type
stringclasses
1 value
custom_template
null
created_at
stringlengths
24
24
id
stringlengths
24
24
slug
stringlengths
2
124
featured
int64
0
1
updated_at
stringlengths
24
24
visibility
stringclasses
1 value
status
stringclasses
2 values
feature_image
stringclasses
7 values
published_at
stringlengths
24
24
title
stringlengths
2
127
html
stringlengths
4
358k
plaintext
stringlengths
1
82.3k
mobiledoc
stringlengths
99
369k
comment_id
stringlengths
1
24
post
null
2019-01-31T02:39:49.000Z
63873b9a8b1c1e0007f52ee3
v2-demo-post
0
2019-02-15T07:20:06.000Z
public
draft
null
2019-01-31T02:39:49.000Z
Koenig Demo Post
<p>Hey there! Welcome to the new Ghost editor - affectionately known as <strong>Koenig</strong>.</p><p>Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, ...
Hey there! Welcome to the new Ghost editor - affectionately known as Koenig. Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, if that's what you prefer...
{"version":"0.3.1","atoms":[],"cards":[["hr",{}],["embed",{"url":"https://twitter.com/TryGhost/status/761119175192420352","html":"<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">Fun announcement coming this afternoon ? what could it be?</p>&mdash; Ghost (@TryGhost) <a href=\"https://twitter.com/TryGhost/...
5c525ff5e604c8004fbbd5dd
post
null
2016-09-02T03:46:03.000Z
63873b9a8b1c1e0007f52ee4
conficker-domain-abuse
0
2018-10-06T08:54:04.000Z
public
published
null
2016-09-02T08:28:38.000Z
Conficker域名被滥用情况分析
<!--kg-card-begin: markdown--><p>根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。</p> <p>由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。</p> <h2 id="conficker">Conficker域名现状及被滥用状况</h2> <h3 id="conficker">Conficker简介</h3> <p>Conficker是出现于2008年11...
根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。 由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。 Conficker域名现状及被滥用状况 Conficker简介 Conficker是出现于2008年11月,曾感染了数百万台电脑。Conficker有一个独特的特性是它使用了DGA技术。利用随机生成的域名来防止网络设备的封堵。自此以后DGA技术也开始逐渐流行起来。关于con...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。\n\n由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。\n\n##Conficker域名现状及被滥用状况\n\n###Conficker...
8
post
null
2016-09-02T03:50:47.000Z
63873b9a8b1c1e0007f52ee5
cldap-is-now-the-3rd-reflection-amplified-ddos-attack-vector-surpassing-ssdp-and-chargen-en
0
2021-05-08T05:10:18.000Z
public
published
null
2017-11-01T10:14:35.000Z
CLDAP is Now the No.3 Reflection Amplified DDoS Attack Vector, Surpassing SSDP and CharGen
<!--kg-card-begin: markdown--><p>Author: Xu Yang,kenshin</p> <p>With our <a href="https://ddosmon.net/">DDoSMon</a>, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection...
Author: Xu Yang,kenshin With our DDoSMon, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection amplification attacks. They rank respectively 1st, 2nd, 3rd and 4th in th...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: Xu Yang,kenshin\n\n\nWith our [DDoSMon](https://ddosmon.net/), we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have b...
12
post
null
2016-09-02T06:44:58.000Z
63873b9a8b1c1e0007f52ee6
new-elknot-billgates-variant-with-xor-like-c2-configuration-encryption-scheme
0
2018-10-06T08:53:33.000Z
public
published
null
2016-09-02T07:46:45.000Z
New Elknot/Billgates Variant with XOR like C2 Configuration Encryption Scheme
<!--kg-card-begin: markdown--><h1 id="overview">Overview</h1> <p>Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms <a href="https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf">[1]</a> <a href="http://blog.malwaremustdie.org/20...
Overview Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [1] [2] [3] [4]. Multiple variants have been found since its first appearance, while the most infamous variant is called BillGates by many researchers because of its characteristic use of Bill and Gates modules [5]. Besid...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#Overview\nElknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [[1]](https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf) [[2...
16
post
null
2016-10-09T02:39:13.000Z
63873b9a8b1c1e0007f52ee7
invalid-rdata-in-dns
0
2018-10-06T08:54:59.000Z
public
published
null
2016-10-09T03:08:28.000Z
DNS中的“无效Rdata”
<!--kg-card-begin: markdown--><p>所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。</p> <p>在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。</p> <p>另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。</p> <p>尽管还有很多其他...
所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。 在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。 另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。 尽管还有很多其他类型的无效的rdata,但是相比IP地址来说,其他种类的数据影响较小。因此本文主要讨论IP地址。...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。\n\n在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。\n\n另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,...
29
post
null
2016-10-14T20:20:38.000Z
63873b9a8b1c1e0007f52ee8
a-quick-stats-on-the-608-083-mirai-ips-that-hit-our-honeypots-in-the-past-2-5-months
0
2018-10-06T08:55:30.000Z
public
published
null
2016-10-15T11:21:49.000Z
A quick stats on the 608,083 Mirai IPs that hit our honeypots in the past 2.5 months
<!--kg-card-begin: markdown--><p>Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, a...
Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, and TCP ports of 23 and 2323, whic...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investig...
30
post
null
2016-10-14T20:31:53.000Z
63873b9a8b1c1e0007f52ee9
new-mirai-variant-with-dga-chinese-version
0
2020-08-11T03:52:24.000Z
public
published
null
2016-12-12T04:10:57.000Z
Mirai 变种中的DGA
<!--kg-card-begin: markdown--><h3 id="">更新历史</h3> <p>2016-12-09 首次发布<br> 2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误</p> <h3 id="">概要</h3> <p>两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。</p> <blockquote> <p>&lt;<a href="__GHOST_URL__/a-few-observations-of-the-new-mirai-variant-on-port-7547/">A Few Observations of Th...
更新历史 2016-12-09 首次发布 2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误 概要 两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。 <A Few Observations of The New Mirai Variant on Port 7547> 我的同事Ye Genshen快速设置了一些蜜罐,并且很快取得收获:11月28日一天就捕获了11个样本。 迄今为止,我们的蜜罐已从6个托管服务器捕获了53个独立样本。 在分析其中一个新样本时,我的同事Qu Wenji发现一些类似DGA的代码,并猜测变种中包...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"### 更新历史\n2016-12-09 首次发布\n2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误\n\n###概要\n\n两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。\n\n> <[A Few Observations of The New Mirai Variant on Port 7547](__GHOST_URL__/a-few-observations-...
31
post
null
2016-10-23T13:43:56.000Z
63873b9a8b1c1e0007f52eea
a-dyn-twitter-ddos-event-report-and-mirai-botnet-review
0
2018-10-06T08:55:47.000Z
public
published
null
2016-10-23T14:21:21.000Z
关于 dyn / twitter 受攻击情况的说明和 mirai 僵尸网络的回顾
<!--kg-card-begin: markdown--><p>【更新记录】</p> <p>2016-10-23 初始版本<br> 2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。</p> <p>北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。</p> <p>目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标...
【更新记录】 2016-10-23 初始版本 2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。 北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。 目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标主要是Dynamic Network Services(dyn)公司,twitter、paypal、g...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n【更新记录】\n\n2016-10-23 初始版本\n2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。\n\n\n北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,...
32
post
null
2016-10-27T15:41:40.000Z
63873b9a8b1c1e0007f52eeb
a-mirai-botnet-c2-data-analysis
0
2018-10-06T08:56:11.000Z
public
published
null
2016-10-27T16:04:02.000Z
关于 mirai 僵尸网络控制主机的数据分析
<!--kg-card-begin: markdown--><p>之前的文章中已经提及,我们的僵尸网络跟踪系统对mirai僵尸网络控制主机做了持续跟踪,并且在文章的结尾处,依据跟踪结果排除了僵尸网络操作者位于北京时区的可能。在这篇文章中,我们将进一步分析mirai僵尸网络的控制主机的行为和特征。之前文章链接如下:</p> <p><a href="__GHOST_URL__/a-dyn-twitter-ddos-event-report-and-mirai-botnet-review/">http://blog.netlab.360.com/a-dyn-twitter-ddos-event-report-and-mirai-botne...
之前的文章中已经提及,我们的僵尸网络跟踪系统对mirai僵尸网络控制主机做了持续跟踪,并且在文章的结尾处,依据跟踪结果排除了僵尸网络操作者位于北京时区的可能。在这篇文章中,我们将进一步分析mirai僵尸网络的控制主机的行为和特征。之前文章链接如下: http://blog.netlab.360.com/a-dyn-twitter-ddos-event-report-and-mirai-botnet-review/ 目前为止,我们与安全社区合作共享了两位数域名上的超过50个mirai僵尸网络主控。但本文后面的分析仅针对360网络安全研究院独立发现的主控,即13个域名上的16个主控主机名,其中8个在持续对外发起攻击。 在时间...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n之前的文章中已经提及,我们的僵尸网络跟踪系统对mirai僵尸网络控制主机做了持续跟踪,并且在文章的结尾处,依据跟踪结果排除了僵尸网络操作者位于北京时区的可能。在这篇文章中,我们将进一步分析mirai僵尸网络的控制主机的行为和特征。之前文章链接如下:\n\n__GHOST_URL__/a-dyn-twitter-ddos-event-report-and-mirai-botnet-review/\n\n目前为止,我们与安全社区...
33
post
null
2016-11-29T03:32:51.000Z
63873b9a8b1c1e0007f52eec
a-mirai-botnet-evolvement-new-variant-and-old-c2
0
2018-10-06T08:56:25.000Z
public
published
null
2016-11-29T10:40:18.000Z
德国电信断网:mirai僵尸网络的新变种和旧主控
<!--kg-card-begin: markdown--><p>【更新】</p> <ol> <li>2016-11-29 18:40:00 初始版本</li> <li>2016-11-29 20:10:00 增加了对德国电信断网事件相关的描述</li> </ol> <h4 id="20161128">德国电信断网事件 2016-11-28</h4> <p>德国电信在2016年11月28日前后遭遇一次大范围的网络故障。在这次故障中,2千万固定网络用户中的大约90万个路由器发生故障(约4.5%),并由此导致大面积网络访问受限。很多媒体给出了网络受限的示意图,如下。</p> <p><img src="__GHOST_URL__/cont...
【更新】 1. 2016-11-29 18:40:00 初始版本 2. 2016-11-29 20:10:00 增加了对德国电信断网事件相关的描述 德国电信断网事件 2016-11-28 德国电信在2016年11月28日前后遭遇一次大范围的网络故障。在这次故障中,2千万固定网络用户中的大约90万个路由器发生故障(约4.5%),并由此导致大面积网络访问受限。很多媒体给出了网络受限的示意图,如下。 德国电信进一步确认了问题是由于路由设备的维护界面被暴露在互联网上、并且互联网上正在发生针对性的攻击而导致。德国电信连夜与设备供应商生成了新的升级包,并且要求客户如果怀疑受到影响就断电重启路由器,之后利用自动/手动的升...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"【更新】\n\n1. 2016-11-29 18:40:00 初始版本\n2. 2016-11-29 20:10:00 增加了对德国电信断网事件相关的描述\n\n####德国电信断网事件 2016-11-28\n德国电信在2016年11月28日前后遭遇一次大范围的网络故障。在这次故障中,2千万固定网络用户中的大约90万个路由器发生故障(约4.5%),并由此导致大面积网络访问受限。很多媒体给出了网络受限的示意图,如下。\n\n![...
34
post
null
2016-11-30T10:38:21.000Z
63873b9a8b1c1e0007f52eed
a-few-observations-of-the-new-mirai-variant-on-port-7547
0
2018-10-06T08:56:45.000Z
public
published
null
2016-11-30T11:12:59.000Z
A Few Observations of The New Mirai Variant on Port 7547
<!--kg-card-begin: markdown--><p>Much of the new mirai variant that scans port 7547 has been covered by various sources. In this blog, we will not repeat such known facts, and we are just going to list a few observations that we have seen so far.</p> <h3 id="miraifirsthitandcapabilityassessment">Mirai First Hit and Cap...
Much of the new mirai variant that scans port 7547 has been covered by various sources. In this blog, we will not repeat such known facts, and we are just going to list a few observations that we have seen so far. Mirai First Hit and Capability Assessment All the mirai samples so far inherit a coding issue so we c...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Much of the new mirai variant that scans port 7547 has been covered by various sources. In this blog, we will not repeat such known facts, and we are just going to list a few observations that we have seen so far. \n...
35
post
null
2016-12-09T14:51:46.000Z
63873b9a8b1c1e0007f52eee
new-mirai-variant-with-dga
0
2020-08-11T04:02:39.000Z
public
published
null
2016-12-09T15:16:27.000Z
Now Mirai Has DGA Feature Built in
<!--kg-card-begin: markdown--><h3 id="updatehistory">Update History</h3> <ul> <li>2016-12-09 first version</li> <li>2016-12-12 fig-0 update, fix a TLD choosing error in our DGA implement</li> </ul> <h3 id="summary">Summary</h3> <p>Nearly 2 weeks ago, 2 new infection vectors (aka TCP ports of 7547 and 5555) were found...
Update History * 2016-12-09 first version * 2016-12-12 fig-0 update, fix a TLD choosing error in our DGA implement Summary Nearly 2 weeks ago, 2 new infection vectors (aka TCP ports of 7547 and 5555) were found being used to spread MIRAI malwares * <A Few Observations of The New Mirai Variant on Port 7547> ...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n### Update History\n* 2016-12-09 first version\n* 2016-12-12 fig-0 update, fix a TLD choosing error in our DGA implement\n\n### Summary\nNearly 2 weeks ago, 2 new infection vectors (aka TCP ports of 7547 and 5555) were found ...
36
post
null
2016-12-16T11:56:18.000Z
63873b9a8b1c1e0007f52eef
new-mirai-dga-seed-0x91-brute-forced
0
2018-10-06T08:57:51.000Z
public
published
null
2016-12-16T15:37:26.000Z
New Mirai DGA Seed 0x91 Brute Forced
<!--kg-card-begin: markdown--><p>Up till very recently, through the samples we had learned that the Mirai DGA seeds are all fixed to 0, as detailed in blog <a href="__GHOST_URL__/new-mirai-variant-with-dga/">Now Mirai Has DGA Feature Built in</a>, and were able to predict all corresponding DGA domains.</p> <p>Surprisin...
Up till very recently, through the samples we had learned that the Mirai DGA seeds are all fixed to 0, as detailed in blog Now Mirai Has DGA Feature Built in, and were able to predict all corresponding DGA domains. Surprisingly, although we have not see any related samples, just few days ago, our PassiveDNS based ano...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Up till very recently, through the samples we had learned that the Mirai DGA seeds are all fixed to 0, as detailed in blog [Now Mirai Has DGA Feature Built in](__GHOST_URL__/new-mirai-variant-with-dga/), and were abl...
37
post
null
2017-01-10T11:51:15.000Z
63873b9a8b1c1e0007f52ef0
fraudulent-top-sites-an-underground-market-infrastructure-en
0
2018-10-06T08:58:22.000Z
public
published
null
2017-01-16T08:45:05.000Z
Fraudulent Top Sites, an Underground Market Infrastructure
<!--kg-card-begin: markdown--><p>[Update History]</p> <ul> <li>2017-01-16 First English version. Updates in original Chinese version is merged.</li> </ul> <h3 id="overview">Overview</h3> <p>Some domain names contains strings representing well-known companies are noticed in our abnormal traffic detecting system, includi...
[Update History] * 2017-01-16 First English version. Updates in original Chinese version is merged. Overview Some domain names contains strings representing well-known companies are noticed in our abnormal traffic detecting system, including 360, ali, baidu, cloudflare, dnspod, google and microsoft. We later fo...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"[Update History]\n\n - 2017-01-16 First English version. Updates in original Chinese version is merged.\n\n###Overview\nSome domain names contains strings representing well-known companies are noticed in our abnormal...
39
post
null
2017-01-10T13:39:18.000Z
63873b9a8b1c1e0007f52ef1
fraudulent-top-sites-a-dedicated-underground-market-infrastructure-chinese
0
2018-10-06T08:58:09.000Z
public
published
null
2017-01-10T15:23:38.000Z
以大站的名义:专注地下产业的网络基础设施
<!--kg-card-begin: markdown--><p>【历史更新记录】</p> <ul> <li>2017-01-10 原始版本</li> <li>2017-01-16 补充了对服务器IP地址同源性的分析,此处分析指向性较弱,仅为完备性考虑</li> </ul> <h3 id="">概述</h3> <p>在奇虎网络安全研究院(<a href="mailto:netlab@360.cn">netlab@360.cn</a>),我们建立了一个基于DNS的异常流量监测系统,每天会检出若干异常流量以及对应的域名/IP。通常这些被检出的域名/IP都属于地下产业链条。</p> <p>但是,我们注意到一些代表知名公司的字符串也出现在这...
【历史更新记录】 * 2017-01-10 原始版本 * 2017-01-16 补充了对服务器IP地址同源性的分析,此处分析指向性较弱,仅为完备性考虑 概述 在奇虎网络安全研究院(netlab@360.cn),我们建立了一个基于DNS的异常流量监测系统,每天会检出若干异常流量以及对应的域名/IP。通常这些被检出的域名/IP都属于地下产业链条。 但是,我们注意到一些代表知名公司的字符串也出现在这些被检出的域名中,包括360, ali, baidu, cloudflare, dnspod, google和microsoft。通过分析,我们认为这是有人冒用大站名义,为赌博、色情、私服等地下产业提供网络基础设施服务。 ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n【历史更新记录】\n\n - 2017-01-10 原始版本\n - 2017-01-16 补充了对服务器IP地址同源性的分析,此处分析指向性较弱,仅为完备性考虑\n\n###概述\n在奇虎网络安全研究院(netlab@360.cn),我们建立了一个基于DNS的异常流量监测系统,每天会检出若干异常流量以及对应的域名/IP。通常这些被检出的域名/IP都属于地下产业链条。\n\n但是,我们注意到一些代表知名公司的字符串也出现在这...
40
post
null
2017-02-04T04:06:50.000Z
63873b9a8b1c1e0007f52ef2
netlab-scanmon-at-rsa-conference-2017-cn
0
2018-10-06T08:58:49.000Z
public
published
null
2017-02-04T07:31:52.000Z
RSA大会 '2017上的ScanMon
<!--kg-card-begin: markdown--><p><a href="https://www.rsaconference.com/events/us17"><code>RSA大会 '2017</code></a> 即将在2月13日至17日期间在美国旧金山Moscone中心举办。在今年的这次大会上,<a href="http://netlab.360.com"><code>我们</code></a>向全世界安全社区推出我们的 <a href="http://scan.netlab.360.com"><code>ScanMon</code></a> 系统。</p> <p>网络扫描是互联网上一种流行的威胁,经常被攻击者用来发...
