Bling LibraÕ½ÂÔת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷

Ðû²¼Ê±¼ä 2024-08-29
1. Bling LibraÕ½ÂÔת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷


8ÔÂ27ÈÕ£¬Unit 42ÍøÂçÇå¾²ÍŶÓÕ¹ÏÖ£¬ÎÛÃûÕÑÖøµÄBling LibraÍþв×éÖ¯ÒÑÏÔÖøת±äÆäÕ½ÂÔ£¬´ÓÒÔÍùͨ¹ýµØÏÂÊг¡ÏúÊÛÇÔÈ¡Êý¾Ý£¬×ª±äΪÕë¶ÔÔÆÇéÐÎʵÑéÀÕË÷¹¥»÷¡£Õâһת±äÓÈΪÁîÈ˵£ÐÄ£¬ÓÉÓÚBling LibraÒÑÀÖ³ÉʹÓÃAWSƾ֤ÈëÇÖ¶à¼ÒÆóÒµµÄÔÆÕË»§£¬ÌØÊâÊÇͨ¹ýAmazon S3×ÊÔ´¡£ËûÃÇÈ«ÐIJ߻®µÄÈëÇÖÐж¯£¬°üÀ¨Ï꾡µÄÊý¾Ý̽Ë÷ºÍÒþ²ØµÄÔ˶¯×·×Ù£¬Ê¹µÃ¹¥»÷³õÆÚÄÑÒÔ±»²ì¾õ¡£Ê¹ÓÃS3ä¯ÀÀÆ÷ºÍWinSCPµÈ¹¤¾ß£¬Bling Libra²»µ«»æÖÆÁËÊܺ¦ÕߵĴ洢Ͱ½á¹¹£¬»¹É¾³ýÁËÒªº¦Êý¾Ý£¬½øÒ»²½¼Ó¾çÁËËðʧ¡£ÓúÉõÕߣ¬ÔÚÍê³ÉÆÆËðºó£¬¸Ã×éÖ¯½¨ÉèÁ˼¥Ð¦ÐÔµÄÐÂS3´æ´¢Í°£¬²¢ÌᳫÀÕË÷Óʼþ£¬ÒªÇóÖ§¸¶Êê½ðÒÔ»Ö¸´Êý¾ÝºÍ×èÖ¹¹¥»÷¡£Unit 42µÄ±¨¸æÉîÈëÆÊÎöÁËÕâЩ¹¤¾ßµÄʹÓ÷½·¨£¬Îª·ÀÓùÕßÌṩÁËʶ±ð¶ñÒâÔ˶¯µÄÏßË÷¡£¼øÓÚÔÆ·þÎñµÄÆÕ¼°£¬±¨¸æÇ¿µ÷×éÖ¯Ó¦½ÓÄÉ×îСÌØȨԭÔòºÍÇ¿»¯Çå¾²²½·¥£¬ÈçʹÓÃIAM»á¼ûÆÊÎöºÍAWS·þÎñ¿ØÖÆÕ½ÂÔ£¬ÒÔÓÐÓõÖÓù´ËÀà¸ß¼¶Íþв¡£


https://securityonline.info/bling-libras-tactical-evolution-exploiting-cloud-misconfigurations-for-extortion/


