Òò¹©Ó¦ÉÌÔâµ½¹¥»÷ ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú

Ðû²¼Ê±¼ä 2022-03-02

Òò¹©Ó¦ÉÌÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ÈÕ±¾·áÌïÆû³µµÄ14¼Ò¹¤³§Í£²ú


ÈÕ±¾·áÌïÆû³µÔÚ2ÔÂ28ÈÕÐû²¼£¬£¬£¬£¬£¬£¬½«ÓÚ±¾Öܶþ3ÔÂ1ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬ÔÝÍ£ÈÕ±¾14¼Ò¹¤³§µÄ28ÌõÉú²úÏßµÄÔËÓª¡£¡£¡£´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÆäÖ÷ÒªÁã¼þ¹©Ó¦ÉÌСµº¹¤Òµ£¨Kojima Industries£©µÄϵͳ¹ÊÕÏÔì³ÉµÄ£¬£¬£¬£¬£¬£¬¾Ý±¨µÀ¸Ã¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½«µ¼Ö·áÌïÔÚÈÕ±¾µÄÔ²úÁ¿Ï½µ5%£¬£¬£¬£¬£¬£¬Ô¼ºÏ13000Á¾Æû³µ¡£¡£¡£·áÌïµÄ×Ó¹«Ë¾´ó·¢Æû³µºÍÈÕÒ°Æû³µÒ²½«Í£²ú£¬£¬£¬£¬£¬£¬Éв»Ã÷È·ËüÃÇÊܵ½µÄÏêϸӰÏì¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÈÔ²»È·¶¨´Ë´ÎÖÐÖ¹»áÒ»Á¬¶à¾Ã¡£¡£¡£


https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/


°×¶íÂÞ˹Ìú·Ôâµ½AnonymouÈëÇÖµ¼ÖÂËùÓÐЧÀÍÖÐÖ¹


¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïAnonymouÉù³ÆÒÑÈëÇÖ°×¶íÂÞ˹Ìú·µÄÄÚ²¿ÍøÂ磬£¬£¬£¬£¬£¬²¢¹Ø±ÕËùÓÐЧÀÍ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÍøÕ¾pass.rw.by¡¢portal.rw.by¡¢rw.byÈÔÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬ÇҸùúÌú·ϵͳ±»ÆÈתΪÊÖ¶¯¿ØÖÆÄ£Ê½£¬£¬£¬£¬£¬£¬Õâ¶ÔÁгµµÄÔËÓª±¬·¢Á˼«´óµÄÓ°Ïì¡£¡£¡£¼¸ÈÕǰ£¬£¬£¬£¬£¬£¬Anonymous»¹ÈëÇÖÁ˰׶íÂÞ˹µÄÎäÆ÷ÖÆÔìÉÌTetraedr£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÔ¼200GBµÄµç×ÓÓʼþ¡£¡£¡£


https://securityaffairs.co/wordpress/128486/hacktivism/anonymous-breached-belarusian-railways.html


Ñо¿ÍŶӷ¢Ã÷Õë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯


¾Ý2ÔÂ24Èյı¨µÀ£¬£¬£¬£¬£¬£¬Bitdefender·¢Ã÷Á˽üÆÚÕë¶Ô»¨ÆìÒøÐеĴó¹æÄ£´¹ÂڵĹ¥»÷»î¶¯¡£¡£¡£¸Ã»î¶¯Ê¹ÓôøÓл¨ÆìÒøÐлձêµÄÓʼþ£¬£¬£¬£¬£¬£¬ÒÔÕË»§¶³½áΪÓÕ¶ü£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄµÇ¼αװ³É»¨ÆìÒøÐйÙÍøµÄ´¹ÂÚÍøÕ¾²¢ÊäÈëÓû§IDºÍÃÜÂ룬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÒøÐÐÕË»§ÖеÄÓà¶î¡£¡£¡£¾ÝBitdefenderͳ¼ÆÊý¾Ý£¬£¬£¬£¬£¬£¬´ó²¿·Ö´¹ÂÚÓʼþÕë¶ÔÃÀ¹úÓû§£¨81%£©£¬£¬£¬£¬£¬£¬Æä´ÎΪӢ¹ú£¨7%£©£»£»´ó²¿·ÖÓʼþÀ´×ÔÃÀ¹úµÄIPµØµã£¨40%£©£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÄ«Î÷¸ç£¨13%£©¡£¡£¡£


https://www.bleepingcomputer.com/news/security/citibank-phishing-baits-customers-with-fake-suspension-alerts/


Ñо¿Ö°Ô±¹ûÕæÊýÍòÌõÀÕË÷ÍÅ»ïContiÄÚ²¿µÄ̸Ìì¼Í¼


2ÔÂ27ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïContiÄÚ²¿µÄÊýÍòÌõ̸Ìì¼Í¼¹ûÕæ¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Êý¾ÝÊÇÓÉÎÚ¿ËÀ¼µÄÒ»ÃûÑо¿Ö°Ô±Ð¹Â¶µÄ£¬£¬£¬£¬£¬£¬Ëû¿ÉÒÔ»á¼ûContiµÄXMPP̸ÌìЧÀÍÆ÷µÄejabberdÊý¾Ý¿âºó¶Ë£¬£¬£¬£¬£¬£¬×ܹ²ÓÐ393¸öJSONÎļþ£¬£¬£¬£¬£¬£¬°üÀ¨2021Äê1ÔÂ21ÈÕÖÁ½ñµÄ60694ÌõÐÂÎÅ¡£¡£¡£ÕâЩ¼ÍÂ¼Éæ¼°¸ÃÍÅ»ïÖÖÖֻµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÒÔǰδ¹ûÕæµÄ±»¹¥»÷Ä¿µÄ¡¢Ë½ÈËÊý¾Ýй¶URL¡¢±ÈÌØ±ÒµØµãÒÔ¼°ÓÐ¹ØÆäÔËÓªµÄÌÖÂ۵ȡ£¡£¡£


