ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ£¬£¬ £¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£ ¡£¡£¡£¡£8ÔÂ12ÈÕ£¬£¬ £¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬£¬ £¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬ £¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£ ¡£¡£¡£¡£Í¬ÈÕ£¬£¬ £¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬£¬ £¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£ ¡£¡£¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬£¬ £¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£ ¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


Ñо¿Ö°Ô±·¢Ã÷ʹÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ£¬£¬ £¬£¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑÇסÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£ ¡£¡£¡£¡£Ôڴ˴λÖй¥»÷ÕßÌáÐÑÄ¿µÄÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏ䣬£¬ £¬£¬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍÉó²é¡£ ¡£¡£¡£¡£Ò»µ©Óû§µã»÷Á´½Ó£¬£¬ £¬£¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔAndroidÓû§£¬£¬ £¬£¬¾ßÓÐÇÔȡ֧¸¶¿¨ÏêϸÐÅÏ¢¡¢×èµ²¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢»á¼ûȨÏ޵ȹ¦Ð§¡£ ¡£¡£¡£¡£FlubotÔçÔÚ½ñÄêÄêÍ·¾Í¹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¼Ò£¬£¬ £¬£¬²¢ÔÚ±¾ÔÂ×îÏÈÕë¶Ô°Ä´óÀûÑÇÓû§¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¶ÃÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸£¿£¿£¿£¿£¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ£¬£¬ £¬£¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷£¬£¬ £¬£¬¹ú·À²¿ÍøÂç˾ÁÕýÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£ ¡£¡£¡£¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬ £¬£¬µ«ËüÔö²¹ËµÕâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£ ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÊǺÎʱ±»·¢Ã÷£¬£¬ £¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬£¬ £¬£¬¹¥»÷¿ÉÄܱ¬·¢ÔÚ¼¸ÖÜǰ¡£ ¡£¡£¡£¡£¹úÎñÔº½²»°ÈËÌåÏÖ£¬£¬ £¬£¬ËûÃÇÕýÔÚ½ÓÄɲ½·¥ÒÔÈ·±£ÐÅÏ¢¿ÉÒÔÊܵ½±£»£»£»£»£»£»¤£¬£¬ £¬£¬²¢ÇÒ³öÓÚÇå¾²Ôµ¹ÊÔ­ÓÉÎÞ·¨ÌÖÂÛ¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨


CISAÐû²¼½üÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨.png


CISAÐû²¼ÁËÓйؽüÆÚÓëÖØ´ó×ÔÈ»ÔÖÄÑÓйع¥»÷»î¶¯µÄ¾¯±¨¡£ ¡£¡£¡£¡£¸Ã¾¯±¨Ö¸³ö£¬£¬ £¬£¬ÔÚÖØ´ó×ÔÈ»ÔÖÄÑÖ®ºó£¬£¬ £¬£¬°üÀ¨¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£»£»£»£»£»£»áºÜ³£¼û¡£ ¡£¡£¡£¡£×éÖ¯ºÍСÎÒ˽¼ÒÔÚ´¦Öóͷ£´øÓÐÓëì«·çÏà¹ØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱÐèҪСÐÄÉóÉ÷¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬»¹ÒªÐ¡ÐÄÓë±°ÁÓÌìÆøÊÂÎñÏà¹ØµÄÉ罻ýÌåÇëÇó¡¢Îı¾»òÏßÏ»¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ


Cisco TalosÐû²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ.jpg


Cisco TalosÐû²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв±¨¸æ¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬ÉÏÒ»¼¾¶È£¬£¬ £¬£¬ÀÕË÷Èí¼þÊ״β»ÔÙÕ¼ÓÐÖ÷ҪλÖ㬣¬ £¬£¬ÍƲâÕâ¿ÉÄÜÊÇÓÉMicrosoft Exchange Îó²îʹÓûµÄ´ó·ùÔöÌíµ¼Öµġ£ ¡£¡£¡£¡£Ö®ºó£¬£¬ £¬£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö£¬£¬ £¬£¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£©£¬£¬ £¬£¬ÓÖ³ÉΪ×î´óµÄÍþв¡£ ¡£¡£¡£¡£ÆäÖУ¬£¬ £¬£¬Ö÷ÒªµÄÀÕË÷Èí¼þ°üÀ¨REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±È£¬£¬ £¬£¬±¾¼¾¶ÈµÄÇå¾²¼ì²âÈÆ¹ýÊÖÒÕµÄʹÓÃÓÐËùÔöÌí¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html