΢Èí°ä²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
°ä²¼¹¦·ò 2024-10-151. ΢Èí°ä²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
10ÔÂ13ÈÕ£¬Î¢Èí½üÆÚ°ä²¼ÁËÐÂÖ¸ÄÏ£¬Ö¼ÔÚÔ®ÊÖ×éÖ¯ÓÐЧ·ÀÓùÈÕÒæÑϳÁµÄ Kerberoasting ¹¥»÷£¬ÕâÖÖ¹¥»÷ÖØÒªÕë¶Ô Active Directory (AD) »·¾³¡£Kerberoasting ÀûÓà Kerberos Éí·ÝÑéÖ¤ºÍ̸ÇÔÈ¡ AD Í´´¦£¬Ê¹¹¥»÷Õß¿ÉÄÜ¿í·º½Ó¼ûÃô¸Ð×ÊÔ´¡£Î¢ÈíÖ¸³ö£¬Ëæ×ÅÍøÂçÍþвµÄ²»ÐÝÑݱ䣬°²È«×¨ÒµÈËÔ±±ØÐë½ô¸ú×îÐµĹ¥»÷ý½éºÍ·ÀÓù»úÔì¡£ÓÉÓÚ GPU ¼Ó¿ìÃÜÂëÆÆ½â¼¼ÊõµÄʹÓã¬Kerberoasting ¹¥»÷µÄÓÐЧÐÔÔÚÌáÉý¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬¹¥»÷Õßͨ¹ýÒªÇó²¢ÆÆ½âʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵķþÎñƱ֤£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾ÊÚȨµÄ½Ó¼ûȨÏÞ¡£³ö¸ñÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬¸üÒ×Êܵ½¹¥»÷¡£Î¢Èí´òËãÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄ½«À´¸üÐÂÖÐĬÈϽûÓà RC4¡£Îª¼õÇá Kerberoasting ·çÏÕ£¬Î¢Èí½¨Òé²ÉÈ¡¶àÏî´ëÊ©£¬Ô̺¬ÀûÓÃ×éÍйܷþÎñÕÊ»§ (gMSA) »òίÍÐÍйܷþÎñÕÊ»§ (dMSA)¡¢Ç¿ÔìʹÓÃÇ¿ÃÜÂë¡¢ÅäÖ÷þÎñÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÓÃÒªµÄ·þÎñÖ÷ÌåÃû³Æ (SPN)¡£´Ë±í£¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÁìµ¼¡£
https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/
2. Water MakaraÀûÓÃÐÂÌӱܼ¼ÊõÕë¶Ô°ÍÎ÷ÆóÒµ²¿ÊðAstaroth¶ñÒâÈí¼þ
10ÔÂ14ÈÕ£¬Trend Micro×êÑÐÈËÔ±·¢ÏÖ£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕß¼¯ÌåÕë¶Ô°ÍÎ÷ÆóÒµ½øÐеĶñÒâ»î¶¯¼¤Ôö£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌӱܼ¼ÊõÀ´²¿Êð³ôÃûÔ¶ÑïµÄAstarothÒøÐжñÒâÈí¼þ¡£Õâ´ÎÓã²æÊ½ÍøÂç´¹µö»î¶¯ÖØÒªÕë¶ÔÀ¶¡ÃÀÖ޵Ĺ«Ë¾£¬ÓÈÆäÊǰÍÎ÷µÄÔì×÷¹«Ë¾¡¢ÁãÊÛ¹«Ë¾ºÍµ±¾Ö»ú¹¹£¬Í¨¹ý¼ÙÒâ¹Ù·½Ë°ÎñÎļþ²¢ÀûÓÃÓ×ÎÒËùµÃ˰É걨µÄ½ôÆÈÐÔÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£¹¥»÷ÕßÀûÓÃmshta.exeÖ´ÐлìºÏµÄJavaScriptºÅÁÓëC&C·þÎñÆ÷³ÉÁ¢Ïνӡ£ZIPÎļþ¸½¼þÖÐÔ̺¬¶ñÒâµÄLNKÎļþ£¬µ±Óû§Ö´ÐÐʱ£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptºÅÁî¡£³ýÁËLNKÎļþ£¬ZIPÎļþ»¹Ô̺¬ÁíÒ»¸öÓµÓлìºÏJavaScriptºÅÁîµÄÎļþ¡£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©´óÃû£¬Èç.pdf¡¢.jpgµÈ£¬ÒÔ´«²¼¶ñÒâÈí¼þ¡£½âÂëºóµÄJavaScriptºÅÁî½ÒʾÁËÒ»¸ö¶ñÒâURL£¬Í¨¹ýGetObjectº¯Êý³¢ÊÔÖ´Ðлò¼ìË÷¶ÔÏ󣬿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£Water MakaraµÄÓã²æÊ½ÍøÂç´¹µö»î¶¯ÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬Òò¶ø¹«Ë¾Ó¦²ÉÈ¡×î¼Ñʵ¼Ê£¬È簲ȫÅàѵ¡¢Ç¿ÃÜÂëÕ½Êõ¡¢¶à³É·ÖÉí·ÝÑéÖ¤¡¢Î¬³Ö°²È«½â¾ö¹æ»®¸üеȣ¬ÒÔ¼ÓÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£
