ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´

Ðû²¼Ê±¼ä 2021-12-22

ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´


ContiÍÅ»ïÒÑÎäÆ÷»¯Log4Shell²¢½¨ÉèÍêÕûµÄ¹¥»÷Á´.png


12ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Advanced Intelligence³ÆConti³ÉΪÊ׸ö½«Log4j2ÎäÆ÷»¯µÄרҵ¼¶ÀÕË÷ÔËÓªÍŻ£¬£¬£¬£¬£¬ÏÖÒÑÓµÓÐÍêÕûµÄ¹¥»÷Á´ ¡£¡£¡£¡£¡£¡£×èÖ¹12ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ¸Ã¹¥»÷Á´Îª£ºEmotet -> Cobalt Strike -> Human Exploitation -> ȱÉÙADMIN$¹²Ïí -> Kerberoast -> VMWare vCenterЧÀÍÆ÷ ¡£¡£¡£¡£¡£¡£Conti×Ô8Ô·Ý×îÏȾÙÐÐÁ˶à´Î¸üУ¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃеĺóÃźͱ¸·Ýɾ³ýÕ½ÂÔµÈ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/conti-ransomware-gang-has-full-log4shell-attack-chain/177173/


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515


FBI³Æ¹¥»÷Õ߯ð¾¢Ê¹ÓÃZohoÖÐÎó²îCVE-2021-44515.png


12ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬FBIÐû²¼¾¯±¨³ÆÓÐAPT×éÖ¯×Ô10ÔÂÏÂÑ®×îÏÈÒ»Ö±ÔÚÆð¾¢Ê¹ÓÃZohoÖеÄÎó²îCVE-2021-44515 ¡£¡£¡£¡£¡£¡£ÕâÊÇManageEngine Desktop CentralÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£¡£¡£FBI³Æ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÈëÇÖDesktop CentralЧÀÍÆ÷ºó×°ÖÃÁýÕÖÆäÕýµ±¹¦Ð§µÄwebshell£¬£¬£¬£¬£¬£¬È»ºóÏÂÔØÊ¹Óù¤¾ß£¬£¬£¬£¬£¬£¬Ã¶¾ÙÓòÓû§ºÍȺ×飬£¬£¬£¬£¬£¬¾ÙÐÐÍøÂçÕì̽£¬£¬£¬£¬£¬£¬×îºóÊÔͼºáÏòÒÆ¶¯ºÍת´¢Æ¾Ö¤ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125821/hacking/zoho-zero-day-cve-2021-44515-fbi-alert.html


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î


΢Èí±Þ²ßÓû§ÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î.png


΢ÈíÔÚ12ÔÂ20ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬±Þ²ßÓû§¾¡¿ìÐÞ¸´Active DirectoryÖÐ2¸öÌáȨÎó²î ¡£¡£¡£¡£¡£¡£Õâ2¸öÎó²îΪCVE-2021-42287ºÍCVE-2021-42278£¬£¬£¬£¬£¬£¬ÒÑÔÚ2021Äê11ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´ ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâÁ½¸öÎó²î¿ÉÔÚActive DirectoryÇéÐÎÖн¨ÉèÒ»¸öÖ±½Ó»á¼ûÓòÖÎÀíÔ±Óû§µÄ·¾¶ ¡£¡£¡£¡£¡£¡£12ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁËʹÓÃÕâЩÎó²îµÄ¿´·¨ÑéÖ¤(PoC)¹¤¾ß£¬£¬£¬£¬£¬£¬¾­²âÊÔÈ·¶¨¸Ã¹¤¾ß¿ÉÒÔÇáËɵؽ«Óû§È¨ÏÞÌáÉýÖÁÖÎÀíԱȨÏÞ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-easy-windows-domain-takeover-via-active-directory-bugs/


