ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-14
1. ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷


9ÔÂ12ÈÕ £¬ÒÁÀ­¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄ¾«Ðijïı¹¥»÷Ä¿±ê¡£¾ÝÍøÂçÄþ¾²¹«Ë¾Check Point·ÖÎö £¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ­¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿ÃÅ £¬ÀûÓÃжñÒâÈí¼þVeatyºÍSpearal £¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉø͸ÍøÂç¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÓò»îÔ¾ £¬Éó¤ÍøÂçµöÓãºÍ¶¨ÖƺóÃŹ¥»÷ £¬´Ë´ÎÒ²²»ÀýÍâ £¬Õ¹Ê¾ÁËÆäÆæÌصÄÃüÁîÓë¿ØÖÆ»úÖÆ £¬°üÂÞ×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¹¥»÷Á´Í¨¹ýÆÛÆ­ÐÔÎļþÆô¶¯ £¬Ö´ÐÐPowerShell»òPyinstaller½Å±¾ £¬É¾³ýºÛ¼£²¢²¿Êð¶ñÒâÈí¼þ¡£SpearalÀûÓÃDNSËíµÀͨÐÅ £¬VeatyÔòͨ¹ýÌض¨ÓÊÏäÏÂÔز¢Ö´ÐÐÃüÁî¡£´ËÍâ £¬»¹·¢ÏÖÓëSSHËíµÀºóÃźÍIIS·þÎñÆ÷ºóÃÅÏà¹ØµÄ»î¶¯ £¬±íÃ÷¹¥»÷ÕßÊֶζàÑùÇÒ¼¼ÊõÏȽø¡£Check PointÇ¿µ÷ £¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÓòÄÚµÄÁ¬ÐøºÍ¼¯ÖÐŬÁ¦ £¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£


https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html


2. TrickMoÒøÐÐľÂíбäÖÖÆع⣺ÔöÇ¿Íþв £¬ÇÔÈ¡Òþ˽


9ÔÂ12ÈÕ £¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½Ò¶ÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ £¬ÕâÒ»±äÖÖ²»½ö¼Ì³Ð²¢Ç¿»¯ÁËÆäÇ°ÉíÕë¶ÔAndroidÉ豸ÒøÐÐƾ֤µÄ´«Í³ÍþвÄÜÁ¦ £¬»¹ÒýÈëÁËÆÁĻ¼ÖÆ¡¢¼üÅ̼Ǽ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§ £¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷·¶Î§ºÍÆÆ»µÁ¦¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô± £¬×Ô2019ÄêÊ״α»·¢ÏÖÒÔÀ´ £¬Á¬Ðø½ø»¯ £¬ÏÖÒѳÉΪ½ðÈÚÆÛÕ©ºÍ¸öÈËÒþ˽Äþ¾²µÄÖØ´óÒþ»¼¡£Ð±äÖÖ²»½öÄÜÀ¹½ØÒ»´ÎÐÔÃÜÂë(OTP)ÈƹýË«ÒòËØÈÏÖ¤(2FA) £¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦ÕßÉ豸ִÐÐÉ豸ÆÛÕ©(ODF) £¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÄþ¾²·À»¤¡£ÓÈΪÑÏÖصÄÊÇ £¬Cleafy·¢ÏָñäÖÖ»¹´ÓÊÜѬȾÉ豸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý £¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ±£»¤µÄÃüÁîÓë¿ØÖÆ(C2)·þÎñÆ÷ÉÏ £¬µ¼ÖÂÊý¾Ýй¶·çÏÕ¼¤Ôö £¬ÈκεÚÈý·½¶¼ÄÜÇáÒ×»ñÈ¡ÕâЩÊý¾Ý¡£±»µÁÊý¾ÝÁè¼Ý 12 GB £¬°üÂÞ¸öÈËÉí·ÝÖ¤¼þ¡¢²ÆÕþÐÅÏ¢ £¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕƬ¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§·þÎñ £¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐÐ £¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ±ÎÐÔºÍΣº¦ÐÔ¡£


