙÊýÓû§µÄÕÊ»§Éϱ£´æÎ´¾­ÊÚȨµÄÌá¿î ¡£¡£¡£¡£Ö®ºó¹«Ë¾ÔÝÍ£ÁËËùÓÐÌá¿îÉúÒ⣬£¬£¬£¬£¬£¬ÔÚ¾­ÓÉÇå¾²¼Ó¹Ìºó£¬£¬£¬£¬£¬£¬Ìá¿îЧÀÍÓÚ1ÔÂ18ÈÕÏÂÖç5:46×óÓÒ»Ö¸´ ¡£¡£¡£¡£Crypto.comÌåÏÖÒÑ×èÖ¹´ó²¿·Öδ¾­ÊÚȨµÄÌá¿î£¬£¬£¬£¬£¬£¬²¢½«ÎªÊÜÓ°Ïì¿Í»§È«¶î±¨Ïú ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/



Çå¾²¹¤¾ß


Raven


ÊǼò»¯¡¢¿É¶¨ÖÆÇÒÏìӦѸËٵĸ߼¶ÍøÂçÍþвͼ ¡£¡£¡£¡£


https://github.com/qeeqbox/raven


Espoofer


ÊÇÒ»ÖÖ¿ªÔ´²âÊÔ¹¤¾ß£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýµç×ÓÓʼþϵͳÖÐµÄ SPF¡¢DKIM ºÍ DMARC Éí·ÝÑéÖ¤ ¡£¡£¡£¡£


https://github.com/chenjj/espoofer


pip-audit


ÊÇÒ»ÖÖÓÃÓÚɨÃè Python ÇéÐÎÒÔ²éÕÒ¾ßÓÐÒÑÖªÎó²îµÄ°üµÄ¹¤¾ß ¡£¡£¡£¡£


https://github.com/trailofbits/pip-audit


Çå¾²ÆÊÎö


Õë¶ÔÎÚ¿ËÀ¼¹Ù·½ÍøÕ¾µÄ¶ñÒâÈí¼þWhisperGateÆÊÎö


1ÔÂ13ÈÕÎÚ¿ËÀ¼´ó×ڵĹٷ½ÍøÕ¾±»¹¥»÷£¬£¬£¬£¬£¬£¬ÎÄÕÂÆÊÎöÁ˸ÃÊÂÎñÖжñÒâÈí¼þ ¡£¡£¡£¡£


https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3


2021 ÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö


´ÓÒ»Ö±Éú³¤µÄÀÕË÷Èí¼þÉú̬ϵͳµ½Õë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÈüÃÅÌú¿Ë»ØÊ×ÁË 2021 ÄêµÄÍøÂçÇå¾²Ì¬ÊÆ ¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021



Ó¢¹úNCSCÐû²¼×éÖ¯µÖÓùµç»°ºÍ¶ÌÐÅڲƭ»î¶¯µÄÖ¸ÄÏ


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC) Ðû²¼Á˵ÄÖ¸ÄÏÖ¼ÔÚ±£»£»£»¤¿Í»§ÃâÊÜڲƭ»î¶¯µÄ¹¥»÷£¬£¬£¬£¬£¬£¬Í¬Ê±È·±£ËûÃÇµÄ SMS ºÍµç»°ÐÂÎſɿ¿ ¡£¡£¡£¡£


https://securityaffairs.co/wordpress/126916/security/ncsc-guidance-communications-with-customers.html