±¾ÌﲿÃųµÐÍ´æÔÚ¿Éͨ¹ýÖØ·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄ©¶´

Ðû²¼Ê±¼ä 2022-03-30

±¾ÌﲿÃųµÐÍ´æÔÚ¿Éͨ¹ýÖØ·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄ©¶´


¾ÝýÌå3ÔÂ25ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±Åû¶Á˱¾ÌïÆû³µÖеÄÒ»¸ö©¶´£¨CVE-2022-27254£©µÄÏêÇé¡£¸Ã©¶´Ó°ÏìÁ˲¿Ãű¾ÌïºÍÚ©¸è³µÐÍ£¬¿Éͨ¹ýÖØ·Å¹¥»÷½âËøÆû³µ£¬ÉõÖÁÔں̵ܶľàÀëÄÚÒÔÎÞÏß·½Ê½Æô¶¯Æû³µ¡£ÕâÊÇÒ»ÖÖÖмä(MitM) ¹¥»÷£¬¹¥»÷ÕßÀ¹½Ø´ÓÒ£¿ØÔ¿³×·¢Ë͵ÄÉ䯵Ðźţ¬È»ºóÖØÐ·¢ËÍÕâЩÐźÅ¡£Ñо¿ÈËÔ±½¨Òé³µÖ÷ʹÓñ»¶¯ÎÞÔ¿³×½øÈë(PKE)¶ø²»ÊÇÔ¶³ÌÎÞÔ¿³×½øÈë(RKE)£¬ÕâÑù½«Ê¹¹¥»÷ÕßÓÉÓÚ¾àÀë¹ý½ü¶ø·Ç³£ÄѿˡºÍ¶ÁÈ¡ÐźÅ¡£  


https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/


½ðÈÚ·þÎñ¹«Ë¾Ä¦¸ùÊ¿µ¤ÀûµÄ²¿Ãſͻ§Ôâµ½ÓïÒôµöÓã¹¥»÷


¾Ý2ÔÂ24ÈÕ±¨µÀ£¬½ðÈÚ·þÎñ¹«Ë¾Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©³ÆÆä²¿Ãſͻ§µÄÕÊ»§ÒѾ­Ð¹Â¶¡£¸Ã¹«Ë¾Ðû²¼Í¨¸æ³Æ£¬ÔÚ2022Äê2ÔÂ11ÈÕǰºó£¬¹¥»÷Õßð³ä¸Ã¹«Ë¾Í¨¹ýÓïÒôͨ»°ÓÕÆ­Ä¿±êÌṩÆäÔÚÏßÕË»§ÐÅÏ¢£¬È»ºó»ñµÃÁ˶ÔÕâЩÕË»§µÄ·ÃÎÊȨÏÞ¡£ÔÚÀÖ³ÉÈëÇÖÕâЩÕË»§ºó£¬¹¥»÷Õßͨ¹ýÖ§¸¶·þÎñZelle£¬½«Ä¿±êµÄ×ʽðתÈëËûÃÇ×Ô¼ºµÄÒøÐÐÕË»§¡£Ä¿Ç°£¬¸Ã¹«Ë¾½ûÓÃÁËËùÓÐÊÜÓ°ÏìµÄÕË»§£¬²¢ÌåÏÖÆäûÓÐÐÅϢй¶¡£


https://www.bleepingcomputer.com/news/security/morgan-stanley-client-accounts-breached-in-social-engineering-attacks/


