΢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö±Õë¶ÔÃÀ¹ú»ù´¡ÉèÊ©

Ðû²¼Ê±¼ä 2023-05-26

1¡¢Î¢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö±Õë¶ÔÃÀ¹ú»ù´¡ÉèÊ©


5ÔÂ24ÈÕ  £¬Î¢Èí³ÆÖÁÉÙ´Ó 2021 ÄêÄêÖÐ×îÏÈ  £¬Volt Typhoon¾ÍÒ»Ö±Õë¶ÔÃÀ¹ú¹ØµººÍÆäËü¸÷µØµÄÒªº¦»ù´¡ÉèÊ© ¡£±»ÈëÇÖ×éÖ¯Éæ¼°Õþ¸®¡¢º£Ê¡¢Í¨Ñ¶¡¢ÖÆÔì¡¢ÐÅÏ¢ÊÖÒÕ¡¢¹«ÓÃÊÂÒµ¡¢½»Í¨¡¢ÐÞ½¨ºÍ½ÌÓýÐÐÒµ ¡£¹¥»÷ÕßÊ×ÏÈʹÓÃδ֪µÄÁãÈÕÎó²îÈëÇÖFortinet FortiGuard×°±¸  £¬À´ÊµÏÖ¶ÔÄ¿µÄµÄ³õʼ»á¼û ¡£È»ºóʹÓÃPowerShell¡¢Certutil¡¢NetshºÍWMICµÈLOLBinsÖ´ÐÐliving-off-the-land¹¥»÷ ¡£ÎåÑÛͬÃË³Æ  £¬¸ÃÍŻﻹʹÓÃÁË¿ªÔ´¹¤¾ß  £¬Èçfrp¡¢MimikatzºÍImpacketµÈ ¡£


https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/


2¡¢SuperVPNÒòÊý¾Ý¿âÉèÖùýʧй¶3.6ÒÚÌõÓû§¼Í¼


¾Ý5ÔÂ24ÈÕ±¨µÀ  £¬Ãâ·ÑVPN·þÎñSuperVPNÒòÊý¾Ý¿âÉèÖùýʧ  £¬Ð¹Â¶ÁË360308817ÌõÓû§¼Í¼  £¬×ܼÆ133 GBÊý¾Ý ¡£ÕâЩ¼Í¼³ýÁË°üÀ¨Óû§ÓʼþµØµã¡¢Ô­Ê¼IPµØµã¡¢µØÀíλÖÃÊý¾ÝºÍ·þÎñÆ÷ʹÓüͼµÈÃô¸ÐÐÅÏ¢  £¬»¹°üÀ¨ÃÜÔ¿¡¢Î¨Ò»Ó¦ÓóÌÐòÓû§IDºÅºÍUUIDºÅµÈ ¡£ËäÈ»SuperVPNÉù³ÆËü²»´æ´¢Óû§ÈÕÖ¾  £¬µ«Ð¹Â¶µÄÊý¾ÝÅú×¢ÕæÕæÏàÐβ¢·ÇÔÆÔÆ  £¬ÕâÓë¸Ã¹«Ë¾µÄÕþ²ßÏàì¶Ü ¡£±ðµÄ  £¬ÔÚÊý¾Ý¿âÖл¹·¢Ã÷Storm VPN¡¢Luna VPN¡¢Radar VPN¡¢Rocket VPNºÍGhost VPNµÈVPNÌṩÉÌÃû³Æ  £¬¿ÉÒÔÍƶÏËüÃÇÔÚijÖÖˮƽÉÏÊÇÏà¹ØµÄ ¡£


https://www.hackread.com/free-vpn-service-supervpn-leaks-user-records/


3¡¢Akamai·¢Ã÷½©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ


AkamaiÔÚ5ÔÂ25ÈÕ³ÆÆä·¢Ã÷ÁËÐÂÐͽ©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ ¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê5ÔÂ×îÏÈ»îÔ¾  £¬Õë¶ÔÓÎÏ·¹«Ë¾¡¢ÓÎÏ··þÎñÆ÷Íйܹ©Ó¦ÉÌ¡¢ÔÚÏßÁ÷ýÌåºÍÆäËûÓÎÏ·ÉçÇø³ÉÔ± ¡£Í¨Ì«¹ýÎöÑо¿Ö°Ô±È·¶¨ËüµÄ¹¥»÷DZÁ¦Ô¼ÔÚ629.28 Gbps ¡£¸Ã½©Ê¬ÍøÂçÒÔGafgyt¡¢QBot¡¢MiraiºÍÆäËü¶ñÒâÈí¼þΪÀ¶±¾  £¬×èÖ¹2ÔÂ·Ý  £¬Ëü°üÀ¨414̨ÔËÐÐÖÖÖÖÖ¸Á¼Ü¹¹µÄ×°±¸  £¬ÈçARMv4¡¢x86¡¢MIPSEL¡¢MIPSºÍARM7 ¡£¸Ã°¸ÀýµÄÌØÊâÖ®´¦ÔÚÓÚ  £¬¹¥»÷ÕßÐû²¼ÁËËûÃǹ¥»÷µÄʵʱ¼Í¼  £¬¹©ËùÓÐÈËÉó²é ¡£