2. Poortry¹¤¾ß¼¯½ø»¯£º´ÓEDRɱÊÖµ½ÖÜÈ«²Á³ýÕß


8ÔÂ27ÈÕ£¬Sophos X-Ops×îб¨¸æÕ¹ÏÖÁ˶ñÒ⹤¾ß¼¯PoortryµÄ×îÐÂÏ£Íû£¬¸Ã¹¤¾ßÖ¼ÔÚÕë¶ÔWindowsϵͳÉϵĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Èí¼þÌᳫ¹¥»÷¡£×Ô2022Äê±»Mandiant·¢Ã÷ÒÔÀ´£¬Poortryͨ¹ýÆä¼ÓÔسÌÐò¡°Stonestop¡±³ÉΪ¶à¸öÀÕË÷Èí¼þ×éÖ¯µÄÒªº¦¹¤¾ß£¬Ò»Ö±½ø»¯ÒÔÌӱܼì²â¡£×îа汾µÄPoortry²»µ«ÏÞÓÚ½ûÓÃEDRÈí¼þ£¬¸üÄÜ´Ó´ÅÅÌÖг¹µ×ɨ³ýÇå¾²Èí¼þµÄÒªº¦×é¼þ£¬´Ó¶øΪÆä±³ºóµÄÀÕË÷Èí¼þ¹¥»÷ɨÇåõ辶¡£PoortryµÄ½¹µãÕ½ÂÔÊÇʹÓÃWindowsÄÚºËģʽÇý¶¯³ÌÐòµÄÆÕ±éȨÏÞ£¬Í¨¹ýɨ³ý¹Ò¹³ºÍÖÕÖ¹± £»¤Àú³ÌÀ´ÈƹýÇå¾²»úÖÆ¡£Æ俪·¢ÕßʹÓöàÖÖÒªÁìÈƹý´úÂëÊðÃûÑéÖ¤£¬°üÀ¨ÀÄÓÃ鶵ÄÖ¤Ê顢αÔìʱ¼ä´ÁÒÔ¼°ÊµÑéÖ±½Óͨ¹ýMicrosoftµÄWHQL֤ʵÊðÃûÊ¿³Ì»ñÈ¡Õýµ±Ö¤Êé¡£Ö»¹ÜÃæÁÙ΢ÈíºÍSophosµÄÆعâÓë·â¶Â£¬PoortryÒÀȻͨ¹ýÎÞаµ÷½âÕ½ÂÔ¼á³Ö»îÔ¾¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬PoortryÔÚ2024Äê7ÔµÄÒ»´ÎÊÂÎñÖÐÊ×´ÎչʾÁËÆäɾ³ýEDR×é¼þµÄÐÂÄÜÁ¦£¬ÕâÏÔÖøÔöÌíÁË×éÖ¯ÃæÁÙµÄΣº¦¡£


https://securityonline.info/poortry-edr-killer-evolves-now-wipes-security-software-from-windows-systems/


3. Park'N FlyÔâºÚ¿ÍÈëÇÖ£¬°ÙÍò¿Í»§Êý¾Ýй¶


8ÔÂ27ÈÕ£¬Park'N FlyÊǼÓÄôó×ÅÃû»ú³¡ÍâÍ£³µ·þÎñÌṩÉÌ£¬½üÆÚÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬Ô¼100Íò¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»ºÚ¿Í²»·¨»ñÈ¡¡£ÍþвÕßʹÓÃÇÔÈ¡µÄVPNƾ֤£¬ÔÚ7ÔÂÖÐÑ®ÇÖÈ빫˾ÍøÂ磬²¢ÔÚ7ÔÂ11ÈÕÖÁ13ÈÕʱ´úʵÑéÁËδÊÚȨ»á¼û¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§È«Ãû¡¢µç×ÓÓʼþ¡¢×¡Ö·¡¢º½°àºÅ¼°Ãñº½¾ÖºÅÂ룬µ«ÐÒÔ˵ÄÊÇ£¬²ÆÎñºÍÖ§¸¶¿¨ÐÅϢδ±»²¨¼°¡£Park'N FlyѸËÙ½ÓÄÉÐж¯£¬ÎåÌìÄÚ»Ö¸´ÁËÊÜÓ°ÏìµÄϵͳ£¬²¢ÔöÇ¿ÁËÇå¾²²½·¥ÒÔ±ÜÃâδÀ´ÀàËÆÊÂÎñµÄ±¬·¢¡£¹«Ë¾CEO¿¨ÂÞ¡¤ÂíÀ×ÂåÏò¿Í»§¼°ÏàÖúͬ°éÖÂǸ£¬²¢ÔÊÐí½«È«Á¦± £»¤Óû§ÐÅÏ¢¡£ÊÜÓ°ÏìµÄ¿Í»§ÔÚÉ罻ýÌåÉϱí´ïÁ˶ÔÊý¾Ýй¶µÄµ£ÐÄ£¬²¢¶Ô¹«Ë¾Êý¾Ý±£´æÕþ²ßÌá³öÖÊÒÉ¡£Park'N FlyÌáÐÑËùÓÐÊÜÓ°ÏìµÄ¿Í»§¼á³Ö¸ß¶ÈСÐÄ£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/parkn-fly-notifies-1-million-customers-of-data-breach/


