AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý
Ðû²¼Ê±¼ä 2022-04-214ÔÂ19ÈÕ£¬£¬£¬£¬£¬Unit 42Ðû²¼±¨¸æ³ÆAWSµÄ¶à¸öLog4ShellÈȲ¹¶¡Öб£´æÑÏÖØµÄÎÊÌâ¡£¡£¡£½«²¹¶¡×°Öõ½Ð§ÀÍÆ÷»ò¼¯Èººó£¬£¬£¬£¬£¬¸ÃÇéÐÎÖеÄÿ¸öÈÝÆ÷¶¼¿ÉÒÔʹÓÃÆäÀ´½ÓÊܵײãÖ÷»ú£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬Kubernetes¼¯ÈºÖеÄÈÝÆ÷¶¼¿ÉÒÔÌÓÒÝ£¬£¬£¬£¬£¬·ÇÌØÈ¨Àú³ÌÒ²¿ÉÒÔʹÓøò¹¶¡À´ÌáȨ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÕâЩÎó²î×·×ÙΪCVE-2021-3100¡¢CVE-2021-3101¡¢CVE-2022-0070ºÍCVE-2022-0071£¬£¬£¬£¬£¬CVSSÆÀ·Ö¾ùΪ8.8¡£¡£¡£Ñо¿Ö°Ô±ÓÚÈ¥Äê12ÔÂ21ÈÕ±¨¸æ¸ÃÎó²î£¬£¬£¬£¬£¬ÑÇÂíÑ·ÓÚ4ÔÂ19ÈÕÐÞ¸´¡£¡£¡£
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/
2¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçBotenaGo×îÏȹ¥»÷LilinµÄDVR
ýÌå4ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬Nozomi Networks Labs·¢Ã÷½©Ê¬ÍøÂçBotenaGoµÄÐÂÑù±¾¹¥»÷LilinµÄDVR¡£¡£¡£BotenaGoÊÇÓÃGolang±àдµÄÏà¶Ô½ÏеĶñÒâÈí¼þ£¬£¬£¬£¬£¬AV¼ì²âÂʽϵÍ(6/62)£¬£¬£¬£¬£¬Ô´´úÂëÓÚ2021 Äê10Ô¹ûÕæ¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÐÂÑù±¾ËƺõÔ´×Ô¹ûÕæµÄÔ´´úÂ룬£¬£¬£¬£¬±»ÃüÃûΪ¡°Lillin scanner¡±£¬£¬£¬£¬£¬ÆäÒ»¸öÏÔÖøÌØÕ÷ÊDz»»á±»VirusTotalɨÃèÆ½Ì¨¼ì²âµ½¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¿ª·¢Õßɾ³ýÁËBotenaGoÔʼ´úÂëÖÐÏÕЩËùÓеÄÎó²îʹÓ㬣¬£¬£¬£¬×¨×¢ÓÚLilin DVRÖеÄRCEÎó²î¡£¡£¡£
https://securityaffairs.co/wordpress/130383/malware/botenago-botnet-targets-dvr.html
3¡¢Funky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥
¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÀñÎ│ÁãÊÛÉÌFunky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ËûÃÇÔÚÉÏÖÜËÄ·¢Ã÷¸ÃÊÂÎñºó£¬£¬£¬£¬£¬Á¬Ã¦¶Ô´ËÊÂÕö¿ªÊӲ죬£¬£¬£¬£¬È·¶¨Óû§Êý¾Ý±»»á¼ûµÄˮƽ£¬£¬£¬£¬£¬²¢½«ÏµÍ³ÀëÏß¡£¡£¡£Ö±µ½±¾ÖÜÒ»£¬£¬£¬£¬£¬Æä¹ÙÍøÈÔÔÚÌáÐÑ£¬£¬£¬£¬£¬ÓÉÓÚÓöµ½ÁËһЩÎÊÌ⣬£¬£¬£¬£¬ÏÖÔÚÎÞ·¨½ÓÊÜж©µ¥¡£¡£¡£Funky PigeonûÓзÖÏí¸ü¶à¹ØÓÚ¹¥»÷ÐÔ×Ó»ò¹¥»÷Õß»ñµÃ¹«Ë¾ÏµÍ³»á¼ûȨÏÞµÄϸ½ÚÐÅÏ¢¡£¡£¡£
https://www.infosecurity-magazine.com/news/funky-pigeon-cyber-attack/
