·¨¹úµ±¾ÖÍøÕ¾ÒòÑϳÁµÄÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷¶øÖжÏ

°ä²¼¹¦·ò 2024-03-13
1. ·¨¹úµ±¾ÖÍøÕ¾ÒòÑϳÁµÄÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷¶øÖжÏ


3ÔÂ12ÈÕ£¬×ÜÀí¼Ó²¼Àï°£¶û¡¤°¢Ëþ¶û°ì¹«ÊÒµÄÒ»·ÝÉêÃ÷ÈϿɣ¬½ØÖÁÖÜÈÕÍí¼ä£¬Ò»Ð©ÍøÕ¾ÒÑÏÝÈëÀ§¾³£¬²¢Ìáµ½ÁËǰËùδÓеÄÇ¿¶ÈµÄͨÀý¹¥»÷¡£¸Ã˵»°ËƺõÖ¸µÄÊÇÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¬¶ø Cloudflare µÄRadar·þÎñ¸ÕºÃ¼ì²âµ½ÁË´ËÀ๥»÷¡£Cloudflare »ã±¨³Æ£¬¸ÃÊÂÎñÓÚÖÜÈÕÁ賿ÆðÍ·£¬Ñ¸¿ìÉý¼¶£¬¶ÌÔÝÏûÍË£¬¶øºóÓÖ¾íÍÁ³ÁÀ´£¬³ÖÐøÁËԼĪÁù¸öÓ×ʱµÄ³Á´ó¹¥»÷¡£·¨¹úµÄÊý×Ö»¯×ªÐÍ»ú¹¹¡ª¡ª²¿¼ÊÊý×ÖÀíÊ»á (DINUM) ÕùÏȿֺóµØÉèÖÃ×è°­À´Õмܹ¥»÷¡£ÄäÃûËÕµ¤Ðû³Æ¶ÔÕâ´ÎÏ®»÷ÕÆ¹Ü£¬¶øºóÐû³ÆDINUM µÄ·ÀÓùÎÞЧ£¬×ÌÈÅÈÔÔÚ³ÖÐø¡£Cloudflare µÄÊý¾ÝÏÔʾ£¬µÚ 7 ²ã¹¥»÷ÔÚÖÜÒ»ºÍÖܶþ¼¤Ôö¡£ÕâÖÖ²»Âú¿ÉÄÜ»¹»á³ÖÐøÏÂÈ¥¡£Cloudflare µÄ Radar ÉÏÖܻ㱨Á˹æÄ£½ÏÓ×µÄ DDoS ¹¥»÷£¬µ«ÕâЩ¹¥»÷²¢Î´³ÉΪÐÂÎÅ£¬Ò²Ã»ÓÐÑϳÁÇÖÈÅ·¨¹úµ±¾ÖµÄÔË×÷¡£¾Ý±¨Â·£¬ÉÏÖÜÈÕµÄÏ®»÷Ó°ÏìÁË×ÜÀí¸®¡¢Ãñº½¾ÖºÍ¾­¼Ã²¿¡£


