΢Èí8Ô·ݵķÇÓ¢ÓïExchangeÄþ¾²¸üдæÔÚBugÒѻعö
Ðû²¼Ê±¼ä 2023-08-111¡¢Î¢Èí8Ô·ݵķÇÓ¢ÓïExchangeÄþ¾²¸üдæÔÚBugÒѻعö
¾ÝýÌå8ÔÂ10ÈÕ±¨µÀ£¬Î¢Èí·¢ÏÖ8Ô·ÝMicrosoft Exchange ServerÄþ¾²¸üдæÔÚÎÊÌ⣬Òѽ«Æä´ÓWindows UpdateÖÐɾ³ý¡£Î¢ÈíÔÚ8ÔÂ8ÈÕÐû²¼Á˴˸üУ¬×ܹ²ÐÞ¸´ÁË6¸ö©¶´¡£È»¶ø£¬µ±¹ÜÀíÔ±ÔÚ·ÇÓ¢Óï·þÎñÆ÷Éϰ²×°¸üк󣬷¢ÏÖExchange Windows·þÎñÎÞ·¨Æô¶¯¡£°²×°Ê§°Ü£¬´íÎó´úÂëΪ1603£¬²¢ÁôÏ´íÎóµÄExchange°²×°¡£Ñо¿ÈËÔ±Ö¸³ö£¬¸ÃÎÊÌâÊÇÓÉ¡°Exchange Server 2023Äê8ÔÂSU°²×°·¨Ê½Öеĵ±µØ»¯ÎÊÌ⡱µ¼Öµġ£ÔÚ·ÇÓ¢Óï²Ù×÷ϵͳÉϰ²×°Î¢ÈíExchange Server 2019»ò2016Äþ¾²¸üÐÂʱ£¬°²×°·¨Ê½½«Í£Ö¹²¢»Ø¹ö¸ü¸Ä£¬Ê¹Exchange Server·þÎñ´¦ÓÚ½ûÓÃ״̬¡£Îª´Ë£¬Î¢ÈíÌṩÁ˽â¾ö´ëÊ©¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-updates-pulled-after-breaking-non-english-installs/
2¡¢Ñо¿ÈËÔ±·¢ÏÖ´ó¹æÄ£½Ù³ÖÔÆÕÊ»§µÄEvilProxyµöÓã¹¥»÷
ProofpointÔÚ8ÔÂ9ÈÕ³ÆÆä·¢ÏÖÁËÀûÓÃEvilProxy´ó¹æÄ£½Ù³ÖÔÆÕÊ»§µÄµöÓã»î¶¯¡£Ñо¿ÈËԱ͸¶£¬ÔÚ3ÔÂÖÁ6ÔÂÆÚ¼ä£¬Ô¼Äª120000·âµöÓãÓʼþ±»·¢Ë͵½È«ÇòÉϰٸöÄ¿±êÆóÒµ£¬ÒÔÇÔÈ¡Microsoft 365ÕÊ»§¡£Ô¼39%µÄÄ¿±êÊÇC¼¶¸ß¹Ü£¬ÆäÖÐ17%ÊÇÊ×ϯ²ÆÕþ¹Ù£¬9%ÊÇ×ܲúÍÊ×ϯִÐй١£ÕâЩ¹¥»÷ÀûÓÃÁË»ùÓÚ·´ÏòÊðÀí¼Ü¹¹µÄµöÓ㹤¾ßEvilProxy£¬²¢½áºÏʹÓÃÁËÆ·ÅÆÃ°³ä¡¢»úÆ÷È˼ì²âÈÆ¹ýºÍ¿ª·ÅÖØ¶¨ÏòµÈ¼¼Êõ¡£
https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level
3¡¢LockBitÉù³ÆÒª¹ûÈ»ÍßÀï°²Ò½ÁÆÏµÍ³°©Ö¢»¼ÕßµÄÊý¾Ý
¾Ý8ÔÂ9ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÍßÀï°²Ò½ÁÆÏµÍ³(Varian Medical Systems)£¬²¢ÍþвҪ¹ûÈ»»¼ÕßµÄÒ½ÁÆÊý¾Ý¡£¸Ã¹«Ë¾Á¥ÊôÓÚÎ÷ÃÅ×ÓÒ½ÁƼ¯ÍÅ£¬ÊÕÈë´ï30ÒÚÃÀÔª£¬Ö÷Òª¿ª·¢ºÍÏúÊÛÓÃÓÚÖÎÁư©Ö¢µÈ¼²²¡µÄÒ½ÁÆÉ豸ºÍÈí¼þ¡£LockbitÔÚÍøÕ¾ÉÏдµÀ£¬ËùÓÐÊý¾Ý¿âºÍ»¼ÕßÊý¾Ý¶¼Òѱ»Ð¹Â¶²¢×¼±¸ÔÚ²©¿ÍÉÏÐû²¼£¬»¹½«¸¶Êê½ðµÄ½ØÖ¹ÈÕÆÚ¶¨Îª8ÔÂ17ÈÕ¡£¸Ã¹«Ë¾ÉÐδÅû¶´Ë´ÎÄþ¾²Ê¼þ¡£
https://securityaffairs.com/149307/cyber-crime/varian-medical-systems-lockbit-ransomware.html
4¡¢Freeze.rsºÍSYK Crypter±»ÓÃÓÚ·Ö·¢XWormµÈ¶ñÒâÈí¼þ
