±¾ÌﲿÃųµÐÍ´æÔÚ¿Éͨ¹ý³Á·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄ·ì϶
°ä²¼¹¦·ò 2022-03-30±¾ÌﲿÃųµÐÍ´æÔÚ¿Éͨ¹ý³Á·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄ·ì϶
¾ÝýÌå3ÔÂ25ÈÕ±¨Â·£¬×êÑÐÈËÔ±Åû¶Á˱¾ÌïÆû³µÖеÄÒ»¸ö·ì϶£¨CVE-2022-27254£©µÄÏêÇé¡£¸Ã·ì϶ӰÏìÁ˲¿Ãű¾ÌïºÍ¸èË̳µÐÍ£¬¿Éͨ¹ý³Á·Å¹¥»÷½âËøÆû³µ£¬ÉõÖÁÔں̵ܶľàÀëÄÚÒÔÎÞÏß·½Ê½Æô¶¯Æû³µ¡£ÕâÊÇÒ»ÖÖÖÐÑë(MitM) ¹¥»÷£¬¹¥»÷ÕßÀ¹½Ø´ÓÒ£¿ØÔ¿³×·¢Ë͵ÄÉ䯵Ðźţ¬¶øºó³Áз¢ËÍÕâЩÐźš£×êÑÐÈËÔ±½¨Òé³µÖ÷ʹÓñ»¶¯ÎÞÔ¿³×½øÈë(PKE)¶ø²»ÊÇÔ¶³ÌÎÞÔ¿³×½øÈë(RKE)£¬ÕâÑù½«Ê¹¹¥»÷ÕßÓÉÓÚ¾àÀë¹ý½ü¶ø¼«¶ÈÄѿˡºÍ¶ÁÊØÐźš£
https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
½ðÈÚ·þÎñ¹«Ë¾Ä¦¸ùÊ¿µ¤ÀûµÄ²¿Ãſͻ§Ôâµ½ÓïÒô´¹µö¹¥»÷
¾Ý2ÔÂ24ÈÕ±¨Â·£¬½ðÈÚ·þÎñ¹«Ë¾Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©³ÆÆä²¿Ãſͻ§µÄÕÊ»§ÒѾй¶¡£¸Ã¹«Ë¾°ä²¼¹«¸æ³Æ£¬ÔÚ2022Äê2ÔÂ11ÈÕǰºó£¬¹¥»÷Õß¼ÙÒâ¸Ã¹«Ë¾Í¨¹ýÓïÒôͨ»°ÓÕÆÖ¸±êÌṩÆäÔÚÏßÕË»§ÐÅÏ¢£¬¶øºó»ñµÃÁ˶ÔÕâЩÕË»§µÄ½Ó¼ûȨÏÞ¡£Ôڳɹ¦ÈëÇÖÕâЩÕË»§ºó£¬¹¥»÷Õßͨ¹ýÖ§¸¶·þÎñZelle£¬½«Ö¸±êµÄ×ʽðתÈëËûÃÇ×Ô¼ºµÄÒøÐÐÕË»§¡£Ä¿Ç°£¬¸Ã¹«Ë¾½ûÓÃÁËËùÓÐÊÜÓ°ÏìµÄÕË»§£¬²¢°µÊ¾ÆäûÓÐÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/morgan-stanley-client-accounts-breached-in-social-engineering-attacks/
Google³Æ¶à¸öÍÅ»ïÀûÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯
3ÔÂ24ÈÕ£¬¹È¸èµÄÍþв·ÖÎöÓ××é(TAG)°ä²¼»ã±¨³Æ2¸ö³¯ÏʵĺڿÍÍÅ»ïÀûÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯¡£ÕâÊÇÒ»¸ö¿ªÊͺóʹÓ÷ì϶£¨CVE-2022-0609£©£¬ÒÑÓÚ½ñÄê2ÔÂ14ÈÕ½¨¸´¡£Õâ´Î·¢ÏֵĵÚÒ»¸ö»î¶¯ÓëClearSkyÔÚ2020Äê·¢ÏÖµÄOperation Dream JobµÄTTPÒ»Ö£¬ÖØÒªÕë¶ÔÐÂÎÅýÌåºÍITÐÐÒµ£»µÚ¶þ¸ö»î¶¯ÎªOperation AppleJeus£¬ÖØÒªÕë¶Ô¼ÓÃÜÇ®±ÒºÍ½ðÈڿƼ¼ÐÐÒµ¡£Google½¨ÒéÓû§ÆôÓÃChrome¼ÓÇ¿°²È«ä¯ÀÀÖ°ÄÜ£¬²¢È·±£ËùÓÐÉ豸¾ùÒѸüС£
