ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§
Ðû²¼Ê±¼ä 2024-10-181. ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§
10ÔÂ16ÈÕ£¬ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¹¤¾ßÌᳫ¹¥»÷¡£ËûÃÇͨ¹ýTelegramÁ÷´«¸Ã¶ñÒâÈí¼þ£¬Î±×°³ÉÎÚ¿ËÀ¼ÐÂÕþ¸®Ó¦Ó÷¨Ê½Reserve+µÄ¼¼ÊõÖ§³Ö»úÆ÷ÈË£¬ÓÕÆÓû§ÉÏ´«°üÂÞ¶ñÒâÎļþµÄZIPµµ°¸¡£Ò»µ©Îļþ±»´ò¿ª£¬MeduzaStealer¾Í»áѬȾĿ±êÉ豸£¬ÇÔÈ¡¾ßÓÐÌض¨À©Õ¹ÃûµÄÎĵµ£¬²¢Ëæºó×ÔÎÒɾ³ý¡£Reserve+Ó¦ÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐÒåÎñ·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üиöÈËÊý¾Ý£¬ÓÉÓÚÊÕ¼¯µÄÊý¾ÝÃô¸Ð£¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ä¿±ê¡£½ØÖÁ7Ô£¬ÒÑÓÐÁè¼Ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÓ¦ÓøüÐÂÊý¾Ý¡£ÎÚ¿ËÀ¼¹ú·À²¿ÒѳÂËß·¢ÏÖ¼ÙðµÄReserve+Ó¦Ó÷¨Ê½£¬¿ÉÄÜÖ¼ÔÚÊÕ¼¯¸öÈËÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÐÄÀíÐж¯¡£´ËÇ°£¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÁ÷ÐÐÒƶ¯Ó¦Ó÷¨Ê½ºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÈËÔ±¡£
https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram
2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý£¬¿çƽ̨Á÷´«ÄÑ·À¿Ø
10ÔÂ16ÈÕ£¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±ÔÚTrend MicroµÄ³ÂËßÖнÒʾÁËÒ»¸öÅÓ´óµÄÀÕË÷Èí¼þ²Ù×÷£¬¸Ã²Ù×÷ÀûÓÃÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þÄ£·ÂÁËÎÛÃûÕÑÖøµÄLockBitÀÕË÷Èí¼þ¼Ò×壬µ«Êµ¼ÊÉÏÊÇÒ»¸öÍêÈ«²îÒìµÄʵÌå¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼ÓËÙ£¨S3TA£©¹¦Ð§£¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß¿ØÖƵÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý£¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ÔÚ¹¥»÷½áÊøʱ£¬É豸µÄ±ÚÖ½»áÄð³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ£¬ÒÔÔö¼ÓÊܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³ÌÓïÑÔ±àд£¬¾ßÓпçƽ̨ÌØÐÔ£¬Äܹ»Õë¶ÔWindowsºÍmacOS»·¾³£¬Ê¹ÆäÓÃ;¹ã·ºÇÒÄÑÒÔ¿ØÖÆ¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõķÃÎÊÃÜÔ¿£¬µ«Trend Micro½¨Òé×éÖ¯±£³Ö¾¯Ì裬¸üÐÂÈí¼þ£¬¼ì²éÔ¶³Ì·ÃÎʼÆı£¬²¢¼à¿ØÓë¶ñÒâ»î¶¯Ïà¹ØµÄAWSÕË»§ID£¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔƵÄÍþв¡£
https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/
3. ClickFixбäÖÖ£ºÀûÓÃGoogle MeetÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ
