NSAµÈ»ú¹¹ÍŽáÐû²¼ÔõÑùÉèÖÃºÍ¼à¿ØPowerShellµÄÖ¸ÄÏ
Ðû²¼Ê±¼ä 2022-06-246ÔÂ22ÈÕ£¬ÃÀ¹úCISA¡¢ÐÂÎ÷À¼NZ NCSCºÍÓ¢¹úNCSC-UKÐû²¼ÁËÒ»·ÝÍŽáÍøÂçÇå¾²ÐÅÏ¢±í(CIS)¡£ÕâЩ»ú¹¹½¨ÒéÊʵ±µÄÉèÖÃºÍ¼à¿ØPowerShell£¬¶ø²»ÊÇÓÉÓÚ¹¥»÷Õß»áÔÚ»á¼ûÍøÂçºóʹÓÃËü¶øÍêȫɾ³ý»ò½ûÓÃËü¡£Ö¸ÄϽ¨Ò飬ʹÓÿò¼ÜÖеĹ¦Ð§£¬ÀýÈçPowerShellÔ¶³Ì´¦Öóͷ££»¹ØÓÚÔ¶³ÌÅþÁ¬£¬Ê¹ÓÃPowerShell 7ÖÐÖ§³ÖµÄSSH£¬ÒÔÔöÌí¹«Ô¿Éí·ÝÑéÖ¤µÄ±ãµ±ÐÔºÍÇå¾²ÐÔ£»ÔÚAppLocker»òWindows DefenderÓ¦ÓóÌÐò¿ØÖÆ(WDAC)µÄ×ÊÖúÏÂïÔÌPowerShellµÄ²Ù×÷£¬½«¹¤¾ßÉèÖÃΪÊÜÏÞÓïÑÔģʽ(CLM)£¬´Ó¶ø¾Ü¾øÖÎÀíÔ±½ç˵µÄÕ½ÂÔÖ®ÍâµÄ²Ù×÷¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/06/22/keeping-powershell-measures-use-and-embrace
2¡¢Cyber Spetsnaz½«Ã¬Í·Ãé×¼Á¢ÌÕÍðµÄÒªº¦»ù´¡ÉèÊ©
¾ÝýÌå6ÔÂ22ÈÕ±¨µÀ£¬Cyber Spetsnaz×îÏÈÕë¶ÔÁ¢ÌÕÍðµÄÕþ¸®»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©¡£ÔÚÁ¢ÌÕÍðÐû²¼¶Ô¶íÂÞ˹ʵÑé¡°½ûÔËÁºó£¬¸ÃÍÅ»ïÐû²¼ÁËе÷DDoS¹¥»÷µÄ¶à¸öÄ¿µÄ£¬ÆäÖÐÉæ¼°ÎïÁ÷¹«Ë¾¡¢½»Í¨»ù´¡ÉèÊ©¡¢Ö÷Òª½ðÈÚ»ú¹¹¡¢ISP¡¢»ú³¡¡¢ÄÜÔ´¹«Ë¾¡¢Ö÷ҪýÌåºÍÕþ¸®µÄÍøÕ¾¡£¾Ý6ÔÂ23ÈÕ±¨µÀ£¬Á¢ÌÕÍð¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NKSC)Ðû²¼ÁËÒ»Ôòͨ¸æ£¬³ÆÕë¶Ô¸Ã¹úÕþ¸®µÄDDoS¹¥»÷¼±¾çÔöÌí£¬µ¼ÖÂÁ¢ÌÕÍðµÄÔËÊ乫˾¡¢½ðÈÚ»ú¹¹ºÍÆäËü´óÐÍʵÌå¶¼±¬·¢Á˶ÌÔݵķþÎñÖÐÖ¹¡£
https://securityaffairs.co/wordpress/132518/hacktivism/lithuania-under-cyber-attack.html
3¡¢Check PointÅû¶Tropic Trooper½üÆÚ¹¥»÷µÄÏêÇé
Check PointÔÚ6ÔÂ22ÈÕÐû²¼Á˹ØÓÚTropic Trooper¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£´Ë´ÎÔ˶¯Ê¹ÓÃÁËеļÓÔØ³ÌÐòNimbdaºÍľÂíYahoyahµÄбäÖÖ¡£Ñ¬È¾Á´Ê¼ÓÚ¶ñÒâ°æ±¾µÄSMS Bomber£¬ËüÏÖʵÉÏÊÇNimbda¼ÓÔØ³ÌÐò£¬µ«Ê¹ÓÃÁËSMS Bomberͼ±ê£¬²¢°üÀ¨SMS Bomber×÷ΪǶÈëµÄ¿ÉÖ´ÐÐÎļþ£¬¼ÓÔØºó»á×°ÖÃYahoyah±äÌå²¢ÍøÂçÖ÷»úµÄÊý¾Ý¡£×îÖÕµÄpayloadÓÉYahoyahÏÂÔØ£¬²¢Ê¹ÓÃÒþдÊÖÒÕ±àÂëΪJPGͼÏñ£¬Check Point½«Æäʶ±ðΪTClient£¬ÊÇTropic TrooperÔÚÒÑÍùÔ˶¯ÖÐÔøÊ¹ÓùýµÄºóÃÅ¡£±ðµÄ£¬ÓÃÓÚ°ü×°YahoyahµÄ¼ÓÃÜÊÇAESµÄ×Ô½ç˵ʵÏÖ£¬ËüÖ´ÐÐÁËÁ½´Îµ¹ÐòµÄÂÖ²Ù×÷£¬Ê¹ÑùÌìÖ°Îö±äµÃºÜÊÇÄÑÌâ¡£
