ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷ ¡£¡£¡£¡£¡£8ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â ¡£¡£¡£¡£¡£Í¬ÈÕ£¬£¬£¬£¬£¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷ ¡£¡£¡£¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬£¬£¬£¬£¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ ¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬£¬£¬£¬£¬£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑÇסÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷ ¡£¡£¡£¡£¡£Ôڴ˴λÖй¥»÷ÕßÌáÐÑÄ¿µÄÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬£¬£¬£¬£¬£¬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍÉó²é ¡£¡£¡£¡£¡£Ò»µ©Óû§µã»÷Á´½Ó£¬£¬£¬£¬£¬£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔAndroidÓû§£¬£¬£¬£¬£¬£¬¾ßÓÐÇÔȡ֧¸¶¿¨ÏêϸÐÅÏ¢¡¢×èµ²¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢»á¼ûȨÏ޵ȹ¦Ð§ ¡£¡£¡£¡£¡£FlubotÔçÔÚ½ñÄêÄêÍ·¾Í¹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬²¢ÔÚ±¾ÔÂ×îÏÈÕë¶Ô°Ä´óÀûÑÇÓû§ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸ £¿£¿£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¹ú·À²¿ÍøÂç˾ÁÕýÔÚ֪ͨÊÜÓ°ÏìµÄÈË ¡£¡£¡£¡£¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬µ«ËüÔö²¹ËµÕâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷ ¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÊǺÎʱ±»·¢Ã÷£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬¹¥»÷¿ÉÄܱ¬·¢ÔÚ¼¸ÖÜǰ ¡£¡£¡£¡£¡£¹úÎñÔº½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚ½ÓÄɲ½·¥ÒÔÈ·±£ÐÅÏ¢¿ÉÒÔÊܵ½±£» £»£»£»¤£¬£¬£¬£¬£¬£¬²¢ÇÒ³öÓÚÇå¾²Ôµ¹ÊÔ­ÓÉÎÞ·¨ÌÖÂÛ¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨.png


CISAÐû²¼ÁËÓйؽüÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨ ¡£¡£¡£¡£¡£¸Ã¾¯±¨Ö¸³ö£¬£¬£¬£¬£¬£¬ÔÚÖØ´ó×ÔÈ»ÔÖÄÑÖ®ºó£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£» £»£»£»áºÜ³£¼û ¡£¡£¡£¡£¡£×éÖ¯ºÍСÎÒ˽¼ÒÔÚ´¦Öóͷ£´øÓÐÓëì«·çÏà¹ØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱÐèҪСÐÄÉóÉ÷ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÒªÐ¡ÐÄÓë±°ÁÓÌìÆøÊÂÎñÏà¹ØµÄÉ罻ýÌåÇëÇó¡¢Îı¾»òÏßÏ» ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ.jpg


Cisco TalosÐû²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÉÏÒ»¼¾¶È£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÊ״β»ÔÙÕ¼ÓÐÖ÷ҪλÖ㬣¬£¬£¬£¬£¬ÍƲâÕâ¿ÉÄÜÊÇÓÉMicrosoft Exchange Îó²îʹÓûµÄ´ó·ùÔöÌíµ¼Ö嵀 ¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬£¬£¬£¬£¬£¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£©£¬£¬£¬£¬£¬£¬ÓÖ³ÉΪ×î´óµÄÍþв ¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬Ö÷ÒªµÄÀÕË÷Èí¼þ°üÀ¨REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬£¬£¬£¬£¬£¬±¾¼¾¶ÈµÄÇå¾²¼ì²âÈÆ¹ýÊÖÒÕµÄʹÓÃÓÐËùÔöÌí ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html