Akamai DNSÈ«Çò·¶Î§Öжϣ¬SteamºÍAWSµÈÍøÕ¾Ì±»¾£»¶ñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢
Ðû²¼Ê±¼ä 2021-07-23±¾ÖÜËÄAkamai DNSÔÚÈ«Çò·¶Î§ÄÚ·¢Éú·þÎñÖжϣ¬Ó°ÏìÁËSteam¡¢PlayStation Network¡¢AWS¡¢ÑÇÂíÑ·¡¢¹È¸èºÍSalesforceµÈÍøÕ¾¡£¾ÊӲ죬´Ë´ÎÖжÏÊÇÓÉÓÚEdge DNS·þÎñÖеÄÎÊÌâµ¼Öµġ£¸Ã¹«Ë¾ÌåÏÖ£¬ÔÚ7ÔÂ22ÈÕ15:46UTC£¬Ò»´ÎÈí¼þÅäÖøüе¼ÖÂÁËDNSϵͳÖзºÆð´íÎó£¬ÖжÏÁ¬ÐøÁ˳¤´ïÒ»¸öСʱ£¬ÔڻعöÈí¼þÅäÖøüк󣬷þÎñ»Ö¸´ÁËÕý³£ÔËÐС£Akamai³ÆÆä¿ÉÒÔÈ·ÈÏÕâ²»ÊÇÕë¶ÔAkamaiƽ̨µÄÍøÂç¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/akamai-dns-global-outage-takes-down-major-websites-online-services/
2.жñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢
Check PointÑо¿ÈËÔ±Åû¶Ð¶ñÒâÈí¼þXLoader¿ÉÔÚmacOSºÍWindowsÇÔÈ¡µÇ¼ÐÅÏ¢¡£XLoaderÔ´×ÔÕë¶ÔWindowsµÄÐÅÏ¢ÇÔÈ¡·¨Ê½Formbook£¬ÓÚÈ¥Äê2ÔÂÊ״ηºÆð²¢Ô½À´Ô½ÊÜ»¶Ó£¬ÊÇÒ»ÖÖûÓÐÒÀÀµÏîµÄ¿çƽ̨£¨WindowsºÍmacOS£©½©Ê¬ÍøÂç¡£´ËÍ⣬¸Ã¶ñÒâÈí¼þ»¹·Ç³£Á®¼Û£¬macOS°æ±¾½öÊÛ49ÃÀÔª¶øWindows°æ±¾59ÃÀÔª¡£Ñо¿ÈËÔ±³Æ£¬ÔÚ2020Äê12ÔÂ1ÈÕÖÁ2021Äê6ÔÂ1ÈÕÆÚ¼ä£¬¼ì²âµ½ÁËÀ´×Ô69¸ö¹ú¼ÒºÍµØÓòµÄFormbook/XLoaderÇëÇ󣬯äÖдó²¿ÃÅÀ´×ÔÃÀ¹ú (53%)¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/xloader-malware-steals-logins-from-macos-and-windows-systems/
3.·¨¹úANSSIÅû¶APT31ÀûÓüÒͥ·ÓÉÆ÷ÌᳫµÄ¼äµý»î¶¯
·¨¹ú¹ú¼ÒÍøÂçÄþ¾²»ú¹¹ANSSIÅû¶APT31£¨»òZirconium£©ÀûÓüÒͥ·ÓÉÆ÷ÌᳫµÄ¼äµý»î¶¯¡£¸Ã»ú¹¹ÌåÏÖ£¬´Ë´Î¹¥»÷¿ªÊ¼ÓÚ2021Äê³õ£¬¶øÇÒÏÖÔÚÈÔÔÚ½øÐÐÖС£Ôڴ˴λÖУ¬¹¥»÷Õß½Ù³ÖÁ˼Òͥ·ÓÉÆ÷ÒÔÉèÖÃÊÜѬȾÉ豸µÄÊðÀíÍøÂ磬ּÔÚÒþ²ØÆäÕì²ìºÍ¹¥»÷»î¶¯¡£´ËÍ⣬ANSSI»¹Ðû²¼ÁËÕâЩ¹¥»÷µÄÈëÇÖÖ¸±ê(IOC)ÁÐ±í£¬²¢Ðû²¼Á˴˴ι¥»÷Öб»APT31½Ù³ÖµÄ161¸öIPµØÖ·µÄÁÐ±í¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/chinese-hacking-group-apt31-uses-mesh-of-home-routers-to-disguise-attacks/
