EmansrepoÐÅÏ¢ÇÔÈ¡·¨Ê½£ºFortiGuard×·×ÙÆäÅÓ´ó¹¥»÷Á´
Ðû²¼Ê±¼ä 2024-09-059ÔÂ3ÈÕ£¬FortiGuardʵÑéÊÒµÄÍøÂçÄþ¾²×¨¼ÒÕý½ôÃÜ×·×ÙÒ»ÖÖÃûΪ¡°Emansrepo¡±µÄ»ùÓÚPythonµÄÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¸Ã·¨Ê½×Ô2023Äê11ÔÂÆعâÒÔÀ´£¬Í¨¹ýαװ²É¹º¶©µ¥ºÍ·¢Æ±µÄÍøÂçµöÓãÓʼþÁ÷´«£¬¹¹½¨³öÈýÌõÅÓ´ó¶à±äµÄ¹¥»÷·¾¶¡£ÕâЩ·¾¶·Ö±ð½ÓÄÉAutoIt±àÒëµÄ¿ÉÖ´ÐÐÎļþ¡¢HTAÎļþ¼°BatchShield»ìÏýµÄÅú´¦ÖÃÎļþ×÷ΪÔØÌ壬ÿÖÖÊֶξùÖ¼ÔÚÈƹýÄþ¾²¼ì²â£¬×îÖÕÖ´ÐжñÒâPython½Å±¾ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£Emansrepo´Ó×î³õµÄµÇ¼ƾ¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢ÊÕ¼¯£¬ÒÑÉú³¤µ½ÄÜÇÔÈ¡PDFÎĵµ¡¢ä¯ÀÀÆ÷À©Õ¹¡¢¼ÓÃÜ»õ±ÒÇ®°ü¼°ÓÎϷƽ̨Êý¾ÝµÈ¸ü¹ã·º·¶Î§¡£´ËÍ⣬ʵÑéÊÒ»¹×¢Òâµ½ÓëEmansrepo»î¶¯ÏàËƵÄRemcos¶ñÒâÈí¼þÁ÷´«£¬ÌåÏÖ±³ºó¿ÉÄÜÓÐͬһÍþв×éÖ¯¡£¼øÓÚ¹¥»÷Õß¼¼ÊõµÄ²»Í£Éý¼¶Óë¶àÑù»¯£¬¸÷×éÖ¯Ðè±£³Ö¸ß¶È¾¯Ì裬½ÓÄÉ»ý¼«Ö÷¶¯µÄÍøÂçÄþ¾²·ÀÓù¼Æı£¬ÒÔÓÐЧӦ¶ÔÈÕÒæÅÓ´óµÄÍøÂçÍþв»·¾³¡£
https://securityonline.info/emansrepo-stealer-a-multi-faceted-threat-evolving-in-complexity/
2. ÐÂÀÕË÷Èí¼þ±äÖÖUndergroundÓëRomCom×éÖ¯¹ØÁª
9ÔÂ3ÈÕ£¬FortiGuard Labs½Ò¶ÁËÒ»ÖÖÐÂÐÍÀÕË÷Èí¼þ±äÖÖUnderground£¬ËüÓëÎÛÃûÕÑÖøµÄ¶íÂÞ˹ºÚ¿Í×éÖ¯RomCom£¨±ðÃûStorm-0978£©½ôÃÜÏà¹Ø¡£Õâ¿î¶ñÒâÈí¼þ×Ô2023Äê7ÔÂÆðËÁÅ°£¬Öص㹥»÷½¨Öþ¡¢ÖÆÒ©¡¢ÒøÐм°ÖÆÔìÒµµÈ¶à¸öÒªº¦ÐÐÒµ£¬Í¨¹ý¼ÓÃÜÊܺ¦ÕßWindowsϵͳÉϵÄÎļþÀ´ÀÕË÷Êê½ð¡£RomCom×éÖ¯²»½öÀûÓÃMicrosoft OfficeºÍWindows