LastPass¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶

°ä²¼¹¦·ò 2022-08-26
1¡¢LastPass¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶

      

¾ÝýÌå8ÔÂ25ÈÕ±¨Â· £¬LastPass¹«Ë¾Ôâµ½¹¥»÷ £¬Ô´´úÂëºÍרÓм¼ÊõÐÅÏ¢¿ÉÄÜй¶ ¡£LastPassÊÇÈ«Çò×î´óµÄÃÜÂëÖÎÀí¹«Ë¾Ö®Ò» £¬±»³¬¹ý3300ÍòÈ˺Í100000¼ÒÆóҵʹÓà ¡£LastPassµÄ¹«¸æÖ¸³ö £¬¹¥»÷ÕßÊÇͨ¹ý½Ó¼û¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÖеÄÊÜËðÕÊ»§ÈëÇÖµÄ ¡£¿Í»§µÄÊý¾Ý»ò¼ÓÃܵÄÃÜÂë¿âδÊÜÓ°Ïì £¬µ«¹¥»÷ÕßµÄÈ·ÇÔÈ¡ÁËËûÃǵIJ¿ÃÅÔ´´úÂëºÍLastPassµÄרÓм¼ÊõÐÅÏ¢ ¡£È¥Äê £¬LastPassÔâµ½ÁËײ¿â¹¥»÷ £¬¹¥»÷Õ߿ɻñµÃÓû§µÄÖ÷ÃÜÂë ¡£ 

   

https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/


2¡¢Á÷ýÌåÆ½Ì¨Plex²úÉúÊý¾Ýй¶²¢¶½´ÙÓû§¾¡¿ì³ÁÖÃÃÜÂë 

      

¾Ý8ÔÂ24ÈÕ±¨Â· £¬ÃÀ¹úÁ÷ýÌåÆ½Ì¨Plex·¢ÏÔìäÊý¾Ý¿âÔâµ½ÁËδ¾­ÊÚȨµÄ½Ó¼ûºó £¬ÏòÓû§·¢ËÍÁËÃÜÂë³ÁÖÃ֪ͨ ¡£¹¥»÷Õß¿ÉÄܽӼûÁËÓʼþµØÖ·¡¢Óû§ÃûºÍÃÜÂëµÈÐÅÏ¢ £¬Ò»Ð©Óû§»ã±¨Åú×¢¸ÃÎÊÌâ²»»áÓ°ÏìÃâ·ÑÕÊ»§ £¬¿ÉÄÜÖ»Óи¶·ÑÕÊ»§Êܵ½Ó°Ïì ¡£Óë´Ëͬʱ £¬Plex.tvÍøÕ¾³öÏÖÁËÖжÏ £¬Plex×´Ì¬Ò³Ãæ°µÊ¾ÔÚµ÷²éÔ­Òò £¬Ä¿Ç°Éв»Ã÷ÏÔÆäÖжÏÊÇ·ñÓëδ¾­ÊÚȨµÄ½Ó¼ûÓйØ £¬»¹ÊÇÒ»´ÎÕë¶Ô¸Ãƽ̨µÄDDoS¹¥»÷ ¡£


https://securityaffairs.co/wordpress/134814/data-breach/plex-data-breach.html


3¡¢RansomEXX³Æ¶ÔÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÕÆ¹Ü

      

ýÌå8ÔÂ24ÈÕ±¨Â· £¬ÀÕË÷ÍÅ»ïRansomEXXÐû³Æ¶Ô¼ÓÄôóÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÕÆ¹Ü ¡£¸Ã¹«Ë¾ÖØÒª³ö²úSki-DooÑ©µØ³µ¡¢Sea-DooÅçÆø»¬Ñ©¡¢ATV¡¢Ä¦Íгµ¡¢Ë®³µºÍRotax·¢Æð»úµÈ £¬ÄêÏúÊÛ¶î¿¿½ü60ÒÚÃÀÔª £¬ÔÚÔâµ½¹¥»÷ºóËùÓÐÒµÎñÁÙʱÖÕ³¡ ¡£BRPÔÚ8ÔÂ8ÈÕÅû¶´Ë¹¥»÷ÊÂÎñ ¡£ÓÚ8ÔÂ15ÈÕй©¼ÓÄô󡢷ÒÀ¼¡¢ÃÀ¹úºÍ°ÂµØÀûµÄ4¸ö¹¤³§¸´Ô­³ö²ú £¬²¢¹«¿ªÁ˳õ´ëÊ©²éÁ˾Ö £¬¹¥»÷ÕßÊÇͨ¹ýµÚÈý·½·þÎñÌṩÉÌÈëÇÔìäϵͳ ¡£8ÔÂ23ÈÕ £¬RansomEXXÐû³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄ29.9GBÎļþ £¬Ô̺¬±£ÃܺÍ̸¡¢»¤ÕÕºÍÉí·ÝÖ¤¡¢×ÊÁϹ©¸øºÍ̸ºÍÐøÇ©ºÏÒ»Ö ¡£


https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/ 


4¡¢Microsoft¼ì²âµ½ÀûÓÿªÔ´µÄC2¿ò¼ÜSliverµÄÇ÷ÏòÔö³¤

      

