Turla APT ºÚ¿ÍÀûÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯
Ðû²¼Ê±¼ä 2024-04-124ÔÂ11ÈÕ£¬ÍøÂçÄþ¾²×¨¼Ò·¢ÏÖ£¬¶íÂÞ˹Turla¸ß¼¶Á¬ÐøÍþв (APT) ×éÖ¯Éø͸µ½°¢¶û°ÍÄáÑǵÄÒ»´Îʧ°ÜʵÑé¡£´ËʼþÊÇÕë¶ÔÅ·ÖÞ¹ú¼ÒµÄ¸ü¹ã·ºÍøÂç¼äµý»î¶¯µÄÒ»²¿ÃÅ£¬²¨À¼Ò²³ÉΪÕâЩÅÓ´ó¹¥»÷µÄÊܺ¦Õß¡£ÕâÒ»·¢ÏÖÓëÁ¬ÐøµÄµØÔµÕþÖνôÕžÖÊÆÏàÒ»Ö£¬²¢Í¹ÏÔÁ˹ú¼ÒÁªÃËÐÐΪÕß²»Í£Éý¼¶µÄÍøÂçÕ½¼Æı¡£Turla APT ×éÖ¯ÒÔÆäÅÓ´óµÄÍøÂç¼äµý»î¶¯¶øÎÅÃû£¬ÀúÀ´ÒÔÓ벨Â޵ĺ£ºÍ¶«Å·¹ú¼ÒÕþ¸®²¿ÃÅÓÐÁªÏµµÄ×é֯ΪĿ±ê¡£×î½üÔÚ°¢¶û°ÍÄáÑǺͲ¨À¼µÄ»î¶¯Í»ÏÔÁ˸Ã×éÖ¯ÔÚÎÚ¿ËÀ¼Õ½ÕùµÄ¸ü¹ã·ºÅ侰ϲ»Í£Å¬Á¦ÊÕ¼¯Ç鱨²¢Ê©¼ÓÓ°Ïì¡£
https://gbhackers.com/cyber-espionage-turla-apt-hackers-attack-european-organization-with-backdoor/
2. TA547 ÀûÓÃÒÉËÆ AI Éú³ÉµÄ Rhadamanthys Ãé×¼µÂ¹ú
4ÔÂ10ÈÕ£¬ÔÚProofpoint×î½üÆعâµÄÒ»´ÎºÚ¿Í»î¶¯ÖÐÖ®ºó£¬µÂ¹ú×éÖ¯ÃæÁٶ෽ÃæµÄ¹¥»÷¡£³öÓÚ¾¼Ã¶¯»úµÄ×éÖ¯ TA547 Ê״β¿ÊðÁË Rhadamanthys ÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬Õâ±êÖ¾×ÅËûÃǹßÓüÆıµÄת±ä¡£ÓÐȤµÄÊÇ£¬ºÚ¿Í¿ÉÄÜ´ÓÒ»¸öÒâÏë²»µ½µÄÀ´Ô´¡ª¡ªÈ˹¤ÖÇÄÜ¡ª¡ªÄÇÀïµÃµ½ÁË×ÊÖú¡£¸Ã»î¶¯µÄ»ùʯÊDz¿ÊðRhadamanthys£¬ÕâÊÇÒ»ÖÖÔÚ TA547 µÄÎäÆ÷¿âÖÐÒÔǰδÔø¼û¹ýµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£ÕâÖÖ¶ñÒâÈí¼þÒÔÆäЧÁ¦ºÍÔÚÍøÂç·¸×ïȦ×ÓÖеĹ㷺ʹÓöøÎÅÃû£¬±êÖ¾×Å TA547 ÔËÓª¼ÆıµÄÕ½ÂÔÖ§µã¡£¹¥»÷Õßαװ³ÉÀ´×Ե¹úÖøÃûÁãÊÛ¾ÞÍ· Metro µÄͨÐÅ£¬¾Ý³ÆÓ뷢ƱÓйء£
https://securityonline.info/ta547-targets-germany-with-rhadamanthys-suspected-ai-generated-code/
3. Raspberry Robin ʹÓà Windows ½Å±¾Îļþ½øÐÐÁ÷´«
