Marko PoloºÚ¿Í×éÖ¯£ºÈ«ÇòÊýÍòÉ豸Ôâ´ó¹æÄ£ÍøÂç¹¥»÷

°ä²¼¹¦·ò 2024-09-20
1. Marko PoloºÚ¿Í×éÖ¯£ºÈ«ÇòÊýÍòÉ豸Ôâ´ó¹æÄ£ÍøÂç¹¥»÷


9ÔÂ19ÈÕ£¬Recorded Future ¼°Æä×Ó¹«Ë¾ Insikt Group ½ÒʾÁËÓɺڿÍ×éÖ¯ Marko Polo ²ß¶¯µÄ´ó¹æÄ£ÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÒÔ¼ÓÃÜÇ®±ÒڲƭºÍÔÚÏßÓÎÏ·Ú¿Æ­ÎÅÃû£¬Æä»î¶¯²¨¼°È«ÇòÊýÍòÉ豸¡£Marko Polo ¾«×¼Ëø¶¨³ÛÃûÓÎÏ·Íæ¼Ò¡¢¼ÓÃÜÇ®±ÒÓ°ÏìÕß¼° IT רҵÈËÊ¿£¬ÀûÓÃÉ罻ýÌå¼Ù×°ÕÐÆ¸ÈËÔ±£¬ÓÕÆ­Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ¡£¸ÃÍŻﱻÓ÷Ϊ½ðÇ®Çý¶¯µÄ¡°··¶¾ÍŻ£¬³ÉÔ±ºá¿ç¶íÂÞ˹¡¢ÎÚ¿ËÀ¼¼°Ó¢Óï¹ú¶È£¬¸¨µ¼²ãÒÉËÆÎ»ÓÚºóËÕÁªµØÓò¡£ÆäÊÖ·¨¶àÑù£¬²»½öÈëÇÖ Zoom ÊÓÆµ»áÒéÈí¼þ°æ±¾£¬»¹ÉøÈëóÒ×Èí¼þ¡¢BitTorrent Îļþ·Ö·¢ÏµÍ³£¬¼Ù×°³É¸÷ÀàÈȵãÀûÓúÍÓÎÏ·£¬Èç PartyWorld ·ÂÕÕ Fortnite£¬ÊµÔòÏÂÔØÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Nortex »î¶¯Ôòͨ¹ý¼Ù Web3 ÏîÄ¿ SendingMe ´«²¼Ä¾Âí¡£Marko Polo ¹¥»÷ÒÑÖ´óÁ¿Ó×ÎÒÓ빫˾Êý¾Ýй¶£¬·¸·¨»ñÀûÊý°ÙÍòÃÀÔª£¬Êܺ¦ÕßÉõÖÁʧȥȫÊý»ý´¢¡£¸Ã×éÖ¯½Ã½Ý¶à±ä£¬ÆµÈÔµ÷ÕûÕ½ÊõÒÔ¶ã±Ü¼ì²â£¬³ÖÐøÍþÐ²ÍøÂ簲ȫ£¬²¢Ô¤Ê¾Æä½«²»ÐÝÉý¼¶ÊÖ·¨ÒÔ³¬¹ýÏÖÓзÀ»¤ÏµÍ³¡£


https://securityonline.info/unmasking-marko-polo-the-infostealer-gang-targeting-thousands/


