΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
Ðû²¼Ê±¼ä 2024-10-151. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
10ÔÂ13ÈÕ£¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ£¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐЧ·ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷£¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) »·¾³¡£Kerberoasting ÀûÓà Kerberos Éí·ÝÑéÖ¤ÐÒéÇÔÈ¡ AD ƾ¾Ý£¬Ê¹¹¥»÷ÕßÄܹ»¹ã·º·ÃÎÊÃô¸Ð×ÊÔ´¡£Î¢ÈíÖ¸³ö£¬Ëæ×ÅÍøÂçÍþвµÄ²»Í£Ñݱ䣬Äþ¾²×¨ÒµÈËÔ±±ØÐë½ô¸ú×îÐµĹ¥»÷ý½éºÍ·ÀÓù»úÖÆ¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆƽ⼼ÊõµÄÔËÓã¬Kerberoasting ¹¥»÷µÄÓÐЧÐÔÕýÔÚÌáÉý¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆƽâʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵķþÎñƱ֤£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾ÊÚȨµÄ·ÃÎÊȨÏÞ¡£ÌرðÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬¸üÒ×Êܵ½¹¥»÷¡£Î¢Èí¼Æ»®ÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£Îª¼õÇá Kerberoasting ·çÏÕ£¬Î¢Èí½¨Òé½ÓÄɶàÏî´ëÊ©£¬°üÂÞÀûÓÃ×éÍйܷþÎñÕÊ»§ (gMSA) »òίÍÐÍйܷþÎñÕÊ»§ (dMSA)¡¢Ç¿ÖÆʹÓÃÇ¿ÃÜÂë¡¢ÅäÖ÷þÎñÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄ·þÎñÖ÷ÌåÃû³Æ (SPN)¡£´ËÍ⣬΢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£
https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/
2. Water MakaraÀûÓÃÐÂÌӱܼ¼ÊõÕë¶Ô°ÍÎ÷ÆóÒµ²¿ÊðAstaroth¶ñÒâÈí¼þ
10ÔÂ14ÈÕ£¬Trend MicroÑо¿ÈËÔ±·¢ÏÖ£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÍÅÌåÕë¶Ô°ÍÎ÷ÆóÒµ½øÐеĶñÒâ»î¶¯¼¤Ôö£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌӱܼ¼ÊõÀ´²¿ÊðÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£´Ë´ÎÓã²æʽÍøÂçµöÓã»î¶¯Ö÷ÒªÕë¶ÔÀ¶¡ÃÀÖ޵Ĺ«Ë¾£¬ÓÈÆäÊÇ°ÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹£¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢ÀûÓøöÈËËùµÃË°É걨µÄ½ôÆÈÐÔÓÕÆÓû§ÏÂÔضñÒâÈí¼þ¡£¹¥»÷ÕßÀûÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÃüÁÓëC&C·þÎñÆ÷½¨Á¢Á¬½Ó¡£ZIPÎļþ¸½¼þÖаüÂÞ¶ñÒâµÄLNKÎļþ£¬µ±Óû§Ö´ÐÐʱ£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÃüÁî¡£³ýÁËLNKÎļþ£¬ZIPÎļþ»¹°üÂÞÁíÒ»¸ö¾ßÓлìÏýJavaScriptÃüÁîµÄÎļþ¡£Ôڴ˴λÖУ¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû£¬Èç.pdf¡¢.jpgµÈ£¬ÒÔÁ÷´«¶ñÒâÈí¼þ¡£½âÂëºóµÄJavaScriptÃüÁî½ÒʾÁËÒ»¸ö¶ñÒâURL£¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß£¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£Water MakaraµÄÓã²æʽÍøÂçµöÓã»î¶¯ÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù£¬ÈçÄþ¾²Åàѵ¡¢Ç¿ÃÜÂë¼Æı¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢±£³ÖÄþ¾²½â¾ö·½°¸¸üеȣ¬ÒÔ¼ÓÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£
https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html
3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂçµöÓã¹¥»÷£¬×¨¼ÒÇ×Éí½ÒÃØƾÖ
10ÔÂ14ÈÕ£¬Gmail×÷ΪȫÇò×îÁ÷Ðеĵç×ÓÓʼþ·þÎñ£¬ÓµÓÐÁè¼Ý25ÒÚÓû§£¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖصãÄ¿±ê¡£Î¢ÈíÄþ¾²²úÎïר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½ü¾¯¸æ³Æ£¬Ò»ÖÖÅÓ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂçµöÓã¼Æ»®ÕýÕë¶ÔGmailÓû§£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£Æ¾Ö´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ¿ªÊ¼£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÆÛÕ©ÍøÕ¾£¬ÆóͼÇÔÈ¡µÇ¼ƾ¾Ý¡£½Ó×Å£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬Éù³Æ¼ì²âµ½ÆäÕË»§´æÔÚÒì³£»î¶¯¡£¾¡¹ÜMitrovic¶ÔÀ´µçºÅÂë½øÐÐÁËÔÚÏßËÑË÷£¬²¢È·ÈÏÁËÆäºÏ·¨ÐÔ£¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØÖ·ºó£¬ËûÃôÈñµØ·¢ÏÖµØַαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£´ËÍ⣬Mitrovic»¹Òâʶµ½£¬Æ×ÓµÄÉùÒô¹ýÓÚÍêÃÀ£¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÉú³ÉµÄ¡£ËûÈÏΪ£¬ÕâÊÇÈ«Çò·¶Î§Äڵĺڿͻ£¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£Òò´Ë£¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾£¬ÌáÐѸ÷ÈËÕ©ÆÊÖ¶ÎÈÕÒæÅÓ´óÇÒÁîÈËÐÅ·þ£¬¸öÈËÓ¦±£³Ö¸ß¶È¾¯Ì裬½øÐлù±¾¼ì²é»òÏòÐÅÈεÄÈËÇóÖú£¬ÒÔ·À·¶´ËÀ๥»÷¡£
