ºÚ¿ÍÀûÓÃCR4TºóÃÅÃé×¼Öж«µØÓòµÄÕþ¸®»ú¹¹

Ðû²¼Ê±¼ä 2024-04-22
1. ºÚ¿ÍÀûÓÃCR4TºóÃÅÃé×¼Öж«µØÓòµÄÕþ¸®»ú¹¹


4ÔÂ20ÈÕ£¬CR4T£¨¡°CR4T.pdb¡±£©ÊÇÒ»ÖÖ»ùÓÚ C/C++ µÄ´¿ÄÚ´æÖ²È뷨ʽ£¬ÔÊÐí¹¥»÷Õß·ÃÎÊ¿ØÖÆ̨£¬ÒÔ±ãÔÚÊÜѬȾµÄ¼ÆËã»úÉÏÖ´ÐÐÃüÁîÐС¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°ÔÚÁªÏµ C2 ·þÎñÆ÷ºóÉÏ´«ºÍÏÂÔØÎļþ¡£¿¨°Í˹»ùÌåÏÖ£¬Ëü»¹·¢ÏÖÁ˾ßÓÐÏàͬ¹¦Ð§µÄ Golang °æ±¾µÄ CR4T£¬´ËÍ⻹¾ßÓÐÖ´ÐÐÈÎÒâÃüÁîºÍʹÓÃGo-ole ¿â´´½¨¼Æ»®ÈÎÎñµÄÄÜÁ¦¡£×îÖØÒªµÄÊÇ£¬Golang CR4T ºóÃÅ¿ÉÒÔÀûÓÃCOM ¹¤¾ß½Ù³Ö¼¼ÊõʵÏÖ³Ö¾ÃÐÔ£¬²¢ÀûÓà Telegram API ½øÐÐ C2 ͨÐÅ¡£¶íÂÞ˹ÍøÂçÄþ¾²¹«Ë¾¿¨°Í˹»ùÌåÏÖ£¬ËüÓÚ 2024 Äê 2 Ô·¢ÏÖÁ˸û£¬ÓÐÖ¤¾Ý±íÃ÷¸Ã»î¶¯¿ÉÄÜÖÁÉÙ´ÓÒ»ÄêÇ°¾Í¿ªÊ¼»îÔ¾¡£¸Ã»î¶¯µÄ´úºÅΪDuneQuixote¡£Golang ±äÌåµÄ´æÔÚ±íÃ÷£¬DuneQuixote ±³ºóµÄÉí·Ý²»Ã÷µÄÍþв¼ÓÈëÕßÕýÔÚ»ý¼«ÀûÓÿçƽ̨¶ñÒâÈí¼þ¸ïÐÂËûÃǵĹ¥»÷·½Ê½¡£


https://thehackernews.com/2024/04/hackers-target-middle-east-governments.html


2. Frontier Communications ÔÚÍøÂç¹¥»÷ºó¹Ø±Õϵͳ


4ÔÂ20ÈÕ£¬µçОÞÍ· Frontier Communications ÒÑ֪ͨÃÀ¹ú֤ȯ½»Ò×ίԱ»á (SEC)£¬Ä³Ð©ÏµÍ³ÔÚÍøÂç¹¥»÷ºó±»¹Ø±Õ¡£¸ÃʼþÊÇÔÚ 4 Ô 14 ÈÕ·¢Ïֵģ¬ÆäʱµÚÈý·½¡°Î´¾­ÊÚȨ·ÃÎÊÁËÆ䲿ÃÅÐÅÏ¢¼¼Êõ»·¾³¡£Frontier ÌåÏÖ£¬ËüÁ¢¼´Æô¶¯ÁËʼþÏìӦЭÒ飬²¢½ÓÄÉ´ëÊ©¿ØÖÆʼþ£¬°üÂ޹رÕijЩϵͳ£¬Õâ¡°µ¼ÖÂÁË¿ÉÄܱ»ÊÓΪÖØ´óµÄÔËÓªÖжϡ±¡£¾Ý Frontier ³Æ£¬Õâ´Î¹¥»÷ºÜ¿ÉÄÜÊÇÒ»¸öÍøÂç·¸×ï×éÖ¯ËùΪ£¬¸Ã×éÖ¯»ñµÃÁËÖÖÖÖÀàÐ͵ÄÊý¾Ý£¬°üÂÞ¸öÈËÉí·ÝÐÅÏ¢¡£¸Ã¹«Ë¾»¹Ö¸³ö£¬ËüÒÑִ֪ͨ·¨²¿ÃÅ£¬¸Ãʼþ¿ÉÄܲ»»á¶ÔÆä²ÆÕþ×´¿ö»òÔËÓªÒµ¼¨·¢ÉúÖØ´óÓ°Ïì¡£ËäÈ» Frontier ûÓÐ˵Ã÷ËüÔâÊÜÁËÄÄÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬µ«ºÜ¿ÉÄÜÉæ¼°Îļþ¼ÓÃÜÀÕË÷Èí¼þ£¬ÒòΪ¹Ø±ÕϵͳÊǶÔÀÕË÷Èí¼þµÄµäÐÍÏìÓ¦¡£Õâ¼ÒµçОÞÍ·»¹ÔÚÆäÍøÕ¾ÉÏÐû²¼ÁË֪ͨ£¬¼û¸æ·ÃÎÊÕßËüÕýÔÚ¾­Àú¡°ÎÒÃǵÄÄÚ²¿Ö§³ÖϵͳµÄ¼¼ÊõÎÊÌ⡱¡£¿Í»§µÄ»¥ÁªÍø·þÎñ²¢Î´Êܵ½¹¥»÷µÄÓ°Ï죬µ«½öͨ¹ýµç»°Ìṩ×ÊÖú¡£


