Bling Libra¼Æıת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷

Ðû²¼Ê±¼ä 2024-08-29
1. Bling Libra¼Æıת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷


8ÔÂ27ÈÕ£¬Unit 42ÍøÂçÄþ¾²ÍŶӽÒʾ£¬ÎÛÃûÕÑÖøµÄBling LibraÍþв×éÖ¯ÒÑÏÔÖøת±äÆä¼Æı£¬´ÓÒÔÍùͨ¹ýµØÏÂÊг¡··ÂôÇÔÈ¡Êý¾Ý£¬×ª±äΪÕë¶ÔÔÆ»·¾³ÊµÊ©ÀÕË÷¹¥»÷¡£ÕâÒ»±ä»¯ÓÈΪÁîÈ˵£ÓÇ£¬ÒòΪBling LibraÒÑÀÖ³ÉÀûÓÃAWSƾ֤ÈëÇÖ¶à¼ÒÆóÒµµÄÔÆÕË»§£¬ÌرðÊÇͨ¹ýAmazon S3×ÊÔ´¡£ËûÃǾ«ÐijïıµÄÈëÇÖÐж¯£¬°üÂÞϸÖµÄÊý¾Ý̽Ë÷ºÍÒþ±ÎµÄ»î¶¯×·×Ù£¬Ê¹µÃ¹¥»÷³õÆÚÄÑÒÔ±»²ì¾õ¡£ÀûÓÃS3ä¯ÀÀÆ÷ºÍWinSCPµÈ¹¤¾ß£¬Bling Libra²»½ö»æÖÆÁËÊܺ¦ÕߵĴ洢Ͱ½á¹¹£¬»¹É¾³ýÁËÒªº¦Êý¾Ý£¬½øÒ»²½¼Ó¾çÁËËðʧ¡£ÓúÉõÕߣ¬ÔÚÍê³ÉÆÆ»µºó£¬¸Ã×éÖ¯´´½¨Á˼¥Ð¦ÐÔµÄÐÂS3´æ´¢Í°£¬²¢ÌᳫÀÕË÷Óʼþ£¬ÒªÇóÖ§¸¶Êê½ðÒÔ»Ö¸´Êý¾ÝºÍÍ£Ö¹¹¥»÷¡£Unit 42µÄ³ÂËßÉîÈë·ÖÎöÁËÕâЩ¹¤¾ßµÄʹÓ÷½Ê½£¬Îª·ÀÓùÕßÌṩÁËʶ±ð¶ñÒâ»î¶¯µÄÏßË÷¡£¼øÓÚÔÆ·þÎñµÄÆÕ¼°£¬³ÂËßÇ¿µ÷×éÖ¯Ó¦½ÓÄÉ×îСÌØȨԭÔòºÍÇ¿»¯Äþ¾²´ëÊ©£¬ÈçÀûÓÃIAM·ÃÎÊ·ÖÎöºÍAWS·þÎñ¿ØÖƼÆı£¬ÒÔÓÐЧµÖÓù´ËÀà¸ß¼¶Íþв¡£


https://securityonline.info/bling-libras-tactical-evolution-exploiting-cloud-misconfigurations-for-extortion/


