MOVEit TransfeÖÐÎó²îCVE-2023-34362±»´ó¹æģʹÓÃ

Ðû²¼Ê±¼ä 2023-06-05

1¡¢MOVEit TransfeÖÐÎó²îCVE-2023-34362±»´ó¹æģʹÓÃ


¾ÝýÌå6ÔÂ1ÈÕ±¨µÀ £¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеÄÎó²î£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý¡£ÕâÊÇÒ»¸öSQL×¢ÈëÎó²î £¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Rapid7Ñо¿Ö°Ô±ÔÚ±»Ê¹ÓÃ×°±¸ÉÏ·¢Ã÷ÁËÏàͬµÄÃûΪhuman2.aspµÄwebshell £¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖС£MandiantÌåÏÖ £¬ËûÃǵÄÊý¾ÝÏÔʾ´Ë´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÉí·Ý £¬µ«¾ÝϤÒѾ­ÓÐÐí¶à×éÖ¯Ôâµ½ÈëÇÖ £¬Êý¾Ý±»µÁ¡£Progress SoftwareÒÑÐû²¼Õë¶ÔÍâµØºÍÔƵĻº½â°ì·¨¡£


https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/


2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ5ÈÕ±¨µÀ £¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcaja͸¶ £¬ËüÕýÔÚ´¦Öóͷ£Ó°ÏìÁ˶à¸ö·þÎñ´¦µÄÀÕË÷¹¥»÷¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊÐ £¬ÖÎÀí×ÅÁè¼Ý46ÒÚÃÀÔªµÄÏûºÄ´û¿î¡£PlayÉù³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿·ÖÐÅÏ¢ £¬°üÀ¨Ð¡ÎÒ˽¼ÒÉñÃØÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕÕºÍÌõÔ¼µÈ¡£¸Ã»ú¹¹ÌåÏÖ £¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄÉúÒâ £¬µç×ÓÒøÐС¢×Ô¶¯È¡¿î»úºÍ¸÷·þÎñ´¦Ò²¶¼ÔÚÕý³£ÔË×÷¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÓÚÊÇ·ñ½»Êê½ðµÄѯÎÊ¡£


https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack


3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÁè¼Ý250ÍòÈ˵ÄÐÅϢй¶


ýÌå6ÔÂ1ÈÕ³Æ £¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷ £¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶¡£ÊӲ췢Ã÷ £¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ £¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý £¬Éæ¼°ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉË°ÈËʶÓÖÃûºÍÁÙ´²ÐÅÏ¢µÈ¡£´Ë´ÎÊÂÎñÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕ×îÏÈ×¢²áµÄ³ÉÔ±¡£HPHC½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£ÏÖÔÚÉÐÎÞÀÕË÷ÍÅ»ïÉù³ÆΪ´ËÊÂÈÏÕæ¡£


https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/


4¡¢Ñо¿ÍŶӷ¢Ã÷Camaro DragonʹÓÃкóÃÅTinyNoteµÄ¹¥»÷


Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢Ã÷ÁËCamaro Dragon½üÆÚ¹¥»÷Ô˶¯µÄÏêÇé¡£Ñо¿Ö°Ô±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢·þÎñÆ÷ÉÏ·¢Ã÷ÁËеĻùÓÚGoµÄºóÃÅ £¬ÃûΪTinyNote¡£¸ÃºóÃÅͨ¹ýÓëÍâ½»ÊÂÎñÏà¹ØµÄÃû³Æ¾ÙÐзַ¢ £¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý¡£Ëü»¹¿ÉÈƹýÓ¡¶ÈÄáÎ÷ÑÇÊ¢ÐеÄɱ¶¾Èí¼þSmadAV¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ £¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines¾ÙÐлù±¾µÄ»úеö¾ÙºÍÏÂÁîÖ´ÐС£


https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/


5¡¢KasperskyÅû¶ʹÓÃÁãµã»÷Îó²î¹¥»÷iOSµÄTriangulationÔ˶¯


6ÔÂ1ÈÕ £¬KasperskyÅû¶ÁËʹÓÃÁãµã»÷Îó²î¹¥»÷iOS×°±¸µÄTriangulationÔ˶¯¡£¸ÃÔ˶¯ÖÁÉÙ´Ó2019Äê×îÏÈ £¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessage·þÎñÏòiOS×°±¸·¢Ë͵ÄÐÂÎÅ £¬¸½¼þÖаüÀ¨Îó²îʹÓ᣸ÃÐÂÎÅÔÚûÓÐÈκÎÓû§½»»¥µÄÇéÐÎÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£Ê¹ÓÃÎó²î´ÓC2·þÎñÆ÷ÏÂÔضà¸öºóÐø½×¶Î £¬°üÀ¨ÓÃÓÚÌáȨµÄÆäËüÎó²îÒÔ¼°×îÖÕpayload¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐÐ £¬ËüÖ§³ÖÒ»×éÓÃÓÚÍøÂçϵͳºÍÓû§ÐÅÏ¢µÄÏÂÁî £¬²¢ÇÒ¿ÉÒÔÔËÐдÓC2×÷Ϊ²å¼þÄ £¿éÏÂÔصÄí§Òâ´úÂë¡£´Ë´Î¹¥»÷ÀֳɵØѬȾÁËÔËÐÐiOS 15.7µÄ×°±¸¡£


https://securelist.com/operation-triangulation/109842/


6¡¢Trend MicroÐû²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄÆÊÎö±¨¸æ


5ÔÂ31ÈÕ £¬Trend MicroÐû²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄÆÊÎö±¨¸æ¡£Ñо¿Ö°Ô±¼ì²éÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾ £¬·¢Ã÷RoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÏàËƶȡ£»ùÓÚBinDiffµÄ½ÏÁ¿·¢Ã÷ £¬º¯ÊýµÄÏàËƶÈΪ93.2% £¬»ù±¾¿éµÄÏàËƶÈΪ99.3% £¬¶øÌøתµÄÏàËƶÈΪ98.4%¡£±ðµÄ £¬¶þÕ߶¼Ê¹ÓÃOpenSSLµÄAES¾ÙÐмÓÃÜ £¬²¢Ê¹ÓÃÀàËƵļäЪ¼ÓÃÜÊÖÒÕÀ´¼ÓËÙ¼ÓÃÜÀú³Ì¡£Ñо¿Ö°Ô±ÌåÏÖ £¬BlackSuitҪôÊÇͳһ¿ª·¢Õß¿ª·¢µÄбäÌå £¬ÒªÃ´ÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ £¬»òÕßÊÇRoyalµÄÁ¥Êô»ú¹¹¶Ôԭʼ´úÂë¾ÙÐÐÁËÐ޸ġ£


https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html