·¨¹úÕþ¸®ÍøÕ¾ÒòÑÏÖصÄÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷¶øÖжÏ
Ðû²¼Ê±¼ä 2024-03-133ÔÂ12ÈÕ£¬×ÜÀí¼Ó²¼Àï°£¶û¡¤°¢Ëþ¶û°ì¹«ÊÒµÄÒ»·ÝÉùÃ÷ÈÏ¿É£¬½ØÖÁÖÜÈÕÍí¼ä£¬Ò»Ð©ÍøÕ¾ÒÑÏÝÈëÀ§¾³£¬²¢Ìáµ½ÁËÇ°ËùδÓеÄÇ¿¶ÈµÄͨÀý¹¥»÷¡£¸ÃÓïÑÔËƺõÖ¸µÄÊÇÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷£¬¶ø Cloudflare µÄRadar·þÎñÇ¡ºÃ¼ì²âµ½ÁË´ËÀ๥»÷¡£Cloudflare ³ÂË߳ƣ¬¸ÃʼþÓÚÖÜÈÕÁ賿¿ªÊ¼£¬Ñ¸ËÙÉý¼¶£¬¶ÌÔÝÏûÍË£¬È»ºóÓÖ¾íÍÁÖØÀ´£¬Á¬ÐøÁËԼĪÁù¸öСʱµÄÖØ´ó¹¥»÷¡£·¨¹úµÄÊý×Ö»¯×ªÐÍ»ú¹¹¡ª¡ª²¿¼ÊÊý×ÖÀíÊ»á (DINUM) ÕùÏÈ¿ÖºóµØÉèÖÃÕÏ°À´µÖÓù¹¥»÷¡£ÄäÃûËÕµ¤Éù³Æ¶ÔÕâ´ÎÏ®»÷ÂôÁ¦£¬È»ºóÉù³ÆDINUM µÄ·ÀÓùÎÞЧ£¬×ÌÈÅÈÔÔÚ¼ÌÐø¡£Cloudflare µÄÊý¾ÝÏÔʾ£¬µÚ 7 ²ã¹¥»÷ÔÚÖÜÒ»ºÍÖܶþ¼¤Ôö¡£ÕâÖÖ²»Âú¿ÉÄÜ»¹»áÁ¬ÐøÏÂÈ¥¡£Cloudflare µÄ Radar ÉÏÖܳÂËßÁ˹æÄ£½ÏСµÄ DDoS ¹¥»÷£¬µ«ÕâЩ¹¥»÷²¢Î´³ÉΪÐÂÎÅ£¬Ò²Ã»ÓÐÑÏÖØÈÅÂÒ·¨¹úÕþ¸®µÄÔË×÷¡£¾Ý±¨µÀ£¬ÉÏÖÜÈÕµÄÏ®»÷Ó°ÏìÁË×ÜÀí¸®¡¢Ãñº½¾ÖºÍ¾¼Ã²¿¡£
https://www.theregister.com/2024/03/12/france_ddos/
2. KrustyLoader ºóÃŹ¥»÷ Windows ºÍ Linux ϵͳ
3ÔÂ12ÈÕ£¬ÍøÂçÄþ¾²ÁìÓòµÄ×îÐÂÉú³¤°üÂÞ KrustyLoader µÄ·ºÆð£¬ÕâÊÇÒ»ÖÖ»ùÓÚ Rust µÄÅÓ´óºóÃÅ£¬ÒýÆðÁ˶à¸öÐÐҵר¼ÒµÄ×¢Òâ¡£ÕâÖÖ¶ñÒâÈí¼þÓµÓÐ Windows ºÍ Linux ±äÌ壬É漰һϵÁÐÓÐÕë¶ÔÐԵĹ¥»÷£¬¶Ô¿çƽ̨µÄÍøÂçÄþ¾²·ÀÓù·¢ÉúÖØ´óÓ°Ïì¡£KrustyLoader µÄLinux ±äÌåÒòÆäÕë¶Ô Avanti É豸µÄÕë¶ÔÐÔ¹¥»÷¶øÔÚ 2023 Äêµ×ºÍ 2024 Äê³õ³ÉΪͷÌõÐÂÎÅ¡£ÕâЩ¹¥»÷±»ÈÏΪÊÇÖйú¹ØϵÍþв×éÖ¯ UNC5221 ËùΪ¡£¸Ã×éÖ¯ÀûÓÃÁËÁ½¸öÑÏÖØ©¶´CVE- 2024-21887ºÍCVE-2023-46805£¬ÔÊÐíÔÚ Ivanti Connect Secure (ICS) ºÍ Ivanti Policy Secure Gateway É豸ÉϽøÐÐδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐ (RCE) »òÉí·ÝÑéÖ¤Èƹý¡£ÀûÓÃÕâЩ©¶´´Ù½øÁË KrustyLoader µÄÏÂÔغÍÖ´ÐУ¬Ëæºó²¿ÊðÁËÀûÓú󹤾߰ü Sliver¡£¾¡¹ÜÕë¶ÔÕâЩ©¶´Ðû²¼Á˲¹¶¡£¬µ«Î´ÐÞ²¹µÄϵͳÈÔÈ»ÃæÁÙ·çÏÕ¡£
https://gbhackers.com/krustyloader-backdoor/
