ShroudedSnooperʹÓÃHTTPSnoop¹¥»÷Öж«µçÐŹ«Ë¾
Ðû²¼Ê±¼ä 2023-09-211¡¢ShroudedSnooperʹÓÃHTTPSnoop¹¥»÷Öж«µçÐŹ«Ë¾
¾Ý9ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Cisco Talos·¢Ã÷ShroudedSnooperʹÓÃкóÃÅHTTPSnoop¹¥»÷Öж«µçÐÅÌṩÉÌ¡£¡£¡£¡£HTTPSnoopÓëWindows HTTPÄÚºËÇý¶¯³ÌÐòºÍ×°±¸½»»¥£¬£¬£¬£¬£¬£¬ÕìÌýÌØ¶¨HTTP(S) URLµÄ´«ÈëÇëÇ󡣡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËPipeSnoop£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔ½ÓÊÜÀ´×ÔÃüÃû¹ÜµÀµÄí§Òâshellcode²¢ÔÚ±»Ñ¬È¾µÄ×°±¸ÉÏÖ´ÐÐËü¡£¡£¡£¡£ÕâÁ½¸öÖ²Èë³ÌÐò¶¼Î±×°³ÉPalo Alto NetworksµÄCortex XDR²úÆ·µÄÇå¾²×é¼þÀ´Èƹý¼ì²â¡£¡£¡£¡£
https://blog.talosintelligence.com/introducing-shrouded-snooper/
2¡¢¼ÓÄôóµÄ×ÔÖúÖµ»úÖÕ¶ËÔâµ½DDoS¹¥»÷Èë¾³·ºÆðÎÊÌâ
¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¼ÓÄôóµÄ×ÔÖúÖµ»úÖÕ¶ËÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÈë¾³·ºÆðÎÊÌâ¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚÉÏÖÜÈÕ£¬£¬£¬£¬£¬£¬¼ÓÄôóÌìϸ÷µØµÄÁìÍÁ¼ì²éÕ¾Öµ»úͤµÄÅÌËã»ú·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬µ¼ÖÂÈë¾³ÓοͰìÀíÊÖÐøµÄËÙÂʼõÂýÁËÒ»¸ö¶àСʱ¡£¡£¡£¡£¼ÓÄôóÁìÍÁЧÀ;֣¨CBSA£©±¾ÖܶþÌåÏÖ£¬£¬£¬£¬£¬£¬Ó°Ïì»ú³¡×ÔÖúЧÀÍÖն˺͵ç×ӵǻú¿ÚµÄÅþÁ¬ÎÊÌâÊÇDDoS¹¥»÷µ¼Öµġ£¡£¡£¡£NoName057ÔÚTelegramÉÏÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷¶Ô¹ú¼Ò»ù´¡ÉèÊ©±¬·¢ÕæÕýÓ°ÏìµÄÇéÐÎ×ÝÈ»²»ÊǵÚÒ»´Î£¬£¬£¬£¬£¬£¬Ò²ÊÇÓÐÊýµÄ¡£¡£¡£¡£
https://www.databreaches.net/outage-at-canadian-airports-was-from-a-ddos-attack/
3¡¢Unit42·¢Ã÷¼ÙCVE-2023-40477 PoC·Ö·¢VenomRAT
Unit42ÔÚ9ÔÂ19ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öαÔìµÄWinRARÎó²îµÄPoC£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢VenomRAT¡£¡£¡£¡£8ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Zero Day Initiative¹ûÕæÁËWinRARÖеÄRCEÎó²î£¨CVE-2023-40477£©£¬£¬£¬£¬£¬£¬ºÚ¿ÍhalersplonkÓÚËÄÌìºóÏòÆäGitHub´æ´¢¿âÌá½»ÁËÒ»¸öαÔìµÄPoC¡£¡£¡£¡£¸ÃPoCÏÖʵÉÏÊǶÔGeoServerÖеÄSQL×¢ÈëÎó²î£¨CVE-2023-25157£©µÄPoCµÄÐ޸ġ£¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬£¬£¬£¬PoC²»»áÔËÐÐÎó²îʹÓóÌÐò£¬£¬£¬£¬£¬£¬¶øÊÇÆô¶¯ÁËÒ»¸öѬȾÁ´À´×°ÖÃVenomRAT payload¡£¡£¡£¡£Unit42ÒÔΪ¹¥»÷Õß²¢²»ÊÇרÃÅÕë¶ÔÑо¿Ö°Ô±µÄ£¬£¬£¬£¬£¬£¬Ïà·´£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇÏ£Íû¹¥»÷ÆäËûÊÔͼʹÓÃÐÂÎó²îµÄ²»·¨·Ö×Ó¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/fake-cve-2023-40477-poc-hides-venomrat/
4¡¢ºÚÝ®Åû¶Õë¶Ô±±ÃÀºÍÑÇÌ«µØÇøµÄ»î¶¯Silent Skimmer
