AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý

Ðû²¼Ê±¼ä 2022-04-21
1¡¢AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý


4ÔÂ19ÈÕ£¬£¬£¬ £¬Unit 42Ðû²¼±¨¸æ³ÆAWSµÄ¶à¸öLog4ShellÈȲ¹¶¡Öб£´æÑÏÖØµÄÎÊÌâ¡£¡£¡£½«²¹¶¡×°Öõ½Ð§ÀÍÆ÷»ò¼¯Èººó£¬£¬£¬ £¬¸ÃÇéÐÎÖеÄÿ¸öÈÝÆ÷¶¼¿ÉÒÔʹÓÃÆäÀ´½ÓÊܵײãÖ÷»ú£¬£¬£¬ £¬ÀýÈ磬£¬£¬ £¬Kubernetes¼¯ÈºÖеÄÈÝÆ÷¶¼¿ÉÒÔÌÓÒÝ£¬£¬£¬ £¬·ÇÌØÈ¨Àú³ÌÒ²¿ÉÒÔʹÓøò¹¶¡À´ÌáȨ¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬ÕâЩÎó²î×·×ÙΪCVE-2021-3100¡¢CVE-2021-3101¡¢CVE-2022-0070ºÍCVE-2022-0071£¬£¬£¬ £¬CVSSÆÀ·Ö¾ùΪ8.8¡£¡£¡£Ñо¿Ö°Ô±ÓÚÈ¥Äê12ÔÂ21ÈÕ±¨¸æ¸ÃÎó²î£¬£¬£¬ £¬ÑÇÂíÑ·ÓÚ4ÔÂ19ÈÕÐÞ¸´¡£¡£¡£


https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/


2¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçBotenaGo×îÏȹ¥»÷LilinµÄDVR


ýÌå4ÔÂ20ÈÕ±¨µÀ£¬£¬£¬ £¬Nozomi Networks Labs·¢Ã÷½©Ê¬ÍøÂçBotenaGoµÄÐÂÑù±¾¹¥»÷LilinµÄDVR¡£¡£¡£BotenaGoÊÇÓÃGolang±àдµÄÏà¶Ô½ÏеĶñÒâÈí¼þ£¬£¬£¬ £¬AV¼ì²âÂʽϵÍ(6/62)£¬£¬£¬ £¬Ô´´úÂëÓÚ2021 Äê10Ô¹ûÕæ¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬ÐÂÑù±¾ËƺõÔ´×Ô¹ûÕæµÄÔ´´úÂ룬£¬£¬ £¬±»ÃüÃûΪ¡°Lillin scanner¡±£¬£¬£¬ £¬ÆäÒ»¸öÏÔÖøÌØÕ÷ÊDz»»á±»VirusTotalɨÃèÆ½Ì¨¼ì²âµ½¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬¿ª·¢Õßɾ³ýÁËBotenaGoԭʼ´úÂëÖÐÏÕЩËùÓеÄÎó²îʹÓ㬣¬£¬ £¬×¨×¢ÓÚLilin DVRÖеÄRCEÎó²î¡£¡£¡£


https://securityaffairs.co/wordpress/130383/malware/botenago-botnet-targets-dvr.html


3¡¢Funky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥


¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬ÀñÎ│ÁãÊÛÉÌFunky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬ £¬ËûÃÇÔÚÉÏÖÜËÄ·¢Ã÷¸ÃÊÂÎñºó£¬£¬£¬ £¬Á¬Ã¦¶Ô´ËÊÂÕö¿ªÊӲ죬£¬£¬ £¬È·¶¨Óû§Êý¾Ý±»»á¼ûµÄˮƽ£¬£¬£¬ £¬²¢½«ÏµÍ³ÀëÏß¡£¡£¡£Ö±µ½±¾ÖÜÒ»£¬£¬£¬ £¬Æä¹ÙÍøÈÔÔÚÌáÐÑ£¬£¬£¬ £¬ÓÉÓÚÓöµ½ÁËһЩÎÊÌ⣬£¬£¬ £¬ÏÖÔÚÎÞ·¨½ÓÊÜж©µ¥¡£¡£¡£Funky PigeonûÓзÖÏí¸ü¶à¹ØÓÚ¹¥»÷ÐÔ×Ó»ò¹¥»÷Õß»ñµÃ¹«Ë¾ÏµÍ³»á¼ûȨÏÞµÄϸ½ÚÐÅÏ¢¡£¡£¡£