RSA大会 '2017 即将在2月13日至17日期间在美国旧金山Moscone中心举办。在今年的这次大会上,我们向全世界安全社区推出我们的 ScanMon 系统。 网络扫描是互联网上一种流行的威胁,经常被攻击者用来发现网络空间里存活的主机或者服务,并随后可能被用来定位潜在的受害者。扫描行为通常发生在恶意攻击行为的早期,所以如果能及早发现扫描行为会对抵御对应的攻击有显著改善。 360网络安全研究院的 ScanMon 系统提供全球范围内实时和历史扫描行为的监控和分析。ScanMon 通过分析大量多样的网络数据,包括但不限于网络流、蜜罐等等,来精确有效的检测扫描行为。对已检出的扫描事件,ScanMon 会展示扫描行为的关键信息和统...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"[`RSA大会 '2017`](https://www.rsaconference.com/events/us17) 即将在2月13日至17日期间在美国旧金山Moscone中心举办。在今年的这次大会上,[`我们`](http://netlab.360.com)向全世界安全社区推出我们的 [`ScanMon`](http://scan.netlab.360.com) 系统。\n\n网络扫描是互联网上一种流行的威胁,经常被攻击者用来...
41
post
null
2017-02-04T07:53:41.000Z
63873b9a8b1c1e0007f52ef3
netlab-scanmon-at-rsa-conference-2017-en
0
2018-10-06T08:59:03.000Z
public
published
null
2017-02-04T08:15:59.000Z
Netlab‘s ScanMon at RSA Conference 2017
<!--kg-card-begin: markdown--><p><a href="https://www.rsaconference.com/events/us17"><code>The RSA Conference 2017</code></a> will be held during Feb 13 - 17 at Moscone Center, San Francisco. This year in the conference, <a href="http://netlab.360.com"><code>we</code></a> will introduce our <a href="http://scan.netlab....
The RSA Conference 2017 will be held during Feb 13 - 17 at Moscone Center, San Francisco. This year in the conference, we will introduce our Network ScanMon system to global security community. Network scanning is a prevalent threat in the Internet. It can discover active hosts or services in cyberspace, thus often b...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"[`The RSA Conference 2017`](https://www.rsaconference.com/events/us17) will be held during Feb 13 - 17 at Moscone Center, San Francisco. This year in the conference, [`we`](http://netlab.360.com) will introduce our [...
42
post
null
2017-04-22T06:25:57.000Z
63873b9a8b1c1e0007f52ef4
idn_measurement_netlab
0
2018-10-06T09:01:10.000Z
public
published
null
2017-04-22T06:25:00.000Z
我们也来聊聊IDN
<!--kg-card-begin: markdown--><h3 id="introduction">Introduction###</h3> <p>  文中首先对IDN的历史和研究进行了回顾,并从近日有关IDN的博客入手,利用DNS派的流量数据,使用轻量级的方法,对目前网络中的“形近异义”的IDN域名进行了测量研究,并对IDN域名目前在网络中的用途进行分析。研究发现,1)Alexa Top10K 域名中至少有83个域名的形近异义IDN域名在活跃,即相关的知名网站受到这种潜在的钓鱼攻击影响;2)我们发现了一起真实的利用IDN域名对Facebook进行钓鱼攻击的案例(www.xn--facebok-i01c.com)。网络安全研究院...
Introduction###   文中首先对IDN的历史和研究进行了回顾,并从近日有关IDN的博客入手,利用DNS派的流量数据,使用轻量级的方法,对目前网络中的“形近异义”的IDN域名进行了测量研究,并对IDN域名目前在网络中的用途进行分析。研究发现,1)Alexa Top10K 域名中至少有83个域名的形近异义IDN域名在活跃,即相关的知名网站受到这种潜在的钓鱼攻击影响;2)我们发现了一起真实的利用IDN域名对Facebook进行钓鱼攻击的案例(www.xn--facebok-i01c.com)。网络安全研究院会持续跟进这项测量研究,希望借此提醒有关厂商,注意提高与其相关的IDN域名品牌保护意识。 Background...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"###Introduction###\n&emsp;&emsp;文中首先对IDN的历史和研究进行了回顾,并从近日有关IDN的博客入手,利用DNS派的流量数据,使用轻量级的方法,对目前网络中的“形近异义”的IDN域名进行了测量研究,并对IDN域名目前在网络中的用途进行分析。研究发现,1)Alexa Top10K 域名中至少有83个域名的形近异义IDN域名在活跃,即相关的知名网站受到这种潜在的钓鱼攻击影响;2)我们发现了一起真实的利...
48
post
null
2017-04-24T06:20:58.000Z
63873b9a8b1c1e0007f52ef5
a-new-threat-an-iot-botnet-scanning-internet-on-port-81-ch
0
2018-10-06T09:01:19.000Z
public
published
null
2017-04-24T15:50:38.000Z
新威胁报告:一个新IoT僵尸网络正在 HTTP 81上大范围传播
<!--kg-card-begin: markdown--><h3 id="">概述</h3> <p>360 网络安全研究院近日监测到一个新的僵尸网络正在大范围扫描整个互联网。考虑到该僵尸网络的以下因素,我们决定向安全社区公开我们的发现成果:</p> <ol> <li>规模较大,我们目前可以看到 ~50k 日活IP</li> <li>有Simple UDP DDoS 攻击记录,可以认定是恶意代码</li> <li>较新,目前尚有较多安全厂商未能识别该恶意代码 ( 7/55 virustotal )</li> <li>与mirai僵尸网络相比,借鉴了其端口嗅探手法和部分代码,但是在传播、C2通信协议、攻击向量等关键方面完全不同于mir...
概述 360 网络安全研究院近日监测到一个新的僵尸网络正在大范围扫描整个互联网。考虑到该僵尸网络的以下因素,我们决定向安全社区公开我们的发现成果: 1. 规模较大,我们目前可以看到 ~50k 日活IP 2. 有Simple UDP DDoS 攻击记录,可以认定是恶意代码 3. 较新,目前尚有较多安全厂商未能识别该恶意代码 ( 7/55 virustotal ) 4. 与mirai僵尸网络相比,借鉴了其端口嗅探手法和部分代码,但是在传播、C2通信协议、攻击向量等关键方面完全不同于mirai,是新的恶意代码家族而不应视为mirai的变种 我们梳理了该僵尸网络的发现过程、传播手法、行为特征,简略分析了该僵尸网络的攻击行...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n###概述\n360 网络安全研究院近日监测到一个新的僵尸网络正在大范围扫描整个互联网。考虑到该僵尸网络的以下因素,我们决定向安全社区公开我们的发现成果:\n\n1. 规模较大,我们目前可以看到 ~50k 日活IP\n2. 有Simple UDP DDoS 攻击记录,可以认定是恶意代码\n3. 较新,目前尚有较多安全厂商未能识别该恶意代码 ( 7/55 virustotal )\n4. 与mirai僵尸网络相比,借鉴了其端口...
49
post
null
2017-04-24T16:16:48.000Z
63873b9a8b1c1e0007f52ef6
a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en
0
2018-10-06T08:59:13.000Z
public
published
null
2017-04-24T18:15:35.000Z
New Threat Report: A new IoT Botnet is Spreading over HTTP 81 on a Large Scale
<!--kg-card-begin: markdown--><h3 id="overview">Overview</h3> <p>360 Network Security Research Lab recently discovered a new botnet that is scanning the entire Internet on a large scale. Taking into account the following factors in the botnet, we decided to disclose our findings to the secure community:</p> <ol> <li>Ve...
Overview 360 Network Security Research Lab recently discovered a new botnet that is scanning the entire Internet on a large scale. Taking into account the following factors in the botnet, we decided to disclose our findings to the secure community: 1. Very active, we can now see ~ 50k live scanner IPs daily. 2. M...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"###Overview\n360 Network Security Research Lab recently discovered a new botnet that is scanning the entire Internet on a large scale. Taking into account the following factors in the botnet, we decided to disclose o...
50
post
null
2017-04-27T05:57:57.000Z
63873b9a8b1c1e0007f52ef7
the_difference_between_http81_botnet_and_mirai
0
2018-10-06T09:02:07.000Z
public
published
null
2017-04-28T04:50:21.000Z
比较“81端口的botnet”和 MIRAI 之间的联系
<!--kg-card-begin: markdown--><h1 id="">概述</h1> <p>从 &quot;<a href="__GHOST_URL__/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-ch/">81 端口的异常流量</a>&quot;中,我们发现了一个新的僵尸网络家族,它和 MRIAI 存在一定的联系,本文将介绍一些对比结果,同时介绍一下我们从这个 botnet 中发现的一种依赖SSDP协议的感染机制。</p> <p>****注:*<em>如无特殊声明,MIRAI的分析将以github源码为基础;新botnet 将以其中的9584B6AEC4...
概述 从 "81 端口的异常流量"中,我们发现了一个新的僵尸网络家族,它和 MRIAI 存在一定的联系,本文将介绍一些对比结果,同时介绍一下我们从这个 botnet 中发现的一种依赖SSDP协议的感染机制。 ****注:*如无特殊声明,MIRAI的分析将以github源码为基础;新botnet 将以其中的9584B6AEC418A2AF4EFAC24867A8C7EC样本的逆向结果为基础。 相同点 相同的扫描方案 众所周知,MIRAI在传播过程中用到了SYN端口探测的技巧,来提高传播效率。新Botnet 也使用了该技巧并将其用在了81端口扫描中。随着研究的深入我们发现它和MIRAI有着相同的扫描规则。 在 ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#概述\n\n从 \"[81 端口的异常流量](__GHOST_URL__/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-ch/)\"中,我们发现了一个新的僵尸网络家族,它和 MRIAI 存在一定的联系,本文将介绍一些对比结果,同时介绍一下我们从这个 botnet 中发现的一种依赖SSDP协议的感染机制。\n\n*\\***注:**如无特殊声明,MIRAI的分析将...
51
post
null
2017-04-27T08:56:50.000Z
63873b9a8b1c1e0007f52ef8
http-81-botnet-the-comparison-against-mirai-and-new-findings-en
0
2018-10-06T09:10:43.000Z
public
published
null
2017-04-28T09:35:28.000Z
Http 81 Botnet: the Comparison against MIRAI and New Findings
<!--kg-card-begin: markdown--><h1 id="overview">Overview</h1> <p>In <a href="__GHOST_URL__/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/">our previous blog</a>, we introduced a new IoT botnet spreading over http 81. We will name it in this blog the <code>http81</code> IoT botnet, while some anti-virus sof...
Overview In our previous blog, we introduced a new IoT botnet spreading over http 81. We will name it in this blog the http81 IoT botnet, while some anti-virus software name it Persirai, and some other name it after MIRAI. In this blog, we will compare http81 against mirai at binary level: 1. Similarities to M...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#Overview\n\nIn [our previous blog](__GHOST_URL__/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/), we introduced a new IoT botnet spreading over http 81. We will name it in this blog the `http81` IoT bot...
52
post
null
2017-07-17T13:03:35.000Z
63873b9a8b1c1e0007f52ef9
wannacry-from-dns-and-sinkhole-view
0
2018-10-06T09:02:17.000Z
public
published
null
2017-07-17T13:38:10.000Z
从DNS和sinkhole视角看WannaCry蠕虫
<!--kg-card-begin: markdown--><p>编注:本文来源自《中国计算机学会通讯》2017年第7期《WannaCry勒索蠕虫专刊》,作者是360网络安全研究院李丰沛。在本博客发布时,文章的字句和排版略有调整,以适应本技术博客。我们将该文章发布在本技术博客的动机之一,是因为这篇文章中对WannaCry的感染情况做了一个定量分析,本技术博客的后续其他分析文章可以参考做一个基准。</p> <p>域名系统(Domain Name System, DNS)数据作为全网流量数据的一种采样方式,可以在大网尺度对域名做有效的度量和分析。我们利用DNS数据,在过去数年里对多个安全事件,包括Mirai等僵尸网络、DGA等恶意域名,...
编注:本文来源自《中国计算机学会通讯》2017年第7期《WannaCry勒索蠕虫专刊》,作者是360网络安全研究院李丰沛。在本博客发布时,文章的字句和排版略有调整,以适应本技术博客。我们将该文章发布在本技术博客的动机之一,是因为这篇文章中对WannaCry的感染情况做了一个定量分析,本技术博客的后续其他分析文章可以参考做一个基准。 域名系统(Domain Name System, DNS)数据作为全网流量数据的一种采样方式,可以在大网尺度对域名做有效的度量和分析。我们利用DNS数据,在过去数年里对多个安全事件,包括Mirai等僵尸网络、DGA等恶意域名,以及黑色产业链条进行跟踪和分析。对于最近爆发的WannaCry蠕虫病毒,利用...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"编注:本文来源自《中国计算机学会通讯》2017年第7期《WannaCry勒索蠕虫专刊》,作者是360网络安全研究院李丰沛。在本博客发布时,文章的字句和排版略有调整,以适应本技术博客。我们将该文章发布在本技术博客的动机之一,是因为这篇文章中对WannaCry的感染情况做了一个定量分析,本技术博客的后续其他分析文章可以参考做一个基准。\n\n\n\n域名系统(Domain Name System, DNS)数据作为全网流量数据的一种...
57
post
null
2017-07-20T02:49:19.000Z
63873b9a8b1c1e0007f52efa
wannacry-from-dns-and-sinkhole-view-en
0
2017-11-21T02:34:01.000Z
public
draft
null
null
Wannacry: A DNS and Sinkhole View
<!--kg-card-begin: markdown--><p>Note: This article comes from Communications of China Computer Federation, No.7, 2017. The author is Li Fengpei from 360 Network Security Research Institute. This article's words and layout are slightly adjusted to fit in this technology blog. One of the motivations for this post is tha...
Note: This article comes from Communications of China Computer Federation, No.7, 2017. The author is Li Fengpei from 360 Network Security Research Institute. This article's words and layout are slightly adjusted to fit in this technology blog. One of the motivations for this post is that this article provides a quantit...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Note: This article comes from Communications of China Computer Federation, No.7, 2017. The author is Li Fengpei from 360 Network Security Research Institute. This article's words and layout are slightly adjusted to f...
58
post
null
2017-09-07T10:58:09.000Z
63873b9a8b1c1e0007f52efb
hajime-status-report
0
2018-10-06T09:11:10.000Z
public
published
null
2017-09-20T04:04:59.000Z
Is Hajime botnet dead?
<!--kg-card-begin: markdown--><h1 id="">概述</h1> <p>我们于近期决定公开一部分Hajime相关的研究结果及数据,供社区成员查阅。本文的核心内容包含以下几点:</p> <ul> <li><a href="http://data.netlab.360.com/hajime/">Hajime跟踪主页上线</a>。结合Hajime的通讯特点(DHT+uTP),我们实现了对Hajime各Bot节点的长期跟踪,同时还在主页绘制了日活及地域分布情况。</li> <li>通过逆向分析,我们代码级重现了密钥交换过程,在该工作的帮助下,可以随时获取到Hajime网络中的最新模块文件。</li> <li>跟...
概述 我们于近期决定公开一部分Hajime相关的研究结果及数据,供社区成员查阅。本文的核心内容包含以下几点: * Hajime跟踪主页上线。结合Hajime的通讯特点(DHT+uTP),我们实现了对Hajime各Bot节点的长期跟踪,同时还在主页绘制了日活及地域分布情况。 * 通过逆向分析,我们代码级重现了密钥交换过程,在该工作的帮助下,可以随时获取到Hajime网络中的最新模块文件。 * 跟踪过程中,我们发现一个包含x64配置项的config文件,该发现预示着,原作者有意将PC平台作为下一个感染目标(这里也存在原作者密钥泄露的可能性)。 Hajime背景 与 MIRAI 的张扬不同,Hajime是一个低调神...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#概述\n\n我们于近期决定公开一部分Hajime相关的研究结果及数据,供社区成员查阅。本文的核心内容包含以下几点:\n\n* [Hajime跟踪主页上线](http://data.netlab.360.com/hajime/)。结合Hajime的通讯特点(DHT+uTP),我们实现了对Hajime各Bot节点的长期跟踪,同时还在主页绘制了日活及地域分布情况。\n* 通过逆向分析,我们代码级重现了密钥交换过程,在该工作的帮助下,...
64
post
null
2017-09-08T07:48:58.000Z
63873b9a8b1c1e0007f52efc
hajime-status-report-en
0
2018-10-06T09:11:03.000Z
public
published
null
2017-09-20T04:04:55.000Z
Is Hajime botnet dead?
<!--kg-card-begin: markdown--><h1 id="overview">Overview</h1> <p>The mysterious Hajime botnet was first discovered by Rapiditynetworks in Oct 2016, and it was all over the news earlier this year, but it seems that nobody talks about it any more now, is this botnet gone?</p> <p>The answer is no, our team has been tracki...
Overview The mysterious Hajime botnet was first discovered by Rapiditynetworks in Oct 2016, and it was all over the news earlier this year, but it seems that nobody talks about it any more now, is this botnet gone? The answer is no, our team has been tracking this botnet for quite some time, and we have recently no...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"# Overview \n\nThe mysterious Hajime botnet was first discovered by Rapiditynetworks in Oct 2016, and it was all over the news earlier this year, but it seems that nobody talks about it any more now, is this botnet g...
65
post
null
2017-10-20T09:51:07.000Z
63873b9a8b1c1e0007f52efd
iot-reaper-a-quick-summary-of-a-rapid-spreading-new-iot-botnet
0
2022-02-09T07:15:37.000Z
public
published
null
2017-10-20T10:54:39.000Z
IoT_reaper : 一个正在快速扩张的新 IoT 僵尸网络
<!--kg-card-begin: markdown--><p>从2017-09-13 01:02:13开始,我们捕获到一个新的针对iot设备的恶意样本出现,在随后的这个一个多月时间里,这个新的IoT僵尸网络家族不断持续更新,开始在互联网上快速大规模的组建僵尸网络军团。</p> <p>该僵尸网络脱胎于mirai,但是在诸多方面比mirai更进一步,特别是开始放弃弱口令猜测,完全转向利用IoT设备漏洞收割,成为IoT僵尸网络里的新兴玩家。我们将之命名为<strong>IoT_reaper</strong>。</p> <p><strong>IoT_reaper</strong>规模较大且正在积极扩张,例如最近的数据昨日(10月19日)...
从2017-09-13 01:02:13开始,我们捕获到一个新的针对iot设备的恶意样本出现,在随后的这个一个多月时间里,这个新的IoT僵尸网络家族不断持续更新,开始在互联网上快速大规模的组建僵尸网络军团。 该僵尸网络脱胎于mirai,但是在诸多方面比mirai更进一步,特别是开始放弃弱口令猜测,完全转向利用IoT设备漏洞收割,成为IoT僵尸网络里的新兴玩家。我们将之命名为IoT_reaper。 IoT_reaper规模较大且正在积极扩张,例如最近的数据昨日(10月19日)在我们观察到的多个C2中,其中一个C2上活跃IP地址去重后已经有10k个,此外还有更多的易感设备信息已经被提交到后台,由一个自动的loader持续植入恶意...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"从2017-09-13 01:02:13开始,我们捕获到一个新的针对iot设备的恶意样本出现,在随后的这个一个多月时间里,这个新的IoT僵尸网络家族不断持续更新,开始在互联网上快速大规模的组建僵尸网络军团。\n\n该僵尸网络脱胎于mirai,但是在诸多方面比mirai更进一步,特别是开始放弃弱口令猜测,完全转向利用IoT设备漏洞收割,成为IoT僵尸网络里的新兴玩家。我们将之命名为**IoT_reaper**。\n\n**IoT_...
