РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ

Ðû²¼Ê±¼ä 2024-03-08
1. РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ


3ÔÂ6ÈÕ £¬Ô½ÄϵÄÒ»¼Ò½ðÈÚʵÌåÊÇÏÈǰδ¼Ç¼µÄÃûΪLotus Bane µÄÍþвÐÐΪÕßµÄÄ¿±ê £¬¸ÃÐÐΪÕßÓÚ 2023 Äê 3 ÔÂÊ״α»·¢ÏÖ ¡£Lotus Bane ʹÓõļ¼ÊõÓëOceanLotusµÄ¼¼ÊõÖØµþ £¬OceanLotus ÊÇÒ»¸öÓëÔ½ÄϽáÃ˵ÄÍþв×éÖ¯ £¬Ò²³ÆÎª APT32¡¢Canvas Cyclone£¨ÒÔǰ³ÆÎª Bismuth£©ºÍ Cobalt Kitty ¡£ÕâÔ´ÓÚʹÓà PIPEDANCE µÈ¶ñÒâÈí¼þ½øÐÐÃüÃû¹ÜµÀͨÐÅ ¡£ÖµµÃ×¢ÒâµÄÊÇ £¬ Elastic Security Labs ÓÚ 2023 Äê 2 ÔÂÊ״μǼÁËPIPEDANCE  £¬¸ÃʼþÓë 2022 Äê 12 ÔÂÏÂÑ®Õë¶ÔÒ»¸öδ͸¶ÐÕÃûµÄÔ½ÄÏ×éÖ¯µÄÍøÂç¹¥»÷ÓÐ¹Ø ¡£¹ýÈ¥Ò»Äê £¬ÑÇÌ«µØÓò (APAC)¡¢Å·ÖÞ¡¢À­¶¡ÃÀÖÞ (LATAM) ºÍ±±ÃÀµÄ½ðÈÚ×éÖ¯ÒѳÉΪBlind EagleºÍLazarus GroupµÈ¶à¸ö¸ß¼¶Á¬ÐøÍþв×éÖ¯µÄÄ¿±ê ¡£ÁíÒ»¸öÖøÃûµÄ³öÓÚ¾­¼Ã¶¯»úµÄÍþв×éÖ¯ÊÇ UNC1945 £¬¾ÝÊÓ²ì £¬¸Ã×éÖ¯ÒÔ ATM ½»»»»ú·þÎñÆ÷ΪĿ±ê £¬Ä¿µÄÊÇÓÃÃûΪ CAKETAP µÄ×Ô½ç˵¶ñÒâÈí¼þѬȾËüÃÇ ¡£


https://thehackernews.com/2024/03/new-apt-group-lotus-bane-behind-recent.html


2. RA World ÀÕË÷Èí¼þ¹¥»÷À­¶¡ÃÀÖÞµÄÒ½ÁƱ£½¡ÐÐÒµ


3ÔÂ6ÈÕ £¬ÀÕË÷Èí¼þ×éÖ¯ RA World£¨Ò²³ÆÎª RA Group£©ÌᳫÁËÐÂÒ»²¨»î¶¯ ¡£¸Ã×éÖ¯ÓÚ 2023 Äê 4 ÔÂÌᳫ¶ñÒâÐж¯ £¬ÔÚÆäÈÎÆÚÄÚ¶ÔÖÚ¶à×éÖ¯ÌᳫÁ˹¥»÷ £¬Ö÷ÒªÊÇÃÀ¹ú¡¢µÂ¹ú¡¢Ó¡¶ÈºĮ́ÍåµÄÒ½ÁƱ£½¡ºÍ½ðÈÚÁìÓòµÄ×éÖ¯ ¡£Ñо¿ÈËÔ±·¢ÏÖ £¬RA World µÄ×îй¥»÷Õë¶ÔÀ­¶¡ÃÀÖ޵Ķà¼ÒÒ½ÁÆ»ú¹¹ ¡£ÕâЩ¹¥»÷ÊÇ·Ö½×¶ÎÖ´ÐеÄ £¬ÒÔ×î´óÏ޶ȵØÌá¸ßÀÖ³ÉÐж¯µÄ×ÜÌå»ú»á ¡£³õʼ·ÃÎʽ׶δӺڿÍͨ¹ýÓò¿ØÖÆÆ÷ÉøÍ¸¼ÆËã»úϵͳ¿ªÊ¼ ¡£ÔÚÕâÀï £¬×鼯ı¹¤¾ß (GPO) µÄ±à¼­Æð×ÅÖÁ¹ØÖØÒªµÄ×÷Óà £¬Ê¹·¸×ïÕßÄܹ»ÔÚÊܺ¦ÕßµÄϵͳÖÐÇ¿¼ÓËûÃǵĹæÔò ¡£´ËÍâ £¬¸Ã¶ñÒâÈí¼þ»¹¿ÉÒÔÒÔÌØÊâµÄÄþ¾²Ä£Ê½ÖØÐÂÆô¶¯ÏµÍ³ £¬ÒÔÌӱܷÀ²¡¶¾Èí¼þµÄ¼ì²â ¡£Ëü»¹Ïû³ýÁ˹¥»÷ºóÆä´æÔڵĺۼ£ £¬Ê¹Ñо¿ÈËÔ±µÄ·ÖÎöÊÂÇé±äµÃÔ½·¢ÅÓ´ó ¡£