4.2¸ö¶ñÒâNPM°üÀûÓÃChromePass·¨Ê½´Óä¯ÀÀÆ÷ÇÔȡƾ¾Ý
ReversingLabsÅû¶ÁË2¸ö¶ñÒâNPM°ü£¬¿ÉÒÔÀûÓÃChromePass·¨Ê½´Óä¯ÀÀÆ÷ÇÔȡƾ¾Ý¡£ÕâÁ½¸öNPM°ü·Ö±ðΪnodejs_net_serverºÍtemptesttempfile£¬×ÜÏÂÔØÁ¿ÒÑÁè¼Ý2000´Î¡£ÆäÖÐǰÕß×Ô2019Äê2ÔÂÊ×´ÎÐû²¼ÒÔÀ´£¬ÒѾ¹ýÁË12¸ö°æ±¾£¬Æä¿ª·¢ÕßchrunleeËÆºõÒ²ÊÇGitHubÉϵĻîÔ¾¿ª·¢ÈËÔ±£»¶ûºóÕßµÄÏà¹ØÐÅÏ¢ÔòÉٵöࡣReversingLabsÓÚ7ÔÂ2ÈÕÁªÏµÁËnpmÄþ¾²ÍŶӣ¬ÏÖÔÚÕâÁ½¸öÈí¼þ°ü¶¼Òѱ»É¾³ý¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/npm-package-steals-chrome-passwords/168004/
5.CISAÔÚ±»¹¥»÷µÄPulse SecureÉ豸Öз¢ÏÖ13¸ö¶ñÒâÑù±¾
ÃÀ¹úCISAÐû²¼¾¯±¨£¬³ÆÔÚ±»¹¥»÷µÄPulse SecureÉ豸ÉÏ·¢ÏÖÁË13¸ö¶ñÒâÈí¼þÑù±¾¡£×Ô2020Äê6ÔÂÒÔÀ´£¬ÃÀ¹úÕþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ¸÷ÐÐÒµ¹«Ë¾µÄPulse SecureÉ豸һֱÊǹ¥»÷ÕßµÄÄ¿±ê£¬¹¥»÷ÕßÀûÓöà¸ö©¶´£¨CVE-2019-11510¡¢CVE-2020-8260¡¢CVE-2020-8243ºÍCVE-2021-2289£©ÈëÇÖ²¢°²×°webshell¡£CISAÃãÀøÓû§ºÍ¹ÜÀíÔ±¼ì²ìÕâ13¸ö¶ñÒâÈí¼þµÄ·ÖÎö³ÂËß(MAR)£¬Á˽⹥»÷Õߵļ¼Êõ¡¢¼ÆÄ±ºÍ·¨Ê½(TTP)ÒÔ¼°ÈëÇÖÖ¸±ê(IOC)¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/07/21/malware-targeting-pulse-secure-devices
6.ºÚ¿Íbl4ckt0r³öÊÛÒâ´óÀûTicketClub 34ÍòÓû§ÐÅÏ¢
2021Äê7ÔÂ19ÈÕ£¬ºÚ¿Íbl4ckt0rÔÚºÚ¿ÍÂÛ̳RaidForumsÉϳöÊÛTicketClubÁè¼Ý340957Óû§µÄÐÅÏ¢¡£TicketClubÊÇÒ»¼ÒÒâ´óÀû¹«Ë¾£¬Ö÷ҪΪÏßϹºÎïÌṩÓÅ»Ýȯ£¬ËûÃǵĿͻ§°üÂÞºº±¤Íõ¡¢Âóµ±ÀͺÍRainbow MagiclandµÈ¡£7ÔÂ22ÈÕ£¬¸Ã¹«Ë¾µÄÐí¶àÓû§³ÂËß³ÆÍøÕ¾ÎÞ·¨·ÃÎÊ¡£ÖµµÃÒ»ÌáµÄÊÇ£¬¸Ã¹«Ë¾ÔÚ2020Äê4ÔÂÒ²¾Àú¹ýÀàËÆÊ¼þ£¬µ¼ÖÂ203859·â¿Í»§µÄµç×ÓÓʼþй¶¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/120406/data-breach/ticketclub-italy-data-leak.html