67
post
null
2017-10-20T11:03:35.000Z
63873b9a8b1c1e0007f52efe
iot_reaper-a-rappid-spreading-new-iot-botnet-en
0
2022-02-09T07:15:26.000Z
public
published
null
2017-10-20T12:20:01.000Z
IoT_reaper: A Rappid Spreading New IoT Botnet
<!--kg-card-begin: markdown--><p>On 2017-09-13 at 01:02:13, we caught a new malicious sample targeting IoT devices. Starting from that time, this new IoT botnet family continued to update and began to harvest vulnerable iot devices in a rapid pace.</p> <p>The bot borrowed some code from the famous mirai botnet, but it ...
On 2017-09-13 at 01:02:13, we caught a new malicious sample targeting IoT devices. Starting from that time, this new IoT botnet family continued to update and began to harvest vulnerable iot devices in a rapid pace. The bot borrowed some code from the famous mirai botnet, but it does not do any password crack all. In...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"On 2017-09-13 at 01:02:13, we caught a new malicious sample targeting IoT devices. Starting from that time, this new IoT botnet family continued to update and began to harvest vulnerable iot devices in a rapid pace.\...
68
post
null
2017-10-24T12:31:52.000Z
63873b9a8b1c1e0007f52eff
iot_reaper-a-few-updates
0
2022-02-09T07:15:15.000Z
public
published
null
2017-10-25T14:24:48.000Z
IoT_reaper 情况更新
<!--kg-card-begin: markdown--><p>在周五晚上披露了<strong>IoT_reaper</strong>之后,我们收到了来自安全社区和各方很多问题。这里给出一个快速的更新,以澄清各方可能的疑问。</p> <h3 id="iot_reaper">IoT_reaper样本投递历史情况</h3> <p>我们通过蜜罐观察到的 <strong>IoT_reaper</strong> 样本历史投递情况如下:</p> <p><img src="__GHOST_URL__/content/images/2017/10/loader_history-1.png" alt="" loading="lazy"></p> <...
在周五晚上披露了IoT_reaper之后,我们收到了来自安全社区和各方很多问题。这里给出一个快速的更新,以澄清各方可能的疑问。 IoT_reaper样本投递历史情况 我们通过蜜罐观察到的 IoT_reaper 样本历史投递情况如下: 可以看出,IoT_reaper 最主要传播的恶意代码位于下面这个URL上: * 下载地址:hxxp://162.211.183.192/sa * 投递者:119.82.26.157 * 起止时间:10-04~10-17 * 样本md5:7 个,详细见文末IoC 这个URL上的样本之间内聚关系比较强,我们称为S簇。 后来进一步的分析,认为S簇还包括其他一些样本;而在...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"在周五晚上披露了**IoT\\_reaper**之后,我们收到了来自安全社区和各方很多问题。这里给出一个快速的更新,以澄清各方可能的疑问。\n\n\n###IoT_reaper样本投递历史情况\n\n我们通过蜜罐观察到的 **IoT_reaper** 样本历史投递情况如下:\n\n![](__GHOST_URL__/content/images/2017/10/loader_history-1.png)\n\n可以看出,IoT_...
69
post
null
2017-10-25T12:44:59.000Z
63873b9a8b1c1e0007f52f00
iot_reaper-a-few-updates-en
0
2022-02-09T07:15:04.000Z
public
published
null
2017-10-25T14:25:04.000Z
IoT_reaper: A Few Updates
<!--kg-card-begin: markdown--><p>Here is a quick follow up post regarding to our <a href="__GHOST_URL__/iot_reaper-a-rappid-spreading-new-iot-botnet-en/">initial blog</a>.</p> <h3 id="iot_reapersamplehistory">IoT_reaper Sample History</h3> <p>The historical delivery of the <strong>IoT_reaper</strong> samples we observe...
Here is a quick follow up post regarding to our initial blog. IoT_reaper Sample History The historical delivery of the IoT_reaper samples we observed through our honeypot are as follow: It is noticeable that most malicious samples for IoT_reaper are located at the following URL: * Downloading URL: hxxp://1...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Here is a quick follow up post regarding to our [initial blog](__GHOST_URL__/iot_reaper-a-rappid-spreading-new-iot-botnet-en/). \n\n###IoT_reaper Sample History\n\nThe historical delivery of the **IoT\\_reaper** samp...
70
post
null
2017-11-01T03:39:18.000Z
63873b9a8b1c1e0007f52f01
cldap-is-now-the-3rd-reflection-amplified-ddos-attack-vector-surpassing-ssdp-and-chargen
0
2021-05-08T05:09:20.000Z
public
published
null
2017-11-01T10:14:41.000Z
CLDAP反射放大攻击超过SSDP和CharGen成为第三大反射型DDoS攻击
<!--kg-card-begin: markdown--><p>作者:Xu Yang,kenshin</p> <p>利用DDoSMon.net,我们实时并持续的监控全球DDoS攻击相关事件。长期以来,DDoS攻击的反射放大细分类型中,DNS、NTP、CharGen、SSDP是最经常被滥用的服务,过去一年中的排位依次是第1、2、3、4位。</p> <p>近期我们注意到, 基于CLDAP的 反射放大攻击(以下称为CLDAP攻击)已经超过SSDP和CharGEN成为第三大反射型DDoS攻击。CLDAP攻击在过去365天和90天在反射放大类DDoS攻击中占据比例,对比如下图:</p> <p><img src="__GHOST_URL__/...
作者:Xu Yang,kenshin 利用DDoSMon.net,我们实时并持续的监控全球DDoS攻击相关事件。长期以来,DDoS攻击的反射放大细分类型中,DNS、NTP、CharGen、SSDP是最经常被滥用的服务,过去一年中的排位依次是第1、2、3、4位。 近期我们注意到, 基于CLDAP的 反射放大攻击(以下称为CLDAP攻击)已经超过SSDP和CharGEN成为第三大反射型DDoS攻击。CLDAP攻击在过去365天和90天在反射放大类DDoS攻击中占据比例,对比如下图: 数据来源:DDoSMon。网站上Insight页面的内容可以覆盖本次blog中的大部分数据。 CLDAP攻击首次出现是在去年10月底,...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"作者:Xu Yang,kenshin\n\n利用DDoSMon.net,我们实时并持续的监控全球DDoS攻击相关事件。长期以来,DDoS攻击的反射放大细分类型中,DNS、NTP、CharGen、SSDP是最经常被滥用的服务,过去一年中的排位依次是第1、2、3、4位。\n\n近期我们注意到, 基于CLDAP的 反射放大攻击(以下称为CLDAP攻击)已经超过SSDP和CharGEN成为第三大反射型DDoS攻击。CLDAP攻击在过去3...
71
post
null
2017-11-24T06:12:00.000Z
63873b9a8b1c1e0007f52f02
early-warning-a-new-mirai-variant-is-spreading-quickly-on-port-23-and-2323-en
0
2018-10-06T09:12:17.000Z
public
published
null
2017-11-24T09:28:23.000Z
Early Warning: A New Mirai Variant is Spreading Quickly on Port 23 and 2323
<!--kg-card-begin: markdown--><p>[Updates on 2017-11-28]</p> <ul> <li>Both C2s have been sink-holed now by security community.</li> <li>admin/CentryL1nk is a typo for admin/CenturyL1nk.</li> </ul> <p>About 60 hours ago, since 2017-11-22 11:00, we noticed big upticks on port 2323 and 23 scan traffic, with almost 100k un...
[Updates on 2017-11-28] * Both C2s have been sink-holed now by security community. * admin/CentryL1nk is a typo for admin/CenturyL1nk. About 60 hours ago, since 2017-11-22 11:00, we noticed big upticks on port 2323 and 23 scan traffic, with almost 100k unique scanner IP came from Argentina. After investigation, w...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"[Updates on 2017-11-28]\n\n* Both C2s have been sink-holed now by security community.\n* admin/CentryL1nk is a typo for admin/CenturyL1nk.\n\n\n\nAbout 60 hours ago, since 2017-11-22 11:00, we noticed big upticks on ...
73
post
null
2017-11-24T09:32:03.000Z
63873b9a8b1c1e0007f52f03
early-warning-a-new-mirai-variant-is-spreading-quickly-on-port-23-and-2323-2
0
2018-10-06T09:02:37.000Z
public
published
null
2017-11-24T09:53:55.000Z
安全威胁早期预警:新的mirai僵尸网络变种正在端口23和2323上积极传播
<!--kg-card-begin: markdown--><p>【2017-11-28 更新】</p> <ul> <li>原文中提到的两个C2均已被安全社区sinkhole。</li> <li>原文中的 admin/CentryL1nk 是 admin/CenturyL1nk 的笔误。</li> </ul> <p>大约60个小时以前,从2017-11-22 11:00开始,360网络安全研究院注意到在端口2323和23上的扫描流量有一个暴涨现象。其中主要扫描者,大约10万个扫描IP地址位于阿根廷,同时360网络安全研究院也注意到大约有5千个IP地址来自国内。分析以后,目前比较确定这是一个<strong>新的mirai变种</str...
【2017-11-28 更新】 * 原文中提到的两个C2均已被安全社区sinkhole。 * 原文中的 admin/CentryL1nk 是 admin/CenturyL1nk 的笔误。 大约60个小时以前,从2017-11-22 11:00开始,360网络安全研究院注意到在端口2323和23上的扫描流量有一个暴涨现象。其中主要扫描者,大约10万个扫描IP地址位于阿根廷,同时360网络安全研究院也注意到大约有5千个IP地址来自国内。分析以后,目前比较确定这是一个新的mirai变种。 根因分析 在我们蜜罐中,最近有两个新的用户名密码被频繁使用到,分别是 admin/CentryL1nk 和 admin/QwestM...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"【2017-11-28 更新】\n\n* 原文中提到的两个C2均已被安全社区sinkhole。\n* 原文中的 admin/CentryL1nk 是 admin/CenturyL1nk 的笔误。\n\n\n大约60个小时以前,从2017-11-22 11:00开始,360网络安全研究院注意到在端口2323和23上的扫描流量有一个暴涨现象。其中主要扫描者,大约10万个扫描IP地址位于阿根廷,同时360网络安全研究院也注意到大约有5...
74
post
null
2017-12-05T08:05:23.000Z
63873b9a8b1c1e0007f52f04
warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en
0
2020-04-15T11:08:31.000Z
public
published
null
2017-12-05T16:52:20.000Z
Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869
<!--kg-card-begin: markdown--><p>Author: 360 netlab</p> <pre><code>[Update History] - At 2017-12-05 18:56:40 UTC, 2 hours after our blog goes live, we observed the C2 sending kill scan command to the bots, and that explains why the scan activities on the two ports started to drop on a global scale. - The C2 address 95...
Author: 360 netlab [Update History] - At 2017-12-05 18:56:40 UTC, 2 hours after our blog goes live, we observed the C2 sending kill scan command to the bots, and that explains why the scan activities on the two ports started to drop on a global scale. - The C2 address 95.211.123.69:7654 is the typo for 95.211.123.69...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: 360 netlab\n\n```\n[Update History]\n- At 2017-12-05 18:56:40 UTC, 2 hours after our blog goes live, we observed the C2 sending kill scan command to the bots, and that explains why the scan activities on the ...
77
post
null
2017-12-05T10:08:15.000Z
63873b9a8b1c1e0007f52f05
wa-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869
0
2020-04-15T11:08:21.000Z
public
published
null
2017-12-05T18:03:30.000Z
安全威胁预警:Mirai变种Satori正在端口 37215 和 52869 上类似蠕虫式传播
<!--kg-card-begin: markdown--><p>作者:360网络安全研究院</p> <pre><code>[更新记录] - 2017-12-05 18:56:40 UTC,在我们的博客发出2个小时后,我们观察到C2服务器开始向bot发送停止扫描的指令,与此同时我们看到大网上这两个端口的流量开始下降。 - 文中提到的C2地址 95.211.123.69:7654 ,实际是 95.211.123.69:7645 的笔误。 </code></pre> <p>在我们之前的blog中,我们提及有大约10万个来自阿根廷的独立扫描IP正在扫描端口2323和23,并且确定这是一个新的mirai变种。在过去的几天中,扫描行为变得...
作者:360网络安全研究院 [更新记录] - 2017-12-05 18:56:40 UTC,在我们的博客发出2个小时后,我们观察到C2服务器开始向bot发送停止扫描的指令,与此同时我们看到大网上这两个端口的流量开始下降。 - 文中提到的C2地址 95.211.123.69:7654 ,实际是 95.211.123.69:7645 的笔误。 在我们之前的blog中,我们提及有大约10万个来自阿根廷的独立扫描IP正在扫描端口2323和23,并且确定这是一个新的mirai变种。在过去的几天中,扫描行为变得愈发严重,更多的国家出现在我们的ScanMon平台上。仔细分析后我们看到了更多的部分,意识到之前2323/23端口上的扫...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"作者:360网络安全研究院\n\n```\n[更新记录]\n\n- 2017-12-05 18:56:40 UTC,在我们的博客发出2个小时后,我们观察到C2服务器开始向bot发送停止扫描的指令,与此同时我们看到大网上这两个端口的流量开始下降。\n\n- 文中提到的C2地址 95.211.123.69:7654 ,实际是 95.211.123.69:7645 的笔误。\n```\n\n在我们之前的blog中,我们提及有大约10万...
78
post
null
2017-12-29T02:14:12.000Z
63873b9a8b1c1e0007f52f06
openload-co-and-other-sites-are-mining-xmr-with-client-browser-without-coinhive
0
2018-10-06T09:02:46.000Z
public
published
null
2017-12-29T14:20:10.000Z
openload.co 等网站绕过 CoinHive 使用客户端浏览器算力挖取门罗币
<!--kg-card-begin: markdown--><p>从2017年12月24日,我们注意到一组网站正在滥用客户终端浏览器的算力在挖矿。攻击者在利用了 CoinHive 的浏览器端挖矿代码基础上,完全绕过 CoinHive 自己运营,避开了 CoinHive 的抽成费用。提供挖矿服务的域名成组出现,共计22个,最早活动时间是2017-11-29。</p> <p>涉及使用上述挖矿服务的网站,包括openload.co,oload.stream,thevideo.me,streamcherry.com,streamango.com。其中,openload.co 网站的Alex排名为136,流行程度非常高,这意味着全球范围内有较...
从2017年12月24日,我们注意到一组网站正在滥用客户终端浏览器的算力在挖矿。攻击者在利用了 CoinHive 的浏览器端挖矿代码基础上,完全绕过 CoinHive 自己运营,避开了 CoinHive 的抽成费用。提供挖矿服务的域名成组出现,共计22个,最早活动时间是2017-11-29。 涉及使用上述挖矿服务的网站,包括openload.co,oload.stream,thevideo.me,streamcherry.com,streamango.com。其中,openload.co 网站的Alex排名为136,流行程度非常高,这意味着全球范围内有较多的终端用户算力会被攻击者攫取。 5个异常域名 dnsmon 是我们...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"从2017年12月24日,我们注意到一组网站正在滥用客户终端浏览器的算力在挖矿。攻击者在利用了 CoinHive 的浏览器端挖矿代码基础上,完全绕过 CoinHive 自己运营,避开了 CoinHive 的抽成费用。提供挖矿服务的域名成组出现,共计22个,最早活动时间是2017-11-29。\n\n涉及使用上述挖矿服务的网站,包括openload.co,oload.stream,thevideo.me,streamcherry....
81
post
null
2017-12-29T14:37:46.000Z
63873b9a8b1c1e0007f52f07
openload-co-and-other-popular-alex-sites-are-abusing-client-browsers-to-mining-cryptocurrency
0
2018-10-06T09:12:25.000Z
public
published
null
2017-12-29T16:49:50.000Z
Openload.co and Other Popular Alex Sites Are Abusing Client Browsers to Mining Cryptocurrency
<!--kg-card-begin: markdown--><p>As of December 24, 2017, we noticed a group of Alex top websites abusing client browser's computing power in cryptocurrency mining. The javascript code is based on CoinHive with tricks to completely circumvent CoinHive's own operations to avoid CoinHive's commission fee. A total of 22 d...
As of December 24, 2017, we noticed a group of Alex top websites abusing client browser's computing power in cryptocurrency mining. The javascript code is based on CoinHive with tricks to completely circumvent CoinHive's own operations to avoid CoinHive's commission fee. A total of 22 domain names were observed providi...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"As of December 24, 2017, we noticed a group of Alex top websites abusing client browser's computing power in cryptocurrency mining. The javascript code is based on CoinHive with tricks to completely circumvent CoinHi...
82
post
null
2018-01-16T03:31:21.000Z
63873b9a8b1c1e0007f52f08
art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address
0
2018-10-06T09:02:52.000Z
public
published
null
2018-01-17T08:36:51.000Z
偷盗的艺术: Satori 变种正在通过替换钱包地址盗取 ETH 数字代币
<!--kg-card-begin: markdown--><p>在我们2017年12月5日发布的关于Satori的 <a href="__GHOST_URL__/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/">文章</a> 中,我们提到Satori僵尸网络正在以前所未有的速度快速传播。自从我们的文章发布以后,安全社区、ISP、供应链厂商共同协作,Satori 的控制端服务器被 sinkhole、ISP和供应链厂商采取了行动,Satori的蔓延趋势得到了暂时遏制,但是Satori的威胁依然存在。</p...
在我们2017年12月5日发布的关于Satori的 文章 中,我们提到Satori僵尸网络正在以前所未有的速度快速传播。自从我们的文章发布以后,安全社区、ISP、供应链厂商共同协作,Satori 的控制端服务器被 sinkhole、ISP和供应链厂商采取了行动,Satori的蔓延趋势得到了暂时遏制,但是Satori的威胁依然存在。 从 2018-01-08 10:42:06 GMT+8 开始,我们检测到 Satori 的后继变种正在端口37215和52869上重新建立整个僵尸网络。值得注意的是,新变种开始渗透互联网上现存其他Claymore Miner挖矿设备,通过攻击其3333 管理端口,替换钱包地址,并最终攫取受害挖矿设备的...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"在我们2017年12月5日发布的关于Satori的 [文章](__GHOST_URL__/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/) 中,我们提到Satori僵尸网络正在以前所未有的速度快速传播。自从我们的文章发布以后,安全社区、ISP、供应链厂商共同协作,Satori 的控制端服务器被 si...
83
post
null
2018-01-17T04:22:34.000Z
63873b9a8b1c1e0007f52f09
art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address-en
0
2018-10-06T09:12:29.000Z
public
published
null
2018-01-17T08:35:40.000Z
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address
<!--kg-card-begin: markdown--><p>The security community was moving very fast to take actions and sinkhole the Satori botnet C2 after our December 5 <a href="__GHOST_URL__/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/">blog</a>. The spread of this new botnet has been temporari...
The security community was moving very fast to take actions and sinkhole the Satori botnet C2 after our December 5 blog. The spread of this new botnet has been temporarily halted, but the threat still remains. Starting from 2018-01-08 10:42:06 GMT+8, we noticed that one Satori’s successor variant (we name it Satori.C...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"The security community was moving very fast to take actions and sinkhole the Satori botnet C2 after our December 5 [blog](__GHOST_URL__/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-...
