MITRE Ðû²¼Ç¶ÈëʽÉ豸 EMB3D ÍøÂçÄþ¾²ÍþвģÐÍ
Ðû²¼Ê±¼ä 2024-05-155ÔÂ14ÈÕ£¬MITRE Óë Red Balloon Security¡¢Narf Industries ºÍ Niyo Little Thunder Pearson (ONEGas, Inc.) ºÏ×÷ÍƳöÁË EMB3D£¬ÕâÊÇÒ»ÖÖÈ«ÃæµÄÍþвģÐÍ£¬Ö¼ÔÚ½â¾öÒªº¦»ù´¡ÉèÊ©ÁìÓòǶÈëʽÉ豸ÃæÁÙµÄÈÕÒæÔö³¤µÄÍøÂçÄþ¾²·çÏÕ¡£Ç¶ÈëʽÉ豸¹ã·ºÓ¦ÓÃÓÚʯÓͺÍÌìÈ»Æø¡¢µçÁ¦¡¢Ë®¹ÜÀí¡¢Æû³µ¡¢Ò½ÁÆ¡¢ÎÀÐÇ¡¢×ÔÖ÷ϵͳºÍÎÞÈË»úϵͳµÈÐÐÒµ£¬µ«ÍùÍùȱ·¦Êʵ±µÄÄþ¾²¿ØÖÆ£¬¶øÇÒûÓжÔ©¶´½øÐгäʵµÄ²âÊÔ¡£Ëæ×ÅÅÓ´óµÄÍøÂç¶ÔÊÖÔ½À´Ô½¶àµØÕë¶ÔÕâЩÉ豸£¬EMB3D Ö¼ÔÚÌṩ¶ÔËù×é³ÉÍþвµÄÅäºÏÀí½âÒÔ¼°»º½âÕâЩÍþвËùÐèµÄÄþ¾²»úÖÆ¡£EMB3D Óë³£¼ûÈõµãö¾Ù (CWE)¡¢MITRE ATT&CK?ÒÔ¼°³£¼û©¶´ºÍ̻¶ (CVE) µÈÏÖÓÐÄ£Ðͱ£³ÖÒ»Ö²¢½øÐÐÀ©Õ¹£¬µ«Ìرð¹ØעǶÈëʽÉ豸¡£¸Ã¿ò¼ÜÌṩÁËǶÈëʽÉ豸ÍøÂçÍþвµÄ¸»ºñ֪ʶ¿â£¬°üÂÞÔÚÏÖ³¡»·¾³ÖÐÊӲ쵽µÄ¡¢Í¨¹ý¿´·¨ÑéÖ¤Ö¤Ã÷µÄ»ò´ÓÀíÂÛÑо¿ÖеóöµÄÍþв¡£
https://gbhackers.com/emb3d-cybersecurity-threat-model/
2. Ñо¿ÍŶӷ¢ÏÖSliverÃé×¼macOS²¢°²×°ºóÃÅ
5ÔÂ13ÈÕ£¬Sliver ÊÇÒ»¿î¿çƽ̨£¨Windows¡¢macOS¡¢Linux£© ¿ªÔ´·´¿¹¿ò¼Ü²âÊÔÌ×¼þ£¬×¨Îª¡°ºì¶Ó¡±²Ù×÷¶øÉè¼Æ£¬ÔÚ²âÊÔÍøÂç·ÀÓùʱģÄâ¶ÔÊÖµÄÐÐΪ¡£ÆäÖ÷Òª¹¦Ð§°üÂÞ×Ô½ç˵ֲÈëÉú³É¡¢ÃüÁîºÍ¿ØÖÆ (C2) ¹¦Ð§¡¢ºóÀûÓù¤¾ß/½Å±¾ÒÔ¼°¸»ºñµÄ¹¥»÷Ä£ÄâÑ¡Ïî¡£ÔÚ Phylum ·¢ÏÖµÄ×îй¥»÷ÖУ¬¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°requests-darwin-lite¡±µÄ macOS ¶ñÒâ Python °ü£¬ËüÊÇÁ÷Ðеġ°requests¡±¿âµÄÁ¼ÐÔ·ÖÖ§¡£¸Ã°üÍйÜÔÚ PyPI ÉÏ£¬ÔÚ´øÓÐ Requests »Õ±êµÄ 17MB PNG ͼÏñÎļþÖаüÂÞ Sliver µÄ¶þ½øÖÆÎļþ¡£ÔÚ macOS ϵͳÉÏ°²×°Æڼ䣬»áÖ´ÐÐ PyInstall ÀàÀ´½âÂë Base64 ±àÂëµÄ×Ö·û´®£¬ÒÔÔËÐмìË÷ϵͳµÄ UUID£¨Í¨ÓÃΨһ±êʶ·û£©µÄÃüÁî (ioreg)¡£UUID ÓÃÓÚÑéÖ¤°üÊÇ·ñ°²×°ÔÚʵ¼ÊÄ¿±êÉÏ£¬²¢½«ÆäÓëÔ¤½ç˵µÄ UUID ½øÐбÈÁ¦¡£µ±´æÔÚÆ¥Åäʱ£¬»á´ÓÎļþÆ«ÒÆ´¦µÄÌض¨²¿ÃŶÁÈ¡²¢ÌáÈ¡ PNG ÎļþÄÚµÄ Go ¶þ½øÖÆÎļþ¡£Sliver ¶þ½øÖÆÎļþ±»Ð´Èëµ±µØÎļþ²¢ÐÞ¸ÄÎļþȨÏÞÒÔʹÆä¿ÉÖ´ÐУ¬²¢×îÖÕÔÚºǫ́Æô¶¯¡£
https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/
3. INC ÀÕË÷Èí¼þÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÊÛ¼Û 30 ÍòÃÀÔª
5ÔÂ13ÈÕ£¬Ò»ÃûÃûΪ¡°salfetka¡±µÄÍøÂç·¸×ï·Ö×ÓÉù³ÆÕýÔÚ³öÊÛ INC Ransom µÄÔ´´úÂ룬INC Ransom ÊÇÒ»ÏîÓÚ 2023 Äê 8 ÔÂÍƳöµÄÀÕË÷Èí¼þ¼´·þÎñ (RaaS) ¡£INC ´ËÇ°µÄÄ¿±êÊÇÊ©ÀÖÉÌÒµ½â¾ö·½°¸¹«Ë¾ (XBS) µÄÃÀ¹ú·Ö²¿ ¡¢·ÆÂɱöÑÅÂí¹þÆû³µ¹«Ë¾£¬ÒÔ¼°×î½üµÄËÕ¸ñÀ¼ ¹ú¼ÒÒ½ÁÆ·þÎñÌåϵ (NHS)¡£ÔÚÉæÏÓ³öÊÛµÄͬʱ£¬INC Êê½ðÒµÎñÕýÔÚ·¢Éú±ä»¯£¬Õâ¿ÉÄܱíÃ÷ÆäºËÐÄÍŶӳÉÔ±Ö®¼ä´æÔÚÁѺۣ¬»òÕ߼ƻ®½øÈëÉ漰ʹÓÃмÓÃÜÆ÷µÄÐÂƪÕ¡£ÍþвÐÐΪÕßÐû²¼ÔÚ Exploit ºÍ XSS ºÚ¿ÍÂÛ̳ÉϳöÊÛ INC µÄ Windows ºÍ Linux/ESXi °æ±¾£¬Òª¼Û 30 ÍòÃÀÔª£¬²¢½«Ç±ÔÚÂò¼ÒÊýÁ¿ÏÞÖÆΪÈý¸ö¡£Æ¾¾Ý·¢ÏÖ´Ë´ÎÏúÊÛµÄ KELAÍþвÇ鱨ר¼ÒÏò BleepingComputer ÌṩµÄÐÅÏ¢£¬ÂÛ̳Ìû×ÓÖÐÌáµ½µÄ¼¼Êõϸ½Ú£¬ÀýÈçÔÚ CTR ģʽÏÂʹÓà AES-128 ºÍ Curve25519 Donna Ëã·¨£¬Óë INC Ransom µÄ¹ûÈ»·ÖÎöÒ»ÖÂÑùÆ·¡£
