ArmisÅû¶PTSϵͳÖеÄͳ³ÆÎªPwnedPiperµÄÎó²î£»£»£»£»£»CyCraftÐû²¼Õë¶ÔÀÕË÷Èí¼þPrometheusµÄÃ⺬»ìÃÜÆ÷

Ðû²¼Ê±¼ä 2021-08-03
1.ArmisÅû¶PTSϵͳÖеÄͳ³ÆÎªPwnedPiperµÄÎó²î


1.jpg


Çå¾²¹«Ë¾ArmisÅû¶SwissLogµÄTransLogic PTS£¨Æø¶¯¹Üϵͳ) ÖÐͳ³ÆÎªPwnedPiperµÄ9¸öÎó²î£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìÈ«ÃÀ80%µÄÒ½Ôº¡£¡£¡£ ¡£TransLogic PTSÓÃÓÚÔÚ´óÖÐÐÍÒ½ÔºÖг¤¾àÀëÔËËÍÒ½ÁÆÎïÆ·£¬£¬£¬£¬£¬ £¬£¬ÒÑÔÚ±±ÃÀ2300¶à¼ÒҽԺʹÓᣡ£¡£ ¡£ÕâЩÎó²îÖÐ×îÑÏÖØµÄÊÇδ¾­Éí·ÝÑéÖ¤¡¢Î´¼ÓÃÜ¡¢Î´ÊðÃûµÄ¹Ì¼þÉý¼¶Îó²î£¨CVE-2021-37160£©£¬£¬£¬£¬£¬ £¬£¬¿ÉÓÃÀ´ÔÚϵͳÉÏ×°ÖöñÒâ¹Ì¼þÀ´ÍêÈ«¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬ÉÐÓÐÌáȨÎó²î£¨CVE-2021-37167£©¡¢DoSÎó²î£¨CVE-2021-37166£©ºÍtcpTxThreadÖеÄÈý±¶¿ÍÕ»Òç³ö£¨CVE-2021-37164£©µÈÎó²î¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/pwnedpiper-pts-security-flaws-threaten.html


2.KasperskyÅû¶ÐµÄGhostEmperorÍÅ»ïÕë¶Ô¶«ÄÏÑÇ


2.jpg


KasperskyÅû¶ÁËÒ»¸öеĺڿÍÍÅ»ïGhostEmperor£¬£¬£¬£¬£¬ £¬£¬Ö÷ÒªÕë¶Ô¶«ÄÏÑǵØÇøµÄÄ¿µÄ£¬£¬£¬£¬£¬ £¬£¬°üÀ¨Õþ¸®»ú¹¹ºÍ¼¸¼ÒµçÐŹ«Ë¾¡£¡£¡£ ¡£¸ÃÍÅ»ïµÄÈëÇֻÒÀÀµÓÚCheat Engine¿ªÔ´ÏîÄ¿µÄÒ»¸ö×é¼þ£¬£¬£¬£¬£¬ £¬£¬ËüÄܹ»ÈƹýWindowsÇý¶¯³ÌÐòÇ¿ÖÆÊðÃû»úÖÆ¡£¡£¡£ ¡£¸ÃÍÅ»ïÖ®ÒÔÊÇÓëÖÚ²î±ð£¬£¬£¬£¬£¬ £¬£¬ÊÇÓÉÓÚËüʹÓÃÁËÒ»¸öÒÔǰ²»ÎªÈËÖªµÄWindowsÄÚºËģʽµÄrootkit£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒ½ÓÄÉÁËÖØ´óµÄ¶à½×¶Î¶ñÒâÈí¼þ¿ò¼Ü£¬£¬£¬£¬£¬ £¬£¬Ö¼ÔÚ¶ÔÄ¿µÄЧÀÍÆ÷¾ÙÐÐÔ¶³Ì¿ØÖÆ¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120721/apt/ghostemperor-chinese-speaking-threat-actor.html


3.CiscoÅû¶¶ñÒâÈí¼þSolarmarkerÐÂÒ»ÂֵĹ¥»÷»î¶¯


3.jpg


Cisco TalosÅû¶Á˶ñÒâÈí¼þSolarmarkerÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£ ¡£ÔÚ2021Äê5ÔÂβºÍ6Ô³õ×óÓÒ£¬£¬£¬£¬£¬ £¬£¬Talos¼ì²âµ½ÐÂÒ»ÂÖSolarmarker¹¥»÷»î¶¯¼¤Ôö¡£¡£¡£ ¡£ÔÚ×î½üµÄÕâЩµü´úÖУ¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õßµ÷½âÁ˳õʼdropperµÄÏÂÔØÒªÁ죬£¬£¬£¬£¬ £¬£¬²¢¶Ôstaging×é¼þ£¨ÏÖÔÚ³ÆÎªMars£©¾ÙÐÐÁËÉý¼¶¡£¡£¡£ ¡£ÒÔǰSolarmarker½«´Ó´øÓÐͨÓÃÎÊÌâÃû³ÆPdfDocDownloadsPanelµÄÒ³ÃæÏÂÔØ£¬£¬£¬£¬£¬ £¬£¬¶ø´Ë´Î»î¶¯ÖеÄÏÂÔØÒ³ÃæÏÖαÔì³ÉÀ´×ԹȸèDriveµÄÏÂÔØÎļþÇëÇ󣬣¬£¬£¬£¬ £¬£¬¿´ÆðÀ´Ô½·¢Õýµ±¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/07/threat-spotlight-solarmarker.html