10ÔÂ17ÈÕ£¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³Ì¼Æı£¬×Ô5Ô·ÝÓÉÍøÂçÄþ¾²¹«Ë¾ProofpointÊ״γÂËßÒÔÀ´£¬Æä»î¶¯Óú·¢Æµ·±£¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¸Ã¼Æıͨ¹ýð³ä Google Chrome¡¢Microsoft Word ºÍ OneDrive ´íÎóÏûÏ¢£¬ÓÕÆÓû§¸´ÖƲ¢Ö´ÐÐ PowerShell ´úÂ룬´Ó¶øѬȾϵͳ¡£Êܺ¦ÕßÒò´Ë»áÃæÁÙ¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷£¬Èç DarkGate¡¢Matanbuchus µÈ¡£½üÆÚ£¬SaaS ÍøÂçÄþ¾²ÌṩÉÌ Sekoia Ö¸³ö£¬ClickFix »î¶¯ÒÑ·¢ÉúÏÔÖø±ä»¯£¬°üÂÞʹÓà Google Meet ÓÕ¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂçµöÓãÓʼþµÈ¡£¹¥»÷Õ߻ᷢËÍ¿´ËƺϷ¨µÄ Google Meet ÑûÇëÓʼþ£¬ÓÕʹÊܺ¦Õß·ÃÎÊÐé¼ÙÒ³Ãæ¡£Ò»µ©½øÈ룬Êܺ¦Õß»áÊÕµ½¼¼ÊõÎÊÌâÌáʾ£¬Èôµã»÷¡°ÊµÑéÐÞ¸´¡±£¬Ôò»áÆô¶¯ ClickFix ѬȾ¹ý³Ì£¬µ¼Ö¼ÆËã»ú±»¶ñÒâÈí¼þѬȾ¡£Windows ϵͳÖ÷ÒªÔâÊÜ Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷£¬¶ø macOS »úÆ÷ÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£´ËÍ⣬Sekoia »¹·¢ÏÖÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢ÇþµÀ£¬°üÂÞ Zoom¡¢PDF ÔĶÁÆ÷¡¢Ðé¼ÙÊÓƵÓÎÏ·µÈ¡£
https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/
4. ³¯ÏÊITÆÛÕ©ÍŻNickel Tapestry¡±ÀûÓùÍÓ¶¹ØϵÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð
10ÔÂ17ÈÕ£¬³¯Ïʺã¾ÃÒÔÀ´Ò»Ö±ÅÉDzITרҵÈËÔ±µ½¸»×ã¹ú¼ÒµÄÆóÒµ¾ÍÖ°£¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄÎäÆ÷¼Æ»®Ä±È¡ÊÕÈë¡£ÕâЩÆÛÕ©ÐÔµÄITÊÂÇéÕßʹÓÃÐé¼Ù»ò͵À´µÄÉí·Ý£¬²¢Í¨¹ýÌõ¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´ÑÚ¸ÇÆäÕæʵλÖá£ËûÃÇÖÆֹʹÓÃÊÓƵͨ»°»òÔÚÊÓƵ»áÒéÆÚ¼äÒþ²ØÃ沿£¬ÒÔ·ÀÖ¹±»·¢ÏÖ¡£¾ÝÍøÂçÄþ¾²¹«Ë¾SecureworksµÄÊӲ죬һ¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆΪUNC5267£©µÄ×éÖ¯ÂôÁ¦×éÖ¯ºÍе÷ÕâЩ³¯ÏÊITÊÂÇéÕß¡£ÔÚ¹ÍÓ¶ÕâЩÍⲿ³Ð°üÉ̺ó£¬Ò»¼Ò¹«Ë¾¼¸ºõÁ¢¼´ÔâÓöÁËÊý¾ÝÇÔÈ¡£¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐéÄâ×ÀÃæ»ù´¡ÉèÊ©´«Êäµ½¸öÈËGoogle DriveÔÆ´æ´¢¡£ÔÚ¹ÍÓ¶¹ØϵÖÕÖ¹ºó£¬¸Ã¹«Ë¾¿ªÊ¼ÊÕµ½ÀÕË÷µç×ÓÓʼþ£¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜ»õ±ÒÊê½ðÒÔ»»È¡²»¹ûȻй¶Êý¾Ý¡£Secureworks»¹·¢ÏÖ£¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬ÊðÀíºÍAnyDeskµÈ¹¤¾ß¡£Ñо¿ÈËÔ±¾¯¸æ£¬³¯ÏʵÄITÊÂÇéÕß¾³£Ï໥е÷£¬ÌṩÍƼö£¬Òò´Ë×éÖ¯ÔÚÕÐƸԶ³ÌÊÂÇéÕßʱӦ±£³Ö¾¯Ì裬²¢ÁôÒâÆÛÕ©¼£Ïó¡£
https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/
5. BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ½¡¿µÒ½Éú²¢ÇÔÈ¡Êý¾Ý
