{"id":924,"date":"2021-02-23T14:33:03","date_gmt":"2021-02-23T06:33:03","guid":{"rendered":"https:\/\/blog.billows.com.tw\/?p=924"},"modified":"2021-02-23T14:45:03","modified_gmt":"2021-02-23T06:45:03","slug":"%e4%b8%ad%e5%9c%8b%e9%96%93%e8%ab%9c%e5%b7%a5%e5%85%b7%e8%bb%9f%e9%ab%94%e7%9a%84%e7%a8%8b%e5%bc%8f%e7%a2%bc%e6%98%af%e5%be%9e%e7%be%8e%e5%9c%8b%e5%9c%8b%e5%ae%b6%e5%ae%89%e5%85%a8%e5%b1%80%ef%bc%88ns","status":"publish","type":"post","link":"https:\/\/blog.billows.com.tw\/?p=924","title":{"rendered":"\u4e2d\u570b\u9593\u8adc\u5de5\u5177\u8edf\u9ad4\u7684\u7a0b\u5f0f\u78bc\u662f\u5f9e\u7f8e\u570b\u570b\u5bb6\u5b89\u5168\u5c40\uff08NSA\uff09\u8907\u88fd\u800c\u4f86\u7684!!!"},"content":{"rendered":"\n<p>\u4ee5\u8272\u5217\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u65bc2\u670822\u65e5\u8072\u7a31\uff0c\u4e2d\u570b\u570b\u5bb6\u7d1a\u99ed\u5ba2\u7d44\u7e54APT31\u76dc\u7528\u4e86\u6700\u521d\u7531\u7f8e\u570b\u570b\u5b89\u5c40\u65d7\u4e0b\u7684Equation Group\u958b\u767c\u7684\u8edf\u9ad4\u7a0b\u5f0f\u78bc\uff0c\u9032\u884c\u99ed\u5ba2\u884c\u52d5\u3002<a href=\"https:\/\/research.checkpoint.com\/2021\/the-story-of-jian\/\">Check Point\u9031\u4e00\u767c\u5e03\u7684\u5831\u544a<\/a>\uff0c\u6307\u9019\u4efd\u7a0b\u5f0f\u78bc\u548c\u4e2d\u570b\u6709\u95dc\u7684\u60e1\u610f\u8edf\u9ad4Jian\u300c\u7bad\u300d\u7684\u90e8\u5206\u529f\u80fd\u975e\u5e38\u76f8\u4f3c\uff0c\u800c\u300c\u7bad\u300d\u8207\u7f8e\u570b\u570b\u5b89\u5c40\u65bc2017\u5e74\u88ab\u76dc\u4e26\u88ab\u653e\u5728\u7db2\u8def\u4e0a\u6563\u64ad\u7684\u7db2\u8def\u653b\u64ca\u5de5\u5177\u975e\u5e38\u76f8\u4f3c\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"599\" src=\"https:\/\/blog.billows.com.tw\/wp-content\/uploads\/2021\/02\/JIAN-1024x599.png\" alt=\"\" class=\"wp-image-927\" srcset=\"https:\/\/blog.billows.com.tw\/wp-content\/uploads\/2021\/02\/JIAN-1024x599.png 1024w, https:\/\/blog.billows.com.tw\/wp-content\/uploads\/2021\/02\/JIAN-300x176.png 300w, https:\/\/blog.billows.com.tw\/wp-content\/uploads\/2021\/02\/JIAN-768x449.png 768w, https:\/\/blog.billows.com.tw\/wp-content\/uploads\/2021\/02\/JIAN.png 1352w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>\u4e8b\u4ef6\u6642\u9593\u8868\u8a73\u7d30\u8aaa\u660e\u4e86EpMe \/ \u7bad \/ CVE-2017-0005\u7684\u6545\u4e8b<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Amazing research by <a href=\"https:\/\/twitter.com\/megabeets_?ref_src=twsrc%5Etfw\">@megabeets_<\/a>  and <a href=\"https:\/\/twitter.com\/EyalItkin?ref_src=twsrc%5Etfw\">@EyalItkin<\/a> revealing how American exploits potentially leaked over to China &#8211; years before anyone ever heard of the Shadow Brokers<a href=\"https:\/\/t.co\/C50ReDcXPR\">https:\/\/t.co\/C50ReDcXPR<\/a><\/p>&mdash; Yaniv