Resecurity°µÊ¾2022ÄêQ2Õë¶Ô·¨ÂÉ»ú¹¹µÄ¹¥»÷ÊÂÎñÔö³¤
°ä²¼¹¦·ò 2022-07-081¡¢Resecurity°µÊ¾2022ÄêQ2Õë¶Ô·¨ÂÉ»ú¹¹µÄ¹¥»÷ÊÂÎñÔö³¤
7ÔÂ6ÈÕ£¬Resecurity°ä²¼»ã±¨³ÆÔÚ2022ÄêµÚ¶þ¼¾¶È£¬Õë¶Ô·¨ÂÉ»ú¹¹µÄ¹¥»÷ÊÂÎñÔö³¤¡£Í¨³££¬¹¥»÷Õß»áʹÓÃÉ繤¹¥»÷Õ½Êõ£¬×î½üµÄÇ÷ÏòÊÇÕë¶ÔÖØÒªµÄ¼¼Êõ¹«Ë¾ºÍÔÚÏß·þÎñ£¨Èç Apple¡¢Facebook (Meta)¡¢Snapchat¡¢Discord£©·¢ËÍαÔìµÄ´«Æ±ºÍEDR£¨´¹Î£Êý¾ÝÒªÇ󣩣¬À´ÍøÂçÓÐ¹ØÆäÖ¸±êµÄÐÅÏ¢¡£ResecurityÔÚ¶à¸ö°µÍøÊг¡Öз¢ÏÖÏúÊÛ¾¯Ô±µÄÕÊ»§ºÍÍ´´¦£¨µç×ÓÓʼþ¡¢VPNºÍSSOµÈ£©µÄÇé¿ö¡£×êÑÐÅú×¢£¬´ËÀà¶ñÒâ»î¶¯ÔÚÀ¶¡ÃÀÖÞ¡¢¶«ÄÏÑǹú¶ÈºÍÀ밶˾·¨¹ÜÏ½ÇøÓÈΪÏÔÖø¡£
https://resecurity.com/blog/article/cybercriminals-are-targeting-law-enforcement-agencies-worldwide
2¡¢Cisco°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö²úÆ·ÖеÄ10¸ö·ì϶
CiscoÔÚ7ÔÂ6ÈÕ°ä²¼°²È«¸üУ¬½¨¸´ÁËÉæ¼°¶à¿î²úÆ·µÄ10¸ö·ì϶¡£ÆäÖУ¬×îÑϳÁµÄÊÇÓ°ÏìCisco ExpresswayϵÁкÍCisco TelePresence Video Communication Server(VCS)µÄ·ì϶£¨CVE-2022-20812ºÍCVE-2022-20813£©£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´¸²¸ÇËÁÒâÎļþ»ò¶ÔÖ¸±êÉ豸½øÐпÕ×Ö½ÚÖж¾¹¥»÷¡£Æä´Î£¬ÊÇSmart Software Manager On-PremÖеÄÒ»¸ö·ì϶£¨CVE-2022-20808£©£¬¿É±»¾¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´Ðлؾø·þÎñ(DoS)¹¥»÷¡£
https://thehackernews.com/2022/07/cisco-and-fortinet-release-security.html
3¡¢Ó볯ÏÊÓйصÄÀÕË÷Èí¼þMauiÕë¶ÔÃÀ¹ú¸÷µØµÄÒ½ÁÆ»ú¹¹
7ÔÂ6ÈÕ£¬ÃÀ¹úFBI¡¢CISAºÍ²ÆÕþ²¿°ä²¼½áºÏÕ÷ѯ£¬³ÆÓ볯ÏÊÓйصĹ¥»÷ÕßÀûÓÃÀÕË÷Èí¼þMaui¹¥»÷ÆäÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)×éÖ¯¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021Äê5ÔÂÆðÍ·£¬¹¥»÷ÕßÀûÓÃMaui¼ÓÃÜÕÆ¹ÜÒ½ÁÆ·þÎñµÄ·þÎñÆ÷£¬Ô̺¬µç×Ó½¡È«¼Í¼·þÎñ¡¢Õï¶Ï·þÎñ¡¢³ÉÏñ·þÎñºÍÄÚÍø·þÎñ¡£StairwellÔÚ2022Äê4ÔÂÍøÂçÁ˵ÚÒ»¸öMauiÑù±¾£¬µ«ËùÓÐMauiµÄ±àÒ빦·ò´Á¾ùΪ2021Äê4ÔÂ15ÈÕ¡£ÓëÆäËüÀÕË÷Èí¼þ·ÖÆçµÄÊÇ£¬Maui²»»áÔÚ±»¼ÓÃܵÄϵͳÉÏÁôÏÂÀÕË÷×ÖÌõ¡£ÕâЩ»ú¹¹°µÊ¾£¬¹¥»÷¿ÉÄÜ»¹»á³ÖÐø£¬²¢ÎªHPH×éÖ¯ÌṩÁËһϵÁдëÊ©À´³ï±¸¡¢Ô¤·ÀºÍÓ¦¶Ô´ËÀàÊÂÎñ¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/07/06/north-korean-state-sponsored-cyber-actors-use-maui-ransomware
