ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶

Ðû²¼Ê±¼ä 2021-01-07

1.ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷


1.jpg


ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷ ¡£¡£¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬ £¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬠£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë ¡£¡£¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë ¡£¡£¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬ £¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


2.Intezer·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦ÓÃ


2.jpg


Intezer Labs·¢Ã÷ElectroRAT²ØÓÚαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Óà ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÔçÔÚ2020Äê1ÔÂ8ÈÕ¾Í×îÏÈ»îÔ¾£¬ £¬£¬£¬¿ÉÊÇÔÚ2020Äê12Ô²ű»·¢Ã÷ ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÖ÷ÒªÒÀÀµÓÚÈý¸öÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄÓ¦ÓÃJamm¡¢eTrade/KintumºÍDaoPokerÀ´·Ö·¢¶ñÒâÈí¼þElectroRAT ¡£¡£¡£¡£¡£¡£ElectroRAT¾ßÓм«Ç¿µÄÇÖÈëÐÔ£¬ £¬£¬£¬¾ßÓмüÅ̼ͼ¡¢½ØÍ¼¡¢ÉÏ´«Îļþ¡¢ÏÂÔØÎļþÒÔ¼°ÔÚÄ¿µÄ¿ØÖÆÌ¨ÉÏÖ´ÐÐÏÂÁîµÈ¹¦Ð§£¬ £¬£¬£¬ÏÖÔÚ¿ÉÄÜÒѾ­Ñ¬È¾ÁËԼĪ6500¸öÓû§ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-target-cryptocurrency-users-with-new-electrorat-malware/


3.°ÄÕþ¸®ÖÒÑÔ·¸·¨ÍÅ»ïð³äÆäÍøÂçÇå¾²ÖÐÐÄ·Ö·¢¶ñÒâÈí¼þ


3.png


°Ä´óÀûÑÇÕþ¸®ÖÒÑԳƣ¬ £¬£¬£¬·¸·¨ÍÅ»ïð³ä°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©·Ö·¢¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÕʹÊܺ¦Õß×°ÖÃÔ¶³ÌÖÎÀíºÍ×ÀÃæ¹²ÏíÈí¼þ£¬ £¬£¬£¬Ö¼ÔÚÇÔȡĿµÄÓû§µÄÒøÐÐÐÅÏ¢ ¡£¡£¡£¡£¡£¡£ÆäÊ×ÏÈʹÓÃαװ³ÉACSC¹Ù·½ÐÂÎŵĵç×ÓÓʼþ£¬ £¬£¬£¬¼û¸æÊܺ¦ÕßµçÄÔÒѾ­±»ÈëÇÖ£¬ £¬£¬£¬ÐèҪͨ¹ý¶ñÒâÁ´½ÓÏÂÔØ¼ÙµÄɱ¶¾Èí¼þ ¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÏÂÔØ²¢Æô¶¯ºó£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í¿ÉÄܽÓÊÜÆäÅÌËã»ú²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬ £¬£¬£¬¸ÃÍŻﻹ»áʹÓÃαÔìµÄµç»°ºÅÂë¸øÊܺ¦Õß´òµç»°£¬ £¬£¬£¬ÒªÇóËûÃÇÏÂÔØTeamViewer»òAnyDeskÓ¦Ó㬠£¬£¬£¬ÒÔ·Ö·¢¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/australian-cybersecurity-agency-used-as-cover-in-malware-campaign/