Balmas (@ynvb) <a href=\"https:\/\/twitter.com\/ynvb\/status\/1363813337168039936?ref_src=twsrc%5Etfw\">February 22, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Checkpoint\u7814\u7a76\u8ca0\u8cac\u4ebaYaniv Balmas\u7a31\u300c\u7bad\u300d\u70ba\u5c71\u5be8(Copycat) \u548c\u4e2d\u570b\u8907\u88fd\u54c1(Chinese replica)\uff0c\u7a4d\u6975\u4f7f\u7528\u4e86\u7f8e\u570b\u570b\u5b89\u5c40\u65d7\u4e0b\u7684\u7db2\u8def\u653b\u64ca\u7d44\u7e54\uff08Equation Group\uff09\u7684\u653b\u64ca\u5de5\u5177\u7a0b\u5f0f\u78bc\u201c EpMe\u201d\u3002<\/p>\n\n\n\n<p>\u64da<a href=\"https:\/\/www.zdnet.com\/article\/chinese-hackers-cloned-attack-tools-belonging-to-nsas-equation-group\/\" data-type=\"URL\" data-id=\"https:\/\/www.zdnet.com\/article\/chinese-hackers-cloned-attack-tools-belonging-to-nsas-equation-group\/\">Zdnet<\/a>\u63f4\u5f15Checkpoint\u8aaa\uff0c \u4e2d\u570bAPT31\u7684\u300c\u7bad\u300d\u548c\u7f8e\u570b\u7684Equation Group\u7684\u300cEpMe\u300d\u90fd\u662f\u70ba\u4e86\u63d0\u5347\u653b\u64ca\u8005\u5728\u672c\u5730Windows\u74b0\u5883\u4e2d\u7684\u8a31\u53ef\u6b0a\u3002\u9019\u4e00\u5de5\u5177\u662f\u5728\u653b\u64ca\u8005\u7372\u5f97\u6700\u521d\u5b58\u53d6\u76ee\u6a19\u96fb\u8166\u7684\u8a31\u53ef\u6b0a\u5f8c\uff08\u4f8b\u5982\u901a\u904e\u91e3\u9b5a\u90f5\u4ef6\u7b49\uff09\u4f7f\u7528\u7684\uff0c\u6388\u4e88\u653b\u64ca\u8005\u6700\u9ad8\u7684\u6b0a\u9650\uff0c\u9019\u6a23\u4ed6\u5011\u5c31\u53ef\u4ee5\u5728\u5df2\u7d93\u53d7\u611f\u67d3\u7684\u96fb\u8166\u4e0a\u70ba\u6240\u6b32\u70ba\u3002\u64da\u5831\u5c0e\uff0c\u9019\u5169\u500b\u7d44\u7e54\uff0c\u4e2d\u570b\u7684APT31\u548c\u7f8e\u570b\u7684Equation Group\u5229\u7528\u4e86\u7576\u6642\u672a\u77e5\u7684Windows\u6f0f\u6d1e\uff08CVE-2017-0005\uff09\uff0c\u70ba\u4e86&#8221;\u63d0\u9ad8\u53d7\u611f\u67d3\u6a5f\u5668\u4e0a\u653b\u64ca\u8005\u7684\u7279\u6b0a&#8221;\u3002<\/p>\n\n\n\n<p>\u5831\u544a\u63d0\u5230\uff0c\u4e2d\u570b\u99ed\u5ba2\u7d44\u7e54\u6709\u53ef\u80fd\u662f\u5728Equation Group\u653b\u64ca\u4e2d\u570b\u76ee\u6a19\u6642\u53d6\u5f97\u4e86\u7a0b\u5f0f\u78bc\uff0c\u4e5f\u53ef\u80fd\u662f\u5728\u5176\u653b\u64caEquation Group\u7684\u57fa\u790e\u5efa\u8a2d\u6642\u6355\u7372\u4e86\u7a0b\u5f0f\u78bc\u3002\u7814\u7a76\u9084\u63d0\u5230\uff0cAPT31\u5229\u7528\u300c\u7bad\u300d\uff0c\u57282015\u5e74\u81f32017\u5e743\u6708\u671f\u9593\u9032\u884c\u4e86\u7db2\u8def\u653b\u64ca\uff0c <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2017\/03\/27\/detecting-and-mitigating-elevation-of-privilege-exploit-for-cve-2017-0005\/\">\u76f4\u5230Microsoft\u4fee\u88dc\u4e86<\/a>\u5b83\u5229\u7528\u7684\u6f0f\u6d1e\u3002\u64da\u7814\u7a76\u4eba\u54e1\u7a31\uff0c\u7bad\u662f\u201cEpMe\u201d\u7684\u5c71\u5be8\uff0c\u8a72\u7522\u54c1\u4e5f\u88ab\u5305\u62ec\u57282017\u5e74 