ÍøÂç·¸×ï·Ö×Ó¶Ô×¼AWS»·¾³£¬ÀûÓÃÅäÖÃÃýÎóÍÆËÍ´¹µö»î¶¯
°ä²¼¹¦·ò 2025-03-041. ÍøÂç·¸×ï·Ö×Ó¶Ô×¼AWS»·¾³£¬ÀûÓÃÅäÖÃÃýÎóÍÆËÍ´¹µö»î¶¯
3ÔÂ3ÈÕ£¬¾ÝPalo Alto Networks Unit 42µÄµ÷²é£¬ÍøÂç·¸×ï·Ö×ÓÕýÕë¶ÔÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»·¾³£¬ÏòÖ¸±êÍÆËÍÍøÂç´¹µö»î¶¯¡£Ò»¸öÃûΪTGR-UNK-0011µÄ»î¶¯¼¯Èº£¨ÓëJavaGhost×éÖ¯ÓгÁµþ£©×Ô2019ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬º¹ÇàÉÏרһÓÚÍøÕ¾´Û¸Ä£¬µ«×Ô2022ÄêÆðתÏò·¢ËÍÍøÂç´¹µöÓʼþÒÔıȡ¾¼ÃÀûÒæ¡£ÕâЩ¹¥»÷²¢Î´ÀûÓÃAWS·ì϶£¬¶øÊÇÀûÓÃÊܺ¦Õß»·¾³ÖÐAWS½Ó¼ûÃÜÔ¿µÄÅäÖÃÃýÎó£¬Í¨¹ýÀÄÓÃSESºÍWorkMail·þÎñ·¢ËÍ´¹µöÐÂÎÅ£¬´Ó¶øÈƹýµç×ÓÓʼþ±£»¤¡£¹¥»÷ÕßÒ»µ©»ñµÃ¶ÔAWSÕË»§µÄ½Ó¼ûȨÏÞ£¬¾Í»áÌìÉúһʱƾ֤ºÍµÇ¼URL£¬°µ²ØÉí·Ý²¢²é¿´ÕË»§×ÊÔ´¡£ËûÃÇ»¹ÀûÓÃSESºÍWorkMail³ÉÁ¢´¹µö»ù´¡ÉèÊ©£¬´´½¨ÐÂÓû§²¢ÉèÖÃSMTPƾ֤·¢ËÍÓʼþ¡£JavaGhost´´½¨Á˶àÖÖIAMÓû§£¬ÆäÖÐδʹÓõÄÓû§Ëƺõ×÷Ϊ³Ö¾ÃÓÆ¾ÃÐÔ»úÔì¡£´Ë±í£¬ËûÃÇ»¹´´½¨ÁËÒ»¸öÐÂIAM½ÇÉ«£¬ÔÊÐí´ÓÁíÒ»¸ö½ÚÔìµÄAWSÕË»§½Ó¼ûÖ¸±êÕË»§¡£Unit 42Ö¸³ö£¬¸Ã×éÖ¯ÔÚ¹¥»÷¹ý³ÌÖÐÁôÏÂÒ»ÑùÏóÕ÷£¬Í¨¹ý´´½¨ÃûΪJava_GhostµÄEC2°²È«×飬×éÃèÊöΪ¡°ÎÒÃÇ´æÔÚµ«²»Ë½¼û¡±£¬ÕâЩ°²È«×é²»Ô̺¬Èκΰ²È«¹æ¶¨¡£
https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
2. ÅÁÀÍÎÀÉú²¿Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ºóѸ¿ì¸´Ô
3ÔÂ4ÈÕ£¬ÉýƽÑ󵺹úÅÁÀ͵ÄÎÀÉú²¿½üÆÚÔâ·êÁËÒ»´ÎÓɳÛÃû·¸×ïÍÅ»ïQilinÌáÒéµÄÀÕË÷Èí¼þ¹¥»÷¡£Õâ´Î¹¥»÷µ¼ÖÂÅÁÀÍÎÀÉúÓ빫¼Ò·þÎñ²¿£¨MHHS£©µÄITϵͳ±»ÈëÇÖ£¬²¿ÃÅÎļþ±»ÇÔÈ¡¡£ÅÁÀ͹ú¶ÈÒ½Ôº×÷Ϊ¸Ã¹ú¹Ø¼üÒ½ÁÆ»ú¹¹£¬ÆäÔËÓªÒò¶øÊܵ½Íþв¡£È»¶ø£