Stacked VLANÖеÄ4¸ö¿Éµ¼ÖÂDoSºÍMiTM¹¥»÷µÄ©¶´

Ðû²¼Ê±¼ä 2022-09-30
1¡¢Stacked VLANÖеÄ4¸ö¿Éµ¼ÖÂDoSºÍMiTM¹¥»÷µÄ©¶´

      

¾ÝýÌå9ÔÂ28ÈÕ±¨µÀ£¬Stacked VLANÒÔÌ«Íø¹¦Ð§ÖеÄ4¸ö©¶´¿É±»ÓÃÀ´Í¨¹ý¶¨ÖƵÄÊý¾Ý°ü¶ÔÄ¿±êÖ´Ðоܾø·þÎñ(DoS)»òÖмäÈË(MitM)¹¥»÷¡£Stacked VLANÊÇÏÖ´ú·ÓÉÆ÷ºÍ½»»»»úÖеÄÒ»ÏЧ£¬ÔÊÐí¹«Ë¾½«¶à¸öVLAN ID·â×°µ½ÓëÉÏÓÎÌṩÉ̹²ÏíµÄµ¥¸öVLANÁ¬½ÓÖС£ÕâЩ©¶´´æÔÚÓÚÔÊÐíVLAN±êÍ·¶ÑµþµÄÒÔÌ«Íø·âװЭÒéÖУ¬·Ö±ðΪCVE-2021-27853¡¢CVE-2021-27854¡¢CVE-2021-27861ºÍCVE-2021-2786£¬Î´¾­Éí·ÝÑéÖ¤µÄÏàÁÚ¹¥»÷Õß¿ÉÒÔʹÓÃVLANºÍLLC/SNAP±êÍ·µÄ×éºÏÀ´ÈƹýL2ÍøÂç¹ýÂ˱£»¤£¬ÀýÈçIPv6 RA·À»¤¡¢¶¯Ì¬ARP¼ì²éºÍDHCPÕìÌýµÈ¡£


https://www.bleepingcomputer.com/news/security/ethernet-vlan-stacking-flaws-let-hackers-launch-dos-mitm-attacks/


2¡¢¹¥»÷ÕßÀûÓÃQuantum BuilderÀ´·Ö·¢Agent Tesla

      

ZscalerÔÚ9ÔÂ27ÈÕÅû¶Á˹¥»÷ÕßÀûÓÃQuantum Builder·Ö·¢Ô¶³Ì·ÃÎÊľÂíAgent TeslaµÄ»î¶¯¡£Quantum BuilderÊÇÒ»Öֿɶ¨ÖƵŤ¾ß£¬ÔÚ°µÍøÒÔÿÔÂ189Å·ÔªµÄ¼Û¸ñ³öÊÛ£¬¿ÉÓÃÓÚÉú³É¶ñÒâ¿ì½Ý·½Ê½ÎļþÒÔ¼°HTA¡¢ISOºÍPowerShell payload¡£¹¥»÷ʹÓõĵöÓãÓʼþÉù³ÆÊÇÀ´×ÔÖйú¿éÌǺͱùÌǹ©Ó¦É̵Ķ©µ¥È·ÈÏÐÅÏ¢£¬ÆäÖеÄLNKÎļþαװ³ÉPDFÎĵµ¡£Ö´ÐÐLNKºó£¬Ç¶ÈëʽPowerShell´úÂë»áÉú³ÉMSHTA£¬È»ºóÖ´ÐÐÍйÜÔÚÔ¶³Ì·þÎñÆ÷ÉϵÄHTAÎļþ£¬×îÖÕÏÂÔØ²¢Ö´ÐÐAgent Tesla¶þ½øÖÆÎļþ¡£


https://www.zscaler.com/blogs/security-research/agent-tesla-rat-delivered-quantum-builder-new-ttps


3¡¢Securonix·¢ÏÖÖ÷ÒªÕë¶Ô¾üʳаüÉ̵ÄÐÂÒ»ÂÖ¹¥»÷»î¶¯

      

¾Ý9ÔÂ28ÈÕ±¨µÀ£¬SecuronixµÄÑо¿ÈËÔ±·¢ÏÖÁËÖ÷ÒªÕë¶Ô¼ÓÈëÎäÆ÷ÖÆÔìµÄ¶à¼Ò¾üʳаüÉ̵Äл£¬ÆäÖпÉÄܰüÂÞF-35 Lightning IIÕ½¶·»úÁã¼þ¹©Ó¦ÉÌ¡£¸Ã»î¶¯Ê¼ÓÚ2022ÄêÏÄÄ©£¬ÀûÓÃÁËÓã²æÊ½ÍøÂçµöÓã×÷Ϊ³õʼѬȾý½é¡£ÓʼþÖаüÂÞÒ»¸ö¿ì½ÝÎļþÔÚÖ´ÐÐʱ»áÁ¬½Óµ½C2£¬²¢Æô¶¯Ò»Á¬´®µÄPowerShell½Å±¾¡£ÓÐȤµÄÊÇ£¬Õâ¸ö¿ì½ÝÎļþûÓÐʹÓó£ÓõÄcmd.exe»òpowershell.exe£¬¶øÊÇÒÀÀµÓÚC:\Windows\System32\ForFiles.exeÃüÁîÀ´Ö´ÐС£´ËÍ⣬¸Ã»î¶¯µÄC2»ù´¡ÉèÊ©µÄÓòÓÚ2022Äê7ÔÂ×¢²á²¢ÍйÜÔÚDigitalOceanÉÏ¡£


https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/


4¡¢WitchettyÀûÓÃÒþдÊõ½«ºóÃÅÒþ²ØÔÚWindowsͼ±êÖÐ

      