85
post
null
2018-01-18T07:18:16.000Z
63873b9a8b1c1e0007f52f0a
themoon-botnet-a-review-and-new-features
0
2018-10-06T09:03:02.000Z
public
published
null
2018-01-30T14:11:15.000Z
TheMoon : 一个僵尸网络的老皇历和新变种
<!--kg-card-begin: markdown--><p>TheMoon 是一个恶意代码家族的代号。早在2014年2月,该恶意代码家族就引起了安全研究人员的普遍关注。在当时,TheMoon是一个针对 Linksys 路由器的、有类似蠕虫式传播行为的僵尸网络。由于其感染传播能力较强,安全社区里的讨论较多。</p> <p>2014~2017年期间,又陆续有各安全厂商对TheMoon恶意代码家族做了分析。报告反应了当时 TheMoon 家族的演化情况。</p> <p>从2017年开始,我们也对 TheMoon 家族做了持续跟踪,并注意到以下的新发现:</p> <ul> <li>感染阶段: TheMoon 集成了最近的一组漏洞利用代...
TheMoon 是一个恶意代码家族的代号。早在2014年2月,该恶意代码家族就引起了安全研究人员的普遍关注。在当时,TheMoon是一个针对 Linksys 路由器的、有类似蠕虫式传播行为的僵尸网络。由于其感染传播能力较强,安全社区里的讨论较多。 2014~2017年期间,又陆续有各安全厂商对TheMoon恶意代码家族做了分析。报告反应了当时 TheMoon 家族的演化情况。 从2017年开始,我们也对 TheMoon 家族做了持续跟踪,并注意到以下的新发现: * 感染阶段: TheMoon 集成了最近的一组漏洞利用代码,提高其感染能力; * 运营阶段: TheMoon 的代理网络,由正向代理改为反向代理,避免被安全...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"TheMoon 是一个恶意代码家族的代号。早在2014年2月,该恶意代码家族就引起了安全研究人员的普遍关注。在当时,TheMoon是一个针对 Linksys 路由器的、有类似蠕虫式传播行为的僵尸网络。由于其感染传播能力较强,安全社区里的讨论较多。\n\n2014~2017年期间,又陆续有各安全厂商对TheMoon恶意代码家族做了分析。报告反应了当时 TheMoon 家族的演化情况。\n\n从2017年开始,我们也对 TheMoo...
86
post
null
2018-02-04T04:43:43.000Z
63873b9a8b1c1e0007f52f0b
early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading
0
2018-10-06T09:03:12.000Z
public
published
null
2018-02-04T07:46:02.000Z
ADB.Miner:恶意代码正在利用开放了ADB 接口的安卓设备挖矿
<!--kg-card-begin: markdown--><p>作者:Hui Wang, RootKiter,<br> <a href="https://twitter.com/360Netlab">twitter/360Netlab</a></p> <p>大约24小时前,从 2018-02-03 15:00 开始,一组恶意代码开始蠕虫式快速传播,我们分析了这个安全威胁,一些快速的结果如下:</p> <ul> <li><strong>传播时间</strong>:最早的感染时间可以回溯到 1月31日附近。当前这波蠕虫式感染从 2018-02-03 下午 15:00 附近开始被我们的系统检测到,目前仍在持续增长。</li> <li><...
作者:Hui Wang, RootKiter, twitter/360Netlab 大约24小时前,从 2018-02-03 15:00 开始,一组恶意代码开始蠕虫式快速传播,我们分析了这个安全威胁,一些快速的结果如下: * 传播时间:最早的感染时间可以回溯到 1月31日附近。当前这波蠕虫式感染从 2018-02-03 下午 15:00 附近开始被我们的系统检测到,目前仍在持续增长。 * 感染端口:5555,是安卓设备上 adb 调试接口的工作端口,这个端口正常应该被关闭,但未知原因导致部分设备错误的打开了该端口 * 蠕虫式感染:恶意代码在完成植入后,会继续扫描 5555 adb 端口,完成自身的传播 * 感染设备...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"作者:Hui Wang, RootKiter,\n[twitter/360Netlab](https://twitter.com/360Netlab)\n\n大约24小时前,从 2018-02-03 15:00 开始,一组恶意代码开始蠕虫式快速传播,我们分析了这个安全威胁,一些快速的结果如下:\n\n - **传播时间**:最早的感染时间可以回溯到 1月31日附近。当前这波蠕虫式感染从 2018-02-03 下午 15:00 附...
88
post
null
2018-02-04T06:34:09.000Z
63873b9a8b1c1e0007f52f0c
early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading-en
1
2018-10-06T09:12:36.000Z
public
published
null
2018-02-04T07:39:34.000Z
Early Warning: ADB.Miner A Mining Botnet Utilizing Android ADB Is Now Rapidly Spreading
<!--kg-card-begin: markdown--><p>Author:Hui Wang, RootKiter,<br> <a href="https://twitter.com/360Netlab">twitter/360Netlab</a></p> <p>About 24 hours ago, around 2018-02-03 15:00(GMT +8), a set of malicious code began to spread rapidly, here are some quick facts:</p> <ul> <li><strong>Timeline</strong> : the earliest tim...
Author:Hui Wang, RootKiter, twitter/360Netlab About 24 hours ago, around 2018-02-03 15:00(GMT +8), a set of malicious code began to spread rapidly, here are some quick facts: * Timeline : the earliest time of the infection can be traced back to January 31. And the current worm-like infection was detected by our s...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author:Hui Wang, RootKiter,\n[twitter/360Netlab](https://twitter.com/360Netlab)\n\nAbout 24 hours ago, around 2018-02-03 15:00(GMT +8), a set of malicious code began to spread rapidly, here are some quick facts:\n\n\...
89
post
null
2018-02-06T02:48:02.000Z
63873b9a8b1c1e0007f52f0d
adb-miner-more-information
0
2018-10-06T09:03:16.000Z
public
published
null
2018-02-06T03:17:00.000Z
ADB.Miner 安卓蠕虫的更多信息
<!--kg-card-begin: markdown--><p>本篇技术分析,由360手机卫士,360威胁情报中心,360烽火实验室,360-CERT,360网络安全研究院联合发布。</p> <h2 id="">综述</h2> <p>大约48小时之前,我们发布 <a href="__GHOST_URL__/early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading/">文章</a> 报告了ADB.Miner,一种新型的安卓蠕虫。该蠕虫可以借助安卓设备上已经打开的 adb 调试接口传播,且初期传播的增速很快,约每12小时...
本篇技术分析,由360手机卫士,360威胁情报中心,360烽火实验室,360-CERT,360网络安全研究院联合发布。 综述 大约48小时之前,我们发布 文章 报告了ADB.Miner,一种新型的安卓蠕虫。该蠕虫可以借助安卓设备上已经打开的 adb 调试接口传播,且初期传播的增速很快,约每12小时翻一番。 在过去的48小时内,我们对 ADB.Miner 做更进一步的分析,目前的结论如下,供安全社区参考: 1. 当前感染量已经稳定:日活感染量在增长到7千(2018-02-05 15:00 GMT+8)后不再快速增长。这个数字已经保持稳定了超过 20 小时,可以认为蠕虫已经经过了爆发期,进入稳定期。 2. 确认电视...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"本篇技术分析,由360手机卫士,360威胁情报中心,360烽火实验室,360-CERT,360网络安全研究院联合发布。\n\n## 综述\n\n大约48小时之前,我们发布 [文章](__GHOST_URL__/early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading/) 报告了ADB.Miner,一种新型的安卓蠕虫...
90
post
null
2018-02-06T06:18:18.000Z
63873b9a8b1c1e0007f52f0e
adb-miner-more-information-en
0
2018-10-06T09:12:39.000Z
public
published
null
2018-02-06T09:29:39.000Z
ADB.Miner: More Information
<!--kg-card-begin: markdown--><p>This blog is a joint effort of <a href="http://blogs.360.cn/360mobile/">360 Beaconlab</a>, <a href="https://cert.360.cn">360 CERT</a>, <a href="http://shouji.360.cn/">360 MobileSafe</a>, <a href="https://twitter.com/360Netlab">360Netlab</a> and <a href="http://ti.360.net">360 Threat Int...
This blog is a joint effort of 360 Beaconlab, 360 CERT, 360 MobileSafe, 360Netlab and 360 Threat Intelligence Center. Overview About 48 hours ago, we reported an Android worm ADB.miner in our previous blog. This malware can replicate itself over Android devices by utilizing the opened ADB debugging interface. The ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This blog is a joint effort of [360 Beaconlab](http://blogs.360.cn/360mobile/), [360 CERT](https://cert.360.cn), [360 MobileSafe](http://shouji.360.cn/), [360Netlab](https://twitter.com/360Netlab) and [360 Threat Int...
91
post
null
2018-02-07T02:34:43.000Z
63873b9a8b1c1e0007f52f0f
who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon
0
2018-10-06T09:03:20.000Z
public
published
null
2018-02-07T13:06:10.000Z
是谁悄悄偷走我的电(一):利用DNSMon批量发现被挂挖矿代码的域名
<!--kg-card-begin: markdown--><p>在360网络安全研究院,我们持续的分析海量的DNS流量。基于此,我们建立了 DNSMon 检测系统,能够对 DNS 流量中的各种异常和关联关系予以分析。</p> <p>在之前的 <a href="__GHOST_URL__/openload-co-and-other-sites-are-mining-xmr-with-client-browser-without-coinhive/">文章</a> 中,我们提到了 openload.co 等网站利用Web页面挖矿的情况。在那之后,我们进一步<strong>利用 DNSMon 对整个互联网上网页挖矿进行分析</stron...
在360网络安全研究院,我们持续的分析海量的DNS流量。基于此,我们建立了 DNSMon 检测系统,能够对 DNS 流量中的各种异常和关联关系予以分析。 在之前的 文章 中,我们提到了 openload.co 等网站利用Web页面挖矿的情况。在那之后,我们进一步利用 DNSMon 对整个互联网上网页挖矿进行分析,本文描述我们目前看到情况。 当前我们可以看到: * 0.2% 的网站在首页嵌入了Web挖矿代码:Alexa Top 10万的网站中,有 241 (0.24%) ; Alexa Top 30万的网站中,有 629 (0.21%) * 色情相关网站是主体,占据了这些网站的49%。其它还有诈骗(8%)...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"在360网络安全研究院,我们持续的分析海量的DNS流量。基于此,我们建立了 DNSMon 检测系统,能够对 DNS 流量中的各种异常和关联关系予以分析。\n\n在之前的 [文章](__GHOST_URL__/openload-co-and-other-sites-are-mining-xmr-with-client-browser-without-coinhive/) 中,我们提到了 openload.co 等网站利用Web页面...
92
post
null
2018-02-07T02:36:42.000Z
63873b9a8b1c1e0007f52f10
who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon-en
0
2018-10-06T09:12:43.000Z
public
published
null
2018-02-07T13:06:36.000Z
Who is Stealing My Power: Web Mining Domains Measurement via DNSMon
<!--kg-card-begin: markdown--><p>At <a href="https://twitter.com/360Netlab">360Netlab</a>, we are continuously analyzing DNS traffic. Based on this, we have established a DNSMon detection system that analyzes various anomalies and correlations in DNS traffic.</p> <p>We reported a few web mining sites such as openload.c...
At 360Netlab, we are continuously analyzing DNS traffic. Based on this, we have established a DNSMon detection system that analyzes various anomalies and correlations in DNS traffic. We reported a few web mining sites such as openload.co in previous article. After that, we try to use DNSMon to further analyze web min...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\nAt [360Netlab](https://twitter.com/360Netlab), we are continuously analyzing DNS traffic. Based on this, we have established a DNSMon detection system that analyzes various anomalies and correlations in DNS traffic...
93
post
null
2018-02-08T04:08:59.000Z
63873b9a8b1c1e0007f52f11
the-list-of-top-alexa-websites-with-web-mining-code-embedded-on-their-homepage
0
2018-10-06T09:12:46.000Z
public
published
null
2018-02-08T14:07:10.000Z
The List of Top Alexa Websites With Web-Mining Code Embedded on Their Homepage
<!--kg-card-begin: markdown--><p>On our previous <a href="__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon-en/">blog</a>, we mentioned over 0.2% websites have web mining code embedded in their homepage: 241 (0.24%) out of Alexa Top 100,000 websites, and 629 (0.21%) out of Alexa Top 300,0...
On our previous blog, we mentioned over 0.2% websites have web mining code embedded in their homepage: 241 (0.24%) out of Alexa Top 100,000 websites, and 629 (0.21%) out of Alexa Top 300,000 websites. And after some discussion, we figured it makes sense to release the whole list so proper action can be taken, so here...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"On our previous [blog](__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon-en/), we mentioned over 0.2% websites have web mining code embedded in their homepage: 241 (0.24%) out of Alexa ...
94
post
null
2018-02-11T02:55:58.000Z
63873b9a8b1c1e0007f52f12
https-blog-netlab-360-com-the-list-of-top-alexa-websites-with-web-mining-code-embedded-on-their-homepage-cn
0
2018-10-06T09:06:37.000Z
public
published
null
2018-02-13T10:07:55.000Z
是谁悄悄偷走我的电(二):那些利用主页挖取比特币的网站
<!--kg-card-begin: markdown--><p>我们在早先的 <a href="__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon/">文章</a> 中提到,大约有 0.2% 的网站在使用主页中嵌入的JS代码挖矿:</p> <pre><code>- Alexa 头部 10万网站中,有 241 (0.24%)个 - Alexa 头部 30万网站中,有 629 (0.21%)个 </code></pre> <p>我们决定还是公开文中提到的全部站点列表,这样读者可以采取更多的行动。</p> <p>我们的 DNSM...
我们在早先的 文章 中提到,大约有 0.2% 的网站在使用主页中嵌入的JS代码挖矿: - Alexa 头部 10万网站中,有 241 (0.24%)个 - Alexa 头部 30万网站中,有 629 (0.21%)个 我们决定还是公开文中提到的全部站点列表,这样读者可以采取更多的行动。 我们的 DNSMon 在2018-02-08 生成的列表,其格式如下: Alexa_Rank Website Related-Coin-Mining-Domain/URL 1503 mejortorrent.com |coinhive.c...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n我们在早先的 [文章](__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon/) 中提到,大约有 0.2% 的网站在使用主页中嵌入的JS代码挖矿:\n\n\t- Alexa 头部 10万网站中,有 241 (0.24%)个\n\t- Alexa 头部 30万网站中,有 629 (0.21%)个\n\n我们决定还是公开文...
95
post
null
2018-02-14T03:54:41.000Z
63873b9a8b1c1e0007f52f13
who-is-stealing-my-power-iv-a-case-study-how-one-big-player-could-impact-the-cohive-business-in-china
0
2018-10-06T09:03:40.000Z
public
published
null
2018-03-09T11:08:57.000Z
是谁悄悄偷走我的电(四):国内大玩家对Coinhive影响的案例分析
<!--kg-card-begin: markdown--><p>《是谁悄悄偷走我的电》是我们的一个系列文章,讨论我们从 DNSMon 看到的网页挖矿的情况。在这个系列的之前的 <a href="__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon/"><strong>一</strong></a> 、 <a href="__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon/"><strong>二</strong></a>...
《是谁悄悄偷走我的电》是我们的一个系列文章,讨论我们从 DNSMon 看到的网页挖矿的情况。在这个系列的之前的 一 、 二 和 三 中,我们已经介绍了整个Web挖矿的市场情况。当前我们知道,市场中的玩家主要可以分为挖矿网站和内容/流量网站,前者提供挖矿能力、后者提供流量,二者合力利用终端用户的浏览器算力挖矿获利。 当前,挖矿网站中最大的玩家是 coinhive 家族,按照被引用数量计,占据了 58% 的市场份额。这些在我们之前的文章中已经提及。 那么,流量网站的情况如何,有哪些有意思的情况? Coinhive 的关联域名 DNSMon 有能力分析任意域名的 关联域名,在这个案例中可以拿来分析 coinhive 家族关...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"《是谁悄悄偷走我的电》是我们的一个系列文章,讨论我们从 DNSMon 看到的网页挖矿的情况。在这个系列的之前的 [**一**](__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon/) 、 [**二**](__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-m...
97
post
null
2018-02-17T06:22:34.000Z
63873b9a8b1c1e0007f52f14
who-is-stealing-my-power-iv-a-case-study-how-one-big-player-could-impact-the-cohive-business-in-china-en
0
2018-10-06T09:12:59.000Z
public
published
null
2018-03-09T11:24:24.000Z
A Case Study: How One Big Player Could Impact the Cohive Business in China
<!--kg-card-begin: markdown--><p>&quot;Who is Stealing My Power&quot; is a series of articles on the topic of web mining that we observed from our DNSMon system.</p> <p>As we mentioned in this series of <a href="__GHOST_URL__/who-is-stealing-my-power-web-mining-domains-measurement-via-dnsmon-en/"><strong>one</strong></...
"Who is Stealing My Power" is a series of articles on the topic of web mining that we observed from our DNSMon system. As we mentioned in this series of one, two, and three , the players in the market can be mainly divided into mining sites and content/traffic sites. The former provides mining capabilities and the la...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\"Who is Stealing My Power\" is a series of articles on the topic of web mining that we observed from our DNSMon system.\n\nAs we mentioned in this series of [**one**](__GHOST_URL__/who-is-stealing-my-power-web-minin...
98
post
null
2018-02-23T10:21:41.000Z
63873b9a8b1c1e0007f52f15
who-is-stealing-my-power-iii-an-adnetwork-company-case-study
0
2018-10-06T09:03:28.000Z
public
published
null
2018-02-24T03:23:46.000Z
是谁悄悄偷走我的电(三):某在线广告网络公司案例分析
<!--kg-card-begin: markdown--><p>我们最近注意到,某在线网络广告商会将来自 coinhive 的javascript网页挖矿程序,插入到自己广告平台中,利用最终用户的浏览器算力,挖取比特币获利。</p> <p>P公司是一家在线广告网络公司,负责完成广告和广告位之间的匹配,并从中获取收入;Adblock 是一种浏览器插件,用户可以利用来屏蔽广告。显然,上述两者之间有长久的利益冲突和技术对抗。</p> <p>在2017-09之前,我们就注意到 P公司 会利用类似 DGA 的技术,生成一组看似随机的域名,绕过 adblock,从而保证其投放的广告能够到达最终用户,我们将这组域名称为 DGA.popad。</...
我们最近注意到,某在线网络广告商会将来自 coinhive 的javascript网页挖矿程序,插入到自己广告平台中,利用最终用户的浏览器算力,挖取比特币获利。 P公司是一家在线广告网络公司,负责完成广告和广告位之间的匹配,并从中获取收入;Adblock 是一种浏览器插件,用户可以利用来屏蔽广告。显然,上述两者之间有长久的利益冲突和技术对抗。 在2017-09之前,我们就注意到 P公司 会利用类似 DGA 的技术,生成一组看似随机的域名,绕过 adblock,从而保证其投放的广告能够到达最终用户,我们将这组域名称为 DGA.popad。 从2017-12开始,我们观察到P公司开始利用这些 DGA.popad 域名,插入挖...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n我们最近注意到,某在线网络广告商会将来自 coinhive 的javascript网页挖矿程序,插入到自己广告平台中,利用最终用户的浏览器算力,挖取比特币获利。\n\nP公司是一家在线广告网络公司,负责完成广告和广告位之间的匹配,并从中获取收入;Adblock 是一种浏览器插件,用户可以利用来屏蔽广告。显然,上述两者之间有长久的利益冲突和技术对抗。\n\n在2017-09之前,我们就注意到 P公司 会利用类似 DGA 的技术...