8ÔÂ24ÈÕ £¬Microsoft°µÊ¾ÒѼì²âµ½ÀûÓÿªÔ´C2¿ò¼ÜSliverµÄÇ÷ÏòÉÏÉý ¡£SliverÓÚ2019Äêµ×³õ´Î¹«¿ª £¬ÖØÒªÃæÏò°²È«×êÑÐÈËÔ± £¬¿ÉÔÚGitHubÉÏʹÓà £¬Ô̺¬ºÜ¶à³£¼ûµÄC2¿ò¼ÜÖ°ÄÜ ¡£×Ô2020Äê12ÔÂÒÔÀ´ £¬ºÜ¶à¹¥»÷Õß½«SliverÄÉÈë±øÆ÷¿â £¬ÆäÖÐÖ®Ò»ÊÇRaaS´ÓÊô×éÖ¯DEV-0237 ¡£½üÆÚ £¬×êÑÐÈËÔ±·¢ÏÖ¹¥»÷ÕßʹÓÃBumblebee£¨Ò²³ÆCOLDTRAIN£©×÷Ϊ³õʼ½Ó¼û¼ÓÔØ·¨Ê½ £¬À´×°ÖÃSliverµÈ¶àÖÖpost-compromise¹¤¾ß ¡£


https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/


5¡¢Zscaler·¢ÏÖÖØÒªÕë¶ÔG SuiteÓû§µÄAiTM´¹µö¹¥»÷

      

ýÌå8ÔÂ24ÈÕ³Æ £¬×êÑÐÈËÔ±·¢ÏÖÁËÕë¶ÔGoogle G SuiteÓû§µÄÐÂÒ»ÂÖAiTM´¹µö¹¥»÷»î¶¯ ¡£¸Ã»î¶¯ÓÚ½ñÄê7ÔÂÖÐÑ®ÆðÍ· £¬×¨ÃÅÕë¶ÔʹÓÃGoogle WorkspaceµÄ¸÷Àà×éÖ¯µÄÊ×ϯִÐйٵȸ߹Ü ¡£×êÑÐÈËÔ±·¢ÏÖÕâ´Î¹¥»÷ʹÓõÄTTPºÍ»ù´¡¼Ü¹¹Óë´Óǰ¼¸¸öÔÂÖÐÕë¶Ô΢ÈíÓû§µÄÓÐËù³Áµþ £¬µ«Óë΢ÈíAiTM´¹µö¹¥»÷Ïà±ÈÖ¸±êÊýÁ¿ÒªÉٵöà ¡£µ÷²éÅú×¢ £¬µ¥¿¿¶à³É·ÖÉí·ÝÑéÖ¤ÎÞ·¨Õмܸ߼¶´¹µö¹¥»÷ £¬Òò¶øÓû§±ØÐëÔÚÊäÈëÍ´´¦Ö®Ç°×Ðϸ²é³­URL £¬²¢Ô¤·À´ò¿ªÎ´ÖªÆðÔ´ºÍ²»ÊÜÐŵĸ½¼þ»òÁ´½Ó ¡£


https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html


6¡¢Kaspersky°ä²¼Kimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

KasperskyÔÚ8ÔÂ25ÈÕ°ä²¼Á˹ØÓÚKimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£¸ÃÍÅ»ïÖØÒªÕë¶ÔÓ뺫¹úÓйصÄʵÌå £¬²¢ÔÚ¼«¶ÈʵʱµØ¸üÐÂÆä¹¤¾ß ¡£ÔÚÐµĹ¥»÷ÖÐ £¬¹¥»÷ÕßÀûÓÃHTMLÀûÓ÷¨Ê½ÎļþÌåʽÀ´Ï°È¾Ö¸±ê £¬²¢Å¼È»Ê¹ÓÃHangeulµö¶üÎĵµ £¬³õʼϰȾºó»á×°ÖÃÒ»¸öVisual Basic¾ç±¾ ¡£Ö²ÈëµÄVBSÎļþ¿ÉÄÜ·µ»ØÓйØÖ¸±êÉ豸µÄÐÅÏ¢²¢ÏÂÔØ±àÂëÌåʽµÄÆäËüpayload ¡£×îºóÒ»¸ö½×¶ÎÊÇWindows¿ÉÖ´ÐÐÀàÐ͵ĶñÒâÈí¼þ £¬¿É´ÓÖ¸±êÇÔÊØÐÅÏ¢ ¡£´Ë±í £¬¸Ã»ã±¨»¹ÖØÒª½éÉÜÁ˸ÃÍÅ»ïÊÇÈôºÎÔËÓªC2µÄ ¡£


https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/