安全研究 Safety research
Earth Kasha组织利用ANEL后门针对日本发起钓鱼攻击 https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html  攻击者借助Weebly服务瞄准电信和金融行业 https://blog.eclecticiq.com/financially-motivated-threat-actor-leveraged-google-docs-and-weebly-services-to-target-telecom-and-financial-sectors APT-C-60组织利用正规系统服务实施网络攻击 https://blogs.jpcert.or.jp/ja/2024/11/APT-C-60.html Matrix组织发起新一轮大规模DDoS攻击 https://www.aquasec.com/blog/matrix-unleashes-a-new-widespread-ddos-campaign/
发布时间: 2024 - 12 - 02
攻击者利用Avast的Anti-Rootkit驱动程序绕过安全防护 https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/ Palo Alto Networks防火墙设备遭漏洞利用攻击 https://arcticwolf.com/resources/blog/arctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices/ 朝鲜UAT-5394组织采用新传播策略部署XenoRAT https://hunt.io/blog/xenorat-excel-xll-confuserex-as-access-method
发布时间: 2024 - 11 - 27
伊朗Emennet Pasargad组织利用WezRat恶意软件攻击以色列 https://research.checkpoint.com/2024/wezrat-malware-deep-dive/ 盲眼鹰组织近期伪造司法部门文件部署DcRat后门 https://mp.weixin.qq.com/s/DDCCjhBjUTa7Ia4Hggsa1A Helldown勒索软件详情披露 https://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/
发布时间: 2024 - 11 - 25
微软补丁日通告:2024年11月版 https://msrc.microsoft.com/update-guide/releaseNote/2024-Nov Mozi僵尸网络卷土重来,以Androxgh0st形式发起新一轮攻击 https://www.cloudsek.com/blog/mozi-resurfaces-as-androxgh0st-botnet-unraveling-the-latest-exploitation-wave WIRTE组织开始针对中东实体实施破坏性攻击 https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/
发布时间: 2024 - 11 - 18
SteelFox木马伪装成软件激活器进行窃密和挖矿活动 https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/ 新型勒索软件Interlock分析 https://blog.talosintelligence.com/emerging-interlock-ransomware/ CopyRh(ight)adamantys活动以侵权为由部署Rhadamantys窃取程序 https://research.checkpoint.com/2024/massive-phishing-campaign-deploys-latest-rhadamanthys-version/ GodFather银行木马扩大攻击范围 https://cyble.com/blog/godfather-malware-targets-500-banking-and-crypto-apps-worldwide/
发布时间: 2024 - 11 - 11
攻击者伪造韩国赌博游戏网站传播WrnRAT恶意软件 https://cybersecuritynews.com/wrnrat-delivered-gambling-games/ 新版FakeCall恶意软件劫持银行电话欺诈韩国用户 https://www.zimperium.com/blog/mishing-in-motion-uncovering-the-evolving-functionality-of-fakecall-malware/ UNC5812组织利用Telegram向乌克兰军方分发恶意软件 https://cybersecuritynews.com/russian-hackers-attacking-ukraine-military/ 台湾地区Facebook商业账户遭到信息窃取攻击 https://blog.talosintelligence.com/threat-actors-use-copyright-infringement-phishing-lure-to-deploy-infostealers/ Strela Stealer恶意软件瞄准中欧和西南欧 https://cyble.com/blog/strela-stealer-targets-europe-stealthily-via-webdav/
发布时间: 2024 - 11 - 04
StormBoobo组织CloudScout工具集技术分析 https://www.welivesecurity.com/en/eset-research/cloudscout-evasive-panda-scouting-cloud-services/ HeptaX活动利用LNK文件实现远程桌面连接 https://cyble.com/blog/heptax-unauthorized-rdp-connections-for-cyberespionage-operations/ Fog和Akira勒索团伙借助SonicWall VPN漏洞入侵企业网络 https://arcticwolf.com/resources/blog/arctic-wolf-labs-observes-increased-fog-and-akira-ransomware-activity-linked-to-sonicwall-ssl-vpn/ 印度机场航空旅客遭钓鱼攻击 https://www.cloudsek.com/blog/uncovering-the-lounge-pass-scam-campaign-targeted-android-sms-stealer-preying-on-air-travellers#Indicators UAC-0215组织瞄准乌克兰政府和军事实体 https://cert.gov.ua/article/6281076
发布时间: 2024 - 10 - 30