2. CISAÖÒ¸æApache HugeGraph-Server·ì϶Ôâ»ý¼«ÀûÓÃ


9ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©¾Ö£¨CISA£©´¹Î£¸üÐÂÁËÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬ÆäÖÐ×îΪÑϳÁµÄÊÇApache HugeGraph-ServerµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¨CVE-2024-27348£©£¬ÆäCVSS v3.1ÆÀ·Ö¸ß´ï9.8£¬Åú×¢ÆäDZÔÚ·çÏÕ¼«´ó¡£´Ë·ì϶ԴÓÚ²»µ±µÄ½Ó¼û½ÚÔ죬ӰÏìApache HugeGraph-Server 1.0.0ÖÁ1.2.x°æ±¾£¬µ«1.3.0°æ±¾ÒѰ䲼½¨¸´¡£Apache¹Ù·½ÓÚ4ÔÂ22ÈÕ°ä²¼ÁË1.3.0°æ±¾ÒÔÓ¦¶Ô´Ë°²È«Íþв£¬²¢½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬Í¬Ê±ÆôÓÃJava 11ºÍAuthϵͳÒÔ¼ÓÇ¿°²È«ÐÔ¡£´Ë±í£¬Îª½øÒ»²½ÌáÉýRESTful-APIµÄ°²È«ÐÔ£¬ÆôÓá°°×Ãûµ¥IP/¶Ë¿Ú¡±Ö°ÄÜÒ²±»ÊÓΪ³ÁÒª´ëʩ֮һ£¬ÒÔ×è¶ÏDZÔڵĹ¥»÷õè¾¶¡£¼øÓÚCVE-2024-27348ÒÑÔÚÒ°±í±»»ý¼«ÀûÓã¬CISAÏòÁª¹ú»ú¹¹¼°¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯·¢³öÖҸ棬ҪÇóÕâЩ×éÖ¯Îñ±ØÔÚ2024Äê10ÔÂ9ÈÕǰ²ÉÈ¡±ØÒªµÄ»º½â´ëÊ©»òÖÕ³¡Ê¹ÓÃÊÜÓ°ÏìµÄHugeGraph-Server°æ±¾¡£Apache HugeGraph-Server×÷Ϊ¿ªÔ´Í¼ÐÎÊý¾Ý¿âµÄÖ÷Ìâ×é¼þ£¬¿í·ºÀûÓÃÓÚµçÐÅ¡¢½ðÈÚ·þÎñºÍÉç½»ÍøÂçµÈÁìÓò£¬Ñ¸¿ìÀûÓð²È«¸üкͲÉÈ¡»º½â´ëÊ©¶ÔÓÚ±£»¤Óû§Êý¾ÝºÍϵͳ°²È«ÖÁ¹Ø³ÁÒª¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-actively-exploited-apache-hugegraph-server-bug/


3. Vice SocietyÀûÓÃÀÕË÷Èí¼þ¹¥»÷ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµ


9ÔÂ20ÈÕ£¬IncÀÕË÷Èí¼þ½üÆÚÔÚÃÀ¹úÒ½ÁƱ£½¡ÁìÓò¹ÄÆð£¬³ÉΪеÄÍþв½¹µã¡£Î¢ÈíÍþвµý±¨ÖÐÐÄ(MSTIC)½Òʾ£¬×Ô2022Äê7ÔÂÒÔÀ´Ò»Ïò»îÔ¾µÄVice Society£¨»ò³ÆVanilla Tempest£©×éÖ¯£¬ÏÖѡȡIncÀÕË÷Èí¼þ×÷ΪÆä¹¥»÷±øÆ÷Ö®Ò»£¬À©´óÁËÆäË«³ÁÀÕË÷Õ½ÊõµÄÁìÓò¡£¸Ã×éÖ¯ÀûÓöàÖÖÀÕË÷Èí¼þ¼Ò×壬Ô̺¬Inc¡¢BlackCatµÈ£¬Õë¶ÔÔ̺¬Ò½ÁƱ£½¡ÔÚÄڵĶà¸öÐÐÒµ½øÐй¥»÷¡£Vice Societyͨ¹ýϰȾGootloaderºóÃÅ·¨Ê½µÈ³õ²½¼¿Á©»ñµÃ½Ó¼ûȨÏÞ£¬ËæºóÀûÓÃSupperºóÃÅ¡¢AnyDeskÔ¶³ÌÖÎÀí¹¤¾ß¼°MEGAÊý¾Ýͬ²½¹¤¾ßµÈºÏ·¨Ã³ÒײúÆ·½øÐкáÏòÒÆ¶¯£¬×îÖÕͶ·ÅIncÀÕË÷Èí¼þ¡£¸Ã×éÖ¯¾«ÐIJ߶¯µÄ½»ÉæÕ½ÊõºÍ½á¹¹»¯µÄ²Ù×÷·½Ê½£¬Ê¹µÃÆäÀÕË÷»î¶¯¸üΪרҵºÍÄÑÒÔÓ¦¶Ô¡£Òò¶ø£¬¼ÓǿҽÁƱ£½¡×éÖ¯µÄ°²È«·ÀÓù£¬ÊµÊ±ÀûÓð²È«¸üлººÍ½â´ëÊ©£¬¶ÔÓÚ·À±¸´ËÀàÀÕË÷Èí¼þ¹¥»÷ÖÁ¹Ø³ÁÒª¡£


https://www.darkreading.com/threat-intelligence/vice-society-inc-ransomware-healthcare-attack


