AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý
Ðû²¼Ê±¼ä 2022-04-214ÔÂ19ÈÕ£¬Unit 42Ðû²¼³ÂËß³ÆAWSµÄ¶à¸öLog4ShellÈȲ¹¶¡ÖдæÔÚÑÏÖصÄÎÊÌâ¡£½«²¹¶¡°²×°µ½·þÎñÆ÷»ò¼¯Èººó£¬¸Ã»·¾³ÖеÄÿ¸öÈÝÆ÷¶¼¿ÉÒÔÀûÓÃÆäÀ´½Ó¹Üµ×²ãÖ÷»ú£¬ÀýÈ磬Kubernetes¼¯ÈºÖеÄÈÝÆ÷¶¼¿ÉÒÔÌÓÒÝ£¬·ÇÌØȨ½ø³ÌÒ²¿ÉÒÔÀûÓøò¹¶¡À´ÌáȨ¡£Ä¿Ç°£¬ÕâЩ©¶´×·×ÙΪCVE-2021-3100¡¢CVE-2021-3101¡¢CVE-2022-0070ºÍCVE-2022-0071£¬CVSSÆÀ·Ö¾ùΪ8.8¡£Ñо¿ÈËÔ±ÓÚÈ¥Äê12ÔÂ21ÈÕ³ÂË߸鶴£¬ÑÇÂíÑ·ÓÚ4ÔÂ19ÈÕÐÞ¸´¡£
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/
2¡¢Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçBotenaGo¿ªÊ¼¹¥»÷LilinµÄDVR
ýÌå4ÔÂ20ÈÕ±¨µÀ£¬Nozomi Networks Labs·¢ÏÖ½©Ê¬ÍøÂçBotenaGoµÄÐÂÑù±¾¹¥»÷LilinµÄDVR¡£BotenaGoÊÇÓÃGolang±àдµÄÏà¶Ô½ÏеĶñÒâÈí¼þ£¬AV¼ì²âÂʽϵÍ(6/62)£¬Ô´´úÂëÓÚ2021 Äê10Ô¹ûÈ»¡£Ñо¿ÈËÔ±³Æ£¬ÐÂÑù±¾ËƺõÔ´×Ô¹ûÈ»µÄÔ´´úÂ룬±»ÃüÃûΪ¡°Lillin scanner¡±£¬ÆäÒ»¸öÏÔÖøÌØÕ÷ÊDz»»á±»VirusTotalɨÃèƽ̨¼ì²âµ½¡£¾ÝϤ£¬¿ª·¢Õßɾ³ýÁËBotenaGoÔʼ´úÂëÖм¸ºõÈ«²¿µÄ©¶´ÀûÓã¬×¨×¢ÓÚLilin DVRÖеÄRCE©¶´¡£
https://securityaffairs.co/wordpress/130383/malware/botenago-botnet-targets-dvr.html
3¡¢Funky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥
¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ£¬ÀñÆ·¿¨ÁãÊÛÉÌFunky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÔÚÉÏÖÜËÄ·¢ÏÖ¸Ãʼþºó£¬Á¢¼´¶Ô´ËÊÂÕ¹¿ªÊӲ죬ȷ¶¨Óû§Êý¾Ý±»·ÃÎʵÄˮƽ£¬²¢½«ÏµÍ³ÀëÏß¡£Ö±µ½±¾ÖÜÒ»£¬Æä¹ÙÍøÈÔÔÚÌáʾ£¬ÒòΪÓöµ½ÁËһЩÎÊÌ⣬ĿǰÎÞ·¨½ÓÊÜж©µ¥¡£Funky PigeonûÓзÖÏí¸ü¶à¹ØÓÚ¹¥»÷ÐÔÖÊ»ò¹¥»÷Õß»ñµÃ¹«Ë¾ÏµÍ³·ÃÎÊȨÏÞµÄϸ½ÚÐÅÏ¢¡£
https://www.infosecurity-magazine.com/news/funky-pigeon-cyber-attack/
4¡¢CheckPoint³ÆÁìÓ¢ÊÇ2022ÄêQ1Öб»ÀûÓÃ×î¶àµÄÆ·ÅÆ