https://www.securityweek.com/frontier-communications-shuts-down-systems-following-cyberattack/


3. ÁªºÏ¹ú¿ª·¢¼Æ»®Êð (UNDP) ÊÓ²ìÆäÀÕË÷Èí¼þ¹¥»÷ʼþ


4ÔÂ21ÈÕ£¬ÁªºÏ¹ú¿ª·¢¼Æ»®Êð (UNDP) ÕýÔÚÊÓ²ìÍþвÐÐΪÕßÈëÇÖÆä IT ϵͳÇÔÈ¡ÈËÁ¦×ÊÔ´Êý¾Ýºó·¢ÉúµÄÍøÂç¹¥»÷¡£ÁªºÏ¹ú¿ª·¢¼Æ»®ÊðÊÇÁªºÏ¹úµÄÈ«ÇòÉú³¤ÍøÂ磬ÔÚ 170 ¶à¸ö¹ú¼ÒºÍµØÓò¿ªÕ¹ÊÂÇ飬ÒÀ¿¿ÁªºÏ¹ú³ÉÔ±¹úºÍ˽Ӫ²¿ÃÅ/¶à±ß×éÖ¯µÄ¾è¿îÀ´×ÊÖúÏû³ýƶÀ§¡¢Ïû³ý²»Æ½µÈºÍÅųâ¡£3 Ô 27 ÈÕ£¬¿ª·¢ÊðÊÕµ½ÍþвÇ鱨֪ͨ£¬³ÆÒ»ÃûÊý¾ÝÀÕË÷ÕßÇÔÈ¡ÁËÊý¾Ý£¬ÆäÖаüÂÞijЩÈËÁ¦×ÊÔ´ºÍ²É¹ºÐÅÏ¢£¬ÁªºÏ¹ú¿ª·¢¼Æ»®ÊðÄ¿Ç°ÕýÔÚÊÓ²ì¸ÃʼþµÄÐÔÖʺͷ¶Î§£¬²¢ÆÀ¹À´Ë´Î¹¥»÷¶ÔÐÅÏ¢±»µÁ¸öÈ˵ÄÓ°Ïì¡£Ëü»¹ÏòÊܸ鶴ӰÏìµÄÈË·¢³ö¾¯±¨£¬Ä¿Ç°ÕýÔÚÓëËûÃǺÏ×÷£¬ÒÔ±ãËûÃÇÄܹ»±£»¤×Ô¼ºµÄ¸öÈËÐÅÏ¢ÃâÔâÀÄÓá£ËäÈ»ÁªºÏ¹ú»ú¹¹ÉÐ佫´Ë´Î¹¥»÷ÓëÌض¨Íþв×éÖ¯ÁªÏµÆðÀ´£¬µ« 8Base ÀÕË÷Èí¼þÍÅ»ïÓÚ 3 Ô 27 ÈÕÔÚÆä°µÍøÊý¾Ýй¶ÍøÕ¾ÉÏÌí¼ÓÁËÐ嵀 UNDP ÌõÄ¿¡£¹¥»÷ÕßÌåÏÖ£¬ËûÃǵIJÙ×÷Ô±ÔÚй¶ÆÚ¼äÉ跨鶵ÄÎļþ°üÂÞ´óÁ¿Ãô¸ÐÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/united-nations-agency-investigates-ransomware-attack-claimed-by-8Base-gang/


