Bling LibraÕ½Êõת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷

°ä²¼¹¦·ò 2024-08-29
1. Bling LibraÕ½Êõת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷


8ÔÂ27ÈÕ£¬Unit 42ÍøÂ簲ȫÍŶӽÒʾ£¬³ôÃûÔ¶ÑïµÄBling LibraÍþв×éÖ¯ÒÑÏÔÖø×ª±äÆäÕ½Êõ£¬´ÓÒÔÍùͨ¹ýµØÏÂÊг¡··ÂôÇÔÈ¡Êý¾Ý£¬×ª±äΪÕë¶ÔÔÆ»·¾³Ö´ÐÐÀÕË÷¹¥»÷¡£ÕâÒ»±ä¶¯ÓÈΪÁîÈËÓÇÓô£¬ÓÉÓÚBling LibraÒѳɹ¦ÀûÓÃAWSƾ֤ÈëÇÖ¶à¼ÒÆóÒµµÄÔÆÕË»§£¬³ö¸ñÊÇͨ¹ýAmazon S3×ÊÔ´¡£ËûÃǾ«ÐIJ߶¯µÄÈëÇÖÐж¯£¬Ô̺¬ÏêϸµÄÊý¾ÝË÷ÇóºÍÒñ±ÎµÄ»î¶¯×·×Ù£¬Ê¹µÃ¹¥»÷³õÆÚÄÑÒÔ±»¾õ²ì¡£ÀûÓÃS3ä¯ÀÀÆ÷ºÍWinSCPµÈ¹¤¾ß£¬Bling Libra²»½ö»æÔìÁËÊܺ¦ÕߵĴ洢Ͱ½á¹¹£¬»¹É¾³ýÁ˹ؼüÊý¾Ý£¬½øÒ»²½¼Ó¾çÁËËðʧ¡£¸üÉõÕߣ¬ÔÚʵÏÖ·ÛËéºó£¬¸Ã×éÖ¯´´½¨Á˳°·íÐÔµÄÐÂS3´æ´¢Í°£¬²¢ÌáÒéÀÕË÷Óʼþ£¬ÒªÇóÖ§¸¶Êê½ðÒÔ¸´Ô­Êý¾ÝºÍÖÕ³¡¹¥»÷¡£Unit 42µÄ»ã±¨Éî¿Ì·ÖÎöÁËÕâЩ¹¤¾ßµÄʹÓ÷½Ê½£¬Îª·ÀÓùÕßÌṩÁ˼ø±ð¶ñÒâ»î¶¯µÄÏßË÷¡£¼øÓÚÔÆ·þÎñµÄ±é¼°£¬»ã±¨Ç¿µ÷×é֯Ӧѡȡ×îÓ×ÌØÈ¨×¼ÔòºÍÇ¿»¯°²È«´ëÊ©£¬ÈçÀûÓÃIAM½Ó¼û·ÖÎöºÍAWS·þÎñ½ÚÔìÕ½Êõ£¬ÒÔÓÐЧÕмܴËÀà¸ß¼¶Íþв¡£


https://securityonline.info/bling-libras-tactical-evolution-exploiting-cloud-misconfigurations-for-extortion/