10ÔÂ17ÈÕ£¬BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô²¨Ê¿¶Ù¶ùͯ½¡¿µÒ½Éú£¨BCHP£©·¢¶¯ÁËÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂ磬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öËùÔÚÌṩҽÁÆ·þÎñ¡£9ÔÂ6ÈÕ£¬BCHPµÄIT¹©Ó¦ÉÌÔâÊÜÁËÍøÂç¹¥»÷£¬¼¸Ììºó£¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾ÊÚȨµÄ»î¶¯£¬²¢Á¢¼´Æô¶¯ÁËʼþÏìÓ¦ÐÒ飬°üÂ޹رÕϵͳ×÷Ϊ±£»¤´ëÊ©¡£¾ÊÓ²ìÈ·ÈÏ£¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾ÊÚȨµÄ·ÃÎÊ£¬²¢ÇÔÈ¡ÁË°üÂÞÈ«Ãû¡¢Éç»á±£ÕϺÅÂë¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƼǼ±àºÅ¡¢½¡¿µ±£ÏÕÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÖÎÁÆÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ï죬ÒòΪËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£È·ÈÏÊܵ½Ó°ÏìµÄ¸öÈ˽«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ£¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓüà¿ØºÍ±£»¤·þÎñ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû²¼¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢Éù³ÆÓµÓвÆÕþºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨÐÅ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢£¬µ«ÉÐδй¶ÈκÎÄÚÈÝ£¬Ò²Î´Åû¶×îºóÆÚÏÞ£¬±íÃ÷ËûÃÇÈÔÏ£ÍûÓëBCHP½øÐÐ̸ÅС£
https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/
6. SideWinder APT×éÖ¯À©´ó¹¥»÷·¶Î§£¬½ÓÄÉÐÂÐÍÅӴ󹤾߰ü
10ÔÂ17ÈÕ£¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶ÈÓйØÁªµÄ¸ß¼¶Á¬ÐøÐÔÍþв£¨APT£©ÐÐΪÕߣ¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸öÖªÃûʵÌåºÍÕ½ÂÔ»ù´¡ÉèÊ©·¢¶¯Á˹¥»÷¡£¸Ã×éÖ¯Ò²±»³ÆΪAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£¾¡¹ÜÆäʹÓùûÈ»µÄ©¶´ÀûÓ÷¨Ê½ºÍ¶ñÒâÎļþ×÷ΪѬȾý½é£¬¿´ËƼ¼Êõˮƽ½ÏµÍ£¬µ«×Ðϸ·ÖÎöÆäÐж¯Ï¸½Úºó£¬·¢ÏÖÆäÕæʵÄÜÁ¦²»ÈÝСêï¡£¹¥»÷Ä¿±ê°üÂÞÃϼÓÀ¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¼ÒµÄÕþ¸®ºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£×î½ü£¬SideWinderʹÓöà½×¶ÎѬȾÁ´Í¨±¨ÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü£¬Í¨¹ýÓã²æʽÍøÂçµöÓãµç×ÓÓʼþ¿ªÊ¼£¬Ö´ÐÐһϵÁÐÏÂÔØ·¨Ê½£¬×îÖÕ²¿Êð¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÄܹ»ÊÕ¼¯ÏµÍ³ÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬²¢Í¨¹ýºóÃżÓÔØÄ£¿éÖ²ÈëStealerBot£¬ÓÃÓÚ¼äµý»î¶¯£¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Ç¼»÷¼üµÈ¡£´ËÍ⣬SideWinderµÄµØÀíÁýÕÖ·¶Î§²»Í£À©´ó£¬Ê¹ÓÃÁËеÄÅӴ󹤾߰ü£¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36½¨Á¢ÁªÏµ¡£
https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html