ºÚ¿ÍÀûÓÃCR4TºóÃŶÔ×¼Öж«µØÓòÈ·µ±¾Ö»ú¹¹
°ä²¼¹¦·ò 2024-04-224ÔÂ20ÈÕ£¬CR4T£¨¡°CR4T.pdb¡±£©ÊÇÒ»ÖÖ»ùÓÚ C/C++ µÄ´¿ÄÚ´æÖ²È뷨ʽ£¬ÔÊÐí¹¥»÷Õß½Ó¼û½ÚÔį̀£¬ÒÔ±ãÔÚÊÜϰȾµÄÍÆËã»úÉÏÖ´ÐкÅÁîÐÓ×¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°ÔÚÁªÏµ C2 ·þÎñÆ÷ºóÉÏ´«ºÍÏÂÔØÎļþ¡£¿¨°Í˹»ù°µÊ¾£¬Ëü»¹·¢ÏÖÁËÓµÓÐÒ»ÑùÖ°ÄÜµÄ Golang °æ±¾µÄ CR4T£¬´Ë±í»¹ÓµÓÐÖ´ÐÐËÁÒâºÅÁîºÍʹÓÃGo-ole ¿â´´½¨´òË㹤×÷µÄÄÜÁ¦¡£×î³ÁÒªµÄÊÇ£¬Golang CR4T ºóÃÅÄܹ»ÀûÓÃCOM ¶ÔÏó½Ù³Ö¼¼ÊõʵÏÖÓÆ¾ÃÐÔ£¬²¢ÀûÓà Telegram API ½øÐÐ C2 ͨѶ¡£¶íÂÞË¹ÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù°µÊ¾£¬ËüÓÚ 2024 Äê 2 Ô·¢ÏÖÁ˸û£¬ÓÐÖ¤¾ÝÅú×¢¸Ã»î¶¯¿ÉÄÜÖÁÉÙ´ÓÒ»Äêǰ¾ÍÆðÍ·»îÔ¾¡£¸Ã»î¶¯µÄ´úºÅΪDuneQuixote¡£Golang ±äÌåµÄ´æÔÚÅú×¢£¬DuneQuixote ±³ºóµÄÉí·Ý²»Ã÷µÄÍþв²Î¼ÓÕßÔÚ»ý¼«ÀûÓÃ¿çÆ½Ì¨¶ñÒâÈí¼þ¸Ä½øËûÃǵĹ¥»÷·½Ê½¡£
https://thehackernews.com/2024/04/hackers-target-middle-east-governments.html
2. Frontier Communications ÔÚÍøÂç¹¥»÷ºó¹Ø¹ØÏµÍ³
4ÔÂ20ÈÕ£¬µçОÞÍ· Frontier Communications ÒÑ֪ͨÃÀ¹ú֤ȯÂòÂôίԱ»á (SEC)£¬Ä³Ð©ÏµÍ³ÔÚÍøÂç¹¥»÷ºó±»¹Ø¹Ø¡£¸ÃÊÂÎñÊÇÔÚ 4 Ô 14 ÈÕ·¢Ïֵ쬯äʱµÚÈý·½¡°Î´¾ÊÚȨ½Ó¼ûÁËÆä²¿ÃÅÐÅÏ¢¼¼Êõ»·¾³¡£Frontier °µÊ¾£¬Ëüµ±¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬²¢²ÉÈ¡´ëÊ©½ÚÔìÊÂÎñ£¬Ô̺¬¹Ø¹ØÄ³Ð©ÏµÍ³£¬Õâ¡°µ¼ÖÂÁË¿ÉÄܱ»ÊÓΪ³Á´óµÄÔËÓªÖжϡ±¡£¾Ý Frontier ³Æ£¬Õâ´Î¹¥»÷ºÜ¿ÉÄÜÊÇÒ»¸öÍøÂç·¸×ï×éÖ¯ËùΪ£¬¸Ã×éÖ¯»ñµÃÁ˸÷ÖÖÀàÐ͵ÄÊý¾Ý£¬Ô̺¬Ó×ÎÒÉí·ÝÐÅÏ¢¡£¸Ã¹«Ë¾»¹Ö¸³ö£¬ËüÒÑ֪ͨ·¨Âɲ¿ÃÅ£¬¸ÃÊÂÎñ¿ÉÄܲ»»á¶ÔÆä²ÆÕþÇé¿ö»òÔ˽»Ò×¼¨²úÉú³Á´óÓ°Ïì¡£¹ÌÈ» Frontier