https://research.checkpoint.com/2022/chinese-actor-takes-aim-armed-with-nim-language-and-bizarro-aes/
4¡¢QNAPÐÞ¸´Òѱ£´æÈýÄêµÄPHPÎó²îCVE-2019-11043
6ÔÂ22ÈÕ£¬QNAPÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÁËÒ»¸öÒѱ£´æÈýÄêÖ®¾ÃµÄPHPÎó²î£¨CVE-2019-11043£©¡£QNAPÔÚͨ¸æÖÐÚ¹ÊÍ£¬Îó²î»áÓ°ÏìµÍÓÚ7.1.33µÄPHP°æ±¾7.1.x¡¢µÍÓÚ7.2.24µÄ7.2.xºÍµÍÓÚ7.3.11µÄ7.3.x£¬ÈôÊDZ»Ê¹Ó㬿ɵ¼ÖÂÔ¶³ÌÖ´ÐдúÂë¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.8£¬Ó°ÏìÁËQNAPµÄ¶à¸ö°æ±¾µÄQTS¡¢QuTS heroºÍQuTScloud×°±¸¡£¸Ã¹«Ë¾½¨ÒéÓû§Á¬Ã¦¸üе½×îеİ汾£¬ÒÔÐÞ¸´´ËÎó²î¡£
https://www.bleepingcomputer.com/news/security/critical-php-flaw-exposes-qnap-nas-devices-to-rce-attacks/
5¡¢ProofpointÐû²¼2022ÄêÉç»á¹¤³ÌµÄ¹¥»÷Ô˶¯±¨¸æ
ProofpointÔÚ6ÔÂ22ÈÕÐû²¼ÁË×îеÄÉç»á¹¤³Ìѧ±¨¸æ¡£±¨¸æÆÊÎöÁËÉç»á¹¤³ÌµÄÖ÷ÒªÇ÷ÊÆºÍÐÐΪ£¬°üÀ¨£¬¹¥»÷Õß¿ÉÒÔͨ¹ýÑÓÉì¶Ô»°ÓëÄ¿µÄ½¨ÉèÐÅÍС¢À©´óÁ˶ÔÓÐÓÃÕ½ÂÔµÄÀÄÓã¨ÈçʹÓÃÊÜÐÅÍй«Ë¾µÄ·þÎñ£©¡¢ÔÚÆä¹¥»÷Á´ÖÐʹÓÃÕý½»ÊÖÒÕ£¨Èçµç»°£©¡¢ÖªµÀ²¢Ê¹ÓÃͬÊÂÖ®¼äÏÖÓеĶԻ°¡¢Ê¹ÓÃÈÈÃźÍÓëÉç»áÏà¹ØµÄÖ÷ÌâµÈ¡£±ðµÄ£¬¸Ã±¨¸æ»¹×ÅÑÛÓÚ¾³£±»ÀÄÓõķþÎñ£¬ºÃ±È¹È¸èDriveºÍDiscord¡£
https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-hijack-attention-2022-social-engineering-report
6¡¢ÈÕ±¾Æû³µÁã¼þÖÆÔìÉÌNichirin³ÆÆäÔâµ½ÀÕË÷¹¥»÷
¾Ý6ÔÂ23ÈÕ±¨µÀ£¬ÈÕ±¾Æû³µºÍĦÍгµÈí¹ÜÖÆÔìÉÌNichirinµÄ×Ó¹«Ë¾Nichirin-Flex USAÔâµ½ÁËÀÕË÷¹¥»÷£¬µ¼Ö¸ù«Ë¾µÄÍøÂçÖÐÖ¹¡£¹¥»÷±¬·¢ÔÚ6ÔÂ14ÈÕ£¬¸Ã¹«Ë¾ÔÚ¼ì²âµ½ÆäÍøÂçÉÏδ¾ÊÚȨµÄ»á¼ûºóÁ¬Ã¦½«²Ù×÷Çл»µ½ÊÖ¶¯Ä£Ê½¡£ÓÉÓÚÍøÂç¹¥»÷Ò²Ó°ÏìÁ˲úÆ··ÖÏú£¬²¢ÇÒ¶©µ¥ÊÇÊÖ¶¯Íê³ÉµÄ£¬Òò´Ë¿Í»§µÄ¶©µ¥Ó¦¸Ã»áÑÓ³Ù¡£¸Ã¹«Ë¾µÄÉùÃ÷ÌåÏÖ£¬»Ö¸´ÏµÍ³ÒѳÉΪ»Ö¸´ÓªÒµÔËÓªµÄÓÅÏÈÊÂÏÆäÏÖÔÚÕýÔÚÊÓ²ìδ¾ÊÚȨµÄ»á¼ûÊÇÔõÑù±¬·¢µÄ£¬²¢ÊÔͼȷ¶¨ÐÅϢй¶µÄÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