¬ÔÚÅÁÀÍ¡¢°Ä´óÀûÑÇÍøÂ簲ȫר¼ÒºÍ²ÆÕþ²¿¹ÙÔ±µÄÐÖúÏ£¬µ±¾ÖѸ¿ì²éÃ÷ÊÂÎñÕæÏ࣬²¢ÔÚ48Ó×ʱÄÚ¸´ÔÁËÒ½ÔºµÄÕý³£ÔËÓª¡£Í¬Ê±£¬ÃÀ¹úÍøÂç˾Á¡°Ç°ÑØ·ÀÓù¡±Ó××éÒ²ÔÚÏÖ³¡½øÐÐÈ¡Ö¤ÍøÂçºÍ·ÖÎö¡£÷è÷ëºÚ¿ÍÍþвҪ°ä²¼ÇÔÈ¡µÄÊý¾Ý£¬µ«ÅÁÀ͹ÙÔ±²¢Î´ÊÔͼÐÉÌÊê½ð¡£Ö»¹Ü²¿Ãű»µÁÐÅÏ¢Òѱ»°ä²¼£¬Ô̺¬»¼ÕßÕ˵¥ÌáÒªµÈÓ×ÎÒÐÅÏ¢£¬µ«MHHSÒÔΪÕâЩÐÅϢй¶²»»á¶ÔÅÁÀÍÓ×ÎҵݲȫÔì³É³Á´óÓ°Ï죬µ«ÈÔ½¨ÒéÃñ¶àά³Ö¾¯Ì裬·À±¸Ç±ÔÚµÄڲƺÍÍøÂç´¹µöÓʼþ¡£´Ë±í£¬÷è÷ëÀÕË÷Èí¼þÍÅ»ï½üÆÚ»¹Õë¶ÔÆäËûÒ½ÁÆ»ú¹¹¡¢´¦Ëùµ±¾ÖºÍ´óÐ͹«Ë¾·¢Õ¹Á˹¥»÷£¬ÒýÆðÁË¿í·º¹Ø×¢¡£
https://therecord.media/palau-health-ministry-ransomware-recover
3. ¼Ù¼¼ÊõÖ§³ÖʹÓõ绰ºÍMicrosoft TeamsÓÕÆÓû§×°ÖÃÀÕË÷Èí¼þ
3ÔÂ3ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢³öÖҸ棬һÖÖеÄȦÌ×ÔÚËÁŰ£¬ÍøÂç·¸×ï·Ö×Ó¼Ù°ç³É¼¼ÊõÖ§³ÖÈËÔ±£¬Í¨¹ý·¢ËÍ´óÁ¿µç×ÓÓʼþ²¢ÀûÓà Microsoft Teams »òµç»°ÓÕÆÊܺ¦ÕߵǼ£¬½ø¶ø»ñȡԶ³Ì½Ó¼ûȨÏÞ¡£ËûÃÇʹÓúϷ¨µÄWindows·¨Ê½Quick AssistÀ´ÌṩԶ³Ì¼¼ÊõÖ§³Ö£¬µ«ÊµÔòÔÚ×°ÖÃÃûΪBackConnectµÄºóÃŶñÒâÈí¼þ£¬Ê¹¹¥»÷Õß¿ÉÄÜÆëÈ«½ÚÔìÊÜϰȾµÄϵͳ¡£ÕâһȦÌ×Óë³ôÃûÔ¶ÑïµÄBlack BastaÀÕË÷Èí¼þ×éÖ¯çÇÃÜÓйأ¬¸Ã×éÖ¯ÔøÔÚ2024ÄêÒòÀàËÆÊÖ·¨±»ÏóÕ÷£¬²¢¾Ý±¨Â·ÔÚ2023Äê´ÓÊܺ¦ÕßÄÇÀï׬ȡÁ˳¬¹ý1ÒÚÃÀÔª¡£´Ë±í£¬Ò»Ð©Black Basta³ÉÔ±ÒѾתÏòCactusÀÕË÷Èí¼þÍŻ×î½üµÄCactus¹¥»÷ÖÐʹÓõIJ½ÖèÓëBlack Basta¾ªÈ˵ØÀàËÆ¡£ÕâЩ¹¥»÷ÖØÒªÕë¶Ô±±ÃÀµÄÔì×÷Òµ¡¢½ðÈÚ¡¢Í¶×ÊÕ÷ѯºÍ·¿µØ²úÐÐÒµ£¬×Ô2024Äê10ÔÂÒÔÀ´ÓÈΪ»îÔ¾¡£¹¥»÷ÕßÀûÓÃÉç½»¹¤³ÌºÍÀÄÓÃÕý°æÈí¼þºÍÔÆ·þÎñÏà½áºÏµÄ·½Ê½£¬Ê¹¶ñÒâÐÐΪ¿´ÆðÀ´ÏñÕý³£µÄÍÆËã»ú»î¶¯¡£ÍøÂ簲ȫ²»½öÔÚÓÚÕ¼ÓÐÕýÈ·µÄÈí¼þ£¬¸üÔÚÓÚÒâʶµ½·¸×ï·Ö×ÓÈôºÎÊÔͼºýŪÈËÃÇ¡£Òò¶ø£¬Microsoft TeamsÓû§Ó¦Î¬³Ö¾¯Ì裬Ԥ·ÀÊܵ½´ËÀàȦÌ×µÄÇÖº¦¡£