https://blog.google/threat-analysis-group/countering-threats-north-korea/
×êÑÐÈËÔ±³Æ·¢ÏÖHiveµÄбäÌå½è¼øBlackCatµÄÖ°ÄÜ
¾Ý3ÔÂ27ÈÕ±¨Â·£¬Group-IB×êÑÐÈËÔ±rivitna·¢ÏÖHive±äÌåÔö³¤ÁËеÄÖ°ÄÜ¡£×êÑÐÈËÔ±³Æ£¬Hive½è¼øÁËBlackCatµÄºÃ¶àÖ°ÄܺÍÕ½Êõ£ºHive½«½»ÉæÓõÄÓû§ÃûºÍµÇ¼ÃÜÂë×÷ΪºÅÁîÐвÎÊý½øÐд«µÝ£¬ÕâЩʹ´¦´Ë¿ÌÖ»ÄÜÔÚ¹¥»÷ÆÚ¼ä´´½¨µÄÊê½ð¼Í¼ÖÐʹÓã¬Õ⽫ʹ×êÑÐÈËÔ±ÎÞ·¨´ÓÑù±¾ÖнøÐмìË÷£»½«Linux¼ÓÃÜ·¨Ê½´ÓGolang¸Ä±àΪRust±àд£¬Ê¹µÃÀÕË÷Èí¼þµÄ¸ßЧ¸ü¸ß£¬¸üÄѽøÐÐÄæÏò¹¤³Ì¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-ports-its-linux-vmware-esxi-encryptor-to-rust/
ASEC°ä²¼¹ØÓÚKimsuky¶Ô×¼º«¹úµÄ´¹µö¹¥»÷µÄ·ÖÎö»ã±¨
3ÔÂ28ÈÕ£¬ASEC°ä²¼Á˹ØÓÚKimsuky¶Ô×¼º«¹úµÄ´¹µö¹¥»÷µÄ·ÖÎö»ã±¨¡£¹¥»÷ÕßÔÚ¶ñÒâÎļþµÄÀ©´óÃûǰÔö³¤ÁË¡°.pdf¡±À´ºýŪÓû§£¬Ê¹ÒѰµ²ØÀ©´óÃûµÄÓû§½«¸ÃVBSÎļþÎóÒÔΪÊÇPDFÎļþ¡£Í¨¹ý¸ÃPDFÎļþµÄÃû×Ö´§¶È£¬¹¥»÷ÕßµÄÖ¸±êËÆºõÊǾ«ÃÜ»¯ÐÐÒµ¡£µ±Óû§ÔËÐÐVBSʱ£¬»áÔÚõè¾¶¡°C:\ProgramData¡±Öд´½¨²¢ÔËÐÐBase64±àÂëµÄDLL£¬¸ÃDLL»á´´½¨cmd.exe¹ý³Ì²¢ÆÚ´ýÓëC&C·þÎñÆ÷µÄͨѶ¡£×êÑÐÈËÔ±½¨ÒéÓû§½ûÓá°°µ²ØÒÑÖªÎļþÀàÐ͵ÄÀ©´ó¡±£¬ÒÔÔ¤·À±»´ËÀ༼ÊõºýŪ¡£
https://asec.ahnlab.com/en/33032/
Intezer°ä²¼IcedIDµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