https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/
4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ
10ÔÂ14ÈÕ£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£Ë¼¿Æ·¢ÑÔÈËÌåÏÖ£¬¹«Ë¾ÒÑÁ˽⵽Ïà¹Ø±¨µÀ£¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæʵÐÔ£¬µ«Ä¿Ç°ÊÓ²ìÈÔÔÚ½øÐÐÖС£´ËÇ°£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ£¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿Æϵͳ£¬²¢ÇÔÈ¡ÁË´óÁ¿¿ª·¢ÈËÔ±Êý¾Ý¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬Ð¹Â¶µÄÊý¾Ý°üÂÞÖÖÖÖÏîÄ¿Ô´´úÂë¡¢Ó²±àÂëƾ֤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿Æ»úÃÜÎĵµµÈ¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£ÖµµÃ×¢ÒâµÄÊÇ£¬6Ô·ÝIntelBrokerÒÑ¿ªÊ¼³öÊÛ»òй¶°üÂÞT-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¾ÝÏûÏ¢ÈËʿ͸¶£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйܷþÎñÌṩÉÌ´¦ÇÔÈ¡µÄ¡£È»¶ø£¬Ä¿Ç°Éв»Çå³þ˼¿Æ´Ë´ÎйÃÜʼþÊÇ·ñÓë´ËÇ°6Ô·ݵÄйÃÜʼþÓйء£
https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/
5. ³¯ÏʺڿÍÀûÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð
10ÔÂ14ÈÕ£¬³¯ÏʺڿÍÕýÀûÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÊ©Î´¾ÊÚȨµÄÏÖ½ðÌáÈ¡¡£FASTCashÏÈÇ°Ö÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬µ«×îз¢ÏÖµÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷·¶Î§¡£×Ô2016ÄêÒÔÀ´£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷£¬ÇÔÈ¡ÊýǧÍòÃÀÔª£¬CISAÓÚ2018ÄêÊ״ξ¯¸æ¸ÃÍþв£¬²¢½«Æä¹é¾ÌÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£2020Ä꣬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬Ò»Äêºó£¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀà¼Æ»®±»ÆðËߣ¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£HaxRob·¢ÏÖµÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal£¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»»»·þÎñÆ÷½ø³ÌÖУ¬À¹½Ø²¢ÀûÓÃISO8583½»Ò×ÐÅÏ¢£¬½«½»Ò׾ܾøÏìÓ¦Ì滻ΪÅú×¼£¬²¢°üÂÞËæ»ú½ð¶î£¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬±íÃ÷Æä¿ÉÌӱܴó¶àÊýÄþ¾²¹¤¾ß¡£´ËÍ⣬HaxRob»¹³ÂËßÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð£¬ÏÔʾºÚ¿ÍÕýÔÚ»ý¼«¸ïÐÂÆ乤¾ß¼¯¡£
https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/
6. Gryphon HealthcareÔâÓöÊý¾Ýй¶£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡
10ÔÂ14ÈÕ£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡·þÎñÌṩÉÌ£¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈ˸öÈËÐÅϢ鶵Äʼþ¡£·Ç·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØÖ·¡¢Éç»á±£ÏÕºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬°üÂÞÕï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ±£ÏÕÐÅÏ¢µÈ¡£GryphonÌåÏַdz£ÖØÊÓÐÅÏ¢Äþ¾²£¬¾¡¹ÜûÓÐÖ¤¾Ý±íÃ÷Êý¾ÝÒѱ»ÀÄÓ㬵«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý±£»¤·þÎñ¡£¾Ý³Æ£¬Õâ393,358Ãû¸öÈ˵ÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥·þÎñµÄ×éÖ¯´æ´¢£¬¿ÉÄÜ°üÂÞÒ½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£GryphonÔÚ·¢ÏÖʼþºóÁ¢¼´½ÓÄÉ´ëÊ©ÔöÇ¿Äþ¾²ÐÔ£¬µ«²¢Î´¾ßÌå˵Ã÷ʼþÐÔÖÊ¡£Î´À´¼¸¸öÔ£¬Ëæ×ÅÂÉʦÃÇÄⶨ¼¯ÌåËßËϼƻ®£¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£
https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/