΢Èí·¢Ã÷³¯Ïʹ¥»÷ÕßʹÓÃH0lyGh0st¹¥»÷ÖÐСÐÍÆóÒµ

Ðû²¼Ê±¼ä 2022-07-18
1¡¢Î¢Èí·¢Ã÷³¯Ïʹ¥»÷ÕßʹÓÃH0lyGh0st¹¥»÷ÖÐСÐÍÆóÒµ

      

7ÔÂ14ÈÕ £¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æÆÊÎöÁ˳¯ÏÊDEV-0530£¨×Ô³ÆÎªH0lyGh0st£©µÄ¹¥»÷Õ½ÂÔÒÔ¼°ÆäÀÕË÷Èí¼þµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£×Ô2021Äê6ÔÂÒÔÀ´ £¬£¬£¬£¬¸ÃÍÅ»ïÒ»Ö±ÔÚ¿ª·¢ºÍʹÓÃÀÕË÷Èí¼þ¾ÙÐй¥»÷ £¬£¬£¬£¬²¢ÔçÔÚ2021Äê9Ô¾ÍÀÖ³ÉÈëÇÖÁ˶à¸ö¹ú¼ÒµÄСÐÍÆóÒµ¡£¡£¡£¡£Ñо¿Ö°Ô±½«¸ÃÍÅ»ïµÄÀÕË÷Èí¼þ¹éÀàΪÁ½¸öϵÁУºSiennaPurpleºÍSiennaBlue £¬£¬£¬£¬²¢ÔÚÕâЩϵÁÐÏÂÈ·¶¨ÁËËĸö±äÌ壺BTLC_C.exe¡¢HolyRS.exe¡¢HolyLock.exeºÍBLTC.exe¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/


2¡¢ÃÀ¹úÖÐÇé¾Öǰ¹¤³ÌʦÒòVault 7й¶ÊÂÎñ¶ø±»ÖÎ×ï

      

¾Ý7ÔÂ14ÈÕ±¨µÀ £¬£¬£¬£¬Å¦Ô¼µÄÒ»¸öÁª°îÅãÉóÍÅÐû²¼ £¬£¬£¬£¬ÖÐÑëÇ鱨¾ÖÈí¼þ¹¤³ÌʦÏòά»ù½âÃÜÍøÕ¾(WikiLeaks)й¶´ó×ÚÉñÃØÎļþµÄ×ïÃû½¨Éè¡£¡£¡£¡£ÏÖÄê33ËêµÄJoshua SchulteÃæÁٵľÅÏîÖ¸¿Ø×ïÃû¾ù½¨Éè £¬£¬£¬£¬°üÀ¨²»·¨ÍøÂç¹ú·ÀÐÅÏ¢µÈ¡£¡£¡£¡£Î¬»ù½âÃܽ«ÕâЩÉñÃØÎļþÃüÃûΪ¡°Vault 7¡± £¬£¬£¬£¬²¢ÔÚ2017ÄêÐû²¼ £¬£¬£¬£¬ÕâЩÎļþÏêϸ½ÒÆÆÁËCIAÔõÑùÈëÇÖµçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ó¦Óú͵çÊÓ»úµÈ¡£¡£¡£¡£Î¬»ù½âÃÜ³Æ £¬£¬£¬£¬Vault 7ÊÇÓÐÊ·ÒÔÀ´¹ØÓÚCIAµÄ×î´óÒ»´ÎÉñÃØÎļþÐû²¼¡£¡£¡£¡£¸ß¼¶Ç鱨¹ÙÔ±ÆÕ±éÒÔΪ £¬£¬£¬£¬ÕâÊǶÔÃÀ¹úÌØ¹¤»ú½á¹¹³É¹¥»÷µÄ×î¾ßÆÆËðÐÔµÄйÃÜÊÂÎñÖ®Ò»¡£¡£¡£¡£


https://thehackernews.com/2022/07/former-cia-engineer-convicted-of.html


3¡¢Cloudflare³ÆÆä½üǧÃû¿Í»§Ôâµ½À´×ÔMantisµÄDDoS¹¥»÷ 

      

ýÌå7ÔÂ14ÈÕ±¨µÀ £¬£¬£¬£¬CloudflareÌåÏÖÆäÔÚ6Ô·ݻº½âÁËÀ´×ÔMantisµÄ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£MantisÖ÷ÒªÕë¶ÔITºÍµçÐÅÐÐÒµ(36%)¡¢ÐÂÎÅýÌåºÍ³öÊéÎïÐÐÒµ(15%)¡¢½ðÈÚÐÐÒµ(10%) ºÍÓÎÏ·ÐÐÒµ(12%)µÄʵÌå¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö £¬£¬£¬£¬ÔÚÒÑÍù30ÌìÀï £¬£¬£¬£¬Æä½üǧÃû¿Í»§Ôâµ½ÁË3000¶à´ÎDDoS¹¥»÷¡£¡£¡£¡£ÓëÓÉIoT×°±¸×é³ÉµÄ¹Å°å½©Ê¬ÍøÂç²î±ð £¬£¬£¬£¬MantisʹÓõÄÊDZ»Ð®ÖƵÄÐéÄâ»úºÍЧÀÍÆ÷ £¬£¬£¬£¬Ëü½öÓÃ5000¶à¸ö»úеÈ˾ÍÄÜÿÃëÌìÉú2600Íò¸öHTTPSÇëÇ󡣡£¡£¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔÃÀ¹ú(20%)ºÍ¶íÂÞ˹(15%) £¬£¬£¬£¬Æä´ÎÊÇÍÁ¶úÆä¡¢·¨¹úºÍ²¨À¼µÈ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mantis-botnet-behind-the-record-breaking-ddos-attack-in-june/


