Kaspersky·¢ÏÖAPT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-08-03

1¡¢Kaspersky·¢ÏÖAPT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷


KasperskyÔÚ7ÔÂ31ÈÕ³Æ £¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚÀûÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯ £¬Ö¼ÔÚ´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý¡£ÊӲ췢ÏÖ £¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²îÒìµÄÖ²È뷨ʽ £¬Ã¿¸öÖ²È뷨ʽ¶¼ÓÃÓÚ²îÒìµÄ¹¥»÷½×¶Î¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·Ý £¬Éæ¼°Èý¸ö²îÒìµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²È뷨ʽ½¨Á¢¶ÔÄ¿±êϵͳµÄ³Ö¾ÃÐÔºÍÔ¶³Ì·ÃÎÊ £¬²¢ÊÕ¼¯Õì²ìÊý¾Ý£»µÚ¶þ½×¶Î £¬APT31»á°²×°¸üרҵµÄ¶ñÒâÈí¼þ £¬À´Ê¹ÓÃUSBÁ÷´«´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý£»×îºóµÄµÚÈý½×¶Î £¬ºÚ¿ÍʹÓÃÖ²È뷨ʽ½«ÊÕ¼¯µ½µÄÊý¾ÝÉÏ´«µ½C2·þÎñÆ÷¡£


https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/


2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷ͬÒâ½»45ÍòÃÀÔªÊê½ð


¾Ý8ÔÂ1ÈÕ±¨µÀ £¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷ £¬¸ÃÕòµÄ±£ÏÕ¹«Ë¾Óë¹¥»÷ÕßЭÉ̸濢ÁË45ÍòÃÀÔªµÄºÍ½âЭÒé¡£ÁÙʱÕò³¤Hartnett³Æ £¬Ä¿Ç°¹¥»÷ÒѾ­µÃµ½Á˽â¾ö £¬¶Ô¸ÃÕòÒµÎñºÍÔËÓªÖÁ¹ØÖØÒªµÄÊý¾ÝÒ²Òѻָ´¡£µ«ÊÇһЩÊôÓÚ¸öÈËÓû§µÄÊý¾Ý £¬ºÍÉæ¼°Îª¸ÃÕò·þÎñ²¢´æ´¢¹ýÈ¥¼Ç¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£ÕâЩ¶ªÊ§µÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÈ»¹«¹²¼Ç¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£


https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/


3¡¢Cofense³Æ½üÆÚÀûÓÃGoogle AMPµÄµöÓã»î¶¯ÊýÁ¿Ôö¶à


 CofenseÓÚ8ÔÂ1ÈÕ͸¶ £¬ÀûÓÃGoogle AMPµÄµöÓã»î¶¯ÊýÁ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔö¼Ó¡£Google AMPÊÇÓÉGoogleÓë30¸öºÏ×÷»ï°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü £¬Ö¼ÔÚÌá¸ßÒÆ¶¯É豸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙ¶È¡£ÕâÖÖеĵöÓã¼ÆÄ±½«AMP URLǶÈëµöÓãÓʼþÖÐ £¬ÕâЩ¶ñÒâURLÓÚ5Ô·ݿªÊ¼·ºÆð £¬Ä¿Ç°ÈÔÔÚÁ÷´« £¬Ö¼ÔÚÇÔȡԱ¹¤µÇ¼ƾ¾Ý¡£´ËÀà»î¶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£´ËÍâ £¬¹¥»÷»î¶¯·Ç³£Òþ±Î £¬²»½öÀûÓÃÁËGoogle AMP URL £¬»¹½áºÏÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÄþ¾²»ù´¡ÉèÊ©¡£


https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/


4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûȻӡ¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â


¾Ý7ÔÂ31ÈÕ±¨µÀ £¬Ñо¿ÈËÔ±·¢ÏÖÃûΪUsNsAµÄºÚ¿Í¹ûÈ»ÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â £¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É £¬×ܾÞϸԼΪ1.8 GB £¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ £¬°üÂÞÑо¿ÂÛÎĵÈ¡£Ñо¿ÈËÔ±Ö¸³ö £¬¹¥»÷ÕßÀûÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢Èë©¶´À´»ñµÃδ¾­ÊÚȨµÄ·ÃÎÊȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â £¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£ 


https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum


5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½Ê½Collide+PowerÓ°Ï켸ºõËùÓÐCPU


¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ £¬Ñо¿ÍŶӷ¢ÏÖÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½Ê½ £¬Ó°ÏìÁ˼¸ºõËùÓÐCPU £¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£ÆäÖ÷Òª¿´·¨ÊÇ £¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦Ó÷¨Ê½·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖз¢ÉúÊý¾Ý¡°³åÍ»¡±²¢ÁýÕÖǰÕßʱ £¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¸Ã©¶´±»×·×ÙΪCVE-2023-20583 £¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦ÖÃÆ÷¡£¸Ã©¶´¾ßÓÐÑо¿ÒâÒå £¬µ«ÀûÓÃÆðÀ´±ÈÁ¦À§ÄÑ £¬Òò´ËÑÏÖØË®Æ½½ÏµÍ¡£ÖÁÓÚ»º½â´ëÊ© £¬ÐèÒªÖØÐÂÉè¼ÆCPU £¬ËùÒÔ¸üÏÖʵµÄ»º½â´ëÊ©ÊÇ·ÀÖ¹¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźÅ¡£


https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/


6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


8ÔÂ1ÈÕ £¬Unit 42³ÆÆä·¢ÏÖÁËÒ»¸öеĵöÓã»î¶¯ £¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¸Ã»î¶¯ÓÚ2022Äê12ÔÂ×óÓÒ¿ªÊ¼ £¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÈ¡ÐÅÏ¢¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer £¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£´Ë´Î·¢ÏÖµÄ»î¶¯Éæ¼°Á½¸ö±äÌå £¬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§ £¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜ»õ±Ò×ʽðµÈ£»µÚ¶þ¸öÖ§³ÖÌØ±ð¹¦Ð§ £¬ÀýÈç½âÎöOutlookÓʼþ¡¢Í¨¹ýTelegram½øÐÐÊý¾Ýй¶¡¢½Ù³ÖFacebookÕË»§ºÍ·´·ÖÎöµÈ¡£


https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/