ContiºÏ×÷»ï°éÒòÐÄ»³²»Âú¹ûÈ»¸ÃÍÅ»ïC2µØÖ·µÈÐÅÏ¢£»ESETÅû¶14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å
Ðû²¼Ê±¼ä 2021-08-061.Òâ´óÀûÄÜÔ´¹«Ë¾ERGÔâµ½ÀÕË÷Èí¼þLockBit 2.0¹¥»÷
Òâ´óÀûÄÜÔ´¹«Ë¾ERG³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£ERGÊÇÒâ´óÀûÁìÏȵķçµçÔËÓªÉÌ£¬Ò²ÊÇÅ·ÖÞÊг¡Ê®´ó½ÉÏÔËÓªÉÌÖ®Ò»¡£¸Ã¹«Ë¾³Æ£¬ÓÉÓÚ·¢ÏÖ¹¥»÷ºóѸËÙ°²×°ÁËÄÚ²¿Äþ¾²·¨Ê½£¬Òò´ËÆäÐÅÏ¢ºÍͨÐż¼Êõ(ICT)»ù´¡ÉèÊ©¡°Ö»·¢ÉúÁ˼¸´ÎÇá΢µÄÖжϡ°£¬ÇÒĿǰÕýÔÚ»º½âÕâЩÖжϡ£La Repubblica±¨µÀ³Æ£¬´Ë´Î¹¥»÷ÊÇÓÉÀÕË÷ÍÅ»ïLockBit 2.0×éÖ¯µÄ¡£ÔÚ²»¾Ãǰ£¬Òâ´óÀûÀÆë°Â´óÇøÒ²Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö¸õØÓòµÄITϵͳ̱»¾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/energy-group-erg-reports-minor-disruptions-after-ransomware-attack/
2.ESETÅû¶14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×å
ESETÑо¿ÈËÔ±ÔÚBlack Hat USAÄþ¾²»áÒéÉÏÐû²¼ÁË14¸öÃé×¼IIS Web·þÎñÆ÷µÄ¶ñÒâÈí¼þ¼Ò×壬ÆäÖÐÓÐ10¸öÊÇмǼµÄ¡£¸ÃÑо¿×ܹ²ÊÕ¼¯ÁË80¶à¸ö¶ñÒâÈí¼þÑù±¾£¬²¢½«ËüÃÇ·ÖΪÁË14¸ö¼Ò×壬ÆäÖдó²¿ÃÅÊÇÔÚ2018ÄêÖÁ2021ÄêÆÚ¼äÊ״μì²âµ½µÄ£¬¶øÇÒĿǰÈÔÔÚ»ý¼«¿ª·¢ÖС£Ñо¿ÈËÔ±³Æ£¬ÕâЩ¶ñÒâÈí¼þ¶¼ÊÇ·þÎñÆ÷¶Ë¶ñÒâÈí¼þ£¬ËüÃÇÖ÷ÒªÓÐÁ½¸ö¹¦Ð§£º¼ì²ì²¢À¹½ØÓë·þÎñÆ÷µÄËùÓÐͨÐÅ£¬ÒÔ¼°Ó°ÏìÇëÇóµÄ´¦Ö÷½Ê½¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/08/several-malware-families-targeting-iis.html
3.Ñо¿ÈËÔ±Åû¶Cobalt StrikeÖоܾø·þÎñ©¶´µÄϸ½Ú
SentinelLabsÑо¿ÈËÔ±Åû¶ÁËCobalt StrikeÖоܾø·þÎñ©¶´µÄϸ½Ú¡£Cobalt StrikeÊǺϷ¨µÄÉøÍ¸²âÊÔ¹¤¾ß£¬Ö÷Òª×÷Ϊºì¶ÓµÄ¹¥»÷¿ò¼Ü£¬Í¬Ê±Ò²±»ºÚ¿ÍÓÃÓÚ¹¥»÷»î¶¯¡£¸Ã©¶´×·×ÙΪCVE-2021-36798£¨²¢³ÆÎªHotcobalt£©£¬¹¥»÷Õß¿ÉÒÔÀûÓøÃ©¶´ÔÚÄ¿±ê·þÎñÆ÷ÉÏ×¢²á¼Ùbeacon£¬È»ºóÏò·þÎñÆ÷·¢ËÍÐé¼ÙÈÎÎñÀ´ºÄ¾¡¿ÉÓÃÄÚ´æ¶øÊ¹·þÎñÆ÷Í߽⣬½ø¶øµ¼ÖÂÄ¿±êÎÞ·¨ÓëC2ͨÐÅ£¬×ÌÈźì¶Ó£¨»òºÚ¿Í£©µÄ²Ù×÷¡£HelpSystems¹«Ë¾ÔÚCobalt Strike 4.4ÖÐÐÞ¸´ÁË©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-cobalt-strike-bugs-allow-takedown-of-attackers-servers/