4. ´÷¶û10,863·ÝÔ±¹¤¼Í¼ÔâºÚ¿Íй¶


9ÔÂ19ÈÕ£¬ºÚ¿Í¡°grep¡±ÔÚºÚ¿ÍÂÛ̳Breach ForumsÉÏÐû³Æ£¬¿Æ¼¼¾ÞÍ·´÷¶ûÔâ·êÁË¡°Çá΢¡±Êý¾Ýй¶£¬Éæ¼°10,863·ÝÔ±¹¤¼Í¼¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬Ô±¹¤µÄÈ«Ãû¡¢ID¡¢»îԾ״̬¡¢DNO¼°ÄÚ²¿IDµÈÃô¸ÐÐÅÏ¢£¬Ö»¹ÜδÔ̺¬Ã÷ÎÄÃÜÂë»òÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬µ«ÈÔ¶Ô´÷¶û×é³É³Á´ó°²È«Íþв¡£´÷¶ûÕâ´ÎÊÂÎñ²¢·Ç¹ÂÀý£¬½ñÄêÔçЩʱ³½Ò²ÔøÆØ³öÁíÒ»Â·Éæ¼°4900ÍòÌõ¿Í»§¼Í¼µÄÊý¾Ýй¶¡£ÕâÔÙ´Î͹ÏÔÁË´óÐͿƼ¼¹«Ë¾Ãæ¶ÔµÄ³ÖÐøÍøÂ簲ȫÌôÕ½¡£Ö»¹Ü´÷¶ûÉÐδÕýʽȷÈÏÕâ´ÎÔ±¹¤¼Í¼й¶ÊÂÎñ£¬µ«°²È«×¨¼ÒÖÒ¸æ³Æ£¬Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓڲ߶¯¸üÓÐÕë¶ÔÐÔµÄÍøÂç¹¥»÷¡£×éÖ¯Ðè¼ÓÇ¿°²È«´ëÊ©£¬Ô̺¬Ñ¡È¡ÏȽøµÄÍþв¼ì²âϵͳºÍ¶¨ÆÚ½øÐа²È«É󼯣¬ÒÔ±£»¤Ãô¸ÐÊý¾ÝºÍÔ±¹¤ÐÅÏ¢¡£Í¬Ê±£¬ÊµÊ±ÏìÓ¦ÊÂÎñ²¢ÓëÊÜÓ°ÏìÈËԱά³ÖͨÃ÷¹µÍ¨£¬¶ÔÓÚ¼õÇáDZÔÚÇÖº¦ÖÁ¹Ø³ÁÒª¡£ÕâһϵÁÐÊÂÎñÇ¿µ÷ÁËÍøÂ簲ȫ·À»¤µÄ»ð¼±ÐԺ͸´ÔÓÐÔ¡£


https://hackread.com/hacker-dell-data-breach-employee-details-leak/


5. FOUNDATION¹ÜÕÊÈí¼þÔâÉøÈë¹¥»÷£¬¹¹ÖþÐÐÒµÃæ¶ÔÐÂÍþв


9ÔÂ19ÈÕ£¬Huntress ÍøÂ簲ȫ¹«Ë¾×îи淢£¬¹¹ÖþÐÐÒµÕýÃæ¶ÔÀ´×ÔÍþвÐÐΪÕßµÄÐÂÒ»²¨¹¥»÷£¬ÕâЩ¹¥»÷Õßͨ¹ýÉøÈë FOUNDATION ¹ÜÕÊÈí¼þÖ´ÐС£¹¥»÷ÕßÀûÓÃÈí¼þµÄĬÈÏÆ¾Ö¤£¬Í¨¹ý´ó¹æÄ£±©Á¦ÆÆ½â¼¿Á©µÈÏлñÈ¡½Ó¼ûȨÏÞ¡£ÊÜÓ°ÏìµÄ×ÓÐÐÒµ¿í·º£¬Ô̺¬¹Ü·¡¢Å¯Í¨¿Õµ÷¡¢»ìÄýÍÁµÈ¹Ø¼üÁìÓò¡£FOUNDATION Èí¼þÒÀÀµ Microsoft SQL ·þÎñÆ÷£¬²¢¿ÉÄÜÊ¢¿ª TCP ¶Ë¿Ú 4243 ÒÔÖ§³ÖÒÆ¶¯ÀûÓÃÖ±½Ó½Ó¼ûÊý¾Ý¿â£¬ÕâΪ¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£ÓÈΪÑϳÁµÄÊÇ£¬¸ÃÈí¼þÄÚÖõġ°sa¡±ºÍ¡°dba¡±¸ßȨÏÞÕË»§³£±£ÁôĬÈÏÃÜÂ룬ʹµÃ¹¥»÷ÕßÄܵÈÏÐÀûÓà xp_cmdshell À©´ó´æ´¢¹ý³ÌÖ´ÐÐËÁÒâ²Ù×÷ϵͳºÅÁ´Ó¶øÆëÈ«½ÚÔìÊÜÓ°ÏìµÄϵͳ¡£×Ô2024Äê9ÔÂ14ÈÕ³õ´Î·¢ÏÖÒÔÀ´£¬Huntress ¼à²âµ½¶Ô MS SQL ·þÎñÆ÷µÄ±©Á¦µÇ¼³¢ÊԸߴï35,000´Î£¬³É¹¦Â¶³öÁËÆä±£»¤µÄ500̨ÔËÐÐ FOUNDATION Èí¼þÖ÷»úÖеÄ33̨¡£ÎªÓ¦¶Ô´ËÍþв£¬Huntress ½¨Òéµ±¼´ÂÖ»»Ä¬ÈÏÕË»§ÃÜÂ룬ÏÞ¶ÅצÓ÷¨Ê½¶Ô»¥ÁªÍøµÄ¹«¿ª½Ó¼û£¬²¢ÔÚ±ØÒªÊ±½ûÓà xp_cmdshell Ö°ÄÜ£¬ÒÔÓÐЧ¼õÇáDZÔÚ·çÏÕ£¬±£»¤¹¹ÖþÐÐÒµµÄÍøÂ簲ȫ¡£


