΢Èí·¢Ã÷³¯Ïʹ¥»÷ÕßʹÓÃH0lyGh0st¹¥»÷ÖÐСÐÍÆóÒµ
Ðû²¼Ê±¼ä 2022-07-18
7ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æÆÊÎöÁ˳¯ÏÊDEV-0530£¨×Ô³ÆÎªH0lyGh0st£©µÄ¹¥»÷Õ½ÂÔÒÔ¼°ÆäÀÕË÷Èí¼þµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÒ»Ö±ÔÚ¿ª·¢ºÍʹÓÃÀÕË÷Èí¼þ¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬²¢ÔçÔÚ2021Äê9Ô¾ÍÀÖ³ÉÈëÇÖÁ˶à¸ö¹ú¼ÒµÄСÐÍÆóÒµ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«¸ÃÍÅ»ïµÄÀÕË÷Èí¼þ¹éÀàΪÁ½¸öϵÁУºSiennaPurpleºÍSiennaBlue£¬£¬£¬£¬£¬£¬²¢ÔÚÕâЩϵÁÐÏÂÈ·¶¨ÁËËĸö±äÌ壺BTLC_C.exe¡¢HolyRS.exe¡¢HolyLock.exeºÍBLTC.exe¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/
2¡¢ÃÀ¹úÖÐÇé¾Öǰ¹¤³ÌʦÒòVault 7й¶ÊÂÎñ¶ø±»ÖÎ×ï
¾Ý7ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Å¦Ô¼µÄÒ»¸öÁª°îÅãÉóÍÅÐû²¼£¬£¬£¬£¬£¬£¬ÖÐÑëÇ鱨¾ÖÈí¼þ¹¤³ÌʦÏòά»ù½âÃÜÍøÕ¾(WikiLeaks)й¶´ó×ÚÉñÃØÎļþµÄ×ïÃû½¨Éè¡£¡£¡£¡£¡£ÏÖÄê33ËêµÄJoshua SchulteÃæÁٵľÅÏîÖ¸¿Ø×ïÃû¾ù½¨É裬£¬£¬£¬£¬£¬°üÀ¨²»·¨ÍøÂç¹ú·ÀÐÅÏ¢µÈ¡£¡£¡£¡£¡£Î¬»ù½âÃܽ«ÕâЩÉñÃØÎļþÃüÃûΪ¡°Vault 7¡±£¬£¬£¬£¬£¬£¬²¢ÔÚ2017ÄêÐû²¼£¬£¬£¬£¬£¬£¬ÕâЩÎļþÏêϸ½ÒÆÆÁËCIAÔõÑùÈëÇÖµçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ó¦Óú͵çÊÓ»úµÈ¡£¡£¡£¡£¡£Î¬»ù½âÃܳƣ¬£¬£¬£¬£¬£¬Vault 7ÊÇÓÐÊ·ÒÔÀ´¹ØÓÚCIAµÄ×î´óÒ»´ÎÉñÃØÎļþÐû²¼¡£¡£¡£¡£¡£¸ß¼¶Ç鱨¹ÙÔ±ÆÕ±éÒÔΪ£¬£¬£¬£¬£¬£¬ÕâÊǶÔÃÀ¹úÌØ¹¤»ú½á¹¹³É¹¥»÷µÄ×î¾ßÆÆËðÐÔµÄйÃÜÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£
https://thehackernews.com/2022/07/former-cia-engineer-convicted-of.html
3¡¢Cloudflare³ÆÆä½üǧÃû¿Í»§Ôâµ½À´×ÔMantisµÄDDoS¹¥»÷
ýÌå7ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬CloudflareÌåÏÖÆäÔÚ6Ô·ݻº½âÁËÀ´×ÔMantisµÄ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£MantisÖ÷ÒªÕë¶ÔITºÍµçÐÅÐÐÒµ(36%)¡¢ÐÂÎÅýÌåºÍ³öÊéÎïÐÐÒµ(15%)¡¢½ðÈÚÐÐÒµ(10%) ºÍÓÎÏ·ÐÐÒµ(12%)µÄʵÌå¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù30ÌìÀ£¬£¬£¬£¬£¬Æä½üǧÃû¿Í»§Ôâµ½ÁË3000¶à´ÎDDoS¹¥»÷¡£¡£¡£¡£¡£ÓëÓÉIoT×°±¸×é³ÉµÄ¹Å°å½©Ê¬ÍøÂç²î±ð£¬£¬£¬£¬£¬£¬MantisʹÓõÄÊDZ»Ð®ÖƵÄÐéÄâ»úºÍЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Ëü½öÓÃ5000¶à¸ö»úеÈ˾ÍÄÜÿÃëÌìÉú2600Íò¸öHTTPSÇëÇ󡣡£¡£¡£¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔÃÀ¹ú(20%)ºÍ¶íÂÞ˹(15%)£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÍÁ¶úÆä¡¢·¨¹úºÍ²¨À¼µÈ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/mantis-botnet-behind-the-record-breaking-ddos-attack-in-june/
4¡¢Netwrix AuditorÖб£´æ¿ÉÓÃÀ´Ö´ÐÐí§Òâ´úÂëµÄÎó²î