4.¹È¸èÐû²¼Äþ¾²¸üУ¬ÐÞ¸´Chromeä¯ÀÀÆ÷ÖÐ10¸ö©¶´
¹È¸èÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËChromeä¯ÀÀÆ÷ÖеÄ10¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄ©¶´ÎªÉ³ÏäÌÓÒÝ©¶´£¨CVE-2021-30590£©£¬¿ÉÔÚChromeµÄɳÏäÖ®ÍâʵÏÖÔ¶³Ì´úÂëÖ´ÐС£´ËÍ⣬»¹ÓÐTab GroupsÖеÄÔ½½çдÈë©¶´£¨CVE-2021-30592£©ºÍTab StripsÖеÄÔ½½ç¶Áȡ©¶´£¨CVE-2021-30593£©£¬Èç¹û¹¥»÷ÕßÄÜÔÚÔ½½ç¶ÁÈ¡·¢Éú֮ǰÊʵ±µÄÉèÖÃÄڴ棬¾ÍÓпÉÄÜÀûÓÃÕâÁ½¸ö©¶´ÈƹýɳÏä¡£´Ë´Î»¹ÐÞ¸´ÁËCVE-2021-30591ºÍCVE-2021-30594µÈ©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/google-patches-several-chrome-flaws-can-be-exploited-malicious-extensions
5.ContiºÏ×÷»ï°éÒòÐÄ»³²»Âú¹ûÈ»¸ÃÍÅ»ïC2µØÖ·µÈÐÅÏ¢
ContiµÄºÏ×÷»ï°éÒò¶ÔÀûÒæ·ÖÅä²»¹«¶øÐÄ»³²»Âú£¬¹ûÈ»Á˸ÃÍÅ»ïµÄC2µØÖ·µÈ»úÃÜÐÅÏ¢¡£Conti×÷ΪRaaS£¬ÆäºËÐÄÍŶӹÜÀí¶ñÒâÈí¼þºÍTorÕ¾µã£¬È»ºóÕÐļºÏ×÷»ï°éÖ´ÐÐÍøÂç©¶´ºÍ¼ÓÃÜÉ豸¡£Í¨³£ºËÐÄÍŶÓ׬ȡÊê½ðµÄ20-30%£¬¶øÆäËüÈË׬ȡʣÓಿÃÅ¡£´Ë´Î¹ûÈ»ÁËCobalt Strike C2·þÎñÆ÷µÄIPµØÖ·ºÍÒ»¸ö113 MBµÄµµ°¸£¬ÆäÖаüÂ޺ڿ͹¤¾ß¡¢¶íÎÄÊֲᡢÅàѵÖÊÁϺÍ×ÊÖúÎĵµ¡£¹ûÈ»Õ߳ƣ¬ËûÃÇÖ®ËùÒÔÐû²¼ÕâЩÖÊÁÏ£¬ÊÇÒòΪËûÔÚ¹¥»÷ÖÐÖ»»ñµÃÁË1500ÃÀÔªµÄ³ê½ð£¬¶øÆäËû³ÉÔ±Ôò׬ȡÁËÊý°ÙÍòÃÀÔª¡£Ñо¿ÈËÔ±½¨Òéÿ¸öÈ˶¼×èÖ¹ÕâЩIPµØÖ·£¬ÒÔ·ÀÖ¹À´×Ô¸Ã×éÖ¯µÄ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/
6.Group IBÐû²¼TaskMasters¹¥»÷¶íÂÞ˹µÄ·ÖÎö³ÂËß
Group IBÐû²¼ÁËÓйØTaskMasters¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã³ÂËßÖ÷ÒªÃèÊöÁËÔÚ2020ÄêÕë¶Ô¶íÂÞ˹Áª°îÐÐÕþÕþ¸®µÄ¹¥»÷Öмì²âµ½µÄWebdav-O¶ñÒâÈí¼þ¡£Ñо¿ÈËÔ±·¢ÏÖÁËÕë¶Ôx86ºÍx64ϵͳµÄÁ½¸ö°æ±¾µÄwebdev-o£¬ÆäÖÐx64°æ±¾±»ÓÃÓÚ¹¥»÷¶íÂÞ˹£¬¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó2018Ä꿪ʼ¾Í´æÔÚÁË¡£´ËÍ⣬ÒòΪWebdav-OÖÐÓÐÒ»×éÃüÁîÀàËÆÓÚBlueTraveller£¨ÓÖÃû RemShell£©£¬Òò´ËÑо¿ÈËԱȷ¶¨´Ë´Î¹¥»÷»î¶¯ÓëºÚ¿Í×éÖ¯TaskMastersÓйØÁª¡£
ÔÎÄÁ´½Ó£º
https://blog.group-ib.com/task