AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.05.18-2020.05.24£©
2020-05-26
Ò»¡¢ Íþвͨ¸æ
Apache Tomcat Session·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-05-21 11:00:00 GMT
¡¾¸ÅÊö¡¿
±±¾©Ê±¼ä5ÔÂ20ÈÕ£¬Apache¹Ù·½Ðû²¼Ç徲ͨ¸æÐÞ¸´ÁËApache Tomcat Session·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9484£©£¬ÈôÊÇʹÓÃÁËTomcatµÄsession³¤ÆÚ»¯¹¦Ð§£¬²»Çå¾²µÄÉèÖý«µ¼Ö¹¥»÷Õß¿ÉÒÔ·¢ËͶñÒâÇëÇóÖ´ÐÐí§Òâ´úÂë¡£
¡¾Á´½Ó¡¿
http://blog.nsfocus.net/apache-tomcat-cve-2020-9484-0521/
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. SecureCRTÄÚ´æËð»µÎó²î
¡¾¸ÅÊö¡¿
SecureCRT×îа汾8.7.2ÖÐÐÞ¸´ÁËÒ»¸öÄÚ´æËð»µÎó²î£¨CVE-2020-12651£©£¬µ±CSIº¯ÊýÎüÊÕµ½Ò»¸ö´ó¸ºÊý×÷Ϊ²ÎÊýʱ£¬¿ÉÄÜÔÊÐíÔ¶³ÌÏµÍ³ÆÆËðÖÕ¶ËÀú³ÌÖеÄÄڴ棬×îÖÕµ¼ÖÂí§Òâ´úÂëµÄÖ´Ðлò³ÌÐòÍ߽⡣¹¥»÷Õß¿ÉÄÜͨ¹ýÀàËÆSSH bannerµÄ·½·¨Ê¹ÓøÃÎó²î¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/
2. Cisco Unified Contact Center Express·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
¡¾¸ÅÊö¡¿
¿ËÈÕ£¬Ë¼¿Æ£¨Cisco£©¹Ù·½Ðû²¼Í¨¸æ³ÆÐÞ¸´ÁËÒ»¸öUnified Contact Center Express£¨Unified CCX£©ÖеĸßΣÎó²î£¨CVE-2020-3280£©¡£¸ÃÎó²îÔ´ÓÚÈí¼þÔÚ·´ÐòÁл¯²Ù×÷ʱ£¬Ã»ÓжÔÓû§ÌṩµÄÊäÈë¾ÙÐÐ×ã¹»µÄÏÞÖÆ£¬¹¥»÷Õß¿ÉÒÔÔÚδÊÚȨµÄÇéÐÎÏ·¢ËÍÒ»¸ö¶ñÒâµÄJava¹¤¾ßÀ´´¥·¢¸ÃÎó²î£¬ÔÚÊÜÓ°Ïì×°±¸ÉÏÒÔrootȨÏÞÖ´ÐÐí§Òâ´úÂë¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/cisco-unified-ccx-cve-2020-3280-0522/
3. Greenbug×éÖ¯Õë¶ÔÄÏÑǵçÐŹ«Ë¾µÄ¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
