Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2022-03-03

Symantec·¢ÏÖSlugÍÅ»ïʹÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯


2ÔÂ28ÈÕ£¬SymantecÐû²¼Ò»·Ý³ÂËßÏêÊöÁËSlugÍÅ»ïÀûÓÃкóÃÅDaxinµÄ¹¥»÷»î¶¯¡£DaxinÊÇÒ»¸öWindowsÄÚºËÇý¶¯·¨Ê½£¬×Ô2019Äê11Ô¿ªÊ¼±»ÓÃÓÚ¹¥»÷»î¶¯£¬Ñо¿ÈËÔ±ÔÚ2021Äê11ÔÂÊӲ쵽Æä×î½üÒ»´Î¹¥»÷»î¶¯£¬Õë¶ÔµçÐÅ¡¢½»Í¨ºÍÖÆÔìÐÐÒµ¡£¸ÃºóÞßÓÐÇÔÈ¡Êý¾Ý¡¢Ö´ÐÐÃüÁî»òÏÂÔØºÍ°²×°ÆäËü¶ñÒâÈí¼þµÄ¹¦Ð§£»¿ÉÒԽٳֺϷ¨µÄTCP/IPÁ¬½Ó½øÐÐͨÐÅ£¬ÒÔÈÆ¹ý¼ì²â£»»¹ÄÜÔÚÄ¿±êÖа²×°ÆäËü×é¼þÀ´ÔöÇ¿ÄÚÖù¦Ð§£¬²¢Ê¹ÓÃÃûΪ\\.\Tcp4µÄÉ豸Ϊ´ËÀà×é¼þÌṩרÓÃͨÐÅ»úÖÆ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage



¼ÑÄܵÄ×Ó¹«Ë¾AxisÔâµ½¹¥»÷µ¼Ö²¿ÃÅϵͳÔÝʱÖжÏ


¾ÝýÌå2ÔÂ28ÈÕ±¨µÀ£¬Èðµä¹«Ë¾Axis CommunicationsÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅϵͳÖжÏ¡£AxisÊǼÑÄܵÄ×Ó¹«Ë¾£¬2019ÄêÓªÒµÊÕÈëÁè¼Ý12.35ÒÚÃÀÔª¡£¹¥»÷·¢ÉúÓÚ2021Äê2ÔÂ20ÈÕ£¬¸Ã¹«Ë¾Á¢¼´¶Ô´ËÊÂÕ¹¿ªÊӲ졣ÊÓ²ìÓÚ2ÔÂ27ÈÕÍê³É£¬½á¹ûÏÔʾûÓзþÎñÆ÷±»¼ÓÃÜ£¬Ò²Ã»Óпͻ§ÐÅÏ¢Êܵ½Ó°Ï죬¹¥»÷Õßͨ¹ýÉ繤¹¥»÷¿ØÖÆÁËÒ»ÃûÔ±¹¤µÄÕË»§£¬²¢ÔÚûÓд¥·¢Èκξ¯±¨µÄÇé¿öÏÂÈëÇÖÁËϵͳ¡£Ä¿Ç°£¬¸Ã¹«Ë¾µÄ²Ù×÷ϵͳºÍÓ¦Ó÷¨Ê½ÈÔ´¦ÓÚÀëÏß״̬£¬Camera StationÐí¿ÉϵͳҲÎÞ·¨Ê¹Óá£


https://www.bleepingcomputer.com/news/security/axis-communications-shares-details-on-disruptive-cyberattack/



CISAÐû²¼Éæ¼°Ê©ÄÍµÂµçÆøÖжà¸ö©¶´µÄICSÄþ¾²Í¨¸æ


CISAÓÚ2ÔÂ24ÈÕÐû²¼ÁËÒ»ÔòICSÄþ¾²Í¨¸æ£¬Éæ¼°Ê©ÄÍµÂµçÆøEasergyÖеĶà¸ö©¶´¡£ÕâЩ©¶´°üÂÞÓ²±àÂëÆ¾Ö¤Ê¹Óé¶´£¨CVE-2022-22722£©ºÍ»º³åÇøÒç³ö©¶´£¨CVE-2022-22723ºÍCVE-2022-22725£©¡£Í¨¸æ³Æ£¬ÀÖ³ÉÀûÓÃÕâЩ©¶´¿ÉÄÜ»áй¶É豸ƾ¾Ý¡¢µ¼ÖÂDoS״̬¡¢Éè±¸ÖØÆô»òÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆÖмÌ¡£Ê©ÄÍµÂµçÆøÔÚ2022Äê1ÔÂ11ÈÕÍÆ³öµÄ¸üÐÂÖÐÐÞ¸´ÁËÕâЩ©¶´¡£