ûÓÐ×¢Ã÷ËüÔâ·êÁËÄÄÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬µ«ºÜ¿ÉÄÜÉæ¼°Îļþ¼ÓÃÜÀÕË÷Èí¼þ£¬ÓÉÓڹعØÏµÍ³ÊǶÔÀÕË÷Èí¼þµÄµäÐÍÏìÓ¦¡£Õâ¼ÒµçОÞÍ·»¹ÔÚÆäÍøÕ¾Éϰ䲼ÁË֪ͨ£¬·î¸æ½Ó¼ûÕßËüÔÚ¾Àú¡°GA»Æ½ð¼×ÄÚ²¿Ö§³ÖϵͳµÄ¼¼ÊõÎÊÌ⡱¡£¿Í»§µÄ»¥ÁªÍø·þÎñ²¢Î´Êܵ½¹¥»÷µÄÓ°Ï죬µ«½öͨ¹ýµç»°ÌṩԮÊÖ¡£
https://www.securityweek.com/frontier-communications-shuts-down-systems-following-cyberattack/
3. ½áºÏ¹ú¿ª·¢´òËãÊð (UNDP) µ÷²éÆäÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ
4ÔÂ21ÈÕ£¬½áºÏ¹ú¿ª·¢´òËãÊð (UNDP) ÔÚµ÷²éÍþвÐÐΪÕßÈëÇÔìä IT ϵͳÇÔÈ¡ÈËÁ¦×ÊÔ´Êý¾Ýºó²úÉúµÄÍøÂç¹¥»÷¡£½áºÏ¹ú¿ª·¢´òËãÊðÊǽáºÏ¹úµÄÈ«Çò·¢Õ¹ÍøÂ磬ÔÚ 170 ¶à¸ö¹ú¶ÈºÍµØÓò·¢Õ¹¹¤×÷£¬ÒÀ¸½½áºÏ¹ú³ÉÔ±¹úºÍ˽Ӫ²¿ÃÅ/¶à±ß×éÖ¯µÄ¾è¿îÀ´Ô®ÊÖ½â³ýÇîÀ§¡¢½â³ý²»Æ½µÈºÍÇãÔþ¡£3 Ô 27 ÈÕ£¬¿ª·¢ÊðÊÕµ½Íþвµý±¨Í¨Öª£¬³ÆÒ»ÃûÊý¾ÝÀÕË÷ÕßÇÔÈ¡ÁËÊý¾Ý£¬ÆäÖÐÔ̺¬Ä³Ð©ÈËÁ¦×ÊÔ´ºÍ²É¹ºÐÅÏ¢£¬½áºÏ¹ú¿ª·¢´òËãÊðĿǰÔÚµ÷²é¸ÃÊÂÎñµÄÐÔÖʺÍÁìÓò£¬²¢ÆÀ¹ÀÕâ´Î¹¥»÷¶ÔÐÅÏ¢±»µÁÓ×ÎÒµÄÓ°Ïì¡£Ëü»¹ÏòÊܸ÷ì϶ӰÏìµÄÈË·¢³ö¾¯±¨£¬Ä¿Ç°ÔÚÓëËûÃǺÏ×÷£¬ÒÔ±ãËûÃÇ¿ÉÄܱ£»¤×Ô¼ºµÄÓ×ÎÒÐÅÏ¢ÃâÔâÀÄÓ᣹ÌÈ»½áºÏ¹ú»ú¹¹ÉÐ佫Õâ´Î¹¥»÷ÓëÌØ¶¨Íþв×éÖ¯ÁªÏµÆðÀ´£¬µ« 8Base ÀÕË÷Èí¼þÍÅ»ïÓÚ 3 Ô 27 ÈÕÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÔö³¤ÁËÐ嵀 UNDP Ìõ¿î¡£¹¥»÷Õß°µÊ¾£¬ËûÃǵIJÙ×÷Ô±ÔÚй¶ÆÚ¼äÉ跨й¶µÄÎļþÔ̺¬´óÁ¿Ãô¸ÐÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/united-nations-agency-investigates-ransomware-attack-claimed-by-8Base-gang/