https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/


3. ÍøÂçÍþвж¯Ïò£ººÏ·¨Python¿â³É¹¥»÷ÀûÆ÷


9ÔÂ12ÈÕ £¬Äþ¾²Ñо¿ÈËÔ±Mertens½üÆÚÐû²¼ÁËÒ»·Ý³ÂËß £¬½ÒʾÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑϾþÇ÷ÊÆ£ºÍøÂç·¸×ï·Ö×ÓÕýÈÕÒæÇÉÃîµØÀûÓúϷ¨µÄPython¿âÖ´ÐжñÒâ»î¶¯¡£ÕâЩ¿â £¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip £¬Ô­±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯ £¬È´±»·¸×ï·Ö×ÓÀÄÓÃÒÔʵʩ¼üÅ̼Ǽ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°å½Ù³ÖµÈ¶ñÒâÐÐΪ¡£MertensÖ¸³ö £¬PyPi.orgµÈÅÓ´ó¿âÉú̬ϵͳµÄ´æÔÚ £¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£¾¡¹ÜÕâЩ¿â×Ô¼ºÎÞº¦ £¬µ«ËüÃǵÄÇ¿´ó¹¦Ð§±»·Ç·¨·Ö×ÓÀûÓà £¬ÒÔÌӱܼì²â £¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ý鶵ÈÄ¿µÄ¡£ÀýÈç £¬discord¿â±»ÖØаüװΪC2ƽ̨ £¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ýй¶µÄ°ïÐס£¸üÁîÈ˵£ÓǵÄÊÇ £¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏý¼¼Êõ £¬ÈçmarshalºÍpy_compile £¬½øÒ»²½Ä£ºý¶ñÒâ´úÂë £¬Ôö¼ÓÄæÏò¹¤³ÌµÄÄѶÈ¡£ÕâÖÖ¼ÆıʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Äþ¾²·ÖÎöʦ²ì¾õ £¬´Ó¶ø¼Ó¾çÁËÍøÂçÄþ¾²·ÀÓùµÄÅÓ´óÐÔ¡£


https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/


4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ13ÈÕ £¬Î÷ÑÅͼ¸Û×÷Ϊ¼à¹ÜÎ÷ÑÅͼµØÓòº£¸ÛÓë»ú³¡µÄÖØÒªÕþ¸®»ú¹¹ £¬½üÆÚÈ·ÈÏÆäϵͳÔÚ¹ýÈ¥ÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¸Ã¹¥»÷ʼÓÚ8Ô £¬ÆÈʹ¿Ú°¶½ô¼±¸ôÀ벿ÃÅÒªº¦ÏµÍ³ÒÔÍ£Ö¹Ó°Ïì £¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì £¬µ¼Öº½°àÑÓÎó¡£ÈýÖܺó £¬¿Ú°¶¹Ù·½ÕýʽָÈÏRhysidaΪĻºóÔªÐ× £¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨ»î¶¯ÇÖÈÅ £¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÄþ¾²¡£´Ë´Î¹¥»÷ÖÐ £¬RhysidaÍÅ»ïÀÖ³ÉÉø͸¿Ú°¶¼ÆËã»úϵͳ £¬¼ÓÃÜÒªº¦Êý¾Ý £¬µ¼Ö°üÂÞÐÐÀî´¦Öá¢×ÔÖú·þÎñ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸ö·þÎñÖжÏ¡£¾¡¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦ £¬»Ö¸´ÁË´ó²¿ÃÅϵͳ £¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐÖ¤·þÎñµÈÒªº¦¹¦Ð§¡£ÖµµÃ×¢ÒâµÄÊÇ £¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð £¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÄþ¾²¡¢²»Ïò·¸×ïÍ×ЭµÄÁ¢³¡¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£© £¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´ £¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£ £¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³ö¾¯¸æ £¬ÌáÐѸ÷ÐÐÒµ¼ÓÇ¿ÍøÂçÄþ¾²·À»¤ £¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄÇÖº¦¡£


