Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú

Ðû²¼Ê±¼ä 2022-03-02

Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ £¬£¬£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú


ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼ £¬£¬£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ×îÏÈ £¬£¬£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£¡£´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÆäÖ÷ÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ £¬£¬£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£¾ÝÔ¤¼Æ £¬£¬£¬´Ë´ÎÊÂÎñ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5% £¬£¬£¬Ô¼ºÏ13000Á¾Æû³µ¡£¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú £¬£¬£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄÏêϸӰÏì¡£¡£ÏÖÔÚ £¬£¬£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖÐÖ¹»áÒ»Á¬¶à¾Ã¡£¡£


https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/


°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓÐЧÀÍÖÐÖ¹


¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ £¬£¬£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂç £¬£¬£¬²¢¹Ø±ÕËùÓÐЧÀÍ¡£¡£ÏÖÔÚ £¬£¬£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨»á¼û £¬£¬£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½ £¬£¬£¬Õâ¶ÔÁгµµÄÔËÓª±¬·¢Á˼«´óµÄÓ°Ïì¡£¡£¼¸ÈÕǰ £¬£¬£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr £¬£¬£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£¡£


https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html


Ñо¿ÍŶӷ¢Ã÷Õë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯


¾Ý2ÔÂ24Èյı¨µÀ £¬£¬£¬Bitdefender·¢Ã÷Á˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯¡£¡£¸Ã»î¶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ £¬£¬£¬ÒÔÕË»§¶³½áΪÓÕ¶ü £¬£¬£¬ÓÕʹĿµÄµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄ´¹ÂÚÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂë £¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÒøÐÐÕË»§ÖеÄÓà¶î¡£¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý £¬£¬£¬´ó²¿·Ö´¹ÂÚÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£© £¬£¬£¬Æä´ÎΪӢ¹ú£¨7%£©£»£»£»£»´ó²¿·ÖÓʼþÀ´×ÔÃÀ¹úµÄIPµØµã£¨40%£© £¬£¬£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£¡£


https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/


Ñо¿Ö°Ô±¹ûÕæÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄ̸Ìì¼Í¼


2ÔÂ27ÈÕ±¨µÀ³Æ £¬£¬£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõ̸Ìì¼Í¼¹ûÕæ¡£¡£¾ÝϤ £¬£¬£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿Ö°Ô±Ð¹Â¶µÄ £¬£¬£¬Ëû¿ÉÒÔ»á¼ûContiµÄXMPP̸ÌìЧÀÍÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë £¬£¬£¬×ܹ²ÓÐ393¸öJSONÎļþ £¬£¬£¬°üÀ¨2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÐÂÎÅ¡£¡£ÕâЩ¼ÍÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖֻµÄÐÅÏ¢ £¬£¬£¬°üÀ¨ÒÔǰδ¹ûÕæµÄ±»¹¥»÷Ä¿µÄ¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØµãÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£¡£


https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/


CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ


2ÔÂ24ÈÕ £¬£¬£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð £¬£¬£¬ÒѸüÐÂÁËÆß´Î¡£¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ £¬£¬£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ £¬£¬£¬Í¨¹ýÍøÂç´¹ÂÚµç×ÓÓʼþ½øÈëÄ¿µÄϵͳ¡£¡£ÆäÁ¬ÏµÁËÇÔÈ¡³ÌÐò¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§ £¬£¬£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨѶ £¬£¬£¬Ö§³ÖTorÍøÂç £¬£¬£¬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots £¬£¬£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£¡£


https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/


Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄÆÊÎö±¨¸æ


¾Ý2ÔÂ27ÈÕ±¨µÀ £¬£¬£¬Intel 471Åû¶Á˰´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд £¬£¬£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨѶÀ´¼ìË÷¶ñÒâpayloadµÄURL £¬£¬£¬²¢×°ÖÃÔÚÄ¿µÄÖ÷»úÉÏ £¬£¬£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢ £¬£¬£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£¡£Í¨³£ÒÀÀµ¾­ÓÉSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾¾ÙÐзַ¢ £¬£¬£¬¿É×°Öò¢Ö´ÐжàÖÖ¶ñÒâpayload £¬£¬£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£¡£


https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/




Çå¾²¹¤¾ß


DRAKVUF Sandbox


×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þÆÊÎöϵͳ £¬£¬£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ £¬£¬£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£¡£


https://github.com/CERT-Polska/drakvuf-sandbox


StayKit


Cobalt Strike ³¤ÆÚÐÔµÄÀ©Õ¹ £¬£¬£¬ËüʹÓà SharpStay .NET ³ÌÐò¼¯µÄ execute_assembly º¯Êý¡£¡£


https://github.com/0xthirteen/StayKit


Fennec


Óà Rust ±àдµÄ¹¤¼þÍøÂ繤¾ß £¬£¬£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄÊÂÎñÏìӦʱ´úʹÓᣡ£


https://github.com/AbdulRhmanAlfaifi/Fennec


request smuggler


Http ÇëÇó×ß˽Îó²îɨÃèÆ÷ £¬£¬£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽Îó²î¹¥»÷µÄЧÀÍÆ÷¡£¡£


https://github.com/Sh1Yo/request_smuggler


Shellcode Template


ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£¡£


https://github.com/Cracked5pider/ShellcodeTemplate




Çå¾²ÆÊÎö


CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/


ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â


https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/


ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã


https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/


΢ÈíÐû²¼ÔÚ Windows 11 ÖоÙÐÐÐ嵀 Windows ¸üÐÂË¢ÐÂ


https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml