CISA¡¢NSAºÍODNI°ä²¼¹ØÓÚ± £»¤Èí¼þ¹©¸øÁ´°²È«µÄÖ¸ÄÏ

°ä²¼¹¦·ò 2022-09-06
1¡¢CISA¡¢NSAºÍODNI°ä²¼¹ØÓÚ± £»¤Èí¼þ¹©¸øÁ´°²È«µÄÖ¸ÄÏ

      

9ÔÂ2ÈÕ £¬CISA¡¢¹ú¶È°²È«¾Ö(NSA)ºÍ¹ú¶Èµý±¨×ܼà°ì¹«ÊÒ(ODNI)°ä²¼Á˹ØÓÚ± £»¤Èí¼þ¹©¸øÁ´°²È«µÄÖ¸ÄϵĵÚÒ»²¿ÃÅ £¬¼´± £»¤Èí¼þ¹©¸øÁ´ÏµÁÓת¡ª¿ª·¢ÈËÔ±ÍÆ¼öʵ¼Ê ¡£¸ÃÖ¸ÄÏÌṩÁËÓйØÈôºÎ¿ª·¢°²È«´úÂë¡¢ÑéÖ¤µÚÈý·½×é¼þ¡¢Ç¿»¯¹¹½¨»·¾³ºÍ½»¸¶´úÂëµÄ¾ßÌåÐÅÏ¢ ¡£ÔÚËùÓÐDevOps³ÉΪDevSecOps֮ǰ £¬Èí¼þ¿ª²úÐÔÃüÖÜÆÚÃæ¶Ô·çÏÕ ¡£±¾ÏµÁеÄÁí±íÁ½¸ö²¿ÃŲà³ÁÓÚÈí¼þ¹©¸øÉ̺Ϳͻ§ ¡£CISA¼¤Àø×éÖ¯¡¢Èí¼þ¹©¸øÉ̺ÍÍøÂçÔËÓªÉ̲鿴ָÄϲ¢Ë¼¿¼½¨Òé ¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/09/02/cisa-nsa-and-odni-release-part-one-guidance-securing-software


2¡¢Armorblox·¢ÏÖÕë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵Ĵ¹µö¹¥»÷»î¶¯

      

¾Ý9ÔÂ4ÈÕ±¨Â· £¬°²È«¹«Ë¾Armorblox·¢ÏÖÁËÕë¶ÔÃÀ¹úÔËͨ³Ö¿¨È˵ÄÐÂÒ»ÂÖ´¹µö»î¶¯ ¡£´¹µöÓʼþµÄÖ÷ÌâÊÇ¡°¹ØÓÚÄúµÄÕÊ»§µÄ³ÁҪ֪ͨ¡± £¬´ò¿ªºó»áÓÕʹָ±êµã»÷¶ñÒ⸽¼þÒԲ鿴°²È«ÐÂÎÅ ¡£Ö¸±êµã»÷¶ñÒ⸽¼þºó»á±»³Á¶¨Ïòµ½Î±ÔìµÄÃÀ¹úÔËͨµÇÂ¼Ò³Ãæ £¬²¢±»ÒªÇóÊäÈëÓû§IDºÍÃÜÂë £¬Ö¼ÔÚÇÔȡָ±êµÄPIIÊý¾Ý ¡£´Ë±í £¬¸Ã¹¥»÷ÈÆ¹ýÁ˱¾µØGoogle Workspaceµç×ÓÓʼþ°²È«½ÚÔì £¬ÓÉÓÚËüͨ¹ýÁËDKIMºÍSPFµç×ÓÓʼþÉí·ÝÑéÖ¤ ¡£


https://securityaffairs.co/wordpress/135292/hacking/phishing-scam-targets-american-express.html


3¡¢DESORDENÈëÇÖÓ¡Äṫ˾BOGA GroupÇÔÈ¡ÊýÊ®Íò±Ê¼Í¼

      

¾ÝýÌå9ÔÂ2ÈÕ±¨Â· £¬ºÚ¿ÍÍŻ﹥»÷ÁËÓ¡¶ÈÄáÎ÷ÑǵÄÒ»¼Ò´óÐÍÆóÒµBOGA Group ¡£¸Ã¹«Ë¾ÔÚÓ¡¶ÈÄáÎ÷ÑǺÍÂíÀ´Î÷ÑǾ­Óª×ų¬¹ý200¼Ò²ÍÌüºÍ°ÂÌØÀ³Ë¹ ¡£¹¥»÷ÕßÐû³Æ £¬ÎªÁËÖ¤Ã÷ÒÑÈëÇָù«Ë¾µÄ·þÎñÆ÷ £¬Æä±ÉÈËÔØÊý¾Ýºó»¹ÔÚ·þÎñÆ÷ÉÑþ³ØýÁËÕâЩÊý¾Ý ¡£Õâ´Î¹¥»÷ÇÔÈ¡Á˳¬¹ý31 GBµÄÊý¾ÝºÍÎļþ £¬Ô̺¬409168Ìõ¿Í»§ÐÅÏ¢£¨ÐÕÃû¡¢µç»°ºÍµç×ÓÓʼþ£©¡¢16476ÌõÔ±¹¤ÒÔ¼°²ÆÕþºÍ¹«Ë¾Êý¾Ý ¡£DESORDEN»¹°µÊ¾ £¬ËûÃÇÔ¤¼Æ»á¶Ôº«¹ú¡¢Öйų́Íå¡¢Ô½ÄϺÍÈÕ±¾½øÐиü¶à¹¥»÷ £¬²¢¶ÔÌ©¹úµÄÊý¾Ý¸ÐÐËÖ ¡£


https://www.databreaches.net/customer-data-from-hundreds-of-indonesian-and-malaysian-restaurants-hacked-by-desorden/