暴露的Docker远程API服务器被用于部署perfctl恶意软件 https://www.trendmicro.com/en_us/research/24/j/attackers-target-exposed-docker-remote-api-servers-with-perfctl-.html 越南攻击者对求职者和数字营销专业人士发起攻击 https://cyble.com/blog/vietnamese-threat-actors-multi-layered-strategy-on-digital-marketing-professionals/ 攻击者利用Gophish框架传播PowerRAT和DCRAT https://blog.talosintelligence.com/gophish-powerrat-dcrat/ Lazarus组织伪造游戏页面以部署Manuscrypt后门 https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/ 巴西银行木马Grandoreiro详情披露 https://securelist.com/grandoreiro-banking-trojan/114257/
发布时间: 2024 - 10 - 28
SideWinder组织目标扩展至中东和非洲 https://securelist.com/sidewinder-apt/114089/ Water Makara向巴西企业分发Astaroth恶意软件 https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html Cerberus银行木马在ErrorFather活动中继续活跃 https://cyble.com/blog/hidden-in-plain-sight-errorfathers-deadly-deployment-of-cerberus/ 攻击者冒充韩国大型娱乐公司投递钓鱼邮件https://asec.ahnlab.com/ko/83863/ 疑似国家级黑客利用Ivanti CSA零日漏洞实现网络入侵 https://www.fortinet.com/blog/threat-research/burning-zero-days-suspected-nation-state-adversary-targets-ivanti-csa
发布时间: 2024 - 10 - 21
CL-STA-240活动瞄准科技行业求职者 https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/ Lying Pigeo组织对摩尔多瓦政府和教育部门发动虚假信息活动 https://research.checkpoint.com/2024/disinformation-campaign-moldova/ GoldenJackal组织再度活跃,袭击欧洲政府 https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/ 恶意广告伪装成下载软件进行投放 https://www.malwarebytes.com/blog/news/2024/10/large-scale-google-ads-campaign-targets-utility-software
发布时间: 2024 - 10 - 14
新型安卓恶意软件Octo2在欧洲传播 https://www.Octo2.com/blogs/octo2-european-banks-already-under-attack-by-new-malware-variant 虚假浏览器更新传播新的WarmCookie后门软件 https://www.bleepingcomputer.com/news/security/fake-browser-updates-spread-updated-warmcookie-malware/ FIN7黑客组织利用deepfake网站下载信息窃取软件 https://www.silentpush.com/blog/fin7-malware-deepfake-ai-honeypot/#NetSupport-RAT  攻击者利用Zimbra邮件服务器中的RCE漏洞进行攻击 https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/ 恶意软件perfctl针对Linux服务器进行长期加密挖矿活动 https://www.aquasec.com/blog/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers/
发布时间: 2024 - 10 - 09
Emmenhtal恶意软件加载器分析 https://blog.sekoia.io/webdav-as-a-service-uncovering-the-infrastructure-behind-emmenhtal-loader-distribution/ Citrine Sleet组织向PyPI库投递PondRAT https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/ 意大利用户遭到SambaSpy恶意软件攻击 https://securelist.com/sambaspy-rat-targets-italian-users/113851/ WhatsUp Gold遭到远程代码执行攻击 https://www.trendmicro.com/en_us/research/24/i/whatsup-gold-rce.html Hadooken恶意软件瞄准Weblogic服务器 https://www.aquasec.com/blog/hadooken-malware-targets-weblogic-applications/
发布时间: 2024 - 09 - 23
https://www.genians.co.kr/blog/threat_intelligence/konni_universehttps://news.drweb.com/show/?i=14900&lng=en&c=9https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packageshttps://www.cleafy.com/cleafy-labs/a-new-trickmo-saga-from-banking-trojan-to-victims-data-leakhttps://www.esentire.com/blog/poseidon-stealer-uses-sopha-ai-lure-to-infect-macos
发布时间: 2024 - 09 - 18
朝鲜黑客组织Konni加大对俄罗斯和韩国的攻击力度 https://www.genians.co.kr/blog/threat_intelligence/konni_universe DragonRank:一家利用恶意软件操纵SEO排名服务的运营商 https://blog.talosintelligence.com/dragon-rank-seo-poisoning/ RansomHub勒索团伙利用TDSSKiller和LaZagne禁用EDR软件 https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/ Quad7僵尸网络团伙新动态披露 https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/ 微软补丁日通告:2024年9月版 https://msrc.microsoft.com/update-guide/releaseNote/2024-Sep
发布时间: 2024 - 09 - 11