https://www.theregister.com/2024/03/12/france_ddos/


2. KrustyLoader ºóÃŹ¥»÷ Windows ºÍ Linux ϵͳ


3ÔÂ12ÈÕ£¬ÍøÂ簲ȫÁìÓòµÄ×îз¢Õ¹Ô̺¬ KrustyLoader µÄ³öÏÖ£¬ÕâÊÇÒ»ÖÖ»ùÓÚ Rust µÄ¸´ÔÓºóÃÅ£¬ÒýÆðÁ˶à¸öÐÐҵר¼ÒÈ·°ÑÎÈ¡£ÕâÖÖ¶ñÒâÈí¼þÕ¼ÓÐ Windows ºÍ Linux ±äÌ壬É漰һϵÁÐÓÐÕë¶ÔÐԵĹ¥»÷£¬¶Ô¿çƽ̨µÄÍøÂ簲ȫ·ÀÓù²úÉú³Á´óÓ°Ïì¡£KrustyLoader µÄLinux ±äÌåÒòÆäÕë¶Ô Avanti É豸µÄÕë¶ÔÐÔ¹¥»÷¶øÔÚ 2023 Äêµ×ºÍ 2024 ËêÊ׳ÉΪͷÌõÐÂÎÅ¡£ÕâЩ¹¥»÷±»ÒÔΪÊÇÖйú¹ØÏµÍþв×éÖ¯ UNC5221 ËùΪ¡£¸Ã×éÖ¯ÀûÓÃÁËÁ½¸öÑϳÁ·ì϶CVE- 2024-21887ºÍCVE-2023-46805£¬ÔÊÐíÔÚ Ivanti Connect Secure (ICS) ºÍ Ivanti Policy Secure Gateway É豸ÉϽøÐÐδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐ (RCE) »òÉí·ÝÑéÖ¤ÈÆ¹ý¡£ÀûÓÃÕâЩ·ìÏ¶ÍÆ½øÁË KrustyLoader µÄÏÂÔØºÍÖ´ÐУ¬Ëæºó²¿ÊðÁËÀûÓú󹤾߰ü Sliver¡£Ö»¹ÜÕë¶ÔÕâЩ·ì϶°ä²¼Á˲¹¶¡£¬µ«Î´½¨²¹µÄϵͳÒÀÈ»Ãæ¶Ô·çÏÕ¡£


https://gbhackers.com/krustyloader-backdoor/


3. Infostealer ¼Ù×°³É Adobe Reader ×°Ö÷¨Ê½


3ÔÂ12ÈÕ£¬AhnLab °²È«µý±¨ÖÐÐÄ (ASEC) ×î½ü·¢ÏÖÁ˼Ù×°³É Adobe Reader ×°Ö÷¨Ê½µÄÐÅÏ¢ÇÔÈ¡·¨Ê½µÄÉ¢²¼¡£Íþв²Î¼ÓÕßÒÔ PDF ´ó¾Ö·Ö·¢Îļþ£¬ÌáÐÑÓû§ÏÂÔØ²¢ÔËÐиÃÎļþ¡£¼ÙðµÄPDFÎļþÊÇÓÃÆÏÌÑÑÀÓï±àдµÄ£¬ÐÂÎÅ֪ͨÓû§ÏÂÔØ²¢×°ÖÃAdobe Reader¡£Í¨¹ý֪ͨÓû§±ØÒª Adobe Reader ÄÜÁ¦´ò¿ª¸ÃÎļþ£¬Ëü»áÌáÐÑÓû§ÏÂÔØ¶ñÒâÈí¼þ²¢½øÐÐ×°Öá£ÏÂÔØµÄÎļþѡȡAdobe Readerͼ±êµÄ´ó¾Ö£¬ÆäÃû³ÆÉèÖÃΪReader_Install_Setup.exe¡£Í¨¹ý¼Ù×° Adobe Reader ×°Ö÷¨Ê½£¬Ëü»áÌáÐÑÓû§ÔËÐÐËü¡£Ä¬ÈÏÇé¿öÏ£¬Windows ϵͳ½«õè¾¶¡°%AppData%\Local\Microsoft\WindowsApps¡±×¢²áΪ PATH »·¾³±äÁ¿¡£Òò¶ø£¬µ± sdiagnhost.exe ¹ý³Ì¼ÓÔØ BluetoothDiagnosticUtil.dll ʱ£¬¾Í»á¼ÓÔØ¶ñÒâ DLL Îļþ¡£Í¨¹ýÉÏÊö¹ý³Ì£¬Íþв²Î¼ÓÕßÄܹ»Í¨¹ý DLL ½Ù³ÖÈÆ¹ýÓû§ÕÊ»§½ÚÔì (UAC)¡£