https://meterpreter.org/ra-world-ransomware-strikes-latin-american-healthcare/


3. ºÚ¿ÍʹÓÃÎäÆ÷»¯ÈÕÀúÑûÇë°²×° MacOS ¶ñÒâÈí¼þ


3ÔÂ6ÈÕ £¬ºÚ¿ÍʹÓÃÎäÆ÷»¯µÄÈÕÀúÑûÇëÀ´ÀûÓõç×ÓÓʼþϵͳÖеÄ©¶´ £¬ÓÕÆ­Óû§µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎ±×°³É»î¶¯¸½¼þµÄ¶ñÒâÈí¼þ ¡£Í¨¹ýÀûÓöÔÈÕÀúÑûÇëµÄÐÅÈÎ £¬ÍþвÐÐΪÕßÔö¼ÓÁËÀֳɽøÐÐÍøÂçµöÓã¹¥»÷ºÍδ¾­ÊÚȨ·ÃÎÊÃô¸ÐÐÅÏ¢µÄ¿ÉÄÜÐÔ ¡£Malwarebytes µÄÍøÂçÄþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖ £¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃÎäÆ÷»¯ÈÕÀúÑûÇëÀ´°²×°macOS ¶ñÒâÈí¼þ ¡£ÍþвÐÐΪÕßͨ¹ý Telegram DM ÁªÏµÄ¿±ê £¬Í¨¹ýÌṩͨ»°»ò»áÒéµÄ»ú»áÀ´ÒýÓÕÄ¿±ê ¡£¸ÐÐËȤµÄÄ¿±ê»áÊÕµ½Ðé¼ÙµÄ»áÒéÑûÇë ¡£µ±Êܺ¦ÕßʵÑé¼ÓÈëʱ £¬Á´½Ó»áʧ°Ü ¡£Õ©Æ­Õß½«´Ë¹é¾ÌÓÚÇøÓò·ÃÎÊÏÞÖÆ £¬²¢½¨ÒéÔËÐнÅÔ­À´ÐÞ¸´Ëü ¡£ 