IntezerÔÚ3ÔÂ28ÈÕ°ä²¼Ò»·Ý»ã±¨£¬ÏêÊöÁËIcedIDµÄжԻ°½Ù³Ö¹¥»÷»î¶¯¡£IcedIDÊÇÒ»ÖÖÄ£¿é»¯ÒøÐÐľÂí£¬ÓÚ2017Äê³õ´Î±»·¢ÏÖ¡£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷ÕßÕë¶ÔÒ×Êܹ¥»÷µÄMicrosoft Exchange·þÎñÆ÷ÇÔȡʹ´¦£¬²¢ÀûÓÃÕâЩ±»ºÚÕÊ»§·¢ËÍ´¹µöÓʼþ¡£´¹µöÓʼþµÄZIP¸½¼þÖÐÊÇÒ»¸öISOÎļþ£¬¸ÃÎļþÓÖÔ̺¬Ò»¸öLNKºÍÒ»¸öDLLÎļþ¡£µ±Ö¸±êµã»÷document.lnkºó£¬DLL½«Æô¶¯ÒÔ×°ÖÃIcedID¡£Ä¿Ç°£¬×êÑÐÈËÔ±ÒѾ¼ì²âµ½Õë¶ÔÄÜÔ´¡¢Ò½ÁƱ£½¡¡¢Ë¾·¨ºÍÔìÒ©ÐÐÒµµÄ¹¥»÷»î¶¯¡£
https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/
°²È«¹¤¾ß
Ostorlab
¿ªÔ´°²È«É¨Ã跨ʽ£¬¿ÉÄÜÒÔµ¥Ò»¡¢¿ÉÀ©´óºÍÉ¢²¼Ê½µÄ·½Ê½ÔËÐÐÉæ¼°¶à¸ö¹¤¾ßµÄ¸´ÔÓ°²È«É¨Ã蹤×÷¡£
https://github.com/Ostorlab/ostorlab
CobaltBus
Cobalt Strike Óë Azure Servicebus¡¢C2 Á÷Á¿µÄ±í²¿ C2 ¼¯³É¡£
https://github.com/Flangvik/CobaltBus
KNX Bus Dump
KNX ´«¸ÐÆ÷¡¢Ö´ÐÐÆ÷ºÍÆäËû KNX É豸µÄºÍ̸·ÖÎö¹¤¾ß¡£
https://github.com/ChrisM09/KNX-Bus-Dump
°²È«·ÖÎö
Windows 11 22H2£ºµ½Ä¿Ç°ÎªÖ¹ÎÒÃÇËù֪·µÄËùÓÐ
https://www.bleepingcomputer.com/news/microsoft/windows-11-22h2-everything-we-know-so-far/
ÄϷǵ«Ô¸Í¨¹ýÉúÎï¼ø±ð²é³À´ÕÐ¼Ü SIM ¿¨»¥»»¹¥»÷
https://www.bleepingcomputer.com/news/security/south-africa-wants-to-fight-sim-swapping-with-biometric-checks/
Êý°Ù¸ö¶íÂÞ˹¥Óî½ÚÔìÆ÷¿É±»Ô¶³ÌÈëÇÖ
https://securityaffairs.co/wordpress/129452/hacking/russian-building-controller-hack.html
Racoon Stealer ¶ñÒâÈí¼þÒòÎÚ¿ËÀ¼Õ½Õù¶øÔÝÍ£ÔËÓª
https://www.bleepingcomputer.com/news/security/racoon-stealer-malware-suspends-operations-due-to-war-in-ukraine/
Íþв¼ò½é£ºLapsus$ Group
https://unit42.paloaltonetworks.com/lapsus-group/


¾©¹«Íø°²±¸11010802024551ºÅ