Turla APT ºÚ¿ÍÀûÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯

°ä²¼¹¦·ò 2024-04-12
1. Turla APT ºÚ¿ÍÀûÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯


4ÔÂ11ÈÕ£¬ÍøÂ簲ȫר¼Ò·¢ÏÖ£¬¶íÂÞ˹Turla¸ß¼¶³ÖÐøÍþв (APT) ×é֝ɸÈëµ½°¢¶û°ÍÄáÑǵÄÒ»´Îʧ°Ü³¢ÊÔ¡£´ËÊÂÎñÊÇÕë¶ÔÅ·ÖÞ¹ú¶ÈµÄ¸ü¿í·ºÍøÂç¼äµý»î¶¯µÄÒ»²¿ÃÅ£¬²¨À¼Ò²³ÉΪÕâЩ¸´ÔÓ¹¥»÷µÄÊܺ¦Õß¡£ÕâÒ»·¢ÏÖÓë³ÖÐøµÄµØÔµÕþÖÎÑÏÖØ´óÊÆÏàÒ»Ö£¬²¢Í¹ÏÔÁ˹ú¶ÈͬÃËÐÐΪÕß²»ÐÝÉý¼¶µÄÍøÂçÕ½Õ½Êõ¡£Turla APT ×éÖ¯ÒÔÆä¸´ÔÓµÄÍøÂç¼äµý»î¶¯¶øÎÅÃû£¬´ÓÀ´ÒÔÓ벨Â޵ĺ£ºÍ¶«Å·¹ú¶Èµ±²¿ÃÅÃÅÓÐÁªÏµµÄ×é֯Ϊָ±ê¡£×î½üÔÚ°¢¶û°ÍÄáÑǺͲ¨À¼µÄ»î¶¯Í»ÏÔÁ˸Ã×éÖ¯ÔÚÎÚ¿ËÀ¼Õ½ÕùµÄ¸ü¿í·º²¼¾°Ï²»ÐÝÖÂÁ¦ÍøÂçµý±¨²¢Ê©¼ÓÓ°Ïì¡£


https://gbhackers.com/cyber-espionage-turla-apt-hackers-attack-european-organization-with-backdoor/


2. TA547 ÀûÓÃÒÉËÆ AI ÌìÉúµÄ Rhadamanthys ¶Ô×¼µÂ¹ú


4ÔÂ10ÈÕ£¬ÔÚProofpoint×î½üÆØ¹âµÄÒ»´ÎºÚ¿Í»î¶¯ÖÐÖ®ºó£¬µÂ¹ú×éÖ¯Ãæ¶Ô¶à·½ÃæµÄ¹¥»÷¡£³öÓÚ¾­¼Ã¶¯»úµÄ×éÖ¯ TA547 ³õ´Î²¿ÊðÁË Rhadamanthys ÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬Õâ±ê־ȡËûÃǹßÓÃÕ½ÊõµÄת±ä¡£ÓÐȤµÄÊÇ£¬ºÚ¿Í¿ÉÄÜ´ÓÒ»¸öÒâÏë²»µ½µÄÆðÔ´¡ª¡ªÈËΪÖÇÄÜ¡ª¡ªÄÇÀïµÃµ½ÁËÔ®ÊÖ¡£¸Ã»î¶¯µÄ»ùʯÊDz¿ÊðRhadamanthys£¬ÕâÊÇÒ»ÖÖÔÚ TA547 µÄ±øÆ÷¿âÖÐÒÔÇ°Î´Ôø¼û¹ýµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£ÕâÖÖ¶ñÒâÈí¼þÒÔÆäЧÁ¦ºÍÔÚÍøÂç·¸×ïȦ×ÓÖÐµÄ¿í·ºÊ¹ÓöøÎÅÃû£¬±ê־ȡ TA547 ÔËÓªÕ½ÊõµÄÕ½ÊõÖ§µã¡£¹¥»÷Õß¼Ù×°³ÉÀ´×Ե¹ú³ÛÃûÁãÊÛ¾ÞÍ· Metro µÄͨѶ£¬¾Ý³ÆÓ뷢ƱÓйØ¡£


https://securityonline.info/ta547-targets-germany-with-rhadamanthys-suspected-ai-generated-code/


