Stacked VLANÖеÄ4¸ö¿Éµ¼ÖÂDoSºÍMiTM¹¥»÷µÄ·ì϶
°ä²¼¹¦·ò 2022-09-30
¾ÝýÌå9ÔÂ28ÈÕ±¨Â·£¬Stacked VLANÒÔÌ«ÍøÖ°ÄÜÖеÄ4¸ö·ì϶¿É±»ÓÃÀ´Í¨¹ý¶¨ÔìµÄÊý¾Ý°ü¶ÔÖ¸±êÖ´Ðлؾø·þÎñ(DoS)»òÖÐÑëÈË(MitM)¹¥»÷¡£Stacked VLANÊÇÏÖ´ú·ÓÉÆ÷ºÍ»¥»»»úÖеÄÒ»ÏîÖ°ÄÜ£¬ÔÊÐí¹«Ë¾½«¶à¸öVLAN ID·â×°µ½ÓëÉÏÓÎÌṩÉ̹²ÏíµÄµ¥¸öVLANÏνÓÖС£ÕâЩ·ì϶´æÔÚÓÚÔÊÐíVLAN±êÍ·¶ÑµþµÄÒÔÌ«Íø·â×°ºÍ̸ÖУ¬±ðÀëΪCVE-2021-27853¡¢CVE-2021-27854¡¢CVE-2021-27861ºÍCVE-2021-2786£¬Î´¾Éí·ÝÑéÖ¤µÄÏàÁÚ¹¥»÷ÕßÄܹ»Ê¹ÓÃVLANºÍLLC/SNAP±êÍ·µÄ×éºÏÀ´ÈƹýL2ÍøÂç¹ýÂ˱£»¤£¬ÀýÈçIPv6 RA·À»¤¡¢¶¯Ì¬ARP²é³ºÍDHCPÕìÌýµÈ¡£
https://www.bleepingcomputer.com/news/security/ethernet-vlan-stacking-flaws-let-hackers-launch-dos-mitm-attacks/
2¡¢¹¥»÷ÕßÀûÓÃQuantum BuilderÀ´·Ö·¢Agent Tesla
ZscalerÔÚ9ÔÂ27ÈÕÅû¶Á˹¥»÷ÕßÀûÓÃQuantum Builder·Ö·¢Ô¶³Ì½Ó¼ûľÂíAgent TeslaµÄ»î¶¯¡£Quantum BuilderÊÇÒ»Öֿɶ¨ÔìµÄ¹¤¾ß£¬ÔÚ°µÍøÒÔÿÔÂ189Å·ÔªµÄ¼ÛÖµÏúÊÛ£¬¿ÉÓÃÓÚÌìÉú¶ñÒâ¿ì½Ý·½Ê½ÎļþÒÔ¼°HTA¡¢ISOºÍPowerShell payload¡£¹¥»÷ʹÓõĴ¹µöÓʼþÐû³ÆÊÇÀ´×ÔÖйú¿éÌǺͱùÌǹ©¸øÉ̵Ķ©µ¥È·ÈÏÐÅÏ¢£¬ÆäÖеÄLNKÎļþ¼Ù×°³ÉPDFÎĵµ¡£Ö´ÐÐLNKºó£¬Ç¶ÈëʽPowerShell´úÂë»áÌìÉúMSHTA£¬¶øºóÖ´ÐÐÍйÜÔÚÔ¶³Ì·þÎñÆ÷ÉϵÄHTAÎļþ£¬×îÖÕÏÂÔØ²¢Ö´ÐÐAgent Tesla¶þ½øÔìÎļþ¡£
https://www.zscaler.com/blogs/security-research/agent-tesla-rat-delivered-quantum-builder-new-ttps
3¡¢Securonix·¢ÏÖÖØÒªÕë¶Ô¾üʳаüÉ̵ÄÐÂÒ»ÂÖ¹¥»÷»î¶¯
¾Ý9ÔÂ28ÈÕ±¨Â·£¬SecuronixµÄ×êÑÐÈËÔ±·¢ÏÖÁËÖØÒªÕë¶Ô²Î¼Ó±øÆ÷Ôì×÷µÄ¶à¼Ò¾üʳаüÉ̵Äл£¬ÆäÖпÉÄÜÔ̺¬F-35 Lightning IIÕ½¶·»úÁã¼þ¹©¸øÉÌ¡£¸Ã»î¶¯Ê¼ÓÚ2022ÄêÏÄÄ©£¬ÀûÓÃÁËÓã²æÊ½ÍøÂç´¹µö×÷Ϊ³õʼϰȾý½é¡£ÓʼþÖÐÔ̺¬Ò»¸ö¿ì½ÝÎļþÔÚÖ´ÐÐʱ»áÏνӵ½C2£¬²¢Æô¶¯Ò»Á¬´®µÄPowerShell¾ç±¾¡£ÓÐȤµÄÊÇ£¬Õâ¸ö¿ì½ÝÎļþûÓÐʹÓó£ÓõÄcmd.exe»òpowershell.exe£¬¶øÊÇÒÀÀµÓÚC:\Windows\System32\ForFiles.exeºÅÁîÀ´Ö´ÐС£´Ë±í£¬¸Ã»î¶¯µÄC2»ù´¡ÉèÊ©µÄÓòÓÚ2022Äê7ÔÂ×¢²á²¢ÍйÜÔÚDigitalOceanÉÏ¡£
https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/