https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile


4¡¢Check Point¹ûÕæAgriusÍÅ»ïÕë¶ÔÒÔÉ«ÁеĹ¥»÷Ô˶¯


5ÔÂ24ÈÕ  £¬Check Point¹ûÕæÁËÒÁÀʺڿÍÍÅ»ïAgriusÕë¶ÔÒÔÉ«ÁÐ×éÖ¯µÄ¹¥»÷Ô˶¯ ¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýʹÓ÷þÎñÆ÷ÖеÄÎó²î»ñµÃÄ¿µÄµÄ³õʼ»á¼ûȨÏÞ ¡£È»ºóʹÓÃÒÔÉ«ÁеÄProtonVPN½Úµã·Ö·¢Òþ²ØÔÚ¡°Certificate¡±Îı¾ÎļþÖеÄASPXSpy webshell±äÌå ¡£Ö®ºó  £¬Agrius´Óufile.ioºÍeasyupload.ioµÈÕýµ±ÎļþÍйÜƽ̨»ñÈ¡ÀÕË÷Èí¼þMoneybirdµÄ¿ÉÖ´ÐÐÎļþ ¡£ÔÚÏÖÔÚ·¢Ã÷µÄ°¸ÀýÖÐ  £¬¸ÃÀÕË÷Èí¼þ½öÕë¶ÔF:\User Shares ¡£ÕâÅú×¢MoneybirdµÄÄ¿µÄÆ«ÏòÓÚµ¼ÖÂÓªÒµÖÐÖ¹  £¬¶ø²»ÊÇËø¶¨ÅÌËã»ú ¡£


https://research.checkpoint.com/2023/agrius-deploys-moneybird-in-targeted-attacks-against-israeli-organizations/


5¡¢Barracuda³ÆÆäESGÖÐÎó²îCVE-2023-2868Òѱ»Ê¹ÓÃ


¾ÝýÌå5ÔÂ24ÈÕ±¨µÀ  £¬Barracuda³Æ·¢Ã÷ÆäESG×°±¸ÖÐÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2023-2868£©Òѱ»Ê¹Óà ¡£¸ÃÎó²îλÓÚµç×ÓÓʼþ¸½¼þɸѡÄ£¿éÖÐ  £¬Ô´ÓÚÓû§ÌṩµÄ.tarÎļþµÄÊäÈëÑéÖ¤²»ÍêÕû ¡£Îó²îÓÚ5ÔÂ19ÈÕ±»·¢Ã÷  £¬²¢ÓÚ5ÔÂ20ÈÕºÍ21ÈÕÐû²¼µÄÁ½¸öÇå¾²²¹¶¡Öб»ÐÞ¸´ ¡£Barracuda͸¶  £¬Æ䲿·Ö¿Í»§µÄESG×°±¸Ôâµ½¹¥»÷  £¬¹¥»÷ÕßʹÓøÃÎó²î¶Ôµç×ÓÓʼþÍø¹Ø×°±¸×Ó¼¯µÄ¾ÙÐÐδÊÚȨµÄ»á¼û ¡£BarracudaÌåÏÖ  £¬ÊÓ²ì½öÏÞÓÚÆäESG²úÆ·  £¬½¨ÒéÊܵ½Ó°ÏìµÄ×éÖ¯ÔÙ¼ì²éÒ»ÏÂËûÃǵÄÍøÂç  £¬ÒÔÈ·¶¨ÆäËüϵͳÊÇ·ñ±»ÈëÇÖ ¡£


https://securityaffairs.com/146620/hacking/barracuda-email-security-gateway-bug.html


6¡¢WP Cookie Consent²å¼þÖеÄXSSÎó²îÒѱ»´ó¹æģʹÓÃ


5ÔÂ24ÈÕ±¨µÀ³Æ  £¬Ñо¿Ö°Ô±·¢Ã÷ÁË´ó¹æģʹÓÃWordPress Cookie Consent²å¼þBeautiful Cookie Consent BannerÖÐXSSÎó²îµÄÔ˶¯ ¡£Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚÔËÐиòå¼þµÄWordPressÍøÕ¾ÉϽ¨Éè¶ñÒâÖÎÀíÔ±ÕÊ»§  £¬Îó²îÒÑÓÚ1Ô·ݱ»ÐÞ¸´ ¡£Æ¾Ö¤¼Í¼  £¬¸ÃÎó²î×Ô2ÔÂ5ÈÕÒÔÀ´Ò»Ö±±»Æð¾¢Ê¹Óà ¡£×Ô5ÔÂ23ÈÕÒÔÀ´  £¬Ñо¿Ö°Ô±ÒѾ­¼ì²âµ½À´×Ô½ü14000¸öIPµØµãµÄ½ü300Íò´ÎÕë¶ÔÁè¼Ý150Íò¸öÍøÕ¾µÄ¹¥»÷  £¬²¢ÇÒ  £¬ÏÖÔÚ¹¥»÷ÈÔÔÚ¼ÌÐø ¡£


https://www.bleepingcomputer.com/news/security/hackers-target-15m-wordpress-sites-with-cookie-consent-plugin-exploit/