https://hackread.com/fake-it-support-calls-microsoft-teams-users-install-ransomware/
4. ¶íÂÞ˹µçОÞÍ·BeelineÔÙÔâDDoS¹¥»÷
3ÔÂ3ÈÕ£¬¶íÂÞ˹µçÐŹ«Ë¾BeelineÔâ·êÁ˶¨ÏòÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬µ¼Ö²¿ÃÅÓû§»¥ÁªÍøÖжϣ¬ÕâÊǽü¼¸ÖÜÄÚÕë¶Ô¸Ã¹«Ë¾µÄµÚ¶þ´Î³Á´ó¹¥»÷¡£Õâ´Î¹¥»÷Ó°ÏìÁËBeelineµÄÒÆ¶¯ÀûÓ÷¨Ê½¡¢ÍøÕ¾ºÍ»¥ÁªÍø·þÎñ£¬Óû§ÔÚ½Ó¼ûʱÓöµ½ÄÑÌ⣬Ī˹¿ÆºÍÖܱߵØÓòµÄÓû§·×·×ͶËßÏνÓÎÊÌâ¡£BeelineÒѲÉÈ¡´ëÊ©²»±ä·þÎñ£¬µ«Î´Ìṩ¸ü¶àϸ½Ú¡£½ñÄê2Ô£¬BeelineÒ²ÔøÔâ·êÀàËÆ¹¥»÷£¬µ¼Ö´óÃæ»ý·þÎñÖжϡ£Õâ´Î¹¥»÷Óë1Ô¶íÂÞ˹µçОÞÍ·MegaFonÔâ·êµÄ¹¥»÷ÀàËÆ£¬¾ùÓÉ´ó¹æÄ£DDoS¹¥»÷Ôì³É£¬±»ÒÔΪÊÇÕë¶ÔµçÐÅÐÐÒµµÄÑϳÁºÚ¿Í»î¶¯Ö÷ÒåÍøÂç¹¥»÷Ö®Ò»¡£Beeline֮ǰ¹éºÉÀ¼¹«Ë¾VeonËùÓУ¬VeonÔÚÈëÇÖÎÚ¿ËÀ¼ºóÆðÍ·°þÀëÆä¶íÂÞ˹ҵÎñ¡£Õâ´Î¹¥»÷ÊǶíÂÞ˹µçÐÅÐÐҵһϵÁÐÍøÂçÊÂÎñÖ®Ò»£¬Ô̺¬RostelecomÒÉËÆÔâ·êÍøÂç¹¥»÷¡¢ÎÚ¿ËÀ¼ÍøÂçͬÃËÐû³Æ¶Ô¶íÂÞ˹»¥ÁªÍøÌṩÉÌNodexµÄ¹¥»÷ÕÆ¹Ü£¬ÒÔ¼°Rapporto»ã±¨Æä»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷µÈ¡£
https://therecord.media/russian-telecom-beeline-outages-cyber
5. еÄClickFix¹¥»÷ͨ¹ýMicrosoft Sharepoint²¿ÊðHavoc¿ò¼Ü
3ÔÂ3ÈÕ£¬Ð·¢ÏÖµÄClickFixÍøÂç´¹µö»î¶¯ÓÕÆÊܺ¦ÕßÖ´ÐжñÒâPowerShellºÅÁÒÔ²¿ÊðHavocºóÀûÓÿò¼ÜÀ´Ô¶³Ì½Ó¼ûÊÜϰȾÉ豸¡£ClickFix