Symantec·¢ÏÖLazarusÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷»î¶¯
°ä²¼¹¦·ò 2022-04-181¡¢Symantec·¢ÏÖLazarusÍÅ»ïÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷»î¶¯
4ÔÂ14ÈÕ£¬Symantec°ä²¼Á˹ØÓÚ³¯ÏʺڿÍÍÅ»ïLazarus×îлµÄ·ÖÎö»ã±¨¡£Õâ´Î»î¶¯ËƺõÊÇOperation Dream JobµÄÒ»Á¬£¬×Ô2022Äê1ÔÂÆðÍ·£¬ÖØÒªÕë¶Ô»¯Ñ§ÐÐÒµµÄ×éÖ¯¡£¹¥»÷ʼÓÚ¶ñÒâHTMÎļþ£¬¿ÉÄÜÊÇͨ¹ýÓʼþÖеĶñÒâÁ´½Ó»òWeb·Ö·¢µÄ¡£HTMÎļþ»á±»¸´Ôìµ½DLLÎļþscskapplink.dllÖУ¬²¢×¢Èëµ½ºÏ·¨µÄϵͳÖÎÀíÈí¼þINISAFE Web EX ClientÖС£scskapplink.dllÎļþͨ³£ÊÇ´øÓжñÒâµ¼³öµÄÊðÃûľÂí¹¤¾ß£¬¹¥»÷ÕßʹÓõÄÊðÃûÔ̺¬DOCTER USA,INCºÍ¡°A¡± MEDICAL OFFICE,PLLC¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical
2¡¢Cisco½¨¸´ÆäWLCÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2022-20695
ýÌå4ÔÂ14ÈÕ±¨Â·£¬CiscoÒѽ¨¸´ÆäÎÞÏßLAN½ÚÔìÆ÷(WLC)ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¡£¸Ã·ì϶׷×ÙΪCVE-2022-20695£¬CVSSÆÀ·ÖΪ10£¬¿É±»ÓÃÀ´ÈƹýÉí·ÝÑéÖ¤½ÚÔ첢ͨ¹ýWLCµÄÖÎÀí½çÃæµÇ¼É豸¡£CiscoÔÚ²¼¸æÖгƣ¬Õâ¸ö·ì϶ÊÇÓÉÓÚÃÜÂëÑéÖ¤Ëã·¨Ö´Ðв»µ±Ôì³ÉµÄ£¬¹¥»÷ÕßÄܹ»Ê¹ÓÃÌØÔìµÄÍ´´¦À´ÀûÓô˷ì϶£¬³É¹¦ÀûÓúó¿É»ñµÃÖÎÀíԱȨÏÞ²¢ÆëÈ«½ÚÔìÖ¸±êÉ豸¡£¸Ã¹«Ë¾½¨ÒéÓû§¸üе½°æ±¾8.10.171.0ÒÔ½¨¸´¸Ã·ì϶¡£
https://thehackernews.com/2022/04/critical-auth-bypass-bug-reported-in.html
3¡¢ÎÚ¿ËÀ¼CERT-UA¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄ¹¥»÷»î¶¯
¾Ý4ÔÂ14Èյı¨Â·£¬ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××é(CERT-UA)¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄл¡£µÚһ·´¹µö»î¶¯Í¨¹ýÃûΪMobilization Register.xlsµÄExcelÎĵµ·Ö·¢IcedID£¨±ðÃûBankBot£©£¬¸Ã»î¶¯ÓëUAC-0041ÍÅ»ïÓйء£µÚ¶þÆð´¹µö»î¶¯ÒÔ×ÜͳV.ZelenskyΪÎä×°¶ÓÁгÉÔ±Ðû¸æÑ«ÕÂ×÷Ϊµö¶ü£¬ÀûÓÃÁËZimbra Collaboration SuiteÖеÄXSS·ì϶(CVE-2018-6882) ¹¥»÷µ±¾Ö×éÖ¯¡£