https://asec.ahnlab.com/en/62853/


4. Equilend ÖÒ¸æÔ±¹¤ËûÃǵÄÊý¾Ý±»ÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡


3ÔÂ11ÈÕ£¬×ܲ¿Î»ÓÚŦԼµÄ֤ȯ½è´ûƽ̨ EquiLend Holdings ÔÚ·¢¸øÔ±¹¤µÄÊý¾Ýй¶֪ͨÐÅÖÐ֤ʵ£¬ËûÃǵÄÊý¾ÝÔÚ 1 Ô·ݵÄÀÕË÷Èí¼þ¹¥»÷Öб»µÁ¡£Õâ¼Ò½ðÈڿƼ¼¹«Ë¾ÓÚ 1 Ô 24 ÈÕ֪ͨ BleepingComputer£¬Ëü±»ÆÈÔÚÁ½Ììǰ£¨¼´ 1 Ô 22 ÈÕ£©¹Ø¹Ø²¿ÃÅϵͳ£¬ÒÔ¶ôÔìÎ¥¹æÐÐΪ¡£¹ÌÈ» Equilend ûÓе±¼´Åû¶ÊÂÎñµÄÐÔÖÊ£¬µ« LockBit ÀÕË÷Èí¼þÔÚ¸øÅí²©ÉçµÄÒ»·ÝÉêÃ÷ÖÐÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£Ö»¹ÜÕâ¼Ò½ðÈڿƼ¼¹«Ë¾Ã»ÓÐ֤ʵ LockBit µÄ˵·¨£¬µ«ËüÓÚ 2 Ô 2 ÈÕͨ¹ýÒ»¸öרÃÅÒ³ÃæÐ¹Â©ÁËÓйظÃÊÂÎñµÄ¸ü¶àÐÅÏ¢£¬³Æ 1 Ô·ݵÄй¶ÊÇÓÉÀÕË÷Èí¼þ¹¥»÷Ôì³ÉµÄ¡£


https://www.bleepingcomputer.com/news/security/equilend-warns-employees-their-data-was-stolen-by-ransomware-gang/#google_vignette


5. BIANLIAN ÔÚÀÕË÷¹¥»÷ÖÐÀûÓà JETBRAINS TEAMCITY ·ì϶


3ÔÂ11ÈÕ£¬GuidePoint Security µÄ×êÑÐÈËÔ±ÔÚµ÷²é×î½üÓëBianLianÀÕË÷Èí¼þ×éÖ¯ÓйصĹ¥»÷ʱ°ÑÎȵ½£¬ÍþвÐÐΪÕßͨ¹ýÀûÓà TeamCity ·þÎñÆ÷ÖеÄȱµã»ñµÃÁ˶ÔÖ¸±êµÄ³õʼ½Ó¼ûȨÏÞ¡£BianLian ÀÕË÷Èí¼þÓÚ 2022 Äê 8 Ô³öÏÖ£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÀ´¹¥»÷¸÷¸öÐÐÒµµÄ×éÖ¯£¬Ô̺¬Ôì×÷¡¢Ã½ÌåºÍÓéÀÖÒÔ¼°Ò½ÁƱ£½¡¡£2023 Äê 1 Ô£¬°²È«¹«Ë¾ Avast°ä²¼ÁËBianLian ÀÕË÷Èí¼þµÄÃâ·Ñ½âÃÜÆ÷£¬ÔÊÐí¶ñÒâÈí¼þµÄÊܺ¦Õ߸´Ô­Ëø¶¨µÄÎļþ¡£×êÑÐÈËÔ±µ÷²éµÄ¹¥»÷±³ºóµÄÍþвÐÐΪÕßÀûÓà TeamCity ȱµã CVE-2024-27198 »ò CVE-2023-42793 À´»ñµÃ¶ÔÊܺ¦Õß»·¾³µÄ³õʼ½Ó¼ûȨÏÞ¡£¹¥»÷ÕßÔÚÒ×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏ´´½¨ÐÂÓû§²¢Ö´ÐжñÒâºÅÁîÒÔ½øÐкóÀûÓúͺáÏòÒÆ¶¯¡£¶øºó£¬ÍþвÐÐΪÕßÔÚÖ¸±ê»·¾³Öз¢ÏÖÁËÁ½¸ö¹¹½¨·þÎñÆ÷£¬ËûÃÇ´ÓÕâЩ·þÎñÆ÷À©´óÁËÔÚÊܺ¦Õß×éÖ¯ÖеݲÉíµã£¬²¢×ªÏò½øÒ»²½ÀûÓá£×êÑÐÈËÔ±°ÑÎȵ½£¬BianLian ×éÖ¯ÂŴγ¢ÊÔÖ´ÐÐËûÃǵÄ×Ô½ç˵ GO ºóÃÅ£¬µ«¶¼Ê§°ÜÁË£¬¶øºóתÏò¿¿µØÆ¤ÎªÉú£¬²¢ÀûÓà PowerShell ʵÏÖËûÃǵĺóÃÅ¡£