99
post
null
2018-02-24T02:45:27.000Z
63873b9a8b1c1e0007f52f16
who-is-stealing-my-power-iii-an-adnetwork-company-case-study-en
0
2018-10-06T09:12:49.000Z
public
published
null
2018-02-24T08:26:48.000Z
Who is Stealing My Power III: An Adnetwork Company Case Study
<!--kg-card-begin: markdown--><p>We recently noticed that one of the ad network provider started to perform in-browser coinhive cryptojacking when users visit websites which use this provider’s ad network service.</p> <p>As early as mid 2017, this ad network provider has been using domain DGA technology to generate see...
We recently noticed that one of the ad network provider started to perform in-browser coinhive cryptojacking when users visit websites which use this provider’s ad network service. As early as mid 2017, this ad network provider has been using domain DGA technology to generate seemingly random domains to bypass adbloc...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"We recently noticed that one of the ad network provider started to perform in-browser coinhive cryptojacking when users visit websites which use this provider’s ad network service.\n\nAs early as mid 2017, this ad ne...
100
post
null
2018-03-01T04:30:57.000Z
63873b9a8b1c1e0007f52f17
what-we-know-about-memcache-udp-reflection-ddos
0
2021-05-08T05:10:47.000Z
public
published
null
2018-03-01T08:33:46.000Z
Memcache UDP反射放大攻击技术分析
<!--kg-card-begin: markdown--><p>本篇技术blog,由360信息安全部<span style="font-family:Times New Roman">0kee Team</span>、360网络安全研究院、360-CERT共同发布。</p> <p>Memcache UDP 反射放大攻击(以下简称 Memcache DRDoS)在最近的一周里吸引了安全社区的较多注意。以下介绍我们对该类型攻击观察到的情况。</p> <h4 id="poc2017">在PoC 2017 会议上的原始报告</h4> <p>Memcache DRDoS,由360信息安全部<span style="font-family:T...
本篇技术blog,由360信息安全部0kee Team、360网络安全研究院、360-CERT共同发布。 Memcache UDP 反射放大攻击(以下简称 Memcache DRDoS)在最近的一周里吸引了安全社区的较多注意。以下介绍我们对该类型攻击观察到的情况。 在PoC 2017 会议上的原始报告 Memcache DRDoS,由360信息安全部0kee Team在2017-06 附近首先发现,并于 2017-11 在 PoC 2017 会议上做了公开报告。会议报告在 这里,其中详细介绍了攻击的原理和潜在危害。 在这份文档中,作者指出这种攻击的特点: * memcache 放大倍数超高,至少可以超过50k;...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"本篇技术blog,由360信息安全部<span style=\"font-family:Times New Roman\">0kee Team</span>、360网络安全研究院、360-CERT共同发布。\n\nMemcache UDP 反射放大攻击(以下简称 Memcache DRDoS)在最近的一周里吸引了安全社区的较多注意。以下介绍我们对该类型攻击观察到的情况。\n\n\n#### 在PoC 2017 会议上的原始报告\...
101
post
null
2018-03-01T09:53:55.000Z
63873b9a8b1c1e0007f52f18
memcache-ddos-a-little-bit-more-en
0
2021-05-08T05:10:33.000Z
public
published
null
2018-03-01T15:10:40.000Z
Memcache DDoS: A Little Bit More
<!--kg-card-begin: markdown--><p>This blog is a joint effort of 360 <span style="font-family:Times new roman">0</span>kee Team, 360 CERT, and 360 Netlab.</p> <p>Memcache UDP Reflection Amplification DDoS (hereinafter referred as Memcache DRDoS) has attracted quite some attentions from security community this week. We a...
This blog is a joint effort of 360 0kee Team, 360 CERT, and 360 Netlab. Memcache UDP Reflection Amplification DDoS (hereinafter referred as Memcache DRDoS) has attracted quite some attentions from security community this week. We are not going to repeat the public known facts, and this blog will only touch base with ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This blog is a joint effort of 360 <span style=\"font-family:Times new roman\">0</span>kee Team, 360 CERT, and 360 Netlab.\n\nMemcache UDP Reflection Amplification DDoS (hereinafter referred as Memcache DRDoS) has at...
102
post
null
2018-03-05T10:19:50.000Z
63873b9a8b1c1e0007f52f19
memcache-udp-reflection-amplification-attack-ii-the-targets-the-sources-and-breakdowns-en
0
2018-10-06T09:12:56.000Z
public
published
null
2018-03-08T12:16:23.000Z
Memcache UDP Reflection Amplification Attack II: The Targets, the Sources and Breakdowns
<!--kg-card-begin: markdown--><p>In less then ten days, Memcache DDoS attack has come out of nowhere and really captured lots of attentions within the security community. When we look at the news, we see all sort of reports but hardly can get a good idea what the real situation is, for example the most important questi...
In less then ten days, Memcache DDoS attack has come out of nowhere and really captured lots of attentions within the security community. When we look at the news, we see all sort of reports but hardly can get a good idea what the real situation is, for example the most important question, how many victims are out ther...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"In less then ten days, Memcache DDoS attack has come out of nowhere and really captured lots of attentions within the security community. When we look at the news, we see all sort of reports but hardly can get a good...
103
post
null
2018-03-06T01:51:40.000Z
63873b9a8b1c1e0007f52f1a
memcache-ddos-ii-numbers-and-charts-by-ddosmon
0
2018-10-06T09:03:37.000Z
public
published
null
2018-03-08T09:30:47.000Z
Memcache UDP 反射放大攻击 II: 最近的数据分析
<!--kg-card-begin: markdown--><p>我们在之前的 <a href="__GHOST_URL__/what-we-know-about-memcache-udp-reflection-ddos/">文章</a> 中已经提及,Memcache DRDoS 自从被360 0kee team首次公开批露以来,在过去的9个月中在网络上都不活跃。但是最近十天以来,Memcache DRDoS 在现网中的攻击越来越频繁,所制造的攻击流量也在不断刷新,当前最新的公开记录已经到了 <a href="https://www.securityweek.com/largest-ever-13tbps-ddos-attack-i...
我们在之前的 文章 中已经提及,Memcache DRDoS 自从被360 0kee team首次公开批露以来,在过去的9个月中在网络上都不活跃。但是最近十天以来,Memcache DRDoS 在现网中的攻击越来越频繁,所制造的攻击流量也在不断刷新,当前最新的公开记录已经到了 1.7Tbps 。 关于这种攻击方式,目前还有很多问题等待回答。例如,到底已经有多少受害者、攻击中所使用的反射点到底有多少、实际发生的反射放大倍数是多少,等等。通过回答这些问题,我们可以充分描述当前总体态势,有助于安全社区理解这种新的DDoS攻击方式。 为此我们在 Memcache DRDoS 在 DDoSMon 上建立了一个 实时页面 ,展示我们看到...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"我们在之前的 [文章](__GHOST_URL__/what-we-know-about-memcache-udp-reflection-ddos/) 中已经提及,Memcache DRDoS 自从被360 0kee team首次公开批露以来,在过去的9个月中在网络上都不活跃。但是最近十天以来,Memcache DRDoS 在现网中的攻击越来越频繁,所制造的攻击流量也在不断刷新,当前最新的公开记录已经到了 [1.7Tbps](h...
104
post
null
2018-03-23T10:59:00.000Z
63873b9a8b1c1e0007f52f1b
threat-brief-a-redis-miner
0
2018-10-06T09:03:52.000Z
public
published
null
2018-03-23T12:26:43.000Z
威胁快讯:一个Redis.Miner
<!--kg-card-begin: markdown--><h4 id="ioc">IoC</h4> <p>下载服务器</p> <pre><code>159.89.190.243 img.namunil.com cdn.namunil.com </code></pre> <p>下载URL</p> <pre><code>hxxp://img.namunil.com/ash.php hxxp://img.namunil.com/bsh.php hxxp://img.namunil.com/rsh.php hxxp://cdn.namunil.com/ash.php hxxp://cdn.namunil.com/bsh.php hxxp...
IoC 下载服务器 159.89.190.243 img.namunil.com cdn.namunil.com 下载URL hxxp://img.namunil.com/ash.php hxxp://img.namunil.com/bsh.php hxxp://img.namunil.com/rsh.php hxxp://cdn.namunil.com/ash.php hxxp://cdn.namunil.com/bsh.php hxxp://cdn.namunil.com/ins.php hxxp://cdn.namunil.com/pgp.php hxxp://cdn.namunil.com/rsh.php ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#### IoC\n下载服务器\n```\n159.89.190.243\nimg.namunil.com\ncdn.namunil.com\n```\n\n下载URL\n```\nhxxp://img.namunil.com/ash.php\nhxxp://img.namunil.com/bsh.php\nhxxp://img.namunil.com/rsh.php\nhxxp://cdn.namunil.com/ash.ph...
107
post
null
2018-03-26T03:00:06.000Z
63873b9a8b1c1e0007f52f1c
wei-xie-kuai-xun-mo-ban
0
2018-11-16T08:27:59.000Z
public
draft
null
null
威胁快讯 - 模板
<!--kg-card-begin: markdown--><p>360 网络安全研究院威胁快讯模板:</p> <ul> <li>IoC (IP地址或者域名都对应AS号)</li> <li>规模统计</li> <li>投入方式</li> <li>获利方式</li> <li>逃避手段</li> <li>联系方式</li> </ul> <h4 id="ioc">IoC</h4> <p>下载服务器</p> <pre><code>123.59.68.172 &quot;AS4808 China Unicom Beijing Province Network&quot; </code></pre> <p>下载URL</p> <pre><co...
360 网络安全研究院威胁快讯模板: * IoC (IP地址或者域名都对应AS号) * 规模统计 * 投入方式 * 获利方式 * 逃避手段 * 联系方式 IoC 下载服务器 123.59.68.172 "AS4808 China Unicom Beijing Province Network" 下载URL http://123.59.68.172/Cache/DL.php #weblogic 利用payload中的初始url http://123.59.68.172/Cache/RunExe.exe http://123.59.68.172/Cache/WMI.ps1 http://123.5...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"360 网络安全研究院威胁快讯模板:\n\n - IoC (IP地址或者域名都对应AS号)\n - 规模统计\n - 投入方式\n - 获利方式\n - 逃避手段\n - 联系方式\n\n#### IoC \n下载服务器\n```\n123.59.68.172\t\"AS4808 China Unicom Beijing Province Network\"\n```\n\n下载URL\n```\nhttp://123.59....
108
post
null
2018-03-26T03:22:26.000Z
63873b9a8b1c1e0007f52f1d
untitled-4
0
2018-03-26T04:49:21.000Z
public
draft
null
null
安全威胁预警:Hajime 新版本开始攻击 MikroTik.RouterOS
<!--kg-card-begin: markdown--><h4 id="ioc">IoC</h4> <p>部分下载URL如下,完整列表可以从 <a href="__GHOST_URL__/file/hajime.MikroTik.RouterOS.downloader.url.txt">这里</a> 下载</p> <pre><code>2018-03-26T10:30:00 hxxp://43.252.221.104:2722/4 2018-03-26T10:30:00 hxxp://43.252.221.104:2722/4 2018-03-26T10:30:00 hxxp://82.9.128.142:31735/4 201...
IoC 部分下载URL如下,完整列表可以从 这里 下载 2018-03-26T10:30:00 hxxp://43.252.221.104:2722/4 2018-03-26T10:30:00 hxxp://43.252.221.104:2722/4 2018-03-26T10:30:00 hxxp://82.9.128.142:31735/4 2018-03-26T10:30:00 hxxp://82.9.128.142:31735/4 2018-03-26T11:30:00 hxxp://109.185.142.251:1714/4 2018-03-26T11:30:00 hxxp://109.185.142.251:1...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#### IoC \n\n部分下载URL如下,完整列表可以从 [这里](__GHOST_URL__/file/hajime.MikroTik.RouterOS.downloader.url.txt) 下载\n```\n2018-03-26T10:30:00\thxxp://43.252.221.104:2722/4\n2018-03-26T10:30:00\thxxp://43.252.221.104:2722/4\n2018-...
109
post
null
2018-03-27T11:05:38.000Z
63873b9a8b1c1e0007f52f1e
quick-summary-port-8291-scan-cn
0
2018-10-06T09:03:55.000Z
public
published
__GHOST_URL__/content/images/2018/03/image001.jpg
2018-03-28T06:23:07.000Z
8291端口告警事件简报
<!--kg-card-begin: markdown--><h2 id="">结论</h2> <p>本次8291扫描事件由更新后的Hajime僵尸网络引起,在新版本中,有两个新的特性:</p> <ol> <li>利用对8291端口的扫描来确定存在'Chimay Red' Stack Clash Remote Code Execution漏洞MikroTik设备。</li> <li>利用上述漏洞进行蠕虫传播。</li> </ol> <h2 id="">起因</h2> <p>北京时间3月25日0点前后,互联网上8291端口出现大量扫描告警。</p> <p><img src="__GHOST_URL__/content/images/2...
结论 本次8291扫描事件由更新后的Hajime僵尸网络引起,在新版本中,有两个新的特性: 1. 利用对8291端口的扫描来确定存在'Chimay Red' Stack Clash Remote Code Execution漏洞MikroTik设备。 2. 利用上述漏洞进行蠕虫传播。 起因 北京时间3月25日0点前后,互联网上8291端口出现大量扫描告警。 下午2点左右,蜜罐数据显示该告警可能和 Hajime 有关,初步判断(UPX壳特有幻数+脱壳后样本特征)后,确认该样本为Hajime样本。并在其atk模块中发现了“'Chimay Red' Stack Clash Remote Code Execu...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"## 结论\n本次8291扫描事件由更新后的Hajime僵尸网络引起,在新版本中,有两个新的特性:\n\n1.\t利用对8291端口的扫描来确定存在'Chimay Red' Stack Clash Remote Code Execution漏洞MikroTik设备。\n2.\t利用上述漏洞进行蠕虫传播。\n\n## 起因\n\n北京时间3月25日0点前后,互联网上8291端口出现大量扫描告警。\n\n![](__GHOST_UR...
110
post
null
2018-03-28T04:58:44.000Z
63873b9a8b1c1e0007f52f1f
quick-summary-port-8291-scan-en
0
2018-10-06T09:13:02.000Z
public
published
__GHOST_URL__/content/images/2018/03/image003-1.jpg
2018-03-28T05:19:37.000Z
Quick summary about the Port 8291 scan
<!--kg-card-begin: markdown--><h2 id="summary">Summary</h2> <p>This 8291 scan event is caused by a Hajime botnet variant. Compared to the old Hajime, this one adds two new features:</p> <ol> <li>Check port 8291 to determine if the target is a MikroTik device</li> <li>Use ‘Chimay Red’ Stack Clash Remote Code Execution ...
Summary This 8291 scan event is caused by a Hajime botnet variant. Compared to the old Hajime, this one adds two new features: 1. Check port 8291 to determine if the target is a MikroTik device 2. Use ‘Chimay Red’ Stack Clash Remote Code Execution Loophole vulnerabilities to infect and spread. For more details ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"## Summary\n\nThis 8291 scan event is caused by a Hajime botnet variant. Compared to the old Hajime, this one adds two new features: \n\n1. Check port 8291 to determine if the target is a MikroTik device\n2. Use ‘Ch...
111
post
null
2018-04-13T08:50:33.000Z
63873b9a8b1c1e0007f52f20
the-360netlab-threat-intelligence-service-on-rsac-2018
0
2018-10-06T09:03:59.000Z
public
published
null
2018-04-13T09:34:04.000Z
RSA大会 '2018,360Netlab的威胁情报服务
<!--kg-card-begin: markdown--><p>RSA大会'2018 即将在4月16日至19日期间在美国旧金山Moscone中心举办。在今年的这次大会上,360Netlab将首次集中展示威胁情报服务能力。您可以在 <a href="https://youtu.be/VeKzaTXlU3A/">这里</a> 观看介绍视频,记得可能需要手动调到1080P。您也可以试用在线系统,包括 <a href="https://ddosmon.net/">DDoSMon</a> 和<a href="https://scan.netlab.360.com/">ScanMon</a> 。</p> <p>DDoSMon、ScanMon和...
RSA大会'2018 即将在4月16日至19日期间在美国旧金山Moscone中心举办。在今年的这次大会上,360Netlab将首次集中展示威胁情报服务能力。您可以在 这里 观看介绍视频,记得可能需要手动调到1080P。您也可以试用在线系统,包括 DDoSMon 和ScanMon 。 DDoSMon、ScanMon和DNSMon,是360Netlab本次展示威胁情报服务能力的三个主要组成部分。三者分别提供拒绝服务、网络扫描、域名异常的监控能力,应对全球网络流量实时处理。 * DNSMon是2018年新推出的能力。在DNSMon里面,我们实时的分析海量的DNS流量,并对流量中的各种异常和关联关系予以分析,从而发现大网流行的恶意...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\nRSA大会'2018 即将在4月16日至19日期间在美国旧金山Moscone中心举办。在今年的这次大会上,360Netlab将首次集中展示威胁情报服务能力。您可以在 [这里](https://youtu.be/VeKzaTXlU3A/) 观看介绍视频,记得可能需要手动调到1080P。您也可以试用在线系统,包括 [DDoSMon](https://ddosmon.net/) 和[ScanMon](https://scan.ne...
113
post
null
2018-04-20T01:56:46.000Z
63873b9a8b1c1e0007f52f21
botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style
0
2022-02-09T07:14:41.000Z
public
published
null
2018-04-20T05:10:01.000Z
僵尸网络 Muhstik 正在积极利用 Drupal 漏洞 CVE-2018-7600 蠕虫式传播
<!--kg-card-begin: markdown--><p>2018年3月28日,Drupal.org 公布了漏洞 CVE-2018-7600 的修复方案。Drapal 是一个开源的内容管理系统,由PHP语言写成,有很多网站使用 Drupal 向外提供网页服务。本次漏洞存在于 Drupal 的多个版本中,攻击者可以利用该漏洞完全控制网站。</p> <p>从2018年4月13日开始,360网络安全研究院观测到互联网上有大量针对该漏洞的扫描。通过分析,我们认为有至少3组恶意软件在利用该漏洞传播。其中一组恶意软件有蠕虫传播行为,感染量显著比其他的恶意软件更多。分析后,我们认为这是一个长期存在的僵尸网络家族。我们将其命名为 muhst...
2018年3月28日,Drupal.org 公布了漏洞 CVE-2018-7600 的修复方案。Drapal 是一个开源的内容管理系统,由PHP语言写成,有很多网站使用 Drupal 向外提供网页服务。本次漏洞存在于 Drupal 的多个版本中,攻击者可以利用该漏洞完全控制网站。 从2018年4月13日开始,360网络安全研究院观测到互联网上有大量针对该漏洞的扫描。通过分析,我们认为有至少3组恶意软件在利用该漏洞传播。其中一组恶意软件有蠕虫传播行为,感染量显著比其他的恶意软件更多。分析后,我们认为这是一个长期存在的僵尸网络家族。我们将其命名为 muhstik,这主要是因为其二进制文件名和通信协议中多处包含了这个字符串。 我们...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"2018年3月28日,Drupal.org 公布了漏洞 CVE-2018-7600 的修复方案。Drapal 是一个开源的内容管理系统,由PHP语言写成,有很多网站使用 Drupal 向外提供网页服务。本次漏洞存在于 Drupal 的多个版本中,攻击者可以利用该漏洞完全控制网站。\n\n从2018年4月13日开始,360网络安全研究院观测到互联网上有大量针对该漏洞的扫描。通过分析,我们认为有至少3组恶意软件在利用该漏洞传播。其中一组恶意软件有蠕虫传播行为...