4¡¢SecuInfraй©Bitter³ÖÐø¹¥»÷ÃϼÓÀ¹úµÄ¾üÊ»ú¹¹
SecuInfraÔÚ7ÔÂ5ÈÕй©ÆäÔÚ½üÆÚ·¢ÏÖ£¬APT×éÖ¯Bitter£¨Ò²³ÆT-APT-17£©Õë¶ÔÃϼÓÀ¹úµÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2013Äê¾ÍÆðÍ·»îÔ¾£¬ÖØÒªÕë¶Ô°Í»ù˹̹¡£×îÐµĹ¥»÷ÊÇÔÚ2022Äê5ÔÂÖÐÑ®ÆðÍ·µÄ£¬Ê¼ÓÚÒ»¸ö±øÆ÷»¯µÄExcelÎĵµ£¬¸ÃÎĵµ¿ÉÄÜͨ¹ýÓã²æÊ½´¹µöÓʼþ·Ö·¢µÄ£¬ÓʼþÔÚ±»´ò¿ªÊ±»áÀûÓÃMicrosoft¹«Ê½±à×ëÆ÷·ì϶(CVE-2018-0798)´ÓÔ¶³Ì·þÎñÆ÷ÖÐÏÂÔØÏÂÒ»½×¶ÎµÄ¶þ½øÔìÎļþ£¬ÏÂÔØµÄpayloadÊÇZxxZ£¬¹¥»÷»¹ÀûÓÃÁ˶ñÒâÈí¼þBitterRAT¡£
https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-to-target-bangladesh/
5¡¢Unit 42·¢ÏÖºÚ¿ÍÀÄÓúì¶ÓÉøÈ빤¾ßBRc4µÄ¹¥»÷»î¶¯
¾ÝýÌå7ÔÂ6ÈÕ±¨Â·£¬Unit 42·¢ÏÖÓÐÒ»¸öÔ̺¬ÓëBrute Ratel C4(BRc4)ÓйصÄpayload¶ñÒâÈí¼þÑù±¾±»ÉÏ´«µ½VirusTotalÊý¾Ý¿â¡£BRc4Óɰ²È«×êÑÐÈËÔ±Chetan Nayak¿ª·¢£¬ÀàËÆÓÚCobalt Strike£¬ÊÇ×îÐÂÉÏÊеĺì¶ÓºÍÆ¥µÐÐÔ¹¥»÷·ÂÕÕ¹¤¾ß¡£¸ÃÑù±¾ÊÇ´Ó˹ÀïÀ¼¿¨ÉÏ´«µÄ£¬¼Ù×°³ÉRoshan BandaraµÄÓ×ÎÒ¼òÀú£¨"Roshan_CV.iso"£©£¬µ«ÏÖʵÉÏÊÇÒ»¸ö¹âÅ̾µÏñÎļþ¡£µ±Ö¸±êË«»÷¸ÃÎļþʱ£¬»á½«Æä¹ÒÔØÎªÒ»¸öWindowsÇý¶¯Æ÷£¬ÆäÖÐÔ̺¬Ò»¸ö¿´ËÆÎÞº¦µÄWordÎĵµ¡£Æô¶¯ºó£¬Ëü»áÔÚÖ¸±êÉ豸ÉÏ×°ÖÃBRc4£¬²¢ÓëÔ¶³Ì·þÎñÆ÷³ÉÁ¢Í¨Ñ¶¡£Í¨¹ý´ò°ü·½Ê½£¬×êÑÐÈËÔ±½«¸Ã»î¶¯¹éÒòÓÚAPT29¡£
https://thehackernews.com/2022/07/hackers-abusing-brc4-red-team.html
6¡¢Intezer°ä²¼¹ØÓÚÐÂLinux¶ñÒâÈí¼þOrBitµÄ·ÖÎö»ã±¨
7ÔÂ6ÈÕ£¬IntezerÅû¶ÁËÒ»ÖÖȫеÄLinux¶ñÒâÈí¼þOrBit£¬Õâ±ê־ȡÕë¶ÔÊ¢ÐвÙ×÷ϵͳµÄ¹¥»÷»î¶¯µÄÔö³¤¡£»ã±¨Ö¸³ö£¬¸Ã¶ñÒâÈí¼þʵÏÖÁËÏȽøµÄÈÆ¹ý¼¼Êõ£¬²¢Í¨¹ýhook¹Ø¼üÖ°ÄÜÔÚÉ豸ÉÏ»ñµÃÓÆ¾ÃÐÔ£¬Í¨¹ýSSHΪ¹¥»÷ÕßÌṩԶ³Ì½Ó¼ûÖ°ÄÜ£¬ÍøÂçÆ¾Ö¤²¢¼Í¼TTYºÅÁî¡£ÆäÖ°ÄܺÜÏñSymbiote£¬Ö¼ÔÚϰȾָ±êÉÏËùÓÐÔÚÔËÐеĹý³Ì¡£µ«ºóÕßÀûÓÃLD_PRELOAD»·¾³±äÁ¿À´¼ÓÔØ¹²Ïí¶ÔÏ󣬶øOrBitѡȡÁËÁ½ÖÖ·ÖÆçµÄ²½Ö裺½«¹²Ïí¶ÔÏóÔö³¤µ½¼ÓÔØ·¨Ê½Ê¹ÓõÄÅäÖÃÎļþÖУ»Åú¸Ä¼ÓÔØ·¨Ê½×ÔÉíµÄ¶þ½øÔìÎļþÀ´¼ÓÔØ¶ñÒâ¹²Ïí¶ÔÏó¡£
https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/


¾©¹«Íø°²±¸11010802024551ºÅ