Shadow Brokers\u7684\u201c Lost in Translation\u201d\u8cc7\u6599\u5916\u6d29\u4e2d\uff0c\u4e26\u88ab\u201c\u91cd\u65b0\u8a2d\u8a08\u201d\u4f86\u653b\u64ca\u7f8e\u570b\u516c\u6c11\u3002<\/p>\n\n\n\n<p>\u5c08\u5bb6\u8a8d\u70ba\u7f8e\u570b\u9593\u8adc\u61c9\u8a72\u6295\u5165\u66f4\u591a\u8cc7\u6e90\u4f86\u4fee\u5fa9\u8edf\u9ad4\u7684\u7f3a\u9677\uff0c\u800c\u4e0d\u662f\u958b\u767c\u548c\u90e8\u7f72\u60e1\u610f\u8edf\u9ad4\u4f86\u9032\u4e00\u6b65\u5229\u7528\u5b83\u3002<a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/buckeye-windows-zero-day-exploit\">Broadcom\u65d7\u4e0b\u7684\u8cc7\u5b89\u516c\u53f8Symantec\u57282019\u5e74\u985e\u4f3c\u7684\u4e8b\u4ef6\u5831\u544a\u4e2d\u8868\u793a<\/a>\uff0cNSA\u591a\u5e74\u4f86\u4e00\u518d\u5931\u53bb\u5c0d\u81ea\u5df1\u60e1\u610f\u8edf\u9ad4\u7684\u63a7\u5236<\/p>\n\n\n\n<p>\u7f8e\u570b\u570b\u5b89\u5c40\u548c\u83ef\u76db\u9813\u7684\u4e2d\u570b\u5927\u4f7f\u9928\u6c92\u6709\u5c0dCheckpoint\u5831\u544a\u767c\u8868\u8a55\u8ad6\u3002<\/p>\n\n\n\n<p>\u6709\u95dc\u60c5\u8cc7\uff0c\u8acb\u9023\u7d50<a href=\"http:\/\/www.billows.com.tw\/\">\u7ae3\u76df\u79d1\u6280<\/a>\u4ee3\u7406\u7684 AlienVault OTX \u60c5\u8cc7\u5e73\u53f0:<\/p>\n\n\n\n<p><a href=\"https:\/\/otx.alienvault.com\/pulse\/6033e08d756155d3fc8d8f1c\">https:\/\/otx.alienvault.com\/pulse\/6033e08d756155d3fc8d8f1c<\/a><\/p>\n\n\n\n<p>*****\u7ae3\u76df\u79d1\u6280\u5feb\u5831\u6b61\u8fce\u8f49\u8f09\uff0c\u4f46\u8acb\u8a3b\u660e\u51fa\u8655\u3002<\/p>\n\n\n\n<p>Source:<\/p>\n\n\n\n<p><a href=\"https:\/\/research.checkpoint.com\/2021\/the-story-of-jian\/\">https:\/\/research.checkpoint.com\/2021\/the-story-of-jian\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4ee5\u8272\u5217\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u65bc2\u670822\u65e5\u8072\u7a31\uff0c\u4e2d\u570b\u570b\u5bb6\u7d1a\u99ed\u5ba2\u7d44\u7e54APT31\u76dc\u7528\u4e86\u6700\u521d\u7531\u7f8e\u570b\u570b\u5b89\u5c40\u65d7\u4e0b\u7684Equation  <a class=\"read-more\" href=\"https:\/\/blog.billows.com.tw\/?p=924\">READ MORE<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[145,112,143],"class_list":["post-924","post","type-post","status-publish","format-standard","hentry","category-6","tag-equation-group-epme-2","tag-112","tag-jian"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=924"}],"version-history":[{"count":3,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/924\/revisions"}],"predecessor-version":[{"id":928,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/924\/revisions\/928"}],"wp:attachment":[{"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.billows.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}