MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß

Ðû²¼Ê±¼ä 2021-10-28

EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷


EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷.png


Äþ¾²¹«Ë¾EmsisoftÔÚ10ÔÂ24ÈÕ¹ûÈ»ÁËÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷¡£½ñÄêÔçЩʱºò£¬Ñо¿ÈËÔ±·¢ÏÖBlackMatterÖдæÔÚÒ»¸ö¿ÉÓÃÓÚ»Ö¸´¼ÓÃÜÎļþ©¶´£¬¶øÇÒËûÃÇÔÚ֮ǰһֱûÓÐ͸¶¸Ã©¶´µÄ´æÔÚ£¬ÒÔ·ÀÖ¹¸ÃÍÅ»ïÐÞ¸´Â©¶´¡£²»ÐÒµÄÊÇ£¬BlackMatterÔÚ9Ôµ׷¢ÏÖ²¢ÐÞ¸´Á˸é¶´£¬Òò´ËÕâ¸ö½âÃÜÆ÷½öÄܽâÃÜ2021Äê7ÔÂÖÐÑ®ÖÁ9ÔÂÏÂѮ֮¼ä±»¼ÓÃܵÄÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123736/security/blackmatter-decryptor-pat-victims.html



DiscourseÐÞ¸´Ô¶³Ì´úÂëÖ´ÐЩ¶´CVE-2021-41163


DiscourseÐÞ¸´Ô¶³Ì´úÂëÖ´ÐЩ¶´CVE-2021-41163.png


DiscourseÔÚ10ÔÂ21ÈÕÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´CVE-2021-41163¡£DiscourseÊÇ¿ªÔ´µÄÂÛ̳ÌÖÂÛÆ½Ì¨£¬¸Ã©¶´µÄCVSSÆÀ·ÖΪ10£¬¹¥»÷Õß¿ÉÀûÓÃÌØÖÆµÄÇëÇóÀ´Ô¶³ÌÖ´ÐдúÂ롣©¶´ÊÇÓÉÓÚsubscribe_urlֵȱ·¦ÑéÖ¤µ¼ÖµÄ£¬Ä¿Ç°ÒÑÐû²¼²¹¶¡£»Èç¹û²»°²×°²¹¶¡£¬¿ÉÒÔͨ¹ýÔÚÉÏÓÎÊðÀí×èÖ¹ÒÔ/webhooks/aws¿ªÍ·µÄ·¾¶µÄÇëÇóÀ´»º½â©¶´¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/10/24/critical-rce-vulnerability-discourse



Ñо¿ÈËÔ±ÔÚº«¹ú·¢ÏÖͨ¹ýÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯


Ñо¿ÈËÔ±ÔÚº«¹ú·¢ÏÖͨ¹ýÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯.png


10ÔÂ21ÈÕ£¬ASECµÄÑо¿ÈËÔ±·¢ÏÖÕë¶Ôº«¹úÀûÓÃÍøÂçÓ²Å̺ÍÖÖ×Ó·Ö·¢RATµÄ»î¶¯¡£¹¥»÷ÕßÊ×ÏȽ«njRATºÍUDP RATµÈ¶ñÒâÈí¼þ·â×°ÔÚÒ»¸öÓÎÏ·°üÖУ¬È»ºó½«ËüÃÇÉÏ´«µ½º«¹úµÄÔÚÏß´æ´¢·þÎñwebhardsÖС£Ä¿±êÏÂÔØ²¢½âѹZIP¸ñʽµÄÓÎÏ·ºó»áµÃµ½Ò»¸ögame.exe£¬ÔËÐиÃÎļþÖ®ºó»á°²×°Ò»¸öRAT²¢´æÈëλÓÚC:\ProgramFiles\4.0389µÄÎļþ¼ÐÖУ¬Í¬Ê±»¹»á´´½¨Ò»¸öеÄGame.exeÀ´ÔËÐÐÓÎÏ·¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/rat-malware-spreading-in-korea-through-webhards-and-torrents/