2. Poortry¹¤¾ß¼¯½ø»¯£º´ÓEDRɱÊÖµ½È«Ãæ²Á³ýÕß


8ÔÂ27ÈÕ£¬Sophos X-Ops×îгÂËß½ÒʾÁ˶ñÒ⹤¾ß¼¯PoortryµÄ×îнøÕ¹£¬¸Ã¹¤¾ßÖ¼ÔÚÕë¶ÔWindowsϵͳÉϵĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Èí¼þÌᳫ¹¥»÷¡£×Ô2022Äê±»Mandiant·¢ÏÖÒÔÀ´£¬Poortryͨ¹ýÆä¼ÓÔØ·¨Ê½¡°Stonestop¡±³ÉΪ¶à¸öÀÕË÷Èí¼þ×éÖ¯µÄÒªº¦¹¤¾ß£¬²»Í£½ø»¯ÒÔÌӱܼì²â¡£×îа汾µÄPoortry²»½öÏÞÓÚ½ûÓÃEDRÈí¼þ£¬¸üÄÜ´Ó´ÅÅÌÖг¹µ×Çå³ýÄþ¾²Èí¼þµÄÒªº¦×é¼þ£¬´Ó¶øΪÆä±³ºóµÄÀÕË÷Èí¼þ¹¥»÷ɨÇåÃÅ·¡£PoortryµÄºËÐļÆıÊÇÀûÓÃWindowsÄÚºËģʽÇý¶¯·¨Ê½µÄ¹ã·ºÈ¨ÏÞ£¬Í¨¹ý½â³ý¹Ò¹³ºÍÖÕÖ¹±£»¤½ø³ÌÀ´ÈƹýÄþ¾²»úÖÆ¡£Æ俪·¢ÕßÀûÓöàÖÖÒªÁìÈƹý´úÂëÇ©ÃûÑéÖ¤£¬°üÂÞÀÄÓÃ鶵ÄÖ¤Ê顢αÔìʱ¼ä´ÁÒÔ¼°ÊµÑéÖ±½Óͨ¹ýMicrosoftµÄWHQLÖ¤Ã÷Ç©ÃûÁ÷³Ì»ñÈ¡ºÏ·¨Ö¤Êé¡£¾¡¹ÜÃæÁÙ΢ÈíºÍSophosµÄÆعâÓë·â¶Â£¬PoortryÒÀȻͨ¹ýÁé»îµ÷Õû¼Æı±£³Ö»îÔ¾¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬PoortryÔÚ2024Äê7ÔµÄÒ»´ÎʼþÖÐÊ×´ÎչʾÁËÆäɾ³ýEDR×é¼þµÄÐÂÄÜÁ¦£¬ÕâÏÔÖøÔö¼ÓÁË×éÖ¯ÃæÁٵķçÏÕ¡£


https://securityonline.info/poortry-edr-killer-evolves-now-wipes-security-software-from-windows-systems/


3. Park'N FlyÔâºÚ¿ÍÈëÇÖ£¬°ÙÍò¿Í»§Êý¾Ýй¶


8ÔÂ27ÈÕ£¬Park'N FlyÊǼÓÄôóÖªÃû»ú³¡ÍâÍ£³µ·þÎñÌṩÉÌ£¬½üÆÚÔâÓöÑÏÖØÊý¾Ýй¶Ê¼þ£¬Ô¼100Íò¿Í»§µÄ¸öÈËÐÅÏ¢±»ºÚ¿Í·Ç·¨»ñÈ¡¡£ÍþвÕßÀûÓÃÇÔÈ¡µÄVPNƾ֤£¬ÔÚ7ÔÂÖÐÑ®ÇÖÈ빫˾ÍøÂ磬²¢ÔÚ7ÔÂ11ÈÕÖÁ13ÈÕÆÚ¼äʵʩÁËδÊÚȨ·ÃÎÊ¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞ¿Í»§È«Ãû¡¢µç×ÓÓʼþ¡¢×¡Ö·¡¢º½°àºÅ¼°Ãñº½¾ÖºÅÂ룬µ«ÐÒÔ˵ÄÊÇ£¬²ÆÕþºÍÖ§¸¶¿¨ÐÅϢδ±»²¨¼°¡£Park'N FlyѸËÙ½ÓÄÉÐж¯£¬ÎåÌìÄÚ»Ö¸´ÁËÊÜÓ°ÏìµÄϵͳ£¬²¢¼ÓÇ¿ÁËÄþ¾²´ëÊ©ÒÔ·ÀֹδÀ´ÀàËÆʼþµÄ·¢Éú¡£¹«Ë¾CEO¿¨ÂÞ¡¤ÂíÀ×ÂåÏò¿Í»§¼°ºÏ×÷»ï°éÖÂǸ£¬²¢ÔÊÐí½«È«Á¦±£»¤Óû§ÐÅÏ¢¡£ÊÜÓ°ÏìµÄ¿Í»§ÔÚÉ罻ýÌåÉϱí´ïÁ˶ÔÊý¾Ýй¶µÄµ£ÓÇ£¬²¢¶Ô¹«Ë¾Êý¾Ý±£ÁôÕþ²ßÌá³öÖÊÒÉ¡£Park'N FlyÌáÐÑËùÓÐÊÜÓ°ÏìµÄ¿Í»§±£³Ö¸ß¶È¾¯Ì裬·À·¶Ç±ÔÚµÄÍøÂçµöÓã¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/parkn-fly-notifies-1-million-customers-of-data-breach/


