΢Èí·¢Ã÷³¯Ïʹ¥»÷ÕßʹÓÃH0lyGh0st¹¥»÷ÖÐСÐÍÆóÒµ

Ðû²¼Ê±¼ä 2022-07-18
1¡¢Î¢Èí·¢Ã÷³¯Ïʹ¥»÷ÕßʹÓÃH0lyGh0st¹¥»÷ÖÐСÐÍÆóÒµ

      

7ÔÂ14ÈÕ£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æÆÊÎöÁ˳¯ÏÊDEV-0530£¨×Ô³ÆÎªH0lyGh0st£©µÄ¹¥»÷Õ½ÂÔÒÔ¼°ÆäÀÕË÷Èí¼þµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬£¬¸ÃÍÅ»ïÒ»Ö±ÔÚ¿ª·¢ºÍʹÓÃÀÕË÷Èí¼þ¾ÙÐй¥»÷£¬£¬£¬£¬²¢ÔçÔÚ2021Äê9Ô¾ÍÀÖ³ÉÈëÇÖÁ˶à¸ö¹ú¼ÒµÄСÐÍÆóÒµ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«¸ÃÍÅ»ïµÄÀÕË÷Èí¼þ¹éÀàΪÁ½¸öϵÁУºSiennaPurpleºÍSiennaBlue£¬£¬£¬£¬²¢ÔÚÕâЩϵÁÐÏÂÈ·¶¨ÁËËĸö±äÌ壺BTLC_C.exe¡¢HolyRS.exe¡¢HolyLock.exeºÍBLTC.exe¡£¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/


2¡¢ÃÀ¹úÖÐÇé¾Öǰ¹¤³ÌʦÒòVault 7й¶ÊÂÎñ¶ø±»ÖÎ×ï

      

¾Ý7ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬Å¦Ô¼µÄÒ»¸öÁª°îÅãÉóÍÅÐû²¼£¬£¬£¬£¬ÖÐÑëÇ鱨¾ÖÈí¼þ¹¤³ÌʦÏòά»ù½âÃÜÍøÕ¾(WikiLeaks)й¶´ó×ÚÉñÃØÎļþµÄ×ïÃû½¨Éè¡£¡£¡£¡£¡£ÏÖÄê33ËêµÄJoshua SchulteÃæÁٵľÅÏîÖ¸¿Ø×ïÃû¾ù½¨É裬£¬£¬£¬°üÀ¨²»·¨ÍøÂç¹ú·ÀÐÅÏ¢µÈ¡£¡£¡£¡£¡£Î¬»ù½âÃܽ«ÕâЩÉñÃØÎļþÃüÃûΪ¡°Vault 7¡±£¬£¬£¬£¬²¢ÔÚ2017ÄêÐû²¼£¬£¬£¬£¬ÕâЩÎļþÏêϸ½ÒÆÆÁËCIAÔõÑùÈëÇÖµçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ó¦Óú͵çÊÓ»úµÈ¡£¡£¡£¡£¡£Î¬»ù½âÃܳƣ¬£¬£¬£¬Vault 7ÊÇÓÐÊ·ÒÔÀ´¹ØÓÚCIAµÄ×î´óÒ»´ÎÉñÃØÎļþÐû²¼¡£¡£¡£¡£¡£¸ß¼¶Ç鱨¹ÙÔ±ÆÕ±éÒÔΪ£¬£¬£¬£¬ÕâÊǶÔÃÀ¹úÌØ¹¤»ú½á¹¹³É¹¥»÷µÄ×î¾ßÆÆËðÐÔµÄйÃÜÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£


https://thehackernews.com/2022/07/former-cia-engineer-convicted-of.html


3¡¢Cloudflare³ÆÆä½üǧÃû¿Í»§Ôâµ½À´×ÔMantisµÄDDoS¹¥»÷ 

      

ýÌå7ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬CloudflareÌåÏÖÆäÔÚ6Ô·ݻº½âÁËÀ´×ÔMantisµÄ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£MantisÖ÷ÒªÕë¶ÔITºÍµçÐÅÐÐÒµ(36%)¡¢ÐÂÎÅýÌåºÍ³öÊéÎïÐÐÒµ(15%)¡¢½ðÈÚÐÐÒµ(10%) ºÍÓÎÏ·ÐÐÒµ(12%)µÄʵÌå¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£¬£¬£¬£¬ÔÚÒÑÍù30ÌìÀ£¬£¬£¬Æä½üǧÃû¿Í»§Ôâµ½ÁË3000¶à´ÎDDoS¹¥»÷¡£¡£¡£¡£¡£ÓëÓÉIoT×°±¸×é³ÉµÄ¹Å°å½©Ê¬ÍøÂç²î±ð£¬£¬£¬£¬MantisʹÓõÄÊDZ»Ð®ÖƵÄÐéÄâ»úºÍЧÀÍÆ÷£¬£¬£¬£¬Ëü½öÓÃ5000¶à¸ö»úеÈ˾ÍÄÜÿÃëÌìÉú2600Íò¸öHTTPSÇëÇ󡣡£¡£¡£¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔÃÀ¹ú(20%)ºÍ¶íÂÞ˹(15%)£¬£¬£¬£¬Æä´ÎÊÇÍÁ¶úÆä¡¢·¨¹úºÍ²¨À¼µÈ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mantis-botnet-behind-the-record-breaking-ddos-attack-in-june/