HTMLµÄÒÑ֪©¶´£¨ÈçCVE-2023-36884£©ÈëÇÖ£¬»¹¿ÉÄܽÓÄɵöÓãÓʼþºÍ¹ºÖóõʼ·ÃÎÊȨÏÞµÈͨÀýÊֶΡ£UndergroundÈëÇֺ󣬻áѸËÙ½ûÓÃÄþ¾²»úÖÆ£¬Çå³ýÓ°×Ó¸±±¾ºÍÈÕÖ¾¼Ç¼£¬ÇÄÎÞÉùÏ¢µØ¼ÓÃÜÎļþ£¬²¢ÁôÏÂÒ»ÕÅÃûΪ¡°!!readme!!!.txt¡±µÄÀÕË÷ÐÅ£¬ÒªÇóÖ§¸¶½âÃÜÓöȣ¬ÆäÆæÌØÖ®´¦ÔÚÓÚ²»¸Ä±äÎļþÀ©Õ¹Ãû£¬Ôö¼ÓÁËʶ±ðÄѶȡ£¸üÁîÈ˵£ÓǵÄÊÇ£¬¸Ã×éÖ¯ÔËÓªÒ»¸öÊý¾Ýй¶ÍøÕ¾£¬¹ûÈ»¾Ü¾øÖ§¸¶Êê½ðµÄÊܺ¦ÕßÐÅÏ¢£¬½øÒ»²½Ê©Ñ¹¡£Ä¿Ç°£¬UndergroundµÄ¹¥»÷·¶Î§ÒÑÀ©Õ¹ÖÁÈ«Çò£¬Êý¾Ýй¶ÍøÕ¾ÒÑÁгö16¸ö¹ú¼ÒµÄÊܺ¦ÕßÃûµ¥£¬º¸ÇÃÀ¡¢·¨¡¢µÂ¡¢Î÷¡¢º«¡¢Ì¨¡¢Ð¼°¼ÓµÈµØ¡£´ËÍ⣬¸Ã×éÖ¯»¹ÀûÓÃTelegramºÍMegaÔÆ´æ´¢·þÎñÀ©´óÆäÓ°ÏìÁ¦£¬Á÷´«ÇÔÈ¡µÄÊý¾Ý¡£
https://securityonline.info/romcom-groups-underground-ransomware-exploits-microsoft-zero-day-flaw/
3. ³¬2.2ÍòÈí¼þ°üÃæÁÙRevival HijackµÄ·çÏÕ
9ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ¡°Revival Hijack¡±µÄÐÂÐ͹©Ó¦Á´¹¥»÷¼¼ÊõÕýÍþв×ÅPythonÈí¼þ°üË÷Òý£¨PyPI£©µÄÄþ¾²£¬¸Ã¼¼ÊõÒѱ»·¢ÏÖ²¢±»ÓÃÓÚʵÑéÉø͸ÏÂÓÎ×éÖ¯¡£JFrogÄþ¾²¹«Ë¾Ö¸³ö£¬¸Ã¼¼ÊõÄܽٳÖÁè¼Ý2.2Íò¸öÏÖÓÐPyPIÈí¼þ°ü£¬Òѵ¼ÖÂÊýÊ®Íò´Î¶ñÒâÏÂÔØ£¬Ó°Ï췶Χ¹ã·º¡£¹¥»÷ÕßÀûÓÃPyPIµÄÕþ²ß©¶´£¬ÔÚÈí¼þ°ü±»ÔËùÓÐÕßɾ³ýºóÖØÐÂ×¢²á²¢ÉÏ´«¶ñÒâ°æ±¾£¬ÀûÓÃÓû§¿ÉÄÜ´æÔÚµÄƴд´íÎó»òÐÅÈιßÐÔ£¬ÓÕµ¼ÏÂÔØ¡£Ó봫ͳÓòÃûÇÀ×¢²îÒ죬Revival HijackרעÓÚÒÑɾ³ýµÄÈí¼þ°ü£¬Ã¿ÔÂÔ¼ÓÐ309¸öÈí¼þ°üÒò´Ë±äµÃ´àÈõ¡£ÕâЩÈí¼þ°üÒòȱ·¦Î¬»¤¡¢¸üÃû»ò¹¦Ð§ÕûºÏ¶ø±»ÒƳý£¬È´Îª¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£JFrogÊý¾ÝÏÔʾ£¬¹¥»÷ÕßÄÜÇÄÎÞÉùÏ¢µØÌæ»»Èí¼þ°ü£¬ÉõÖÁͨ¹ý¡°pip install -upgrade¡±ÃüÁºÏ·¨Èí¼þ°üÌ滻Ϊ¶ñÒâ°æ±¾£¬¶ø¿ª·¢ÕߺÁÎÞ²ì¾õ¡£ÓÈΪÑÏÖصÄÊÇ£¬Ò»¸öÃûΪJinnisµÄÍþвÐÐΪÕßÒÑʵ¼ÊÀûÓøü¼Êõ¡£ÆóÒµºÍ¿ª·¢ÕßÐè¼ÓÇ¿¾¯Ì裬¼ì²éDevOps¹ÜµÀ£¬È·±£²»°²×°ÒÑɾ³ýµÄÈí¼þ°ü£¬²¢½ÓÄÉÐëÒª´ëÊ©±£»¤×ÔÉíÃâÊÜ´ËÀà½Ù³Ö¼¼ÊõµÄÇÖº¦¡£
