ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£ºÂ·Í¸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯

°ä²¼¹¦·ò 2021-08-24


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.png


8ÔÂ6ÈÕ £¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉϰ䲼ÉêÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£8ÔÂ12ÈÕ £¬ºÚ¿ÍÍÅ»ïALTDOSÐû³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´ £¬Ò»ÏòÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý £¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£Í¬ÈÕ £¬OrangeTee¹«Ë¾°µÊ¾Æä²»»áÖ§¸¶Êê½ð¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/



HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎå £¬°²È«¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþ·þÎñÆ÷ÔÚ´Óǰ¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£ProxyShellÊÇ3¸ö·ì϶CVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£×êÑÐÈËÔ±°µÊ¾ £¬ÔÚProxyShell¸ÅÏëÑéÖ¤´úÂë°ä²¼ºó²»¾Ã³öÏÖÁËÓйØÉ¨Ãè»î¶¯ £¬Ö±µ½ÉÏÖÜÄ©Ôì³ÉÁËÏÖʵ¹¥»÷¡£´Ë±í £¬Òѱ»ÈëÇÖµÄ1900¶ą̀Exchange·þÎñÆ÷Éæ¼°µ½µÄ×éÖ¯Ô̺¬¹¹ÖþÔì×÷ÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬½¨µêºÍÓ×ÐÍ»ú³¡µÈ¡£    


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/



×êÑÐÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ


×êÑÐÈËÔ±·¢ÏÖÀûÓöÌÐÅ·Ö·¢FlubotµÄ»î¶¯Õë¶Ô°Ä´óÀûÑÇ.png


½üÆÚ £¬³ÉǧÉÏÍòµÄ°Ä´óÀûÑǾÓÃñÔâµ½ÁËÒ»ÖÖÃûΪFlubotµÄ¶ñÒâÈí¼þµÄ¹¥»÷¡£ÔÚÕâ´Î»î¶¯Öй¥»÷ÕßÌáÄܸɱêÓÐδ½ÓÀ´µç»òÓïÒôÐÅÏä £¬²¢ÒªÇóÆäµã»÷Ò»¸öαÔìµÄÁ´½ÓÀ´ÊÕÌýºÍ²é¿´¡£Ò»µ©Óû§µã»÷Á´½Ó £¬¾Í»áÏÂÔØ¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÖØÒªÕë¶ÔAndroidÓû§ £¬ÓµÓÐÇÔȡ֧¸¶¿¨¾ßÌåÐÅÏ¢¡¢À¹½Ø¶ÌÐÅ¡¢ä¯ÀÀÒ³ÃæºÍÍøÂçÊÖ»úÉÏµÄÆäËûÐÅÏ¢½Ó¼ûȨÏÞµÈÖ°ÄÜ¡£FlubotÔçÔÚ½ñÄêËêÊ׾͹¥»÷ÁËÅ·Ö޵Ķà¸ö¹ú¶È £¬²¢ÔÚ±¾ÔÂÆðÍ·Õë¶Ô°Ä´óÀûÑÇÓû§¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/08/flubot-malware-targets-australians.html


·͸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯


·͸ÉçÅû¼ûÀ¹ú¹úÎñÔºÓÚ½üÆÚÔâµ½µÄÍøÂç¹¥»÷»î¶¯.png


¸ £¿Ë˹ÐÂÎżÇÕßJacqui HeinrichÉÏÖÜÁùÔÚTwitterÉÏ·¢ÎijÆ £¬ÃÀ¹ú¹úÎñÔº½üÆÚÔâµ½ÁËÍøÂç¹¥»÷ £¬¹ú·À²¿ÍøÂç˾ÁÔÚ֪ͨÊÜÓ°ÏìµÄÈË¡£Â·Í¸ÉçҲ֤ʵÁËÕâÒ»ÊÂÎñ £¬µ«Ëü²¹³ä˵Õâ´Î¹¥»÷²¢Î´Ó°Ïì¹úÎñÔºµÄÕý³£ÔË×÷¡£Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷ÊǺÎʱ±»·¢ÏÖ £¬µ«×êÑÐÈËÔ±ÒÔΪ £¬¹¥»÷¿ÉÄܲúÉúÔÚ¼¸ÖÜǰ¡£¹úÎñÔº½²»°È˰µÊ¾ £¬ËûÃÇÔÚ²ÉÈ¡´ëÊ©ÒÔÈ·±£ÐÅÏ¢Äܹ»Êܵ½±£»¤ £¬²¢ÇÒ³öÓÚ°²È«Ô­ÒòÎÞ·¨»áÉ̸ÃÊÂÎñµÄÐÔÖʺÍÁìÓò¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121354/hacking/us-state-department-hit-cyber-attack.html


CISA°ä²¼½üÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨


CISA°ä²¼½üÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨.png


CISA°ä²¼ÁËÓйؽüÆÚÓë³Á´óÌìÈ»ÔÖº¦Óйع¥»÷»î¶¯µÄ¾¯±¨¡£¸Ã¾¯±¨Ö¸³ö £¬ÔÚ³Á´óÌìÈ»ÔÖº¦Ö®ºó £¬Ô̺¬¶ñÒâÁ´½Ó»ò¸½¼þڲƭÐÔµç×ÓÓʼþͨ³£»áºÜ³£¼û¡£×éÖ¯ºÍÓ×ÎÒÔÚ´¦ÖôøÓÐÓëì«·çÓйØÖ÷Ìâ¡¢¸½¼þ»ò³¬Á´½ÓµÄµç×ÓÓʼþʱ±ØÒªÓ×ÐÄÉóÉ÷¡£´Ë±í £¬»¹Òª¾¯ÌèÓë¶ñÁÓÆøÏóÊÂÎñÓйصÄÉ罻ýÌåÒªÇó¡¢Îı¾»òÏßÏ»¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/hurricane-related-scams


Cisco Talos°ä²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨


Cisco Talos°ä²¼2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨.jpg


Cisco Talos°ä²¼ÁË2021ÄêQ2ÊÂÎñÏìÓ¦µÄÍþв»ã±¨¡£»ã±¨Ö¸³ö £¬ÉÏÒ»¼¾¶È £¬ÀÕË÷Èí¼þ³õ´Î²»ÔÙÕ¼¾ÝÖØÒªµØÎ» £¬´§Ä¦Õâ¿ÉÄÜÊÇÓÉMicrosoft Exchange ·ì϶ÀûÓûµÄ´ó·ùÔö³¤µ¼ÖµÄ¡£Ö®ºó £¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ±¾¼¾¶È¼¤Ôö £¬Õ¼ËùÓÐÊÂÎñµÄ½üÒ»°ë£¨46%£© £¬ÓÖ³ÉΪ×î´óµÄÍþв¡£ÆäÖÐ £¬ÖØÒªµÄÀÕË÷Èí¼þÔ̺¬REvil¡¢Conti¡¢WastedLockerºÍDarksideµÈ¡£´Ë±í £¬ÓëÉÏÒ»¼¾¶ÈÏà±È £¬±¾¼¾¶ÈµÄ°²È«¼ì²âÈÆ¹ý¼¼ÊõµÄʹÓÃÓÐËùÔö³¤¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/talos-incident-response-quarterly.html