安全研究 SECURITY SERVICE

Ursnif变体通过Word文档传播,使用异常处理函数解密恶意代码

发布时间: 2019-08-13
来源:
浏览数: 61

(2019-03-15)今日威胁情报



 

1、Ursnif变体通过Word文档传播,使用异常处理函数解密恶意代码


相关链接:https://redqueen.tj-un.com/IntelDetails.html?id=1f4214299d5e4cf6bb926d90668f5828


2、新僵尸网络木马Emptiness,通过变换C&C协议逃避追踪


相关链接:https://redqueen.tj-un.com/IntelDetails.html?id=71aa2f3ad24e488883f18b8497eba68f


3、针对中文网站用户的水坑钓鱼攻击,利用WinRAR和RTF文件漏洞


相关链接:https://redqueen.tj-un.com/IntelDetails.html?id=c8b7dcc734164e03b6aadaea877a257d


4、安全研究人员称中兴4G热点可能成为黑客的温床


相关链接:https://www.cnbeta.com/articles/tech/877311.htm



(2019-03-15)今日威胁情报




1、【高】网站安全狗(Apache版)V4.0存在SQL注入漏洞(CNVD-2019-21949)


相关链接:https://www.cnvd.org.cn/flaw/show/CNVD-2019-21949


2、【高】深喉咙CMS v4.2存在文件写入漏洞(CNVD-2019-21950)


相关链接:https://www.cnvd.org.cn/flaw/show/CNVD-2019-21950


3、【高】WordPress acf-better-search插件跨站请求伪造漏洞(CNVD-2019-27015)


相关链接:https://www.cnvd.org.cn/flaw/show/CNVD-2019-27015


4、【中】Backdrop CMS跨站脚本漏洞(CNVD-2019-26880)


相关链接:https://www.cnvd.org.cn/flaw/show/CNVD-2019-26880



分享到:
  • 相关推荐 RELATED TO RECOMMEND
  • 点击次数: 11
    2025 - 06 - 09
    1、APT组织利用PathWiper恶意软件针对乌克兰关键基础设施  https://blog.talosintelligence.com/pathwiper-targets-ukraine/ 2、Chaos RAT新变种针对Linux和Windows用户  https://gbhackers.com/new-chaos-rat-targets-linux-and-windows-users/  3、APT组织利用VELETRIX和VShell恶意软件攻击中国电信行业 https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/
  • 点击次数: 21
    2025 - 06 - 03
    新型信息窃取恶意软件EDDIESTEALER通过假验证码传播  https://www.elastic.co/security-labs/eddiestealer Siemens SiPass Integrated漏洞预警  https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-02 Instantel Micromate漏洞预警  https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04 Silent Werewolf针对俄摩两国利用伪装邮件投递恶意加载器 https://bi.zone/eng/expertise/blog/silent-werewolf-ispolzuet-novye-zagruzchiki-v-atakakh-na-rossiyskie-i-moldavskie-organizatsii/
  • 点击次数: 13
    2025 - 05 - 19
    Siemens SIMATIC PCS neo漏洞预警https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-12 新型.NET多阶段加载器持续传播多款恶意软件 https://gbhackers.com/new-net-multi-stage-loader-targets-windows-systems/ APT28利用XSS漏洞向高价值邮件服务器注入恶意代码 https://gbhackers.com/russian-hackers-exploit-xss-vulnerabilities/ ECOVACS DEEBOT Vacuum and Base Station漏洞预警 https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-19
  • 点击次数: 12
    2025 - 05 - 07
    Mimic勒索软件变体通过Clipper窃取凭证重返医疗系统 https://nationalcybersecurity.com/mimic-ransomware-variant-targets-healthcare-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=mimic-ransomware-variant-targets-healthcare-ransomware-cybercrime CLFS零日漏洞利用导致勒索软件活动 https://nationalcybersecurity.com/exploitation-of-clfs-zero-day-leads-to-ransomware-activity-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=exploitation-of-clfs-zero-day-leads-to-ransomware-activity-ransomware-cybercrime DragonForce勒索团伙近期针对英国零售业发动大规模攻击https://nationalcybersecurity.com/dragonforce-ransomware-gang-from-hacktivists-to-high-street-extortionists-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=dragonforce-ransomware-gang-from-hacktivists-to-hig...
  • 点击次数: 14
    2025 - 04 - 14
    微软补丁日通告:2025年4月版https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr Neptune RAT:针对Windows系统的高级远控木马  https://www.cyfirma.com/research/neptune-rat-an-advanced-windows-rat-with-system-destruction-capabilities-and-password-exfiltration-from-270-applications/ 伪装成政府官方应用的Android恶意软件变种分析 https://www.seqrite.com/blog/beware-fake-nextgen-mparivahan-malware-returns-with-enhanced-stealth-and-data-theft/ Scattered Spider借助多种钓鱼套件与RAT技术持续发起网络攻击 https://www.silentpush.com/blog/scattered-spider-2025/?utm_source=rss&utm_medium=rss&utm_campaign=scattered-spider-2025 APT32利用GitHub对安全团队和企业网络发动攻击 https://gbhackers.com/apt32-turns-github-into-a-weapon-against-security-teams/
友情连接:
免费服务热线 ree service hotline 400-613-1868 手机端
法律声明 Copyright  西安交大捷普网络科技有限公司  陕ICP备18022218号-1

陕公网安备 61019002000857号

犀牛云提供云计算服务