CISA¡¢NSAºÍODNIÐû²¼¹ØÓÚ±£»¤Èí¼þ¹©Ó¦Á´Äþ¾²µÄÖ¸ÄÏ

Ðû²¼Ê±¼ä 2022-09-06
1¡¢CISA¡¢NSAºÍODNIÐû²¼¹ØÓÚ±£»¤Èí¼þ¹©Ó¦Á´Äþ¾²µÄÖ¸ÄÏ

      

9ÔÂ2ÈÕ£¬CISA¡¢¹ú¼ÒÄþ¾²¾Ö(NSA)ºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)Ðû²¼Á˹ØÓÚ±£»¤Èí¼þ¹©Ó¦Á´Äþ¾²µÄÖ¸ÄϵĵÚÒ»²¿ÃÅ£¬¼´±£»¤Èí¼þ¹©Ó¦Á´ÏµÁСª¡ª¿ª·¢ÈËÔ±ÍÆ¼öʵ¼ù¡£¸ÃÖ¸ÄÏÌṩÁËÓйØÈçºÎ¿ª·¢Äþ¾²´úÂë¡¢ÑéÖ¤µÚÈý·½×é¼þ¡¢Ç¿»¯¹¹½¨»·¾³ºÍ½»¸¶´úÂëµÄÏêϸÐÅÏ¢¡£ÔÚËùÓÐDevOps³ÉΪDevSecOps֮ǰ£¬Èí¼þ¿ª·¢ÉúÃüÖÜÆÚÃæÁÙ·çÏÕ¡£±¾ÏµÁеÄÁíÍâÁ½¸ö²¿ÃÅÆ«ÖØÓÚÈí¼þ¹©Ó¦É̺Ϳͻ§¡£CISAÃãÀø×éÖ¯¡¢Èí¼þ¹©Ó¦É̺ÍÍøÂçÔËÓªÉ̼ì²ìÖ¸Äϲ¢¿¼Âǽ¨Òé¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/09/02/cisa-nsa-and-odni-release-part-one-guidance-securing-software


2¡¢Armorblox·¢ÏÖÕë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵ĵöÓã¹¥»÷»î¶¯

      

¾Ý9ÔÂ4ÈÕ±¨µÀ£¬Äþ¾²¹«Ë¾Armorblox·¢ÏÖÁËÕë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵ÄÐÂÒ»ÂÖµöÓã»î¶¯¡£µöÓãÓʼþµÄÖ÷ÌâÊÇ¡°¹ØÓÚÄúµÄÕÊ»§µÄÖØÒªÍ¨Öª¡±£¬´ò¿ªºó»áÓÕʹĿ±êµã»÷¶ñÒ⸽¼þÒÔ¼ì²ìÄþ¾²ÏûÏ¢¡£Ä¿±êµã»÷¶ñÒ⸽¼þºó»á±»Öض¨Ïòµ½Î±ÔìµÄÃÀ¹úÔËͨµÇÂ¼Ò³Ãæ£¬²¢±»ÒªÇóÊäÈëÓû§IDºÍÃÜÂ룬ּÔÚÇÔȡĿ±êµÄPIIÊý¾Ý¡£´ËÍ⣬¸Ã¹¥»÷ÈÆ¹ýÁ˵±µØGoogle Workspaceµç×ÓÓʼþÄþ¾²¿ØÖÆ£¬ÒòΪËüͨ¹ýÁËDKIMºÍSPFµç×ÓÓʼþÉí·ÝÑéÖ¤¡£


https://securityaffairs.co/wordpress/135292/hacking/phishing-scam-targets-american-express.html


3¡¢DESORDENÈëÇÖÓ¡Äṫ˾BOGA GroupÇÔÈ¡ÊýÊ®ÍòÌõ¼Ç¼

      

¾ÝýÌå9ÔÂ2ÈÕ±¨µÀ£¬ºÚ¿ÍÍŻ﹥»÷ÁËÓ¡¶ÈÄáÎ÷ÑǵÄÒ»¼Ò´óÐÍÆóÒµBOGA Group¡£¸Ã¹«Ë¾ÔÚÓ¡¶ÈÄáÎ÷ÑǺÍÂíÀ´Î÷ÑǾ­Óª×ÅÁè¼Ý200¼Ò²ÍÌüºÍ°ÂÌØÀ³Ë¹¡£¹¥»÷ÕßÉù³Æ£¬ÎªÁËÖ¤Ã÷ÒÑÈëÇָù«Ë¾µÄ·þÎñÆ÷£¬ÆäÔÚÏÂÔØÊý¾Ýºó»¹ÔÚ·þÎñÆ÷ÉÏɾ³ýÁËÕâЩÊý¾Ý¡£´Ë´Î¹¥»÷ÇÔÈ¡ÁËÁè¼Ý31 GBµÄÊý¾ÝºÍÎļþ£¬°üÂÞ409168Ìõ¿Í»§ÐÅÏ¢£¨ÐÕÃû¡¢µç»°ºÍµç×ÓÓʼþ£©¡¢16476ÌõÔ±¹¤ÒÔ¼°²ÆÕþºÍ¹«Ë¾Êý¾Ý¡£DESORDEN»¹ÌåÏÖ£¬ËûÃÇÔ¤¼Æ»á¶Ôº«¹ú¡¢Öйų́Íå¡¢Ô½ÄϺÍÈÕ±¾½øÐиü¶à¹¥»÷£¬²¢¶ÔÌ©¹úµÄÊý¾Ý¸ÐÐËȤ¡£


https://www.databreaches.net/customer-data-from-hundreds-of-indonesian-and-malaysian-restaurants-hacked-by-desorden/