SymantecÓÚ9ÔÂ29ÈÕ³ÆÆä·¢ÏÖÁËWitchettyÀûÓÃÒþдÊõ½«ºóÃŶñÒâÈí¼þÒþ²ØÔÚWindowsͼ±êÖС£Ñо¿ÈËԱ͸¶ËûÃÇÕýÔÚÊÓ²ìÒ»Æðеļäµý»î¶¯£¬¸Ã»î¶¯¿ªÊ¼ÓÚ2022Äê2Ô£¬Õë¶ÔÖж«µÄÁ½¸öÕþ¸®»ú¹¹ºÍ·ÇÖÞµÄÒ»¼Ò֤ȯ½»Ò×Ëù£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷ÕßÊ×ÏÈÀûÓÃProxyShellºÍProxyLogon©¶´£¬ÔÚÄ¿±ê·þÎñÆ÷ÉÏÏÂÔØwebshell£¬È»ºó»ñÈ¡Òþ²ØÔÚͼÏñÎļþÖеĺóÃÅ¡£ËäÈ»¸ÃÍÅ»ïÈÔÔÚʹÓÃLookBackºóÃÅ£¬µ«ËƺõÒÑÌí¼ÓÁ˼¸¸öеĶñÒâÈí¼þ£¬ÈçBackdoor.Stegmap£¬ËüÀûÓÃÒþдÊõ´ÓλͼͼÏñÖÐÌáÈ¡Æäpayload¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage


5¡¢KasperskyÐû²¼¹ØÓÚPrilexµÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß

      

9ÔÂ28ÈÕ£¬KasperskyÐû²¼Á˹ØÓÚ°ÍÎ÷ºÚ¿ÍÍÅ»ïPrilexµÄ¹¥»÷µÄ·ÖÎö³ÂËß¡£¸ÃÍÅ»ï×Ô2014Ä꿪ʼ»îÔ¾£¬ÔÚ2016Äê¾ö¶¨·ÅÆúATM¶ñÒâÈí¼þ£¬½«ËùÓй¥»÷¼¯ÖÐÔÚPoSϵͳÉÏ¡£PrilexµÄ×îа汾ÔÚ¹¥»÷·½Ê½ÉÏÓë֮ǰ°æ±¾´æÔÚijЩ²îÒ죬¼´¸ÃÍÅ»ïÒÑ´ÓÖØ·Å¹¥»÷ת±äΪʹÓÃGHOST½»Ò×£¬¸Ã¼¼ÊõÔÚµêÄÚÖ§¸¶¹ý³ÌÖÐʹÓÃÄ¿±ê¿¨Éú³ÉµÄÃÜÂë·Ç·¨¶ÒÏÖ×ʽð¡£Prilex¶ÔÐÅÓÿ¨ºÍ½è¼Ç¿¨½»Ò×ÒÔ¼°ÓÃÓÚÖ§¸¶´¦ÖõÄÈí¼þµÄÊÂÇéÔ­Àí·Ç³£ÊìÁ·£¬Òò´Ë¿ÉÒÔ²»Í£¸üй¤¾ß£¬²¢ÕÒµ½ÈƹýÊÚȨ¼ÆÄ±µÄÒªÁ죬´Ó¶øÖ´Ðй¥»÷¡£


https://securelist.com/prilex-atm-pos-malware-evolution/107551/


6¡¢LumenÐû²¼»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö³ÂËß

      

9ÔÂ28ÈÕ£¬LumenÐû²¼ÁË»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö³ÂËß¡£½ü¼¸¸öÔÂÀ´£¬ChaosµÄÊýÁ¿Ñ¸ËÙÔö³¤£¬Ö¼ÔÚ½«ÖÖÖÖWindowsºÍLinuxÉ豸¡¢SOHO·ÓÉÆ÷ºÍÆóÒµ·þÎñÆ÷µÈÓÕÈë½©Ê¬ÍøÂç¡£ChaosµÄ¹¦Ð§°üÂÞö¾ÙÖ÷»ú»·¾³¡¢ÔËÐÐÔ¶³ÌshellÃüÁî¡¢¼ÓÔØ¸½¼ÓÄ£¿é¡¢Í¨¹ýÇÔÈ¡ºÍ±©Á¦ÆÆ½âSSH˽Կ×Ô¶¯Á÷´«ÒÔ¼°Ö´ÐÐDDoS¹¥»÷¡£ChaosËÆºõÕýÔÚʹÓÃÁíÒ»¸ö½©Ê¬ÍøÂçKaijiµÄ¹¹½¨¿éºÍ¹¦Ð§£¬Ñо¿ÈËԱƾ¾Ý¶Ô100¶à¸öÑù±¾ÖеĹ¦Ð§·ÖÎö£¬ÍƲâChaosÊÇKaijiµÄÏÂÒ»´Îµü´ú¡£


https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/