ÃÀ¹úWelltokй©¹¥»÷µ¼Ö½ü850ÍòÃû»¼ÕßµÄÐÅϢй¶
°ä²¼¹¦·ò 2023-11-23¾ÝýÌå11ÔÂ22ÈÕ±¨Â·£¬ÃÀ¹úÒ½ÁƱ£½¡SaaSÌṩÉÌWelltokй©£¬ÆäʹÓõÄÎļþ´«ÊäÀûÓÃÔâµ½¹¥»÷£¬µ¼Ö½ü850ÍòÃû»¼ÕßµÄÓ×ÎÒÊý¾Ýй¶¡£½ñÄêÔçЩʱ³½£¬ClopÀûÓÃMOVEitÖеķì϶ÈëÇÖÁËÈ«ÇòÊýǧ¸öÆóÒµ¡£WelltokÔÚ10Ôµװ䲼ÁËÒ»·Ý֪ͨ£¬³ÆÆäMOVEit Transfer·þÎñÆ÷ÓÚ7ÔÂ26ÈÕÔâµ½ÈëÇÖ¡£¸Ã¹«Ë¾ÔÚ22ÈÕй©£¬ÒÑÈ·ÈÏÕâ´Îй¶ÊÂÎñÓ°ÏìÁË8493379ÈË¡£ÕâÊÇMOVEit·ì϶µ¼Öµĵڶþ´óÊý¾Ýй¶ÊÂÎñ£¬½ö´ÎÓÚй¶ÁË1100ÍòÈËÊý¾ÝµÄ·þÎñ³Ð°üÉÌMaximus¡£
https://www.bleepingcomputer.com/news/security/welltok-data-breach-exposes-data-of-85-million-us-patients/
2¡¢Cofense³ÆQakBot±»µ·»ÙºóDarkGateºÍPikaBot¼¤Ôö
CofenseÔÚ11ÔÂ20Èճƣ¬QakBot±»µ·»ÙºóDarkGateºÍPikaBotµÄ»î¶¯¼¤Ôö¡£½ñÄê8Ô·ݣ¬·¨ÂÉ»ú¹¹²é»ñÁËQakBotµÄ»ù´¡ÉèÊ©¡£ÐÂÒ»ÂÖ´¹µö»î¶¯ÓÚ9ÔÂ·ÝÆðÍ·´«²¼DarkGate£¬ºóÀ´ÓÔìðÍ·´«²¼PikaBot¡£×êÑÐÈËÔ±·¢ÏÖ£¬DarkGateºÍPikabot·Ö·¢»î¶¯Ê¹ÓõÄÕ½ÊõºÍ¼¼ÊõÓë֮ǰµÄQakbot»î¶¯ÀàËÆ£¬Ô̺¬½Ù³Öµç×ÓÓʼþÏß³Ì×÷Ϊ³õÊ¼Ï°È¾ÔØÌå¡¢ÓµÓÐÏÞ¶Å×û§½Ó¼ûµÄ¹ÖÒìģʽµÄURLÒÔ¼°ÓëQakBotÏÕЩһÑùµÄϰȾÁ´¡£¹¥»÷Õß»¹³¢ÊÔÁ˶à¸ö³õʼ¶ñÒâÈí¼þÖ²È뷨ʽ£¬Ô̺¬JS Dropper¡¢Excel-DNA Loader¡¢VBS DownloadersºÍLNK Downloader¡£
https://cofense.com/blog/are-darkgate-and-pikabot-the-new-qakbot/
3¡¢ActiveMQ·ì϶CVE-2023-46604±»ÓÃÀ´·Ö·¢Kinsing
11ÔÂ20ÈÕ£¬TrendMicro³Æ£¬¹¥»÷ÕßÀûÓÃApache ActiveMQ·ì϶£¨CVE-2023-46604£©×°ÖÃKinsing£¨Ò²³Æh2miner£©ºÍ¶ñÒâ¿ó¹¤¡£ÕâÊÇÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶£¬ÒÑÓÚ10Ôµױ»½¨¸´¡£¸Ã¶ñÒâÈí¼þʹÓá°ProcessBuilder¡±²½ÖèÔÚд´½¨µÄϵͳ¼¶¹ý³ÌÖÐÖ´ÐжñÒâbash¾ç±¾£¬²¢ÔÚ±»Ï°È¾É豸¸ßµÍÔØÆäËüpayload¡£Kinsing»¹»áÔÚÓйعý³Ì¡¢crontabºÍ»îÔ¾ÍøÂçÏνÓÖÐ×Ô¶¯²éÕÒ¾ºÕù¹ØÏµµÄ¿ó¹¤£¬²¢ÖÕÖ¹ËüÃÇ¡£
https://www.trendmicro.com/en_us/research/23/k/cve-2023-46604-exploited-by-kinsing.html
4¡¢VMwareÅû¶NetSupport RATÕë¶Ô½ÌÓýµÈÐÐÒµµÄ¹¥»÷
