Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ

Ðû²¼Ê±¼ä 2021-11-10

Robinhoodƽ̨³ÆÒòÔâµ½¹¥»÷700Íò¿Í»§ÐÅϢй¶


Robinhoodƽ̨³ÆÒòÔâµ½¹¥»÷700Íò¿Í»§ÐÅϢй¶.png


¹ÉƱÉúÒâÆ½Ì¨RobinhoodÔÚ11ÔÂ8ÈÕÐû²¼Í¨¸æ £¬Éù³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¹¥»÷±¬·¢ÔÚ11ÔÂ3ÈÕ £¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¹¥»÷»ñµÃÁ˿ͻ§Ö§³ÖϵͳµÄ»á¼ûȨÏÞ £¬¿ÉÄÜÒѾ­»á¼ûÁËÔ¼700Íò¿Í»§µÄÊý¾Ý £¬Éæ¼°ÐÕÃû¡¢ÓʼþµØµã¡¢³öÉúÈÕÆÚºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£±ðµÄ £¬RobinHoodÌåÏÖËûÃÇ»¹Ôâµ½ÁËÀÕË÷ £¬µ«²¢Î´ÌṩÓйØÀÕË÷ÒªÇóµÄϸ½ÚÐÅÏ¢¡£ÏÖÔÚ £¬¸Ã¹«Ë¾ÕýÔÚÇå¾²¹«Ë¾MandiantµÄЭÖú϶ԴËÊÂÕö¿ªÊӲ졣


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/


¶à¹úÖ´·¨²¿·ÖÕö¿ªµÄCycloneÐж¯Àֳɹ¥»÷ClopÍÅ»ï


¶à¹úÖ´·¨²¿·ÖÕö¿ªµÄCycloneÐж¯Àֳɹ¥»÷ClopÍÅ»ï.png


ÉÏÖÜÎå £¬Ïà¹Ø²¿·Ö¹ûÕæÁ˹ØÓÚCycloneÐж¯µÄ×îÐÂÐÂÎÅ¡£ÕâÊÇΪÆÚ30¸öÔµĹú¼ÊÖ´·¨Ðж¯ £¬Óɹú¼ÊÐ̾¯×é֯Эµ÷ £¬²¢ÍŽáÁËÎÚ¿ËÀ¼ºÍÃÀ¹úÖ´·¨²¿·Ö¡£Ðж¯µÄÖ÷ҪĿµÄÊÇClop £¬ËüÔø¶à´Î¹¥»÷Á˺«¹úµÄ¹«Ë¾ºÍÃÀ¹úµÄѧÊõ»ú¹¹¡£CycloneÐж¯»ñµÃÁËCDI¡¢Kaspersky¡¢FortinetºÍGroup-IBµÈ¹«Ë¾µÄ×ÊÖú £¬ÔÚÎÚ¿ËÀ¼¾Ð²¶ÁË6ÃûÏÓÒÉÈË £¬²¢Ã»ÊÕÁË185000ÃÀÔªµÄÏÖ½ð¡£ÈôÊÇ×ïÃû½¨Éè £¬Õâ6¸öÏÓÒÉÈ˽«ÃæÁÙ×î¸ß°ËÄêµÄî¿Ïµ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/operation-cyclone-deals-blow-to-clop-ransomware-operation/


unit42Åû¶ʹÓÃÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú


unit42Åû¶ʹÓÃÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú.png


unit42ÔÚ11ÔÂ7ÈÕÅû¶ÁËʹÓÃManageEngine ADSelfService PlusÖÐÎó²îCVE-2021-40539µÄ¹¥»÷ϸ½Ú¡£9ÔÂ16ÈÕ £¬CISAÔøÐû²¼¾¯±¨³ÆAPT×éÖ¯ÕýÔÚʹÓøÃÎó²î¹¥»÷Êý°Ù¸öÒ×Êܹ¥»÷µÄ×éÖ¯¡£¹¥»÷×îÏÈÓÚ9ÔÂ22ÈÕ £¬Õë¶ÔÈ«Çò¹æÄ£ÄڵĹú·À¡¢Ò½ÁƱ£½¡¡¢ÄÜÔ´ºÍ½ÌÓýÐÐÒµµÈÖÁÉÙÓоŸöÐÐÒµ¡£ÔÚÎó²îʹÓÃÀÖ³ÉÖ®ºó £¬¹¥»÷Õß»á×°ÖÃGodzilla webshell¡£ÏÖÔÚ £¬Éв»ÇåÎúÔ˶¯±³ºóµÄ¹¥»÷ÍÅ»ï £¬µ«»òÐíÓëAPT27£¨Emissary Panda£©Óйء£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/