4. ÀûÓÃAtlassian Confluence©¶´CVE-2023-22527½øÐмÓÃܽٳÖ


8ÔÂ28ÈÕ£¬Trend Micro Ñо¿ÈËÔ±½ÒʾÁËÕë¶Ô Atlassian Confluence Êý¾ÝÖÐÐĺͷþÎñÆ÷°æ±¾µÄÑÏÖØ©¶´£¨CVE-2023-22527£©µÄ¹ã·º¼ÓÃܽٳֻ¡£¸Ã©¶´ÓÚ2024Äê1ÔÂ16ÈÕÓÉAtlassian¹ûÈ»£¬ÆäCVSSÆÀ·ÖΪÂú·Ö10£¬±íÃ÷Æ伫¸ßΣº¦ÐÔ¡£¸Ã©¶´Í¨¹ýÄ£°å×¢Èë»úÖÆ£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂ룬¿ØÖÆ·þÎñÆ÷¡£×Ô2024Äê6ÔÂÖÐÑ®Æð£¬ÀûÓôË©¶´µÄ¼ÓÃÜ»õ±ÒÍÚ¾ò¹¥»÷¼±¾çÔö¼Ó£¬Ö÷ÒªÓÉÈý¸öÍþвÐÐΪÕßÖ÷µ¼£¬ËûÃǽÓÄɲîÒì¼Æı²¿ÊðXMRigÍÚ¿ó»ú£¬µÁÓüÆËã×ÊÔ´ÒÔIJÀû¡£ÆäÖÐÒ»¸öÐÐΪÕßÖ±½ÓÀûÓÃELFÎļþ¸ºÔز¿ÊðÍÚ¿ó»ú£¬¶øÁíÒ»ÐÐΪÕßÔò½ÓÄÉÅÓ´óÊֶΣ¬Í¨¹ýSSH½Å±¾Éø͸ϵͳ£¬Çå³ý¾ºÕùÍÚ¿ó½ø³Ì£¬½ûÓÃÔÆÄþ¾²·þÎñ£¬²¢ÊÕ¼¯Ãô¸ÐÐÅÏ¢ÒÔÀ©´ó¹¥»÷·¶Î§¡£ÕâЩÐÐΪÕß»¹Í¨¹ý´´½¨¶à¸öcron×÷ÒµÀ´Î¬³Ö¶ÔÊÜѬȾ·þÎñÆ÷µÄ¿ØÖÆ£¬È·±£ÍÚ¿ó»î¶¯Á¬Ðø½øÐУ¬²¢Ïû³ýDZÔÚµÄÄþ¾²ÕÏ°­¡£ÎªÓ¦¶Ô´ËÍþв£¬¹ÜÀíÔ±Ó¦Á¢¼´¸üÐÂConfluenceÖÁ×îа汾£¬²¢Ç¿»¯Äþ¾²´ëÊ©¡£


https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html


5. BlackByte ÀÕË÷Èí¼þй¥ÊÆ£ºÀûÓÃVMware ESXi©¶´ÓëVPN·ÃÎÊ


8ÔÂ29ÈÕ£¬BlackByte ÀÕË÷Èí¼þ×éÖ¯Õý½èÖúз¢ÏÖµÄ VMware ESXi ©¶´¼°VPN·ÃÎÊ;¾¶£¬¶ÔÈ«ÇòÆóÒµÌᳫÐÂÒ»ÂÖÃÍÁÒ¹¥»÷¡£Ë¼¿ÆTalos ÍŶӽÒ¶ÁËÆä¹¥»÷¼Æı£¬BlackByte ²»½öÀûÓÃCVE-2024-37085©¶´ÈƹýÉí·ÝÑéÖ¤£¬»¹Í¨¹ýVPNµÈÔ¶³Ì·ÃÎÊ»úÖÆÒþÃØÉø͸£¬ÒԵͿɼûÐÔ·½Ê½À©´óѬȾ·¶Î§¡£¸Ã×éÖ¯»¹Éó¤ÀûÓÃÇÔÈ¡µÄActive Directoryƾ¾Ý×ÔÎÒÁ÷´«£¬¼Ó¾çÁËÆäÆÆ»µÁ¦¡£¾¡¹ÜÆä¹ûÈ»Êý¾Ýй¶ÍøÕ¾½öչʾ²¿ÃŹ¥»÷°¸Àý£¬µ«Talos Ñо¿ÏÔʾÆäʵ¼Ê»î¶¯Ô¶³¬Ô¤ÆÚ¡£ÖÆÔìÒµ¡¢ÔËÊä/²Ö´¢¡¢×¨Òµ·þÎñ¡¢ÐÅÏ¢¼¼Êõ¼°¹«¹²ÐÐÕþ³ÉΪÆäÖص㹥»÷Ä¿±ê¡£ÎªÓ¦¶Ô´ËÍþв£¬×éÖ¯Ðè½ô¼±ÐÞ²¹VMware ESXiµÈϵͳ£¬ÊµÊ©MFA£¬ÉóºËVPNÅäÖ㬲¢ÏÞÖÆÒªº¦ÍøÂç·ÃÎÊ¡£Í¬Ê±£¬½ûÓûòÏÞÖÆNTLMʹÓ㬲¿Êð¸ßЧµÄ¶Ëµã¼ì²âºÍÏìӦϵͳ£¬²¢¹¹½¨È«ÃæµÄÄþ¾²¼Æı£¬ÈÚºÏÖ÷¶¯ÍþвÇ鱨ÓëʼþÏìÓ¦ÄÜÁ¦£¬ÒÔÈ«ÃæµÖÓùBlackByteµÈÀÕË÷Èí¼þµÄÇÖº¦¡£