4¡¢WitchettyÀûÓÃÒþдÊõ½«ºóÃ۵²ØÔÚWindowsͼ±êÖÐ
SymantecÓÚ9ÔÂ29ÈÕ³ÆÆä·¢ÏÖÁËWitchettyÀûÓÃÒþдÊõ½«ºóÃŶñÒâÈí¼þ°µ²ØÔÚWindowsͼ±êÖС£×êÑÐÈËԱй©ËûÃÇÔÚµ÷²éһ·Ðµļäµý»î¶¯£¬¸Ã»î¶¯ÆðÍ·ÓÚ2022Äê2Ô£¬Õë¶ÔÖж«µÄÁ½¸öµ±¾Ö»ú¹¹ºÍ·ÇÖÞµÄÒ»¼Ò֤ȯÂòÂôËù£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷ÕßÊ×ÏÈÀûÓÃProxyShellºÍProxyLogon·ì϶£¬ÔÚÖ¸±ê·þÎñÆ÷¸ßµÍÔØwebshell£¬¶øºó»ñÈ¡°µ²ØÔÚͼÏñÎļþÖеĺóÃÅ¡£¹ÌÈ»¸ÃÍÅ»ïÈÔÔÚʹÓÃLookBackºóÃÅ£¬µ«ËƺõÒÑÔö³¤Á˼¸¸öеĶñÒâÈí¼þ£¬ÈçBackdoor.Stegmap£¬ËüÀûÓÃÒþдÊõ´ÓλͼͼÏñÖÐÌáÈ¡Æäpayload¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage
5¡¢Kaspersky°ä²¼¹ØÓÚPrilexµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
9ÔÂ28ÈÕ£¬Kaspersky°ä²¼Á˹ØÓÚ°ÍÎ÷ºÚ¿ÍÍÅ»ïPrilexµÄ¹¥»÷µÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ï×Ô2014ÄêÆðÍ·»îÔ¾£¬ÔÚ2016Äê¾ö¶¨ÉÕ»ÙATM¶ñÒâÈí¼þ£¬½«ËùÓй¥»÷¼¯ÖÐÔÚPoSϵͳÉÏ¡£PrilexµÄ×îа汾ÔÚ¹¥»÷·½Ê½ÉÏÓë֮ǰ°æ±¾´æÔÚijЩ²î¾à£¬¼´¸ÃÍÅ»ïÒÑ´Ó³Á·Å¹¥»÷ת±äΪʹÓÃGHOSTÂòÂô£¬¸Ã¼¼ÊõÔÚµêÄÚÖ§¸¶¹ý³ÌÖÐʹÓÃÖ¸±ê¿¨ÌìÉúµÄÃÜÂë·¸·¨¶ÒÏÖ×ʽð¡£Prilex¶ÔÐÅÓþ¿¨ºÍ½è¼Ç¿¨ÂòÂôÒÔ¼°ÓÃÓÚÖ§¸¶´¦ÖõÄÈí¼þµÄ¹¤×÷µÀÀí¼«¶È´¿Ê죬Òò¶øÄܹ»²»Ðݸüй¤¾ß£¬²¢ÕÒµ½ÈƹýÊÚȨսÊõµÄ²½Ö裬´Ó¶øÖ´Ðй¥»÷¡£
https://securelist.com/prilex-atm-pos-malware-evolution/107551/
6¡¢Lumen°ä²¼»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö»ã±¨
9ÔÂ28ÈÕ£¬Lumen°ä²¼ÁË»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö»ã±¨¡£½ü¼¸¸öÔÂÀ´£¬ChaosµÄÊýÁ¿Ñ¸¿ìÔö³¤£¬Ö¼ÔÚ½«¸÷ÀàWindowsºÍLinuxÉ豸¡¢SOHO·ÓÉÆ÷ºÍÆóÒµ·þÎñÆ÷µÅ×ÕÈë½©Ê¬ÍøÂç¡£ChaosµÄÖ°ÄÜÔ̺¬Ã¶¾ÙÖ÷»ú»·¾³¡¢ÔËÐÐÔ¶³ÌshellºÅÁî¡¢¼ÓÔØ¸½¼ÓÄ£¿é¡¢Í¨¹ýÇÔÈ¡ºÍ±©Á¦ÆÆ½âSSH˽Կ×Ô¶¯´«²¼ÒÔ¼°Ö´ÐÐDDoS¹¥»÷¡£ChaosËÆºõÔÚʹÓÃÁíÒ»¸ö½©Ê¬ÍøÂçKaijiµÄ¹¹½¨¿éºÍÖ°ÄÜ£¬×êÑÐÈËԱƾ¾Ý¶Ô100¶à¸öÑù±¾ÖеÄÖ°ÄÜ·ÖÎö£¬´§Ä¦ChaosÊÇKaijiµÄÏÂÒ»´Îµü´ú¡£
https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/


¾©¹«Íø°²±¸11010802024551ºÅ