3. Infostealer αװ³É Adobe Reader °²×°·¨Ê½
3ÔÂ12ÈÕ£¬AhnLab Äþ¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢ÏÖÁËαװ³É Adobe Reader °²×°·¨Ê½µÄÐÅÏ¢ÇÔÈ¡·¨Ê½µÄÂþÑÜ¡£Íþв¼ÓÈëÕßÒÔ PDF ÐÎʽ·Ö·¢Îļþ£¬ÌáʾÓû§ÏÂÔز¢ÔËÐиÃÎļþ¡£¼ÙðµÄPDFÎļþÊÇÓÃÆÏÌÑÑÀÓï±àдµÄ£¬ÏûÏ¢¸æËßÓû§ÏÂÔز¢°²×°Adobe Reader¡£Í¨¹ý¸æËßÓû§ÐèÒª Adobe Reader ²ÅÆø´ò¿ª¸ÃÎļþ£¬Ëü»áÌáʾÓû§ÏÂÔضñÒâÈí¼þ²¢½øÐа²×°¡£ÏÂÔصÄÎļþ½ÓÄÉAdobe Readerͼ±êµÄÐÎʽ£¬ÆäÃû³ÆÉèÖÃΪReader_Install_Setup.exe¡£Í¨¹ýαװ Adobe Reader °²×°·¨Ê½£¬Ëü»áÌáʾÓû§ÔËÐÐËü¡£Ä¬ÈÏÇé¿öÏ£¬Windows ϵͳ½«Â·¾¶¡°%AppData%\Local\Microsoft\WindowsApps¡±×¢²áΪ PATH »·¾³±äÁ¿¡£Òò´Ë£¬µ± sdiagnhost.exe ½ø³Ì¼ÓÔØ BluetoothDiagnosticUtil.dll ʱ£¬¾Í»á¼ÓÔضñÒâ DLL Îļþ¡£Í¨¹ýÉÏÊö¹ý³Ì£¬Íþв¼ÓÈëÕß¿ÉÒÔͨ¹ý DLL ½Ù³ÖÈƹýÓû§ÕÊ»§¿ØÖÆ (UAC)¡£
https://asec.ahnlab.com/en/62853/
4. Equilend ¾¯¸æÔ±¹¤ËûÃǵÄÊý¾Ý±»ÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡
3ÔÂ11ÈÕ£¬×ܲ¿Î»ÓÚŦԼµÄ֤ȯ½è´ûƽ̨ EquiLend Holdings ÔÚ·¢¸øÔ±¹¤µÄÊý¾Ýй¶֪ͨÐÅÖÐ֤ʵ£¬ËûÃǵÄÊý¾ÝÔÚ 1 Ô·ݵÄÀÕË÷Èí¼þ¹¥»÷Öб»µÁ¡£Õâ¼Ò½ðÈڿƼ¼¹«Ë¾ÓÚ 1 Ô 24 ÈÕ¸æËß BleepingComputer£¬Ëü±»ÆÈÔÚÁ½ÌìÇ°£¨¼´ 1 Ô 22 ÈÕ£©¹Ø±Õ²¿ÃÅϵͳ£¬ÒÔֹͣΥ¹æÐÐΪ¡£ËäÈ» Equilend ûÓÐÁ¢¼´Åû¶Ê¼þµÄÐÔÖÊ£¬µ« LockBit ÀÕË÷Èí¼þÔÚ¸øÅí²©ÉçµÄÒ»·ÝÉùÃ÷ÖÐÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£¾¡¹ÜÕâ¼Ò½ðÈڿƼ¼¹«Ë¾Ã»ÓÐ֤ʵ LockBit µÄ˵·¨£¬µ«ËüÓÚ 2 Ô 2 ÈÕͨ¹ýÒ»¸öרÃÅÒ³Ãæ͸¶ÁËÓйظÃʼþµÄ¸ü¶àÐÅÏ¢£¬³Æ 1 Ô·ݵÄй¶ÊÇÓÉÀÕË÷Èí¼þ¹¥»÷Ôì³ÉµÄ¡£
https://www.bleepingcomputer.com/news/security/equilend-warns-employees-their-data-was-stolen-by-ransomware-gang/#google_vignette
5. BIANLIAN ÔÚÀÕË÷¹¥»÷ÖÐÀûÓà JETBRAINS TEAMCITY ©¶´