4ÔÂ10ÈÕ£¬Raspberry Robin ÊÇÒ»ÖÖÊÊÓ¦ÐÔÇ¿¡¢¹æ±ÜÐÔÇ¿µÄÈä³æºÍ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½£¬ÓÚ 2021 ÄêÊ״ηºÆðÔÚÍøÂçÍþв³¡¾°ÖУ¬ÏÖÔÚÕýÔÚʹÓÃÒ»ÖÖÐÂÒªÁìÀ´Á÷´«Æä¶ñÒâ´úÂ롣ƾ¾Ý HP Wolf Security ÍþвÑо¿ÈËÔ±±¾ÖÜÐû²¼µÄÒ»·Ý³ÂËߣ¬ÉϸöÔ¼ì²âµ½µÄÒ»Ïîл±íÃ÷ Raspberry Robin ±³ºóµÄÔËÓªÉÌÕýÔÚʹÓöñÒâ Windows ½Å±¾Îļþ(WSF) À´Á÷´«Æä¶ñÒâÈí¼þ£¬ÕâÓëËûÃǸüÆÕ±éµÄʹÓÃÒªÁì²îÒì¡£×î½ü£¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ýʹÓà Discord ÏûÏ¢·þÎñÒÔ¸½¼þÐÎʽ·¢Ë͵Ĵ浵ÎļþÏÂÔØ£¨½«×ÔÉíαװ³ÉºÏ·¨ÇÒÒÑÇ©ÃûµÄ Windows ¿ÉÖ´ÐÐÎļþ£©ÒÔ¼°Í¨¹ýÄ¿±ê Web ä¯ÀÀÆ÷ÏÂÔØµÄ 7-Zip ´æµµ½øÐÐÁ÷´«¡£
https://securityboulevard.com/2024/04/raspberry-robin-malware-now-using-windows-script-files-to-spread/
4. Spectre v2 ¹¥»÷Ó°Ïì Intel CPU É쵀 Linux ϵͳ
4ÔÂ10ÈÕ£¬Spectre V2 ÊÇ°¢Ä·Ë¹Ìص¤×ÔÓÉ´óѧ VUSec С×éµÄÒ»×éÑо¿ÈËÔ±·¢ÏÖµÄÔʼ Spectre ¹¥»÷µÄбäÌå¡£Ñо¿ÈËÔ±»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬¸Ã¹¤¾ßʹÓ÷ûºÅÖ´ÐÐÀ´Ê¶±ð Linux ÄÚºËÖпÉÀûÓõĴúÂë¶Î£¬ÒÔ×ÊÖú»º½âÎÊÌâ¡£Õâһз¢ÏÖÇ¿µ÷ÁËƽºâÐÔÄÜÓÅ»¯ÓëÄþ¾²ÐÔµÄÌôÕ½£¬ÕâʹµÃ½â¾ö»ù±¾µÄ CPU ȱÏݱäµÃÅӴ󣬼´Ê¹ÊÇÔÚ Spectre ·¢ÏÖÁùÄêºó ¡£Ó¢Ìضû»¹¸üÐÂÁËÕë¶Ô Spectre v2 µÄ»º½â½¨Ò飬ÏÖÔÚ½¨Òé½ûÓ÷ÇÌØȨÀ©Õ¹²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷ (eBPF) ¹¦Ð§£¬ÆôÓÃÔöÇ¿Ðͼä½Ó·ÖÖ§ÏÞÖÆÍƲâ (eIBRS)£¬²¢ÆôÓùÜÀíԱģʽִÐб£»¤ (SMEP)¡£
https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/
5. RUBYCARP SSH ±©Á¦½©Ê¬ÍøÂçͨ¹ýй¤¾ß»Ø¹é
