ContiºÏ×÷»ï°éÒòÐÄ»³²»Âú¹ûÈ»¸ÃÍÅ»ïC2µØÖ·µÈÐÅÏ¢ £»ESETÅû¶14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å

Ðû²¼Ê±¼ä 2021-08-06

1.Òâ´óÀûÄÜÔ´¹«Ë¾ERGÔâµ½ÀÕË÷Èí¼þLockBit 2.0¹¥»÷


1.jpg


Òâ´óÀûÄÜÔ´¹«Ë¾ERG³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£ERGÊÇÒâ´óÀûÁìÏȵķçµçÔËÓªÉÌ £¬Ò²ÊÇÅ·ÖÞÊг¡Ê®´ó½ÉÏÔËÓªÉÌÖ®Ò»¡£¸Ã¹«Ë¾³Æ £¬ÓÉÓÚ·¢ÏÖ¹¥»÷ºóѸËÙ°²×°ÁËÄÚ²¿Äþ¾²·¨Ê½ £¬Òò´ËÆäÐÅÏ¢ºÍͨÐż¼Êõ(ICT)»ù´¡ÉèÊ©¡°Ö»·¢ÉúÁ˼¸´ÎÇá΢µÄÖжϡ° £¬ÇÒĿǰÕýÔÚ»º½âÕâЩÖжÏ¡£La Repubblica±¨µÀ³Æ £¬´Ë´Î¹¥»÷ÊÇÓÉÀÕË÷ÍÅ»ïLockBit 2.0×éÖ¯µÄ¡£ÔÚ²»¾Ãǰ £¬Òâ´óÀûÀ­Æë°Â´óÇøÒ²Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼Ö¸õØÓòµÄITϵͳ̱»¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/energy-group-erg-reports-minor-disruptions-after-ransomware-attack/    


2.ESETÅû¶14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å


2.jpg


ESETÑо¿ÈËÔ±ÔÚBlack Hat USAÄþ¾²»áÒéÉÏÐû²¼ÁË14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å £¬ÆäÖÐÓÐ10¸öÊÇмǼµÄ¡£¸ÃÑо¿×ܹ²ÊÕ¼¯ÁË80¶à¸ö¶ñÒâÈí¼þÑù±¾ £¬²¢½«ËüÃÇ·ÖΪÁË14¸ö¼Ò×å £¬ÆäÖдó²¿ÃÅÊÇÔÚ2018ÄêÖÁ2021ÄêÆÚ¼äÊ״μì²âµ½µÄ £¬¶øÇÒĿǰÈÔÔÚ»ý¼«¿ª·¢ÖС£Ñо¿ÈËÔ±³Æ £¬ÕâЩ¶ñÒâÈí¼þ¶¼ÊÇ·þÎñÆ÷¶Ë¶ñÒâÈí¼þ £¬ËüÃÇÖ÷ÒªÓÐÁ½¸ö¹¦Ð§£º¼ì²ì²¢À¹½ØÓë·þÎñÆ÷µÄËùÓÐͨÐÅ £¬ÒÔ¼°Ó°ÏìÇëÇóµÄ´¦Ö÷½Ê½¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/several-malware-families-targeting-iis.html


3.Ñо¿ÈËÔ±Åû¶Cobalt StrikeÖоܾø·þÎñ©¶´µÄϸ½Ú


3.jpg


SentinelLabsÑо¿ÈËÔ±Åû¶ÁËCobalt StrikeÖоܾø·þÎñ©¶´µÄϸ½Ú¡£Cobalt StrikeÊǺϷ¨µÄÉøÍ¸²âÊÔ¹¤¾ß £¬Ö÷Òª×÷Ϊºì¶ÓµÄ¹¥»÷¿ò¼Ü £¬Í¬Ê±Ò²±»ºÚ¿ÍÓÃÓÚ¹¥»÷»î¶¯¡£¸Ã©¶´×·×ÙΪCVE-2021-36798£¨²¢³ÆÎªHotcobalt£© £¬¹¥»÷Õß¿ÉÒÔÀûÓøÃ©¶´ÔÚÄ¿±ê·þÎñÆ÷ÉÏ×¢²á¼Ùbeacon £¬È»ºóÏò·þÎñÆ÷·¢ËÍÐé¼ÙÈÎÎñÀ´ºÄ¾¡¿ÉÓÃÄÚ´æ¶øÊ¹·þÎñÆ÷Í߽⠣¬½ø¶øµ¼ÖÂÄ¿±êÎÞ·¨ÓëC2ͨÐÅ £¬×ÌÈźì¶Ó£¨»òºÚ¿Í£©µÄ²Ù×÷¡£HelpSystems¹«Ë¾ÔÚCobalt Strike 4.4ÖÐÐÞ¸´ÁË©¶´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-cobalt-strike-bugs-allow-takedown-of-attackers-servers/


