°²È«³§Ḛ́䲼Turla APT»ù´¡ÉèÊ©µÄ¸ú×ٻ㱨 £»·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷

°ä²¼¹¦·ò 2020-03-16

1.°²È«³§Ḛ́䲼Turla APT»ù´¡ÉèÊ©µÄ¸ú×ٻ㱨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Turla APTÊÇÒ»¸ö³ÉÊì¡¢¸´ÔÓÇÒÓµÓÐÕ½Êõ³ÁµãµÄÍøÂç¼äµý×éÖ¯£¬¸Ã×éÖ¯Õë¶ÔÈ«Çò¿ÆÑÓ×¢±í½»ºÍ¾üÊ»ú¹¹µÄ¹¥»÷ÒÑÓÐÊ®¶àÄêµÄº¹Ç࣬²¢ÇÒÒ»ÏòÔÚÕë¶Ô±±´óÎ÷ÑóЭÒé×éÖ¯£¨NATO£©ºÍ¶ÀÁªÌ壨CIS£©¹ú¶È ¡£Turla²»ÐÝ¿ª·¢×Ô¼º¶ÀÓеġ¢ÏȽøµÄ¶ñÒâÈí¼þºÍ¹¤¾ß£¬²¢Ñ¡È¡ÐµĹ¥»÷ºÍ»ìºÏ²½Ö裬Insikt GroupÆÀ¹ÀÒÔΪTurlaÔÚ½«À´¼¸ÄêÄÚÈÔ½«ÊÇÒ»¸ö»îÔ¾µÄ¡¢ÏȽøµÄÍþв ¡£Recorded FutureµÄÐÂ×êÑÐÌṩÁË×Ô¶¯¸ú×ٺͼø±ðTurla»ù´¡¼Ü¹¹µÄ²½Ö裬³Áµã¹Ø×¢¼¸ÖÖÓëTurlaÓйصĶñÒâÈí¼þÀàÐÍ£¬Ô̺¬MosquitoºóÃźͽٳֵÄÒÁÀÊTwoFace ASPX Web Shell ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.recordedfuture.com/turla-apt-infrastructure/


2.ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄDDR4ÄÚ´æÈÔÊÜRowhammer¹¥»÷Ó°Ïì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


VUSec×êÑÐÈËÔ±·¢ÏÖÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄÏÖ´úÄÚ´æÄ £¿éÈÔ½«Ãæ¶ÔRowhammer£¨ÄÚ´æÎ»·­×ª£©¹¥»÷·çÏÕ ¡£Ä¿Ç°Õë¶ÔRowhammer¹¥»÷µÄ·À»¤´ëÊ©¶ÔÓÚÒÑÖªµÄRowhammer±äÖÖÊÇÓÐЧµÄ£¬µ«×êÑÐÈËÔ±ÑÝʾÁË¿ÉÈÆ¹ýµ±Ç°»º½â´ëÊ©µÄÐÂÐÍRowhammer¹¥»÷£¨CVE2020-10255£© ¡£ÐµÄÄÚ´æÎ»·­×ª¹¥»÷¿ÉÔںܶàÉ豸ÉÏÔËÐУ¬Ô̺¬¹È¸è¡¢ÈýÐǺÍÒ»¼ÓµÄÖÇÄÜÊÖ»ú ¡£VUSecÓÚ2019Äê11ÔÂÏòËùÓÐÊÜÓ°ÏìµÄ¸÷·½Åû¶ÁËеÄRowhammer¹¥»÷£¬µ«ÐµĻº½â´ëʩִÐÐÆðÀ´²¢²»ÈÝÒ×£¬²¢ÇÒ±ØÒªÆÆ·ÑһЩ¹¦·òÀ´²¿Êð ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/


3.BlackWaterºóÃÅÀÄÓÃCloudflare Workers½øÐÐC2ͨѶ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MalwareHunterTeam·¢ÏÖÒ»¸öÃûΪBlackWaterµÄÐÂÐͺóÃÅ£¬¸ÃºóÃÅÔÚ¼Ù×°³ÉÐéαCOVID-19ÐÅÏ¢µÄͬʱ»¹ÀÄÓÃCloudflare Workers½øÐÐC2ͨѶ ¡£BlackWaterͨ¹ýÒ»¸öÃûΪImportant-COVID-19.rarµÄRARÎļþ´«²¼£¬Ä¿Ç°Éв»Ã÷ÏÔ¸ÃÎļþͨ¹ýºÎÖÖ·½Ê½·Ö·¢£¬µ«ºÜ¿ÉÄÜÊÇͨ¹ý´¹µöÓʼþ·Ö·¢ ¡£ÎļþÖÐÔ̺¬ÃûΪImportant-COVID-19.docx.exeµÄÎļþ£¬ÓÉÓÚWindowsĬÈϰµ²ØÎļþÀ©´óÃû£¬Òò¶øºÜ¶àÈË¿ÉÄÜ»áÎóÒÔΪ¸ÃÎļþÊÇdocxÎļþ¶ø½«Æä´ò¿ª ¡£BlackWaterʹÓÃCloud Workers½øÐÐC2ͨѶ£¬ÕâʹµÃ¼ì²âºÍ×èÖ¹¶ñÒâÁ÷Á¿±äµÃÔ½·¢ÄÑÌâ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/