4. MITRE ÔâÓöÍøÂç¹¥»÷£¬ºÚ¿ÍÀûÓà Ivanti ÁãÈÕ©¶´


4ÔÂ19ÈÕ£¬ÍøÂçÄþ¾²Ñо¿ºÍ¿ª·¢ÁìÓòµÄÁìÏÈ×éÖ¯ MITRE ×î½üÅû¶ÁËÒ»ÆðÅÓ´óµÄÍøÂ究´£¬Í¹ÏÔÁËÏÖ´úÍøÂçÍþв²»Í£ÑݱäµÄÐÔÖÊÒÔ¼°Ç¿ÓÐÁ¦µÄÍøÂçÄþ¾²´ëÊ©µÄÖØÒªÐÔ¡£¸ÃʼþÓÚ 2024 Äê 4 Ôµõ½Ö¤Êµ£¬Éæ¼° MITRE µÄÍøÂçʵÑé¡¢Ñо¿ºÍÐéÄ⻯»·¾³ (NERVE) µÄй¶£¬NERVE ÊÇÒ»¸öÓÃÓÚÑо¿¡¢¿ª·¢ºÍÔ­ÐÍÉè¼ÆµÄЭ×÷ÍøÂç¡£ÔÚ¼ì²âµ½¿ÉÒɻºó£¬MITRE Á¢¼´½ÓÄÉÐж¯¿ØÖÆʼþ£¬°üÂÞʹ NERVE »·¾³ÏÂÏߣ¬²¢ÔÚÄÚ²¿ºÍÁìÏȵĵÚÈý·½×¨¼ÒµÄÖ§³ÖÏÂÕ¹¿ªÊӲ졣¼ì²âµ½Â©¶´ºó£¬MITRE ÁªÏµÁËÕþ¸®£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¸÷·½£¬²¢ÕýÔÚŬÁ¦»Ö¸´ÒÔÄþ¾²·½Ê½½øÐÐЭ×÷µÄ²Ù×÷Ìæ´ú·½°¸¡£ÊÓ²ìÕýÔÚ½øÐÐÖУ¬ÒÔÈ·¶¨¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢·¶Î§¡£¸Ã¹«Ë¾ÔÊÐíËæ×ÅÊÓ²ìµÄ¼ÌÐøºÍ½áÊø£¬·ÖÏí¸ü¶àÐÅÏ¢¡£Ëæ×ÅÊÓ²ìÕýÔÚ½øÐÐÖУ¬MITREÌáµ½£¬Ã»Óм£Ïó±íÃ÷MITREµÄºËÐÄÆóÒµÍøÂç»òºÏ×÷»ï°éµÄϵͳÊܵ½´ËʼþµÄÓ°Ïì¡£


https://www.cyberkendra.com/2024/04/mitre-suffers-cyber-breach-hacker.html#google_vignette