4¡¢ZscalerÔÚPrynt StealerÖз¢ÏÖ»ùÓÚTelegramµÄºóÃÅ

      

ZscalerÔÚ9ÔÂ1ÈÕ°ä²¼Á˹ØÓÚPrynt StealerµÄ·ÖÎö»ã±¨ ¡£Prynt StealerÊÇÒ»¸öÏà¶Ô½ÏеÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼Ò×å £¬ÓÉ.NET±àд ¡£ËüÓë¶ñÒâÈí¼þ¼Ò×åWorldWindºÍDarkEye¼«¶ÈÀàËÆ £¬ÕâÅú×¢ËüÃÇ¿ÉÄÜÓÉͳһ¿ª·¢Õß¿ª·¢ ¡£×êÑзÖÎöÅú×¢ £¬Æä´úÂë¿âÔ´×ÔÁí±íÁ½¸ö¿ªÔ´¶ñÒâÈí¼þAsyncRATºÍStormKitty £¬²¢Ôö³¤ÁËÐÂÖ°ÄÜ £¬Ô̺¬Ò»¸öºóÃÅTelegram channel £¬ÓÃÓÚÍøÂçÆäËû¹¥»÷ÕßÇÔÈ¡µÄÐÅÏ¢ ¡£¸Ã¶ñÒâÈí¼þÒÔ100ÃÀÔª/Ô¡¢700ÃÀÔª/Äê»ò900ÃÀԪƽÉú¶©ÔĵļÛÖµÏúÊÛ ¡£


https://www.zscaler.com/blogs/security-research/no-honor-among-thieves-prynt-stealers-backdoor-exposed


5¡¢UptycsÅû¶һ¸öËÆºõÈÔÔÚ¿ª·¢ÖеÄÐÂLinuxÀÕË÷Èí¼þ 

      

9ÔÂ1ÈÕ £¬UptycsÅû¶ÁËÒ»¸ö¿ÉÖ´ÐкͿÉÁ´½ÓÌåʽ(ELF) ÀÕË÷Èí¼þ £¬Ëüƾ¾Ý¸ø¶¨µÄÎļþ¼Ðõè¾¶¼ÓÃÜLinuxϵͳÖеÄÎļþ ¡£¹¥»÷ÕßÁôϵÄREADMEÓëÀÕË÷Èí¼þDarkAngelsµÄREADMEÆëÈ«ÎǺÏ ¡£×êÑÐÈËÔ±·¢ÏÖELFÎļþ×ÔÉíÊÇÐ嵀 £¬µ«¶þ½øÔìÎļþÖеÄOnionÁ´½ÓËÆºõÒÑ¹Ø¹Ø £¬ÕâÅú×¢Õâ¸öеÄÀÕË÷Èí¼þ¿ÉÄÜÈÔÔÚ¿ª·¢ÖÐ ¡£´Ë±í £¬¶þ½øÔìÎļþʹÓÃpthread_createº¯ÊýÀ´´´½¨ÐÂÏß³Ì £¬¹¥»÷Õß¼ÓÃÜÎļþºóÔö³¤µÄÀ©´óÃûÊÇ.crypted ¡£


https://www.uptycs.com/blog/another-ransomware-for-linux-likely-in-development


6¡¢QNAP°ä²¼¸üР£¬½¨¸´±»ÀÕË÷Èí¼þDeadboltÀûÓõķì϶

      

¾ÝýÌå9ÔÂ5ÈÕ±¨Â· £¬QNAP¼ì²âµ½DeadboltÀûÓÃPhoto StationÖзì϶µÄÀÕË÷¹¥»÷»î¶¯ ¡£¹¥»÷´ÓÉÏ´ÓÖÜÁùÆðÍ· £¬¸Ã¹«Ë¾ÔÚ·¢ÏÖ¹¥»÷ºóµÄ12Ó×ʱÄÚ°ä²¼Á˲¹¶¡ £¬µ«¹¥»÷ĿǰÈÔÔÚ³ÖÐø ¡£¹¥»÷µÄÁìÓòºÜ¹ã £¬ÖÜÁùºÍÖÜÈÕÌá½»µÄID Ransomware·þÎñ¼¤Ôö ¡£¸Ã¹«Ë¾¶½´ÙNAS¿Í»§Á¢¼´½«Photo Station¸üе½×îа汾 £¬½¨ÒéÓû§ÓÃQuMagie´úÌæPhoto Station £¬²¢Ç¿ÁÒ½¨ÒéÓû§²»Òª½«QNAP NASÖ±½ÓÏνӵ½»¥ÁªÍøÉÏ ¡£×Ô2022Äê1ÔÂÒÔÀ´ £¬DeadBoltÒ»ÏòÔÚ¹¥»÷NASÉ豸 ¡£


https://www.bleepingcomputer.com/news/security/qnap-patches-zero-day-used-in-new-deadbolt-ransomware-attacks/