AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý

Ðû²¼Ê±¼ä 2022-04-21
1¡¢AWSµÄ¶à¸öLog4ShellÈȲ¹¶¡¿Éµ¼ÖÂÈÝÆ÷ÌÓÒݺÍȨÏÞÌáÉý


4ÔÂ19ÈÕ £¬Unit 42Ðû²¼±¨¸æ³ÆAWSµÄ¶à¸öLog4ShellÈȲ¹¶¡Öб£´æÑÏÖØµÄÎÊÌâ¡£½«²¹¶¡×°Öõ½·þÎñÆ÷»ò¼¯Èººó £¬¸ÃÇéÐÎÖеÄÿ¸öÈÝÆ÷¶¼¿ÉÒÔʹÓÃÆäÀ´½ÓÊܵײãÖ÷»ú £¬ÀýÈç £¬Kubernetes¼¯ÈºÖеÄÈÝÆ÷¶¼¿ÉÒÔÌÓÒÝ £¬·ÇÌØÈ¨Àú³ÌÒ²¿ÉÒÔʹÓøò¹¶¡À´ÌáȨ¡£ÏÖÔÚ £¬ÕâЩÎó²î×·×ÙΪCVE-2021-3100¡¢CVE-2021-3101¡¢CVE-2022-0070ºÍCVE-2022-0071 £¬CVSSÆÀ·Ö¾ùΪ8.8¡£Ñо¿Ö°Ô±ÓÚÈ¥Äê12ÔÂ21ÈÕ±¨¸æ¸ÃÎó²î £¬ÑÇÂíÑ·ÓÚ4ÔÂ19ÈÕÐÞ¸´¡£


https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/


2¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçBotenaGo×îÏȹ¥»÷LilinµÄDVR


ýÌå4ÔÂ20ÈÕ±¨µÀ £¬Nozomi Networks Labs·¢Ã÷½©Ê¬ÍøÂçBotenaGoµÄÐÂÑù±¾¹¥»÷LilinµÄDVR¡£BotenaGoÊÇÓÃGolang±àдµÄÏà¶Ô½ÏеĶñÒâÈí¼þ £¬AV¼ì²âÂʽϵÍ(6/62) £¬Ô´´úÂëÓÚ2021 Äê10Ô¹ûÕæ¡£Ñо¿Ö°Ô±³Æ £¬ÐÂÑù±¾ËƺõÔ´×Ô¹ûÕæµÄÔ´´úÂë £¬±»ÃüÃûΪ¡°Lillin scanner¡± £¬ÆäÒ»¸öÏÔÖøÌØÕ÷ÊDz»»á±»VirusTotalɨÃèÆ½Ì¨¼ì²âµ½¡£¾ÝϤ £¬¿ª·¢Õßɾ³ýÁËBotenaGoԭʼ´úÂëÖÐÏÕЩËùÓеÄÎó²îʹÓà £¬×¨×¢ÓÚLilin DVRÖеÄRCEÎó²î¡£


https://securityaffairs.co/wordpress/130383/malware/botenago-botnet-targets-dvr.html


3¡¢Funky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥


¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ £¬ÀñÎ│ÁãÊÛÉÌFunky PigeonÔâµ½ÍøÂç¹¥»÷ºóÔÝÍ£½ÓÊÜж©µ¥¡£¸Ã¹«Ë¾ÌåÏÖ £¬ËûÃÇÔÚÉÏÖÜËÄ·¢Ã÷¸ÃÊÂÎñºó £¬Á¬Ã¦¶Ô´ËÊÂÕö¿ªÊÓ²ì £¬È·¶¨Óû§Êý¾Ý±»»á¼ûµÄˮƽ £¬²¢½«ÏµÍ³ÀëÏß¡£Ö±µ½±¾ÖÜÒ» £¬Æä¹ÙÍøÈÔÔÚÌáÐÑ £¬ÓÉÓÚÓöµ½ÁËһЩÎÊÌâ £¬ÏÖÔÚÎÞ·¨½ÓÊÜж©µ¥¡£Funky PigeonûÓзÖÏí¸ü¶à¹ØÓÚ¹¥»÷ÐÔ×Ó»ò¹¥»÷Õß»ñµÃ¹«Ë¾ÏµÍ³»á¼ûȨÏÞµÄϸ½ÚÐÅÏ¢¡£


