ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÁÙʱÖжÏ

°ä²¼¹¦·ò 2023-04-25

1¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÁÙʱÖжÏ


¾ÝýÌå4ÔÂ21ÈÕ±¨Â· £¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷ £¬Ó°ÏìÁËÆäµç×ÓÓʼþ·þÎñÆ÷ºÍ²¿ÃÅϵͳ¡£¹¥»÷²úÉúÔÚ4ÔÂ12ÈÕÔ糿 £¬¸ÃÔì´¬³§Ð¹Â© £¬¹¥»÷Õë¶ÔµÄ·þÎñÆ÷ÖØÒªÓÃÓÚ±£ÁôÏòÆäÍÆËã»úÊý½ÚÔì×÷É豸ÌṩָÁîµÄÊý¾Ý £¬µ¼ÖÂËüÃÇå´»úÊýÌ졣ĿǰûÓÐÔ±¹¤µÄÓ×ÎÒÐÅÏ¢Êܵ½Ó°Ïì¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾ £¬FMGÒѲÉÈ¡´ëÊ©½øÐÐÏìÓ¦ £¬Ë®Ê¦ÔÚ»ý¼«¼à¶½ÕâЩ¹¤×÷¡£


https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/


2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ


¾Ý4ÔÂ21ÈÕ±¨Â· £¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢µï±¤Ö®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ £¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ £¬Ðû³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍÎè±×Æ÷µÈ¡£ËüÃÇ»á¼ÓÔØ¼Ù×°³ÉFortniteÒ³ÃæµÄ´¹µöÍøÒ³ £¬»ò³ÐŵÌṩÀñÎ│µÄÐéαµÄµ÷²é¡£´Ë±í £¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖݵ±¾ÖµÄÒ»¸öÓ×ÐÍÍøÕ¾ £¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£


https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/


3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢ÏÖеÄDecoy Dog


InfobloxÓÚ4ÔÂ20ÈÕ³Æ £¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó £¬·¢ÏÖÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¸Ã¹¤¾ßÖ¼ÔÚÔ®ÊÖ¹¥»÷Õßͨ¹ýÕ½ÊõÐÔµÄÓòÃûÀÏ»¯ºÍDNS²éÎÊÔËÔØÀ´Èƹý¼ì²â £¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«Îªº±¼û¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄµ÷²é·¢ÏÖÁ˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò £¬ËüÃǵĴó²¿ÃÅͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£ÕâЩÓòÃûµÄDNSËí·ӵÓÐÖ¸ÏòPupy RATµÄÌØµã £¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü²¿ÊðµÄÔ¶³Ì½Ó¼ûľÂí¡£


https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/


4¡¢AquaÅû¶ÀûÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯


AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢ÏÖÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯ £¬ÀûÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ½Ó¼û½ÚÔì(RBAC)´´½¨ºóÃŲ¢ÔËÐп󹤡£Í¨¹ýÀûÓÃRBACÖ´ÐжñÒâ½Ó¼û½ÚÔìÕ½Êõ £¬¼´±ãÌṩ³õʼ½Ó¼ûµÄÃýÎóÅäÖÃÔÚ½«À´µÃµ½½¨¸´ £¬¹¥»÷ÕßÒ²Äܹ»ÔÚ±»Ï°È¾µÄ¼¯ÈºÉϳÖÐø´æÔÚ¡£¹¥»÷Á´ÀûÓÃÅäÖÃÃýÎóµÄAPI·þÎñÆ÷½øÐгõʼ½Ó¼û £¬¶øºó·¢ËÍHTTPÒªÇóÒÔÁгö»úÃÜ £¬²¢·¢³öAPIÒªÇóÒÔͨ¹ýÁгö¶¨Ãû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£´Ë±í £¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´ÊÕÊܺͽٳֱ»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£


https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters


5¡¢×êÑÐÍŶӷ¢ÏÖÀûÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯


4ÔÂ20ÈÕ £¬SecureWorksÅû¶ÁËÀûÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£×êÑÐÈËÔ±·¢ÏÖÒ»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnect°²È«Òƶ¯¿Í»§¶ËÏÂÔØÒ³Ãæ £¬Ëü´´½¨ÓÚ2ÔÂ16ÈÕ £¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°Ö÷¨Ê½cisco-anyconnect-4_9_0195.msi £¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£´Ë±í £¬×êÑÐÈËÔ±»¹·¢ÏÖÁËÆäËüÓµÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü £¬ÀýÈçZoomInstaller.exeºÍzoom.ps1 £¬ChatGPT.msiºÍchch.ps1 £¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£


https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads


6¡¢Huntress°ä²¼PaperCut·ì϶ÀûÓûµÄ·ÖÎö»ã±¨


4ÔÂ21ÈÕ £¬Huntress°ä²¼»ã±¨ £¬³ÆÆä·¢ÏÖÁËÀûÓÃPaperCut MF/NG·ì϶µÄ»î¶¯¡£ÕâÁ½¸ö·ì϶£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ï°È¾µÄPaperCut·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£×êÑÐÈËÔ±·¢ÏÖ´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellºÅÁî £¬ÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ £¬ÒÔ±ãÔÚÖ¸±êÖ÷»ú³ÖÐø½Ó¼ûºÍÖ´ÐдúÂë¡£»ù´¡ÉèÊ©·ÖÎö·¢ÏÖ £¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á £¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ £¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйØ¡£


https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software