Head Mare黑客组织揭秘 https://securelist.com/head-mare-hacktivists/113555/ Stone Wolf组织向俄罗斯公司投递Meduza Stealer https://bi-zone.medium.com/stone-wolf-employs-meduza-stealer-to-hack-russian-companies-db3fd0e7af02 Underground勒索软件信息公开 https://www.fortinet.com/blog/threat-research/ransomware-roundup-underground 俄罗斯APT29对蒙古政府网站实施水坑攻击 https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/ 马来西亚政府人员遭到Babylon木马攻击 https://cyble.com/blog/the-intricate-babylon-rat-campaign-targets-malaysian-politicians-government/
发布时间: 2024 - 09 - 09
Barix Sip_client_firmware存在信息暴露漏洞 https://cxsecurity.com/cveshow/CVE-2024-41700/ Tenda Fh1201_firmware存在跨界内存写漏洞 https://www.tendacn.com/download/detail-3322.html Dreamer_cms_project Dreamer_cms存在跨站请求伪造漏洞 https://nvd.nist.gov/vuln/detail/CVE-2023-48060 Live555存在释放后使用漏洞 https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202401-1162 Python存在低效的正则表达式复杂性漏洞 https://github.com/python/cpython/pull/123075
发布时间: 2024 - 09 - 04
UTG-Q-010组织对中国实体发起钓鱼攻击 https://cyble.com/blog/analysing-the-utg-q-010-campaign/ ValleyRAT多阶段恶意软件瞄准中文使用者 https://www.fortinet.com/blog/threat-research/valleyrat-campaign-targeting-chinese-speakers 俄罗斯Tusk组织假冒品牌网站传播DanaBot与StealC恶意软件 https://securelist.com/tusk-infostealers-campaign/113367/ Xeon Sender云攻击工具被用于开展大规模短信钓鱼活动 https://www.sentinelone.com/labs/xeon-sender-sms-spam-shipping-multi-tool-targeting-saas-credentials/ UULoader恶意软件攻击韩语和中文使用者 https://cyberint.com/blog/research/meet-uuloader-an-emerging-and-evasive-malicious-installer/
发布时间: 2024 - 08 - 26
Rockwell Automation Micro850/870漏洞预警https://www.cisa.gov/news-events/ics-advisories/icsa-24-226-07摩诃草组织Spyder下载器新变种揭秘https://mp.weixin.qq.com/s/M6xoCfqMCSDsv32S0vrGEw UAC-0198组织向乌克兰政府投递ANONVNC恶意软件https://cert.gov.ua/article/6280345攻击者在新社会工程学活动中更新有效负载https://www.rapid7.com/blog/post/2024/08/12/ongoing-social-engineering-campaign-refreshes-payloads/Earth Baku组织近期活动详情披露https://www.trendmicro.com/en_us/research/24/h/earth-baku-latest-campaign.html
发布时间: 2024 - 08 - 19
微软补丁日通告:2024年8月版 https://msrc.microsoft.com/update-guide/releaseNote/2024-Aug AVEVA SuiteLink Server漏洞预警 https://www.cisa.gov/news-events/ics-advisories/icsa-24-226-01 Rockwell Automation Micro850/870漏洞预警 https://www.cisa.gov/news-events/ics-advisories/icsa-24-226-07 UAC-0198组织向乌克兰政府投递ANONVNC恶意软件 https://cert.gov.ua/article/6280345 伊朗APT42加强对以色列和美国的钓鱼攻击力度 https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/
发布时间: 2024 - 08 - 14
1、StackExchange平台被用于传播恶意Python包https://checkmarx.com/blog/stackexchange-abused-to-spread-malicious-python-package-that-drains-victims-crypto-wallets/ 2、Hunters International组织使用新木马SharpRhino https://www.quorumcyber.com/insights/sharprhino-new-hunters-international-rat-identified-by-quorum-cyber/ 3、攻击者利用TryCloudflare向政府部门分发多种恶意软件 https://www.esentire.com/blog/quartet-of-trouble-xworm-asyncrat-venomrat-and-purelogs-stealer-leverage-trycloudflare 4、BlankBot安卓银行木马瞄准土耳其用户 https://intel471.com/blog/blankbot-a-new-android-banking-trojan-with-screen-recording-keylogging-and-remote-control-capabilities 5、Bloody Wolf利用STRRAT商业恶意软件攻击哈萨克斯坦https://bi.zone/eng/expertise/blog/bloody-wolf-primenyaet-kommercheskoe-vpo-strrat-protiv-organizatsiy-v-kazakhstane/
发布时间: 2024 - 08 - 12
友情连接:
免费服务热线 ree service hotline 400-613-1868 手机端
法律声明 Copyright  西安交大捷普网络科技有限公司  陕ICP备18022218号-1

陕公网安备 61019002000857号

犀牛云提供云计算服务