DetectifyÐÂÑо¿·¢Ã÷SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢


DetectifyÐÂÑо¿·¢Ã÷SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢.png


Detectify 11ÔÂ4ÈÕµÄ×îÐÂÑо¿·¢Ã÷ £¬SSLÖ¤Êé¿ÉÄÜ»áй¶Ãô¸ÐÐÅÏ¢¡£×Ô7Ô·ÝÒÔÀ´ £¬DetectifyÒѾ­ÍøÂçºÍÆÊÎöÁËÁè¼Ý9ÒÚ¸ö¹«¹²SSL/TLSÖ¤Êé £¬²¢·¢Ã÷ÆäÖб£´æµÄ¡°ÏÝÚ塱¿ÉÄÜ»áй¶¹«Ë¾µÄÉñÃØÐÅÏ¢¡£¾ø´ó´ó¶¼ÐÂÈÏÖ¤µÄÓò¶¼±»¸¶ÓëÁËÐÎòÐÔÃû³Æ £¬ÈôÊÇÖ¤ÊéÊÇÔÚ¹ûÕæÇ°µÄ¿ª·¢½×¶Î½ÒÏþµÄ £¬¿ÉÄÜÈþºÕùµÐÊÖÓÐʱ¼äÔÚвúÆ·½øÈëÊг¡Ö®Ç°¾ÙÐÐÆÆËð¡£±ðµÄ £¬Í¨Åä·ûÖ¤Êé¿ÉÄÜ»áÊܵ½ALPACA¹¥»÷µÄÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://blog.detectify.com/2021/11/04/new-research-are-ssl-certificates-leaking-company-secrets/


Intel 471Ðû²¼Õë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ


Intel 471Ðû²¼Õë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ.png


Intel 471ÔÚ11ÔÂ2ÈÕÐû²¼ÁËÕë¶Ô½»Í¨ÔËÊäÐÐÒµµÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£Ñо¿Ö°Ô±·¢Ã÷ £¬´ó×ÚºÚ¿ÍÔÚ°µÍø³öÊÛÔËÊäºÍÎïÁ÷×éÖ¯µÄ»á¼ûȨÏÞ £¬²¢ÍƶÏËûÃÇÊÇʹÓÃÔ¶³Ì»á¿´·¨¾ö¼Æ»®£¨°üÀ¨Ô¶³Ì×ÀÃæÐ­ÒéRDP¡¢VPN¡¢CitrixºÍSonicWallµÈ£©ÖеÄÎó²î»ñµÃµÄ¡£±¨¸æÖ¸³ö £¬ÎïÊ¢ÐÐÒµÖð½¥³ÉΪ¹¥»÷Ä¿µÄ £¬¹¥»÷¿ÉÄÜ»á¶ÔÈ«Çò¾­¼ÃÔì³ÉÑÏÖØµÄÁ¬Ëø·´Ó¦ £¬Ò»´ÎÀֳɵĹ¥»÷¿ÉÄÜ»áʹÕû¸öÐÐÒµÕϰ­ £¬Òò´ËÏà¹Ø×éÖ¯Òª×Ô¶¯ÐÞ¸´Îó²îÒÔ×èÖ¹´ËÀ๥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://intel471.com/blog/shipping-companies-ransomware-credentials


Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ


Positive TechnologiesÐû²¼RootkitÑݱäÇ÷ÊÆ±¨¸æ.png


Positive TechnologiesÔÚ11ÔÂ3ÈÕÐû²¼ÁËRootkitµÄÑݱäÇ÷ÊÆºÍÄ¿½ñÍþвµÄÆÊÎö±¨¸æ¡£Ñо¿Ö°Ô±ÆÊÎöÁ˽ü10Äê×îÖøÃûµÄ16¸örootkit¼Ò×å £¬·¢Ã÷ÆäÖеÄ44%ÓÃÓÚ¹¥»÷Õþ¸®»ú¹¹ £¬ 77%±»ÓÃÓÚÍøÂçÌØ¹¤Ô˶¯¡£±ðµÄ £¬rootkitºÜÄÑ¿ª·¢ £¬Ðè񻮮·ÑÐí¶àʱ¼äºÍ¿î×Ó £¬Òò´Ë´ó´ó¶¼»ùÓÚrootkitµÄ¹¥»÷¶¼ÓëAPT×éÖ¯Óйء£ËùÓеÄrootkitÖÐ38%ÊôÓÚÄÚºËģʽ £¬31%ÊÇÓû§Ä£Ê½ £¬31%ÊÇ×éºÏÀàÐÍ £¬ÇҴ󲿷ÖÕë¶ÔWindowsϵͳ¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/