4.Check PointÐû²¼Õë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ


4.png


Check PointÐû²¼ÁËÕë¶ÔÈ«ÇòÒ½ÁÆ»ú¹¹µÄ¹¥»÷µÄÆÊÎö±¨¸æ ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬×Ô2020Äê11ÔÂ1ÈÕÒÔÀ´È«ÇòÕë¶ÔÒ½ÁÆÐÐÒµµÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÁè¼Ý45£¥£¬ £¬£¬£¬¶øÕë¶ÔÆäËûÐÐÒµµÄ¹¥»÷ƽ¾ùÔöÌíÁË22£¥£»£»£»£»ÔÚ11ÔÂÿ¸ö×é֯ƽ¾ùÿÖÜÔâµ½626´Î¹¥»÷£»£»£»£»Éæ¼°µ½ÀÕË÷Èí¼þ¡¢½©Ê¬ÍøÂç¡¢Ô¶³Ì´úÂëÖ´ÐкÍDDoSµÄ¹¥»÷ÔÚ11Ô·ݶ¼ÓÐËùÔöÌí£¬ £¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷µÄÔöÌí×îΪÏÔ×Å£»£»£»£»¹¥»÷ÖÐʹÓõÄÖ÷ÒªÀÕË÷Èí¼þÊÇRyuk£¬ £¬£¬£¬Æä´ÎÊÇSodinokibi ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/05/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again/


5.ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý²¢³ÆÓû³öÊÛ¸ü¶à


5.png


ºÚ¿Í¹ûÕæ1ÍòÕÅExpressÐÅÓÿ¨Êý¾Ý£¬ £¬£¬£¬²¢³ÆÓû³öÊÛ¸ü¶àExpress¡¢SantanderºÍBanamexÒøÐпͻ§µÄÐÅÓÿ¨ÐÅÏ¢ ¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄ10000Ìõ¼Í¼°üÀ¨ÍêÕûµÄÃÀ¹úExpressÐÅÓÿ¨ºÅºÍ¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ £¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÐԱ𣬠£¬£¬£¬¿ÉÊDz¢Ã»ÓÐÐÅÓÿ¨µÄµ½ÆÚÈÕÆÚ¡¢ÃÜÂë»òÃô¸ÐµÄ²ÆÎñÊý¾Ý ¡£¡£¡£¡£¡£¡£Âô·½ÌåÏÖ²¢²»³öÊÛÃÜÂëºÍÉí·ÝÖ¤ºÅµÈ˽ÈËÊý¾Ý£¬ £¬£¬£¬ÕâЩÊý¾Ý½ö»á±»ÓÃÓÚÀ¬»øÓʼþ»òÓªÏú¹ã¸æ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-posts-data-of-10-000-american-express-accounts-for-free/


6.NISSAN±±ÃÀ·Ö¹«Ë¾ÒòGitЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÔ´´úÂëй¶


6.png


NISSAN±±ÃÀ·Ö¹«Ë¾ÒòÔÚBitbucket GitЧÀÍÆ÷ÖÐʹÓÃÁËĬÈÏÆ¾Ö¤admin/admin£¬ £¬£¬£¬µ¼ÖÂÆäÒÆ¶¯Ó¦ÓóÌÐòºÍÄÚ²¿¹¤¾ßµÄÔ´´úÂëй¶ ¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÔ´´úÂë°üÀ¨ÈÕ²úNA MobileÓ¦Óá¢ÈÕ²úASISTÕï¶Ï¹¤¾ßµÄijЩ²¿·Ö¡¢¾­ÏúÉÌӪҵϵͳ/¾­ÏúÉÌÃÅ»§¡¢ÈÕ²úÄÚ²¿½¹µãmobile library¡¢ÈÕ²ú/Ó¢·ÆÄáµÏNCAR/ICARЧÀÍ¡¢¿Í»§»ñÈ¡ºÍ±£´æ¹¤¾ß¡¢ÏúÊÛ/Êг¡Ñо¿¹¤¾ß+Êý¾Ý¡¢ÖÖÖÖÓªÏú¹¤¾ß¡¢³µÁ¾ÎïÁ÷ÃÅ»§¡¢³µÁ¾ÁªÍøÐ§ÀÍ/ÈÕ²úÁªÍø¡¢ÒÔ¼°ÆäËüÖÖÖÖºó¶ËºÍÄÚ²¿¹¤¾ßµÈ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nissan-source-code-leaked-online-after-git-repo-misconfiguration/