ÐÂÎ÷À¼´¢±¸ÒøÐÐÔâµ½¹¥»÷£¬£¬ £¬£¬ £¬ £¬£¬Ãô¸ÐÐÅÏ¢»òÒÑй¶ £»£»£»£»£»£»£»PysaÔÚ°µÍø¹ûÕæ´ÓÓ¢¹ú¹þ¿ËÄáÒé»á͵ȡµÄÊý¾Ý

Ðû²¼Ê±¼ä 2021-01-11

1.ÐÂÎ÷À¼´¢±¸ÒøÐÐÔâµ½¹¥»÷£¬£¬ £¬£¬ £¬ £¬£¬Ãô¸ÐÐÅÏ¢»òÒÑй¶


1.jpg


λÓÚ»ÝÁé¶ÙµÄÐÂÎ÷À¼´¢±¸ÒøÐÐÓÚÖÜÈÕÉù³ÆÆäÔâµ½¹¥»÷¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬ £¬ £¬£¬¸ÃÒøÐÐÓÃÀ´¹²ÏíºÍ´æ´¢Ãô¸ÐÐÅÏ¢µÄµÚÈý·½Îļþ¹²ÏíЧÀ͵ÄÊý¾ÝϵͳÔâµ½ÆÆË𣬣¬ £¬£¬ £¬ £¬£¬ºÚ¿Í¿ÉÄÜÒѾ­»á¼ûÁËÆäÖеÄÉÌÒµºÍСÎÒ˽¼ÒÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬ £¬ £¬£¬¸ÃϵͳÒѱ»ÍÑ»ú± £»£»£»£»£»£»£»¤£¬£¬ £¬£¬ £¬ £¬£¬Ö±µ½ÒøÐÐÍê³ÉÆä³õ³ÌÐò²éΪֹ²Å»á»Ö¸´¡£¡£¡£¡£¡£¸ÃÒøÐÐÌåÏÖÆäÕýÔÚÈ·¶¨Ð¹Â¶ÐÅÏ¢µÄ¹æÄ££¬£¬ £¬£¬ £¬ £¬£¬²¢ÇҾܾøÍ¸Â¶Óйش˴ι¥»÷¸ü¶àµÄϸ½Ú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/new-zealand-central-bank-hit-cyber-attack


2.·É»úÖÆÔìÉÌDFJÊý¾Ýй¶£¬£¬ £¬£¬ £¬ £¬£¬»òÓÉÀÕË÷Èí¼þ¹¥»÷ËùÖÂ


2.png


·É»úÖÆÔìÉÌDassault Falcon Jet£¨DFJ£©ÓÚ2020Äê12ÔÂ6ÈÕ·¢Ã÷ÆäÔâµ½Á˹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ÒªÉè¼ÆºÍÖÆÔì¾üÓ÷ɻú¡¢¹«Îñ»úºÍÌ«¿Õϵͳ¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬ £¬ £¬£¬¹¥»÷ÕßÔÚ6ÔÂ6ÈÕÖÁ12ÔÂ7ÈÕÖ®¼äÒ»Ö±¿ÉÒÔ»á¼û¸Ã¹«Ë¾µÄϵͳ£¬£¬ £¬£¬ £¬ £¬£¬¿ÉÄÜй¶ÁËÆäÔ±¹¤µÄÐÕÃû¡¢Ð¡ÎÒ˽¼ÒºÍ¹«Ë¾ÓʼþµØµã¡¢Óʼĵص㡢IDºÅ¡¢¼ÝʻִÕպ𢻤ÕÕÐÅÏ¢¡¢½ðÈÚÕʺš¢Éç»á°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ¡¢ÊÂÇéËùÔÚ¡¢Ð½³êºÍ¸£ÀûµÈÐÅÏ¢¡£¡£¡£¡£¡£LeMagIT³Æ´ËÊÂÎñÊÇRagnar LockerËùΪ£¬£¬ £¬£¬ £¬ £¬£¬µ«DFJÉÐδȷ¶¨¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬ £¬ £¬£¬¸Ã¹«Ë¾ÕýÔÚ»Ö¸´ºÍÖØÐÞÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dassault-falcon-jet-reports-data-breach-after-ransomware-attack/