¾Ý7ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Bishop FoxµÄÔÚNetwrix AuditorÈí¼þÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÊÜÓ°ÏìµÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Netwrix AuditorÊÇÒ»¿îÔÊÐí×éÖ¯¼à¿ØÆäIT»ù´¡ÉèÊ©µÄÉó¼ÆÈí¼þ£¬£¬£¬£¬£¬£¬±»È«ÇòÓÐÁè¼Ý11000¸ö×é֯ʹÓᣡ£¡£¡£¡£ÕâÊÇÒ»¸ö²»Çå¾²µÄ¹¤¾ß·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬»ù´¡Ôµ¹ÊÔÓÉÊDZ£´æÒ»¸ö²»Çå¾²µÄ.NETÔ¶³Ì´¦Öóͷ£Ð§ÀÍ£¬£¬£¬£¬£¬£¬¿ÉÔÚNetwrixЧÀÍÆ÷ÉϵÄTCP¶Ë¿Ú9004ÉÏ»á¼û£¬£¬£¬£¬£¬£¬Äܱ»ÓÃÀ´ÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¸ÃÏÂÁîÊÇÒÔNT AUTHORITY/SYSTEMȨÏÞÖ´Ðе쬣¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÍêÈ«¿ØÖÆNetwrixЧÀÍÆ÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Îó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/133310/hacking/netwrix-auditor-flaw.html
5¡¢Unit 42͸¶Õë¶ÔElastix VoIPϵͳµÄ¹¥»÷»î¶¯µÄϸ½Ú
7ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»³¡Õë¶ÔElastix VoIPµç»°Ð§ÀÍÆ÷µÄ´ó¹æÄ£»£»£»£»î¶¯¡£¡£¡£¡£¡£ElastixÊÇͳһͨѶµÄЧÀÍÆ÷Èí¼þ£¬£¬£¬£¬£¬£¬ÓÃÓÚFreePBXµÄDigiumµç»°Ä£¿£¿£¿é¡£¡£¡£¡£¡£¹¥»÷»î¶¯×îÏÈ×Ô2021Äê12Ô£¬£¬£¬£¬£¬£¬ÖÁ2022Äê3ÔÂÑо¿Ö°Ô±ÒÑ·¢Ã÷ÁËÁè¼Ý50Íò¸ö¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷Õß»áͨ¹ýÔÚÄ¿µÄµÄDigiumÈí¼þÖÐÏÂÔØºÍÖ´ÐÐÌØÁíÍâpayload£¬£¬£¬£¬£¬£¬Ö²ÈëÒ»¸öweb shellÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¾Íʱ¼äÏß¶øÑÔ£¬£¬£¬£¬£¬£¬Web shellËÆºõÓëRest Phone Apps(restapps)Ä£¿£¿£¿éÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-45461£©Ïà¹Ø¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/digium-phones-web-shell/
6¡¢Wordfence³Æ´ó¹æÄ£¹¥»÷»î¶¯ÒÑɨÃè160Íò¸öWPÍøÕ¾
¾ÝýÌå7ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬WordfenceÑо¿Ö°Ô±¼ì²âµ½ÁËÒ»³¡´ó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬ÒѾɨÃèÁ˽ü160Íò¸öWordPressÍøÕ¾¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ÒªÕë¶ÔKaswara Modern WPBakeryÒ³ÃæÌìÉúÆ÷£¬£¬£¬£¬£¬£¬¸Ã²å¼þÒѱ»Æä¿ª·¢Õß·ÅÆú¡£¡£¡£¡£¡£¾ÝWordfenceÒ£²âÊý¾Ý£¬£¬£¬£¬£¬£¬¹¥»÷´Ó7ÔÂ4ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬Æ½¾ùÌìÌìÓÐ443868´Î¹¥»÷ʵÑé¡£¡£¡£¡£¡£¹¥»÷Õß»áÏò¡°wp-admin/admin-ajax/php¡±·¢ËÍPOSTÇëÇ󣬣¬£¬£¬£¬£¬²¢Ê¹Óòå¼þµÄ¡°uploadFontIcon¡±AJAXº¯ÊýÉÏ´«°üÀ¨PHPÎļþµÄ¶ñÒâZIP payload¡£¡£¡£¡£¡£ÕâЩ¹¥»÷À´×Ô10215¸ö²î±ðµÄIPµØµã£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦É¾³ý¸Ã²å¼þ£¬£¬£¬£¬£¬£¬²¢×èÖ¹¹¥»÷ÕßʹÓõÄIPµØµã¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/attackers-scan-16-million-wordpress-sites-for-vulnerable-plugin/


¾©¹«Íø°²±¸11010802024551ºÅ