4.¹È¸èÐû²¼Äþ¾²¸üР£¬ÐÞ¸´Chromeä¯ÀÀÆ÷ÖÐ10¸ö©¶´


4.jpg


¹È¸èÐû²¼Äþ¾²¸üР£¬ÐÞ¸´ÁËChromeä¯ÀÀÆ÷ÖеÄ10¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄ©¶´ÎªÉ³ÏäÌÓÒÝ©¶´£¨CVE-2021-30590£© £¬¿ÉÔÚChromeµÄɳÏäÖ®ÍâʵÏÖÔ¶³Ì´úÂëÖ´ÐС£´ËÍâ £¬»¹ÓÐTab GroupsÖеÄÔ½½çдÈë©¶´£¨CVE-2021-30592£©ºÍTab StripsÖеÄÔ½½ç¶Áȡ©¶´£¨CVE-2021-30593£© £¬Èç¹û¹¥»÷ÕßÄÜÔÚÔ½½ç¶ÁÈ¡·¢Éú֮ǰÊʵ±µÄÉèÖÃÄÚ´æ £¬¾ÍÓпÉÄÜÀûÓÃÕâÁ½¸ö©¶´ÈƹýɳÏä¡£´Ë´Î»¹ÐÞ¸´ÁËCVE-2021-30591ºÍCVE-2021-30594µÈ©¶´¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-several-chrome-flaws-can-be-exploited-malicious-extensions


5.ContiºÏ×÷»ï°éÒòÐÄ»³²»Âú¹ûÈ»¸ÃÍÅ»ïC2µØÖ·µÈÐÅÏ¢


5.jpg


ContiµÄºÏ×÷»ï°éÒò¶ÔÀûÒæ·ÖÅä²»¹«¶øÐÄ»³²»Âú £¬¹ûÈ»Á˸ÃÍÅ»ïµÄC2µØÖ·µÈ»úÃÜÐÅÏ¢¡£Conti×÷ΪRaaS £¬ÆäºËÐÄÍŶӹÜÀí¶ñÒâÈí¼þºÍTorÕ¾µã £¬È»ºóÕÐļºÏ×÷»ï°éÖ´ÐÐÍøÂç©¶´ºÍ¼ÓÃÜÉ豸¡£Í¨³£ºËÐÄÍŶÓ׬ȡÊê½ðµÄ20-30% £¬¶øÆäËüÈË׬ȡʣÓಿÃÅ¡£´Ë´Î¹ûÈ»ÁËCobalt Strike C2·þÎñÆ÷µÄIPµØÖ·ºÍÒ»¸ö113 MBµÄµµ°¸ £¬ÆäÖаüÂ޺ڿ͹¤¾ß¡¢¶íÎÄÊֲᡢÅàѵÖÊÁϺÍ×ÊÖúÎĵµ¡£¹ûÈ»Õß³Æ £¬ËûÃÇÖ®ËùÒÔÐû²¼ÕâЩÖÊÁÏ £¬ÊÇÒòΪËûÔÚ¹¥»÷ÖÐÖ»»ñµÃÁË1500ÃÀÔªµÄ³ê½ð £¬¶øÆäËû³ÉÔ±Ôò׬ȡÁËÊý°ÙÍòÃÀÔª¡£Ñо¿ÈËÔ±½¨Òéÿ¸öÈ˶¼×èÖ¹ÕâЩIPµØÖ· £¬ÒÔ·ÀÖ¹À´×Ô¸Ã×éÖ¯µÄ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/


6.Group IBÐû²¼TaskMasters¹¥»÷¶íÂÞ˹µÄ·ÖÎö³ÂËß


6.jpg


Group IBÐû²¼ÁËÓйØTaskMasters¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã³ÂËßÖ÷ÒªÃèÊöÁËÔÚ2020ÄêÕë¶Ô¶íÂÞ˹Áª°îÐÐÕþÕþ¸®µÄ¹¥»÷Öмì²âµ½µÄWebdav-O¶ñÒâÈí¼þ¡£Ñо¿ÈËÔ±·¢ÏÖÁËÕë¶Ôx86ºÍx64ϵͳµÄÁ½¸ö°æ±¾µÄwebdev-o £¬ÆäÖÐx64°æ±¾±»ÓÃÓÚ¹¥»÷¶íÂÞ˹ £¬¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó2018Ä꿪ʼ¾Í´æÔÚÁË¡£´ËÍâ £¬ÒòΪWebdav-OÖÐÓÐÒ»×éÃüÁîÀàËÆÓÚBlueTraveller£¨ÓÖÃû RemShell£© £¬Òò´ËÑо¿ÈËԱȷ¶¨´Ë´Î¹¥»÷»î¶¯ÓëºÚ¿Í×éÖ¯TaskMastersÓйØÁª¡£


Ô­ÎÄÁ´½Ó£º

https://blog.group-ib.com/task