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ


Avast·¢Ã÷ÃÀ¹úij¹Ù·½×éÖ¯Ôâµ½APT¹¥»÷ºó±»Ö²ÈëºóÃÅ.png


½Ý¿ËÇå¾²¹«Ë¾AvastÔÚ12ÔÂ16ÈÕÅû¶ÁËÕë¶ÔÃÀ¹úij¹Ù·½×éÖ¯µÄAPT¹¥»÷»î¶¯µÄϸ½Ú ¡£¡£¡£¡£¡£¡£Avast²¢Î´¹ûÕæÄ¿µÄ×éÖ¯µÄÃû³Æ£¬£¬£¬£¬£¬£¬¾ÝThe RecordÍÆ²âÓëÃÀ¹ú¹ú¼Ê×Ú½Ì×ÔÓÉίԱ»á(USCIRF)ÓÐ¹Ø ¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷¹¥»÷»î¶¯ÖÐʹÓõÄ2¸ö¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬µÚÒ»¸öαװ³Éoci.dll²¢Ê¹ÓÃÕýµ±Ó¦ÓÃWinDivertÀ´ÕìÌýInternetͨѶ£»£»£»£»£»£»£»µÚ¶þ¸öҲαװ³ÉÁËoci.dll£¬£¬£¬£¬£¬£¬ÊÇÒ»¸ö½âÃÜÆ÷£¬£¬£¬£¬£¬£¬Óëred signatureÐж¯ÖÐʹÓõĶñÒâÈí¼þºÜÊÇÏàËÆ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/12/experts-discover-backdoor-deployed-on.html



T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°


T-MobileÉù³ÆÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°.png


12ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬T-MobileÌåÏÖÆäÔÚ2021ÄêÒÑ×èµ²Ô¼210ÒÚ¸öÕ©Æ­µç»°£¬£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÔÂʶ±ð»ò×èµ²ÁË18ÒÚ¸öÕ©Æ­µç»° ¡£¡£¡£¡£¡£¡£×èÖ¹2021Äê12ÔÂÉÏÑ®µÄÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÁ÷Á¿ÒѵִïÀúÊ·×î¸ßˮƽ£¬£¬£¬£¬£¬£¬µÖ´ïÿÖÜԼĪ4.25ÒÚ´ÎʵÑ飬£¬£¬£¬£¬£¬½ÏÖ®2020ÄêÔö·ùÁè¼Ý116% ¡£¡£¡£¡£¡£¡£Á÷Á¿×îµÍµÄÊÇ1Ô£¬£¬£¬£¬£¬£¬ÓÐ11ÒÚ¸öÕ©Æ­µç»°£»£»£»£»£»£»£»µ½11Ô£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý³ÊÖ¸ÊýÔöÌí£¬£¬£¬£¬£¬£¬Õ©Æ­µç»°µÄÊýÄ¿ÊÇ1Ô·ݵÄÒ»±¶£¬£¬£¬£¬£¬£¬µÖ´ïÁË25ÒÚ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-it-blocked-21-billion-scam-calls-this-year/


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ


Dell×îÐÂBIOS¸üе¼Ö¶à¿îÅÌËã»úÐͺŷºÆðÆô¶¯ÎÊÌâ.png


¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬×î½üÐû²¼µÄDell BIOS¸üе¼Ö¶à¿îÌõ¼Ç±¾µçÄÔºĮ́ʽ»ú·ºÆðÑÏÖØµÄÆô¶¯ÎÊÌâ ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨Dell LatitudeÌõ¼Ç±¾µçÄÔ£¨5320ºÍ5520£©£¬£¬£¬£¬£¬£¬ÒÔ¼°Dell Inspiron 5680 ºÍAlienware Aurora R8̨ʽ»ú ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÓû§³Æµ±ËûÃÇÆô¶¯×°±¸Ê±£¬£¬£¬£¬£¬£¬»áÖ±½Ó½øÈëÀ¶ÆÁ²¢ÔÙ´Î¹Ø±Õ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ÔÚDellÐû²¼½â¾ö¼Æ»®Ö®Ç°£¬£¬£¬£¬£¬£¬×î¼òÆÓµÄÐÞ¸´ÒªÁìÊǽµµ½ÒÔǰµÄ¹Ì¼þ°æ±¾ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/new-dell-bios-updates-cause-laptops-and-desktops-not-to-boot/