4.CyCraftÐû²¼Õë¶ÔÀÕË÷Èí¼þPrometheusµÄÃ⺬»ìÃÜÆ÷


4.jpg


Çå¾²¹«Ë¾CyCraftÐû²¼Ã⺬»ìÃÜÆ÷£¬£¬£¬£¬£¬ £¬£¬×ÊÖúÀÕË÷Èí¼þPrometheusµÄÊܺ¦Õ߻ָ´Ï¢ÕùÃÜÎļþ¡£¡£¡£ ¡£CyCraftÌåÏÖ£¬£¬£¬£¬£¬ £¬£¬PrometheusʹÓÃÁËSalsa20ºÍ»ùÓÚtickcountµÄËæÉñÃØÂëÀ´¼ÓÃÜÎļþ¡£¡£¡£ ¡£ËæÉñÃØÂëµÄ¾ÞϸΪ32×Ö½Ú£¬£¬£¬£¬£¬ £¬£¬Ã¿¸ö×Ö·û¶¼Êǿɼû×Ö·û£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒÓÉÓÚÃÜÂëÒÔtickcount×÷ΪÃÜÔ¿£¬£¬£¬£¬£¬ £¬£¬ÒÔÊÇ¿ÉÒÔʹÓñ©Á¦ÆÆ½â¡£¡£¡£ ¡£Emsisoft¹«Ë¾ÌåÏָýâÃÜÆ÷ΨһµÄÈõµãÊÇÖ»ÄÜÆÆ½âСÎļþµÄ½âÃÜÃÜÔ¿¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬½âÃÜÆ÷Ðû²¼²»¾Ãºó£¬£¬£¬£¬£¬ £¬£¬PrometheusÍÅ»ïËÆºõÒѾ­×èÖ¹ÁËÐж¯¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/decryptor-released-for-prometheus-ransomware-victims/


5.SonicWallÐû²¼2021ÄêÉϰëÄêÍøÂçÌ¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


SonicWallÐû²¼ÁË2021ÄêÉϰëÄêÍøÂçÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷Èí¼þ¹¥»÷ÔÚ2021ÄêÉϰëÄêÊ®·Ö·Å×Ý£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾¼ì²âµ½µÄ¹¥»÷ʵÑéµÖ´ï3.047ÒڴΣ¬£¬£¬£¬£¬ £¬£¬ Áè¼ÝÁË2020ÕûÄêµÄ¹¥»÷×ÜÊý¡£¡£¡£ ¡£ÃÀ¹ú¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÄϷǺͰÍÎ÷µÈ¹ú¼ÒÊÇÊÜÀÕË÷Èí¼þ¹¥»÷×îÑÏÖØµÄ¹ú¼Ò£¬£¬£¬£¬£¬ £¬£¬ÆäÖÐÃÀ¹úÊÜÓ°Ïì½Ï´óµÄµØÇøÊÇ·ðÂÞÀï´ïÖÝ£¬£¬£¬£¬£¬ £¬£¬ÓÐ1.111Òڴι¥»÷ʵÑé¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷¹¥»÷×î³£¼ûµÄÄ¿µÄÊǽðÈÚ»ú¹¹ÒÔ¼°¹ú·ÀµÈÖ÷ÒªµÄÕþ¸®×éÖ¯£¬£¬£¬£¬£¬ £¬£¬¶øÕë¶Ô½ÌÓýÐÐÒµµÄ¹¥»÷Ôò¼¤ÔöÁË615%¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.sonicwall.com/2021-cyber-threat-report/


6.DeepinstinctÐû²¼2021ÄêÖÐÍøÂçÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ


6.jpg


Deep InstinctÐû²¼ÁË2021ÄêÖÐÍøÂçÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷Èí¼þÒ»Ö±ÊÇÕû¸ö2021ÄêµÄÖ÷µ¼Ç÷ÊÆ£¬£¬£¬£¬£¬ £¬£¬ÆäÖÐÖ÷ÒªÍþвΪSTOP(Djvu)¡¢RyukºÍSodinokibi(REvil)µÈ¡£¡£¡£ ¡£ÒøÐÐľÂí»î¶¯µÄÖ÷ÒªÍþвΪEmotetµÄ¼ÌÈÎÕߣ¬£¬£¬£¬£¬ £¬£¬ÀýÈçRamnit¡¢QbotºÍIcedID¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬Õë¶ÔColonial PipelineµÄ¹¥»÷³ÉΪȫÇòµÄ½¹µã£¬£¬£¬£¬£¬ £¬£¬µ«ÕâÖ»Êǹ¥»÷Òªº¦»ù´¡ÉèÊ©µÄÖڶ๥»÷ʵÑéÖ®Ò»£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒÔ¤¼ÆÕâÖÖ¹¥»÷Õ½ÂÔ½üÆÚÄÚ²»»á±¬·¢¸Ä±ä¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.deepinstinct.com/2021/07/22/2021-mid-year-cyber-threat-landscape-report/