https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html
4. ÃÉ´óÄÃÖݼƻ®ÉúÓýлáÔâRansomHubÀÕË÷Èí¼þ¹¥»÷
9ÔÂ4ÈÕ£¬ÃÉ´óÄÃÖݼƻ®ÉúÓýлá½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÉù³ÆÒÑÇÖÈëÆäϵͳ²¢ÇÔÈ¡93GBÊý¾Ý£¬ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÈ»Êý¾Ý¡£¸Ã·ÇÓªÀû×é֯ѸËÙÏìÓ¦£¬½«²¿ÃÅÍøÂçÀëÏß²¢Õ÷ÕÙÁª°îÖ´·¨ºÍÐÅÏ¢Äþ¾²×¨¼ÒÐÖúÊÓ²ìÓëÖؽ¨IT»·¾³¡£ÃÀ¹ú¼Æ»®ÉúÓý°ì¹«ÊÒÊ×ϯִÐйÙÂêɯ¡¤¸»ÀÕÈ·ÈÏÁËÕâÒ»¡°ÍøÂçÄþ¾²Ê¼þ¡±£¬²¢Ð»Ð»ÍŶӵIJ»Ð¸Å¬Á¦ÒÔ»Ö¸´ÏµÍ³ºÍÊÓ²ìʼþ¡£¾¡¹Ü¸»ÀÕδ͸¶¾ßÌåÊý¾Ýй¶Çé¿ö£¬µ«È·ÈÏÒÑÏòÁª°îÖ´·¨²¿ÃųÂËß²¢Ñ°ÇóÖ§³Ö¡£ÖµµÃ×¢ÒâµÄÊÇ£¬´Ë´Î¹¥»÷·¢ÉúÇ°£¬FBIµÈÒÑÐû²¼¹ØÓÚRansomHub»îÔ¾ÐÔµÄÄþ¾²¾¯±¨£¬Ö¸³öÆä×Ô2ÔÂÒÔÀ´Òѵ¼ÖÂÖÁÉÙ210ÃûÊܺ¦Õߣ¬º¸Ç¶à¸öÒªº¦»ù´¡ÉèÊ©ÁìÓò¡£´Ë´ÎÕë¶ÔÌṩÉúÖ³±£½¡·þÎñµÄ·ÇÓªÀû×éÖ¯µÄ¹¥»÷£¬±»ÊÓΪÓÈΪ¶ñÁÓµÄÐÐΪ¡£
https://www.theregister.com/2024/09/04/planned_parenthood_cybersecurity_incident/
5. ºÚ¿Í×éÖ¯ÁªºÏ¶Ô·¨·¢¶¯DDoS¹¥»÷£¬ÒªÇóÊÍ·ÅTelegramÊ×´´ÈË
9ÔÂ4ÈÕ£¬Telegram Ê×ϯִÐйÙÅÁά¶û¡¤¶ÅÂÞ·ò±»²¶ºó£¬Ò»ÏµÁкڿÍ×é֯ѸËÙ¼¯½á£¬ÌᳫÃûΪ #FreeDurov »ò #OpDurov µÄÈ«ÇòÍøÂçÐж¯£¬Ã¬Í·Ö±Ö¸·¨¹ú£¬Í¨¹ýʵʩ´ó¹æÄ£µÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ºÍºÚ¿Í¼¼ÊõÈëÇÖ£¬¶ÔÁè¼Ý50¸ö·¨¹úÕþ¸®»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢½»Í¨ÊàŦ¡¢½ÌÓý»ú¹¹¼°Ë½ÓªÆóÒµÌᳫÌôÕ½¡£ÕâЩºÚ¿Í×éÖ¯£¬°üÂÞ¶íÂÞ˹ÍøÂç¾üÖØÉú£¨CARR£©¡¢RipperSec¡¢EvilWeb¡¢CyberDragon µÈ£¬¶àÊý¾ßÓÐÇ׶í»òÇ×ÒÁ˹À¼ÇãÏò£¬ËûÃÇÀûÓÃ×ÔÉí¼¼Êõ×ÊÔ´ºÍ Telegram ƽ̨¹ã·º·¢¶¯£¬ÒªÇ󷨹úÊͷŶÅÂÞ·ò¡£CARR ×÷Ϊ´Ë´ÎÐж¯µÄÁìÍ·Ñò£¬Æ¾½èÆäÓë¶íÂÞ˹¾üÊÂÇ鱨²¿ÃŵÄÁªÏµ¼°ÅÓ´óµÄÉçȺ»ù´¡£¬Õë¶Ô¶à¸ö·¨¹úÖØÒª»ú¹¹·¢¶¯¹¥»÷¡£RipperSec µÈ×éÖ¯Ò²²»¸ÊÂäºó£¬½ÓÄÉרҵ¹¤¾ßÈç MegaMedusa ¶Ô·¨¹ú˾·¨ºÍ¾¯·½ÏµÍ³ÊµÊ©ÃÍÁÒ¹¥»÷¡£ºÚ¿ÍÃDz»½öͨ¹ý DDoS ¹¥»÷̱»¾Ä¿±êÍøÕ¾£¬»¹Éù³ÆÈëÇÖ²¢ÇÔÈ¡Á˲¿ÃÅÃô¸ÐÊý¾Ý£¬ÔÚ Telegram ÉÏìÅÒ«Õ½¹û¡£¾¡¹Ü¶¯»ú¸÷Ò죬´ÓÖ§³Ö¶ÅÂÞ·ò¸öÈ˵½Î¬»¤ Telegram µÄÔËÓªÄþ¾²£¬µ«ÅäºÏµÄËßÇóÊÇ´Ùʹ·¨¹úÕþ¸®ÖØп¼ÂÇÆäÐж¯¡£
https://hackread.com/ddos-attacks-france-telegrams-pavel-durov-arrest/
6. MacroPack¹¤¾ßÔâÀÄÓ㬶à¹ú·¢ÏÖ¶ñÒâÎĵµ
9ÔÂ4ÈÕ£¬MacroPackÊÇÒ»¿îÔΪºì¶ÓÑÝÁ·Éè¼ÆµÄ¹¤¾ß£¬½üÆÚ±»·Ç·¨·Ö×ÓÀÄÓã¬ÓÃÓÚÁ÷´«Havoc¡¢Brute RatelºÍPhatomCoreµÈ¶ñÒ⸺ÔØ£¬Ó°Ï췶Χ²¨¼°¶à¸ö¹ú¼ÒºÍµØÓò¡£¸Ã¹¤¾ßÓÉ·¨¹ú¿ª·¢ÕßEmeric Nasi¿ª·¢£¬¾ß±¸·´¶ñÒâÈí¼þÈƹý¡¢´úÂë»ìÏýµÈ¸ß¼¶¹¦Ð§£¬Ê¹µÃ¹¹½¨Òþ±ÎµÄ¶ñÒâÎĵµ³ÉΪ¿ÉÄÜ¡£Cisco TalosµÄÑо¿½Òʾ£¬ÕâЩ¶ñÒâÎĵµÍ¨¹ýVirusTotalƽ̨Ìá½»µÄÑù±¾ÏÔʾ³ö¸ß¶È¶àÑùÐÔ£¬°üÂÞ²îÒìÓÕ¶ü¡¢ÅÓ´óˮƽºÍѬȾÊֶΣ¬±íÃ÷MacroPackÒѳÉΪºÚ¿Í¹¥»÷µÄг衣±»²¶×½µÄ¶ñÒâÑù±¾ÖУ¬¾ùÁôÓÐMacroPack´´½¨µÄÌØÕ÷£¬ÈçÂí¶û¿É·òÁ´ÃüÃûµÄº¯ÊýºÍ±äÁ¿¡¢É¾³ý×¢Êͼ°¿Õ¸ñÒÔ¼õÉÙ¾²Ì¬·ÖÎö¼ì²âµÈ¡£Êܺ¦ÕßÒ»µ©´ò¿ªÕâЩαװ³É¼ÓÃܱí¸ñ¡¢¾üÊÂ֪ͨ»ò¾ÍҵȷÈÏÊéµÄOfficeÎĵµ£¬±ã»á´¥·¢VBA´úÂ룬¼ÓÔضñÒâDLL²¢Á¬½Óµ½¹¥»÷ÕßµÄC2·þÎñÆ÷¡£²îÒìµØÓòµÄ¹¥»÷°¸Àý¸÷¾ßÌØÉ«£ºÃÀ¹ú°¸ÀýÖУ¬¶ñÒâÎĵµÎ±×°³É¼ÓÃܸüбí¸ñ£¬ÀûÓÃmshta.exeÏÂÔØδ֪Ôغɣ»¶íÂÞ˹°¸ÀýÖУ¬ExcelÊÂÇé²¾ÆóͼÏÂÔØPhantomCoreºóÃÅ£»°Í»ù˹̹°¸ÀýÖУ¬ÔòÒÔ¾üÊÂÏà¹ØÖ÷Ìâαװ£¬ÀûÓÃHTTPS DNSºÍÑÇÂíÑ·CloudFrontͨÐÅ£¬ÉõÖÁǶÈëAdobe Experience Cloud¸ú×Ù´úÂë¡£
https://www.bleepingcomputer.com/news/security/red-team-tool-macropack-abused-in-attacks-to-deploy-brute-ratel/