5. MadMxShell ÒÔ IT ÍŶÓΪĿ±ê¿ªÕ¹¶ñÒâ¹ã¸æ»î¶¯


4ÔÂ21ÈÕ£¬ÔÚÍøÂç¹¥»÷²»Í£ÑݱäµÄÅä¾°Ï£¬Ð·¢ÏÖµÄÃûΪ¡°MadMxShell¡±µÄºóÃÅ¶Ô IT Äþ¾²×é³ÉÁËÆæÌصÄÍþв¡£Zscaler ThreatLabz×î½üµÄÒ»·Ý³ÂËßÏêϸ½éÉÜÁËÕâ¸öºóÃÅ£¬Ëü¾­¹ý¾«ÐÄÉè¼Æ£¬Ö¼ÔÚÌӱܼì²â£¬Í¬Ê±Õë¶ÔÂôÁ¦×éÖ¯ÍøÂç·ÀÓùµÄ¸öÈË¡£MadMxShell »î¶¯ÌåÏÖÁ˸߼¶ÍøÂç·¸×ï·Ö×ӵĽƻ«ºÍÄÍÐÄ¡£¹¥»÷Õß¾«ÐÄ´´½¨ÆÛÕ©ÐÔÍøÕ¾£¬Ä£·Â IT רҵÈËÔ±³£ÓõĺϷ¨Èí¼þ£¨ÀýÈçÍøÂçɨÃèÒǺÍϵͳ¹ÜÀí¹¤¾ß£©µÄÍâ¹Û¡£Ñ©ÉϼÓ˪µÄÊÇ£¬ÕâЩÐé¼ÙÍøÕ¾»¹ÀûÓà Google Ads ½øÐлý¼«Íƹ㣬½«ÆäÍÆÖÁËÑË÷½á¹ûµÄ¶¥²¿£¬²¢Ìá¸ßÁËÄ¿±êÊÜÖڵĿɼû¶È¡£Õë¶Ô IT רҵÈËÔ±µÄ¾«ÐÄÑ¡ÔñÒâζ×Å¿ÉÄÜÔì³É¹ã·ºµÄË𺦡£ÕâЩÈËÓµÓжÔÃô¸ÐϵͳºÍÍøÂçÊý¾ÝµÄ·ÃÎÊȨÏÞ¡£Êܵ½ MadMxShell ¹¥»÷µÄ IT ÍŶӿÉÄÜ»áΪ¹¥»÷ÕßÌṩÆÆ»µÐÔÆÆ»µµÄÊֶΣ¬ÉõÖÁΪËûÃÇÌṩÃû¹óµÄ·ÃÎÊȨÏÞÒÔ½«Æä³öÊÛ¸øÆäËû·¸×OÍÅ¡£


https://securityonline.info/stealthy-madmxshell-backdoor-targets-it-teams-in-malvertising-campaign/


6. Ð嵀 RedLine Stealer ±äÖÖαװ³ÉÓÎÏ·Íâ¹Ò½øÐй¥»÷


4ÔÂ22ÈÕ£¬Âõ¿Ë·ÆʵÑéÊÒµÄÊÓ²ì½á¹ûÏÔʾ£¬ÒѾ­·¢ÏÖÒ»ÖÖеÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÀûÓà Lua ×Ö½ÚÂëÀ´ÔöÇ¿Òþ±ÎÐÔºÍÅÓ´óÐÔ¡£¸ÃÍøÂçÄþ¾²¹«Ë¾Òѽ«ÆäÆÀ¹ÀΪÃûΪ RedLine Stealer µÄÒÑÖª¶ñÒâÈí¼þµÄ±äÌ壬ÒòΪÃüÁîÓë¿ØÖÆ (C2) ·þÎñÆ÷IP µØַ֮ǰÒѱ»Ê¶±ðΪÓë¸Ã¶ñÒâÈí¼þÏà¹Ø¡£RedLine StealerÓÚ 2020 Äê 3 ÔÂÊ״μǼ£¬Í¨³£Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æ»î¶¯Ö±½Ó»òͨ¹ý©¶´ÀûÓù¤¾ß°üºÍ¼ÓÔØÆ÷¶ñÒâÈí¼þ£¨ÈçdotRunpeXºÍHijackLoader £©Á÷´«¡£ÕâÖÖÏֳɵĶñÒâÈí¼þÄܹ»´Ó¼ÓÃÜ»õ±ÒÇ®°ü¡¢VPN Èí¼þºÍÍøÂçä¯ÀÀÆ÷ÖÐÊÕ¼¯ÐÅÏ¢£¬ÀýÈçÉú´æµÄƾ¾Ý¡¢×Ô¶¯Íê³ÉÊý¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍ»ùÓÚÊܺ¦Õß IP µØÖ·µÄµØÀíλÖ᣶àÄêÀ´£¬RedLine Stealer Òѱ»¶à¸öÍþв¼ÓÈëÕßÄÉÈëÆä¹¥»÷Á´£¬Ê¹Æä³ÉΪºá¿ç±±ÃÀ¡¢ÄÏÃÀ¡¢Å·ÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵÄÁ÷Ðв¡¶¾¡£McAfee ·¢ÏÖµÄѬȾÐòÁÐÀÄÓÃÁË GitHub£¬Ê¹Óà Microsoft µÄÁ½¸ö¹Ù·½´æ´¢¿âÀ´ÊµÏÖ C++ ³ß¶È¿â ( STL ) ºÍvcpkg£¬ÒÔ ZIP ´æµµµÄÐÎʽÍйܳäÂú¶ñÒâÈí¼þµÄÓÐЧ¸ºÔØ¡£


https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html