3. Raspberry Robin ʹÓà Windows ¾ç±¾Îļþ½øÐд«²¼


4ÔÂ10ÈÕ£¬Raspberry Robin ÊÇÒ»ÖÖÊÊÓ¦ÐÔÇ¿¡¢¶ã±ÜÐÔÇ¿µÄÈ䳿ºÍ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½£¬ÓÚ 2021 Äê³õ´Î³Ê´Ë¿ÌÍøÂçÍþв³¡¾°ÖУ¬´Ë¿ÌÔÚʹÓÃÒ»ÖÖв½ÖèÀ´´«²¼Æä¶ñÒâ´úÂ롣ƾ¾Ý HP Wolf Security Íþв×êÑÐÈËÔ±±¾Öܰ䲼µÄÒ»·Ý»ã±¨£¬ÉϸöÔ¼ì²âµ½µÄÒ»ÏîлÅú×¢ Raspberry Robin ±³ºóµÄÔËÓªÉÌÔÚʹÓöñÒâ Windows ¾ç±¾Îļþ(WSF) À´´«²¼Æä¶ñÒâÈí¼þ£¬ÕâÓëËûÃǸüÆÕ±éµÄʹÓò½Öè·ÖÆç¡£×î½ü£¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ýʹÓà Discord ÐÂÎÅ·þÎñÒÔ¸½¼þ´ó¾Ö·¢Ë͵Ĵ浵ÎļþÏÂÔØ£¨½«×ÔÉí¼Ù×°³ÉºÏ·¨ÇÒÒÑÊðÃûµÄ Windows ¿ÉÖ´ÐÐÎļþ£©ÒÔ¼°Í¨¹ýÖ¸±ê Web ä¯ÀÀÆ÷ÏÂÔØµÄ 7-Zip ´æµµ½øÐд«²¼¡£


https://securityboulevard.com/2024/04/raspberry-robin-malware-now-using-windows-script-files-to-spread/


 4. Spectre v2 ¹¥»÷Ó°Ïì Intel CPU É쵀 Linux ϵͳ

 

4ÔÂ10ÈÕ£¬Spectre V2 Êǰ¢Ä·Ë¹Ìص¤×ÔÓÉ´óѧ VUSec Ó××éµÄÒ»×é×êÑÐÈËÔ±·¢ÏÖµÄԭʼ Spectre ¹¥»÷µÄбäÌå¡£×êÑÐÈËÔ±»¹°ä²¼ÁËÒ»¸ö¹¤¾ß£¬¸Ã¹¤¾ßʹÓ÷ûºÅÖ´ÐÐÀ´¼ø±ð Linux ÄÚºËÖпÉÀûÓõĴúÂë¶Î£¬ÒÔÔ®ÊÖ»º½âÎÊÌâ¡£Õâһз¢ÏÖÇ¿µ÷ÁËÆ½ºâ»úÄÜÓÅ»¯Ó밲ȫÐÔµÄÌôÕ½£¬ÕâʹµÃ½â¾ö¸ù»ùµÄ CPU ȱµã±äµÃ¸´ÔÓ£¬¼´±ãÊÇÔÚ Spectre ·¢ÏÖÁùÄêºó ¡£Ó¢Ìضû»¹¸üÐÂÁËÕë¶Ô Spectre v2 µÄ»º½â½¨Ò飬´Ë¿Ì½¨Òé½ûÓ÷ÇÌØÈ¨À©´ó²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷ (eBPF) Ö°ÄÜ£¬ÆôÓüÓÇ¿Ðͼä½Ó·ÖÖ§ÏÞ¶È´§Ä¦ (eIBRS)£¬²¢ÆôÓÃÖÎÀíԱģʽִÐб£»¤ (SMEP)¡£

 

