DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ

Ðû²¼Ê±¼ä 2021-11-24

RedCurlÍÅ»ï»Ø¹é£¬ÐµĹ¥»÷Ä¿µÄÉæ¼°¸÷Ðи÷Òµ


RedCurlÍÅ»ï»Ø¹é£¬ÐµĹ¥»÷Ä¿µÄÉæ¼°¸÷Ðи÷Òµ.png


Group-IBÔÚ11ÔÂ18ÈÕÅû¶Á˺ڿÍÍÅ»ïRedCurlµÄÐÂÔ˶¯¡£ÍøÂçÌØ¹¤ºÚ¿Í×éÖ¯RedCurlÔÚ2018ÄêÖÁ2020Äêʱ´ú£¬ÌᳫÁËÖÁÉÙ26´Î¹¥»÷£¬Éæ¼°Ó¢¹ú¡¢µÂ¹ú¡¢¼ÓÄôó¡¢Å²Íþ¡¢¶íÂÞ˹ºÍÎÚ¿ËÀ¼µÈµØÇøµÄÐÞ½¨¡¢½ðÈÚ¡¢×Éѯ¡¢ÁãÊÛ¡¢°ü¹ÜºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¸ÃÍÅ»ïÔÚÖÐÖ¹7¸öÔºó¾íÍÁÖØÀ´£¬×Ô2021ÄêÍ·ÒÔÀ´Õë¶Ô4¼Ò¹«Ë¾ÌᳫÁËÐµĹ¥»÷£¬ÆäÖаüÀ¨¶íÂÞ˹×î´óµÄÅú·¢ÊÐËÁ¡£Group-IB³Æ£¬RedCurlÔÚÿ´Î¹¥»÷Öж¼»áʹÓÃÆä×Ô½ç˵¶ñÒâÈí¼þÈÆ¹ý¼ì²â¡£


Ô­ÎÄÁ´½Ó£º

https://www.group-ib.com/media/red-curl-threat-report/


Ñо¿Ö°Ô±ÑÝʾеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ


Ñо¿Ö°Ô±ÑÝʾеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ.png


¼ÓÖÝ´óѧÑо¿Ö°Ô±ÔÚ11ÔÂ18ÈÕÑÝʾÁËÒ»ÖÖеÄSAD DNS»º´æÖж¾¹¥»÷ģʽ¡£SAD DNS£¨Side channel AttackeD DNS£©ÓÚ2020Äê11ÔÂÊ×´ÎÅû¶£¬ËüÒÀÀµICMPµÄ¡°port unreachable¡±ÐÂÎÅÀ´ÍƶÏʹÓÃÄĸöÔÝʱ¶Ë¿Ú¡£Ê¹Óô˹¥»÷ģʽ¿É½«¶ñÒâµÄDNS¼Í¼עÈëDNS»º´æ£¬È»ºó½«Ä¿µÄÁ÷Á¿Öض¨Ïòµ½¹¥»÷ÕߵķþÎñÆ÷ÖУ¬¾ÙÐÐÖÐÐÄÈË(MITM)¹¥»÷¡£Ñо¿Ö°Ô±³Æ£¬´ËÖÖ¹¥»÷±£´æÓÚLinuxÉÏÔËÐеÄBIND¡¢UnboundºÍdnsmasqµÈDNSÈí¼þÖУ¬Ó°ÏìÔ¼38%µÄÓòÃûÆÊÎöÆ÷¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/11/new-side-channel-attacks-re-enable.html


ÃÀ¹ú֤ȯÉúÒâίԱ»á·¢Ã÷ð³äÆäÔ±¹¤µÄ´¹ÂÚÔ˶¯


ÃÀ¹ú֤ȯÉúÒâίԱ»á·¢Ã÷ð³äÆäÔ±¹¤µÄ´¹ÂÚÔ˶¯.png


ÃÀ¹ú֤ȯÉúÒâίԱ»á(SEC)Ͷ×ÊÕß½ÌÓýºÍÐû´«°ì¹«ÊÒ(OIEA)ÓÚ11ÔÂ19ÈÕÐû²¼¾¯±¨£¬³Æ·¢Ã÷ð³äSECÔ±¹¤µÄÔ˶¯¡£¹¥»÷Õßͨ¹ýµç»°¡¢ÓïÒôÓʼþ¡¢µç×ÓÓʼþºÍÐżþ£¬ÖÒÑÔÊÕ¼þÈËÆä»îÆÚ´æ¿î»ò¼ÓÃÜÇ®±ÒµÄÕË»§Öб£´æÎ´¾­ÊÚȨµÄÉúÒâ»òÆäËû¿ÉÒÉÔ˶¯£¬²¢Ë÷ÒªÆä¹ÉȨ¡¢Õʺš¢PINÂë¡¢ÃÜÂëµÈÐÅÏ¢¡£OIEA½¨ÒéÓû§ÔÚ·¢ËÍСÎÒ˽¼ÒÐÅϢ֮ǰ£¬Ó¦ÏÈͨ¹ýÓʼþ»òÖµçSECÈ·¶¨·¢¼þÈ˵ÄÉí·Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-sec-warns-investors-of-ongoing-govt-impersonation-attacks/