https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-03



ÒÁÀÊUNC3313ÀûÓÃ2¸öкóÃŹ¥»÷Öж«µÄijÕþ¸®»ú¹¹


MandiantÔÚ2ÔÂ24ÈÕÐû²¼µÄ³ÂËßÅû¶ÁËÒÁÀÊUNC3313ʹÓõÄ2¸öкóÃŵÄϸ½Ú¡£Ñо¿ÈËÔ±ÔÚ2021Äê11Ô¼ì²âµ½UNC3313Õë¶ÔÖж«Ä³Õþ¸®»ú¹¹µÄ¹¥»÷£¬²¢ÔÚÊÓ²ì¹ý³ÌÖз¢ÏÖÁËеĶñÒâÈí¼þGRAMDOORºÍSTARWHALE¡£ÆäÖУ¬STARWHALEÊÇÒ»¸öWindows½Å±¾Îļþ(.WSF)£¬Ö´ÐдÓÓ²±àÂëC2·þÎñÆ÷½ÓÊÕµ½µÄÃüÁGRAMDOOR±»²¿ÊðΪNSIS°²×°·¨Ê½£¬²¢Í¨¹ýÉèÖÃWindows Run×¢²á±íÏîʵÏÖ³Ö¾ÃÐÔ¡£


https://www.mandiant.com/resources/telegram-malware-iranian-espionage



¼ÓÖÝÂÉʦЭ»áState BarµÄ26ÍòÆð°¸¼þ¼Ç¼й¶


ýÌå2ÔÂ28ÈÕ±¨µÀ³Æ£¬¼ÓÀû¸£ÄáÑÇÖÝÂÉʦЭ»áState BarÔ¼26Íò·Ý·Ç¹ûÈ»µÄ°¸¼þ¼Ç¼±»Ðû²¼ÔÚJudyrecords.com¡£¸Ã¾ÛºÏÍøÕ¾´Ó¶à¸öÖ´·¨»ú¹¹Êý¾Ý¿âÊÕ¼¯¹ûÈ»µÄ·¨Í¥¼Ç¼£¬»ã¼¯ÁËÁè¼Ý6.3ÒڷݼǼ¡£¾ÝϤ£¬´Ë´Îй¶Ê¼þÔ´ÓÚ°¸¼þ¹ÜÀíϵͳÖдæÔÚÒ»¸öÄþ¾²Â©¶´£¬µ¼ÖÂJudyrecordsÔÚ·ÃÎʹ«¹²¼Ç¼ʱÎÞÒâÖÐץȡµ½Á˷ǹûÈ»¼Ç¼¡£Ä¿Ç°£¬ÕâЩÎļþÒѱ»´ÓÍøÕ¾ÖÐɾ³ý¡£