4. ʹÓÃAtlassian ConfluenceÎó²îCVE-2023-22527¾ÙÐмÓÃÜЮÖÆ


8ÔÂ28ÈÕ£¬Trend Micro Ñо¿Ö°Ô±Õ¹ÏÖÁËÕë¶Ô Atlassian Confluence Êý¾ÝÖÐÐĺͷþÎñÆ÷°æ±¾µÄÑÏÖØÎó²î£¨CVE-2023-22527£©µÄÆÕ±é¼ÓÃÜЮÖÆÔ˶¯¡£¸ÃÎó²îÓÚ2024Äê1ÔÂ16ÈÕÓÉAtlassian¹ûÕ棬ÆäCVSSÆÀ·ÖΪÂú·Ö10£¬Åú×¢Æ伫¸ßΣº¦ÐÔ¡£¸ÃÎó²îͨ¹ýÄ£°å×¢Èë»úÖÆ£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂ룬¿ØÖÆ·þÎñÆ÷¡£×Ô2024Äê6ÔÂÖÐÑ®Æð£¬Ê¹ÓôËÎó²îµÄ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¼±¾çÔöÌí£¬Ö÷ÒªÓÉÈý¸öÍþвÐÐΪÕßÖ÷µ¼£¬ËûÃǽÓÄɲî±ðÕ½ÂÔ°²ÅÅXMRigÍÚ¿ó»ú£¬µÁÓÃÅÌËã×ÊÔ´ÒÔIJÀû¡£ÆäÖÐÒ»¸öÐÐΪÕßÖ±½ÓʹÓÃELFÎļþ¸ºÔØ°²ÅÅÍÚ¿ó»ú£¬¶øÁíÒ»ÐÐΪÕßÔò½ÓÄÉÖØ´óÊֶΣ¬Í¨¹ýSSH¾ç±¾Éø͸ϵͳ£¬É¨³ý¾ºÕùÍÚ¿óÀú³Ì£¬½ûÓÃÔÆÇå¾²·þÎñ£¬²¢ÍøÂçÃô¸ÐÐÅÏ¢ÒÔÀ©´ó¹¥»÷¹æÄ£¡£ÕâЩÐÐΪÕß»¹Í¨¹ý½¨Éè¶à¸öcron×÷ÒµÀ´Î¬³Ö¶ÔÊÜѬȾ·þÎñÆ÷µÄ¿ØÖÆ£¬È·±£ÍÚ¿óÔ˶¯Ò»Á¬¾ÙÐУ¬²¢Ïû³ýDZÔÚµÄÇå¾²ÕÏ°­¡£ÎªÓ¦¶Ô´ËÍþв£¬ÖÎÀíÔ±Ó¦Á¬Ã¦¸üÐÂConfluenceÖÁ×îа汾£¬²¢Ç¿»¯Çå¾²²½·¥¡£


https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html


5. BlackByte ÀÕË÷Èí¼þй¥ÊÆ£ºÊ¹ÓÃVMware ESXiÎó²îÓëVPN»á¼û


8ÔÂ29ÈÕ£¬BlackByte ÀÕË÷Èí¼þ×éÖ¯Õý½èÖúз¢Ã÷µÄ VMware ESXi Îó²î¼°VPN»á¼û;¾¶£¬¶ÔÈ«ÇòÆóÒµÌᳫÐÂÒ»ÂÖÇ¿ÁÒ¹¥»÷¡£Ë¼¿ÆTalos ÍŶӽÒÆÆÁËÆä¹¥»÷Õ½ÂÔ£¬BlackByte ²»µ«Ê¹ÓÃCVE-2024-37085Îó²îÈƹýÉí·ÝÑéÖ¤£¬»¹Í¨¹ýVPNµÈÔ¶³Ì»áʶȤÖÆÒþÃØÉø͸£¬ÒԵͿɼûÐÔ·½·¨À©´óѬȾ¹æÄ£¡£¸Ã×éÖ¯»¹ÉÆÓÚʹÓÃÇÔÈ¡µÄActive Directoryƾ֤×ÔÎÒÈö²¥£¬¼Ó¾çÁËÆäÆÆËðÁ¦¡£Ö»¹ÜÆä¹ûÕæÊý¾Ýй¶ÍøÕ¾½öչʾ²¿·Ö¹¥»÷°¸Àý£¬µ«Talos Ñо¿ÏÔʾ×Åʵ¼ÊÔ˶¯Ô¶³¬Ô¤ÆÚ¡£ÖÆÔìÒµ¡¢ÔËÊä/²Ö´¢¡¢×¨Òµ·þÎñ¡¢ÐÅÏ¢ÊÖÒÕ¼°¹«¹²ÐÐÕþ³ÉΪÆäÖص㹥»÷Ä¿µÄ¡£ÎªÓ¦¶Ô´ËÍþв£¬×éÖ¯Ðè½ôÆÈÐÞ²¹VMware ESXiµÈϵͳ£¬ÊµÑéMFA£¬ÉóºËVPNÉèÖ㬲¢ÏÞÖÆÒªº¦ÍøÂç»á¼û¡£Í¬Ê±£¬½ûÓûòÏÞÖÆNTLMʹÓ㬰²ÅŸßЧµÄ¶Ëµã¼ì²âºÍÏìӦϵͳ£¬²¢¹¹½¨ÖÜÈ«µÄÇå¾²Õ½ÂÔ£¬ÈÚºÏ×Ô¶¯ÍþвÇ鱨ÓëÊÂÎñÏìÓ¦ÄÜÁ¦£¬ÒÔÖÜÈ«µÖÓùBlackByteµÈÀÕË÷Èí¼þµÄË𺦡£


