´òÓ¡¹ÜÀíÈí¼þ¿ª·¢ÉÌPaperCutÐÞ¸´Æä²úÎïÖÐÒѱ»ÀûÓ鶴
Ðû²¼Ê±¼ä 2023-04-211¡¢´òÓ¡¹ÜÀíÈí¼þ¿ª·¢ÉÌPaperCutÐÞ¸´Æä²úÎïÖÐÒѱ»ÀûÓ鶴
¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ£¬PaperCut¶Ø´Ù¿Í»§°²×°¸üУ¬ÐÞ¸´ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓõÄ©¶´¡£PaperCutÓÃÓÚʹ´òÓ¡¹ÜÀíÈí¼þÓëËùÓÐÖ÷ҪƷÅƺÍƽ̨¼æÈÝ£¬ËüÉù³ÆΪÀ´×Ô100¶à¸ö¹ú¼ÒµÄÊýÒÚÈËÌṩ·þÎñ¡£¸Ã¹«Ë¾ÓÚ1ÔÂ10ÈÕÊÕµ½³ÂËߣ¬µÃÖªÆäPaperCut MF/NGµÄ´æÔÚÁ½¸ö©¶´£¬·Ö±ðÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´ºÍÒ»¸öÐÅϢ鶩¶´¡£Ö®ºó£¬Õâ¼ÒÈí¼þ¿ª·¢É̸üÐÂÁËÆä3ÔµÄÄþ¾²Í¨¸æ£¬³Æ½ØÖÁ2023Äê4ÔÂ18ÈÕ£¬ÓÐÖ¤¾Ý±íÃ÷δ´ò²¹¶¡µÄ·þÎñÆ÷ÕýÔÚ±»ÀûÓ㬵«Ã»ÓÐ͸¶̫¶àÓйØÕâЩ©¶´µÄÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-bug-in-papercut-servers/
2¡¢Ó¡¶ÈICICIÒøÐÐÒòϵͳÅäÖôíÎóй¶Êý°ÙÍòÌõ¿Í»§ÐÅÏ¢
¾Ý4ÔÂ20ÈÕ±¨µÀ£¬Ó¡¶ÈICICIÒøÐÐй¶ÁËÊý°ÙÍòÌõ¿Í»§ÐÅÏ¢¡£2ÔÂ1ÈÕ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÅäÖôíÎóµÄDigital Ocean´æ´¢Í°£¬ÆäÖаüÂÞÁè¼Ý360Íò¸öICICIÒøÐеÄÎļþ£¬Éæ¼°ÒøÐм°Æä¿Í»§µÄÃô¸ÐÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢°üÂÞ¿Í»§µÄÒøÐÐÕË»§ÐÅÏ¢¡¢ÐÅÓÿ¨ºÅ¡¢»¤ÕÕ¡¢Éí·ÝÖ¤ºÍÓ¡¶ÈÄÉË°ÈËʶ±ðºÅµÈ£¬ÒøÐеĶÔÕ˵¥ºÍKYC±í¸ñ£¬ÒÔ¼°ÒøÐÐÔ±¹¤ºÍÇóÖ°ÕߵļòÀú¡£½ØÖÁ3ÔÂ30ÈÕ£¬¸Ã´æ´¢Í°Òѱ»±£»¤ÆðÀ´¡£
https://securityaffairs.com/145094/uncategorized/icici-bank-data-leak.html
3¡¢APT 36ÀûÓÃжñÒâÈí¼þPoseidon¹¥»÷Ó¡¶ÈµÄÕþ¸®»ú¹¹
UptycsÔÚ4ÔÂ17ÈÕ³ÆÆä·¢ÏÖÁËAPT 36£¨Ò²³ÆTransparent Tribe£©ÀûÓÃÐÂLinux¶ñÒâÈí¼þPoseidonµÄ¹¥»÷»î¶¯¡£¹¥»÷Õßͨ¹ýľÂí»¯µÄ2FAÈí¼þKavach·Ö·¢¶ñÒâÈí¼þpayload£¬Ö÷ÒªÕë¶ÔΪӡ¶ÈÕþ¸®»ú¹¹ÊÂÇéµÄLinuxÓû§¡£¹¥»÷ʼÓÚÒ»¸ö¶ñÒâELFÎļþ£¬Ö¼ÔÚ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷µÚ¶þ½×¶ÎPoseidon payload¡£PoseidonÊÇÒ»¸öͨÓúóÃÅ¿ÉÓÃÓÚ½Ù³Ö±»Ñ¬È¾µÄÖ÷»ú£¬Æ书Ч°üÂ޼Ǽ¼üÅÌ¡¢½ØÆÁ¡¢ÉÏ´«ºÍÏÂÔØÎļþ£¬ÒÔ¼°Í¨¹ýÖÖÖÖ·½Ê½Ô¶³Ì¹ÜÀíϵͳ¡£