https://hackread.com/blackbyte-ransomware-vmware-flaw-vpn-based-attacks/


6. ÒÁÀÊAPT33ÀûÓÃTickler¶ñÒâÈí¼þ¹¥»÷ÃÀ¹úÕþ¸®ºÍ¹ú·ÀµÈ»ú¹¹


8ÔÂ28ÈÕ£¬ÒÁÀʺڿÍ×éÖ¯APT33£¬±ðÃûPeach SandstormºÍRefined Kitten£¬½üÄêÀ´Æµ·±·¢¶¯ÍøÂç¹¥»÷£¬Æä×îÐÂÊÖ¶ÎÉ漰ʹÓÃÐÂÐÍTickler¶ñÒâÈí¼þ£¬ÖصãÕë¶ÔÃÀ¹úºÍ°¢ÁªÇõµÄÕþ¸®¡¢¹ú·À¡¢ÎÀÐÇ¡¢Ê¯Óͼ°ÌìÈ»Æø²¿ÃŵÄ×éÖ¯¡£2024Äê4ÔÂÖÁ7Լ䣬¸Ã×é֯ͨ¹ýMicrosoft Azure»ù´¡ÉèʩʵʩÃüÁîÓë¿ØÖÆ£¨C2£©£¬ÀûÓÃÆÛÕ©ÐÔAzure¶©ÔĽøÐÐÇ鱨ÊÕ¼¯¡£´ËÇ°£¬APT33ÒÑÀÖ³ÉÀûÓÃÃÜÂëÅçÈ÷¹¥»÷ÇÖÈë¹ú·À¡¢º½Ìì¡¢½ÌÓý¼°Õþ¸®²¿ÃÅ£¬ÓÈÆäÊÇͨ¹ý½ÌÓýÐÐÒµµÁÓÃÕË»§À´»ñÈ¡Azure×ÊÔ´¡£´ËÍ⣬APT33ÔÚ2023Ä껹½ÓÄÉÀàËƼÆı£¬ÀûÓÃFalseFontºóÃŶñÒâÈí¼þ¹¥»÷È«Çò¹ú·À³Ð°üÉÌ¡£Î¢Èí¶Ô´ËÀ๥»÷±£³Ö¸ß¶È¾¯Ì裬ָ³öAPT33×Ô2023Äê2ÔÂÒÔÀ´£¬ÒѶÔÈ«ÇòÊýǧ¸ö×éÖ¯½øÐÐÁË´ó¹æÄ£ÃÜÂëÅçÈ÷¹¥»÷£¬ÍþвÁìÓò½øÒ»²½À©Õ¹µ½ÖÆÒ©Òµ¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬Î¢ÈíÐû²¼×Ô10ÔÂ15ÈÕÆð£¬ËùÓÐAzureµÇ¼ʵÑé¾ùÐèͨ¹ý¶àÖØÉí·ÝÑéÖ¤£¨MFA£©£¬Ö¼ÔÚÏÔÖøÔöÇ¿ÕË»§Äþ¾²ÐÔ¡£


https://www.bleepingcomputer.com/news/security/APT33-Iranian-hacking-group-uses-new-tickler-malware-to-backdoor-us-govt-defense-orgs/