EmansrepoÐÅÏ¢ÇÔÈ¡³ÌÐò£ºFortiGuard×·×ÙÆäÖØ´ó¹¥»÷Á´
Ðû²¼Ê±¼ä 2024-09-059ÔÂ3ÈÕ£¬FortiGuardʵÑéÊÒµÄÍøÂçÇ徲ר¼ÒÕýϸÃÜ×·×ÙÒ»ÖÖÃûΪ¡°Emansrepo¡±µÄ»ùÓÚPythonµÄÐÅÏ¢ÇÔÈ¡³ÌÐò£¬¸Ã³ÌÐò×Ô2023Äê11ÔÂÆعâÒÔÀ´£¬Í¨¹ýαװ²É¹º¶©µ¥ºÍ·¢Æ±µÄÍøÂç´¹ÂÚÓʼþÈö²¥£¬¹¹½¨³öÈýÌõÖØ´ó¶à±äµÄ¹¥»÷·¾¶¡£ÕâЩ·¾¶»®·Ö½ÓÄÉAutoIt±àÒëµÄ¿ÉÖ´ÐÐÎļþ¡¢HTAÎļþ¼°BatchShield»ìÏýµÄÅú´¦Öóͷ£Îļþ×÷ΪÔØÌ壬ÿÖÖÊֶξùÖ¼ÔÚÈƹýÇå¾²¼ì²â£¬×îÖÕÖ´ÐжñÒâPython¾ç±¾ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£Emansrepo´Ó×î³õµÄµÇ¼ƾ֤¡¢ÐÅÓÿ¨ÐÅÏ¢ÍøÂ磬ÒÑÉú³¤µ½ÄÜÇÔÈ¡PDFÎĵµ¡¢ä¯ÀÀÆ÷À©Õ¹¡¢¼ÓÃÜÇ®±ÒÇ®°ü¼°ÓÎϷƽ̨Êý¾ÝµÈ¸üÆÕ±é¹æÄ£¡£±ðµÄ£¬ÊµÑéÊÒ»¹×¢Öص½ÓëEmansrepoÔ˶¯ÏàËƵÄRemcos¶ñÒâÈí¼þÈö²¥£¬ÌåÏÖ±³ºó¿ÉÄÜÓÐͳһÍþв×éÖ¯¡£¼øÓÚ¹¥»÷ÕßÊÖÒÕµÄÒ»Ö±Éý¼¶Óë¶àÑù»¯£¬¸÷×éÖ¯Ðè¼á³Ö¸ß¶ÈСÐÄ£¬½ÓÄÉÆð¾¢×Ô¶¯µÄÍøÂçÇå¾²·ÀÓùÕ½ÂÔ£¬ÒÔÓÐÓÃÓ¦¶ÔÈÕÒæÖØ´óµÄÍøÂçÍþвÇéÐΡ£
https://securityonline.info/emansrepo-stealer-a-multi-faceted-threat-evolving-in-complexity/
2. ÐÂÀÕË÷Èí¼þ±äÖÖUndergroundÓëRomCom×éÖ¯¹ØÁª
9ÔÂ3ÈÕ£¬FortiGuard Labs½ÒÆÆÁËÒ»ÖÖÐÂÐÍÀÕË÷Èí¼þ±äÖÖUnderground£¬ËüÓëÎÛÃûÕÑÖøµÄ¶íÂÞ˹ºÚ¿Í×éÖ¯RomCom£¨ÓÖÃûStorm-0978£©Ï¸ÃÜÏà¹Ø¡£Õâ¿î¶ñÒâÈí¼þ×Ô2023Äê7ÔÂÆðËÁÅ°£¬Öص㹥»÷ÐÞ½¨¡¢ÖÆÒ©¡¢ÒøÐм°ÖÆÔìÒµµÈ¶à¸öÒªº¦ÐÐÒµ£¬Í¨¹ý¼ÓÃÜÊܺ¦ÕßWindowsϵͳÉϵÄÎļþÀ´ÀÕË÷Êê½ð¡£RomCom×éÖ¯²»µ«Ê¹ÓÃMicrosoft OfficeºÍWindows