2. Poortry¹¤¾ß¼¯½ø»¯£º´ÓEDRɱÊÖµ½È«Ãæ²Á³ýÕß


8ÔÂ27ÈÕ£¬Sophos X-Ops×îл㱨½ÒʾÁ˶ñÒ⹤¾ß¼¯PoortryµÄ×îнøÕ¹£¬¸Ã¹¤¾ßÖ¼ÔÚÕë¶ÔWindowsϵͳÉϵĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Èí¼þÌáÒé¹¥»÷¡£×Ô2022Äê±»Mandiant·¢ÏÖÒÔÀ´£¬Poortryͨ¹ýÆä¼ÓÔØ·¨Ê½¡°Stonestop¡±³ÉΪ¶à¸öÀÕË÷Èí¼þ×éÖ¯µÄ¹Ø¼ü¹¤¾ß£¬²»Ðݽø»¯ÒÔÌӱܼì²â¡£×îа汾µÄPoortry²»½öÏÞÓÚ½ûÓÃEDRÈí¼þ£¬¸üÄÜ´Ó´ÅÅÌÖг¹µ×¶Ï¸ù°²È«Èí¼þµÄ¹Ø¼ü×é¼þ£¬´Ó¶øÎªÆä±³ºóµÄÀÕË÷Èí¼þ¹¥»÷ɨÇå··¡£PoortryµÄÖ÷ÌâÕ½ÊõÊÇÀûÓÃWindowsÄÚºËģʽÇý¶¯·¨Ê½µÄ¿í·ºÈ¨ÏÞ£¬Í¨¹ý½â³ý¹Ò¹³ºÍÖÕÖ¹±£»¤¹ý³ÌÀ´Èƹý°²È«»úÔì¡£Æä¿ª·¢ÕßÀûÓöàÖÖ²½ÖèÈÆ¹ý´úÂëÊðÃûÑéÖ¤£¬Ô̺¬ÀÄÓÃй¶µÄÖ¤Ê顢αÔ칦·ò´ÁÒÔ¼°³¢ÊÔÖ±½Óͨ¹ýMicrosoftµÄWHQLÖ¤Ã÷ÊðÃûÈ˳̻ñÈ¡ºÏ·¨Ö¤Êé¡£Ö»¹ÜÃæ¶Ô΢ÈíºÍSophosµÄÆØ¹âÓë·â¶Â£¬PoortryÒÀȻͨ¹ý½Ã½Ýµ÷ÕûÕ½Êõά³Ö»îÔ¾¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬PoortryÔÚ2024Äê7ÔµÄÒ»´ÎÊÂÎñÖгõ´ÎչʾÁËÆäɾ³ýEDR×é¼þµÄÐÂÄÜÁ¦£¬ÕâÏÔÖøÔö³¤ÁË×éÖ¯Ãæ¶ÔµÄ·çÏÕ¡£


https://securityonline.info/poortry-edr-killer-evolves-now-wipes-security-software-from-windows-systems/


3. Park'N FlyÔâºÚ¿ÍÈëÇÖ£¬°ÙÍò¿Í»§Êý¾Ýй¶


8ÔÂ27ÈÕ£¬Park'N FlyÊǼÓÄôó³ÛÃû»ú³¡±íÍ£³µ·þÎñÌṩÉÌ£¬½üÆÚÔâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬Ô¼100Íò¿Í»§µÄÓ×ÎÒÐÅÏ¢±»ºÚ¿Í·¸·¨»ñÈ¡¡£ÍþвÕßÀûÓÃÇÔÈ¡µÄVPNƾ֤£¬ÔÚ7ÔÂÖÐÑ®ÇÖÈë¹«Ë¾ÍøÂ磬²¢ÔÚ7ÔÂ11ÈÕÖÁ13ÈÕÆÚ¼äÖ´ÐÐÁËδÊÚȨ½Ó¼û¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬¿Í»§È«Ãû¡¢µç×ÓÓʼþ¡¢×¡Ö·¡¢º½°àºÅ¼°Ãñº½¾ÖºÅÂ룬µ«ÐÒÔ˵ÄÊÇ£¬²ÆÕþºÍÖ§¸¶¿¨ÐÅϢδ±»²¨¼°¡£Park'N FlyѸ¿ì²ÉÈ¡Ðж¯£¬ÎåÌìÄÚ¸´Ô­ÁËÊÜÓ°ÏìµÄϵͳ£¬²¢¼ÓÇ¿Á˰²È«´ëÊ©ÒÔÔ¤·À½«À´ÀàËÆÊÂÎñµÄ²úÉú¡£¹«Ë¾CEO¿¨ÂÞ¡¤ÂíÀ×ÂåÏò¿Í»§¼°ºÏ×÷ͬ°éÖÂǸ£¬²¢³Ðŵ½«È«Á¦±£»¤Óû§ÐÅÏ¢¡£ÊÜÓ°ÏìµÄ¿Í»§ÔÚÉ罻ýÌåÉϱí°×Á˶ÔÊý¾Ýй¶µÄÓÇÓô£¬²¢¶Ô¹«Ë¾Êý¾Ý±£ÁôÕþ²ßÌá³öÖÊÒÉ¡£Park'N FlyÌáÐÑËùÓÐÊÜÓ°ÏìµÄ¿Í»§Î¬³Ö¸ß¶È¾¯Ì裬·À±¸Ç±ÔÚµÄÍøÂç´¹µö¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/parkn-fly-notifies-1-million-customers-of-data-breach/


