ÃÀ¹úÒѲé·âNOBELIUMÔÚÕë¶ÔUSAIDµÄ¹¥»÷ÖÐʹÓõÄÓòÃû£»ºÚ¿ÍÒÔ35ÍòÃÀÔªµÄÆðÅļ۸ñ³öÊÛDDoS-GuardµÄÔ´´úÂë
Ðû²¼Ê±¼ä 2021-06-031.ÃÀ¹úÒѲé·âNOBELIUMÔÚÕë¶ÔUSAIDµÄ¹¥»÷ÖÐʹÓõÄÓòÃû
ÃÀ¹ú˾·¨²¿ÒѲé·âNOBELIUMÔÚÕë¶ÔÃÀ¹ú¹ú¼Ê¿ª·¢Êð (USAID) µÄ¹¥»÷ÖÐʹÓõÄÓòÃû¡£Î¢ÈíÓÚÉÏÖÜËÄÊ×´ÎÅû¶Á˴˴εöÓã¹¥»÷£¬Á¥ÊôÓÚ¶íÂÞ˹Ç鱨»ú¹¹SVRµÄNOBELIUM£¨ÓÖÃûAPT29£©Ã°³äUSAID£¬ Ïò150 ¶à¸ö×éÖ¯·¢ËÍÁË3000¶à·âµöÓãÓʼþ¡£´Ë´Î²é·âµÄÁ½¸öÓòÃû·Ö±ðΪtheyardservice[.]comºÍworldhomeoutlet[.]com£¬Ö÷ÒªÓÃÓÚ½ÓÊÕ´ÓÊܺ¦ÕßÄÇÀï鶵ÄÊý¾Ý£¬²¢·¢ËÍÃüÁî¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-seizes-domains-used-by-apt29-in-recent-usaid-phishing-attacks/
2.ºÚ¿ÍÒÔ35ÍòÃÀÔªµÄÆðÅļ۸ñ³öÊÛDDoS-GuardµÄÔ´´úÂë
Group-IB·¢ÏÖºÚ¿ÍÔÚ°µÍø³öÊÛDDoS-GuardµÄÊý¾Ý¿â¡£DDoS-GuardÊǶíÂÞ˹µÄÒ»¼ÒÔÚÏß»ù´¡ÉèÊ©·þÎñÌṩÉÌ£¬ÔøÔÚ½ñÄê1ÔÂ×ÊÖú±»AWSƽ̨¾Ü¾øµÄÉç½»Ó¦ÓÃParlerÖØÐÂÉÏÏß¡£ºÚ¿ÍÓÚ5ÔÂ26ÈÕÔÚºÚ¿ÍÂÛ̳exploit[.]in³öÊÛ¸ÃÊý¾Ý¿â£¬³Æ°üÂÞDDoS-Guard¿Í»§µÄÐÅÏ¢£¬ÈçÐÕÃû¡¢IP µØÖ·ºÍ¸¶¿îÐÅÏ¢µÈ£¬ÒÔ¼°DDoS-Guard »ù´¡ÉèÊ©µÄÔ´´úÂë¡£×î³õµÄÆðÅļÛΪ50ÍòÃÀÔª£¬ºóÓÖ½µÎª35ÍòÃÀÔª¡£
ÔÎÄÁ´½Ó£º
https://www.group-ib.com/media/ddos-guard-database/
3.Ñо¿ÈËÔ±¼ì²âµ½ÀûÓÃFancyProductDesignerÖÐ0dayµÄ¹¥»÷
WordfenceÑо¿ÈËÔ±¼ì²âµ½ÀûÓÃFancy Product Designer²å¼þÖÐ0dayµÄ¹¥»÷»î¶¯¡£¸ÃÓ¦ÓÃÊÇWordPress¡¢WooCommerceºÍShopifyµÄ¿ÉÊÓ»¯²úÎïÅäÖòå¼þ£¬ÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄͼÐκÍÄÚÈÝ×Ô½ç˵²úÎï¡£¸Ã©¶´ÊÇÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬¿ÉÓÃÀ´Èƹý×èÖ¹¶ñÒâÎļþÉÏ´«µÄÄÚÖüì²éÔÚÍøÕ¾ÉÏÖ´ÐÐPHPÎļþ¡£Ñо¿ÈËÔ±³Æ´Ë´Î¹¥»÷»î¶¯ÓÚ2021Äê1ÔÂ30ÈÕ¿ªÊ¼£¬ºÚ¿ÍÒÔµçÉÌÍøվΪĿ±ê£¬ÊÔͼÇÔÈ¡ÆäÊý¾Ý¿âÖеĶ©µ¥ÐÅÏ¢£¬½¨ÒéÓû§Á¢¼´°²×°6ÔÂ2ÈÕÐû²¼µÄ²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-wordpress-plugin-zero-day-under-active-exploitation/