3.PysaÔÚ°µÍø¹ûÕæ´ÓÓ¢¹ú¹þ¿ËÄáÒé»á͵ȡµÄÊý¾Ý


3.png


ºÚ¿Í×éÖ¯PysaÔÚ°µÍø¹ûÕæ´ÓÓ¢¹ú¹þ¿ËÄáÒé»á͵ȡµÄÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷Õß³ÆÐ¹Â¶Êý¾ÝÊÇ´Ó2020Äê10ÔÂÕë¶Ô¸ÃÒé»áµÄÀÕË÷Èí¼þ¹¥»÷ÖлñµÃµÄ£¬£¬ £¬£¬ £¬ £¬£¬°üÀ¨ÁËÊÐÕþ¾ÖÊÂÇéÖ°Ô±ºÍסÃñµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬ £¬ £¬£¬ÀýÈçPhotoID¡¢Ô±¹¤Êý¾ÝºÍ»¤ÕÕÐÅÏ¢µÈÖ÷ÒªÊý¾Ý¡£¡£¡£¡£¡£¸ÃÒé»áÌåÏÖ£¬£¬ £¬£¬ £¬ £¬£¬´ËÊÂÎñ¶Ô¹þ¿ËÄáµÄ¾ø´ó´ó¶¼×¡ÃñºÍÆóÒµ²»»áÓйý¶àµÄÓ°Ï죬£¬ £¬£¬ £¬ £¬£¬²¢ÇÒÆäÕýÔÚÓëNCSC¡¢¹ú¼Ò·¸·¨¾Ö¡¢ÐÅϢרԱ°ì¹«ÊÒ¡¢Â׶ؾ¯Ô±ÌüºÍÆäËûר¼ÒÏàÖú£¬£¬ £¬£¬ £¬ £¬£¬À´¼ì²é²¢ÏàʶÊÂÎñµÄÓ°Ïì¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/data-stolen-council-online/


4.Recorded FutureÐû²¼2020ÄêºÚ¿Í»ù´¡ÉèÊ©µÄÆÊÎö±¨¸æ


4.png


Recorded FutureÐû²¼ÁË2020ÄêºÚ¿Í»ù´¡ÉèÊ©µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã¹«Ë¾È¥Äê×·×ÙÁË10000¶à¸ö¶ñÒâC£¦CЧÀÍÆ÷£¬£¬ £¬£¬ £¬ £¬£¬Éæ¼°µ½80¶àÖÖ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬ £¬£¬ £¬ £¬£¬×÷Ϊ¶ñÒâÈí¼þ²Ù×÷µÄÒ»²¿·Ö£¬£¬ £¬£¬ £¬ £¬£¬¿ªÔ´Çå¾²¹¤¾ßµÄʹÓóÊÉÏÉýÇ÷ÊÆ£¬£¬ £¬£¬ £¬ £¬£¬ÌØÊâÊǽø¹¥ÐÔÇå¾²¹¤¾ß£¨Ò²³ÆÎªOST£¬£¬ £¬£¬ £¬ £¬£¬ºì¶Ó¹¤¾ß»òÉøÍ¸£©µÄʹÓᣡ£¡£¡£¡£ÔÚÕâÐ©ÉøÍ¸²âÊÔ¹¤¾ß°üÖУ¬£¬ £¬£¬ £¬ £¬£¬Cobalt Strike£¨Õ¼13.5£¥£©ºÍMetasploit£¨Õ¼10.5£¥£©ÏÖÒѳÉΪÍйܶñÒâC£¦CЧÀÍÆ÷ʹÓÃ×îÆÕ±éµÄÁ½ÏîÊÖÒÕ¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬ £¬£¬C£¦CЧÀÍÆ÷µÄƽ¾ùÊÙÃüΪ54.8Ì죬£¬ £¬£¬ £¬ £¬£¬33£¥µÄЧÀÍÆ÷¶¼ÍйÜÔÚÃÀ¹ú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.recordedfuture.com/2020-adversary-infrastructure-report/


