¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý£»ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀÂÕë¶ÔÆóÒµÄÚÍøÖÐ×°±¸

Ðû²¼Ê±¼ä 2020-08-06

1.¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¿¨°Í˹»ù·¢Ã÷ £¬ÒÁÀÊAPT×éÖ¯Oilrig£¨APT34£©Ê¹ÓÃDNS-over-HTTPS£¨DoH£©Ð­Òé´Ó±»ÈëÇÖµÄÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£¿¨°Í˹»ùµÄ¶ñÒâÈí¼þÆÊÎöʦVincente DiazÌåÏÖ £¬Oilrig×îÏÈʹÓÃDNSExfiltrator¾ÙÐй¥»÷ £¬Æä¿ÉÒÔͨ¹ýÍøÂçÊý¾Ý²¢½«ÆäÒþ²ØÔڷDZê׼ЭÒéÖÐ £¬´Ó¶ø½¨ÉèÒþ²ØµÄͨѶͨµÀ £¬OilrigÒ»Ö±ÔÚʹÓÃDNSExfiltratorÔÚÄÚ²¿ÍøÂçÖкáÏòÒÆ¶¯²¢ÍµÈ¡Êý¾Ý¡£OilrigÊÇÊ׸öʹÓÃDoHµÄAPT×éÖ¯ £¬¸Ã×éÖ¯Ô­À´Ò²Éæ×ã¹ý»ùÓÚDNSµÄÉøÍ¸ÊÖÒÕ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iranian-hacker-group-becomes-first-known-apt-to-weaponize-dns-over-https-doh/#ftag=RSSbaffb68    


2.WastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þ¼ì²â


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÀÕË÷Èí¼þWastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þµÄ¼ì²â¡£ÎªÁËÈÆ¹ý·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²â £¬WastedLocker»áʹÓÃÒ»¸öÀú³ÌÀ´·­¿ªÒ»¸öÎļþ £¬²¢½«Æä¶ÁÈ¡µ½Windows Cache ManagerÖÐ £¬È»ºó¹Ø±ÕԭʼÎļþ¡£ÓÉÓÚÊý¾ÝÏÖÔÚ´æ´¢ÔÚWindows»º´æÖÎÀíÆ÷ÖÐ £¬Òò´ËWastedLocker½«¼ÓÃÜ»º´æÖеÄÎļþÄÚÈÝ¡£ÓÉÓÚWindows»º´æÖÎÀíÆ÷×÷ΪϵͳÀú³ÌÔËÐÐ £¬Çå¾²Èí¼þ½«ÒÔΪÕâÊÇÕýµ±µÄWindowsÀú³Ì¼ÓÃÜÊý¾Ý¡£¸ÃÒªÁìÓÐÓõØÈƹýÁËÀÕË÷Èí¼þ±£»¤Ä£¿é £¬²¢ÔÊÐíWastedLocker¼ÓÃÜËùÓÐÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/wastedlocker-ransomware-abuses-windows-feature-to-evade-detection/


3.ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀ £¬Õë¶ÔÆóÒµÄÚÍøÖÐ×°±¸


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÎïÁªÍøÑо¿»ú¹¹ArmisµÄÑо¿Ö°Ô±·¢Ã÷й¥»÷·½·¨EtherOops £¬¸ÃÊÖÒÕʹÓÃÓйÊÕϵÄÒÔÌ«ÍøµçÀ £¬¿ÉÓÃÓÚ¹¥»÷ÆóÒµÄÚ²¿ÍøÂçÖеÄ×°±¸¡£EtherOops»ù±¾ÉÏÊÇÖð°ü¹¥»÷ £¬ÓйÊÕϵĵçÀ£¨ÒªÃ´ÊÇÓÉÓÚ²»ÍêÉÆµÄµçÀ £¬ÒªÃ´ÊÇÓÉÓÚ¶ñÒâ×ÌÈŹ¥»÷£©½«Ôâµ½µç×Ó×ÌÈÅ £¬²¢·­×ªÏÖʵÊý¾Ý°üÖеıÈÌØ £¬Öð²½ÆÆËðÍâ¿Ç £¬Ê¹ÄÚ²¿ÓÐÓøºÔØ´¦ÓÚÔ˶¯×´Ì¬¡£EtherOops¹¥»÷Àֳɺó £¬¿ÉÖ±½Ó´ÓInternetÉøÍ¸ÍøÂç £¬ÉøÍ¸À´×ÔDMZÍø¶ÎµÄÄÚ²¿ÍøÂç £¬²¢ÔÚÄÚ²¿ÍøÂçµÄ¸÷¸ö²¿·ÖÖ®¼äºáÏòÒÆ¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-etheroops-attack-takes-advantage-of-faulty-ethernet-cables/