9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ºÚÝ®Åû¶ÁËÒ»¸öÃûΪSilent SkimmerµÄл£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÌ«µØÇøµÄÔÚÏßÖ§¸¶ÆóÒµ¡£¡£¡£¡£¸Ã»î¶¯ÒÑÒ»Á¬Ò»Äê¶à£¬£¬£¬£¬£¬£¬Õë¶ÔÍйܻò½¨ÉèÖ§¸¶»ù´¡ÉèÊ©µÄ²î±ðÐÐÒµ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃWebÓ¦ÓûñµÃ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬È»ºó°²ÅÅÖÖÖÖ¹¤¾ßºÍÊÖÒÕ£¬£¬£¬£¬£¬£¬°üÀ¨¿ªÔ´¹¤¾ßºÍLOLBAS£¬£¬£¬£¬£¬£¬ËùÓй¤¾ßºÍpayload¶¼ÍйÜÔÚVPSÉϵÄHTTPÎļþЧÀÍÆ÷(HFS)ÖС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃASP.NET AJAXµÄ.NET·´ÐòÁл¯Îó²î(CVE-2019-18935)ÔÚЧÀÍÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¸Ã»î¶¯Ä¿µÄÊÇÔÚÄ¿µÄʵÌåµÄ¸¶¿î½áÕËÒ³ÃæÉϰ²ÅÅweb skimmer£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Óû§Õ˵¥ºÍÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÎñÊý¾Ý¡£¡£¡£¡£
https://blogs.blackberry.com/en/2023/09/silent-skimmer-online-payment-scraping-campaign-shifts-targets-from-apac-to-nala
5¡¢¹ú¼ÊÐÌÊ·¨Ôº£¨ICC£©Í¸Â¶ÆäϵͳÔâµ½ºÚ¿ÍÈëÇÖ
ýÌå9ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¹ú¼ÊÐÌÊ·¨Ôº£¨ICC£©Í¸Â¶ÆäϵͳÔâµ½Á˺ڿÍÈëÇÖ¡£¡£¡£¡£·¨ÔºÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬ICCµÄЧÀͲ¿·Ö¼ì²âµ½Ó°ÏìÆäÐÅϢϵͳµÄÒì³£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬ÒÑÁ¬Ã¦½ÓÄɲ½·¥Ó¦¶ÔÕâÒ»ÍøÂçÇå¾²ÊÂÎñ²¢¼õÇáÆäÓ°Ïì¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬»¹Ã»ÓйØÓÚÍøÂç¹¥»÷µÄÐÔ×ӺͶÔICCϵͳµÄÓ°ÏìˮƽµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬Ò²Ã»ÓйØÓÚ¹¥»÷ÕßÊÇ·ñ»á¼û»òÇÔÈ¡ÁËÊý¾Ý»òÎļþµÄÐÅÏ¢¡£¡£¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬£¬»áÓÅÏÈ˼Á¿È·±£·¨ÔºµÄ½¹µãÊÂÇé¼ÌÐø¾ÙÐУ¬£¬£¬£¬£¬£¬²¢½«ÔÚÏÖÔÚ¾ÙÐеÄÏÖÓÐÊÂÇéµÄ»ù´¡ÉÏÔöÇ¿ÆäÍøÂçÇå¾²¿ò¼Ü£¬£¬£¬£¬£¬£¬°üÀ¨¼ÓËÙÔÆÊÖÒÕµÄʹÓᣡ£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-breached-international-criminal-courts-systems-last-week/
6¡¢Check PointÐû²¼¹ØÓÚRemcosºÍGuLoaderµÄÆÊÎö±¨¸æ
9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Check PointÐû²¼Á˹ØÓÚRemcosºÍGuLoaderµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ÕâÁ½¸ö³ÌÐò±»¶¨Î»ÎªÕýµ±¹¤¾ß£¬£¬£¬£¬£¬£¬ËäÈ»Âô¼ÒÒ²Éù³ÆÕâЩ¹¤¾ßÖ»ÄÜÕýµ±Ê¹Ó㬣¬£¬£¬£¬£¬µ«ÊÂʵÊÇËûÃǵÄÖ÷Òª¿Í»§ÕýÊÇÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷Á½ÕßÖ®¼ä±£´æÇ×½üµÄÁªÏµ£¬£¬£¬£¬£¬£¬ÓÉÓÚRemcosºÜÈÝÒ×±»É±¶¾Èí¼þ¼ì²âµ½£¬£¬£¬£¬£¬£¬Òò´ËºÜÄÑÓÃÓÚ¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉÊÇGuLoader¿ÉÓÃÓÚ×ÊÖúÆäÈÆ¹ý¼ì²â¡£¡£¡£¡£»£»£»£»£¼ÙÃûΪEMIN§ïMµÄÈËÖÎÀí×ÅÕýµ±ÍøÕ¾BreakingSecurityºÍVgoStore£¬£¬£¬£¬£¬£¬ÒÔÐÂÃû³ÆTheProtect¹ûÕæÏúÊÛRemcosºÍGuLoader¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬EMIN§ïM»¹Ôø¼ÓÈëFormbookºÍAmadey LoaderµÈ¶ñÒâÈí¼þµÄÈö²¥¡£¡£¡£¡£
https://research.checkpoint.com/2023/unveiling-the-shadows-the-dark-alliance-between-guloader-and-remcos/


¾©¹«Íø°²±¸11010802024551ºÅ