4. MITRE Ôâ·êÍøÂç¹¥»÷£¬ºÚ¿ÍÀûÓà Ivanti ÁãÈÕ·ì϶
4ÔÂ19ÈÕ£¬ÍøÂ簲ȫ×êÑкͿª·¢ÁìÓòÈ·µ±ÏÈ×éÖ¯ MITRE ×î½üÅû¶ÁËһ·¸´ÔÓµÄÍøÂç·ì϶£¬Í¹ÏÔÁËÏÖ´úÍøÂçÍþв²»ÐÝÑݱäµÄÐÔÖÊÒÔ¼°Ç¿ÓÐÁ¦µÄÍøÂ簲ȫ´ëÊ©µÄ³ÁÒªÐÔ¡£¸ÃÊÂÎñÓÚ 2024 Äê 4 Ôµõ½Ö¤Êµ£¬Éæ¼° MITRE µÄÍøÂç³¢ÊÔ¡¢×êÑкÍÐé¹¹»¯»·¾³ (NERVE) µÄй¶£¬NERVE ÊÇÒ»¸öÓÃÓÚ×êÑÓ×¢¿ª·¢ºÍÔÐÍÉè¼ÆµÄºÏ×÷ÍøÂç¡£ÔÚ¼ì²âµ½¿ÉÒɻºó£¬MITRE µ±¼´²ÉÈ¡Ðж¯½ÚÔìÊÂÎñ£¬Ô̺¬Ê¹ NERVE »·¾³ÏÂÏߣ¬²¢ÔÚÄÚ²¿ºÍµ±ÏȵĵÚÈý·½×¨¼ÒµÄÖ§³ÖÏ·¢Õ¹µ÷²é¡£¼ì²âµ½·ì϶ºó£¬MITRE ÁªÏµÁ˵±¾Ö£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¸÷·½£¬²¢ÔÚÖÂÁ¦¸´ÔÒÔ°²È«·½Ê½½øÐкÏ×÷µÄ²Ù×÷´úÌæ¹æ»®¡£µ÷²éÔÚ½øÐÐÖУ¬ÒÔÈ·¶¨¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢ÁìÓò¡£¸Ã¹«Ë¾³ÐÅµËæ×ŵ÷²éµÄ³ÖÐøºÍʵÏÖ£¬·ÖÏí¸ü¶àÐÅÏ¢¡£Ëæ×ŵ÷²éÔÚ½øÐÐÖУ¬MITREÌáµ½£¬Ã»Óм£ÏóÅú×¢MITREµÄÖ÷ÌâÆóÒµÍøÂç»òºÏ×÷ͬ°éµÄϵͳÊܵ½´ËÊÂÎñµÄÓ°Ïì¡£
https://www.cyberkendra.com/2024/04/mitre-suffers-cyber-breach-hacker.html#google_vignette
5. MadMxShell ÒÔ IT ÍŶÓΪָ±ê·¢Õ¹¶ñÒâ¸æ°×»î¶¯
4ÔÂ21ÈÕ£¬ÔÚÍøÂç¹¥»÷²»ÐÝÑݱäµÄ²¼¾°Ï£¬Ð·¢ÏÖµÄÃûΪ¡°MadMxShell¡±µÄºóÃÅ¶Ô IT °²È«×é³ÉÁ˹ÖÒìµÄÍþв¡£Zscaler ThreatLabz×î½üµÄÒ»·Ý»ã±¨¾ßÌå½éÉÜÁËÕâ¸öºóÃÅ£¬Ëü¾¹ý¾«ÐÄÉè¼Æ£¬Ö¼ÔÚÌӱܼì²â£¬Í¬Ê¹Øë¶ÔÕÆ¹Ü×éÖ¯ÍøÂç·ÀÓùµÄÓ×ÎÒ¡£MadMxShell »î¶¯ÌåÏÖÁ˸߼¶ÍøÂç·¸×ï·Ö×ӵĵ󻬺ÍÄÍÐÄ¡£¹¥»÷Õß¾«ÐÄ´´½¨Ú²ÆÐÔÍøÕ¾£¬·ÂÕÕ IT רҵÈËÔ±³£ÓõĺϷ¨Èí¼þ£¨ÀýÈçÍøÂçɨÃèÒǺÍϵͳÖÎÀí¹¤¾ß£©µÄ±í¹Û¡£Ñ©ÉϼÓ˪µÄÊÇ£¬ÕâЩÐéÎ±ÍøÕ¾»¹ÀûÓà Google Ads ½øÐлý¼«Íƹ㣬½«ÆäÍÆÖÁËÑË÷Á˾ֵĶ¥²¿£¬²¢Ìá¸ßÁËÖ¸±êÊܶàµÄ¿É¼û¶È¡£Õë¶Ô IT רҵÈËÔ±µÄ¾«ÐÄÑ¡ÔñÒâζ×Å¿ÉÄÜÔì³É¿í·ºµÄÇÖº¦¡£ÕâЩÈËÕ¼ÓжÔÃô¸ÐϵͳºÍÍøÂçÊý¾ÝµÄ½Ó¼ûȨÏÞ¡£Êܵ½ MadMxShell ¹¥»÷µÄ IT ÍŶӿÉÄÜ»áΪ¹¥»÷ÕßÌṩ·ÛËéÐÔ·ÛËéµÄ¼¿Á©£¬ÉõÖÁΪËûÃÇÌṩ¹óÖØµÄ½Ó¼ûȨÏÞÒÔ½«ÆäÏúÊÛ¸øÆäËû·¸×OÍÅ¡£