VMwareÔÚ11ÔÂ20ÈÕй©NetSupport RAT¹¥»÷»î¶¯¼¤Ôö£¬×êÑÐÈËÔ±ÔÚ´Óǰ¼¸ÖÜÄڹ۲쵽³¬¹ý15ÆðÓëÖ®ÓйصÄÐÂϰȾ¡£ÊÜÓ°Ïì×îÑϳÁµÄÊǽÌÓýºÍóÒ×·þÎñÐÐÒµ£¬ÒÔ¼°µ±¾Ö»ú¹¹¡£×î½üµÄ¹¥»÷ÖУ¬NetSupport RATͨ¹ýαÔìµÄÍøÕ¾ºÍÐéαä¯ÀÀÆ÷¸üнøÐзַ¢£¬ÕâЩ¶ñÒâÍøÕ¾ÍйÜ×Å¿´ËÆÊǸüеÄPHP¾ç±¾£¬µ±Ö¸±ê»÷ÏÂÔØÁ´½Óʱ£¬»áÏÂÔØ¶î±íµÄJavascript payload¡£Javascript»á´Ó±í²¿ÓòÏÂÔØ²¢Ö´ÐÐPowershell£¬PowershellÓÃÓÚ¼ìË÷Ô̺¬NetSupport RATµÄZIPÎĵµ¡£
https://blogs.vmware.com/security/2023/11/netsupport-rat-the-rat-king-returns.html
5¡¢Atomic StealerÀûÓÃαÔìµÄä¯ÀÀÆ÷¸üнøÐд«²¼
11ÔÂ21ÈÕ£¬MalwarebytesÅû¶ÁËAtomic Stealer£¨Ò²³ÆAMOS£©Õë¶ÔMacϵͳµÄ·Ö·¢»î¶¯¡£×êÑÐÈËÔ±³Æ£¬AMOS´Ë¿ÌÕýͨ¹ýÒ»¸öÃûΪ"ClearFake"µÄÐéαä¯ÀÀÆ÷¸üÐÂÁ´½øÐзַ¢£¬ÕâºÜ¿ÉÄÜÊǵÚÒ»´Î·¢ÏÖÉ繤¹¥»÷£¨ÒÔǰֻÕë¶ÔWindows£©ÔÚµØÀíµØÎ»ºÍÖ¸±êϵͳ·½Ãæ¶¼ÓÐËùÀ©´ó¡£¶ñÒâÈí¼þpayloadÊÇÒ»¸ö×Ô³ÆÎªSafari»òChrome¸üеÄDMGÎļþ£¬²é¿´¶ñÒâÀûÓÃÖеÄ×Ö·û´®Äܹ»¿´µ½ÕâЩºÅÁîÔ̺¬ÃÜÂëºÍÎļþץȡְÄÜ£¬ÔÚͳһ¸öÎļþÖл¹Äܹ»ÕÒµ½¶ñÒâÈí¼þµÄC2·þÎñÆ÷¡£
https://www.malwarebytes.com/blog/threat-intelligence/2023/11/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates
6¡¢Î¢Èí°ä²¼Õë¶ÔÓ¡¶ÈµÄAndroidľÂí»î¶¯µÄ·ÖÎö»ã±¨
11ÔÂ20ÈÕ£¬Î¢Èí°ä²¼ÁËÕë¶ÔÓ¡¶ÈµÄAndroidľÂí»î¶¯µÄ·ÖÎö»ã±¨¡£¹¥»÷ÕßʹÓÃWhatsAppºÍTelegramµÈÉ罻ýÌåÆ½Ì¨·¢ËÍÐÂÎÅ£¬Ö¼ÔÚͨ¹ý¼ÙÒâÒøÐÓ×¢µ±¾Ö·þÎñºÍ¹«ÓÃÊÂÒµµÈºÏ·¨»ú¹¹À´ÓÕʹָ±êÔÚÆäÒÆ¶¯É豸ÉÏ×°ÖöñÒâÀûÓá£Ò»µ©×°Öã¬ÕâЩ¶ñÒâÀûÓþͻá´ÓÓû§ÄÇÀïÇÔÈ¡¸÷ÖÖÀàÐ͵ÄÐÅÏ¢£¬ÆäÖпÉÄÜÔ̺¬Ó×ÎÒÐÅÏ¢¡¢ÒøÐоßÌåÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢ºÍÕÊ»§Í´´¦µÈ¡£±¾»ã±¨Í¨¹ý¶ÈÎöÁ½¸öÕë¶ÔÓ¡¶ÈÒøÐпͻ§µÄÚ²ÆÐÔÀûÓ÷¨Ê½µÄ¹¥»÷£¬½ÒʾÁËÓ°Ïì¸÷¸öÐÐÒµµÄÒÆ¶¯ÒøÐÐľÂí¹¥»÷»î¶¯¡£
https://www.microsoft.com/en-us/security/blog/2023/11/20/social-engineering-attacks-lure-indian-users-to-install-android-banking-trojans/


¾©¹«Íø°²±¸11010802024551ºÅ