×êÑÐÈËÔ±·¢ÏÖWindowsȱµã¿Éµ¼ÖÂÀàËÆRootkitµÄÖ°ÄÜ

°ä²¼¹¦·ò 2024-04-24

1. ×êÑÐÈËÔ±·¢ÏÖWindowsȱµã¿Éµ¼ÖÂÀàËÆRootkitµÄÖ°ÄÜ


4ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßÄܹ»ÀûÓà DOS µ½ NT õ辶ת»»¹ý³ÌÀ´ÊµÏÖÀàËÆ rootkit µÄÖ°ÄÜ£¬ÒÔ°µ²ØºÍ·ÂÕÕÎļþ¡¢Ä¿Â¼ºÍ¹ý³Ì¡£°²È«×êÑÐÔ± Or YairÔÚºÚñ´ó»áÉϰ䷢µÄÒ»·Ý·ÖÎö»ã±¨ÖаµÊ¾£º¡°µ±Óû§ÔÚ Windows ÖÐÖ´ÐдøÓÐõè¾¶²ÎÊýµÄº¯Êýʱ£¬Îļþ»òÎļþ¼ÐµØµãµÄ DOS õè¾¶½«×ª»»Îª NT õè¾¶¡£¡±ÔÚ´Ëת»»¹ý³ÌÖУ¬´æÔÚÒ»¸öÒÑÖªÎÊÌ⣬¼´¸Ãº¯Êý»áɾ³ýÈκÎõè¾¶ÔªËØÖеÄÎ²ËæµãÒÔ¼°×îºóÒ»¸öõè¾¶ÔªËØÖеÄÈκÎÎ²Ëæ¿Õ¸ñ¡£´Ë²Ù×÷ÓÉ Windows ÖеĴóÎÞÊýÓû§¿Õ¼ä API ʵÏÖ¡£ÕâЩËùνµÄ MagicDot õè¾¶ÔÊÐíÈκηÇÌØÈ¨Óû§½Ó¼ûÀàËÆ rootkit µÄÖ°ÄÜ£¬¶øºóÕâЩÓû§Äܹ»½«Æä±øÆ÷»¯£¬ÔÚûÓÐÖÎÀíԱȨÏÞµÄÇé¿öÏÂÖ´ÐÐһϵÁжñÒâ²Ù×÷£¬²¢ÇÒ²»»á±»·¢ÏÖ¡£


https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html?&web_view=true


2. ¶íÂÞ˹SandwormºÚ¿ÍÍÅ»ï¶Ô×¼ÁËÎÚ¿ËÀ¼20¸ö³ÁÒª×éÖ¯


4ÔÂ22ÈÕ£¬Æ¾¾ÝÎÚ¿ËÀ¼ÍÆËã»ú´¹Î£ÏìÓ¦Ó××é (CERT-UA) µÄÒ»·Ý»ã±¨£¬¶íÂÞ˹ºÚ¿Í×éÖ¯ Sandworm Ö¼ÔÚ·ÛËéÎÚ¿ËÀ¼Ô¼ 20 ¸ö¹Ø¼ü»ù´¡ÉèÊ©µÄÔËÐС£ÕâЩºÚ¿ÍÒ²±»³ÆÎª BlackEnergy¡¢Seashell Blizzard¡¢Voodoo Bear ºÍ APT44£¬¾ÝÐÅÓë¶íÂÞ˹Îä×°¶ÓÁÐ×ÜÕÕ·÷²¿ (GRU) ÓйØ£¬¶Ô¸÷ÀàÖ¸±ê½øÐÐÍøÂç¼äµý»î¶¯ºÍ·ÛËéÐÔ¹¥»÷¡£CERT-UA »ã±¨³Æ£¬2024 Äê 3 Ô£¬APT44 ½øÐÐÁË·ÛËéÎÚ¿ËÀ¼ 10 ¸öµØÓòÄÜÔ´¡¢Ë®ºÍ¹©Å¯¹©¸øÉÌÐÅÏ¢ºÍͨѶϵͳµÄÐж¯¡£¹¥»÷²úÉúÔÚÈýÔ·Ý£¬ÔÚijЩÇé¿öÏ£¬ºÚ¿Í¿ÉÄÜͨ¹ý¶¾º¦¹©¸øÁ´À´ÌṩÊÜËð»òÒ×Êܹ¥»÷µÄÈí¼þ£¬»òÕßͨ¹ýÈí¼þÌṩÉ̽Ӽû×é֯ϵͳ½øÐÐÊØ»¤ºÍ¼¼ÊõÖ§³ÖµÄÄÜÁ¦À´ÉøÈëÖ¸±êÍøÂç¡£


https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-targeted-20-critical-orgs-in-ukraine/