114
post
null
2018-04-20T07:46:44.000Z
63873b9a8b1c1e0007f52f22
botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style-en
0
2022-02-09T07:14:25.000Z
public
published
null
2018-04-20T09:27:45.000Z
Botnet Muhstik is Actively Exploiting Drupal CVE-2018-7600 in a Worm Style
<!--kg-card-begin: markdown--><p>On March 28, 2018, drupal released a patch for CVE-2018-7600. Drupal is an open-source content management system written in PHP, quite popular in many sites to provide web service. This vulnerability exists in multiple drupal versions, which may be exploited by an attacker to take full ...
On March 28, 2018, drupal released a patch for CVE-2018-7600. Drupal is an open-source content management system written in PHP, quite popular in many sites to provide web service. This vulnerability exists in multiple drupal versions, which may be exploited by an attacker to take full control of the target. Starting...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"On March 28, 2018, drupal released a patch for CVE-2018-7600. Drupal is an open-source content management system written in PHP, quite popular in many sites to provide web service. This vulnerability exists in multip...
115
post
null
2018-05-08T01:26:58.000Z
63873b9a8b1c1e0007f52f23
gpon-exploit-in-the-wild-ii-satori-botnet
0
2018-10-06T09:04:17.000Z
public
published
null
2018-05-16T11:07:55.000Z
GPON 漏洞的在野利用(二)——Satori 僵尸网络
<!--kg-card-begin: markdown--><p>本篇文章由 Rootkiter,yegenshen,Hui Wang 共同撰写。</p> <p>我们在之前的 <a href="__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others/">文章</a> 里提及,在本次GPON漏洞(CVE-2018-10561,CVE-2018-10562)公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 mettle、muhstik、mirai、hajime、satori等等。</p> <p>在上一篇文章里,我们详细介绍了...
本篇文章由 Rootkiter,yegenshen,Hui Wang 共同撰写。 我们在之前的 文章 里提及,在本次GPON漏洞(CVE-2018-10561,CVE-2018-10562)公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 mettle、muhstik、mirai、hajime、satori等等。 在上一篇文章里,我们详细介绍了 muhstik 僵尸网络的情况。在那篇文章发布的前后,通过与安全社区共同的努力,我们累积关闭了muhstik僵尸网络在 OVH 上的12 个IP地址,以及在微软网络上的 1 个IP地址。详细的IP地址列表,见附件 IoC部分。 【更新:值得一提的是...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"本篇文章由 Rootkiter,yegenshen,Hui Wang 共同撰写。\n\n\n\n我们在之前的 [文章](__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others/) 里提及,在本次GPON漏洞(CVE-2018-10561,CVE-2018-10562)公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 ...
116
post
null
2018-05-10T06:25:00.000Z
63873b9a8b1c1e0007f52f24
gpon-exploit-in-the-wild-i-muhstik-botnet-among-others
0
2022-02-09T07:13:54.000Z
public
published
null
2018-05-10T11:57:52.000Z
GPON 漏洞的在野利用(一)——muhstik 僵尸网络
<!--kg-card-begin: markdown--><p>自从本次GPON漏洞公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 mettle、muhstik、mirai、hajime、satori。时间之短、参与者之多,在以往IoT僵尸网络发展中并不多见。</p> <p>幸运的是,当前包括muhstik、mirai、hajime、satori在内的其中大部分僵尸网络的攻击载荷经测试实现有问题,并不能真正植入恶意代码;mettle 虽然能够植入恶意代码,但C2服务器短暂出现后下线了。无论如何,由于这些恶意代码团伙在积极更新,我们仍应对他们的行为保持警惕。</p> <p>muhstik 僵尸网络由...
自从本次GPON漏洞公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 mettle、muhstik、mirai、hajime、satori。时间之短、参与者之多,在以往IoT僵尸网络发展中并不多见。 幸运的是,当前包括muhstik、mirai、hajime、satori在内的其中大部分僵尸网络的攻击载荷经测试实现有问题,并不能真正植入恶意代码;mettle 虽然能够植入恶意代码,但C2服务器短暂出现后下线了。无论如何,由于这些恶意代码团伙在积极更新,我们仍应对他们的行为保持警惕。 muhstik 僵尸网络由我们首次批露 ( 报告-2018-04 )。本次 muhstik 的更新中增加了针对包...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"自从本次GPON漏洞公布以来,10天内已经有至少5个僵尸网络家族在积极利用该漏洞构建其僵尸军团,包括 mettle、muhstik、mirai、hajime、satori。时间之短、参与者之多,在以往IoT僵尸网络发展中并不多见。\n\n幸运的是,当前包括muhstik、mirai、hajime、satori在内的其中大部分僵尸网络的攻击载荷经测试实现有问题,并不能真正植入恶意代码;mettle 虽然能够植入恶意代码,但C2服务...
117
post
null
2018-05-10T11:27:43.000Z
63873b9a8b1c1e0007f52f25
gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en
0
2022-02-09T07:14:08.000Z
public
published
null
2018-05-10T11:57:09.000Z
GPON Exploit in the Wild (I) - Muhstik Botnet Among Others
<!--kg-card-begin: markdown--><p>On May 1st, VPN Mentor disclosed two vulnerabilities against GPON home router. Since then, at least 5 botnet families have been actively exploiting the vulnerability to build their zombie corps, including mettle, muhstik, mirai, hajime and satori. It is the first time we have seen so ma...
On May 1st, VPN Mentor disclosed two vulnerabilities against GPON home router. Since then, at least 5 botnet families have been actively exploiting the vulnerability to build their zombie corps, including mettle, muhstik, mirai, hajime and satori. It is the first time we have seen so many botnets competing for territor...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"On May 1st, VPN Mentor disclosed two vulnerabilities against GPON home router. Since then, at least 5 botnet families have been actively exploiting the vulnerability to build their zombie corps, including mettle, muh...
118
post
null
2018-05-16T10:21:29.000Z
63873b9a8b1c1e0007f52f26
gpon-exploit-in-the-wild-iii-mettle-hajime-mirai-omni-imgay
0
2018-10-06T09:07:11.000Z
public
published
null
2018-05-18T11:44:23.000Z
GPON 漏洞的在野利用(三)——Mettle、Hajime、Mirai、Omni、Imgay、TheMoon
<!--kg-card-begin: markdown--><p>本文由 Hui Wang、LIU Ya、RootKiter、yegenshen 共同撰写。</p> <p>[更新 2018-05-21 17:30]</p> <pre><code>这场GPON的聚会看起来永远不会结束了,现在 TheMoon 僵尸网络家族也开始加入了。文中增加了相关的描述。特别值得说明的,TheMoon僵尸网络所使用的攻击漏洞此前并没有批露过,看起来像是个 0day,我们选择不公开攻击载荷的详细内容。另外我们选择了两个版本的 GPON 家用路由器,TheMoon使用的攻击载荷均能成功运行。 </code></pre> <p>我们在之前的系列文章 <a ...
本文由 Hui Wang、LIU Ya、RootKiter、yegenshen 共同撰写。 [更新 2018-05-21 17:30] 这场GPON的聚会看起来永远不会结束了,现在 TheMoon 僵尸网络家族也开始加入了。文中增加了相关的描述。特别值得说明的,TheMoon僵尸网络所使用的攻击漏洞此前并没有批露过,看起来像是个 0day,我们选择不公开攻击载荷的详细内容。另外我们选择了两个版本的 GPON 家用路由器,TheMoon使用的攻击载荷均能成功运行。 我们在之前的系列文章 一 和 二 里提及,在本次GPON漏洞(CVE-2018-10561,CVE-2018-10562)公布以来,10天内已经有至少5个僵尸...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"本文由 Hui Wang、LIU Ya、RootKiter、yegenshen 共同撰写。\n\n[更新 2018-05-21 17:30]\n```\n这场GPON的聚会看起来永远不会结束了,现在 TheMoon 僵尸网络家族也开始加入了。文中增加了相关的描述。特别值得说明的,TheMoon僵尸网络所使用的攻击漏洞此前并没有批露过,看起来像是个 0day,我们选择不公开攻击载荷的详细内容。另外我们选择了两个版本的 GPON 家...
119
post
null
2018-05-17T05:48:15.000Z
63873b9a8b1c1e0007f52f27
gpon-exploit-in-the-wild-ii-satori-botnet-en
0
2018-10-06T09:13:12.000Z
public
published
null
2018-05-17T07:40:09.000Z
GPON Exploit in the Wild (II) - Satori Botnet
<!--kg-card-begin: markdown--><p>This article was co-authored by Rootkiter, Yegenshen, and Hui Wang.</p> <p>In our previous <a href="__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/">article</a>, we mentioned since this GPON Vulnerability (CVE-2018-10561, CVE-2018-10562 ) announced, there have b...
This article was co-authored by Rootkiter, Yegenshen, and Hui Wang. In our previous article, we mentioned since this GPON Vulnerability (CVE-2018-10561, CVE-2018-10562 ) announced, there have been at least five botnets family mettle, muhstik, mirai, hajime, satori actively exploit the vulnerability to build their zom...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This article was co-authored by Rootkiter, Yegenshen, and Hui Wang.\n\nIn our previous [article](__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/), we mentioned since this GPON Vulnerability (...
120
post
null
2018-05-21T02:31:01.000Z
63873b9a8b1c1e0007f52f28
untitled-3gpon-exploit-in-the-wild-iii-mettle-hajime-mirai-omni-imgay-en
0
2018-10-06T09:13:15.000Z
public
published
null
2018-05-21T04:05:47.000Z
GPON Exploit in the Wild (III) - Mettle, Hajime, Mirai, Omni, Imgay
<!--kg-card-begin: markdown--><p>This article was co-authored by Hui Wang, LIU Ya, Rootkiter and Yegenshen.</p> <p>In our previous articles <a href="__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others/">I</a> and <a href="__GHOST_URL__/gpon-exploit-in-the-wild-ii-satori-botnet/">II</a> of this series,...
This article was co-authored by Hui Wang, LIU Ya, Rootkiter and Yegenshen. In our previous articles I and II of this series, we mentioned that since the expose of the GPON vulnerabilities (CVE-2018-10561, CVE-2018-10562), there have been at least five botnet families actively exploiting this vulnerability to build th...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This article was co-authored by Hui Wang, LIU Ya, Rootkiter and Yegenshen.\n\nIn our previous articles [I](__GHOST_URL__/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others/) and [II](__GHOST_URL__/gpon-exploit-i...
122
post
null
2018-05-21T10:09:55.000Z
63873b9a8b1c1e0007f52f29
gpon-exploit-in-the-wild-iv-themoon-botnet-join-in-with-a-0day
0
2018-10-06T09:13:20.000Z
public
published
null
2018-05-21T10:45:59.000Z
GPON Exploit in the Wild (IV) - TheMoon Botnet Join in with a 0day(?)
<!--kg-card-begin: markdown--><p>This article was co-authored by Hui Wang, Rootkiter and Yegenshen.</p> <p>It looks like this GPON party will never end. We just found TheMoon botnet has join the party.</p> <p>TheMoon botnet has been discussed in our previous <a href="__GHOST_URL__/themoon-botnet-a-review-and-new-featur...
This article was co-authored by Hui Wang, Rootkiter and Yegenshen. It looks like this GPON party will never end. We just found TheMoon botnet has join the party. TheMoon botnet has been discussed in our previous article, in Chinese. Its activity can be seen as early as in 2014, and since 2017 it has merged at least...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This article was co-authored by Hui Wang, Rootkiter and Yegenshen.\n\nIt looks like this GPON party will never end. We just found TheMoon botnet has join the party.\n\nTheMoon botnet has been discussed in our previou...
123
post
null
2018-06-15T11:03:23.000Z
63873b9a8b1c1e0007f52f2a
old-botnets-never-die-and-satori-refuse-to-fade-away-too
0
2018-10-06T09:04:41.000Z
public
published
null
2018-06-15T14:44:21.000Z
僵尸永远不死,Satori也拒绝凋零
<!--kg-card-begin: markdown--><p>两天前,2018-06-14,我们注意到 Satori 的作者开始扫描收集 uc-httpd 1.0.0 设备的IP地址列表。这或许是为了针对4月公开的脆弱性 XiongMai uc-httpd 1.0.0 (<a href="https://www.exploit-db.com/exploits/44864/">CVE-2018-10088</a>) 在做准备。这些扫描活动导致了近期在 80 和 8000 端口上的扫描流量大涨。</p> <p>3小时前,就在我们撰写本篇文章的同时,Satori 作者又发布了一个更新版本。这个更新是个蠕虫,针对 D-Link DSL-...
两天前,2018-06-14,我们注意到 Satori 的作者开始扫描收集 uc-httpd 1.0.0 设备的IP地址列表。这或许是为了针对4月公开的脆弱性 XiongMai uc-httpd 1.0.0 (CVE-2018-10088) 在做准备。这些扫描活动导致了近期在 80 和 8000 端口上的扫描流量大涨。 3小时前,就在我们撰写本篇文章的同时,Satori 作者又发布了一个更新版本。这个更新是个蠕虫,针对 D-Link DSL-2750B 设备,对应的漏洞利用在5月25日刚刚 公开 。 僵尸永远不死 Satori 是 Mirai 僵尸网络的一个变种,我们首次注意到该僵尸网络是 2017-11-22。一周之后...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"两天前,2018-06-14,我们注意到 Satori 的作者开始扫描收集 uc-httpd 1.0.0 设备的IP地址列表。这或许是为了针对4月公开的脆弱性 XiongMai uc-httpd 1.0.0 ([CVE-2018-10088](https://www.exploit-db.com/exploits/44864/)) 在做准备。这些扫描活动导致了近期在 80 和 8000 端口上的扫描流量大涨。\n\n3小时前,就...
127
post
null
2018-06-15T14:41:05.000Z
63873b9a8b1c1e0007f52f2b
botnets-never-die-satori-refuses-to-fade-away-en
0
2018-10-06T09:13:26.000Z
public
published
null
2018-06-15T15:22:46.000Z
Botnets never Die, Satori REFUSES to Fade Away
<!--kg-card-begin: markdown--><p>Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uc-httpd 1.0.0 devices. Most likely for the vulnerability of XiongMai uc-httpd 1.0.0 (<a href="https://www.exploit-db.com/exploits/44864/">CVE-2018-10088</a>). The scanni...
Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uc-httpd 1.0.0 devices. Most likely for the vulnerability of XiongMai uc-httpd 1.0.0 (CVE-2018-10088). The scanning activities led to a surge in scanning traffic on ports 80 and 8000. About three hours...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uc-httpd 1.0.0 devices. Most likely for the vulnerability of XiongMai uc-httpd 1.0.0 ([CVE-2018-100...
129
post
null
2018-06-26T04:18:38.000Z
63873b9a8b1c1e0007f52f2c
a-fast-linux-mining-botnet-analyze
0
2018-10-06T09:04:46.000Z
public
published
null
2018-06-26T04:42:29.000Z
威胁快讯:一次僵尸挖矿威胁分析
<!--kg-card-begin: markdown--><p>友商发布了一个威胁分析 <a href="http://www.freebuf.com/vuls/175709.html">报告</a>,我们阐述一下从我们的角度看到的情况。</p> <h4 id="">核心样本</h4> <pre><code>hxxp://120.55.54.65/a7 </code></pre> <p>核心样本是个 Linux Shell 文件,后续动作均由该样本完成,包括:</p> <ul> <li>挖矿获利</li> <li>确保资源</li> <li>逃避检测</li> <li>横向扩展</li> </ul> <h4 id="">挖矿获利<...
友商发布了一个威胁分析 报告,我们阐述一下从我们的角度看到的情况。 核心样本 hxxp://120.55.54.65/a7 核心样本是个 Linux Shell 文件,后续动作均由该样本完成,包括: * 挖矿获利 * 确保资源 * 逃避检测 * 横向扩展 挖矿获利 具体的挖矿动作是由下面一组样本完成的: * hxxps://www.aybc.so/ubuntu.tar.gz * hxxps://www.aybc.so/debian.tar.gz * hxxps://www.aybc.so/cent.tar.gz 样本中的挖矿配置如下: * 矿池地址:xmr-asia1.nanop...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"友商发布了一个威胁分析 [报告](http://www.freebuf.com/vuls/175709.html),我们阐述一下从我们的角度看到的情况。\n\n####核心样本\n```\nhxxp://120.55.54.65/a7\n```\n\n核心样本是个 Linux Shell 文件,后续动作均由该样本完成,包括:\n\n - 挖矿获利\n - 确保资源\n - 逃避检测\n - 横向扩展\n\n#### 挖矿获利\n...
130
post
null
2018-07-06T07:12:01.000Z
63873b9a8b1c1e0007f52f2d
hns-botnet-recent-activities
0
2018-10-06T09:04:52.000Z
public
published
null
2018-07-06T11:11:41.000Z
HNS Botnet 最近活动更新
<!--kg-card-begin: markdown--><p>作者:Rootkiter, yegenshen</p> <p>HNS 僵尸网络(Hide and Seek) 是最初由 BitDefender 于今年 1月 <a href="https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/">报告</a> 的一个IoT僵尸网络。在那份报告中研究人员指出,HNS 会利用CVE-2016-10401、其他漏洞以及Telnet弱口...
作者:Rootkiter, yegenshen HNS 僵尸网络(Hide and Seek) 是最初由 BitDefender 于今年 1月 报告 的一个IoT僵尸网络。在那份报告中研究人员指出,HNS 会利用CVE-2016-10401、其他漏洞以及Telnet弱口令投入恶意代码,有执行任意指令和盗取用户信息的恶意行为,传播方式类似蠕虫,感染规模在1月23日至1月24期间快速增长到超过32k。并且,HNS内部通过P2P 机制通信,这是我们所知继 hajime之后第二个利用P2P通信的IoT僵尸网络。 P2P类的僵尸网络很难被根除,HNS 僵尸网络也是如此。在过去的几个月中 HNS 僵尸网络一直在持续更新,我们看到其更新活...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"作者:Rootkiter, yegenshen\n\nHNS 僵尸网络(Hide and Seek) 是最初由 BitDefender 于今年 1月 [报告](https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/) 的一个I...
131
post
null
2018-07-06T10:55:45.000Z
63873b9a8b1c1e0007f52f2e
hns-botnet-recent-activities-en
0
2018-10-06T09:13:30.000Z
public
published
null
2018-07-06T11:53:13.000Z
HNS Botnet Recent Activities
<!--kg-card-begin: markdown--><p>Author: Rootkiter, yegenshen</p> <p>HNS is an IoT botnet (Hide and Seek) originally discovered by BitDefender in January this year. In that <a href="https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/">report...
Author: Rootkiter, yegenshen HNS is an IoT botnet (Hide and Seek) originally discovered by BitDefender in January this year. In that report, the researchers pointed out that HNS used CVE-2016-10401, and other vulnerabilities to propagate malicious code and stole user information. The HNS communicates through the P2P ...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: Rootkiter, yegenshen\n\nHNS is an IoT botnet (Hide and Seek) originally discovered by BitDefender in January this year. In that [report](https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-c...