4. ÀûÓÃAtlassian Confluence·ì϶CVE-2023-22527½øÐмÓÃܽٳÖ


8ÔÂ28ÈÕ£¬Trend Micro ×êÑÐÈËÔ±½ÒʾÁËÕë¶Ô Atlassian Confluence Êý¾ÝÖÐÐĺͷþÎñÆ÷°æ±¾µÄÑϳÁ·ì϶£¨CVE-2023-22527£©µÄ¿í·º¼ÓÃܽٳֻ¡£¸Ã·ì϶ÓÚ2024Äê1ÔÂ16ÈÕÓÉAtlassian¹«¿ª£¬ÆäCVSSÆÀ·ÖΪÂú·Ö10£¬Åú×¢Æä¼«¸ß·çÏÕÐÔ¡£¸Ã·ì϶ͨ¹ýÄ£°å×¢Èë»úÔ죬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂ룬½ÚÔì·þÎñÆ÷¡£×Ô2024Äê6ÔÂÖÐÑ®Æð£¬ÀûÓô˷ì϶µÄ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¼±¾çÔö³¤£¬ÖØÒªÓÉÈý¸öÍþвÐÐΪÕßÖ÷µ¼£¬ËûÃÇѡȡ·ÖÆçÕ½Êõ²¿ÊðXMRigÍÚ¿ó»ú£¬µÁÓÃÍÆËã×ÊÔ´ÒÔIJÀû¡£ÆäÖÐÒ»¸öÐÐΪÕßÖ±½ÓÀûÓÃELFÎļþ¸ºÔز¿ÊðÍÚ¿ó»ú£¬¶øÁíÒ»ÐÐΪÕßÔòѡȡ¸´ÔÓ¼¿Á©£¬Í¨¹ýSSH¾ç±¾ÉøÈëϵͳ£¬¶Ï¸ù¾ºÕùÍÚ¿ó¹ý³Ì£¬½ûÓÃÔÆ°²È«·þÎñ£¬²¢ÍøÂçÃô¸ÐÐÅÏ¢ÒÔÀ©´ó¹¥»÷ÁìÓò¡£ÕâЩÐÐΪÕß»¹Í¨¹ý´´½¨¶à¸öcron×÷Ò·´Î¬³Ö¶ÔÊÜϰȾ·þÎñÆ÷µÄ½ÚÔ죬ȷ±£ÍÚ¿ó»î¶¯³ÖÐø½øÐУ¬²¢½â³ýDZÔڵݲȫ×è°­¡£ÎªÓ¦¶Ô´ËÍþв£¬ÖÎÀíÔ±¸Ãµ±¼´¸üÐÂConfluenceÖÁ×îа汾£¬²¢Ç¿»¯°²È«´ëÊ©¡£


https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html


5. BlackByte ÀÕË÷Èí¼þй¥ÊÆ£ºÀûÓÃVMware ESXi·ì϶ÓëVPN½Ó¼û


8ÔÂ29ÈÕ£¬BlackByte ÀÕË÷Èí¼þ×éÖ¯Õý½èÖúз¢ÏÖµÄ VMware ESXi ·ì϶¼°VPN½Ó¼ûõè¾¶£¬¶ÔÈ«ÇòÆóÒµÌáÒéÐÂÒ»ÂÖ¾çÁÒ¹¥»÷¡£Ë¼¿ÆTalos ÍŶӸ淢ÁËÆä¹¥»÷Õ½Êõ£¬BlackByte ²»½öÀûÓÃCVE-2024-37085·ìÏ¶ÈÆ¹ýÉí·ÝÑéÖ¤£¬»¹Í¨¹ýVPNµÈÔ¶³Ì½ÓʶȤÔìÒþÃØÉøÈ룬ÒԵͿɼûÐÔ·½Ê½À©´óϰȾÁìÓò¡£¸Ã×éÖ¯»¹ÉÆÓÚÀûÓÃÇÔÈ¡µÄActive DirectoryÍ´´¦×ÔÎÒ´«²¼£¬¼Ó¾çÁËÆä·ÛËéÁ¦¡£Ö»¹ÜÆä¹«¿ªÊý¾ÝÐ¹Â¶ÍøÕ¾½öչʾ²¿ÃŹ¥»÷°¸Àý£¬µ«Talos ×êÑÐÏÔʾÆäÏÖʵ»î¶¯Ô¶³¬Ô¤ÆÚ¡£Ôì×÷Òµ¡¢ÔËÊä/²Ö´¢¡¢×¨Òµ·þÎñ¡¢ÐÅÏ¢¼¼Êõ¼°¹«¹²ÐÐÕþ³ÉΪÆä³Áµã¹¥»÷Ö¸±ê¡£ÎªÓ¦¶Ô´ËÍþв£¬×éÖ¯Ð费Σ½¨²¹VMware ESXiµÈϵͳ£¬Ö´ÐÐMFA£¬ÉóºËVPNÅäÖ㬲¢Ï޶ȹؼüÍøÂç½Ó¼û¡£Í¬Ê±£¬½ûÓûòÏÞ¶ÈNTLMʹÓ㬲¿Êð¸ßЧµÄ¶Ëµã¼ì²âºÍÏìӦϵͳ£¬²¢¹¹½¨È«ÃæµÄ°²È«Õ½Êõ£¬ÈÚºÏ×Ô¶¯Íþвµý±¨ÓëÊÂÎñÏìÓ¦ÄÜÁ¦£¬ÒÔÈ«ÃæÕмÜBlackByteµÈÀÕË÷Èí¼þµÄÇÖº¦¡£