https://www.infosecurity-magazine.com/news/funky-pigeon-cyber-attack/


4¡¢CheckPoint³ÆÁìÓ¢ÊÇ2022ÄêQ1Öб»Ê¹ÓÃ×î¶àµÄÆ·ÅÆ


4ÔÂ19ÈÕ £¬Check Point ResearchÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÆ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ¡£LinkedInÒѳÉΪ´¹ÂÚ¹¥»÷ÖÐ×ģÄâ×î¶àµÄÆ·ÅÆ £¬Õ¼È«ÇòËùÓдËÀàÊÂÎñµÄ52%ÒÔÉÏ £¬ÉÏÒ»¼¾¶ÈÆäÅÅÃûµÚÎå £¬½öÓë8%µÄ´¹ÂÚ¹¥»÷Ïà¹Ø¡£±¨¸æÇ¿µ÷Á˹¥»÷ÕßʹÓÃÉç½»ÍøÂçµÄÐÂÇ÷ÊÆ £¬Éç½»ÍøÂçÏÖÔÚÒÑÓâÔ½ÖÖÖÖº½Ô˹«Ë¾ºÍ¹È¸èµÈ¿Æ¼¼¹«Ë¾ £¬³ÉΪµÚÒ»´óÖÖ±ð¡£Æä´ÎÊÇ¿ìµÝ¹«Ë¾DHL(Õ¼±È14%) £¬ÒÔ¼°¹È¸è(7%)¡¢Î¢Èí(6%)ºÍÁª°î¿ìµÝ(6%)¡£


https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/


5¡¢VaronisÅû¶Æä¿Í»§Ñ¬È¾HiveÀÕË÷Èí¼þµÄÏêϸÐÅÏ¢


4ÔÂ19ÈÕ £¬Çå¾²ºÍÆÊÎö¹«Ë¾VaronisÅû¶ÁËÆäÒ»¸ö¿Í»§Ôâµ½µÄHiveÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢¡£Æäȡ֤ÍŶӳÆ £¬Ä¿µÄϵͳÔÚ72СʱÄÚ±»¼ÓÃÜ¡£ÆÊÎö±¨¸æÖ¸³ö £¬¹¥»÷Àú³Ì×ܹ²°üÀ¨ÁË5¸ö½×¶Î£ºÊ¹ÓÃProxyShell×°ÖúóÃÅ£»Ê¹ÓÃPowerShellÏÂÔØCobalt Strike stager£»Ê¹ÓÃSYSTEMȨÏÞ½¨Éèϵͳ¹ÜÀíÔ±Óû§¡°user¡± £¬²¢Å²ÓÃMimikatzת´¢Æ¾Ö¤£»Ê¹ÓÃÇáÁ¿¼¶¹¤¾ßSoftPerfectɨÃèÃô¸ÐÐÅÏ¢£»Í¨¹ýÃûΪ¡°Windows.exe¡±µÄpayload×°ÖÃÀÕË÷Èí¼þ¡£


https://www.varonis.com/blog/hive-ransomware-analysis


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ


KasperskyÔÚ4ÔÂ19ÈÕÐû²¼Á˹ØÓÚ¶ñÒâÀ¬»øÓʼþ»î¶¯µÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö £¬´ËÀà»î¶¯ÔÚÒ»¸öÔÂÄÚÔöÌíÁË10±¶ £¬´Ó2022Äê2ÔµÄÔ¼3000·âÔöÌíµ½3ÔµÄÔ¼30000·â¡£¸Ã»î¶¯Ö÷Òª·Ö·¢¶ñÒâÈí¼þEmotetºÍQbot £¬²¢ÒÔÆóÒµ¹«Ë¾ÎªÄ¿µÄ¡£µ½ÏÖÔÚΪֹ £¬¼ì²âµ½ÕâЩÓʼþÖÐʹÓõÄÓïÑÔ°üÀ¨Ó¢Óï¡¢·¨Óï¡¢ÐÙÑÀÀûÓï¡¢Òâ´óÀûÓŲÍþÓï¡¢²¨À¼Óï¡¢¶íÓ˹ÂåÎÄÄáÑÇÓï¡¢Î÷°àÑÀÓïºÍÖÐÎÄ¡£CryptolaemusÌåÏÖ £¬Emotet×îÏÈʹÓÃ64λ¼ÓÔØ³ÌÐòºÍÇÔȡģ¿é¡£


https://usa.kaspersky.com/about/press-releases/2022_kaspersky-finds-malicious-spam-campaign-targeting-organizations-grows-10-fold-in-a-month-spreads-qbot-and-emotet-malware