https://www.theregister.com/2022/02/28/ca_legal_leak/



Akamai·¢ÏÖÐÂDDoS¹¥»÷ģʽ¿É·Å´ó65±¶


3ÔÂ1ÈÕ£¬AkamaiÐû²¼³ÂË߳Ƽì²âµ½ÐÂDDoS¹¥»÷ģʽTCP Middlebox Reflection¿É·Å´ó65±¶¡£´ËÀ๥»÷Õë¶ÔÊý¾Ý°ü¼ì²éºÍÄÚÈݹýÂËÉ豸£¬¾ßÓÐ33×Ö½ÚpayloadµÄSYNÊý¾Ý°ü¿É´¥·¢2156×Ö½ÚµÄÏìÓ¦£¬·Å´óÁË6533%¡£AkamaiÔÚÕë¶ÔÒøÐС¢ÂÃÓΡ¢ÓÎÏ·¡¢Ã½ÌåºÍWeb ÍйܷþÎñÌṩÉ̵ĻÖж¼¼ì²âµ½ÁË´ËÀ๥»÷¡£Ñо¿ÈËÔ±ÈÏΪ£¬¾¡¹ÜĿǰ´ËÀ๥»÷µÄ¹æÄ£ÉÐС£¨·åֵΪ11GbpsºÍ1.5Mpps£©£¬µ«¹¥»÷ÕßÔÚ½øÐÐ΢µ÷ºóÕÒµ½×î¼Ñ·´ÉäģʽֻÊÇʱ¼äÎÊÌâ¡£


https://www.akamai.com/blog/security/tcp-middlebox-reflection#.Yh41hIhUsH0.twitter




Äþ¾²¹¤¾ß


Katoolin3 


¿ÉÒÔ½« Kali Linux ÖпÉÓõÄËùÓз¨Ê½´øµ½ Debian ºÍ Ubuntu¡£


https://github.com/s-h-3-l-l/katoolin3



openSquat 


ÊÇÒ»ÖÖ¿ªÔ´Ç鱨 (OSINT) Äþ¾²¹¤¾ß£¬ÓÃÓÚʶ±ð¶ÔÌØ¶¨¹«Ë¾»òÓòµÄÇÀ×¢Íþв¡£


https://github.com/atenreiro/opensquat



CloudGraph


ÊÇÊÊÓÃÓÚ AWS¡¢Azure¡¢GCP ºÍ K8s µÄÃâ·Ñ¿ªÔ´Í¨Óà GraphQL API ºÍÔÆÄþ¾²×´Ì¬¹ÜÀí (CSPM) ¹¤¾ß¡£


https://github.com/cloudgraphdev/cli



Nimcrypt2


Óà Nim ±àдµÄ .NET¡¢PE ºÍԭʼ Shellcode ´ò°ü·¨Ê½/¼ÓÔØ·¨Ê½¡£


https://github.com/icyguider/Nimcrypt2



moonwalk


ͨ¹ýÔÚϵͳÈÕÖ¾ºÍÎļþϵͳʱ¼ä´ÁÉÏÇå³ýºÛ¼££¬ÔÚ Linux ©¶´ÀûÓÃ/ÉøÍ¸²âÊÔÆÚ¼äÁýÕÖ×Ù¼£¡£


https://github.com/mufeedvh/moonwalk




Äþ¾²·ÖÎö


ÎÚ¿ËÀ¼Ñо¿ÈËԱй¿àÕË÷Èí¼þ Conti µÄÔ´´úÂë


https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/



ÀÕË÷Èí¼þ BlackCat ·ÖÎö³ÂËß


https://cybersecurity.att.com/blogs/labs-research/blackcat-ransomware



Namecheap ÖÕֹΪ¶íÂÞ˹×éÖ¯Ìṩ·þÎñ£¬ÒªÇóËûÃÇ×ªÒÆÓòÃû


https://www.bleepingcomputer.com/news/technology/namecheap-terminates-services-for-russians-asks-them-to-move-domains/



΢Èí£ºÎÚ¿ËÀ¼ÔÚÈëÇÖǰÊýСʱ¾ÍÔâÊÜÁËÐ嵀 FoxBlade ¶ñÒâÈí¼þ¹¥»÷


https://securityaffairs.co/wordpress/128538/cyber-warfare-2/foxblade-malware-used-hours-before-invasion.html



CISAºÍFB¾¯¸æÕë¶ÔÎÚ¿ËÀ¼µÄÊý¾Ý²Á³ý¹¥»÷¿ÉÄÜ»áÂûÑÓµ½ÆäËü¹ú¼Ò


https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-potential-data-wiping-attacks-spillover/



Emotet µÄÖØÉú£º½©Ê¬ÍøÂçµÄй¦Ð§¼°Æä¼ì²âÒªÁì


https://thehackernews.com/2022/02/reborn-of-emotet-new-features-of-botnet.html