4¡¢Netwrix AuditorÖб£´æ¿ÉÓÃÀ´Ö´ÐÐí§Òâ´úÂëµÄÎó²î

      

¾Ý7ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬Bishop FoxµÄÔÚNetwrix AuditorÈí¼þÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÊÜÓ°ÏìµÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Netwrix AuditorÊÇÒ»¿îÔÊÐí×éÖ¯¼à¿ØÆäIT»ù´¡ÉèÊ©µÄÉó¼ÆÈí¼þ£¬£¬£¬£¬±»È«ÇòÓÐÁè¼Ý11000¸ö×é֯ʹÓᣡ£¡£¡£¡£ÕâÊÇÒ»¸ö²»Çå¾²µÄ¹¤¾ß·´ÐòÁл¯Îó²î£¬£¬£¬£¬»ù´¡Ôµ¹ÊÔ­ÓÉÊDZ£´æÒ»¸ö²»Çå¾²µÄ.NETÔ¶³Ì´¦Öóͷ£Ð§ÀÍ£¬£¬£¬£¬¿ÉÔÚNetwrixЧÀÍÆ÷ÉϵÄTCP¶Ë¿Ú9004ÉÏ»á¼û£¬£¬£¬£¬Äܱ»ÓÃÀ´ÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÓÉÓÚ¸ÃÏÂÁîÊÇÒÔNT AUTHORITY/SYSTEMȨÏÞÖ´Ðе쬣¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÍêÈ«¿ØÖÆNetwrixЧÀÍÆ÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Îó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/133310/hacking/netwrix-auditor-flaw.html 


5¡¢Unit 42͸¶Õë¶ÔElastix VoIPϵͳµÄ¹¥»÷»î¶¯µÄϸ½Ú

      

7ÔÂ15ÈÕ£¬£¬£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»³¡Õë¶ÔElastix VoIPµç»°Ð§ÀÍÆ÷µÄ´ó¹æÄ£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£ElastixÊÇͳһͨѶµÄЧÀÍÆ÷Èí¼þ£¬£¬£¬£¬ÓÃÓÚFreePBXµÄDigiumµç»°Ä £¿£¿£¿£¿é¡£¡£¡£¡£¡£¹¥»÷»î¶¯×îÏÈ×Ô2021Äê12Ô£¬£¬£¬£¬ÖÁ2022Äê3ÔÂÑо¿Ö°Ô±ÒÑ·¢Ã÷ÁËÁè¼Ý50Íò¸ö¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬¹¥»÷Õß»áͨ¹ýÔÚÄ¿µÄµÄDigiumÈí¼þÖÐÏÂÔØºÍÖ´ÐÐÌØÁíÍâpayload£¬£¬£¬£¬Ö²ÈëÒ»¸öweb shellÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¾Íʱ¼äÏß¶øÑÔ£¬£¬£¬£¬Web shellËÆºõÓëRest Phone Apps(restapps)Ä £¿£¿£¿£¿éÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-45461£©Ïà¹Ø¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/digium-phones-web-shell/


6¡¢Wordfence³Æ´ó¹æÄ£¹¥»÷»î¶¯ÒÑɨÃè160Íò¸öWPÍøÕ¾

      

¾ÝýÌå7ÔÂ15Èճƣ¬£¬£¬£¬WordfenceÑо¿Ö°Ô±¼ì²âµ½ÁËÒ»³¡´ó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬ÒѾ­É¨ÃèÁ˽ü160Íò¸öWordPressÍøÕ¾¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ÒªÕë¶ÔKaswara Modern WPBakeryÒ³ÃæÌìÉúÆ÷£¬£¬£¬£¬¸Ã²å¼þÒѱ»Æä¿ª·¢Õß·ÅÆú¡£¡£¡£¡£¡£¾ÝWordfenceÒ£²âÊý¾Ý£¬£¬£¬£¬¹¥»÷´Ó7ÔÂ4ÈÕ×îÏÈ£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬Æ½¾ùÌìÌìÓÐ443868´Î¹¥»÷ʵÑé¡£¡£¡£¡£¡£¹¥»÷Õß»áÏò¡°wp-admin/admin-ajax/php¡±·¢ËÍPOSTÇëÇ󣬣¬£¬£¬²¢Ê¹Óòå¼þµÄ¡°uploadFontIcon¡±AJAXº¯ÊýÉÏ´«°üÀ¨PHPÎļþµÄ¶ñÒâZIP payload¡£¡£¡£¡£¡£ÕâЩ¹¥»÷À´×Ô10215¸ö²î±ðµÄIPµØµã£¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦É¾³ý¸Ã²å¼þ£¬£¬£¬£¬²¢×èÖ¹¹¥»÷ÕßʹÓõÄIPµØµã¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/attackers-scan-16-million-wordpress-sites-for-vulnerable-plugin/