4¡¢CheckPoint³ÆÁìÓ¢ÊÇ2022ÄêQ1Öб»Ê¹ÓÃ×î¶àµÄÆ·ÅÆ
4ÔÂ19ÈÕ£¬£¬£¬£¬£¬Check Point ResearchÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÆ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ¡£¡£¡£LinkedInÒѳÉΪ´¹ÂÚ¹¥»÷ÖÐ×ģÄâ×î¶àµÄÆ·ÅÆ£¬£¬£¬£¬£¬Õ¼È«ÇòËùÓдËÀàÊÂÎñµÄ52%ÒÔÉÏ£¬£¬£¬£¬£¬ÉÏÒ»¼¾¶ÈÆäÅÅÃûµÚÎ壬£¬£¬£¬£¬½öÓë8%µÄ´¹ÂÚ¹¥»÷Ïà¹Ø¡£¡£¡£±¨¸æÇ¿µ÷Á˹¥»÷ÕßʹÓÃÉç½»ÍøÂçµÄÐÂÇ÷ÊÆ£¬£¬£¬£¬£¬Éç½»ÍøÂçÏÖÔÚÒÑÓâÔ½ÖÖÖÖº½Ô˹«Ë¾ºÍ¹È¸èµÈ¿Æ¼¼¹«Ë¾£¬£¬£¬£¬£¬³ÉΪµÚÒ»´óÖֱ𡣡£¡£Æä´ÎÊÇ¿ìµÝ¹«Ë¾DHL(Õ¼±È14%)£¬£¬£¬£¬£¬ÒÔ¼°¹È¸è(7%)¡¢Î¢Èí(6%)ºÍÁª°î¿ìµÝ(6%)¡£¡£¡£
https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/
5¡¢VaronisÅû¶Æä¿Í»§Ñ¬È¾HiveÀÕË÷Èí¼þµÄÏêϸÐÅÏ¢
4ÔÂ19ÈÕ£¬£¬£¬£¬£¬Çå¾²ºÍÆÊÎö¹«Ë¾VaronisÅû¶ÁËÆäÒ»¸ö¿Í»§Ôâµ½µÄHiveÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£Æäȡ֤ÍŶӳƣ¬£¬£¬£¬£¬Ä¿µÄϵͳÔÚ72СʱÄÚ±»¼ÓÃÜ¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷Àú³Ì×ܹ²°üÀ¨ÁË5¸ö½×¶Î£ºÊ¹ÓÃProxyShell×°ÖúóÃÅ£»£»£»£»£»Ê¹ÓÃPowerShellÏÂÔØCobalt Strike stager£»£»£»£»£»Ê¹ÓÃSYSTEMȨÏÞ½¨ÉèϵͳÖÎÀíÔ±Óû§¡°user¡±£¬£¬£¬£¬£¬²¢Å²ÓÃMimikatzת´¢Æ¾Ö¤£»£»£»£»£»Ê¹ÓÃÇáÁ¿¼¶¹¤¾ßSoftPerfectɨÃèÃô¸ÐÐÅÏ¢£»£»£»£»£»Í¨¹ýÃûΪ¡°Windows.exe¡±µÄpayload×°ÖÃÀÕË÷Èí¼þ¡£¡£¡£
https://www.varonis.com/blog/hive-ransomware-analysis
6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ
KasperskyÔÚ4ÔÂ19ÈÕÐû²¼Á˹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬´ËÀà»î¶¯ÔÚÒ»¸öÔÂÄÚÔöÌíÁË10±¶£¬£¬£¬£¬£¬´Ó2022Äê2ÔµÄÔ¼3000·âÔöÌíµ½3ÔµÄÔ¼30000·â¡£¡£¡£¸Ã»î¶¯Ö÷Òª·Ö·¢¶ñÒâÈí¼þEmotetºÍQbot£¬£¬£¬£¬£¬²¢ÒÔÆóÒµ¹«Ë¾ÎªÄ¿µÄ¡£¡£¡£µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬¼ì²âµ½ÕâЩÓʼþÖÐʹÓõÄÓïÑÔ°üÀ¨Ó¢Óï¡¢·¨Óï¡¢ÐÙÑÀÀûÓï¡¢Òâ´óÀûÓŲÍþÓï¡¢²¨À¼Óï¡¢¶íÓ˹ÂåÎÄÄáÑÇÓï¡¢Î÷°àÑÀÓïºÍÖÐÎÄ¡£¡£¡£CryptolaemusÌåÏÖ£¬£¬£¬£¬£¬Emotet×îÏÈʹÓÃ64λ¼ÓÔØ³ÌÐòºÍÇÔȡģ¿£¿£¿£¿£¿é¡£¡£¡£
https://usa.kaspersky.com/about/press-releases/2022_kaspersky-finds-malicious-spam-campaign-targeting-organizations-grows-10-fold-in-a-month-spreads-qbot-and-emotet-malware


¾©¹«Íø°²±¸11010802024551ºÅ