132
post
null
2018-07-23T07:39:19.000Z
63873b9a8b1c1e0007f52f2f
a-malware-compain-is-actively-exploiting-cve-2018-2893-for-botnet-mining
0
2018-10-06T09:04:57.000Z
public
published
null
2018-07-23T11:39:05.000Z
恶意代码团伙luoxk正在积极利用 CVE-2018-2893 传播
<!--kg-card-begin: markdown--><p>文章作者:Zhang Zaifeng, yegenshen, RootKiter, JiaYu</p> <p>7月18日,Oracle在官方发布的例行补丁更新中修复了CVE-2018-2893,一个Oracle WebLogic Server 远程代码执行漏洞。一般认为漏洞影响严重且相关PoC已经公开,建议相关用户尽快进行评估升级。</p> <p>三天后,2018-07-21 11:24:31 开始,我们注意到一个长久以来我们跟踪的恶意代码团伙正在积极利用该漏洞传播自身。由于该团伙经常使用 luoxkexp[.]com ,我们将其命名为 luoxk 。</p> <p>...
文章作者:Zhang Zaifeng, yegenshen, RootKiter, JiaYu 7月18日,Oracle在官方发布的例行补丁更新中修复了CVE-2018-2893,一个Oracle WebLogic Server 远程代码执行漏洞。一般认为漏洞影响严重且相关PoC已经公开,建议相关用户尽快进行评估升级。 三天后,2018-07-21 11:24:31 开始,我们注意到一个长久以来我们跟踪的恶意代码团伙正在积极利用该漏洞传播自身。由于该团伙经常使用 luoxkexp[.]com ,我们将其命名为 luoxk 。 该恶意代码团伙第一次触发我们的警铃是在一年前的2017年3月17日,我们的DNSMon系统,在该...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"文章作者:Zhang Zaifeng, yegenshen, RootKiter, JiaYu\n\n7月18日,Oracle在官方发布的例行补丁更新中修复了CVE-2018-2893,一个Oracle WebLogic Server 远程代码执行漏洞。一般认为漏洞影响严重且相关PoC已经公开,建议相关用户尽快进行评估升级。\n\n三天后,2018-07-21 11:24:31 开始,我们注意到一个长久以来我们跟踪的恶意代码团伙...
133
post
null
2018-07-23T11:43:04.000Z
63873b9a8b1c1e0007f52f30
malicious-campaign-luoxk-is-actively-exploiting-cve-2018-2893
0
2018-10-06T09:13:33.000Z
public
published
null
2018-07-23T12:30:09.000Z
Malicious Campaign luoxk Is Actively Exploiting CVE-2018-2893
<!--kg-card-begin: markdown--><p>Author: Zhang Zaifeng, yegenshen, RootKiter, JiaYu</p> <p>On July 18, in an officially released routine patch update, Oracle fixed CVE-2018-2893, an Oracle WebLogic Server remote code execution vulnerability.</p> <p>Three days later, at 2018-07-21 11:24:31 GMT+8, we noticed that a malic...
Author: Zhang Zaifeng, yegenshen, RootKiter, JiaYu On July 18, in an officially released routine patch update, Oracle fixed CVE-2018-2893, an Oracle WebLogic Server remote code execution vulnerability. Three days later, at 2018-07-21 11:24:31 GMT+8, we noticed that a malicious campaign that we have been tracking fo...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: Zhang Zaifeng, yegenshen, RootKiter, JiaYu\n\nOn July 18, in an officially released routine patch update, Oracle fixed CVE-2018-2893, an Oracle WebLogic Server remote code execution vulnerability.\n\nThree da...
134
post
null
2018-08-30T03:01:56.000Z
63873b9a8b1c1e0007f52f31
bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers-en
0
2018-11-22T02:20:17.000Z
public
published
null
2018-11-07T10:22:51.000Z
BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers
<!--kg-card-begin: markdown--><p>This article was co-authored by <a href="https://twitter.com/huiwangeth"><em>Hui Wang</em></a> and <a href="https://twitter.com/RooKiter"><em>RootKiter</em></a>.</p> <p>Since September 2018, <a href="https://scan.netlab.360.com/#/dashboard?dstport=5431">360Netlab Scanmon</a> has detecte...
This article was co-authored by Hui Wang and RootKiter. Since September 2018, 360Netlab Scanmon has detected multiple scan spikes on TCP port 5431, each time the system logged more than 100k scan sources, a pretty large number compared with most other botnets we have covered before. The interaction between the botn...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"This article was co-authored by [*Hui Wang*](https://twitter.com/huiwangeth) and [*RootKiter*](https://twitter.com/RooKiter).\n\n\nSince September 2018, [360Netlab Scanmon](https://scan.netlab.360.com/#/dashboard?dst...
137
post
null
2018-09-03T03:56:18.000Z
63873b9a8b1c1e0007f52f32
7500-mikrotik-routers-are-forwarding-owners-traffic-to-the-attackers-how-is-yours
0
2020-12-21T03:54:06.000Z
public
published
null
2018-09-04T05:28:20.000Z
窃听风云: 你的MikroTik路由器正在被监听
<!--kg-card-begin: markdown--><h4 id="">背景介绍</h4> <p>MikroTik是一家拉脱维亚公司,成立于1996年,致力于开发路由器和无线ISP系统。MikroTik现在为世界上大多数国家/地区的互联网连接提供硬件和软件。在1997年,MikroTik创建了RouterOS软件系统,在2002年,MikroTik决定制造自己的硬件并创建了RouterBOARD品牌,每个RouterBOARD设备都运行RouterOS软件系统。<a href="https://mikrotik.com/aboutus">[1]</a></p> <p>根据维基解密披露的CIA Vault7黑客工具Chimay...
背景介绍 MikroTik是一家拉脱维亚公司,成立于1996年,致力于开发路由器和无线ISP系统。MikroTik现在为世界上大多数国家/地区的互联网连接提供硬件和软件。在1997年,MikroTik创建了RouterOS软件系统,在2002年,MikroTik决定制造自己的硬件并创建了RouterBOARD品牌,每个RouterBOARD设备都运行RouterOS软件系统。[1] 根据维基解密披露的CIA Vault7黑客工具Chimay Red涉及到2个漏洞利用,其中包括Winbox任意目录文件读取(CVE-2018-14847)和Webfig远程代码执行漏洞。[2] Winbox是一个Windows GUI应用程序...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"####背景介绍\n\nMikroTik是一家拉脱维亚公司,成立于1996年,致力于开发路由器和无线ISP系统。MikroTik现在为世界上大多数国家/地区的互联网连接提供硬件和软件。在1997年,MikroTik创建了RouterOS软件系统,在2002年,MikroTik决定制造自己的硬件并创建了RouterBOARD品牌,每个RouterBOARD设备都运行RouterOS软件系统。[\\[1\\]](https://mi...
138
post
null
2018-09-04T02:40:03.000Z
63873b9a8b1c1e0007f52f33
7500-mikrotik-routers-are-forwarding-owners-traffic-to-the-attackers-how-is-yours-en
0
2020-12-21T03:54:30.000Z
public
published
null
2018-09-04T05:10:08.000Z
7,500+ MikroTik Routers Are Forwarding Owners’ Traffic to the Attackers, How is Yours?
<!--kg-card-begin: markdown--><p>[Update]</p> <p>2018-09-05 11:00 GMT+8, with the generous help from the AS64073, 103.193.137.211 has been promptly suspended and is no longer a threat.</p> <h4 id="overview">Overview</h4> <p>MikroTik is a Latvian company founded in 1996 to develop routers and wireless ISP systems. Mikro...
[Update] 2018-09-05 11:00 GMT+8, with the generous help from the AS64073, 103.193.137.211 has been promptly suspended and is no longer a threat. Overview MikroTik is a Latvian company founded in 1996 to develop routers and wireless ISP systems. MikroTik now provides hardware and software for Internet connectivity...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"[Update] \n\n2018-09-05 11:00 GMT+8, with the generous help from the AS64073, 103.193.137.211 has been promptly suspended and is no longer a threat.\n\n####Overview\n\nMikroTik is a Latvian company founded in 1996 to...
139
post
null
2018-09-07T11:09:00.000Z
63873b9a8b1c1e0007f52f34
miner-delivery-sample-via-ngrok-tunnel
0
2018-10-06T09:05:12.000Z
public
published
null
2018-09-11T13:52:00.000Z
利用ngrok传播样本挖矿
<!--kg-card-begin: markdown--><h1 id="">概述</h1> <p>&quot;链治百病,药不能停&quot;。时下各种挖矿软件如雨后春笋层出不穷,想把他们都灭了,那是不可能的,这辈子都不可能的。通常我们都忽略他们。但这个利用ngrok生成大量随机域名作为Downloader和Report域名,对抗安全设施阻断其域名,隐藏真实服务器地址的挖矿恶意样本成功的引起了我们的注意。</p> <p>该恶意样本的主要特点是:</p> <ul> <li> <p>使用ngrok定期更换的随机域名作为Downloader和Report域名。</p> </li> <li> <p>利用redis,docker,jenki...
概述 "链治百病,药不能停"。时下各种挖矿软件如雨后春笋层出不穷,想把他们都灭了,那是不可能的,这辈子都不可能的。通常我们都忽略他们。但这个利用ngrok生成大量随机域名作为Downloader和Report域名,对抗安全设施阻断其域名,隐藏真实服务器地址的挖矿恶意样本成功的引起了我们的注意。 该恶意样本的主要特点是: * 使用ngrok定期更换的随机域名作为Downloader和Report域名。 * 利用redis,docker,jenkins,drupal,modx,CouchDB漏洞植入xmr挖矿程序挖矿。 * 企图...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#概述\n \"链治百病,药不能停\"。时下各种挖矿软件如雨后春笋层出不穷,想把他们都灭了,那是不可能的,这辈子都不可能的。通常我们都忽略他们。但这个利用ngrok生成大量随机域名作为Downloader和Report域名,对抗安全设施阻断其域名,隐藏真实服务器地址的挖矿恶意样本成功的引起了我们的注意。\n\n该恶意样本的主要特点是:\n\n- 使用ngrok定期更换的随机域名作为Downloader和Report域名。\n\n...
144
post
null
2018-09-12T03:55:50.000Z
63873b9a8b1c1e0007f52f35
a-new-mining-botnet-blends-its-c2s-into-ngrok-service
0
2018-10-06T09:13:42.000Z
public
published
null
2018-09-12T15:06:10.000Z
A New Mining Botnet Blends Its C2s into ngrok Service
<!--kg-card-begin: markdown--><h1 id="overview">Overview</h1> <p>These days, it feels like new mining malwares are popping up almost daily and we have pretty much stopped blogging the regular ones so we don’t flood our readers’ feed.</p> <p>With that being said, one did have our attention recently. This botnet hides it...
Overview These days, it feels like new mining malwares are popping up almost daily and we have pretty much stopped blogging the regular ones so we don’t flood our readers’ feed. With that being said, one did have our attention recently. This botnet hides its C2s(Downloader and Reporter server) by using the ngrok re...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#Overview\n\nThese days, it feels like new mining malwares are popping up almost daily and we have pretty much stopped blogging the regular ones so we don’t flood our readers’ feed. \n\nWith that being said, one did ...
146
post
null
2018-09-14T12:08:57.000Z
63873b9a8b1c1e0007f52f36
fbot-a-satori-related-block-chain-dns-based-worm
0
2018-10-06T09:05:16.000Z
public
published
null
2018-09-14T12:42:19.000Z
Fbot,一个Satori相关的、基于区块链DNS的蠕虫
<!--kg-card-begin: markdown--><p>从2018-09-13 11:30 UTC开始,我们首次注意到一个新的蠕虫正在清理 com.ufo.miner。在完成了清理动作后,该蠕虫会等待来自C2(musl.lib,66.42.57.45:7000, Singapore/SG)的下一步指令。我们将该蠕虫命名为fbot,主要是因为该蠕虫的主要执行模块使用了这个名字。该C2域名的解析,需要通过EmerDNS,一个emercoin.com旗下的区块链DNS完成。</p> <p>com.ufo.miner 与我们之前多次 <a href="__GHOST_URL__/tag/adbminer/">报告</a> 的 AD...
从2018-09-13 11:30 UTC开始,我们首次注意到一个新的蠕虫正在清理 com.ufo.miner。在完成了清理动作后,该蠕虫会等待来自C2(musl.lib,66.42.57.45:7000, Singapore/SG)的下一步指令。我们将该蠕虫命名为fbot,主要是因为该蠕虫的主要执行模块使用了这个名字。该C2域名的解析,需要通过EmerDNS,一个emercoin.com旗下的区块链DNS完成。 com.ufo.miner 与我们之前多次 报告 的 ADB.Miner 类似,利用adb安卓调试接口传播,并挖矿。ADB.Miner 是我们今年二月首次 报告 的,自那以后,类似的其他僵尸网络已经长期传播,感染了包括...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"从2018-09-13 11:30 UTC开始,我们首次注意到一个新的蠕虫正在清理 com.ufo.miner。在完成了清理动作后,该蠕虫会等待来自C2(musl.lib,66.42.57.45:7000, Singapore/SG)的下一步指令。我们将该蠕虫命名为fbot,主要是因为该蠕虫的主要执行模块使用了这个名字。该C2域名的解析,需要通过EmerDNS,一个emercoin.com旗下的区块链DNS完成。\n\ncom....
147
post
null
2018-09-14T13:04:56.000Z
63873b9a8b1c1e0007f52f37
threat-alert-a-new-worm-fbot-cleaning-adbminer-is-using-a-blockchain-based-dns-en
0
2018-10-06T09:13:45.000Z
public
published
null
2018-09-14T19:01:55.000Z
Fbot, A Satori Related Botnet Using Block-chain DNS System
<!--kg-card-begin: markdown--><p>Since 2018-09-13 11:30 UTC, a new botnet (we call it Fbot) popped up in our radar which really caught our attention.</p> <p>There are 3 interesting aspects about this new botnet:</p> <ul> <li>First, so far the only purpose of this botnet looks to be just going after and removing another...
Since 2018-09-13 11:30 UTC, a new botnet (we call it Fbot) popped up in our radar which really caught our attention. There are 3 interesting aspects about this new botnet: * First, so far the only purpose of this botnet looks to be just going after and removing another botnet com.ufo.miner. * Second, the bot does...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\nSince 2018-09-13 11:30 UTC, a new botnet (we call it Fbot) popped up in our radar which really caught our attention.\n\nThere are 3 interesting aspects about this new botnet:\n \n * First, so far the only purpose o...
148
post
null
2018-09-28T04:03:23.000Z
63873b9a8b1c1e0007f52f38
70-different-types-of-home-routers-all-together-100000-are-being-hijacked-by-ghostdns
0
2022-02-09T07:13:18.000Z
public
published
null
2018-09-29T04:20:45.000Z
GhostDNS正在针对巴西地区70种、100,000+家用路由器做恶意DNS劫持
<!--kg-card-begin: markdown--><h3 id="">背景介绍</h3> <p>从2018年9月20号开始,360Netlab Anglerfish蜜罐系统监测到互联网上有大量IP正在针对性地扫描路由器系统。攻击者尝试对路由器Web认证页面进行口令猜解或者通过dnscfg.cgi漏洞利用绕过身份认证,然后通过相应DNS配置接口篡改路由器默认DNS地址为Rogue DNS Server[<a href="https://en.wikipedia.org/wiki/DNS_hijacking">1]</a> 。</p> <p>我们共发现3套成熟的DNSChanger程序,根据其编程语言特性我们将它们分别命名为S...
背景介绍 从2018年9月20号开始,360Netlab Anglerfish蜜罐系统监测到互联网上有大量IP正在针对性地扫描路由器系统。攻击者尝试对路由器Web认证页面进行口令猜解或者通过dnscfg.cgi漏洞利用绕过身份认证,然后通过相应DNS配置接口篡改路由器默认DNS地址为Rogue DNS Server[1] 。 我们共发现3套成熟的DNSChanger程序,根据其编程语言特性我们将它们分别命名为Shell DNSChanger,Js DNSChanger,PyPhp DNSChanger。目前这3套DNSChanger程序由同一个恶意软件团伙运营,其中以PyPhp DNChanger部署规模最大。根据其功能特性...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"### 背景介绍\n从2018年9月20号开始,360Netlab Anglerfish蜜罐系统监测到互联网上有大量IP正在针对性地扫描路由器系统。攻击者尝试对路由器Web认证页面进行口令猜解或者通过dnscfg.cgi漏洞利用绕过身份认证,然后通过相应DNS配置接口篡改路由器默认DNS地址为Rogue DNS Server[[1\\]](https://en.wikipedia.org/wiki/DNS_hijacking) 。\n\n我们共发现3套成...
149
post
null
2018-09-28T10:23:01.000Z
63873b9a8b1c1e0007f52f39
70-different-types-of-home-routers-all-together-100000-are-being-hijacked-by-ghostdns-en
0
2022-02-09T07:13:37.000Z
public
published
null
2018-09-29T02:52:00.000Z
70+ different types of home routers(all together 100,000+) are being hijacked by GhostDNS
<!--kg-card-begin: markdown--><p>note:We have informed various ISPs on the IoC list, and OVH, ORACLE, Google, Microsoft have taken down the related IPs and some others are working on it (Thanks!)</p> <h3 id="backgroundintroduction">Background introduction</h3> <p>DNSchanger is not something new and was quite active yea...
note:We have informed various ISPs on the IoC list, and OVH, ORACLE, Google, Microsoft have taken down the related IPs and some others are working on it (Thanks!) Background introduction DNSchanger is not something new and was quite active years ago [1], we occasionally encountered one every once in a while, but g...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"note:We have informed various ISPs on the IoC list, and OVH, ORACLE, Google, Microsoft have taken down the related IPs and some others are working on it (Thanks!)\n\n### Background introduction\n\nDNSchanger is not s...
150
post
null
2018-10-11T08:11:20.000Z
63873b9a8b1c1e0007f52f3a
bcmupnp_hunter-a-100k-botnet-is-seeming-abusing-home-routers-for-spam-emails
0
2021-01-26T13:16:12.000Z
public
published
null
2018-11-02T03:50:58.000Z
BCMUPnP_Hunter:疑似10万节点级别的僵尸网络正在滥用家用路由器发送垃圾邮件
<!--kg-card-begin: markdown--><p>本文由 <a href="https://twitter.com/huiwangeth"><em>Hui Wang</em></a>、<a href="https://twitter.com/RooKiter"><em>RootKiter</em></a>共同撰写</p> <p>360Netlab在2018年9月注意到一个新的僵尸网络。该僵尸网络的感染数量特别巨大,每个扫描波次中活跃的IP地址为10万左右,值得引起安全社区的警惕。</p> <p>我们将该僵尸网络命名为 <em>BCMUPnP_Hunter</em>,主要是考虑基其感染目标特征。该僵尸网络有以下几个特点...