4.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19¶ÔÈ«ÇòÍøÂç·¸·¨Ó°ÏìµÄ±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹ú¼ÊÐ̾¯×éÖ¯£¨Interpol£©Ðû²¼Á˹ØÓÚCOVID-19¶ÔÈ«ÇòÍøÂç·¸·¨µÄÓ°ÏìµÄ±¨¸æ¡£±¨¸æÌåÏÖ £¬ÀÕË÷Èí¼þLockBitÏÖÔÚ½«ÃÀ¹úÖÐÐÍÆóÒµ×÷ΪÖ÷Òª¹¥»÷Ä¿µÄ¡£±ðµÄ £¬Æ¾Ö¤ËûÃÇµÄÆÊÎö £¬CERBER¡¢NetWalkerºÍRyukÊÇ×î½ü·¢Ã÷µÄ¶¥¼¶ÀÕË÷Èí¼þ¼Ò×å £¬ËûÃÇÒ»Ö±Ò»Ö±Éú³¤ÒÔ×îºéÁ÷ƽµØÌá¸ßµ¥´Î¹¥»÷µÄΣº¦¼°ÊÕÒæ¡£Interpol½¨Ò鹫˾ºÍ×éÖ¯¼á³ÖÆäÈí¼þºÍÓ²¼þΪ×îÐÂ״̬ £¬²¢Ê¹ÓÃÍÑ»ú´æ´¢×°±¸±¸·ÝÆäÊý¾Ý £¬ÒÔ±ÜÃâÀÕË÷Èí¼þ¶ÔÊý¾Ý¾ÙÐлá¼ûºÍ¼ÓÃÜ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/interpol-lockbit-ransomware-attacks-affecting-american-smbs/


5.Check Point±¨¸æ £¬GoogleºÍAmazonΪ´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Check PointÐû²¼ÁËÆ·ÅÆÍøÂç´¹ÂÚ±¨¸æ £¬·¢Ã÷GoogleºÍAmazonÎªÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ¡£ÔÚÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷ÖÐ £¬¹¥»÷Õßͨ¹ýʹÓÃÏàËÆµÄÓòºÍURLÀ´Ã°³ä×ÅÃûÆ·ÅÆµÄ¹Ù·½ÍøÕ¾ £¬Í¨³£»¹»áʹÓÃÓëÔ­Ê¼ÍøÕ¾ÏàËÆµÄÍøÒ³¡£Ñо¿Ö°Ô±·¢Ã÷ £¬¹È¸è£¨13£¥£©ºÍÑÇÂíÑ·£¨13£¥£©Ò»Æð×é³ÉÁׯÃÀ๥»÷µÄËÄ·ÖÖ®Ò»¡£½ÓÏÂÀ´ÊÇWhatsApp£¨9£¥£©ºÍFacebook£¨9£¥£© £¬Æä´ÎÊÇMicrosoft£¨7£¥£©¡¢Outlook£¨3£¥£©¡¢Netflix£¨2£¥£©¡¢Apple£¨2£¥£©¡¢Huawei£¨2£¥£©ºÍPayPal£¨ 2£¥£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/vulnerabilities---threats/google-and-amazon-replace-apple-as-phishers-favorite-brands/d/d-id/1338572?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple


6.NSAÐû²¼Ê¹ÓÃIoT×°±¸ºÍÒÆ¶¯Ó¦ÓÃʱ½µµÍλÖøú×ÙΣº¦µÄÖ¸ÄÏ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)Ðû²¼ÁËÒ»·ÝÖ¸ÄÏ £¬Ö¸µ¼ÈËÃÇÔõÑùÔÚʹÓÃÒÆ¶¯ºÍÎïÁªÍø×°±¸¡¢É罻ýÌåºÍÒÆ¶¯Ó¦ÓóÌÐòʱ¾¡¿ÉÄÜÉÙµØÌ»Â¶Î»ÖÃÐÅÏ¢ £¬¸ÃÖ¸ÄÏÖ÷ÒªÕë¶ÔÖ÷ÒªÊÇÕë¶ÔNSSºÍDoDϵͳÓû§¡£ÖÇÄÜÊÖ»úÇå¾²°åµçÄÔµÈ×°±¸»áʹÓÃGPSºÍÎÞÏßÐźÅÀ´È·¶¨Óû§µÄλÖà £¬½ûÓÃÕâЩ·þÎñ½«´ó´óïÔ̭λÖÃÊý¾Ý̻¶µÄ¿ÉÄÜ¡£±ðµÄ £¬»¹¿ÉÒÔ½ûÓÃÉè±¹ØÁ¬ÄλÖ÷þÎñÉèÖ㻵±²»Ê¹ÓÃ×°±¸Ê±Ê¹Óú½ÐÐģʽ £¬Õâ¿ÉÒÔÈ·±£BTºÍWi-Fi´¦ÓÚ½ûÓÃ״̬£»¾¡¿ÉÄÜÉÙµØÔÊÐíÓ¦ÓóÌÐòµÄȨÏÞ£»×î´óÏ޶ȵؽûÓÃ¹ã¸æÈ¨ÏÞ£»½ûÓÃÔÊÐí¸ú×Ùɥʧ¡¢±»µÁ»òɥʧװ±¸µÄÉèÖã»Ê¹ÓÃÄäÃûÐéÄâרÓÃÍø(VPN)×ÊÖúÒþ²ØÎ»Ö㻾¡¿ÉÄÜïÔÌ­´æ´¢ÔÚÔÆÖеÄλÖÃÐÅÏ¢µÄÊýÄ¿¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nsa-offers-advice-on-how-to-reduce-location-tracking-risks/