4ÔÂ19ÈÕ£¬Check Point ResearchÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÆ·ÅÆÍøÂçµöÓãµÄ·ÖÎö³ÂËß¡£LinkedInÒѳÉΪµöÓã¹¥»÷ÖÐ×ģ·Â×î¶àµÄÆ·ÅÆ£¬Õ¼È«ÇòËùÓдËÀàʼþµÄ52%ÒÔÉÏ£¬ÉÏÒ»¼¾¶ÈÆäÅÅÃûµÚÎ壬½öÓë8%µÄµöÓã¹¥»÷Ïà¹Ø¡£³ÂËßÇ¿µ÷Á˹¥»÷ÕßÀûÓÃÉç½»ÍøÂçµÄÐÂÇ÷ÊÆ£¬Éç½»ÍøÂçÏÖÔÚÒÑÓâÔ½ÖÖÖÖº½Ô˹«Ë¾ºÍ¹È¸èµÈ¿Æ¼¼¹«Ë¾£¬³ÉΪµÚÒ»´óÀà±ð¡£Æä´ÎÊÇ¿ìµÝ¹«Ë¾DHL(Õ¼±È14%)£¬ÒÔ¼°¹È¸è(7%)¡¢Î¢Èí(6%)ºÍÁª°î¿ìµÝ(6%)¡£
https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/
5¡¢VaronisÅû¶Æä¿Í»§Ñ¬È¾HiveÀÕË÷Èí¼þµÄÏêϸÐÅÏ¢
4ÔÂ19ÈÕ£¬Äþ¾²ºÍ·ÖÎö¹«Ë¾VaronisÅû¶ÁËÆäÒ»¸ö¿Í»§Ôâµ½µÄHiveÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢¡£ÆäÈ¡Ö¤ÍŶӳƣ¬Ä¿±êϵͳÔÚ72СʱÄÚ±»¼ÓÃÜ¡£·ÖÎö³ÂËßÖ¸³ö£¬¹¥»÷¹ý³Ì×ܹ²°üÂÞÁË5¸ö½×¶Î£ºÀûÓÃProxyShell°²×°ºóÃÅ£»ÀûÓÃPowerShellÏÂÔØCobalt Strike stager£»ÀûÓÃSYSTEMȨÏÞ´´½¨ÏµÍ³¹ÜÀíÔ±Óû§¡°user¡±£¬²¢µ÷ÓÃMimikatzת´¢Æ¾Ö¤£»ÀûÓÃÇáÁ¿¼¶¹¤¾ßSoftPerfectɨÃèÃô¸ÐÐÅÏ¢£»Í¨¹ýÃûΪ¡°Windows.exe¡±µÄpayload°²×°ÀÕË÷Èí¼þ¡£
https://www.varonis.com/blog/hive-ransomware-analysis
6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄ·ÖÎö³ÂËß
KasperskyÔÚ4ÔÂ19ÈÕÐû²¼Á˹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬´ËÀà»î¶¯ÔÚÒ»¸öÔÂÄÚÔö³¤ÁË10±¶£¬´Ó2022Äê2ÔµÄÔ¼3000·âÔö³¤µ½3ÔµÄÔ¼30000·â¡£¸Ã»î¶¯Ö÷Òª·Ö·¢¶ñÒâÈí¼þEmotetºÍQbot£¬²¢ÒÔÆóÒµ¹«Ë¾ÎªÄ¿±ê¡£µ½Ä¿Ç°ÎªÖ¹£¬¼ì²âµ½ÕâЩÓʼþÖÐʹÓõÄÓïÑÔ°üÂÞÓ¢Óï¡¢·¨Óï¡¢ÐÙÑÀÀûÓï¡¢Òâ´óÀûÓŲÍþÓï¡¢²¨À¼Óï¡¢¶íÓ˹ÂåÎÄÄáÑÇÓï¡¢Î÷°àÑÀÓïºÍÖÐÎÄ¡£CryptolaemusÌåÏÖ£¬Emotet¿ªÊ¼Ê¹ÓÃ64λ¼ÓÔØ·¨Ê½ºÍÇÔÈ¡Ä£¿é¡£
https://usa.kaspersky.com/about/press-releases/2022_kaspersky-finds-malicious-spam-campaign-targeting-organizations-grows-10-fold-in-a-month-spreads-qbot-and-emotet-malware