4¡¢ZscalerÔÚPrynt StealerÖз¢ÏÖ»ùÓÚTelegramµÄºóÃÅ

      

ZscalerÔÚ9ÔÂ1ÈÕÐû²¼Á˹ØÓÚPrynt StealerµÄ·ÖÎö³ÂËß¡£Prynt StealerÊÇÒ»¸öÏà¶Ô½ÏеÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼Ò×壬ÓÉ.NET±àд¡£ËüÓë¶ñÒâÈí¼þ¼Ò×åWorldWindºÍDarkEye·Ç³£ÏàËÆ£¬Õâ±íÃ÷ËüÃÇ¿ÉÄÜÓÉͬһ¿ª·¢Õß¿ª·¢¡£Ñо¿·ÖÎö±íÃ÷£¬Æä´úÂë¿âÔ´×ÔÁíÍâÁ½¸ö¿ªÔ´¶ñÒâÈí¼þAsyncRATºÍStormKitty£¬²¢Ìí¼ÓÁËй¦Ð§£¬°üÂÞÒ»¸öºóÃÅTelegram channel£¬ÓÃÓÚÊÕ¼¯ÆäËû¹¥»÷ÕßÇÔÈ¡µÄÐÅÏ¢¡£¸Ã¶ñÒâÈí¼þÒÔ100ÃÀÔª/Ô¡¢700ÃÀÔª/Äê»ò900ÃÀÔªÖÕÉí¶©Ôĵļ۸ñ³öÊÛ¡£


https://www.zscaler.com/blogs/security-research/no-honor-among-thieves-prynt-stealers-backdoor-exposed


5¡¢UptycsÅû¶һ¸öËÆºõÈÔÔÚ¿ª·¢ÖеÄÐÂLinuxÀÕË÷Èí¼þ 

      

9ÔÂ1ÈÕ£¬UptycsÅû¶ÁËÒ»¸ö¿ÉÖ´ÐкͿÉÁ´½Ó¸ñʽ(ELF) ÀÕË÷Èí¼þ£¬Ëüƾ¾Ý¸ø¶¨µÄÎļþ¼Ð·¾¶¼ÓÃÜLinuxϵͳÖеÄÎļþ¡£¹¥»÷ÕßÁôϵÄREADMEÓëÀÕË÷Èí¼þDarkAngelsµÄREADMEÍêÈ«ÎǺÏ¡£Ñо¿ÈËÔ±·¢ÏÖELFÎļþ×Ô¼ºÊÇеÄ£¬µ«¶þ½øÖÆÎļþÖеÄOnionÁ´½ÓËÆºõÒѹرÕ£¬Õâ±íÃ÷Õâ¸öеÄÀÕË÷Èí¼þ¿ÉÄÜÈÔÔÚ¿ª·¢ÖС£´ËÍ⣬¶þ½øÖÆÎļþʹÓÃpthread_createº¯ÊýÀ´´´½¨ÐÂỊ̈߳¬¹¥»÷Õß¼ÓÃÜÎļþºóÌí¼ÓµÄÀ©Õ¹ÃûÊÇ.crypted¡£


https://www.uptycs.com/blog/another-ransomware-for-linux-likely-in-development


6¡¢QNAPÐû²¼¸üУ¬ÐÞ¸´±»ÀÕË÷Èí¼þDeadboltÀûÓõÄ©¶´

      

¾ÝýÌå9ÔÂ5ÈÕ±¨µÀ£¬QNAP¼ì²âµ½DeadboltÀûÓÃPhoto StationÖЩ¶´µÄÀÕË÷¹¥»÷»î¶¯¡£¹¥»÷´ÓÉÏ´ÓÖÜÁù¿ªÊ¼£¬¸Ã¹«Ë¾ÔÚ·¢ÏÖ¹¥»÷ºóµÄ12СʱÄÚÐû²¼Á˲¹¶¡£¬µ«¹¥»÷ĿǰÈÔÔÚ¼ÌÐø¡£¹¥»÷µÄ·¶Î§ºÜ¹ã£¬ÖÜÁùºÍÖÜÈÕÌá½»µÄID Ransomware·þÎñ¼¤Ôö¡£¸Ã¹«Ë¾¶Ø´ÙNAS¿Í»§Á¢¼´½«Photo Station¸üе½×îа汾£¬½¨ÒéÓû§ÓÃQuMagieÌæ»»Photo Station£¬²¢Ç¿ÁÒ½¨ÒéÓû§²»Òª½«QNAP NASÖ±½ÓÁ¬½Óµ½»¥ÁªÍøÉÏ¡£×Ô2022Äê1ÔÂÒÔÀ´£¬DeadBoltÒ»Ö±ÔÚ¹¥»÷NASÉ豸¡£


https://www.bleepingcomputer.com/news/security/qnap-patches-zero-day-used-in-new-deadbolt-ransomware-attacks/