4.ÈÕ±¾¸»Ê¿½ºÆ¬¹«Ë¾FujiFilm³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷
ÈÕ±¾¸»Ê¿½ºÆ¬¹«Ë¾£¨FujiFilm£©³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬ÓʼþºÍµç»°ÏµÍ³Öжϡ£FujiFilm×î³õÒÔ¹âѧ½ºÆ¬ºÍÏà»úΪÖ÷£¬ºóÓÖÉæ¼°Ò©Æ·¡¢´æ´¢É豸¡¢¸´Ó¡»úºÍ´òÓ¡»ú (XEROX) ÒÔ¼°ÊýÂëÏà»úµÈ²úÎ2020ÊÕÈëΪ201ÒÚÃÀÔª¡£¸Ã¹«Ë¾³Æ¹¥»÷·¢ÉúÔÚ6ÔÂ1ÈÕÍíÉÏ£¬Ö®ºóÁ¢¼´Ðµ÷È«ÇòµÄ·Ö¹«Ë¾²¢¹Ø±ÕÁËËùÓÐÊÜÓ°Ïìϵͳ¡£FUJIFILM²¢Î´Ö¸³öÀÕË÷ÍÅ»ïµÄÃû³Æ£¬µ«Advanced IntelÌåÏÖFUJIFILMÓÚ5ÔÂ15ÈÕѬȾÁËQbotľÂí£¬Òò´Ë´Ë´Î¹¥»÷¿ÉÄÜÓëREvilÓйء£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fujifilm-shuts-down-network-after-suspected-ransomware-attack/
5.°×¹¬Ö¤ÊµJBSÔâµ½µÄ¹¥»÷Óë¶íÂÞ˹Óйأ¬±¸·ÝϵͳδÊÜÓ°Ïì
°×¹¬Ö¤ÊµJBSÔÚ5ÔÂ30ÈÕÔâµ½µÄ¹¥»÷Óë¶íÂÞ˹Óйء£´Ë´Î¹¥»÷¶ÔJBSµÄÔËÓª·¢ÉúÁ˾޴óµÄÓ°Ï죬¾Ýͳ¼Æ£¬Å£µÄÍÀÔ×Á¿±ÈÉÏÖÜϽµÁË22%£¬¶øÖíµÄÍÀÔ×Á¿ÔòϽµÁË20%¡£¸Ã¹«Ë¾ÌåÏÖ£¬±¸·Ý·þÎñÆ÷²¢Î´Êܵ½Ó°Ï죬ÆäÕýÔÚÓëµÚÈý·½ºÏ×÷ÒÔ¾¡¿ì»Ö¸´ÊÜÓ°Ïìϵͳ£¬Ô¤¼Æ´ó²¿ÃŹ¤³§ÔÚ6ÔÂ3ÈÕÓ¦¸Ã¿ÉÒÔÔËÐС£Ä¿Ç°£¬FBIÒÑÈ·¶¨´Ë´Î¹¥»÷¿É¹éÒòÓÚREvilÍŻ
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118490/cyber-crime/jbs-attack-russian-origin.html
6.ThreatpostÐû²¼2021ÄêÀÕË÷Èí¼þµÄÑݱäÇ÷ÊƵijÂËß
ThreatpostÐû²¼ÁË2021ÄêÀÕË÷Èí¼þµÄÑݱäÇ÷ÊƵijÂËß¡£ÀÕË÷Èí¼þÊÇÒ»ÖÖÈÕÒæÑÏÖصÄÍþв£¬×î½ü¼¸¸öÔ£¬´ËÀàÍøÂç·¸×ïµÄÅÓ´óÐԺʹ´ÐÂˮƽ²»Í£Ìá¸ß¡£¸Ã³ÂËß´Ó6¸ö·½Ã棺ÀÕË÷Èí¼þµÄÐÂÇ÷ÊÆ¡¢ÀÕË÷Èí¼þ¾¼Ã¸ÅÀ¨¡¢ÀÕË÷Èí¼þ¹¥»÷µÄ³É±¾¡¢ÍøÂç±£ÏÕÖú³¤ÀÕË÷Èí¼þÖ§¸¶¼¤Ôö¡¢48СʱÀÕË÷Èí¼þ¹¥»÷ÈռǺÍÖÆÖ¹ÀÕË÷Èí¼þµÄʵÓÃÖ¸ÄÏ£¬·ÖÎöÁ˽üÆÚÀÕË÷Èí¼þÉú³¤µÄÐÂÇ÷ÊÆ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/