ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬£¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£¡£¡£¡£¡£¡£8ÔÂ12ÈÕ£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£¡£¡£¡£¡£¡£Í¬ÈÕ£¬£¬£¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬£¬£¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬£¬£¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬£¬£¬£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑÇסÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ôڴ˴λÖй¥»÷ÕßÌáÐÑÄ¿µÄÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬£¬£¬£¬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍÉó²é¡£¡£¡£¡£¡£¡£Ò»µ©Óû§µã»÷Á´½Ó£¬£¬£¬£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔAndroidÓû§£¬£¬£¬£¬¾ßÓÐÇÔȡ֧¸¶¿¨ÏêϸÐÅÏ¢¡¢×èµ²¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢»á¼ûȨÏ޵ȹ¦Ð§¡£¡£¡£¡£¡£¡£FlubotÔçÔÚ½ñÄêÄêÍ·¾Í¹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¼Ò£¬£¬£¬£¬²¢ÔÚ±¾ÔÂ×îÏÈÕë¶Ô°Ä´óÀûÑÇÓû§¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸£¿£¿£¿£¿£¿£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢Îijƣ¬£¬£¬£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬¹ú·À²¿ÍøÂç˾ÁÕýÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£¡£¡£¡£¡£¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬µ«ËüÔö²¹ËµÕâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÊǺÎʱ±»·¢Ã÷£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬¹¥»÷¿ÉÄܱ¬·¢ÔÚ¼¸ÖÜǰ¡£¡£¡£¡£¡£¡£¹úÎñÔº½²»°ÈËÌåÏÖ£¬£¬£¬£¬ËûÃÇÕýÔÚ½ÓÄɲ½·¥ÒÔÈ·±£ÐÅÏ¢¿ÉÒÔÊܵ½±£»£»£»£»¤£¬£¬£¬£¬²¢ÇÒ³öÓÚÇå¾²Ôµ¹ÊÔ­ÓÉÎÞ·¨ÌÖÂÛ¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨.png


CISAÐû²¼ÁËÓйؽüÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£¡£¸Ã¾¯±¨Ö¸³ö£¬£¬£¬£¬ÔÚÖØ´ó×ÔÈ»ÔÖÄÑÖ®ºó£¬£¬£¬£¬°üÀ¨¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£»£»£»£»áºÜ³£¼û¡£¡£¡£¡£¡£¡£×éÖ¯ºÍСÎÒ˽¼ÒÔÚ´¦Öóͷ£´øÓÐÓëì«·çÏà¹ØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱÐèҪСÐÄÉóÉ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹ÒªÐ¡ÐÄÓë±°ÁÓÌìÆøÊÂÎñÏà¹ØµÄÉ罻ýÌåÇëÇó¡¢Îı¾»òÏßÏ»¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ.jpg


Cisco TalosÐû²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬ÉÏÒ»¼¾¶È£¬£¬£¬£¬ÀÕË÷Èí¼þÊ״β»ÔÙÕ¼ÓÐÖ÷ҪλÖ㬣¬£¬£¬ÍƲâÕâ¿ÉÄÜÊÇÓÉMicrosoft Exchange Îó²îʹÓûµÄ´ó·ùÔöÌíµ¼Öµġ£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬£¬£¬£¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£©£¬£¬£¬£¬ÓÖ³ÉΪ×î´óµÄÍþв¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Ö÷ÒªµÄÀÕË÷Èí¼þ°üÀ¨REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬£¬£¬£¬±¾¼¾¶ÈµÄÇå¾²¼ì²âÈÆ¹ýÊÖÒÕµÄʹÓÃÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html