https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/


5. Ivanti CSA¸ßΣ©¶´ÔâÀûÓà £¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹


9ÔÂ13ÈÕ £¬IvantiÈ·ÈÏÆäÔÆ·þÎñÉ豸£¨CSA£©½â¾ö·½°¸ÖдæÔÚ¸ßΣ©¶´CVE-2024-8190 £¬¸Ã©¶´ÒÑÔâ¹¥»÷ÕßÀûÓá£Æð³õ £¬Ivanti³ÂËß³Æδ·¢ÏÖ¿Í»§ÊÜÓ°Ïì £¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¸Ã©¶´ÔÊÐíÔ¶³ÌÈÏÖ¤µÄ¹ÜÀíԱͨ¹ýÃüÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£Ivanti½¨Òé½ÓÄÉÌض¨ÅäÖýµµÍ·çÏÕ £¬²¢¼ì²é¹ÜÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑ顣ͬʱ £¬¹«Ë¾¶Ø´Ù¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾ £¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£´ËÍâ £¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»ÀûÓ鶴Ŀ¼ £¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕÇ°ÐÞ¸´¡£CISAÇ¿µ÷´ËÀ੶´¶ÔÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£IvantiÔÚÈ«ÇòÓµÓй㷺µÄºÏ×÷»ï°éÍøÂç £¬Æä²úÎïºÍ·þÎñ±»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳ¹ÜÀí £¬´Ë´ÎʼþÔÙ´Î͹ÏÔÁ˼°Ê±ÐÞ¸´Äþ¾²Â©¶´µÄÖØÒªÐÔ¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/


6. Trojan Ajina.BankerËÁÅ°ÖÐÑÇ£ºÎ±×°ºÏ·¨Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢


9ÔÂ13ÈÕ £¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁÅ°ÖÐÑǵØÓò £¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°ÖеĶñ¶¾¾«ÁéÃüÃû £¬Í¨¹ýαװ³ÉºÏ·¨Ó¦Ó÷¨Ê½ÈçÒøÐзþÎñºÍÕþ¸®ÃÅ»§ £¬ÀûÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³Ì¼ÆıÓÕµ¼Óû§ÏÂÔز¢ÔËÐжñÒâÎļþ¡£×Ô2023Äê11ÔÂÒÔÀ´ £¬ÒÑ·¢ÏÖÔ¼1,400ÖÖ±äÖÖ £¬Ö÷ҪĿ±êΪÎÚ×ȱð¿Ë˹̹Óû§ £¬µ«¹¥»÷·¶Î§ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó £¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó £¬ÀûÓÃÓû§µÄºÃÆæÐĽøÐÐÁ÷´«¡£Æäµ±µØ»¯Íƹã¼ÆıÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆȸÐ £¬´ÙʹÓû§²»¾­Ë¼¿¼¼´µã»÷Á´½Ó¡£¸Ã¶ñÒâÈí¼þ²»½öÄÜÊÕ¼¯½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇé £¬»¹ÄÜÀ¹½Ø¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Âë £¬Õ¹ÏÖ³ö¸ß¶ÈÊÊÓ¦ÐԺͽø»¯ÄÜÁ¦¡£ÖµµÃ×¢ÒâµÄÊÇ £¬Ajina.Banker½ÓÄÉÁªÃ˼ƻ®Ä£Ê½ÔËÓª £¬ºËÐÄÍŶÓÓëÁªÃËÍøÂçºÏ×÷ £¬Í¨¹ý·ÖÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£Ãæ¶ÔÕâÒ»Íþв £¬×¨¼Ò½¨Òé±£³Ö¾¯Ìè £¬ÖÆÖ¹µã»÷δ¾­ÇëÇóµÄÏûÏ¢ºÍÏÂÔØÁ´½Ó £¬¼á³ÖʹÓùٷ½Ó¦ÓÃÉ̵êÏÂÔØÓ¦Óà £¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£


https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/