3. APT28 ÀûÓà Windows ´òÓ¡ºó¶Ü´¦Ö÷¨Ê½È±µã²¿ÊðGooseEgg


4ÔÂ23ÈÕ£¬APT28½« Microsoft Windows Print Spooler ×é¼þÖеݲȫ·ì϶±øÆ÷»¯£¬ÒÔ´«²¼Ò»ÖÖÃûΪ GooseEgg µÄÏÈǰδ֪µÄ×Ô½ç˵¶ñÒâÈí¼þ¡£¾Ý³Æ£¬¸Ãй¶ºó¹¤¾ßÖÁÉÙ´Ó 2020 Äê 6 ÔÂÆðͷʹÓ㬿ÉÄÜ×îÔç´Ó 2019 Äê 4 ÔÂÆðͷʹÓã¬ËüÀûÓÃÁËÒ»¸öÏÖÒѽ¨²¹µÄȱµã£¬ÔÊÐíȨÏÞÉý¼¶£¨CVE-2022-38028£¬CVSS ÆÀ·Ö£º7.8£©¡£Microsoft ÔÚ 2022 Äê 10 Ô°䲼µÄ¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌ⣬ÃÀ¹ú¹ú¶È°²È«¾Ö (NSA) Æäʱ»ã±¨Á˸Ãȱµã¡£Æ¾¾ÝÕâ¼Ò¿Æ¼¼¾ÞÍ·Íþвµý±¨ÍŶӵÄ×îз¢ÏÖ£¬APT28£¨Ò²³ÆÎª Fancy Bear ºÍ Forest Blizzard£¨ÒÔǰ³ÆÎª Strontium£©£©½«¸Ã·ì϶±øÆ÷»¯£¬ÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼¡¢Î÷Å·ºÍ±±ÃÀµ±¾Ö¡¢·Çµ±¾Ö¡¢½ÌÓýºÍ½»Í¨µÄ¹¥»÷²¿ÃÅ×éÖ¯¡£½ü¼¸¸öÔÂÀ´£¬APT28 ºÚ¿Í»¹ÀÄÓÃÁËMicrosoft Outlook ÖеÄȨÏÞÉý¼¶·ì϶£¨CVE-2023-23397£¬CVSS µÃ·Ö£º9.8£©ºÍ WinRAR ÖеĴúÂëÖ´Ðзì϶£¨CVE-2023-38831£¬CVSS µÃ·Ö£º7.8£©¡£


https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html


4. ToddyCat APT ÔÚÍøÂçÑÇÌ«µØÓò¹¤¿ØÐÐÒµµÄÊý¾Ý


4ÔÂ23ÈÕ£¬Ò»¸öÃûΪ ToddyCat µÄ¸ß¼¶³ÖÐøÍþв (APT) ×éÖ¯ÔÚ´ÓÑÇÌ«µØÓòÈ·µ±¾ÖºÍ¹ú·ÀÖ¸±êÍøÂ繤ҵ¹æÄ£»¯µÄÊý¾Ý¡ £¿¨°Í˹»ù³¢ÊÔÊÒ¸ú×ٸûµÄ×êÑÐÈËÔ±±¾Öܽ«ÍþвÐÐΪÕßÃèÊöΪʹÓöà¸öͬʱÏνӵ½Êܺ¦Õß»·¾³À´Î¬³ÖÓÆ¾ÃÐÔ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£ËûÃÇ»¹·¢ÏÖÁË ToddyCatʹÓõÄÒ»×éй¤¾ß£¬ÓÃÓÚ´ÓÊܺ¦ÕßϵͳºÍä¯ÀÀÆ÷ÍøÂçÊý¾Ý¡£ToddyCat ºÜ¿ÉÄÜÊÇÒ»¸ö½²ÖÐÎĵÄÍþвÐÐΪÕߣ¬¿¨°Í˹»ùÒѽ«ÆäÓëÖÁÉÙ¿É×·Òäµ½ 2020 Äê 12 ÔµĹ¥»÷ÁªÏµÆðÀ´¡£ÔÚ×îÅüÍ·¶Î£¬¸Ã×éÖ¯ËÆºõÖ»¹Ø×¢Ì¨ÍåºÍÔ½ÄϵÄÉÙÊý×éÖ¯¡£µ«ÔÚ 2021 Äê 2 Ô¹«¿ªÅû¶ Microsoft Exchange Server ÖеÄËùνProxyLogon ·ì϶ºó£¬ÍþвÐÐΪÕßѸ¿ì¼Ó´óÁ˹¥»÷Á¦¶È¡£


https://www.darkreading.com/cyber-risk/-toddycat-apt-is-stealing-data-on-an-industrial-scale-