ÊÇÈ¥Äê³öÏÖµÄÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ£¬ÍþвÐÐΪÕßͨ¹ý´´½¨ÏÔʾÐéαÃýÎóµÄÍøÕ¾»ò¸½¼þ£¬ÌáÐÑÓû§µ¥»÷°´Å¥½¨¸´ÃýÎó¡£µ¥»÷ºó£¬¶ñÒâPowerShellºÅÁî»á±»¸´Ôìµ½¼ôÌù°å£¬¶øºóÌáÐÑÓû§Õ³Ìùµ½ºÅÁîÌáÐÑ·ûÖУ¬ÏÖʵÉÏÖ´ÐеÄÊÇÔ¶³ÌÕ¾µãÉϵĶñÒâ¾ç±¾£¬ÏÂÔØ²¢×°ÖöñÒâÈí¼þ¡£ÔÚ×î½üµÄÒ»´ÎClickFix»î¶¯ÖУ¬ÍþвÐÐΪÕßÀûÓÃMicrosoftÔÆ·þÎñ£¬·¢ËÍ´¹µöÓʼþÐû³ÆÓÓ×°ÏÞ¶È֪ͨ¡±£¬ÓÕʹÓû§´ò¿ªHTMLÎĵµºóÏÔʾ¼ÙµÄÃýÎóÌáÐÑ£¬Êèµ¼Óû§Ö´ÐÐPowerShellºÅÁî¡£¸ÃºÅÁîÆô¶¯ÍйÜÔÚÍþвÐÐΪÕßSharePoint·þÎñÆ÷Éϵľ籾£¬²é³É豸ÊÇ·ñÔÚɳºÐ»·¾³ÖУ¬¶øºóÅú¸Ä×¢²á±í¡¢×°ÖÃPythonÚ¹ÊÍÆ÷£¬²¢ÏÂÔØ²¢Ö´ÐÐPython¾ç±¾ÒÔ²¿ÊðHavoc¿ò¼Ü¡£Havoc¿ò¼ÜÔÊÐí¹¥»÷ÕßÔ¶³Ì½ÚÔìÉ豸£¬Í¨¹ýMicrosoft Graph APIÓëÍþвÐÐΪÕߵķþÎñͨѶ£¬»ìÈëͨÀýÍøÂçͨѶÒÔÌӱܼì²â¡£ClickFix¹¥»÷Ô½À´Ô½ÊÜÓ½Ó£¬±»ÓÃÓÚ²¿Êð¸÷Àà¶ñÒâÈí¼þ£¬ÍþвÐÐΪÕß»¹²»ÐݸĽø¼¼Êõ£¬ÀûÓÃÉ罻ýÌåÆ½Ì¨ÓÕÆÓû§¡£
https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/
6. ²¨À¼º½Ìì¾ÖÔâÍøÂç¹¥»÷£¬Ì«¿Õ»ú×é³ÉºÚ¿ÍÐÂÖ¸±ê
3ÔÂ3ÈÕ£¬²¨À¼º½Ìì¾Ö£¨POLSA£©ÖÜÈÕ°ä·¢ÆäÔâ·êÁËÍøÂç¹¥»÷£¬²¢ÒѶϿªÓ뻥ÁªÍøµÄÏνӽøÐе÷²é£¬Í¬Ê±ÆäÍøÕ¾½ØÖÁÖÜÒ»ÈÔÎÞ·¨½Ó¼û¡£¹ú¶ÈÍøÂ簲ȫ·þÎñ²¿ÃÅÒѼì²âµ½¶ÔPOLSA IT»ù´¡ÉèÊ©µÄδ¾ÊÚȨ½Ó¼û£¬²¢ÔÚ±£»¤ÊÜÓ°ÏìµÄϵͳ£¬Í¬Ê±ÖÂÁ¦¼ø±ð¹¥»÷Õß¡£Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷ÊÇÓÉÀÕË÷Èí¼þ×éÖ¯»¹ÊÇÕþÖζ¯»úµÄºÚ¿ÍÌáÒ飬Ҳδй©ºÚ¿ÍÈëÇÖϵͳµÄ¾ßÌåϸ½Ú¡£POLSAÊDz¨À¼ÕƹÜÌ«¿Õ»î¶¯È·µ±¾Ö»ú¹¹£¬Ò²ÊÇÅ·ÖÞº½Ìì¾Ö³ÉÔ±£¬Æä¿ÉÄܳÉΪºÚ¿ÍµÄÓÕÈËÖ¸±ê£¬ÓÉÓÚÓë¾üʺ͵ý±¨»ú¹¹µÄºÏ×÷¿ÉÄܶ³öÃô¸ÐµÄ¹ú·ÀÓйØÐÅÏ¢¡¢ÎÀÐÇÔËÓª»ò»úÃÜ×êÑУ¬Î£¼°¹ú¶È°²È«¡£²¨À¼ÒѳÉΪÇ×¶íºÚ¿ÍµÄÖØÒªÖ¸±ê£¬½ñÄêÍøÂç¹¥»÷ÊýÁ¿·±¶£¬Îª´Ë²¨À¼ÒÑͶ×Ê7.6ÒÚÃÀÔª¼ÓÇ¿ÍøÂ簲ȫ¡£
https://therecord.media/poland-space-cyberattack-agency-investigate


¾©¹«Íø°²±¸11010802024551ºÅ