¹¥»÷ÍÅ»ïÀûÓüƷÑÓ¦ÓÃBillQuick·Ö·¢ÀÕË÷Èí¼þ


¹¥»÷ÍÅ»ïÀûÓüƷÑÓ¦ÓÃBillQuick·Ö·¢ÀÕË÷Èí¼þ.png


Huntress ThreatOpsÍŶӷ¢ÏÖ¼ÆÊ±¼Æ·ÑÓ¦ÓÃBillQuick´æÔÚSQL×¢Èë©¶´CVE-2021-42258¡£¿ÉÒÔͨ¹ýÔÚÓû§Ãû×Ö¶ÎÖÐʹÓÃÎÞЧ×Ö·û£¨µ¥ÒýºÅ£©µÇ¼ÇëÇóÀ´´¥·¢¸Ã©¶´£¬²¢Ô¶³ÌÖ´ÐдúÂë¡£Ñо¿ÍŶӳÆ£¬ËûÃÇÔÚ2021Äê10ÔÂ8ÈÕÖÁ10ÈÕ·¢ÏÖÁËÀûÓøÃ©¶´·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯£¬´Ë´Î¹¥»÷±³ºóµÄÍÅ»ïÉв»Ã÷È·£¬µ«ÀÕË÷Èí¼þ×Ô2020Äê5ÔÂÒÔÀ´¾ÍÒ»Ö±ÔÚʹÓá£Ä¿Ç°£¬¸Ã©¶´ÒÑÓÚ10ÔÂ7ÈÕÐÞ¸´£¬µ«Ñо¿ÈËÔ±»¹·¢ÏÖÁËBillQuickÖÐµÄÆäËû8¸ö0 day¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/10/hackers-exploited-popular-billquick.html



MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß


MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß.png


MicrosoftÍþвÇ鱨ÖÐÐÄÔÚ10ÔÂ25ÈÕÐû²¼Á˹ØÓÚNOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£NOBELIUMÊÇ2020Äê12ÔÂÕë¶ÔSolarWindsµÄ¹©Ó¦Á´¹¥»÷µÄÄ»ºóºÚÊÖ£¬×Ô2021Äê5ÔÂÒÔÀ´£¬¸ÃÍÅ»ïÔÚÃÀ¹úºÍÅ·ÖÞÌᳫÁËÓÐÕë¶ÔÐԵũӦÁ´¹¥»÷¡£´Ë´Î»î¶¯²¢Î´ÀûÓÃÈκΩ¶´£¬¶øÊÇÀûÓÃÃÜÂëÅçÉä¡¢ÁîÅÆÍµÇÔ¡¢APIÀÄÓúÍÓã²æÊ½ÍøÂçµöÓãµÈ¶àÖÖ¼¼ÊõÀ´ÇÔÌØÈ¨ÕÊ»§µÄƾ¾Ý£¬´Ó¶øÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/



NeustarÐû²¼2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ³ÂËß


NeustarÐû²¼2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ³ÂËß.png


Neustar¹ú¼ÊÄþ¾²Î¯Ô±»á(NISC)Ðû²¼ÁË2021Äê9ÔÂÈ«ÇòÍþÐ²Ì¬ÊÆµÄͳ¼Æ³ÂËß¡£³ÂËßÏÔʾ£¬72%µÄ×éÖ¯ÔÚ¹ýÈ¥12¸öÔÂÄÚÖÁÉÙ¾­Àú¹ýÒ»´ÎDNS¹¥»÷£¬ÆäÖÐ×î³£¼ûµÄDNS¹¥»÷ÀàÐÍDNS½Ù³Ö (47%)¡¢DNSºé·º·´Éä»ò·Å´ó¹¥»÷µÈDDoS¹¥»÷(46%)¡¢DNSËíµÀ(35%)ºÍ»º´æÖж¾(33%)¡£2021Äê7ÔÂÖÁ8Ô£¬DDoSÊÇ×îÊܹØ×¢µÄÎÊÌ⣬Æä´ÎÊÇϵͳÈëÇÖºÍÀÕË÷Èí¼þ¡£


Ô­ÎÄÁ´½Ó£º

https://www.niscicb.com/LatestResults