https://gbhackers.com/malware-weaponized-calendar-invites/


4. ºÚ¿ÍÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷½øÐÐÒþÃØ C2 ͨÐÅ


3ÔÂ6ÈÕ £¬QEMU ÊÇÒ»¸ö¿ªÔ´Æ½Ì¨ £¬ÌṩÄþ¾²ÇÒ˽ÓеÄÐéÄ⻯¿Õ¼ä £¬ÓÃÓÚÔÚ×Ô¼ºµÄ»·¾³ÖÐʵÑé¶ñÒâ´úÂ롢©¶´ÀûÓú͹¥»÷ ¡£Õâ¸öÊܿصIJâÊÔ³¡×î´óÏ޶ȵؽµµÍÁ˱»·¢ÏÖºÍÖ´·¨ÎÊÌâµÄ·çÏÕ ¡£??´ËÍâ £¬QEMU ÔÊÐíºÚ¿Í¿ª·¢¿ÉÒÔÔÚ²îÒìÓ²¼þ¼Ü¹¹ºÍ²Ù×÷ϵͳÉÏÔËÐеĶñÒâÈí¼þ ¡ £¿¨°Í˹»ùʵÑéÊÒµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖ £¬ºÚ¿ÍÕýÔÚÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷À´ÃØÃÜÇÔÈ¡±»µÁÊý¾Ý ¡£¹¥»÷Õßϲ»¶Ê¹ÓÃÕý°æ¹¤¾ßÒÔÖÆÖ¹¼ì²â £¬Í¬Ê±Ò²¼õÉÙ¶ñÒâÈí¼þÖ§³ö ¡£Êý¾Ýй¶¡¢Çý¶¯Æ÷¼ÓÃÜ¡¢Ô¶³ÌÖ´ÐкÍÄÚ´æ×ª´¢ÊÇ¿ÉÐÅÈí¼þÖ§³ÖµÄÒ»Ð©ÍøÂçɨÃè»î¶¯ ¡£Ô¤°²×°µÄ¶ñÒâÈí¼þ»òÄ£·ÂÔ±¹¤µÄ RDP/ VPN·ÃÎʳ䵱ÊÜѬȾϵͳµÄÁ¢×ãµã ¡£ÍøÂçËíµÀºÍ¶Ë¿Úת·¢ÊµÓ÷¨Ê½Ê¹Óû§Äܹ»Èƹý NAT ºÍ·À»ðǽ £¬´Ó¶ø½øÈëÄÚ²¿ÏµÍ³ ¡£ÓÐÐí¶à¹¤¾ß¿ÉÓÃÓÚÔÚϵͳ֮¼ä´´½¨ÍøÂçËíµÀ £¬ÆäÖÐһЩÊÇÖ±½ÓµÄ £¬ÁíһЩÔòʹÓÃÊðÀíÀ´Ñڸǹ¥»÷Õß IP ¡£


https://gbhackers.com/hackers-qemu-data-exfiltration/


5. ¼ÓÄôóµÄ·´Ï´Ç®»ú¹¹ÒòÍøÂç¹¥»÷¶ø¹Ø±Õ


3ÔÂ6ÈÕ £¬¼ÓÄôó½ðÈÚ½»Ò׺ͳÂËß·ÖÎöÖÐÐÄ (FINTRAC) Ðû²¼ £¬×÷ΪԤ·À´ëÊ© £¬Ò»´Î¡°ÍøÂçʼþ¡±ÆÈʹÆä¹«Ë¾ÏµÍ³ÏÂÏß ¡£FINTRAC ÊǼÓÄôóµÄÒ»¸öÕþ¸®»ú¹¹ £¬×÷Ϊ¸Ã¹úµÄ½ðÈÚÇ鱨»ú¹¹ÔË×÷ ¡£Ëü´ÓÊÂÏ´Ç®ÊÓ²ì £¬Ã¿Äê×·×ÙÊý°ÙÍò±Ê¿ÉÒɽ»Ò× £¬²¢Ïò¾¯·½Åû¶ÊýǧÆð·Ç·¨×ʽðÁ÷Ïò ¡£¸Ã»ú¹¹ÔÚÆäÍøÕ¾ÉÏ·¢±íÁËÒ»·Ý¼ò¶ÌµÄÐÂÎÅÉùÃ÷ £¬Ö¸³ö¸ÃÖÐÐĵÄÇ鱨»ò»úÃÜϵͳδ±»·ÃÎÊ £¬Òò´ËÓëÆäºËÐÄÈÎÎñÏà¹ØµÄÃô¸ÐÐÅÏ¢ºÍ²Ù×÷ÄÜÁ¦ÈÔÈ»Äþ¾² ¡£FINTRAC Óë°üÂÞ¼ÓÄôóÍøÂçÄþ¾²ÖÐÐÄÔÚÄÚµÄÁª°îºÏ×÷»ï°éºÏ×÷ £¬»Ö¸´ÔËÓª²¢¼ÓÇ¿·ÀÓù £¬ÒÔ·ÀֹδÀ´·¢Éúʼþ ¡£¸ÃÍøÂçʼþ·¢ÉúÔÚÖÜÄ© £¬½ñºóûÓзÖÏí½øÒ»²½µÄ¸üР¡£BleepingComputer ÉÐδ·¢ÏÖÈκÎÀÕË÷Èí¼þ»òÊý¾ÝÀÕË÷Íþв×éÖ¯¶Ô FINTRAC µÄ¹¥»÷ÂôÁ¦ £¬Òò´ËÍþвÐÐΪÕßÈÔȻδ֪ ¡£×Ô½ñÄêÄê³õÒÔÀ´ £¬¼ÓÄôóÔÚÍøÂçÄþ¾²·½Ãæ¾­ÀúÁ˳äÂúÌôÕ½µÄʱÆÚ £¬·ºÆðÁ˶àÆðÒýÈËעĿµÄÊܺ¦ÕߺÍʼþ ¡£


https://www.bleepingcomputer.com/news/security/canadas-anti-money-laundering-agency-offline-after-cyberattack/