3ÔÂ11ÈÕ£¬GuidePoint Security µÄÑо¿ÈËÔ±ÔÚÊÓ²ì×î½üÓëBianLianÀÕË÷Èí¼þ×éÖ¯Ïà¹ØµÄ¹¥»÷ʱעÒâµ½£¬ÍþвÐÐΪÕßͨ¹ýÀûÓà TeamCity ·þÎñÆ÷ÖеÄȱÏÝ»ñµÃÁ˶ÔÄ¿±êµÄ³õʼ·ÃÎÊȨÏÞ¡£BianLian ÀÕË÷Èí¼þÓÚ 2022 Äê 8 Ô·ºÆ𣬸öñÒâÈí¼þ±»ÓÃÀ´¹¥»÷¸÷¸öÐÐÒµµÄ×éÖ¯£¬°üÂÞÖÆÔ졢ýÌåºÍÓéÀÖÒÔ¼°Ò½ÁƱ£½¡¡£2023 Äê 1 Ô£¬Äþ¾²¹«Ë¾ AvastÐû²¼ÁËBianLian ÀÕË÷Èí¼þµÄÃâ·Ñ½âÃÜÆ÷£¬ÔÊÐí¶ñÒâÈí¼þµÄÊܺ¦Õ߻ָ´Ëø¶¨µÄÎļþ¡£Ñо¿ÈËÔ±ÊÓ²ìµÄ¹¥»÷±³ºóµÄÍþвÐÐΪÕßÀûÓà TeamCity ȱÏÝ CVE-2024-27198 »ò CVE-2023-42793 À´»ñµÃ¶ÔÊܺ¦Õß»·¾³µÄ³õʼ·ÃÎÊȨÏÞ¡£¹¥»÷ÕßÔÚÒ×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏ´´½¨ÐÂÓû§²¢Ö´ÐжñÒâÃüÁîÒÔ½øÐкóÀûÓúͺáÏòÒƶ¯¡£È»ºó£¬ÍþвÐÐΪÕßÔÚÄ¿±ê»·¾³Öз¢ÏÖÁËÁ½¸ö¹¹½¨·þÎñÆ÷£¬ËûÃÇ´ÓÕâЩ·þÎñÆ÷À©´óÁËÔÚÊܺ¦Õß×éÖ¯ÖеÄÁ¢×ãµã£¬²¢×ªÏò½øÒ»²½ÀûÓá£Ñо¿ÈËÔ±×¢Òâµ½£¬BianLian ×éÖ¯¶à´ÎʵÑéÖ´ÐÐËûÃǵÄ×Ô½ç˵ GO ºóÃÅ£¬µ«¶¼Ê§°ÜÁË£¬È»ºóתÏò¿¿ÍÁµØΪÉú£¬²¢ÀûÓà PowerShell ʵÏÖËûÃǵĺóÃÅ¡£
https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html?web_view=true
6. ÐÂÒøÐÐľÂí CHAVECLOAK ͨ¹ýÍøÂçµöÓã¼ÆıÃé×¼°ÍÎ÷Óû§
3ÔÂ11ÈÕ£¬°ÍÎ÷µÄÓû§ÊÇÒ»ÖÖÃûΪCHAVECLOAKµÄÐÂÐÍÒøÐÐľÂíµÄÄ¿±ê£¬¸ÃľÂíͨ¹ý´øÓÐ PDF ¸½¼þµÄÍøÂçµöÓãµç×ÓÓʼþ½øÐÐÁ÷´«¡£Fortinet FortiGuard ʵÑéÊÒÑо¿Ô± Cara LinÌåÏÖ£º¡°ÕâÖÖÅÓ´óµÄ¹¥»÷Éæ¼° PDF ÏÂÔØ ZIP Îļþ£¬È»ºóÀûÓà DLL ²àÃæ¼ÓÔؼ¼ÊõÀ´Ö´ÐÐ×îÖյĶñÒâÈí¼þ¡£¡±¹¥»÷Á´É漰ʹÓÃÒÔºÏͬΪÖ÷ÌâµÄ DocuSign ÓÕ¶üÀ´ÓÕÆÓû§´ò¿ª°üÂÞÓÃÓÚÔĶÁºÍÇ©ÊðÎĵµµÄ°´Å¥µÄ PDF Îļþ¡£Êµ¼ÊÉÏ£¬µ¥»÷¸Ã°´Å¥»áµ¼Ö´ÓʹÓà Goo.su URL Ëõ¶Ì·þÎñËõ¶ÌµÄÔ¶³ÌÁ´½Ó¼ìË÷°²×°·¨Ê½Îļþ¡£°²×°·¨Ê½ÖдæÔÚÒ»¸öÃûΪ¡°Lightshot.exe¡±µÄ¿ÉÖ´ÐÐÎļþ£¬ËüÀûÓà DLL ²àÃæ¼ÓÔØÀ´¼ÓÔØ¡°Lightshot.dll¡±£¬ÕâÊÇÒ»ÖÖÓÐÖúÓÚÇÔÈ¡Ãô¸ÐÐÅÏ¢µÄ CHAVECLOAK ¶ñÒâÈí¼þ¡£Õâ°üÂÞÊÕ¼¯ÏµÍ³ÔªÊý¾Ý²¢ÔËÐмì²éÒÔÈ·¶¨ÊÜѬȾµÄ¼ÆËã»úÊÇ·ñλÓÚ°ÍÎ÷£¬Èç¹ûÊÇ£¬Ôò¶¨ÆÚ¼àÊÓǰ̨´°¿ÚÒÔ½«ÆäÓëÒøÐÐÏà¹Ø×Ö·û´®µÄÔ¤½ç˵Áбí½øÐбÈÁ¦¡£
https://thehackernews.com/2024/03/new-banking-trojan-chavecloak-targets.html