΢ÈíÅû¶ÀûÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
Ðû²¼Ê±¼ä 2023-04-181¡¢Î¢ÈíÅû¶ÀûÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
4ÔÂ13ÈÕ£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄµöÓã¹¥»÷»î¶¯¡£µöÓãÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£ZIPÎĵµ°üÂÞÐí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬µ«Êµ¼ÊÉÏÊÇWindows¿ì½Ý·½Ê½¡£¿ì½Ý·½Ê½Ö´ÐÐPowerShell£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬½ø¶ø°²×°Remcos RAT¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ·ÃÎÊȨÏÞ£¬¹¥»÷Õß¿ÉÀûÓôËȨÏÞ½øÒ»²½Á÷´«£¬ÇÔÈ¡Êý¾Ý²¢°²×°ÆäËü¶ñÒâÈí¼þ¡£
https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/
2¡¢ÐÂ¼ÓÆÂ¼ÓÃÜ»õ±Ò½»Òׯ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª
ýÌå4ÔÂ15Èճƣ¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜ»õ±Ò½»Òׯ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬ËðʧԼ2300ÍòÃÀÔª¡£ÉùÃ÷ÌåÏÖ£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×Ö»õ±Ò£¬°üÂÞÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£Bitrue³Æ£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø·ÃÎʵÄÈÈÇ®°ü£¬Ö»°üÂÞBitrue×Ü×ʽðµÄ²»µ½5%£¬ÆäÓàÇ®°üÈÔÈ»Äþ¾²¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬Í¬Ê±½øÐÐÄþ¾²¼ì²é£¬¼Æ»®ÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£
https://therecord.media/bitrue-23million-stolen-cryptocurrency
3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ
²¨À¼¾üÊ·´Ç鱨¾Ö¼°¼ÆËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷Óйء£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬½üÆÚ»î¶¯µÄÐí¶àÒªËØ£¬°üÂÞ»ù´¡ÉèÊ©¡¢Ê¹Óõļ¼ÊõºÍ¹¤¾ß£¬¶¼Óë¹ýÈ¥µÄAPT29»î¶¯Öصþ¡£¹¥»÷Õë¶ÔÍâ½»ÈËÔ±£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½µöÓãÓʼþ£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬°üÂÞSNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£Ä¿Ç°£¬¸Ã»î¶¯ÈÔÔÚ½øÐÐÖС£
https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html
4¡¢AhnLab·¢ÏÖÀÕË÷Èí¼þTrigona¹¥»÷MS-SQL·þÎñÆ÷µÄ»î¶¯
AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢ÏÖÁËÀÕË÷Èí¼þTrigona¹¥»÷¹ÜÀí²»ÉÆµÄMS-SQL·þÎñÆ÷µÄ»î¶¯¡£¾ÝÍÆ²â£¬¹¥»÷ÕßÔÚ°²×°Trigona֮ǰÊ×ÏȰ²×°Á˶ñÒâÈí¼þCLR Shell¡£CLR ShellÓÐÒ»¸öÀûÓÃÌáȨ©¶´µÄÀý³Ì£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£MS-SQL½ø³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå°²×°Trigona¡£svcservice.exeÊÇÒ»¸ödropper£¬ËüÔÚͬһ·¾¶ÉÏ´´½¨²¢Ö´ÐÐʵ¼ÊµÄTrigonaÀÕË÷Èí¼þ£¬¼´svchost.exe¡£
https://asec.ahnlab.com/en/51343/
5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄ·ÖÎö³ÂËß
4ÔÂ14ÈÕ£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢ÈËÔ±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬·Ö±ðΪDomino BackdoorºÍDomino Loader¡£Í¨³££¬Dave Loader»á·Ö·¢Domino Backdoor¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬È»ºóÏÂÔØDomino Loader¡£Loader»á°²×°ÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡·¨Ê½¡£DominoµÄ´úÂëÓëLizarÓдóÁ¿Öصþ£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£
https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/
6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄ·ÖÎö³ÂËß
4ÔÂ13ÈÕ£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´·þÎñ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄ·ÖÎö³ÂËß¡£¸ÃÍÅ»ïµÄ¼ÆÄ±Ö»×¨×¢ÓÚÒ»¼þÊ£¬¼´µÍµ÷ÐÐÊ¡£ËûÃǵÄÄ¿±ê²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇé¿öÏÂ׬Ǯ¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿Ãŵȣ¬ÒÔ¾¡¿ÉÄܼõÉÙ¹Ø×¢¡£¸ÃÍÅ»ïµÄÒµÎñÉèÖã¬ÒªÇóÁ¥Êô»ú¹¹±£³Ö»îÔ¾£¬·ñÔòËûÃǵÄÕÊ»§½«±»É¾³ý¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html