https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/


5. RUBYCARP SSH ±©Á¦½©Ê¬ÍøÂçͨ¹ýй¤¾ß»Ø¹é


4ÔÂ10ÈÕ£¬ÓÉÓÚÒÔ SSH ±©Á¦¹¥»÷¶øÎÅÃûµÄ³ôÃûÔ¶ÑïµÄ½©Ê¬ÍøÂç×éÖ¯ RUBYCARP ƾ½èÐµĹ¤¾ßºÍÕ½Êõ³ÁгöÏÖ£¬ÍøÂ簲ȫÉçÇøÔٴδ¦Óڸ߶Ⱦ¯Ìè״̬¡£Sysdig Íþв×êÑÐÍÅ¶Ó (Sysdig TRT) Ò»ÏòÔÚÇ×êǼලÕâ¸öÂÞÂíÄáÑÇÍþв×éÖ¯µÄ»î¶¯£¬¸Ã×éÖ¯ÒѾ­»îÔ¾ÁËÊ®¶àÄ꣬×î½ü·¢ÏÔìäÐж¯³öÏÖÁ˳ÁÃͽøÕ¹¡£RUBYCARP »Ø¸´µÄÖ÷ÌâÊÇÀûÓà Laravel ÀûÓ÷¨Ê½ÖеÄÒ»¸ö¹Ø¼ü·ì϶ CVE-2021-3129¡£´Ë·ì϶һÏòÊǸÃ×éÖ¯µÄÖ¸±êºÍÀûÓù¤×÷µÄ½¹µã£¬Ê¹ËûÃÇ¿ÉÄÜ»ñµÃ¶ÔϵͳµÄδ¾­ÊÚȨµÄ½Ó¼û²¢À©´óÆä½©Ê¬ÍøÂç¡£³ýÁËÀûÓà CVE-2021-3129 Ö®±í£¬RUBYCARP »¹Ê¹ÓÃSSH ±©Á¦¹¥»÷½øÈëÖ¸±êÍøÂç¡£¸Ã×éÖ¯µÄ¶ÔÖźÍÕ½ÊõµÄÑݱäÇ¿µ÷Á˽¨²¹ÒÑÖª·ì϶ºÍ¼ÓÇ¿ SSH °²È«´ëÊ©ÒÔ×èÖ¹´ËÀ๥»÷µÄ³ÁÒªÐÔ¡£Sysdig TRT µÄ×îз¢ÏÖÅú×¢£¬RUBYCARP ²»½ö³ÖÐøÆä´«Í³µÄ±©Á¦ÆÆ½âºÍÀûÓû£¬²¢ÇÒ»¹Ôö³¤ÁËм¼Êõ¡£


https://gbhackers.com/rubycarp-ssh-brute-botnet/


6. Ð嵀 SharePoint ¼¼Êõ¿ÉÈúڿÍÈÆ¹ý°²È«´ëÊ©


4ÔÂ10ÈÕ£¬SharePoint Öз¢ÏÖµÄÁ½ÖÖм¼Êõʹ¶ñÒâÐÐΪÕß¿ÉÄÜÈÆ¹ý´«Í³°²È«´ëÊ©²¢ÔÚ²»´¥·¢³ß¶È¼ì²â»úÔìµÄÇé¿öÏÂй¼ûô¸ÐÊý¾Ý¡£·¸·¨ÎļþÏÂÔØ¿ÉÄÜ»á¼Ù×°³ÉÎÞº¦µÄ»î¶¯£¬Ê¹ÍøÂ簲ȫ·ÀÓù´ëÊ©ÄÑÒÔ¼ì²âµ½ËüÃÇ¡£µÚÒ»ÖÖ¼¼Êõ±»³ÆÎª¡°ÔÚÀûÓ÷¨Ê½Öдò¿ª²½Ö衱£¬ËüÀûÓÃÁË SharePoint Ö°ÄÜ£¬¸ÃÖ°ÄÜÔÊÐíÓû§Ö±½ÓÔÚ¹ØÁªµÄÀûÓ÷¨Ê½Öдò¿ªÎĵµ¡£¹ÌÈ»Õâ¸öÖ°ÄÜÊÇΪÁË·½±ãÓû§¶øÉè¼ÆµÄ£¬µ«È´ÎÞÒâÖÐÔì³ÉÁËÊý¾Ýй¶µÄ·ì϶¡£¹¥»÷ÕßÄܹ»Ê¹ÓôËÖ°Äܵĵײã´úÂëÀ´½Ó¼ûºÍÏÂÔØÎļþ£¬Ö»ÔÚÎļþµÄÉóºËÈÕÖ¾ÖÐÁôϽӼûÊÂÎñ¡£µÚ¶þÖÖ¼¼ÊõÉæ¼°¶Ô Microsoft SkyDriveSync£¨´Ë¿Ì³ÆÎª OneDrive£©µÄÓû§´úÀí×Ö·û´®µÄ²Ù×÷¡£Í¨¹ý¼Ù×°³Éͬ²½¿Í»§¶Ë£¬¹¥»÷ÕßÄܹ»ÏÂÔØÎļþÉõÖÁÕû¸öSharePointÍøÕ¾¡£ÕâЩÏÂÔØ±»ÃýÎóµØÏóÕ÷ΪÎļþͬ²½ÊÂÎñ¶ø²»ÊÇÏÖʵÏÂÔØ£¬´Ó¶øÈƹýÁËÖ¼ÔÚ¼ì²âºÍ¼Í¼ÎļþÏÂÔØµÄ°²È«´ëÊ©¡£ÕâÖÖ²½Öè³ö¸ñÒõÏÕ£¬ÓÉÓÚËü¿ÉÓÃÓÚ´ó¹æÄ£ÇÔÈ¡Êý¾Ý£¬²¢ÇÒͬ²½¼Ùװʹ°²È«¹¤¾ß¸üÄÑÒÔ·Ö±æºÏ·¨»î¶¯ºÍ¶ñÒâ»î¶¯¡£


https://gbhackers.com/sharepoint-technique-bypas/