ÓÌËûÖÝÒ½ÁÆÖÐÐÄUIA½ü60Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶


ÓÌËûÖÝÒ½ÁÆÖÐÐÄUIA½ü60Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶.png


11ÔÂ18ÈÕ£¬ÃÀ¹úÓÌËûÖÝ·ÅÉäÖÐÐÄUtah Imaging Associates(UIA)È·ÈÏ582170»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶¡£Ð¹Â¶ÊÂÎñ±¬·¢ÔÚ8ÔÂ29ÈÕ£¬Êý¾ÝÔÚ̻¶ԼһÖܺó£¬ÓÚ9ÔÂ4ÈÕ±»·¢Ã÷²¢ÓÚͬÈÕÐÞ¸´¡£´Ë´Îй¶ÁË»¼ÕßµÄÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹Üµ¥ºÅºÍÒ½ÁÆÐÅÏ¢µÈ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬¹¥»÷ÕßÇãÏòÓÚ¹¥»÷ÏñUIAÕâÑùµÄÒ½ÁÆÖÐÐÄ£¬ÊÇÓÉÓÚËûÃÇÒÔΪ´ËÀàÊý¾ÝÔÚ°µÍøÖеļÛÖµ¸ü¸ß¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/utah-medical-center-hit-by-data-breach-affecting-582k-patients/


ProdaftÐû²¼¹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÆÊÎö±¨¸æ


ProdaftÐû²¼¹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÆÊÎö±¨¸æ.png


ProdaftÓÚ11ÔÂ18ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÔËÓªÍÅ»ïContiµÄÉî¶ÈÆÊÎö±¨¸æ¡£ContiÊÇ˽ÓÐRaaS£¬ÓÚ2019Äê12ÔÂβÊ״ηºÆð£¬²¢Í¨¹ýTrickBot¾ÙÐÐÈö²¥¡£±¨¸æÖ¸³ö£¬×Ô2021Äê7ÔÂÒÔÀ´£¬Conti´ÓÊê½ðÖÐ׬ǮÖÁÉÙ2550ÍòÃÀÔª£¬¶øContiÍÅ»ïÔòÉù³ÆÒÑ׬Ǯ3ÒÚÃÀÔª¡£±ðµÄ£¬Prodaft»¹¹ûÕæÁËContiµÄÖ§¸¶ÍøÕ¾£¬Æä·þÎñÆ÷ÍйÜÔÚ217.12.204.135ÉÏ£¬¸ÃIPµØµãÊôÓÚÎÚ¿ËÀ¼ÍøITL LLC¡£Ôڸñ¨¸æÐû²¼¼¸Ð¡Ê±ºó£¬ContiÍÅ»ï¾Í½«ÆäÖ§¸¶ÍøÕ¾¹Ø±Õ¡£


Ô­ÎÄÁ´½Ó£º

https://www.prodaft.com/resource/detail/conti-ransomware-group-depth-analysis


DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ


DevolutionsÐû²¼2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄ±¨¸æ.png


DevolutionsÔÚ11ÔÂ17ÈÕÐû²¼ÁË2021ÄêÖÐСÐÍÆóÒµÇå¾²Ì¬ÊÆµÄÑо¿±¨¸æ¡£¸ÃÑо¿¾ÍÎå¸ö½¹µãÖ÷Ì⣺ÖÐСÆóÒµµÄÍøÂç¹¥»÷ºÍÍþв¡¢ÃÜÂëÖÎÀí¡¢Ê¹ÓõÄÌØÈ¨»á¼ûÖÎÀí¡¢Çå¾²ÅàѵºÍÖÎÀíÒÔ¼°Ç徲Ͷ×ʾÙÐÐÁËÆÊÎö¡£±¨¸æÖ¸³ö£¬ÓëÈ¥ÄêÏà±È£¬72%µÄÖÐСÆóÒµÏÖÔÚÔ½·¢ÌåÌùÍøÂçÇå¾²£»ÖÎÀíÕß×îµ£ÐĵÄÍøÂçÍþвÊÇÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂںͶñÒâÈí¼þ£»52%µÄÆóÒµÔÚÈ¥ÄêÔâµ½¹ýÍøÂç¹¥»÷£»Ö»ÓÐ13%µÄÆóÒµÓµÓÐÍêÕûµÄPAM½â¾ö¼Æ»®¡£


Ô­ÎÄÁ´½Ó£º

https://blog.devolutions.net/2021/11/new-now-available-devolutions-state-of-cybersecurity-in-smbs-in-2021-2022-report