https://www.infosecurity-magazine.com/news/funky-pigeon-cyber-attack/


4¡¢CheckPoint³ÆÁìÓ¢ÊÇ2022ÄêQ1Öб»Ê¹ÓÃ×î¶àµÄÆ·ÅÆ


4ÔÂ19ÈÕ£¬£¬£¬ £¬Check Point ResearchÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÆ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ¡£¡£¡£LinkedInÒѳÉΪ´¹ÂÚ¹¥»÷ÖÐ×ģÄâ×î¶àµÄÆ·ÅÆ£¬£¬£¬ £¬Õ¼È«ÇòËùÓдËÀàÊÂÎñµÄ52%ÒÔÉÏ£¬£¬£¬ £¬ÉÏÒ»¼¾¶ÈÆäÅÅÃûµÚÎ壬£¬£¬ £¬½öÓë8%µÄ´¹ÂÚ¹¥»÷Ïà¹Ø¡£¡£¡£±¨¸æÇ¿µ÷Á˹¥»÷ÕßʹÓÃÉç½»ÍøÂçµÄÐÂÇ÷ÊÆ£¬£¬£¬ £¬Éç½»ÍøÂçÏÖÔÚÒÑÓâÔ½ÖÖÖÖº½Ô˹«Ë¾ºÍ¹È¸èµÈ¿Æ¼¼¹«Ë¾£¬£¬£¬ £¬³ÉΪµÚÒ»´óÖֱ𡣡£¡£Æä´ÎÊÇ¿ìµÝ¹«Ë¾DHL(Õ¼±È14%)£¬£¬£¬ £¬ÒÔ¼°¹È¸è(7%)¡¢Î¢Èí(6%)ºÍÁª°î¿ìµÝ(6%)¡£¡£¡£


https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/


5¡¢VaronisÅû¶Æä¿Í»§Ñ¬È¾HiveÀÕË÷Èí¼þµÄÏêϸÐÅÏ¢


4ÔÂ19ÈÕ£¬£¬£¬ £¬Çå¾²ºÍÆÊÎö¹«Ë¾VaronisÅû¶ÁËÆäÒ»¸ö¿Í»§Ôâµ½µÄHiveÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£Æäȡ֤ÍŶӳÆ£¬£¬£¬ £¬Ä¿µÄϵͳÔÚ72СʱÄÚ±»¼ÓÃÜ¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬ £¬¹¥»÷Àú³Ì×ܹ²°üÀ¨ÁË5¸ö½×¶Î£ºÊ¹ÓÃProxyShell×°ÖúóÃÅ£»£»£»£»£»Ê¹ÓÃPowerShellÏÂÔØCobalt Strike stager£»£»£»£»£»Ê¹ÓÃSYSTEMȨÏÞ½¨ÉèϵͳÖÎÀíÔ±Óû§¡°user¡±£¬£¬£¬ £¬²¢Å²ÓÃMimikatzת´¢Æ¾Ö¤£»£»£»£»£»Ê¹ÓÃÇáÁ¿¼¶¹¤¾ßSoftPerfectɨÃèÃô¸ÐÐÅÏ¢£»£»£»£»£»Í¨¹ýÃûΪ¡°Windows.exe¡±µÄpayload×°ÖÃÀÕË÷Èí¼þ¡£¡£¡£


https://www.varonis.com/blog/hive-ransomware-analysis


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ


KasperskyÔÚ4ÔÂ19ÈÕÐû²¼Á˹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬´ËÀà»î¶¯ÔÚÒ»¸öÔÂÄÚÔöÌíÁË10±¶£¬£¬£¬ £¬´Ó2022Äê2ÔµÄÔ¼3000·âÔöÌíµ½3ÔµÄÔ¼30000·â¡£¡£¡£¸Ã»î¶¯Ö÷Òª·Ö·¢¶ñÒâÈí¼þEmotetºÍQbot£¬£¬£¬ £¬²¢ÒÔÆóÒµ¹«Ë¾ÎªÄ¿µÄ¡£¡£¡£µ½ÏÖÔÚΪֹ£¬£¬£¬ £¬¼ì²âµ½ÕâЩÓʼþÖÐʹÓõÄÓïÑÔ°üÀ¨Ó¢Óï¡¢·¨Óï¡¢ÐÙÑÀÀûÓï¡¢Òâ´óÀûÓŲÍþÓï¡¢²¨À¼Óï¡¢¶íÓ˹ÂåÎÄÄáÑÇÓï¡¢Î÷°àÑÀÓïºÍÖÐÎÄ¡£¡£¡£CryptolaemusÌåÏÖ£¬£¬£¬ £¬Emotet×îÏÈʹÓÃ64λ¼ÓÔØ³ÌÐòºÍÇÔȡģ¿£¿£¿£¿£¿é¡£¡£¡£


https://usa.kaspersky.com/about/press-releases/2022_kaspersky-finds-malicious-spam-campaign-targeting-organizations-grows-10-fold-in-a-month-spreads-qbot-and-emotet-malware