LastPass¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶
°ä²¼¹¦·ò 2022-08-26
¾ÝýÌå8ÔÂ25ÈÕ±¨Â·£¬LastPass¹«Ë¾Ôâµ½¹¥»÷£¬Ô´´úÂëºÍרÓм¼ÊõÐÅÏ¢¿ÉÄÜй¶¡£LastPassÊÇÈ«Çò×î´óµÄÃÜÂëÖÎÀí¹«Ë¾Ö®Ò»£¬±»³¬¹ý3300ÍòÈ˺Í100000¼ÒÆóҵʹÓá£LastPassµÄ¹«¸æÖ¸³ö£¬¹¥»÷ÕßÊÇͨ¹ý½Ó¼û¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÖеÄÊÜËðÕÊ»§ÈëÇֵġ£¿Í»§µÄÊý¾Ý»ò¼ÓÃܵÄÃÜÂë¿âδÊÜÓ°Ï죬µ«¹¥»÷ÕßµÄÈ·ÇÔÈ¡ÁËËûÃǵIJ¿ÃÅÔ´´úÂëºÍLastPassµÄרÓм¼ÊõÐÅÏ¢¡£È¥Ä꣬LastPassÔâµ½ÁËײ¿â¹¥»÷£¬¹¥»÷Õ߿ɻñµÃÓû§µÄÖ÷ÃÜÂë¡£
https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/
2¡¢Á÷ýÌåÆ½Ì¨Plex²úÉúÊý¾Ýй¶²¢¶½´ÙÓû§¾¡¿ì³ÁÖÃÃÜÂë
¾Ý8ÔÂ24ÈÕ±¨Â·£¬ÃÀ¹úÁ÷ýÌåÆ½Ì¨Plex·¢ÏÔìäÊý¾Ý¿âÔâµ½ÁËδ¾ÊÚȨµÄ½Ó¼ûºó£¬ÏòÓû§·¢ËÍÁËÃÜÂë³ÁÖÃ֪ͨ¡£¹¥»÷Õß¿ÉÄܽӼûÁËÓʼþµØÖ·¡¢Óû§ÃûºÍÃÜÂëµÈÐÅÏ¢£¬Ò»Ð©Óû§»ã±¨Åú×¢¸ÃÎÊÌâ²»»áÓ°ÏìÃâ·ÑÕÊ»§£¬¿ÉÄÜÖ»Óи¶·ÑÕÊ»§Êܵ½Ó°Ïì¡£Óë´Ëͬʱ£¬Plex.tvÍøÕ¾³öÏÖÁËÖжϣ¬Plex×´Ì¬Ò³Ãæ°µÊ¾ÔÚµ÷²éÔÒò£¬Ä¿Ç°Éв»Ã÷ÏÔÆäÖжÏÊÇ·ñÓëδ¾ÊÚȨµÄ½Ó¼ûÓйأ¬»¹ÊÇÒ»´ÎÕë¶Ô¸Ãƽ̨µÄDDoS¹¥»÷¡£
https://securityaffairs.co/wordpress/134814/data-breach/plex-data-breach.html
3¡¢RansomEXX³Æ¶ÔÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÕÆ¹Ü
ýÌå8ÔÂ24ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïRansomEXXÐû³Æ¶Ô¼ÓÄôóÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÕÆ¹Ü¡£¸Ã¹«Ë¾ÖØÒª³ö²úSki-DooÑ©µØ³µ¡¢Sea-DooÅçÆø»¬Ñ©¡¢ATV¡¢Ä¦Íгµ¡¢Ë®³µºÍRotax·¢Æð»úµÈ£¬ÄêÏúÊÛ¶î¿¿½ü60ÒÚÃÀÔª£¬ÔÚÔâµ½¹¥»÷ºóËùÓÐÒµÎñÁÙʱÖÕ³¡¡£BRPÔÚ8ÔÂ8ÈÕÅû¶´Ë¹¥»÷ÊÂÎñ¡£ÓÚ8ÔÂ15ÈÕй©¼ÓÄô󡢷ÒÀ¼¡¢ÃÀ¹úºÍ°ÂµØÀûµÄ4¸ö¹¤³§¸´Ô³ö²ú£¬²¢¹«¿ªÁ˳õ´ëÊ©²éÁ˾֣¬¹¥»÷ÕßÊÇͨ¹ýµÚÈý·½·þÎñÌṩÉÌÈëÇÔìäϵͳ¡£8ÔÂ23ÈÕ£¬RansomEXXÐû³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄ29.9GBÎļþ£¬Ô̺¬±£ÃܺÍ̸¡¢»¤ÕÕºÍÉí·ÝÖ¤¡¢×ÊÁϹ©¸øºÍ̸ºÍÐøÇ©ºÏÒ»Ö¡£