https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/
4. ¹È¸èÒâÍâɾ³ýÁ˼ÛÖµ1250ÒÚÃÀÔªµÄÑøÀÏ»ù½ðÕË»§
5ÔÂ13ÈÕ£¬¹È¸è×î½ü·¸ÁËÒ»¸ö´ó´íÎ󡣸ù«Ë¾²»Ð¡ÐÄɾ³ýÁ˼ÛÖµ 1250 ÒÚÃÀÔªµÄ°Ä´óÀûÑÇÑøÀÏ»ù½ð UniSuper µÄ˽ÈË Google Cloud ÕË»§¡£½á¹ûÊÇ£º¾Ý¡¶ÎÀ±¨¡·ÉÏÖܱ¨µÀ£¬Áè¼Ý 50 Íò UniSuper »ù½ð»áÔ±ÔÚԼĪһÖܵÄʱ¼äÀïÎÞ·¨·ÃÎÊ×Ô¼ºµÄÕË»§¡£UniSuperÔÚÁíÒ»¼ÒÔÆÌṩÉÌÓÐÒ»¸ö±¸·ÝÕÊ»§£¬·þÎñÓÚ5ÔÂ2ÈÕ»Ö¸´¡£ËäÈ»¹È¸èÌåÏÖ£¬ÕâÖÖ´íÎóÒÔÇ°´ÓδÔÚÔÆÉÏ·¢Éú¹ý£¬µ«·ºÆð¹ÊÕϺÍÖжϵĿÉÄÜÐÔÒýÆðÁËÔ½À´Ô½¶àµØ½«Êý¾ÝתÒƵ½ÔÆÈí¼þÌṩÉ̵Ĺ«Ë¾ºÍÕþ¸®µÄµ£ÓÇ¡£¸Ã¹«Ë¾½ñÄêÌåÏÖ£¬È«Çò 1000 ¼Ò×î´ó¹«Ë¾ÖÐÔ¼60% µÄ¹«Ë¾ºÍ 90% µÄÉú³ÉÐÍÈ˹¤ÖÇÄܶÀ½ÇÊÞ¹«Ë¾¶¼ÊǸù«Ë¾µÄ¿Í»§¡£È«Çò½ü 50 Íò¼Ò¹«Ë¾Ê¹Óà Google Cloud ×÷Ϊ¡°Æ½Ì¨¼´·þÎñ¡±»òÃæÏò¿Í»§µÄ¹¤¾ß£¬ÆäÖаüÂÞ¹«¹²Æû³µºÍ¼ÓÄôó»Ê¼ÒÒøÐС£
https://qz.com/google-cloud-pension-fund-unisuper-1851472990
5. LockBit Black ÀÕË÷¹¥»÷»î¶¯ÒÑ·¢ËÍÊý°ÙÍò·âµç×ÓÓʼþ
5ÔÂ13ÈÕ£¬×Ô 4 Ô·ÝÒÔÀ´£¬ÒÑͨ¹ý Phorpiex ½©Ê¬ÍøÂç·¢ËÍÁËÊý°ÙÍò·âµöÓãµç×ÓÓʼþ£¬ÒÔ¿ªÕ¹´ó¹æÄ£µÄ LockBit Black ÀÕË÷Èí¼þ»î¶¯¡£ÕýÈçÐÂÔóÎ÷ÖÝÍøÂçÄþ¾²ºÍͨÐż¯³ÉС×é (NJCCIC) ÖÜÎ徯¸æµÄÄÇÑù£¬¹¥»÷ÕßʹÓðüÂÞ²¿Êð LockBit Black ÓÐЧ¸ºÔصĿÉÖ´ÐÐÎļþµÄ ZIP ¸½¼þ£¬¸ÃÓÐЧ¸ºÔØÒ»µ©Æô¶¯¾Í»á¶Ô½ÓÊÕÕßµÄϵͳ½øÐмÓÃÜ¡£ÕâЩ¹¥»÷Öв¿ÊðµÄ LockBit Black ¼ÓÃÜÆ÷ºÜ¿ÉÄÜÊÇʹÓÃÒ»ÃûÐÄ»³²»ÂúµÄ¿ª·¢ÈËÔ±ÓÚ 2022 Äê 9 ÔÂÔÚ Twitter ÉÏй¶µÄ LockBit 3.0 ¹¹½¨Æ÷¹¹½¨µÄ¡£²»Í⣬¾ÝПûÓëʵ¼ÊµÄ LockBit ÀÕË÷Èí¼þ²Ù×÷ûÓÐÈκιØϵ¡£ÕâЩÍøÂçµöÓãµç×ÓÓʼþ´øÓС°ÄúµÄÎĵµ¡±ºÍ¡°ÄúµÄÕÕƬ£¿£¿£¿¡±Ö÷ÌâÐÐʹÓá°Jenny Brown¡±»ò¡°Jenny Green¡±±ðÃû´ÓÈ«Çò 1,500 ¶à¸öΨһ IP µØÖ··¢ËÍ£¬ÆäÖаüÂÞ¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹¡¢ÒÁÀÊ¡¢¶íÂÞ˹ºÍÖйú¡£µ±ÊÕ¼þÈË´ò¿ª¶ñÒâ ZIP ´æµµ¸½¼þ²¢Ö´ÐÐÆäÖеĶþ½øÖÆÎļþʱ£¬¹¥»÷Á´¾Í¿ªÊ¼ÁË¡£
https://www.bleepingcomputer.com/news/security/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign/
6. ºÚ¿ÍÀûÓà DNS ËíµÀ½øÐÐÍøÂçɨÃèºÍ¸ú×ÙÊܺ¦Õß
5ÔÂ14ÈÕ£¬ÍþвÐÐΪÕßÕýÔÚʹÓÃÓòÃûϵͳ (DNS) ËíµÀÀ´¸ú×ÙÆäÄ¿±êºÎʱ´ò¿ªÍøÂçµöÓãµç×ÓÓʼþ²¢µ¥»÷¶ñÒâÁ´½Ó£¬²¢É¨ÃèÍøÂçÒÔ²éÕÒDZÔÚ©¶´¡£DNS ËíµÀÊǶÔͨ¹ý DNS ²éѯ·¢ËͺͼìË÷µÄÊý¾Ý»òÃüÁî½øÐбàÂ룬±¾ÖÊÉÏÊǽ« DNS£¨»ù±¾ÍøÂçͨÐÅ×é¼þ£©×ª±äΪÒþ±ÎµÄͨÐÅͨµÀ¡£ÍþвÐÐΪÕßÒÔÖÖÖÖ·½Ê½¶ÔÊý¾Ý½øÐбàÂ룬ÀýÈç Base16 »ò Base64 »ò×Ô½ç˵Îı¾±àÂëËã·¨£¬Òò´Ë¿ÉÒÔÔÚ²éѯ DNS ¼Ç¼£¨ÀýÈç TXT¡¢MX¡¢CNAME ºÍµØÖ·¼Ç¼£©Ê±·µ»ØËüÃÇ¡£ºÚ¿Íͨ³£Ê¹Óà DNS ËíµÀÀ´ÈƹýÍøÂç·À»ðǽºÍ¹ýÂËÆ÷£¬ÀûÓøü¼Êõ½øÐÐÃüÁîºÍ¿ØÖÆ (C2) ÒÔ¼°ÐéÄâרÓÃÍøÂç (VPN) ²Ù×÷¡£»¹ÓкϷ¨µÄ DNS ËíµÀÓ¦Ó÷¨Ê½£¬ÀýÈçÓÃÓÚÈƹýÉó²éÖƶȡ£×î½ü·¢ÏÖµÄÁ½¸ö¹¥»÷»î¶¯·Ö±ðÊÇTrkCdnºÍSecShow¡£
https://www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/