4¡¢Netwrix AuditorÖб£´æ¿ÉÓÃÀ´Ö´ÐÐí§Òâ´úÂëµÄÎó²î

      

¾Ý7ÔÂ16ÈÕ±¨µÀ £¬£¬£¬£¬Bishop FoxµÄÔÚNetwrix AuditorÈí¼þÖз¢Ã÷ÁËÒ»¸öÎó²î £¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÊÜÓ°ÏìµÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Netwrix AuditorÊÇÒ»¿îÔÊÐí×éÖ¯¼à¿ØÆäIT»ù´¡ÉèÊ©µÄÉó¼ÆÈí¼þ £¬£¬£¬£¬±»È«ÇòÓÐÁè¼Ý11000¸ö×é֯ʹÓᣡ£¡£¡£ÕâÊÇÒ»¸ö²»Çå¾²µÄ¹¤¾ß·´ÐòÁл¯Îó²î £¬£¬£¬£¬»ù´¡Ôµ¹ÊÔ­ÓÉÊDZ£´æÒ»¸ö²»Çå¾²µÄ.NETÔ¶³Ì´¦Öóͷ£Ð§ÀÍ £¬£¬£¬£¬¿ÉÔÚNetwrixЧÀÍÆ÷ÉϵÄTCP¶Ë¿Ú9004ÉÏ»á¼û £¬£¬£¬£¬Äܱ»ÓÃÀ´ÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬ÓÉÓÚ¸ÃÏÂÁîÊÇÒÔNT AUTHORITY/SYSTEMȨÏÞÖ´ÐÐµÄ £¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÍêÈ«¿ØÖÆNetwrixЧÀÍÆ÷¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬Îó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£


https://securityaffairs.co/wordpress/133310/hacking/netwrix-auditor-flaw.html 


5¡¢Unit 42͸¶Õë¶ÔElastix VoIPϵͳµÄ¹¥»÷»î¶¯µÄϸ½Ú

      

7ÔÂ15ÈÕ £¬£¬£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»³¡Õë¶ÔElastix VoIPµç»°Ð§ÀÍÆ÷µÄ´ó¹æÄ£»£»£»£»£»£»î¶¯¡£¡£¡£¡£ElastixÊÇͳһͨѶµÄЧÀÍÆ÷Èí¼þ £¬£¬£¬£¬ÓÃÓÚFreePBXµÄDigiumµç»°Ä£¿£¿£¿£¿£¿é¡£¡£¡£¡£¹¥»÷»î¶¯×îÏÈ×Ô2021Äê12Ô £¬£¬£¬£¬ÖÁ2022Äê3ÔÂÑо¿Ö°Ô±ÒÑ·¢Ã÷ÁËÁè¼Ý50Íò¸ö¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬¹¥»÷Õß»áͨ¹ýÔÚÄ¿µÄµÄDigiumÈí¼þÖÐÏÂÔØºÍÖ´ÐÐÌØÁíÍâpayload £¬£¬£¬£¬Ö²ÈëÒ»¸öweb shellÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¾Íʱ¼äÏß¶øÑÔ £¬£¬£¬£¬Web shellËÆºõÓëRest Phone Apps(restapps)Ä£¿£¿£¿£¿£¿éÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-45461£©Ïà¹Ø¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/digium-phones-web-shell/


6¡¢Wordfence³Æ´ó¹æÄ£¹¥»÷»î¶¯ÒÑɨÃè160Íò¸öWPÍøÕ¾

      

¾ÝýÌå7ÔÂ15ÈÕ³Æ £¬£¬£¬£¬WordfenceÑо¿Ö°Ô±¼ì²âµ½ÁËÒ»³¡´ó¹æÄ£¹¥»÷»î¶¯ £¬£¬£¬£¬ÒѾ­É¨ÃèÁ˽ü160Íò¸öWordPressÍøÕ¾¡£¡£¡£¡£¹¥»÷ÕßÖ÷ÒªÕë¶ÔKaswara Modern WPBakeryÒ³ÃæÌìÉúÆ÷ £¬£¬£¬£¬¸Ã²å¼þÒѱ»Æä¿ª·¢Õß·ÅÆú¡£¡£¡£¡£¾ÝWordfenceÒ£²âÊý¾Ý £¬£¬£¬£¬¹¥»÷´Ó7ÔÂ4ÈÕ×îÏÈ £¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖÐ £¬£¬£¬£¬Æ½¾ùÌìÌìÓÐ443868´Î¹¥»÷ʵÑé¡£¡£¡£¡£¹¥»÷Õß»áÏò¡°wp-admin/admin-ajax/php¡±·¢ËÍPOSTÇëÇó £¬£¬£¬£¬²¢Ê¹Óòå¼þµÄ¡°uploadFontIcon¡±AJAXº¯ÊýÉÏ´«°üÀ¨PHPÎļþµÄ¶ñÒâZIP payload¡£¡£¡£¡£ÕâЩ¹¥»÷À´×Ô10215¸ö²î±ðµÄIPµØµã £¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦É¾³ý¸Ã²å¼þ £¬£¬£¬£¬²¢×èÖ¹¹¥»÷ÕßʹÓõÄIPµØµã¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/attackers-scan-16-million-wordpress-sites-for-vulnerable-plugin/