本文由 Hui Wang、RootKiter共同撰写 360Netlab在2018年9月注意到一个新的僵尸网络。该僵尸网络的感染数量特别巨大,每个扫描波次中活跃的IP地址为10万左右,值得引起安全社区的警惕。 我们将该僵尸网络命名为 BCMUPnP_Hunter,主要是考虑基其感染目标特征。该僵尸网络有以下几个特点: * 感染量特别巨大,每个波次中活跃的扫描IP均在10万左右; * 感染目标单一,主要是以BroadCom UPnP为基础的路由器设备; * 样本捕获难度大,在高交互蜜罐中需模拟多处设备环境后才能成功捕获; * 自建代理网络(tcp-proxy),该代理网络由攻击者自行实现,可以利用 bot端 为跳板...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"本文由 [*Hui Wang*](https://twitter.com/huiwangeth)、[*RootKiter*](https://twitter.com/RooKiter)共同撰写\n\n360Netlab在2018年9月注意到一个新的僵尸网络。该僵尸网络的感染数量特别巨大,每个扫描波次中活跃的IP地址为10万左右,值得引起安全社区的警惕。\n\n我们将该僵尸网络命名为 *BCMUPnP_Hunter*,主要是考虑基...
151
post
null
2018-12-20T07:12:38.000Z
63873b9a8b1c1e0007f52f3b
fighting-mirai-in-an-automatic-manner
0
2018-12-24T03:48:15.000Z
public
draft
null
null
Fighting Mirai in an automatic manner
<!--kg-card-begin: markdown--><p>Although over 2 years have passed since the first time Mirai attracted lots of public attention for crippling some well-known sites such as Krebsonsecurity, OVH, and DYN, the infamous Linux DDoS botnet family still come to the media center very often in now days, which is for its new va...
Although over 2 years have passed since the first time Mirai attracted lots of public attention for crippling some well-known sites such as Krebsonsecurity, OVH, and DYN, the infamous Linux DDoS botnet family still come to the media center very often in now days, which is for its new variants get discovered, or some ze...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Although over 2 years have passed since the first time Mirai attracted lots of public attention for crippling some well-known sites such as Krebsonsecurity, OVH, and DYN, the infamous Linux DDoS botnet family still c...
158
post
null
2018-12-20T07:34:40.000Z
63873b9a8b1c1e0007f52f3c
untitled-7
0
2018-12-20T07:34:40.000Z
public
draft
null
null
(Untitled)
null
null
{"version":"0.3.1","markups":[],"atoms":[],"cards":[],"sections":[[1,"p",[[0,[],0,""]]]],"ghostVersion":"3.0"}
159
post
null
2019-01-11T02:37:19.000Z
63873b9a8b1c1e0007f52f3d
untitled-8
0
2019-01-11T02:37:19.000Z
public
draft
null
null
(Untitled)
null
null
{"version":"0.3.1","markups":[],"atoms":[],"cards":[],"sections":[[1,"p",[[0,[],0,""]]]],"ghostVersion":"3.0"}
162
post
null
2019-01-11T05:31:18.000Z
63873b9a8b1c1e0007f52f3e
untitled-9
0
2019-01-16T07:46:03.000Z
public
draft
null
null
简讯:几款可能需要持续关注的工具
<!--kg-card-begin: markdown--><p>作者:yegenshen, Rootkiter</p> <h1 id="">引</h1> <p>近日 360Netlab 对大量已公开的 Linux 类样本进行了集中的梳理,从中发现了一批可疑样本,它们在VT上的检出率均很低甚至未检出。</p> <p>分析后,我们推测:作者在相关开发过程中动了一些心思,并针对性的做了一些工作,虽然其中的一部分还未挖掘到更多的威胁证据,但这些心思或工作却值得警惕,选择在这里集中披露,是希望各安全从业者能够补充更多的数据拼图,或在后续的工作中能够识别出相似的威胁。</p> <h1 id="">恶意工具</h1> <h2 id="1reve...
作者:yegenshen, Rootkiter 引 近日 360Netlab 对大量已公开的 Linux 类样本进行了集中的梳理,从中发现了一批可疑样本,它们在VT上的检出率均很低甚至未检出。 分析后,我们推测:作者在相关开发过程中动了一些心思,并针对性的做了一些工作,虽然其中的一部分还未挖掘到更多的威胁证据,但这些心思或工作却值得警惕,选择在这里集中披露,是希望各安全从业者能够补充更多的数据拼图,或在后续的工作中能够识别出相似的威胁。 恶意工具 样本1 -- ReverseShell后门 样本(daca1d5e464d3320f90b773c1e355211)是个工具类后门,主要功能是:在受害机器上,...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"作者:yegenshen, Rootkiter\n# 引\n近日 360Netlab 对大量已公开的 Linux 类样本进行了集中的梳理,从中发现了一批可疑样本,它们在VT上的检出率均很低甚至未检出。\n\n分析后,我们推测:作者在相关开发过程中动了一些心思,并针对性的做了一些工作,虽然其中的一部分还未挖掘到更多的威胁证据,但这些心思或工作却值得警惕,选择在这里集中披露,是希望各安全从业者能够补充更多的数据拼图,或在后续的工作中...
163
post
null
2019-01-11T09:33:48.000Z
63873b9a8b1c1e0007f52f3f
untitled-10
0
2019-01-14T04:54:06.000Z
public
draft
null
null
anacroni后门
null
null
{"version":"0.3.1","markups":[],"atoms":[],"cards":[],"sections":[[1,"p",[[0,[],0,""]]]],"ghostVersion":"3.0"}
164
post
null
2019-01-14T08:17:06.000Z
63873b9a8b1c1e0007f52f40
pi-liang-de-icpbei-an-yu-ming
0
2019-01-16T11:15:04.000Z
public
draft
null
null
批量的ICP备案域名
<!--kg-card-begin: markdown--><h2 id="">异常发现</h2> <p>在360netlab的DNSMon系统中,最近发现一批非常<strong>奇特</strong>的域名。所谓奇特是指其域名格式较为统一,同时ICP备案的名称则为汉语中的 成语 + 网 构成,并且注册的公司主题都是太原的某些公司,不出意外,备案号都是 <strong>晋ICP备</strong> 开头的备案号。一批例子如下:</p> <ul> <li>rxnmwbj.cn 骑牛读汉书网 太原博睿创辉文化传媒有限公司 晋ICP备18012039号</li> <li>actxpbe.cn 藏龙卧虎网 太原三开商贸有限公司 晋ICP备1...
异常发现 在360netlab的DNSMon系统中,最近发现一批非常奇特的域名。所谓奇特是指其域名格式较为统一,同时ICP备案的名称则为汉语中的 成语 + 网 构成,并且注册的公司主题都是太原的某些公司,不出意外,备案号都是 晋ICP备 开头的备案号。一批例子如下: * rxnmwbj.cn 骑牛读汉书网 太原博睿创辉文化传媒有限公司 晋ICP备18012039号 * actxpbe.cn 藏龙卧虎网 太原三开商贸有限公司 晋ICP备18012107号 * frnzcpb.cn 鞠躬尽瘁网 太原三开商贸有限公司 晋ICP备18012107号 * iowxpaf.cn 狡兔三窟网 太原市仁邦商贸有限公司 晋ICP备18...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"##异常发现\n在360netlab的DNSMon系统中,最近发现一批非常**奇特**的域名。所谓奇特是指其域名格式较为统一,同时ICP备案的名称则为汉语中的 成语 + 网 构成,并且注册的公司主题都是太原的某些公司,不出意外,备案号都是 **晋ICP备** 开头的备案号。一批例子如下:\n\n* rxnmwbj.cn\t骑牛读汉书网\t太原博睿创辉文化传媒有限公司\t晋ICP备18012039号\n* actxpbe.cn\t...
165
post
null
2019-02-15T07:40:13.000Z
63873b9a8b1c1e0007f52f41
smoke-loader-zhu-ti-kong-zhi-tai-cha-jian-yi-ji-dao-ban-zhi-shang
0
2019-02-15T17:01:10.000Z
public
published
null
2019-02-03T07:46:00.000Z
Smoke Loader:主体、控制台、插件,以及盗版之殇
<p>Smoke Loader 是一个在黑市上公开销售的僵尸网络软件。其活动时间可以追溯到2011年,虽然近年来已经被多次曝光,但保持持续升级,非常活跃。在我们统计中,仅最近半年活跃的样本就超过 1,500 个。</p><p>我们在跟踪这一家族的过程中,捕获了一套完整的恶意程序套件,包括其主体Loader、控制台Panel,以及控制台中包含的插件。对这套样本的分析使我们对其运行机制有了更深入的了解,这将是本文的主要内容之一。</p><p>分析过程中,我们还遇到一组被修改过的特例样本。虽然有人认为这组样本是作者在对抗安全研究人员提取C2主控域名,但仔细分析后,我们认为这是第三方做“盗版”。这部分的分析和研判过程,是本文的主要内容之二。...
Smoke Loader 是一个在黑市上公开销售的僵尸网络软件。其活动时间可以追溯到2011年,虽然近年来已经被多次曝光,但保持持续升级,非常活跃。在我们统计中,仅最近半年活跃的样本就超过 1,500 个。 我们在跟踪这一家族的过程中,捕获了一套完整的恶意程序套件,包括其主体Loader、控制台Panel,以及控制台中包含的插件。对这套样本的分析使我们对其运行机制有了更深入的了解,这将是本文的主要内容之一。 分析过程中,我们还遇到一组被修改过的特例样本。虽然有人认为这组样本是作者在对抗安全研究人员提取C2主控域名,但仔细分析后,我们认为这是第三方做“盗版”。这部分的分析和研判过程,是本文的主要内容之二。 Smoke Loade...
{"version":"0.3.1","atoms":[["soft-return","",{}],["soft-return","",{}]],"cards":[["image",{"src":"__GHOST_URL__/content/images/2019/02/image.png"}],["image",{"src":"__GHOST_URL__/content/images/2019/02/image-16.png","caption":"<i>图 2. Smoke Loader 的Panel控制台,Web界面&nbsp;</i>"}],["image",{"src":"__GHOST_URL__/content/ima...
5c666cdd3cfa71000717a663
post
null
2019-02-15T09:29:44.000Z
63873b9a8b1c1e0007f52f42
smoke-loader-the-core-files-the-admin-panel-the-plugins-and-the-3rd-party-patch
0
2019-02-18T03:51:52.000Z
public
published
null
2019-02-18T03:51:52.000Z
Smoke Loader: The Admin Panel, the 3rd Party Patch, and few other things
<p>Smoke Loader is a botnet software that is publicly available since 2011 on the black market. It is old but still active, just in the last six months we have seen more than 1,500 active samples.</p><p>Although it has been repeatedly exposed by different security researchers in recent years, the public available docum...
Smoke Loader is a botnet software that is publicly available since 2011 on the black market. It is old but still active, just in the last six months we have seen more than 1,500 active samples. Although it has been repeatedly exposed by different security researchers in recent years, the public available documents we ...
{"version":"0.3.1","atoms":[["soft-return","",{}],["soft-return","",{}]],"cards":[["image",{"src":"http://123.125.80.45/content/images/2019/02/1_smoke_load_file_tree.png","alt":"","title":"","caption":"<em>Figure 1. Smoke Loader's Panel Kit File Structure</em>"}],["image",{"src":"http://123.125.80.45/content/images/201...
5c6686883cfa71000717a69e
post
null
2019-02-19T08:53:51.000Z
63873b9a8b1c1e0007f52f43
the-new-developments-of-the-fbot
0
2022-02-09T07:13:05.000Z
public
published
null
2019-02-20T08:37:07.000Z
FBot 新进展
<!--kg-card-begin: markdown--><p>【更新:2019年12月4日】近期我们多次收到针对本blog的询问。我们决定将一些事实补充列出如下:</p> <p>——Kenneth Crurrin Schuchman,绰号 Nexus-Zeta,一名21岁的年轻人,已经于2019年9月3日向美国阿拉斯加区域法庭认罪。Schuchman的认罪书表明,Schuchman及其同谋者通过感染大批设备,创建了一系列僵尸网络,包括 Satori,Okiru,Masuta,Tsunami,Fbot,并利用这些僵尸网络的DDoS破坏力牟利;<br> ——本 Blog 中涉及到的脆弱性并非发生在 Hisilicon。通过后续分析以...
【更新:2019年12月4日】近期我们多次收到针对本blog的询问。我们决定将一些事实补充列出如下: ——Kenneth Crurrin Schuchman,绰号 Nexus-Zeta,一名21岁的年轻人,已经于2019年9月3日向美国阿拉斯加区域法庭认罪。Schuchman的认罪书表明,Schuchman及其同谋者通过感染大批设备,创建了一系列僵尸网络,包括 Satori,Okiru,Masuta,Tsunami,Fbot,并利用这些僵尸网络的DDoS破坏力牟利; ——本 Blog 中涉及到的脆弱性并非发生在 Hisilicon。通过后续分析以及安全社区交流,我们确认该脆弱性发生在华为海思的供应链下游厂商。为了保护最终客户的...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"markdown":"【更新:2019年12月4日】近期我们多次收到针对本blog的询问。我们决定将一些事实补充列出如下:\n\n——Kenneth Crurrin Schuchman,绰号 Nexus-Zeta,一名21岁的年轻人,已经于2019年9月3日向美国阿拉斯加区域法庭认罪。Schuchman的认罪书表明,Schuchman及其同谋者通过感染大批设备,创建了一系列僵尸网络,包括 Satori,Okiru,Masuta,Tsunami,Fbot,并利用这些僵尸网络的DDoS破坏力牟利;\n——本 Blog 中涉及到的脆弱...
5c6bc41f3e49df0007c26b3c
post
null
2019-02-20T04:24:37.000Z
63873b9a8b1c1e0007f52f44
the-new-developments-of-the-fbot-en
0
2022-02-09T07:12:49.000Z
public
published
null
2019-02-20T08:37:17.000Z
The new developments Of the FBot
<!--kg-card-begin: markdown--><p>Update 2019.12.04: Recently we have received quite a few requests of comment about this blog. We feel it necessary to list following facts here:</p> <ol> <li>Kenneth Crurrin Schuchman, with nicknames &quot;Nexus&quot; or &quot;Nexus-Zeta&quot;, a 21 years old young man, has pleaded guil...
Update 2019.12.04: Recently we have received quite a few requests of comment about this blog. We feel it necessary to list following facts here: 1. Kenneth Crurrin Schuchman, with nicknames "Nexus" or "Nexus-Zeta", a 21 years old young man, has pleaded guilty on 2019.09.03 to the United States District Court for the...
{"version":"0.3.1","atoms":[["soft-return","",{}]],"cards":[["markdown",{"markdown":"Update 2019.12.04: Recently we have received quite a few requests of comment about this blog. We feel it necessary to list following facts here:\n\n1.\tKenneth Crurrin Schuchman, with nicknames \"Nexus\" or \"Nexus-Zeta\", a 21 years o...
5c6cd6853e49df0007c26ba3
post
null
2019-03-28T08:55:49.000Z
63873b9a8b1c1e0007f52f45
twde-yu-ming-lan-yong-qing-kuang-fen-xi
0
2019-04-18T03:14:35.000Z
public
draft
null
null
.TW顶级域的域名滥用情况分析
<blockquote><em>注:本文所说的 .TW 顶级域仅指SLD.TW这类域名,并不包含com.tw, net.tw, org.tw, idv.tw, game.tw, club.tw, ebiz.tw 等复合顶级域。</em></blockquote><!--kg-card-begin: markdown--><h1 id="noddnsmon">NOD 以及 DNSMon</h1> <p>Newly Observered Doamin(NOD)是指在DNS系统中新出现的域名,对NOD域名的监测和标记能够快速的对新出现的各种应用进行发现和分析。NOD域名经常会用来做垃圾邮件,恶意软件的分发以及botnet的C2等。此外各种...
注:本文所说的 .TW 顶级域仅指SLD.TW这类域名,并不包含com.tw, net.tw, org.tw, idv.tw, game.tw, club.tw, ebiz.tw 等复合顶级域。 NOD 以及 DNSMon Newly Observered Doamin(NOD)是指在DNS系统中新出现的域名,对NOD域名的监测和标记能够快速的对新出现的各种应用进行发现和分析。NOD域名经常会用来做垃圾邮件,恶意软件的分发以及botnet的C2等。此外各种灰产(赌博,色情,网络诈骗)为了避免为安全设备/程序的封杀,也经常会使用NOD来开展业务。对NOD的监控对一个完善的DNS监控系统必须具备的功能。 DNSMon系统是3...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"markdown":"# NOD 以及 DNSMon\nNewly Observered Doamin(NOD)是指在DNS系统中新出现的域名,对NOD域名的监测和标记能够快速的对新出现的各种应用进行发现和分析。NOD域名经常会用来做垃圾邮件,恶意软件的分发以及botnet的C2等。此外各种灰产(赌博,色情,网络诈骗)为了避免为安全设备/程序的封杀,也经常会使用NOD来开展业务。对NOD的监控对一个完善的DNS监控系统必须具备的功能。\n\nDNSMon系统是360netlab开发的,针对互联网DNS流量做持续不断的监控和各种异...
5c9c8c1540e02300075f9d56
post
null
2019-04-04T09:46:27.000Z
63873b9a8b1c1e0007f52f46
you-yi-ci-yong-hu-fan-kui-shuo-kai-qu
0
2019-05-24T10:33:10.000Z
public
draft
null
null
由一次用户反馈说开去
<!--kg-card-begin: markdown--><h1 id="">缘由</h1> <p>2019-04-04 的下午,我收到一份用户反馈的邮件,说是同样一个链接在两台不同的电脑上打开的效果不一致。一台电脑是“正常”打开,另一台则“打不开”,返回的是360netlab的sinkhole页面。我当然知道是因为我们的DNSMon的恶意域名拦截功能导致的,不过引起我兴趣的是具体被拦截的域名 <strong>1oau9.cn</strong>。 这种域名像极了黑灰产业链中用到的那种垃圾域名。在反馈中用户特意提到了“<strong>使用微信</strong>”点开链接,这一点和我上一篇文章提到的 TW 顶级域的滥用也很像。邮件截图...
缘由 2019-04-04 的下午,我收到一份用户反馈的邮件,说是同样一个链接在两台不同的电脑上打开的效果不一致。一台电脑是“正常”打开,另一台则“打不开”,返回的是360netlab的sinkhole页面。我当然知道是因为我们的DNSMon的恶意域名拦截功能导致的,不过引起我兴趣的是具体被拦截的域名 1oau9.cn。 这种域名像极了黑灰产业链中用到的那种垃圾域名。在反馈中用户特意提到了“使用微信”点开链接,这一点和我上一篇文章提到的 TW 顶级域的滥用也很像。邮件截图如下: 域名用途 1oau9.cn 这个域名被拦截,在DNSMon系统中,没有任何可用的信息,被拦截是因为高可疑。不过从用户的反馈中,可以看到它有...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"markdown":"# 缘由\n2019-04-04 的下午,我收到一份用户反馈的邮件,说是同样一个链接在两台不同的电脑上打开的效果不一致。一台电脑是“正常”打开,另一台则“打不开”,返回的是360netlab的sinkhole页面。我当然知道是因为我们的DNSMon的恶意域名拦截功能导致的,不过引起我兴趣的是具体被拦截的域名 **1oau9.cn**。 这种域名像极了黑灰产业链中用到的那种垃圾域名。在反馈中用户特意提到了“**使用微信**”点开链接,这一点和我上一篇文章提到的 TW 顶级域的滥用也很像。邮件截图如下:\n![...
5ca5d27340e02300075fa114