4.Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2ºÏ×÷ͬ°éµÄ¿Í»§Êý¾Ý±»µÁ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2×î´óµÄºÏ×÷ͬ°éÖ®Ò»Aerial DirectÔâºÚ¿ÍÈëÇÖ£¬¿Í»§Êý¾Ý±»µÁ ¡£¸Ã¹«Ë¾°µÊ¾2ÔÂ26ÈÕδ¾­ÊÚȨµÄµÚÈý·½Í¨¹ý±í²¿±¸·ÝµÄÊý¾Ý¿â½Ó¼ûÁËÆä¿Í»§Êý¾Ý£¬¸ÃÊý¾Ý¿âÖÐÔ̺¬ÁùÄêÄÚÈ·µ±Ç°ºÍÒѹýÆÚ¶©»§µÄÓ×ÎÒÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢¹«Ë¾µØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍ²úÆ·ÐÅÏ¢ ¡£¸Ã¹«Ë¾°µÊ¾Ã»ÓÐÈκÎÃÜÂë»ò²ÆÕþÐÅÏ¢±»µÁ ¡£¸Ã¹«Ë¾ÒÑΪÊÜÓ°ÏìµÄ¿Í»§³ÉÁ¢ÁËÒ»¸öÖ§³ÖÍøÕ¾£¬²¢½¨ÒéËûÃǸü¸ÄÃÜÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.co.uk/2020/03/13/o2_customer_data_slurped_through_partner_databse/


5.·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬Ñ¡¾ÙδÊÜÓ°Ïì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


·¨¹úÂíÈüÊÐÔÚ¼´½«ÓÚ3ÔÂ15ÈÕÖÁ3ÔÂ22ÈÕ½øÐÐÊÐÕþÑ¡¾Ù֮ǰÔâ·ê´ó¹æÄ£ÍøÂç¹¥»÷ ¡£¸Ã´ÎÑ¡¾ÙµÄÖ÷ÕÅÊÇÑ¡¾Ù¸ÃÊа˸ö²¿ÃŵÄÒé»á¡¢ÊÐÒé»áºÍ°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹¶àÊý»áÒé»á ¡£Æ¾¾Ý¹ú¶ÈÐÅϢϵͳ°²È«¾Ö£¨Anssi£©µÄÐÂÎÅ£¬¸Ã´Î¹¥»÷Ôì³É°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹¶àÊý»áÒÔ¼°ÂíÌá¸ñȺµºµÄ300̨»úе̱»¾£¬ÕâЩ»úеÓÃÓÚ´´½¨´úÀíÊðÃûÁбí£¬Òò¶øÕâЩ¹¤×÷±ØÐëÊÖ¶¯ÊµÏÖ ¡£ÊÐÕþÌüÒѾ­È·ÈÏÊÐÕþÑ¡¾Ù½«Õý³£½øÐÐ ¡£¾ÝÖªÁµÈËʿй©£¬¸ÃÍøÂç¹¥»÷µÄ¹æÄ£ÊÇǰËùδÓеÄ£¬ÂíÈüÊкʹó³ÇÊÐÊÐÕþÌüÊܵ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬µ«Ä¿Ç°ÉÐÎÞÓë¹¥»÷»òÀÕË÷Èí¼þ¼Ò×åÓйصľßÌåÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/99658/malware/marseille-city-massive-attack.html


6.½Ý¿Ëйڲ¡¶¾¼ì²â³¢ÊÔÊÒÔâÍøÂç¹¥»÷£¬ITϵÍÂäÙʱ¹Ø¹Ø


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


½Ý¿Ë×î´óµÄCOVID-19¼ì²â³¢ÊÔÊÒÖ®Ò»£¨²¼¶ûŵ´óѧҽԺ£©Ôâµ½ÍøÂç¹¥»÷ ¡£Ò½Ôº¹ÙÔ±ÉÐδй©°²È«ÊÂÎñµÄÐÔÖÊ£¬µ«¾Ý±¾µØÃ½Ì屨·£¬¸ÃÊÂÎñÒѾ­ÑϳÁµ½±ØÐëÍÆ³Ù´¹Î£±í¿ÆÊÖÊõºÍ½«Ðµļ±Ö¢»¼Õß×ªÒÆµ½×ó½üµÄÊ¥°²ÄÝ´óѧҽԺ ¡£ÔÚÊÂÎñ²úÉúÆÚ¼ä£¬²¼¶ûŵ´óѧҽԺ±»ÆÈ¹Ø¹ØÁËÕû¸öITÍøÂ磬ÆäÁí±íÁ½¸ö·ÖÖ§»ú¹¹-¶ùͯҽԺºÍ¸¾²úÒ½ÔºÒ²Êܵ½ÁËÓ°Ïì ¡£ÊÂÎñ²úÉúºó£¬½Ý¿Ë¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©¡¢½Ý¿Ë¾¯Ô±£¨NCOZ£©ºÍÒ½ÔºµÄITÈËÔ¹ØýÔÚºÏ×÷ÒÔ¸´Ô­Ò½ÔºµÄITÍøÂç ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/