´òÓ¡ÖÎÀíÈí¼þ¿ª·¢ÉÌPaperCut½¨¸´Æä²úÆ·ÖÐÒѱ»ÀûÓ÷ì϶

°ä²¼¹¦·ò 2023-04-21

1¡¢´òÓ¡ÖÎÀíÈí¼þ¿ª·¢ÉÌPaperCut½¨¸´Æä²úÆ·ÖÐÒѱ»ÀûÓ÷ì϶


¾ÝýÌå4ÔÂ19ÈÕ±¨Â·£¬PaperCut¶½´Ù¿Í»§×°ÖøüУ¬½¨¸´ºÚ¿ÍÔÚ»ý¼«ÀûÓõķì϶¡£PaperCutÓÃÓÚʹ´òÓ¡ÖÎÀíÈí¼þÓëËùÓÐÖØÒªÆ·ÅÆºÍƽ̨¼æÈÝ£¬ËüÐû³ÆÎªÀ´×Ô100¶à¸ö¹ú¶ÈµÄÊýÒÚÈËÌṩ·þÎñ¡£¸Ã¹«Ë¾ÓÚ1ÔÂ10ÈÕÊÕµ½»ã±¨£¬µÃÖªÆäPaperCut MF/NGµÄ´æÔÚÁ½¸ö·ì϶£¬±ðÀëÊÇÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶ºÍÒ»¸öÐÅϢй¶·ì϶¡£Ö®ºó£¬Õâ¼ÒÈí¼þ¿ª·¢É̸üÐÂÁËÆä3Եݲȫ²¼¸æ£¬³Æ½ØÖÁ2023Äê4ÔÂ18ÈÕ£¬ÓÐÖ¤¾ÝÅúעδ´ò²¹¶¡µÄ·þÎñÆ÷ÔÚ±»ÀûÓ㬵«Ã»ÓÐй©̫¶àÓйØÕâЩ·ì϶µÄÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-bug-in-papercut-servers/


2¡¢Ó¡¶ÈICICIÒøÐÐÒòϵͳÅäÖÃÃýÎóй¶Êý°ÙÍòÌõ¿Í»§ÐÅÏ¢


¾Ý4ÔÂ20ÈÕ±¨Â·£¬Ó¡¶ÈICICIÒøÐÐй¶ÁËÊý°ÙÍòÌõ¿Í»§ÐÅÏ¢¡£2ÔÂ1ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÅäÖÃÃýÎóµÄDigital Ocean´æ´¢Í°£¬ÆäÖÐÔ̺¬³¬¹ý360Íò¸öICICIÒøÐеÄÎļþ£¬Éæ¼°ÒøÐм°Æä¿Í»§µÄÃô¸ÐÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢Ô̺¬¿Í»§µÄÒøÐÐÕË»§ÐÅÏ¢¡¢ÐÅÓþ¿¨ºÅ¡¢»¤ÕÕ¡¢Éí·ÝÖ¤ºÍÓ¡¶ÈÄÉ˰È˼ø±ðºÅµÈ£¬ÒøÐеĶÔÕ˵¥ºÍKYC±í¸ñ£¬ÒÔ¼°ÒøÐÐÔ±¹¤ºÍÇóÖ°ÕߵļòÀú¡£½ØÖÁ3ÔÂ30ÈÕ£¬¸Ã´æ´¢Í°Òѱ»±£»¤ÆðÀ´¡£


https://securityaffairs.com/145094/uncategorized/icici-bank-data-leak.html


3¡¢APT 36ÀûÓÃжñÒâÈí¼þPoseidon¹¥»÷Ó¡¶ÈÈ·µ±¾Ö»ú¹¹


UptycsÔÚ4ÔÂ17ÈÕ³ÆÆä·¢ÏÖÁËAPT 36£¨Ò²³ÆTransparent Tribe£©ÀûÓÃÐÂLinux¶ñÒâÈí¼þPoseidonµÄ¹¥»÷»î¶¯¡£¹¥»÷Õßͨ¹ýľÂí»¯µÄ2FAÈí¼þKavach·Ö·¢¶ñÒâÈí¼þpayload£¬ÖØÒªÕë¶ÔΪӡ¶Èµ±¾Ö»ú¹¹¹¤×÷µÄLinuxÓû§¡£¹¥»÷ʼÓÚÒ»¸ö¶ñÒâELFÎļþ£¬Ö¼ÔÚ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷µÚ¶þ½×¶ÎPoseidon payload¡£PoseidonÊÇÒ»¸öͨÓúóÃÅ¿ÉÓÃÓÚ½Ù³Ö±»Ï°È¾µÄÖ÷»ú£¬ÆäÖ°ÄÜÔ̺¬¼Í¼¼üÅÌ¡¢½ØÆÁ¡¢ÉÏ´«ºÍÏÂÔØÎļþ£¬ÒÔ¼°Í¨¹ý¸÷À෽ʽԶ³ÌÖÎÀíϵͳ¡£


https://www.uptycs.com/blog/cyber_espionage_in_india_decoding_apt_36_new_linux_malware