Google³Æ¶à¸öÍÅ»ïÀûÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯


3ÔÂ24ÈÕ£¬¹È¸èµÄÍþв·ÖÎöС×é(TAG)Ðû²¼³ÂËß³Æ2¸ö³¯ÏʵĺڿÍÍÅ»ïÀûÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯¡£ÕâÊÇÒ»¸öÊͷźóʹÓé¶´£¨CVE-2022-0609£©£¬ÒÑÓÚ½ñÄê2ÔÂ14ÈÕÐÞ¸´¡£´Ë´Î·¢ÏֵĵÚÒ»¸ö»î¶¯ÓëClearSkyÔÚ2020Äê·¢ÏÖµÄOperation Dream JobµÄTTPÒ»Ö£¬Ö÷ÒªÕë¶ÔÐÂÎÅýÌåºÍITÐÐÒµ£»µÚ¶þ¸ö»î¶¯ÎªOperation AppleJeus£¬Ö÷ÒªÕë¶Ô¼ÓÃÜ»õ±ÒºÍ½ðÈڿƼ¼ÐÐÒµ¡£Google½¨ÒéÓû§ÆôÓÃChromeÔöÇ¿Äþ¾²ä¯ÀÀ¹¦Ð§£¬²¢È·±£ËùÓÐÉ豸¾ùÒѸüС£


https://blog.google/threat-analysis-group/countering-threats-north-korea/


Ñо¿ÈËÔ±³Æ·¢ÏÖHiveµÄбäÌå½è¼øBlackCatµÄ¹¦Ð§


¾Ý3ÔÂ27ÈÕ±¨µÀ£¬Group-IBÑо¿ÈËÔ±rivitna·¢ÏÖHive±äÌåÌí¼ÓÁËÐµĹ¦Ð§¡£Ñо¿ÈËÔ±³Æ£¬Hive½è¼øÁËBlackCatµÄºÜ¶à¹¦Ð§ºÍ¼ÆÄ±£ºHive½«Ì¸ÅÐÓõÄÓû§ÃûºÍµÇ¼ÃÜÂë×÷ΪÃüÁîÐвÎÊý½øÐÐͨ±¨£¬ÕâЩƾ¾ÝÏÖÔÚÖ»ÄÜÔÚ¹¥»÷ÆÚ¼ä´´½¨µÄÊê½ð¼Ç¼ÖÐʹÓã¬Õ⽫ʹÑо¿ÈËÔ±ÎÞ·¨´ÓÑù±¾ÖнøÐмìË÷£»½«Linux¼ÓÃÜ·¨Ê½´ÓGolang¸Ä±àΪRust±àд£¬Ê¹µÃÀÕË÷Èí¼þµÄ¸ßЧ¸ü¸ß£¬¸üÄѽøÐÐÄæÏò¹¤³Ì¡£


https://www.bleepingcomputer.com/news/security/hive-ransomware-ports-its-linux-vmware-esxi-encryptor-to-rust/


ASECÐû²¼¹ØÓÚKimsukyÃé×¼º«¹úµÄµöÓã¹¥»÷µÄ·ÖÎö³ÂËß


3ÔÂ28ÈÕ£¬ASECÐû²¼Á˹ØÓÚKimsukyÃé×¼º«¹úµÄµöÓã¹¥»÷µÄ·ÖÎö³ÂËß¡£¹¥»÷ÕßÔÚ¶ñÒâÎļþµÄÀ©Õ¹ÃûǰÌí¼ÓÁË¡°.pdf¡±À´ÆÛÆ­Óû§£¬Ê¹ÒÑÒþ²ØÀ©Õ¹ÃûµÄÓû§½«¸ÃVBSÎļþÎóÈÏΪÊÇPDFÎļþ¡£Í¨¹ý¸ÃPDFÎļþµÄÃû×ÖÍÆ¶Ï£¬¹¥»÷ÕßµÄÄ¿±êËÆºõÊǾ«Ï¸»¯ÐÐÒµ¡£µ±Óû§ÔËÐÐVBSʱ£¬»áÔÚ·¾¶¡°C:\ProgramData¡±Öд´½¨²¢ÔËÐÐBase64±àÂëµÄDLL£¬¸ÃDLL»á´´½¨cmd.exe½ø³Ì²¢ÆÚ´ýÓëC&C·þÎñÆ÷µÄͨÐÅ¡£Ñо¿ÈËÔ±½¨ÒéÓû§½ûÓá°Òþ²ØÒÑÖªÎļþÀàÐ͵ÄÀ©Õ¹¡±£¬ÒÔ·ÀÖ¹±»´ËÀ༼ÊõÆÛÆ­¡£