https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/


CybleÐû²¼Ð¶ñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ


2ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬Cyble ResearchÐû²¼Á˹ØÓÚжñÒâÈí¼þJester StealerµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê7ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬£¬ÒѸüÐÂÁËÆß´Î¡£¡£¡£ËüÊÇÒ»ÖÖ»ùÓÚ.NetµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Í¨³£Î±×°³Étxt¡¢jarºÍbatµÈ¸½¼þ£¬£¬£¬£¬£¬£¬Í¨¹ýÍøÂç´¹ÂÚµç×ÓÓʼþ½øÈëÄ¿µÄϵͳ¡£¡£¡£ÆäÁ¬ÏµÁËÇÔÈ¡³ÌÐò¡¢clipper¡¢¼ÓÃܿ󹤺ͽ©Ê¬ÍøÂçµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬Ê¹ÓÃAES-CBC-256¼ÓÃÜͨѶ£¬£¬£¬£¬£¬£¬Ö§³ÖTorÍøÂ磬£¬£¬£¬£¬£¬½«ÈÕÖ¾ÖØ¶¨Ïòµ½Telegram bots£¬£¬£¬£¬£¬£¬²¢ÔÚй¶֮ǰ»á½«±»µÁÊý¾Ý´æ·ÅÔÚÄÚ´æÖС£¡£¡£


https://blog.cyble.com/2022/02/24/jester-stealer-an-emerging-info-stealer/


Intel 471Ðû²¼PPI¶ñÒâÈí¼þPrivateLoaderµÄÆÊÎö±¨¸æ


¾Ý2ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Intel 471Åû¶Á˰´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þPrivateLoaderµÄϸ½Ú¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉC++±àд£¬£¬£¬£¬£¬£¬¿ÉÒÔÓëºó¶Ë»ù´¡ÉèʩͨѶÀ´¼ìË÷¶ñÒâpayloadµÄURL£¬£¬£¬£¬£¬£¬²¢×°ÖÃÔÚÄ¿µÄÖ÷»úÉÏ£¬£¬£¬£¬£¬£¬Ëü»¹»á´«»ØÖÖÖÖͳ¼ÆÐÅÏ¢£¬£¬£¬£¬£¬£¬ÀýÈçÀÖ³ÉÏÂÔØºÍÆô¶¯ÁËÄÄЩpayload¡£¡£¡£Í¨³£ÒÀÀµ¾­ÓÉSEOÓÅ»¯µÄÆÆ½âÈí¼þÍøÕ¾¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬¿É×°Öò¢Ö´ÐжàÖÖ¶ñÒâpayload£¬£¬£¬£¬£¬£¬ÀýÈçVidar¡¢Raccoon¡¢Redline¡¢Smokeloader¡¢Danabot ¡¢GCleanerºÍDiscoloaderµÈ¡£¡£¡£


https://www.hackread.com/malware-families-pay-per-install-service-expand-targets/




Çå¾²¹¤¾ß


DRAKVUF Sandbox


×Ô¶¯»¯µÄºÚºÐ¶ñÒâÈí¼þÆÊÎöϵͳ£¬£¬£¬£¬£¬£¬ÆäÒý´øÓÐDRAKVUFÒýÇæ£¬£¬£¬£¬£¬£¬²»ÐèÒª¿Í»§²Ù×÷ϵͳÉϵÄÊðÀí¡£¡£¡£


https://github.com/CERT-Polska/drakvuf-sandbox


StayKit


Cobalt Strike ³¤ÆÚÐÔµÄÀ©Õ¹£¬£¬£¬£¬£¬£¬ËüʹÓà SharpStay .NET ³ÌÐò¼¯µÄ execute_assembly º¯Êý¡£¡£¡£


https://github.com/0xthirteen/StayKit


Fennec


Óà Rust ±àдµÄ¹¤¼þÍøÂ繤¾ß£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚ»ùÓÚ *nix µÄϵͳÉϵÄÊÂÎñÏìӦʱ´úʹÓᣡ£¡£


https://github.com/AbdulRhmanAlfaifi/Fennec


request smuggler


Http ÇëÇó×ß˽Îó²îɨÃèÆ÷£¬£¬£¬£¬£¬£¬ÕÒµ½¿ÉÄÜÈÝÒ×Êܵ½ÇëÇó×ß˽Îó²î¹¥»÷µÄЧÀÍÆ÷¡£¡£¡£


https://github.com/Sh1Yo/request_smuggler


Shellcode Template


ÊÊÓÃÓÚ Windows x64/x86µÄÒ×ÓÚÐ޸ĵÄshellcodeÄ£°å¡£¡£¡£


https://github.com/Cracked5pider/ShellcodeTemplate




Çå¾²ÆÊÎö


CVE-2022-23131£ºZabbix ǰ¶ËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


https://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/


ºÚ¿ÍÂÛ̳ Raidforums.com ±»Õþ¸®²é·â


https://www.hackread.com/hacking-forum-raidforums-com-seized-by-authorities/


ÓòÉý¼¶£ºPetitPotam NTLM Öм̵½ ADCS ¶Ëµã


https://www.hackingarticles.in/domain-escalation-petitpotam-ntlm-relay-to-adcs-endpoints/


΢ÈíÐû²¼ÔÚ Windows 11 ÖоÙÐÐÐ嵀 Windows ¸üÐÂË¢ÐÂ


https://news.softpedia.com/news/microsoft-announces-new-windows-update-improvements-in-windows-11-534940.shtml