6. »ùÓÚÍøÂçµÄ PLC ¶ñÒâÈí¼þ½«ÖØÐ½ç˵¹¤ÒµÍøÂçÄþ¾²Íþв


3ÔÂ4ÈÕ £¬×ôÖÎÑÇÀí¹¤Ñ§ÔºµÄÑо¿ÈËÔ±Ìá³öÁËÒ»ÖÖ¿ª·¢¿É±à³ÌÂß¼­¿ØÖÆÆ÷ (PLC) ¶ñÒâÈí¼þµÄÐÂÒªÁì £¬¸ÃÒªÁì±»Ö¤Ã÷±Èµ±Ç°¼ÆÄ±¸üÁé»î¡¢¸üÓе¯ÐԺ͸üÓÐÓ°ÏìÁ¦ ¡£¸Ã·½°¸ÔÊÐí¶ñÒâÈí¼þʹÓùÜÀíÃÅ»§ÍøÕ¾¹ûÈ»µÄºÏ·¨ Web Ó¦Ó÷¨Ê½½Ó¿Ú (API) ÃØÃܹ¥»÷µ×²ãµÄÏÖʵÊÀ½ç»úÆ÷ ¡£´ËÀ๥»÷°üÂÞαÔì´«¸ÐÆ÷¶ÁÊý¡¢½ûÓÃÄþ¾²¾¯±¨ÒÔ¼°ÀûÓÃÎïÀíÖ´ÐÐÆ÷ ¡£Ñо¿Ð¡×éµÄÊÓ²ì±íÃ÷ £¬ËûÃÇÌá³öµÄ¹¥»÷½«¶Ôÿ¸öÖ÷ÒªÖÆÔìÉÌÉú²úµÄ PLC Æð×÷Óà ¡£´ËÍâ £¬¸ÃÒªÁì±ÈÏÖÓÐµÄ PLC ¶ñÒâÈí¼þ¼¼Êõ£¨¿ØÖÆÂß¼­ºÍ¹Ì¼þ£©¾ßÓÐÏÔ×ÅÓÅÊÆ £¬ÀýÈçÆ½Ì¨¶ÀÁ¢ÐÔ¡¢Ò×ÓÚ²¿ÊðºÍ¸ü¸ß¼¶´ËÍâ³Ö¾ÃÐÔ ¡£Ñо¿ÈËÔ±»¹±íÃ÷ £¬¹¤Òµ¿ØÖÆ»·¾³ÖÐÍøÂç¼¼ÊõµÄ·ºÆð´øÀ´ÁË IT ÁìÓò»òÏû·ÑÎïÁªÍøÉ豸Öв»´æÔÚµÄÐÂÄþ¾²ÎÊÌâ ¡£ÓëÆÕ±é¿´·¨Ïà·´ £¬¹Ì¼þºÍ¿ØÖÆÂß¼­²¢²»ÊÇ PLC ¼ÆËãµÄΨһ¼¶±ð ¡£ÏÖ´ú PLC ÏÖÔÚ°üÂÞÒ»¸ö¿É±à³ÌǶÈëÊ½ÍøÂç·þÎñÆ÷ £¬ÆäÖÐ×Ô½ç˵¿Í»§¶Ë JavaScript ´úÂëʹÓÃÈÕÒæÇ¿´óµÄ API À´¼àÊӺͿØÖÆÎïÀí¹ý³Ì ¡£ÕâÖÖ»·¾³ÌṩÁËÒ»¸öеġ¢ÁîÈ˾ªÑȵÄÀíÏëÆ½Ì¨À´ÔËÐÐ PLC ¶ñÒâÈí¼þ £¬Õâ¶Ô¹¤Òµ¿ØÖÆÏµÍ³×é³ÉÁËеÄÍþв ¡£


https://industrialcyber.co/industrial-cyber-attacks/georgia-tech-researchers-warn-of-stuxnet-style-web-based-plc-malware-redefining-industrial-cybersecurity-threats/?web_view=true