https://thehackernews.com/2024/09/hackers-exploit-default-credentials-in.html


6. ¼ÓÃÜÇ®±Ò½Ù³ÖÍÅ»ïTeamTNT¾íÍÁ³ÁÀ´


9ÔÂ19ÈÕ£¬Ö»¹ÜTeamTNT×éÖ¯ÔÚ2022Äê±»ÒÔΪÒÑÒþû£¬µ«°²È«×êÑÐÁìÓòµÄ×îз¢ÏÖ½ÒʾÁ˸ÃÍþвÐÐΪÕßÔÚ2023ÄêÈÔÔڻµÄ¼£Ïó¡£TeamTNTÒÔÆä¼ÓÃܽٳֹ¥»÷ÎÅÃû£¬Í¨¹ýÀûÓÃÊܺ¦ÕßµÄIT×ÊÔ´·¸·¨ÍÚ¾ò¼ÓÃÜÇ®±Ò¡£×Ô2019Äê³õ´Î¼ûæÒÔÀ´£¬¸Ã×éÖ¯¾ÍÒòÆä¸´ÔÓµÄShell¾ç±¾ºÍ¶ñÒâ¶þ½øÔìÎļþ¹¤¾ß°üÔì×÷µÄ¶ñÒâÈí¼þ¶ø³ôÃûÔ¶Ñï¡£×îл㱨ָ³ö£¬TeamTNTµÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½£¨TTP£©ÓëÈ¥Äê»î¶¯ÀàËÆ£¬ÇÒÒÑÓ°Ïì»ùÓÚCentOS²Ù×÷ϵͳµÄVPSÔÆ»ù´¡ÉèÊ©¡£¾ÝGroup-IB·ÖÎö£¬TeamTNTͨ¹ýSSH±©Á¦¹¥»÷½øÈëÊܺ¦Õßϵͳ£¬ÉÏ´«²¢Ö´ÐжñÒâ¾ç±¾£¬¸Ã¾ç±¾²»½ö²é³­Ö÷»úÊÇ·ñÒѱ»ÆäËû¿ó¹¤ÈëÇÖ£¬»¹½ûÓð²È«Ö°ÄÜ¡¢É¾³ýÈÕÖ¾¡¢Åú¸ÄϵͳÎļþ£¬²¢ÖÕÖ¹ÏÖÓмÓÃÜÇ®±ÒÍÚ¾ò¹ý³Ì¡£¸ü½øÒ»²½£¬¸Ã¾ç±¾×°ÖÃDiamorphine rootkitÒÔʵÏÖÒþÉíºÍ»ñÈ¡rootȨÏÞ£¬²¢Ê¹Óö¨Ô칤¾ßά³Ö¶ÔϵͳµÄÓÆ¾Ã½ÚÔì¡£ÆäÕ½ÊõÔ̺¬Åú¸ÄÎļþÊôÐÔ¡¢´´½¨ºóÃÅÓû§ÕË»§¼°¶Ï¸ùºÅÁÇ࣬ÒÔÈ«Ãæ°µ²Ø»î¶¯ºÛ¼£¡£Õâ´Î·¢ÏÖ͹ÏÔÁËTeamTNTÔÚ×Ô¶¯»¯¹¥»÷ÁìÓòµÄ¸ßÃ÷¼¼ÒÕ£¬Æä¹¥»÷Õ½Êõ´Ó³õʼÈëÇÖµ½Ô¤·À¸´Ô­³¢ÊÔµÄÿ¸ö»·½Ú¶¼¾­¹ý¾«ÐÄÉè¼Æ£¬Ö¼ÔÚ¸øÊܺ¦Õß´øÀ´ÑϳÁÇÖº¦¡£


https://www.infosecurity-magazine.com/news/cryptojacking-gang-teamtnt-comeback/