https://www.uptycs.com/blog/cyber_espionage_in_india_decoding_apt_36_new_linux_malware
4¡¢SymantecÅû¶PlayµÄÁ½¸öй¤¾ßGrixbaºÍVSS¸´Öƹ¤¾ß
SymantecÓÚ4ÔÂ19ÈÕÅû¶ÁËÀÕË÷ÍÅ»ïPlayµÄÁ½¸öеÄ×Ô½ç˵Êý¾ÝÊÕ¼¯¹¤¾ß£¬¼´GrixbaºÍVSS¸´Öƹ¤¾ß¡£GrixbaÊÇÍøÂçɨÃèºÍÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬ÓÃÓÚö¾ÙÓòÖеÄÓû§ºÍ¼ÆËã»ú¡£¸Ã¹¤¾ß½«ÊÕ¼¯µ½µÄÊý¾ÝÉú´æÔÚCSVÎļþÖв¢Ñ¹Ëõ³ÉZIP£¬È»ºó鶵½¹¥»÷ÕßµÄC2·þÎñÆ÷£¬ÎªÏÂÒ»²½¹¥»÷ÌṩÖØÒªÐÅÏ¢¡£VSS¸´Öƹ¤¾ßÒ²ÊÇʹÓÃCostura¹¤¾ß¿ª·¢µÄ£¬½«AlphaVSS¿âǶÈëµ½¿ÉÖ´ÐÐÎļþÖУ¬¸Ã¹¤¾ßÓÃÓÚÔÚ¼ÓÃÜ֮ǰ£¬´Ó±»Ñ¬È¾É豸µÄVSS¾í¸´ÖÆÎļþ¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy
5¡¢ThreatMonÐû²¼Blind Eagle¹¥»÷»î¶¯µÄ¼¼Êõ·ÖÎö³ÂËß
4ÔÂ19ÈÕ£¬ThreatMonÐû²¼³ÂËߣ¬½«Blind EagleÁ´½Óµ½Ò»¸öеĶà½×¶Î¹¥»÷Á´¡£Ñо¿ÈËÔ±·¢ÏÖʹÓÃÒ»¸öJavaScriptÏÂÔØ·¨Ê½À´Ö´ÐÐÍйÜÔÚDiscord CDNÖеÄPowerShell½Å±¾¡£¸Ã½Å±¾»á·Ö·¢ÁíÒ»¸öPowerShell½Å±¾ºÍÒ»¸öWindowsÅú´¦ÖÃÎļþ£¬²¢ÔÚWindowsÆô¶¯Îļþ¼ÐÖÐÉú´æÒ»¸öVBScriptÎļþÒÔʵÏÖ³Ö¾ÃÐÔ¡£È»ºóÔËÐÐVBScript´úÂëÒÔÆô¶¯Åú´¦ÖÃÎļþ£¬Åú´¦ÖÃÎļþËæºó±»½âÃÜ£¬ÒÔÔËÐÐ֮ǰÓëÖ®Ò»Æð·Ö·¢µÄPowerShell½Å±¾¡£ÔÚ×îºó½×¶Î£¬PowerShell½Å±¾»áÖ´ÐÐnjRAT¡£
https://threatmon.io/apt-blind-eagles-malware-arsenal-technical-analysis/
6¡¢FortraÐû²¼¹ØÓÚGoAnywhere MFT©¶´¹¥»÷µÄÊÓ²ì½á¹û
4ÔÂ17ÈÕ£¬FortraÐû²¼Á˹ØÓÚGoAnywhere MFT©¶´£¨CVE-2023-0669£©ÀûÓûµÄÊÓ²ì½á¹û¡£Æ¾¾Ýͨ¸æ£¬¸Ã¹«Ë¾ÓÚ1ÔÂ30ÈÕÒâʶµ½²¿ÃÅGoAnywhere MFTaaSʵÀýÖеĿÉÒɻ£¬²¢Ñ¸ËٹرÕÔÆ·þÎñÒÔ½øÐнøÒ»·¨Ê½²é¡£ÊÓ²ìÏÔʾ£¬¹¥»÷ÕßÔÚ1ÔÂ28ÈÕÖÁ1ÔÂ30ÈÕÀûÓ鶴ÔÚ²¿ÃÅ¿Í»§»·¾³Öд´½¨ÁËÕÊ»§£¬È»ºóʹÓÃÕâЩÕÊ»§´ÓMFT»·¾³ÏÂÔØÎļþ¡£¹¥»÷Õß»¹ÔÚijЩMFTaaS¿Í»§»·¾³Öа²×°ÁËÁ½¸öÌرðµÄ¹¤¾ß£¬NetcatºÍErrors.jsp¡£´ËÍ⣬Fortra·¢ÏÖÔçÔÚ1ÔÂ18Èո鶴¾Í±»ÓÃÓÚÕë¶ÔÔËÐÐGoAnywhere MFTÌض¨ÅäÖõĵ±µØ¿Í»§¡£
https://www.fortra.com/blog/summary-investigation-related-cve-2023-0669