Greenbug×é֯ͨ¹ý·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄµç×ÓÓʼþѬȾĿµÄ£¬¸ÃÁ´½ÓÖ¸ÏòÊܵ½¹¥»÷µÄÍøÕ¾£¬ÍøÕ¾ÍйÜ×ÅÒ»¸ö°üÀ¨¶ñÒâCHMÎļþµÄ´æµµÎļþ£¬ÔÚÖ´ÐÐʱװÖÃÓÐÓøºÔØ£¬ÆäÖаüÀ¨Ò»¸öADSÓÃÀ´Òþ²ØÆä¸ºÔØ£¬¹¥»÷Ô˶¯Ö÷ÒªÕë¶ÔÄÏÑǵĵçÐŹ«Ë¾£¬Ö¼ÔÚÇÔȡƾ֤ÒÔ¼°½¨ÉèÓëÊý¾Ý¿â·þÎñÆ÷µÄÅþÁ¬¡£GreenbugÍþв×éÖ¯ÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñ£¬ÒÉËÆÀ´×ÔÒÁÀÊ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia
4. Chafer×éÖ¯Õë¶ÔÖж«Õþ¸®ºÍº½¿ÕÔËÊäÒµµÄÔ˶¯
¡¾¸ÅÊö¡¿
ChaferÊÇÒ»¸öÓÐÒÁÀÊÅä¾°µÄÍþв×éÖ¯£¬Ö÷Òª´ÓÊÂÍøÂçÌØ¹¤Ô˶¯¡£½üÆÚChafer×éÖ¯Õë¶ÔÖж«£¬ÌØÊâÊÇ¿ÆÍþÌØºÍÉ³ÌØ°¢À²®Èö²¥¶ñÒâÈí¼þ£¬Èö²¥Í¾¾¶Í¨¹ýÓã²æÊ½´¹ÂÚÓʼþ£¬ÆäÄ¿µÄÊÇΪÁËÍøÂçÇ鱨¡£´Ë´Î¹¥»÷ÖУ¬¹¥»÷ÕßʹÓó£¼ûµÄºÚ¿Í¹¤¾ßSafetyKat¡¢MetasploitºÍCrackMapExec£¬ÒÔ¼°×Ô½ç˵¹¤¾ßPLINKºÍÓÃÓÚÍøÂçɨÃèºÍÆ¾Ö¤ÍøÂçµÈ¶àÖÖ¹¦Ð§µÄµÄRemexi¶ñÒâÈí¼þ¾ÙÐÐÈö²¥ºÍ¹¥»÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.bitdefender.com/files/News/CaseStudies/study/332/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf
5. Winnti×é֯ʹÓÃкóÃÅPipeMonÕë¶ÔÊÓÆµÓÎÏ·¹«Ë¾
¡¾¸ÅÊö¡¿
Hangover×éÖ¯Õë¶ÔÄÏÑǵÄÕþ¸®ºÍ¾üÊÂ×éÖ¯ÌᳫÁËÓã²æÊ½´¹ÂÚ¹¥»÷¡£´Ë´Î¹¥»÷ʹÓôøÓÐÐżþ»òÕþ¸®±í¸ñÎļþÒýÓÕÓû§ä¯ÀÀÊܹ¥»÷µÄÍøÕ¾£¬ÕâÐ©ÍøÕ¾ÀïÓÐЯ´øBackConfigľÂíµÄMicrosoft ExcelÎļþ£¬¸Ã¶ñÒâľÂí¾ßÓÐÎÞаµÄ²å¼þϵͳ½á¹¹£¬¿ÉÓÃÓÚÌṩÖÖÖÖ¹¦Ð§µÄ×é¼þ£¬°üÀ¨ÍøÂçϵͳºÍ¼üÅ̼ͼÐÅÏ¢ÒÔ¼°ÉÏÔØºÍÖ´ÐÐÆäËûÓÐÓøºÔصÄÄÜÁ¦¡£Hangover£¬Ò²±»³ÆÎªPatchwork¡¢Dropping Elephant¡¢VICEROY TIGERµÈ£¬ÊÇÒ»¸öÓëÓ¡¶ÈÓйصÄÍþв×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
6. APT15×éÖ¯µÄкóÃÅKetrum
¡¾¸ÅÊö¡¿
LampionľÂíͨ¹ý·ÂðÆÏÌÑÑÀÕþ¸®ÌṩµÄ¿¹»÷йÚÒßÇéµÄÏà¹Øµç×ÓÓʼþ¾ÙÐзַ¢£¬ÊÕ¼þÈ˵¥»÷µç×ÓÓʼþÖеÄÁ´½Óʱ£¬¶ñÒâÈí¼þ½«´ÓÔÚÏß·þÎñÆ÷ÏÂÔØ¡£¸Ã¶ñÒâÈí¼þÍøÂçÏµÍ³Ò³Ãæ¡¢ÒÑ×°ÖÃÈí¼þ¡¢Webä¯ÀÀÆ÷ÀúÊ·¼Í¼µÈÓû§ÐÅÏ¢£¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÃÅÉè¼ÆµÄWeb½çÃæ»á¼ûºÍʹÓÃÊÜѬȾµÄÅÌËã»ú¡£
¡¾²Î¿¼Á´½Ó¡¿
https://seguranca-informatica.pt/trojan-lampion-is-back-after-3-months/#.Xrudm2gzaUl