5. Synlab Italia ÒòÀÕË÷Èí¼þ¹¥»÷¶øÔÝÍ£ÔËÓª


4ÔÂ22ÈÕ£¬ÔÚÀÕË÷Èí¼þ¹¥»÷ÆÈʹ IT ϵͳÀëÏߺó£¬Synlab Italia ÔÝÍ£ÁËËùÓÐÒ½ÁÆÕï¶ÏºÍ²âÊÔ·þÎñ¡£Synlab Italia ÍøÂç´ÓÊôÓڱ鲼ȫÇò 30 ¸ö¹ú¶È/µØÓòµÄ Synlab ¼¯ÍÅ£¬ÔÚÒâ´óÀû¸÷µØÔËÓª×Å 380 ¸ö³¢ÊÔÊÒºÍÒ½ÁÆÖÐÐÄ¡£ËüµÄÄê½»Ò×¶îΪ 4.26 ÒÚÃÀÔª£¬Ã¿Äê½øÐÐ 3500 Íò´Î·ÖÎö¡£¸Ã¹«Ë¾°ä·¢ÔÚ 4 Ô 18 ÈÕÁ賿Ôâ·ê°²È«·ì϶£¬ÆÈʹÆä¹Ø¹ØËùÓÐÍÆËã»úÒÔÏÞ¶È·ÛËé»î¶¯¡£Ö»¹Ü¸Ã¹«Ë¾ÉÐδ֤ʵ£¬µ«Ò»Ð©Ãô¸ÐµÄÒ½ÁÆÊý¾Ý¿ÉÄÜÒѶ³ö¸ø¹¥»÷Õß¡£ÉÐÎÞÖØÒªÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶Ô Synlab Italia µÄÍøÂç¹¥»÷ÕÆ¹Ü¡£


https://www.bleepingcomputer.com/news/security/synlab-italia-suspends-operations-following-ransomware-attack/


6. ÃÀ¹ú¹ú¶È°²È«¾Ö (NSA) °ä²¼°²È«ÈËΪÖÇÄܲ¿ÊðÖ¸ÄÏ


4ÔÂ22ÈÕ£¬ÃÀ¹ú¹ú¶È°²È«¾ÖÓëÃÀ¹úºÍÆäËûÎåÑÛ¹ú¶ÈµÄÁù¸öµ±¾Ö»ú¹¹ºÏ×÷°ä²¼ÁËÓйØÈôºÎ°²È«ÊýÊðÈËΪÖÇÄÜϵͳµÄÐÂÖ¸ÄÏ¡£ËüÌṩÁË·ÖΪÈýÀàµÄ×î¼Ñʵ¼ÊÁбí£¬Éæ¼°ÈËΪÖÇÄܲ¿ÊðµÄÈý¸öÖØÒª²½Ö裺±£»¤²¿Êð»·¾³¡¢³ÖÐø±£»¤AIϵͳºÍ°²È«AIÔËά¡£±£»¤ÈËΪÖÇÄÜÏµÍ³Éæ¼°¼ø±ð·çÏÕ¡¢Ö´ÐÐÊʵ±µÄ»º½â´ëÊ©ºÍ¼à¿ØÎÊÌâµÄ³ÖÐø¹ý³Ì¡£Í¨¹ý²ÉÈ¡±¾»ã±¨ÖиÅÊöµÄ²½ÖèÀ´È·±£ÈËΪÖÇÄÜϵͳµÄ²¿ÊðºÍÔËÐа²È«£¬×éÖ¯Äܹ»ÏÔ׎µµÍËùÉæ¼°µÄ·çÏÕ¡£ÕâЩ²½ÖèÓÐÖúÓÚ±£»¤×éÖ¯µÄ֪ʶ²úȨ¡¢Ä£ÐͺÍÊý¾ÝÃâÔâ͵ÇÔ»òÀÄÓá£


https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/