https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html
3. GmailÓû§ÔâAI¼ÓÇ¿ÐÍÍøÂç´¹µö¹¥»÷£¬×¨¼ÒÇ××Ô½ÒÃØÈ¦Ì×
10ÔÂ14ÈÕ£¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþ·þÎñ£¬Õ¼Óг¬¹ý25ÒÚÓû§£¬Ò²Òò¶ø³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄ³ÁµãÖ¸±ê¡£Î¢Èí°²È«²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒ¸æ³Æ£¬Ò»ÖÖ¸´ÔÓµÄÈËΪÖÇÄܼÓÇ¿ÐÍÍøÂç´¹µö´òËãÕýÕë¶ÔGmailÓû§£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£È¦Ì×´ÓÒ»·âÐû³ÆÀ´×ԹȸèµÄµç×ÓÓʼþÆðÍ·£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²ÆÍøÕ¾£¬Ì°Í¼ÇÔÈ¡µÇ¼ʹ´¦¡£½Ó×Å£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬Ðû³Æ¼ì²âµ½ÆäÕË»§´æÔÚÒì³£»î¶¯¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë½øÐÐÁËÔÚÏßËÑË÷£¬²¢È·ÈÏÁËÆäºÏ·¨ÐÔ£¬µ«ÔÚ×Ðϸ²é³·¢¼þÈ˵ĵç×ÓÓʼþµØÖ·ºó£¬ËûÃô¸ÐµØ·¢ÏÖµØÖ·¼Ù×°³ÉÁËGoogle¹Ù·½ÓòÃû¡£´Ë±í£¬Mitrovic»¹Òâʶµ½£¬Æ×ÓµÄÉùÒô¹ýÓÚÃÀÂú£¬¿ÉÄÜÊÇÓÉÈËΪÖÇÄÜÌìÉúµÄ¡£ËûÒÔΪ£¬ÕâÊÇÈ«ÇòÁìÓòÄڵĺڿͻ£¬¶øËûÖ»ÊǶà¶àÊܺ¦ÕßÖ®Ò»¡£Òò¶ø£¬ËûÏò¹«¼Ò·¢³ö¾¯Ê¾£¬ÌáÐѸ÷ÈËڿƼ¿Á©ÈÕÒæ¸´ÔÓÇÒÁîÈËÕÛ·þ£¬Ó×ÎÒӦά³Ö¸ß¶È¾¯Ì裬½øÐиù»ù²é³»òÏòÐÅÀµµÄÈËÇóÖú£¬ÒÔ·À±¸´ËÀ๥»÷¡£
https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/
4. ˼¿Æµ÷²éÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ
10ÔÂ14ÈÕ£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÔÚµ÷²éÒ»ÏîÖ¸¿Ø£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉÏÏúÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬°µÊ¾¹«Ë¾¿ÉÄÜÒÑÔâ·êÈëÇÖ¡£Ë¼¿Æ½²»°È˰µÊ¾£¬¹«Ë¾ÒÑÏàʶµ½Óйر¨Â·£¬²¢ÒÑÆô¶¯µ÷²éÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæÊµÐÔ£¬µ«Ä¿Ç°µ÷²éÈÔÔÚ½øÐÐÖС£´Ëǰ£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÐû³Æ£¬ËûÓëÁí±íÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿ÆÏµÍ³£¬²¢ÇÔÈ¡ÁË´óÁ¿¿ª·¢ÈËÔ±Êý¾Ý¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬Ð¹Â¶µÄÊý¾ÝÔ̺¬¸÷ÀàÏîĿԴ´úÂë¡¢Ó²±àÂëÆ¾Ö¤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿Æ»úÃÜÎĵµµÈ¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£ÖµÍ×ÌùÐĵÄÊÇ£¬6Ô·ÝIntelBrokerÒÑÆðÍ·ÏúÊÛ»òй¶Ô̺¬T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¾ÝÐÂÎÅÈËʿй©£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйܷþÎñÌṩÉÌ´¦ÇÔÈ¡µÄ¡£È»¶ø£¬Ä¿Ç°Éв»Ã÷ÏÔ˼¿ÆÕâ´ÎйÃÜÊÂÎñÊÇ·ñÓë´Ëǰ6Ô·ݵÄйÃÜÊÂÎñÓйء£
