Kaspersky·¢ÏÖAPT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
Ðû²¼Ê±¼ä 2023-08-031¡¢Kaspersky·¢ÏÖAPT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
KasperskyÔÚ7ÔÂ31Èճƣ¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚÀûÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯£¬Ö¼ÔÚ´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý¡£ÊӲ췢ÏÖ£¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²îÒìµÄÖ²È뷨ʽ£¬Ã¿¸öÖ²È뷨ʽ¶¼ÓÃÓÚ²îÒìµÄ¹¥»÷½×¶Î¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·ݣ¬Éæ¼°Èý¸ö²îÒìµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²È뷨ʽ½¨Á¢¶ÔÄ¿±êϵͳµÄ³Ö¾ÃÐÔºÍÔ¶³Ì·ÃÎÊ£¬²¢ÊÕ¼¯Õì²ìÊý¾Ý£»µÚ¶þ½×¶Î£¬APT31»á°²×°¸üרҵµÄ¶ñÒâÈí¼þ£¬À´Ê¹ÓÃUSBÁ÷´«´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý£»×îºóµÄµÚÈý½×¶Î£¬ºÚ¿ÍʹÓÃÖ²È뷨ʽ½«ÊÕ¼¯µ½µÄÊý¾ÝÉÏ´«µ½C2·þÎñÆ÷¡£
https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/
2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷ͬÒâ½»45ÍòÃÀÔªÊê½ð
¾Ý8ÔÂ1ÈÕ±¨µÀ£¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷£¬¸ÃÕòµÄ±£ÏÕ¹«Ë¾Óë¹¥»÷ÕßÐÉ̸濢ÁË45ÍòÃÀÔªµÄºÍ½âÐÒé¡£ÁÙʱÕò³¤Hartnett³Æ£¬Ä¿Ç°¹¥»÷ÒѾµÃµ½Á˽â¾ö£¬¶Ô¸ÃÕòÒµÎñºÍÔËÓªÖÁ¹ØÖØÒªµÄÊý¾ÝÒ²Òѻָ´¡£µ«ÊÇһЩÊôÓÚ¸öÈËÓû§µÄÊý¾Ý£¬ºÍÉæ¼°Îª¸ÃÕò·þÎñ²¢´æ´¢¹ýÈ¥¼Ç¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£ÕâЩ¶ªÊ§µÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÈ»¹«¹²¼Ç¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£
https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/
3¡¢Cofense³Æ½üÆÚÀûÓÃGoogle AMPµÄµöÓã»î¶¯ÊýÁ¿Ôö¶à
CofenseÓÚ8ÔÂ1ÈÕ͸¶£¬ÀûÓÃGoogle AMPµÄµöÓã»î¶¯ÊýÁ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔö¼Ó¡£Google AMPÊÇÓÉGoogleÓë30¸öºÏ×÷»ï°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü£¬Ö¼ÔÚÌá¸ßÒÆ¶¯É豸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙ¶È¡£ÕâÖÖеĵöÓã¼ÆÄ±½«AMP URLǶÈëµöÓãÓʼþÖУ¬ÕâЩ¶ñÒâURLÓÚ5Ô·ݿªÊ¼·ºÆð£¬Ä¿Ç°ÈÔÔÚÁ÷´«£¬Ö¼ÔÚÇÔȡԱ¹¤µÇ¼ƾ¾Ý¡£´ËÀà»î¶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£´ËÍ⣬¹¥»÷»î¶¯·Ç³£Òþ±Î£¬²»½öÀûÓÃÁËGoogle AMP URL£¬»¹½áºÏÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÄþ¾²»ù´¡ÉèÊ©¡£
https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/
4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûȻӡ¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â
¾Ý7ÔÂ31ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±·¢ÏÖÃûΪUsNsAµÄºÚ¿Í¹ûÈ»ÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â£¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É£¬×ܾÞϸԼΪ1.8 GB£¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ£¬°üÂÞÑо¿ÂÛÎĵȡ£Ñо¿ÈËÔ±Ö¸³ö£¬¹¥»÷ÕßÀûÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢Èë©¶´À´»ñµÃδ¾ÊÚȨµÄ·ÃÎÊȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â£¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£
https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum
5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½Ê½Collide+PowerÓ°Ï켸ºõËùÓÐCPU
¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢ÏÖÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½Ê½£¬Ó°ÏìÁ˼¸ºõËùÓÐCPU£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£ÆäÖ÷Òª¿´·¨ÊÇ£¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦Ó÷¨Ê½·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖз¢ÉúÊý¾Ý¡°³åÍ»¡±²¢ÁýÕÖǰÕßʱ£¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¸Ã©¶´±»×·×ÙΪCVE-2023-20583£¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦ÖÃÆ÷¡£¸Ã©¶´¾ßÓÐÑо¿ÒâÒ壬µ«ÀûÓÃÆðÀ´±ÈÁ¦À§ÄÑ£¬Òò´ËÑÏÖØË®Æ½½ÏµÍ¡£ÖÁÓÚ»º½â´ëÊ©£¬ÐèÒªÖØÐÂÉè¼ÆCPU£¬ËùÒÔ¸üÏÖʵµÄ»º½â´ëÊ©ÊÇ·ÀÖ¹¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźš£
https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/
6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
8ÔÂ1ÈÕ£¬Unit 42³ÆÆä·¢ÏÖÁËÒ»¸öеĵöÓã»î¶¯£¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¸Ã»î¶¯ÓÚ2022Äê12ÔÂ×óÓÒ¿ªÊ¼£¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÈ¡ÐÅÏ¢¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer£¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£´Ë´Î·¢ÏÖµÄ»î¶¯Éæ¼°Á½¸ö±äÌ壬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§£¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜ»õ±Ò×ʽðµÈ£»µÚ¶þ¸öÖ§³ÖÌØ±ð¹¦Ð§£¬ÀýÈç½âÎöOutlookÓʼþ¡¢Í¨¹ýTelegram½øÐÐÊý¾Ýй¶¡¢½Ù³ÖFacebookÕË»§ºÍ·´·ÖÎöµÈ¡£
https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/