TI.360.CN
高级威胁分析
1、关于朝鲜黑客社会工程学+水坑+钓鱼攻击活动微软的分析报告
https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/
2、真主党黑客团伙“Lebanese Cedar”攻击美国,英国,埃及,约旦,黎巴嫩,沙特阿拉伯,以色列和巴勒斯坦权力机构的许多公司,其中大多数受害者代表电信运营商(Etisalat,Mobily,Vodafone Egypt), Internet服务提供商(SaudiNet,TE Data)以及托管和基础结构服务提供商(Secured Servers LLC,iomart)
一般来说,打运营商,必有大谋
https://www.clearskysec.com/cedar/
3、ThreatNeedle的C2通信的深入分析,关于Lazarus组织疑似使用ThreatNeedle木马在本次社工攻击中的分析。
https://medium.com/s2wlab/analysis-of-threatneedle-c-c-communication-feat-google-tag-warning-to-researchers-782aa51cf74
4、A41APT case ~ Analysis of the Stealth APT Campaign Threatening Japan
啥也不说了,看截图吧
https://jsac.jpcert.or.jp/archive/2021/pdf/JSAC2021_202_niwa-yanagishita_en.pdf
5、Internals of Lazarus Operation Dream Job
https://0xthreatintel.medium.com/internals-of-lazarus-operation-dream-job-7ced9fc7da3e
6、PWC的报告,商业电子邮件恶意攻击
https://github.com/PwC-IR/Business-Email-Compromise-Guide/blob/main/PwC-Business_Email_Compromise-Guide.pdf
技术分享
1、物联网僵尸网络VPNFilter
感染还是很多啊
https://www.trendmicro.com/en_us/research/21/a/vpnfilter-two-years-later-routers-still-compromised-.html
2、密码爆破工具
https://github.com/S4R1N/Tritium
3、Pro-Ocean: Rocke Group’s New Cryptojacking Malware
https://unit42.paloaltonetworks.com/pro-ocean-rocke-groups-new-cryptojacking-malware/
漏洞相关
1、日本工控设备命令执行漏洞(缓冲区溢出,越界读取,越界写,未初始化指针的访问),富士电机Tellus Lite V-Simulator和V-Server Lite。
@大网测绘搞一把
https://us-cert.cisa.gov/ics/advisories/icsa-21-026-01
2、CVE-2021-3156 Sudo漏洞已允许任何本地用户在无需身份验证的类Unix操作系统上获得root特权。
测试命令:
sudoedit -s '' `perl -e 'print "A" x 65536'`
https://www.sudo.ws/alerts/unescape_overflow.html
3、Docker容器转义漏洞逃逸Microsoft Azure Functions
https://github.com/tsarpaul/Azure-Functions-EoP-PoC
https://thehackernews.com/2021/01/new-docker-container-escape-bug-affects.html
4、又可能被NSO 利用的漏洞
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html
5、Node.js应用程序中远程执行代码漏洞
https://portswigger.net/daily-swig/potential-remote-code-execution-vulnerability-uncovered-in-node-js-apps
6、警惕可以被供应链攻击的漏洞,可以在Microsoft VS Code的官方GitHub存储库并提交文件
https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/
7、Cisco DNA Center Bug Opens Enterprises to Remote Attack
https://threatpost.com/cisco-dna-center-bug-remote-attack/163302/
数据泄露
1、巴基斯坦打车应用暴露了4亿条记录
https://www.hackread.com/bykea-data-breach-pakistani-ride-hailing-app/
2、1.76亿巴基斯坦手机用户的数据库,涉及巴基斯坦的一些主要电信公司包括Zong,Warid,Ufone,Telenor和Jazz。像是被黑了脱裤了?
https://www.hackread.com/pakistani-mobile-phone-users-database-sold-online/
3、5.33亿FaceBook用户数据在线售卖。
https://ciso.economictimes.indiatimes.com/news/data-of-533mn-fb-users-being-sold-via-telegram-bot/80471782
网络战与网络情报
1、Emotet僵尸网络众多网络基础被国际组织联手关停
https://www.justice.gov/usao-mdnc/pr/emotet-botnet-disrupted-international-cyber-operation
2、国际执法机构打击NetWalker勒索软件
https://www.justice.gov/opa/pr/department-justice-launches-global-action-against-netwalker-ransomware
本文始发于微信公众号(ThreatPage全球威胁情报):今日威胁情报2021/1/27-29(第343期)
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论