https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/
5. ³¯ÏʺڿÍÀûÓÃFASTCashÐÂÐÍLinux±äÖÖµÁÈ¡½ðÈÚ»ú¹¹×ʽð
10ÔÂ14ÈÕ£¬³¯ÏʺڿÍÕýÀûÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³Ö´ÐÐδ¾ÊÚȨµÄÏÖ½ðÌáÈ¡¡£FASTCashÏÈÇ°ÖØÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬µ«×îз¢ÏÖµÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷ÁìÓò¡£×Ô2016ÄêÒÔÀ´£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¶È·¢ÆðATMÈ¡¿î¹¥»÷£¬ÇÔÈ¡ÊýǧÍòÃÀÔª£¬CISAÓÚ2018Äê³õ´ÎÖÒ¸æ¸ÃÍþв£¬²¢½«Æä¹é×ïÓÚ³¯Ïʵ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯¡°°µ²ØÑÛ¾µÉß¡±¡£2020Ä꣬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬Ò»Äêºó£¬ÈýÃû³¯ÏÊÈËÒòÉæÏӲμӴËÀà´òËã±»¸æ×´£¬ÇÔÈ¡½ð¶î³¬¹ý13ÒÚÃÀÔª¡£HaxRob·¢ÏÖµÄбäÖÖÓÚ2023Äê6Ô³õ´ÎÌá½»¸øVirusTotal£¬ËüÒÔ¹²Ïí¿â´ó¾Ö×¢Èëµ½Ö§¸¶»¥»»·þÎñÆ÷¹ý³ÌÖУ¬À¹½Ø²¢°Ñ³ÖISO8583ÂòÂôÐÅÏ¢£¬½«ÂòÂô»Ø¾øÏìÓ¦´úÌæÎªºË×¼£¬²¢Ô̺¬Ëæ»ú½ð¶î£¬Ê¹ºÚ¿Í¿ÉÄÜ´ÓATMÖÐÌáÈ¡Ïֽ𡣸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬Åú×¢Æä¿ÉÌӱܴóÎÞÊý°²È«¹¤¾ß¡£´Ë±í£¬HaxRob»¹»ã±¨ÁËFASTCashеÄWindows°æ±¾µÄ³öÏÖ£¬ÏÔʾºÚ¿ÍÔÚ»ý¼«¸Ä½øÆä¹¤¾ß¼¯¡£
https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/
6. Gryphon HealthcareÔâ·êÊý¾Ýй¶£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡
10ÔÂ14ÈÕ£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡·þÎñÌṩÉÌ£¬Ôâ·êÁËһ·¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËÓ×ÎÒÐÅϢй¶µÄÊÂÎñ¡£·¸·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬°ÑÎÕÁË»¼ÕßµÄÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·¡¢Éç»á±£ÏÕºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬Ô̺¬Õï¶Ï¡¢Ò½ÖΡ¢´¦·½ºÍ±£ÏÕÐÅÏ¢µÈ¡£Gryphon°µÊ¾Ê®·Ôì÷³ÁÐÅÏ¢°²È«£¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬵«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£¾Ý³Æ£¬Õâ393,358ÃûÓ×ÎÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥·þÎñµÄ×éÖ¯´æ´¢£¬¿ÉÄÜÔ̺¬Ò½Ôº¡¢¼¹ØïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£GryphonÔÚ·¢ÏÖÊÂÎñºóµ±¼´²ÉÈ¡´ëÊ©¼ÓÇ¿°²È«ÐÔ£¬µ«²¢Î´¾ßÌå×¢Ã÷ÊÂÎñÐÔÖÊ¡£½«À´¼¸¸öÔ£¬Ëæ×ÅÂÉʦÃÇÄⶨ¼¯ÌåËßËÏ´òË㣬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£
https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/


¾©¹«Íø°²±¸11010802024551ºÅ