HTMLµÄÒÑÖªÎó²î£¨ÈçCVE-2023-36884£©ÈëÇÖ£¬»¹¿ÉÄܽÓÄÉ´¹ÂÚÓʼþºÍ¹ºÖóõʼ»á¼ûȨÏÞµÈͨÀýÊֶΡ£UndergroundÈëÇֺ󣬻áѸËÙ½ûÓÃÇå¾²»úÖÆ£¬É¨³ýÓ°×Ó¸±±¾ºÍÈÕÖ¾¼Í¼£¬ÇÄÎÞÉùÏ¢µØ¼ÓÃÜÎļþ£¬²¢ÁôÏÂÒ»ÕÅÃûΪ¡°!!readme!!!.txt¡±µÄÀÕË÷ÐÅ£¬ÒªÇóÖ§¸¶½âÃÜÓöȣ¬ÆäÆæÒìÖ®´¦ÔÚÓÚ²»¸Ä±äÎļþÀ©Õ¹Ãû£¬ÔöÌíÁËʶ±ðÄѶȡ£¸üÁîÈ˵£ÐĵÄÊÇ£¬¸Ã×éÖ¯ÔËÓªÒ»¸öÊý¾Ýй¶ÍøÕ¾£¬¹ûÕæ¾Ü¾øÖ§¸¶Êê½ðµÄÊܺ¦ÕßÐÅÏ¢£¬½øÒ»²½Ê©Ñ¹¡£ÏÖÔÚ£¬UndergroundµÄ¹¥»÷¹æÄ£ÒÑÀ©Õ¹ÖÁÈ«Çò£¬Êý¾Ýй¶ÍøÕ¾ÒÑÁгö16¸ö¹ú¼ÒµÄÊܺ¦ÕßÃûµ¥£¬º¸ÇÃÀ¡¢·¨¡¢µÂ¡¢Î÷¡¢º«¡¢Ì¨¡¢Ð¼°¼ÓµÈµØ¡£±ðµÄ£¬¸Ã×éÖ¯»¹Ê¹ÓÃTelegramºÍMegaÔÆ´æ´¢·þÎñÀ©´óÆäÓ°ÏìÁ¦£¬Èö²¥ÇÔÈ¡µÄÊý¾Ý¡£
https://securityonline.info/romcom-groups-underground-ransomware-exploits-microsoft-zero-day-flaw/
3. ³¬2.2ÍòÈí¼þ°üÃæÁÙRevival HijackµÄΣº¦
9ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ¡°Revival Hijack¡±µÄÐÂÐ͹©Ó¦Á´¹¥»÷ÊÖÒÕÕýÍþв×ÅPythonÈí¼þ°üË÷Òý£¨PyPI£©µÄÇå¾²£¬¸ÃÊÖÒÕÒѱ»·¢Ã÷²¢±»ÓÃÓÚʵÑéÉø͸ÏÂÓÎ×éÖ¯¡£JFrogÇå¾²¹«Ë¾Ö¸³ö£¬¸ÃÊÖÒÕÄÜЮÖÆÁè¼Ý2.2Íò¸öÏÖÓÐPyPIÈí¼þ°ü£¬Òѵ¼ÖÂÊýÊ®Íò´Î¶ñÒâÏÂÔØ£¬Ó°Ïì¹æÄ£Æձ顣¹¥»÷ÕßʹÓÃPyPIµÄÕþ²ßÎó²î£¬ÔÚÈí¼þ°ü±»ÔËùÓÐÕßɾ³ýºóÖØÐÂ×¢²á²¢ÉÏ´«¶ñÒâ°æ±¾£¬Ê¹ÓÃÓû§¿ÉÄܱ£´æµÄƴд¹ýʧ»òÐÅÍйßÐÔ£¬ÓÕµ¼ÏÂÔØ¡£Óë¹Å°åÓòÃûÇÀ×¢²î±ð£¬Revival HijackרעÓÚÒÑɾ³ýµÄÈí¼þ°ü£¬Ã¿ÔÂÔ¼ÓÐ309¸öÈí¼þ°üÒò´Ë±äµÃųÈõ¡£ÕâЩÈí¼þ°üÒòȱ·¦Î¬»¤¡¢¸üÃû»ò¹¦Ð§ÕûºÏ¶ø±»ÒƳý£¬È´Îª¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£JFrogÊý¾ÝÏÔʾ£¬¹¥»÷ÕßÄÜÇÄÎÞÉùÏ¢µØÌæ»»Èí¼þ°ü£¬ÉõÖÁͨ¹ý¡°pip install -upgrade¡±ÏÂÁÕýµ±Èí¼þ°üÌ滻Ϊ¶ñÒâ°æ±¾£¬¶ø¿ª·¢ÕߺÁÎÞ²ì¾õ¡£ÓÈΪÑÏÖصÄÊÇ£¬Ò»¸öÃûΪJinnisµÄÍþвÐÐΪÕßÒÑÏÖʵʹÓøÃÊÖÒÕ¡£ÆóÒµºÍ¿ª·¢ÕßÐèÔöǿСÐÄ£¬¼ì²éDevOps¹ÜµÀ£¬È·±£²»×°ÖÃÒÑɾ³ýµÄÈí¼þ°ü£¬²¢½ÓÄÉÐëÒª²½·¥±£»¤×ÔÉíÃâÊÜ´ËÀàЮÖÆÊÖÒÕµÄË𺦡£