4ÔÂ10ÈÕ£¬ÓÉÓÚÒÔ SSH ±©Á¦¹¥»÷¶øÎÅÃûµÄÎÛÃûÕÑÖøµÄ½©Ê¬ÍøÂç×éÖ¯ RUBYCARP ƾ½èÐµĹ¤¾ßºÍ¼ÆıÖØзºÆð£¬ÍøÂçÄþ¾²ÉçÇøÔٴδ¦Óڸ߶Ƚ䱸״̬¡£Sysdig ÍþвÑо¿ÍÅ¶Ó (Sysdig TRT) Ò»Ö±ÔÚÃÜÇмàÊÓÕâ¸öÂÞÂíÄáÑÇÍþв×éÖ¯µÄ»î¶¯£¬¸Ã×éÖ¯ÒѾ»îÔ¾ÁËÊ®¶àÄ꣬×î½ü·¢ÏÖÆäÐж¯·ºÆðÁËÖØ´ó½øÕ¹¡£RUBYCARP ÔÙÆðµÄºËÐÄÊÇÀûÓà Laravel Ó¦Ó÷¨Ê½ÖеÄÒ»¸öÒªº¦Â©¶´ CVE-2021-3129¡£´Ë©¶´Ò»Ö±ÊǸÃ×éÖ¯µÄÄ¿±êºÍÀûÓÃÊÂÇéµÄ½¹µã£¬Ê¹ËûÃÇÄܹ»»ñµÃ¶ÔϵͳµÄδ¾ÊÚȨµÄ·ÃÎʲ¢À©´óÆ佩ʬÍøÂç¡£³ýÁËÀûÓà CVE-2021-3129 Ö®Í⣬RUBYCARP »¹Ê¹ÓÃSSH ±©Á¦¹¥»÷½øÈëÄ¿±êÍøÂç¡£¸Ã×éÖ¯µÄ¼á³ÖºÍ¼ÆıµÄÑݱäÇ¿µ÷ÁËÐÞ²¹ÒÑ֪©¶´ºÍ¼ÓÇ¿ SSH Äþ¾²´ëÊ©ÒÔ×èÖ¹´ËÀ๥»÷µÄÖØÒªÐÔ¡£Sysdig TRT µÄ×îз¢ÏÖ±íÃ÷£¬RUBYCARP ²»½ö¼ÌÐøÆ䴫ͳµÄ±©Á¦ÆƽâºÍÀûÓû£¬¶øÇÒ»¹Ìí¼ÓÁËм¼Êõ¡£
https://gbhackers.com/rubycarp-ssh-brute-botnet/
6. Ð嵀 SharePoint ¼¼Êõ¿ÉÈúڿÍÈƹýÄþ¾²´ëÊ©
4ÔÂ10ÈÕ£¬SharePoint Öз¢ÏÖµÄÁ½ÖÖм¼Êõʹ¶ñÒâÐÐΪÕßÄܹ»Èƹý´«Í³Äþ¾²´ëÊ©²¢ÔÚ²»´¥·¢³ß¶È¼ì²â»úÖƵÄÇé¿öÏÂй¶Ãô¸ÐÊý¾Ý¡£·Ç·¨ÎļþÏÂÔØ¿ÉÄÜ»áαװ³ÉÎÞº¦µÄ»î¶¯£¬Ê¹ÍøÂçÄþ¾²·ÀÓù´ëÊ©ÄÑÒÔ¼ì²âµ½ËüÃÇ¡£µÚÒ»ÖÖ¼¼Êõ±»³ÆΪ¡°ÔÚÓ¦Ó÷¨Ê½Öдò¿ªÒªÁ족£¬ËüÀûÓÃÁË SharePoint ¹¦Ð§£¬¸Ã¹¦Ð§ÔÊÐíÓû§Ö±½ÓÔÚ¹ØÁªµÄÓ¦Ó÷¨Ê½Öдò¿ªÎĵµ¡£ËäÈ»Õâ¸ö¹¦Ð§ÊÇΪÁË·½±ãÓû§¶øÉè¼ÆµÄ£¬µ«È´ÎÞÒâÖÐÔì³ÉÁËÊý¾Ýй¶µÄ©¶´¡£¹¥»÷Õß¿ÉÒÔʹÓô˹¦Ð§µÄµ×²ã´úÂëÀ´·ÃÎʺÍÏÂÔØÎļþ£¬Ö»ÔÚÎļþµÄÉóºËÈÕÖ¾ÖÐÁôÏ·ÃÎÊʼþ¡£µÚ¶þÖÖ¼¼ÊõÉæ¼°¶Ô Microsoft SkyDriveSync£¨ÏÖÔÚ³ÆΪ OneDrive£©µÄÓû§ÊðÀí×Ö·û´®µÄ²Ù×÷¡£Í¨¹ýαװ³Éͬ²½¿Í»§¶Ë£¬¹¥»÷Õß¿ÉÒÔÏÂÔØÎļþÉõÖÁÕû¸öSharePointÍøÕ¾¡£ÕâЩÏÂÔر»´íÎóµØ±ê־ΪÎļþͬ²½Ê¼þ¶ø²»ÊÇʵ¼ÊÏÂÔØ£¬´Ó¶øÈƹýÁËÖ¼ÔÚ¼ì²âºÍ¼Ç¼ÎļþÏÂÔصÄÄþ¾²´ëÊ©¡£ÕâÖÖÒªÁìÌرðÒõÏÕ£¬ÒòΪËü¿ÉÓÃÓÚ´ó¹æÄ£ÇÔÈ¡Êý¾Ý£¬¶øÇÒͬ²½Î±×°Ê¹Äþ¾²¹¤¾ß¸üÄÑÒÔÇø·ÖºÏ·¨»î¶¯ºÍ¶ñÒâ»î¶¯¡£
https://gbhackers.com/sharepoint-technique-bypas/