https://securityonline.info/stealthy-madmxshell-backdoor-targets-it-teams-in-malvertising-campaign/
6. Ð嵀 RedLine Stealer ±äÖÖ¼Ù×°³ÉÓÎÏ·±í¹Ò½øÐй¥»÷
4ÔÂ22ÈÕ£¬Âõ¿Ë·Æ³¢ÊÔÊҵĵ÷²éÁ˾ÖÏÔʾ£¬ÒѾ·¢ÏÖÒ»ÖÖеÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÀûÓà Lua ×Ö½ÚÂëÀ´¼ÓÇ¿Òñ±ÎÐԺ͸´ÔÓÐÔ¡£¸ÃÍøÂ簲ȫ¹«Ë¾Òѽ«ÆäÆÀ¹ÀΪÃûΪ RedLine Stealer µÄÒÑÖª¶ñÒâÈí¼þµÄ±äÌ壬ÓÉÓÚºÅÁîÓë½ÚÔì (C2) ·þÎñÆ÷IP µØÖ·Ö®Ç°Òѱ»¼ø±ðΪÓë¸Ã¶ñÒâÈí¼þÓйء£RedLine StealerÓÚ 2020 Äê 3 Ô³õ´Î¼Í¼£¬Í¨³£Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¸æ°×»î¶¯Ö±½Ó»òͨ¹ý·ì϶ÀûÓù¤¾ß°üºÍ¼ÓÔØÆ÷¶ñÒâÈí¼þ£¨ÈçdotRunpeXºÍHijackLoader £©´«²¼¡£ÕâÖÖÏֳɵĶñÒâÈí¼þ¿ÉÄÜ´Ó¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN Èí¼þºÍÍøÂçä¯ÀÀÆ÷ÖÐÍøÂçÐÅÏ¢£¬ÀýÈç±£ÁôµÄÍ´´¦¡¢×Ô¶¯ÊµÏÖÊý¾Ý¡¢ÐÅÓþ¿¨ÐÅÏ¢ºÍ»ùÓÚÊܺ¦Õß IP µØÖ·µÄµØÀíµØÎ»¡£¶àÄêÀ´£¬RedLine Stealer Òѱ»¶à¸öÍþв²Î¼ÓÕßÄÉÈëÆä¹¥»÷Á´£¬Ê¹Æä³ÉΪºá¿ç±±ÃÀ¡¢ÄÏÃÀ¡¢Å·ÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵÄÊ¢Ðв¡¶¾¡£McAfee ·¢ÏÖµÄϰȾÐòÁÐÀÄÓÃÁË GitHub£¬Ê¹Óà Microsoft µÄÁ½¸ö¹Ù·½´æ´¢¿âÀ´ÊµÏÖ C++ ³ß¶È¿â ( STL ) ºÍvcpkg£¬ÒÔ ZIP ´æµµµÄ´ó¾ÖÍйܳä³â¶ñÒâÈí¼þµÄÓÐЧ¸ºÔØ¡£
https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html


¾©¹«Íø°²±¸11010802024551ºÅ