4¡¢SymantecÅû¶PlayµÄÁ½¸öй¤¾ßGrixbaºÍVSS¸´Ô칤¾ß


SymantecÓÚ4ÔÂ19ÈÕÅû¶ÁËÀÕË÷ÍÅ»ïPlayµÄÁ½¸öеÄ×Ô½ç˵Êý¾ÝÍøÂ繤¾ß£¬¼´GrixbaºÍVSS¸´Ô칤¾ß¡£GrixbaÊÇÍøÂçɨÃèºÍÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬ÓÃÓÚö¾ÙÓòÖеÄÓû§ºÍÍÆËã»ú¡£¸Ã¹¤¾ß½«ÍøÂçµ½µÄÊý¾Ý±£ÁôÔÚCSVÎļþÖв¢Ñ¹Ëõ³ÉZIP£¬¶øºóй¶µ½¹¥»÷ÕßµÄC2·þÎñÆ÷£¬ÎªÏÂÒ»²½¹¥»÷Ìṩ³ÁÒªÐÅÏ¢¡£VSS¸´Ô칤¾ßÒ²ÊÇʹÓÃCostura¹¤¾ß¿ª·¢µÄ£¬½«AlphaVSS¿âǶÈëµ½¿ÉÖ´ÐÐÎļþÖУ¬¸Ã¹¤¾ßÓÃÓÚÔÚ¼ÓÃÜ֮ǰ£¬´Ó±»Ï°È¾É豸µÄVSS¾í¸´ÔìÎļþ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy


5¡¢ThreatMon°ä²¼Blind Eagle¹¥»÷»î¶¯µÄ¼¼Êõ·ÖÎö»ã±¨


4ÔÂ19ÈÕ£¬ThreatMon°ä²¼»ã±¨£¬½«Blind EagleÁ´½Óµ½Ò»¸öеĶà½×¶Î¹¥»÷Á´¡£×êÑÐÈËÔ±·¢ÏÖʹÓÃÒ»¸öJavaScriptÏÂÔØ·¨Ê½À´Ö´ÐÐÍйÜÔÚDiscord CDNÖеÄPowerShell¾ç±¾¡£¸Ã¾ç±¾»á·Ö·¢ÁíÒ»¸öPowerShell¾ç±¾ºÍÒ»¸öWindowsÅú´¦ÖÃÎļþ£¬²¢ÔÚWindowsÆô¶¯Îļþ¼ÐÖб£ÁôÒ»¸öVBScriptÎļþÒÔʵÏÖÓÆ¾ÃÐÔ¡£¶øºóÔËÐÐVBScript´úÂëÒÔÆô¶¯Åú´¦ÖÃÎļþ£¬Åú´¦ÖÃÎļþËæºó±»½âÃÜ£¬ÒÔÔËÐÐ֮ǰÓë֮һ··Ö·¢µÄPowerShell¾ç±¾¡£ÔÚ×îºó½×¶Î£¬PowerShell¾ç±¾»áÖ´ÐÐnjRAT¡£


https://threatmon.io/apt-blind-eagles-malware-arsenal-technical-analysis/


6¡¢Fortra°ä²¼¹ØÓÚGoAnywhere MFT·ì϶¹¥»÷µÄµ÷²éÁ˾Ö


 4ÔÂ17ÈÕ£¬Fortra°ä²¼Á˹ØÓÚGoAnywhere MFT·ì϶£¨CVE-2023-0669£©ÀûÓûµÄµ÷²éÁ˾Ö¡£Æ¾¾Ý²¼¸æ£¬¸Ã¹«Ë¾ÓÚ1ÔÂ30ÈÕÒâʶµ½²¿ÃÅGoAnywhere MFTaaSÊ·ýÖеĿÉÒɻ£¬²¢Ñ¸¿ì¹Ø¹ØÔÆ·þÎñÒÔ½øÇ°½øÒ»´ëÊ©²é¡£µ÷²éÏÔʾ£¬¹¥»÷ÕßÔÚ1ÔÂ28ÈÕÖÁ1ÔÂ30ÈÕÀûÓ÷ì϶ÔÚ²¿Ãſͻ§»·¾³Öд´½¨ÁËÕÊ»§£¬¶øºóʹÓÃÕâЩÕÊ»§´ÓMFT»·¾³ÏÂÔØÎļþ¡£¹¥»÷Õß»¹ÔÚijЩMFTaaS¿Í»§»·¾³ÖÐ×°ÖÃÁËÁ½¸ö¶î±íµÄ¹¤¾ß£¬NetcatºÍErrors.jsp¡£´Ë±í£¬Fortra·¢ÏÖÔçÔÚ1ÔÂ18Èո÷ì϶¾Í±»ÓÃÓÚÕë¶ÔÔËÐÐGoAnywhere MFTÌØ¶¨ÅäÖõı¾µØ¿Í»§¡£


https://www.fortra.com/blog/summary-investigation-related-cve-2023-0669