5.Check PointÐû²¼2020Äê12ÔÂÈ«ÇòÍþвָÊýµÄ±¨¸æ


5.png


Check PointÐû²¼ÁË2020Äê12ÔÂÈ«ÇòÍþвָÊýµÄ±¨¸æ¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬ £¬£¬ £¬ £¬£¬2020Äê9ÔºÍ2020Äê10Ô£¬£¬ £¬£¬ £¬ £¬£¬EmotetʼÖÕ´¦ÓÚÈ«ÇòÍþвָÊýÖ®Ê×£¬£¬ £¬£¬ £¬ £¬£¬ÔÚ½ÚÈÕʱ´úÌìÌìÕë¶ÔÁè¼Ý100000¸öÓû§ÌᳫÀ¬»øÓʼþ¹¥»÷£¬£¬ £¬£¬ £¬ £¬£¬Ó°ÏìÁËÈ«Çò7£¥µÄ×éÖ¯¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬ £¬£¬MVPower DVRÔ¶³ÌÖ´ÐдúÂëÊDZ»Ê¹ÓÃ×î¶àµÄÎó²î£¬£¬ £¬£¬ £¬ £¬£¬Ó°ÏìÁËÈ«Çò42£¥µÄ×éÖ¯£¬£¬ £¬£¬ £¬ £¬£¬Æä´ÎÊÇHTTP±êÍ·Ô¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-13756£©£¬£¬ £¬£¬ £¬ £¬£¬Ó°ÏìÁËÈ«Çò42£¥µÄ×éÖ¯¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/


6.CISAÐû²¼Õë¶Ô΢ÈíÔÆµÄ¹¥»÷»î¶¯µÄ¾¯±¨


6.png


CISAÐû²¼ÁËÕë¶Ô΢ÈíÔÆµÄAPT¹¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£CISA·¢Ã÷ºÚ¿ÍÒÑͨ¹ýÃÜÂëÍÆ²â¡¢ÃÜÂëÅçÍ¿ºÍʹÓò»Çå¾²µÄÖÎÀí»òЧÀÍÆ¾Ö¤¾ÙÐй¥»÷£¬£¬ £¬£¬ £¬ £¬£¬¶ø·ÇSolarWinds Orion²úÆ·¡£¡£¡£¡£¡£Æä¿ÉÒÔ´ÓÊܺ¦ÍøÂçÖÐÌáÉýȨÏÞ£¬£¬ £¬£¬ £¬ £¬£¬²¢Ê¹ÓÃWindowsÖÎÀí¹¤¾ß£¨WMI£©µÈ±¾»úWindows¹¤¾ßºÍÊÖÒÕÀ´Ã¶¾ÙMicrosoft Active DirectoryÁªºÏЧÀÍ£¨ADFS£©Ö¤ÊéÊðÃû¹¦Ð§£¬£¬ £¬£¬ £¬ £¬£¬Î±ÔìÉí·ÝÑéÖ¤ÁîÅÆ£¨OAuth£©£¬£¬ £¬£¬ £¬ £¬£¬ÒÔÏòЧÀÍÌṩÕß±¬·¢ÉùÃ÷£¬£¬ £¬£¬ £¬ £¬£¬È»ºóºáÏòǨáãµ½Microsoft CloudÇéÐΡ£¡£¡£¡£¡£CISAÌṩÁ˰üÀ¨Æä¿ª·¢µÄ¹¤¾ßSparrowÔÚÄÚµÄ3ÖÖ¿ªÔ´¹¤¾ßµÄÖ¸ÄÏ£¬£¬ £¬£¬ £¬ £¬£¬ÒÔ×ÊÖú×é֯ʹÓÃÕâЩ¹¤¾ßÀ´¼ì²âºÍÓ¦¶ÔAPT×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/01/08/cisa-releases-new-alert-post-compromise-threat-activity-microsoft