FortinetÔÚ8ÔÂ9ÈÕÅû¶ÁËÀûÓÃFreeze.rsºÍSYK Crypter·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£Ñо¿ÈËÔ±ÓÚ7ÔÂ13ÈÕ¼ì²âµ½µöÓã¹¥»÷»î¶¯£¬¹¥»÷Á´Ê¼ÓÚ¶ñÒâPDFÎļþ¡£¸ÃÎļþÖØ¶¨Ïòµ½HTMLÎļþ£¬²¢ÀûÓá°search-ms¡±ÐÒé·ÃÎÊÔ¶³Ì·þÎñÆ÷ÉϵÄLNKÎļþ¡£´ò¿ªLNKÎļþºó£¬PowerShell½Å±¾»áÖ´ÐÐFreeze.rsºÍSYK Crypter£¬ÒÔÖ´ÐнøÒ»²½µÄ¹¥»÷¡£×îÖÕ£¬»á¼ÓÔØXWormºÍRemcos£¬²¢ÓëC2·þÎñÆ÷½¨Á¢Í¨ÐÅ¡£
https://www.fortinet.com/blog/threat-research/malware-distributed-via-freezers-and-syk-crypter
5¡¢Trend MicroÏêÊöRhysidaÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄ¹¥»÷
8ÔÂ9ÈÕ£¬Trend Micro¸ÅÊöÁËÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÐÂÐÍRhysidaÀÕË÷Èí¼þµÄ¹¥»÷»î¶¯¡£RhysidaÖ÷ÒªÕë¶ÔÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú»ú¹¹£¬Í¨³£Ê×ÏÈͨ¹ýµöÓã¹¥»÷ÈëÇÖÄ¿±êµÄ¼ÆËã»ú£¬È»ºóʹÓÃCobalt StrikeÔÚϵͳÄÚºáÏòÒÆ¶¯¡£¹¥»÷ÕßÖ´ÐÐPsExecÀ´°²×°PowerShell½Å±¾ºÍRhysida payload¡£PowerShell½Å±¾±»ÓÃÓÚÖÕÖ¹AV½ø³Ì¡¢É¾³ý¾íÓ°¸±±¾²¢ÐÞ¸ÄRDPÅäÖã¬Õâ±íÃ÷¼ÓÃÜ·¨Ê½ÈÔÔÚ»ý¼«¿ª·¢ÖС£´ËÍ⣬ÀÕË÷Èí¼þ½ÓÄÉ4096λRSAÃÜÔ¿ºÍAES-CTRÀ´¼ÓÃÜÎļþ¡£
https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html
6¡¢Check PointÐû²¼2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ³ÂËß
8ÔÂ9ÈÕ£¬Check PointÐû²¼ÁË2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ·ÖÎö³ÂËß¡£7Ô·Ý×îÁ÷ÐеĶñÒâÈí¼þÊÇQbot£¬Ó°ÏìÁËÈ«Çò5%µÄ×éÖ¯£¬Æä´ÎÊÇFormbook£¨4%£©ºÍRemcos£¨2%£©¡£È«ÇòÔâµ½¹¥»÷×î¶àµÄÐÐÒµÊǽÌÓýºÍÑо¿ÐÐÒµ£¬Æä´ÎÊÇÕþ¸®ºÍ¾üÊÂÐÐÒµ£¬È»ºóÊÇÒ½ÁƱ£½¡ÐÐÒµ¡£×î³£±»ÀûÓõÄ©¶´Web·þÎñÆ÷¶ñÒâURLĿ¼±éÀú©¶´£¬Ó°ÏìÁËÈ«Çò49%µÄ×éÖ¯£¬Æä´ÎÊÇApache Log4jÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨45%£©ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨42%£©¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þAnubis£¬È»ºóÊÇSpinOkºÍAhMyth¡£
https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/