https://www.bleepingcomputer.com/news/security/hackers-target-ukrainian-govt-with-icedid-malware-zimbra-exploits/
4¡¢ÀÕË÷ÍÅ»ïOldGremlinÀûÓÃкóÃÅTinyFluff¶Ô×¼¶íÂÞ˹
ýÌå4ÔÂ14Èճƣ¬Group-IB·¢ÏÖÁËÀÕË÷ÍÅ»ïOldGremlinÕë¶Ô¶íÂÞ˹µÄÐÂÒ»ÂÖ´¹µö¹¥»÷¡£¹¥»÷Õß¼ÙÒâ¶íÂÞ˹һ¼Ò½ðÈÚ»ú¹¹µÄ¸ß¼¶¹ÜÕÊʦ£¬Ðû³Æ½üÆÚ¶Ô¶íÂÞ˹ִÐеÄÔì²Ã½«ÔÝÍ£VisaºÍMastercardÖ§¸¶´¦ÖÃϵͳµÄÔËÓª¡£´¹µöÓʼþ½«ÊÕ¼þÈ˳Á¶¨Ïòµ½´æ´¢ÔÚDropboxÖеĶñÒâÎĵµ£¬²¢ÏÂÔØÒ»¸öÃûΪTinyFluffµÄ×Ô½ç˵ºóÃÅ£¬¸ÃºóÃÅÊÇTinyNodeµÄбäÖÖ£¬Ëü»áÆô¶¯Node.jsÚ¹ÊÍÆ÷²¢Ê¹¹¥»÷ÕßÔ¶³Ì½Ó¼ûÖ¸±êϵͳ¡£
https://www.bleepingcomputer.com/news/security/oldgremlin-ransomware-gang-targets-russia-with-new-malware/
5¡¢Î÷°àÑÀ×ãÐRFEFÔâµ½¹¥»÷µ¼ÖÂÓʼþºÍÒôƵµÈÊý¾Ýй¶
¾ÝýÌå4ÔÂ15ÈÕ±¨Â·£¬Î÷°àÑÀ»Ê¼Ò×ãÇòлᣨRFEF£©Ïò¾¯·½»ã±¨ÆäÔâµ½ÍøÂç¹¥»÷¡£Õâ´Î¹¥»÷µ¼ÖÂлáÖ÷ϯLuis RubialesºÍÃØÊ鳤Andreu CampsÔÚÄڵĸ߼¶ÖÎÀíÈËÔ±µÄµç×ÓÓʼþÕÊ»§¡¢¸öÈËÎı¾ºÍÒôƵ¶Ô»°µÈÓйØÐÅϢй¶¡£RFEFÔÚÉÏÖÜËĵÄÒ»·ÝÉêÃ÷ÖаµÊ¾£¬±»µÁÐÅÏ¢ºÜ¿ÉÄÜÒÑÌṩ¸ø·ÖÆçµÄýÌå¡£ÓÐýÌåÐû³ÆÒÑͨ¹ýµÚÈý·½ÊÕµ½ÁË»úÃܺÏͬ¡¢¸öÈËWhatsApp¶Ô»°¡¢µç×ÓÓʼþºÍ´óÁ¿ÓйØRFEFÖÎÀíµÄÎļþ¡£
https://www.espn.com/soccer/spain-esp/story/4642921/spanish-fa-report-cyber-attack-to-police-after-email-accounts-private-texts-stolen
6¡¢Segran?a-Informatica°ä²¼ÀÕË÷Èí¼þSunnyDay·ÖÎö»ã±¨
4ÔÂ11ÈÕ£¬Segran?a-Informatica°ä²¼Á˹ØÓÚÀÕË÷Èí¼þSunnyDayµÄ¼¼Êõ·ÖÎö»ã±¨¡£ËüÊÇÒ»¸ö»ùÓÚSALSA20Á÷ÃÜÂëµÄµ¥Ò»ÀÕË÷Èí¼þ£¬´øÓÐǶÈëµÄRSA¹«Ô¿blob£¬ÓÃÓÚ¼ÓÃܶԳÆSALSA20ʹÓõÄÌìÉúÃÜÔ¿£¬¸ÃÃÜÔ¿ÓÃÀ´¼ÓÃÜÖ¸±êÉ豸ÖеÄËùÓпÉÓÃÎļþ¡£·ÖÎö·¢ÏÖ£¬SunnyDayÓëÆäËüÀÕË÷Èí¼þÑù±¾Ö®¼ä´æÔÚÀàËÆÖ®´¦£¬ÀýÈçEver101¡¢Medusa Locker¡¢CuratorºÍPayment45£¬µ«ÈÔÎÞ·¨¶ÔÆä½øÐйéÒò¡£
https://seguranca-informatica.pt/analysis-of-the-sunnyday-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