https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/
4¡¢Microsoft¼ì²âµ½ÀûÓÿªÔ´µÄC2¿ò¼ÜSliverµÄÇ÷ÏòÔö³¤
8ÔÂ24ÈÕ£¬Microsoft°µÊ¾ÒѼì²âµ½ÀûÓÿªÔ´C2¿ò¼ÜSliverµÄÇ÷ÏòÉÏÉý¡£SliverÓÚ2019Äêµ×³õ´Î¹«¿ª£¬ÖØÒªÃæÏò°²È«×êÑÐÈËÔ±£¬¿ÉÔÚGitHubÉÏʹÓã¬Ô̺¬ºÜ¶à³£¼ûµÄC2¿ò¼ÜÖ°ÄÜ¡£×Ô2020Äê12ÔÂÒÔÀ´£¬ºÜ¶à¹¥»÷Õß½«SliverÄÉÈë±øÆ÷¿â£¬ÆäÖÐÖ®Ò»ÊÇRaaS´ÓÊô×éÖ¯DEV-0237¡£½üÆÚ£¬×êÑÐÈËÔ±·¢ÏÖ¹¥»÷ÕßʹÓÃBumblebee£¨Ò²³ÆCOLDTRAIN£©×÷Ϊ³õʼ½Ó¼û¼ÓÔØ·¨Ê½£¬À´×°ÖÃSliverµÈ¶àÖÖpost-compromise¹¤¾ß¡£
https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
5¡¢Zscaler·¢ÏÖÖØÒªÕë¶ÔG SuiteÓû§µÄAiTM´¹µö¹¥»÷
ýÌå8ÔÂ24Èճƣ¬×êÑÐÈËÔ±·¢ÏÖÁËÕë¶ÔGoogle G SuiteÓû§µÄÐÂÒ»ÂÖAiTM´¹µö¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ½ñÄê7ÔÂÖÐÑ®ÆðÍ·£¬×¨ÃÅÕë¶ÔʹÓÃGoogle WorkspaceµÄ¸÷Àà×éÖ¯µÄÊ×ϯִÐйٵȸ߹ܡ£×êÑÐÈËÔ±·¢ÏÖÕâ´Î¹¥»÷ʹÓõÄTTPºÍ»ù´¡¼Ü¹¹Óë´Óǰ¼¸¸öÔÂÖÐÕë¶Ô΢ÈíÓû§µÄÓÐËù³Áµþ£¬µ«Óë΢ÈíAiTM´¹µö¹¥»÷Ïà±ÈÖ¸±êÊýÁ¿ÒªÉٵöࡣµ÷²éÅú×¢£¬µ¥¿¿¶à³É·ÖÉí·ÝÑéÖ¤ÎÞ·¨Õмܸ߼¶´¹µö¹¥»÷£¬Òò¶øÓû§±ØÐëÔÚÊäÈëÍ´´¦Ö®Ç°×Ðϸ²é³URL£¬²¢Ô¤·À´ò¿ªÎ´ÖªÆðÔ´ºÍ²»ÊÜÐŵĸ½¼þ»òÁ´½Ó¡£
https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
6¡¢Kaspersky°ä²¼Kimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
KasperskyÔÚ8ÔÂ25ÈÕ°ä²¼Á˹ØÓÚKimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ïÖØÒªÕë¶ÔÓ뺫¹úÓйصÄʵÌ壬²¢ÔÚ¼«¶ÈʵʱµØ¸üÐÂÆä¹¤¾ß¡£ÔÚÐµĹ¥»÷ÖУ¬¹¥»÷ÕßÀûÓÃHTMLÀûÓ÷¨Ê½ÎļþÌåʽÀ´Ï°È¾Ö¸±ê£¬²¢Å¼È»Ê¹ÓÃHangeulµö¶üÎĵµ£¬³õʼϰȾºó»á×°ÖÃÒ»¸öVisual Basic¾ç±¾¡£Ö²ÈëµÄVBSÎļþ¿ÉÄÜ·µ»ØÓйØÖ¸±êÉ豸µÄÐÅÏ¢²¢ÏÂÔØ±àÂëÌåʽµÄÆäËüpayload¡£×îºóÒ»¸ö½×¶ÎÊÇWindows¿ÉÖ´ÐÐÀàÐ͵ĶñÒâÈí¼þ£¬¿É´ÓÖ¸±êÇÔÊØÐÅÏ¢¡£´Ë±í£¬¸Ã»ã±¨»¹ÖØÒª½éÉÜÁ˸ÃÍÅ»ïÊÇÈôºÎÔËÓªC2µÄ¡£
https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/


¾©¹«Íø°²±¸11010802024551ºÅ