https://asec.ahnlab.com/en/33032/


IntezerÐû²¼IcedIDµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


IntezerÔÚ3ÔÂ28ÈÕÐû²¼Ò»·Ý³ÂËߣ¬ÏêÊöÁËIcedIDµÄжԻ°½Ù³Ö¹¥»÷»î¶¯¡£IcedIDÊÇÒ»ÖÖÄ£¿é»¯ÒøÐÐľÂí£¬ÓÚ2017ÄêÊ״α»·¢ÏÖ¡£Ôڴ˴λÖУ¬¹¥»÷ÕßÕë¶ÔÒ×Êܹ¥»÷µÄMicrosoft Exchange·þÎñÆ÷ÇÔȡƾ¾Ý£¬²¢ÀûÓÃÕâЩ±»ºÚÕÊ»§·¢Ë͵öÓãÓʼþ¡£µöÓãÓʼþµÄZIP¸½¼þÖÐÊÇÒ»¸öISOÎļþ£¬¸ÃÎļþÓÖ°üÂÞÒ»¸öLNKºÍÒ»¸öDLLÎļþ¡£µ±Ä¿±êµã»÷document.lnkºó£¬DLL½«Æô¶¯ÒÔ°²×°IcedID¡£Ä¿Ç°£¬Ñо¿ÈËÔ±ÒѾ­¼ì²âµ½Õë¶ÔÄÜÔ´¡¢Ò½ÁƱ£½¡¡¢Ö´·¨ºÍÖÆÒ©ÐÐÒµµÄ¹¥»÷»î¶¯¡£


https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/



Äþ¾²¹¤¾ß


Ostorlab


¿ªÔ´Äþ¾²É¨Ã跨ʽ£¬Äܹ»ÒÔ¼òµ¥¡¢¿ÉÀ©Õ¹ºÍÂþÑÜʽµÄ·½Ê½ÔËÐÐÉæ¼°¶à¸ö¹¤¾ßµÄÅÓ´óÄþ¾²É¨ÃèÈÎÎñ¡£


https://github.com/Ostorlab/ostorlab



CobaltBus


Cobalt Strike Óë Azure Servicebus¡¢C2 Á÷Á¿µÄÍⲿ C2 ¼¯³É¡£


https://github.com/Flangvik/CobaltBus



KNX Bus Dump


KNX ´«¸ÐÆ÷¡¢Ö´ÐÐÆ÷ºÍÆäËû KNX É豸µÄЭÒé·ÖÎö¹¤¾ß¡£


https://github.com/ChrisM09/KNX-Bus-Dump




Äþ¾²·ÖÎö


Windows 11 22H2£ºµ½Ä¿Ç°ÎªÖ¹ÎÒÃÇËùÖªµÀµÄÒ»ÇÐ


https://www.bleepingcomputer.com/news/microsoft/windows-11-22h2-everything-we-know-so-far/


ÄÏ·ÇÏ£Íûͨ¹ýÉúÎïʶ±ð¼ì²éÀ´µÖÓù SIM ¿¨½»»»¹¥»÷


https://www.bleepingcomputer.com/news/security/south-africa-wants-to-fight-sim-swapping-with-biometric-checks/


Êý°Ù¸ö¶íÂÞ˹¥Óî¿ØÖÆÆ÷¿É±»Ô¶³ÌÈëÇÖ


https://securityaffairs.co/wordpress/129452/hacking/russian-building-controller-hack.html


Racoon Stealer ¶ñÒâÈí¼þÒòÎÚ¿ËÀ¼Õ½Õù¶øÔÝÍ£ÔËÓª


https://www.bleepingcomputer.com/news/security/racoon-stealer-malware-suspends-operations-due-to-war-in-ukraine/


Íþв¼ò½é£ºLapsus$ Group


https://unit42.paloaltonetworks.com/lapsus-group/