MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ
°ä²¼¹¦·ò 2023-06-051¡¢MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ
¾ÝýÌå6ÔÂ1ÈÕ±¨Â·£¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеķì϶£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý¡£ÕâÊÇÒ»¸öSQL×¢Èë·ì϶£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Rapid7×êÑÐÈËÔ±ÔÚ±»ÀûÓÃÉ豸ÉÏ·¢ÏÖÁËÒ»ÑùµÄÃûΪhuman2.aspµÄwebshell£¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖС£Mandiant°µÊ¾£¬ËûÃǵÄÊý¾ÝÏÔʾÕâ´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÉí·Ý£¬µ«¾ÝϤÒѾÓкܶà×éÖ¯Ôâµ½ÈëÇÖ£¬Êý¾Ý±»µÁ¡£Progress SoftwareÒѰ䲼Õë¶Ô±¾µØºÍÔÆµÄ»º½â²½Öè¡£
https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/
2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷
¾Ý6ÔÂ5ÈÕ±¨Â·£¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcajaй©£¬ËüÔÚ´¦ÖÃÓ°ÏìÁ˶à¸ö´¦Ê´¦µÄÀÕË÷¹¥»÷¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊУ¬ÖÎÀí×ų¬¹ý46ÒÚÃÀÔªµÄÏû·Ñ´û¿î¡£PlayÐû³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿ÃÅÐÅÏ¢£¬Ô̺¬Ó×ÎÒ»úÃÜÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕպͺÏÒ»Ö¡£¸Ã»ú¹¹°µÊ¾£¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄÂòÂô£¬µç×ÓÒøÐÓ×¢×Ô¶¯È¡¿î»úºÍ¸÷´¦Ê´¦Ò²¶¼ÔÚÕý³£ÔË×÷¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÒò¶ø·ñ½»Êê½ðµÄѯÎÊ¡£
https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack
3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼Ö³¬¹ý250ÍòÈ˵ÄÐÅϢй¶
ýÌå6ÔÂ1Èճƣ¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶¡£µ÷²é·¢ÏÖ£¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ£¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬Éæ¼°ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»á°²È«ºÅÂë¡¢ÄÉ˰È˼ø±ðºÅºÍÁÙ´²ÐÅÏ¢µÈ¡£Õâ´ÎÊÂÎñÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕÆðÍ·×¢²áµÄ³ÉÔ±¡£HPHC½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£Ä¿Ç°ÉÐÎÞÀÕË÷ÍÅ»ïÐû³ÆÎª´ËÊÂÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/
4¡¢×êÑÐÍŶӷ¢ÏÖCamaro DragonÀûÓÃкóÃÅTinyNoteµÄ¹¥»÷
Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËCamaro Dragon½üÆÚ¹¥»÷»î¶¯µÄÏêÇé¡£×êÑÐÈËÔ±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢·þÎñÆ÷ÉÏ·¢ÏÖÁËеĻùÓÚGoµÄºóÃÅ£¬ÃûΪTinyNote¡£¸ÃºóÃÅͨ¹ýÓë±í½»ÊÂÎñÓйصÄÃû³Æ½øÐзַ¢£¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý¡£Ëü»¹¿ÉÈÆ¹ýÓ¡¶ÈÄáÎ÷ÑÇÊ¢ÐеÄɱ¶¾Èí¼þSmadAV¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ£¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines½øÐиù»ùµÄ»úеö¾ÙºÍºÅÁîÖ´ÐС£
https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/
5¡¢KasperskyÅû¶ÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSµÄTriangulation»î¶¯
6ÔÂ1ÈÕ£¬KasperskyÅû¶ÁËÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSÉ豸µÄTriangulation»î¶¯¡£¸Ã»î¶¯ÖÁÉÙ´Ó2019ÄêÆðÍ·£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessage·þÎñÏòiOSÉ豸·¢Ë͵ÄÐÂÎÅ£¬¸½¼þÖÐÔ̺¬·ì϶ÀûÓ᣸ÃÐÂÎÅÔÚûÓÐÈκÎÓû§½»»¥µÄÇé¿öÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´Ðзì϶¡£ÀûÓ÷ì϶´ÓC2·þÎñÆ÷ÏÂÔØ¶à¸öºóÐø½×¶Î£¬Ô̺¬ÓÃÓÚÌáȨµÄÆäËü·ì϶ÒÔ¼°×îÖÕpayload¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐУ¬ËüÖ§³ÖÒ»×éÓÃÓÚÍøÂçϵͳºÍÓû§ÐÅÏ¢µÄºÅÁ²¢ÇÒÄܹ»ÔËÐдÓC2×÷Ϊ²å¼þÄ£¿éÏÂÔØµÄËÁÒâ´úÂë¡£Õâ´Î¹¥»÷³É¹¦µØÏ°È¾ÁËÔËÐÐiOS 15.7µÄÉ豸¡£
https://securelist.com/operation-triangulation/109842/
6¡¢Trend Micro°ä²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨
5ÔÂ31ÈÕ£¬Trend Micro°ä²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±²é³ÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾£¬·¢ÏÖRoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÀàËÆ¶È¡£»ùÓÚBinDiffµÄ±ÈÁ¦·¢ÏÖ£¬º¯ÊýµÄÀàËÆ¶ÈΪ93.2%£¬¸ù»ù¿éµÄÀàËÆ¶ÈΪ99.3%£¬¶øÌø×ªµÄÀàËÆ¶ÈΪ98.4%¡£´Ë±í£¬¶þÕß¶¼Ê¹ÓÃOpenSSLµÄAES½øÐмÓÃÜ£¬²¢ÀûÓÃÀàËÆµÄ¼äЪ¼ÓÃܼ¼ÊõÀ´¼Ó¿ì¼ÓÃܹý³Ì¡£×êÑÐÈËÔ±°µÊ¾£¬BlackSuitҪôÊÇͳһ¿ª·¢Õß¿ª·¢µÄбäÌ壬ҪôÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ£¬»òÕßÊÇRoyalµÄ´ÓÊô»ú¹¹¶ÔÔʼ´úÂë½øÐÐÁËÅú¸Ä¡£
https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html


¾©¹«Íø°²±¸11010802024551ºÅ