7. Amadey¶ñÒâÈí¼þа汾¿É·Ö·¢RemcosľÂí
¡¾¸ÅÊö¡¿
Amadey¶ñÒâÈí¼þ±»Ñ¬È¾ºó»á½«Óû§Êý¾Ý·¢Ë͵½C&C·þÎñÆ÷£¬²¢Ö´ÐÐC&C·þÎñÆ÷·¢»ØµÄÆäËûʹÃü¡£½üÆÚ¸Ã¶ñÒâÈí¼þ·ºÆðа汾£¬Í¨¹ýÖøÃûµÄRIG Exploit Kit (RIG EK)½»¸¶£¬Ñ¬È¾ºóÏòÓû§ÅÌËã»ú·Ö·¢RemcosľÂí¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶Ô¼ÓÄôóµÄWindows 7ϵͳ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/latest-version-amadey-introduces-screen-capturing-and-pushes-remcos-rat
8. WolfRAT¶ñÒâÈí¼þÕë¶ÔÌ©¹úÓû§
¡¾¸ÅÊö¡¿
WolfRAT¶ñÒâÈí¼þ»ùÓÚDenDroid¶ñÒâÈí¼þ¼Ò×å·ºÆðµÄ£¬½üÆÚ¹¥»÷ÕßʹÓÃWolfRATÓÃ×÷×÷Çé±¨ÍøÂ繤¾ß»ò×èµ²¹¤¾ß£¬ÆäÄ¿µÄÕë¶ÔÌ©¹úµÄAndroid×°±¸µÄͨѶӦÓóÌÐò¡£WolfRATÒÉËÆÓкڿÍ×éÖ¯Wolf ResearchÓйأ¬¸Ã×é֝ɯÓÚÓÚ¿ª·¢ÇÔÃܶñÒâÈí¼þ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html
9. ¹¥»÷ÕßʹÓÃMandrakeÌØ¹¤Èí¼þ¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷
¡¾¸ÅÊö¡¿
AndroidÌØ¹¤Èí¼þ¿ò¼ÜMandrake´Ó2016ÄêÒÔÀ´¾ÍÒ»Ö±»îÔ¾£¬¸ÃÌØ¹¤Èí¼þ²¢²»ÖÂÁ¦ÓÚѬȾ¸ü¶àµÄ×°±¸£¬¶øÊÇÖ¼ÔÚ´ÓÓÃÌØ¶¨Óû§ÊÖ»úÖÐÇÔÈ¡¸ü¶àµÄÊý¾Ý£¬Ëü¿ÉÒÔµ÷µÍÊÖ»úÒôÁ¿¡¢×èµ²µç»°»òÐÅÏ¢¡¢ÇÔȡ֤Êé¡¢ÇÔÊØÐÅÏ¢¾ÙÐÐתÕ˺ÍÀÕË÷²¢ÇÒʵÑé´¹ÂÚ¹¥»÷£¬Êܺ¦ÕßÂþÑÜÔÚ°Ä´óÀûÑÇ¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍһЩŷÖÞ¹ú¼Ò¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf
10. Õë¶ÔѧÊõÊý¾ÝÖÐÐľÙÐмÓÃÜÇ®±ÒÍÚ¿ó
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃÊÜËðµÄµÄSSHƾ֤´ÓÒ»¸öÊܺ¦ÕßÌøµ½ÆäËûÏà¹ØÁªÊܺ¦Õß¾ÙÐÐCPUÍÚ¿óÔ˶¯£¬±»Ñ¬È¾µÄÖ÷»ú·Ö³ÉÈýÀࣺXMRÍÚ¾òÖ÷»ú¡¢XMRÊðÀíÖ÷»ú¡¢SOCKSÊðÀíÖ÷»úºÍËíµÀÖ÷»ú£¬´Ë´Î¹¥»÷Õë¶ÔÖйú¡¢Å·Ö޺ͱ±ÃÀµÄѧÊõÊý¾ÝÖÐÐÄ£¬ÕâЩÊý¾ÝÖÐÐͼ±»ÓÃÓÚÕýÔÚ¾ÙÐÐCOVID-19Ñо¿¡£
¡¾²Î¿¼Á´½Ó¡¿
https://csirt.egi.eu/academic-data-centers-abused-for-crypto-currency-mining/

AG¹«Ë¾ÔÆ