https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html?web_view=true


6. ÐÂÒøÐÐľÂí CHAVECLOAK ͨ¹ýÍøÂç´¹µöÕ½Êõ¶Ô×¼°ÍÎ÷Óû§


3ÔÂ11ÈÕ£¬°ÍÎ÷µÄÓû§ÊÇÒ»ÖÖÃûΪCHAVECLOAKµÄÐÂÐÍÒøÐÐľÂíµÄÖ¸±ê£¬¸ÃľÂíͨ¹ý´øÓÐ PDF ¸½¼þµÄÍøÂç´¹µöµç×ÓÓʼþ½øÐд«²¼¡£Fortinet FortiGuard ³¢ÊÔÊÒ×êÑÐÔ± Cara Lin°µÊ¾£º¡°ÕâÖÖ¸´ÔӵĹ¥»÷Éæ¼° PDF ÏÂÔØ ZIP Îļþ£¬¶øºóÀûÓà DLL ²àÃæ¼ÓÔØ¼¼ÊõÀ´Ö´ÐÐ×îÖյĶñÒâÈí¼þ¡£¡±¹¥»÷Á´É漰ʹÓÃÒÔºÏͬΪÖ÷ÌâµÄ DocuSign µö¶üÀ´ÓÕÆ­Óû§´ò¿ªÔ̺¬ÓÃÓÚÔĶÁºÍÇ©ÊðÎĵµµÄ°´Å¥µÄ PDF Îļþ¡£ÏÖʵÉÏ£¬µ¥»÷¸Ã°´Å¥»áµ¼Ö´ÓʹÓà Goo.su URL Ëõ¶Ì·þÎñËõ¶ÌµÄÔ¶³ÌÁ´½Ó¼ìË÷×°Ö÷¨Ê½Îļþ¡£×°Ö÷¨Ê½ÖдæÔÚÒ»¸öÃûΪ¡°Lightshot.exe¡±µÄ¿ÉÖ´ÐÐÎļþ£¬ËüÀûÓà DLL ²àÃæ¼ÓÔØÀ´¼ÓÔØ¡°Lightshot.dll¡±£¬ÕâÊÇÒ»ÖÖÓÐÖúÓÚÇÔÈ¡Ãô¸ÐÐÅÏ¢µÄ CHAVECLOAK ¶ñÒâÈí¼þ¡£ÕâÔ̺¬ÍøÂçϵͳԪÊý¾Ý²¢ÔËÐв鳭ÒÔÈ·¶¨ÊÜϰȾµÄÍÆËã»úÊÇ·ñλÓÚ°ÍÎ÷£¬ÈôÊÇÊÇ£¬Ôò¶¨ÆÚ¼à¶½Ç°Ì¨´°¿ÚÒÔ½«ÆäÓëÒøÐÐÓйØ×Ö·û´®µÄÔ¤Ô¼ÒåÁÐ±í½øÐбÈÁ¦¡£


https://thehackernews.com/2024/03/new-banking-trojan-chavecloak-targets.html