https://hackread.com/blackbyte-ransomware-vmware-flaw-vpn-based-attacks/


6. ÒÁÀÊAPT33ÀûÓÃTickler¶ñÒâÈí¼þ¹¥»÷ÃÀ¹úµ±¾ÖºÍ¹ú·ÀµÈ»ú¹¹


8ÔÂ28ÈÕ£¬ÒÁÀʺڿÍ×éÖ¯APT33£¬±ðºÅPeach SandstormºÍRefined Kitten£¬½üÄêÀ´ÆµÈÔ·¢ÆðÍøÂç¹¥»÷£¬Æä×îм¿Á©É漰ʹÓÃÐÂÐÍTickler¶ñÒâÈí¼þ£¬³ÁµãÕë¶ÔÃÀ¹úºÍ°¢ÁªÇõÈ·µ±¾Ö¡¢¹ú·À¡¢ÎÀÐÇ¡¢Ê¯Óͼ°ÌìÈ»Æø²¿ÃŵÄ×éÖ¯¡£2024Äê4ÔÂÖÁ7Լ䣬¸Ã×é֯ͨ¹ýMicrosoft Azure»ù´¡ÉèʩִÐкÅÁîÓë½ÚÔ죨C2£©£¬ÀûÓÃڲƭÐÔAzure¶©ÔĽøÐеý±¨ÍøÂç¡£´Ëǰ£¬APT33Òѳɹ¦ÀûÓÃÃÜÂëÅçÈ÷¹¥»÷ÇÖÈë¹ú·À¡¢º½Ìì¡¢½ÌÓý¼°µ±²¿ÃÅÃÅ£¬ÓÈÆäÊÇͨ¹ý½ÌÓýÐÐÒµµÁÓÃÕË»§À´»ñÈ¡Azure×ÊÔ´¡£´Ë±í£¬APT33ÔÚ2023Ä껹ѡȡÀàËÆÕ½Êõ£¬ÀûÓÃFalseFontºóÃŶñÒâÈí¼þ¹¥»÷È«Çò¹ú·À³Ð°üÉÌ¡£Î¢Èí¶Ô´ËÀ๥»÷ά³Ö¸ß¶È¾¯Ì裬ָ³öAPT33×Ô2023Äê2ÔÂÒÔÀ´£¬ÒѶÔÈ«ÇòÊýǧ¸ö×éÖ¯½øÐÐÁË´ó¹æÄ£ÃÜÂëÅçÈ÷¹¥»÷£¬ÍþвÁìÓò½øÒ»²½À©´óµ½ÔìÒ©Òµ¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬Î¢Èí°ä·¢×Ô10ÔÂ15ÈÕÆð£¬ËùÓÐAzureµÇ¼³¢ÊÔ¾ùÐèͨ¹ý¶à³ÁÉí·ÝÑéÖ¤£¨MFA£©£¬Ö¼ÔÚÏÔÖø¼ÓÇ¿ÕË»§°²È«ÐÔ¡£


https://www.bleepingcomputer.com/news/security/APT33-Iranian-hacking-group-uses-new-tickler-malware-to-backdoor-us-govt-defense-orgs/