https://hackread.com/blackbyte-ransomware-vmware-flaw-vpn-based-attacks/


6. ÒÁÀÊAPT33ʹÓÃTickler¶ñÒâÈí¼þ¹¥»÷ÃÀ¹úÕþ¸®ºÍ¹ú·ÀµÈ»ú¹¹


8ÔÂ28ÈÕ£¬ÒÁÀʺڿÍ×éÖ¯APT33£¬ÓÖÃûPeach SandstormºÍRefined Kitten£¬½üÄêÀ´ÆµÈÔ·¢¶¯ÍøÂç¹¥»÷£¬Æä×îÐÂÊÖ¶ÎÉ漰ʹÓÃÐÂÐÍTickler¶ñÒâÈí¼þ£¬ÖصãÕë¶ÔÃÀ¹úºÍ°¢ÁªÇõµÄÕþ¸®¡¢¹ú·À¡¢ÎÀÐÇ¡¢Ê¯Óͼ°×ÔÈ»Æø²¿·ÖµÄ×éÖ¯¡£2024Äê4ÔÂÖÁ7Լ䣬¸Ã×é֯ͨ¹ýMicrosoft Azure»ù´¡ÉèʩʵÑéÏÂÁîÓë¿ØÖÆ£¨C2£©£¬Ê¹ÓÃڲƭÐÔAzure¶©ÔľÙÐÐÇ鱨ÍøÂç¡£´ËÇ°£¬APT33ÒÑÀÖ³ÉʹÓÃÃÜÂëÅçÈ÷¹¥»÷ÇÖÈë¹ú·À¡¢º½Ìì¡¢½ÌÓý¼°Õþ¸®²¿·Ö£¬ÓÈÆäÊÇͨ¹ý½ÌÓýÐÐÒµµÁÓÃÕË»§À´»ñÈ¡Azure×ÊÔ´¡£±ðµÄ£¬APT33ÔÚ2023Ä껹½ÓÄÉÀàËÆÕ½ÂÔ£¬Ê¹ÓÃFalseFontºóÃŶñÒâÈí¼þ¹¥»÷È«Çò¹ú·À³Ð°üÉÌ¡£Î¢Èí¶Ô´ËÀ๥»÷¼á³Ö¸ß¶ÈСÐÄ£¬Ö¸³öAPT33×Ô2023Äê2ÔÂÒÔÀ´£¬ÒѶÔÈ«ÇòÊýǧ¸ö×éÖ¯¾ÙÐÐÁË´ó¹æÄ£ÃÜÂëÅçÈ÷¹¥»÷£¬ÍþвÁìÓò½øÒ»²½À©Õ¹µ½ÖÆÒ©Òµ¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬Î¢ÈíÐû²¼×Ô10ÔÂ15ÈÕÆð£¬ËùÓÐAzureµÇ¼ʵÑé¾ùÐèͨ¹ý¶àÖØÉí·ÝÑéÖ¤£¨MFA£©£¬Ö¼ÔÚÏÔÖøÔöÇ¿ÕË»§Çå¾²ÐÔ¡£


https://www.bleepingcomputer.com/news/security/APT33-Iranian-hacking-group-uses-new-tickler-malware-to-backdoor-us-govt-defense-orgs/