https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html
4. ÃÉ´óÄÃÖÝÍýÏëÉúÓýлáÔâRansomHubÀÕË÷Èí¼þ¹¥»÷
9ÔÂ4ÈÕ£¬ÃÉ´óÄÃÖÝÍýÏëÉúÓýлá½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÉù³ÆÒÑÇÖÈëÆäϵͳ²¢ÇÔÈ¡93GBÊý¾Ý£¬ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÊý¾Ý¡£¸Ã·ÇÓªÀû×é֯ѸËÙÏìÓ¦£¬½«²¿·ÖÍøÂçÀëÏß²¢Õ÷ÕÙÁª°îÖ´·¨ºÍÐÅÏ¢Ç徲ר¼ÒÐÖúÊÓ²ìÓëÖØÐÞITÇéÐΡ£ÃÀ¹úÍýÏëÉúÓý°ì¹«ÊÒÊ×ϯִÐйÙÂêɯ¡¤¸»ÀÕÈ·ÈÏÁËÕâÒ»¡°ÍøÂçÇå¾²ÊÂÎñ¡±£¬²¢Ð»Ð»ÍŶӵIJ»Ð¸Æð¾¢ÒÔ»Ö¸´ÏµÍ³ºÍÊÓ²ìÊÂÎñ¡£Ö»¹Ü¸»ÀÕδ͸¶ÏêϸÊý¾Ýй¶ÇéÐΣ¬µ«È·ÈÏÒÑÏòÁª°îÖ´·¨²¿·Ö±¨¸æ²¢×·ÇóÖ§³Ö¡£ÖµµÃ×¢ÖصÄÊÇ£¬´Ë´Î¹¥»÷±¬·¢Ç°£¬FBIµÈÒÑÐû²¼¹ØÓÚRansomHub»îÔ¾ÐÔµÄÇå¾²¾¯±¨£¬Ö¸³öÆä×Ô2ÔÂÒÔÀ´Òѵ¼ÖÂÖÁÉÙ210ÃûÊܺ¦Õߣ¬º¸Ç¶à¸öÒªº¦»ù´¡ÉèÊ©ÁìÓò¡£´Ë´ÎÕë¶ÔÌṩÉúÖ³±£½¡·þÎñµÄ·ÇÓªÀû×éÖ¯µÄ¹¥»÷£¬±»ÊÓΪÓÈΪ±°ÁÓµÄÐÐΪ¡£
https://www.theregister.com/2024/09/04/planned_parenthood_cybersecurity_incident/
5. ºÚ¿Í×é͎֯á¶Ô·¨·¢¶¯DDoS¹¥»÷£¬ÒªÇóÊÍ·ÅTelegramÊ×´´ÈË
9ÔÂ4ÈÕ£¬Telegram Ê×ϯִÐйÙÅÁά¶û¡¤¶ÅÂÞ·ò±»²¶ºó£¬Ò»ÏµÁкڿÍ×é֯ѸËÙ¼¯½á£¬ÌᳫÃûΪ #FreeDurov »ò #OpDurov µÄÈ«ÇòÍøÂçÐж¯£¬Ã¬Í·Ö±Ö¸·¨¹ú£¬Í¨¹ýʵÑé´ó¹æÄ£µÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ºÍºÚ¿ÍÊÖÒÕÈëÇÖ£¬¶ÔÁè¼Ý50¸ö·¨¹úÕþ¸®»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢½»Í¨ÊàŦ¡¢½ÌÓý»ú¹¹¼°Ë½ÓªÆóÒµÌᳫÌôÕ½¡£ÕâЩºÚ¿Í×éÖ¯£¬°üÀ¨¶íÂÞ˹ÍøÂç¾üÖØÉú£¨CARR£©¡¢RipperSec¡¢EvilWeb¡¢CyberDragon µÈ£¬´ó¶¼¾ßÓÐÇ׶í»òÇ×ÒÁ˹À¼ÇãÏò£¬ËûÃÇʹÓÃ×ÔÉíÊÖÒÕ×ÊÔ´ºÍ Telegram ƽ̨Æձ鷢¶¯£¬ÒªÇ󷨹úÊͷŶÅÂÞ·ò¡£CARR ×÷Ϊ´Ë´ÎÐж¯µÄÁìÍ·Ñò£¬ÒÀ¸½ÆäÓë¶íÂÞ˹¾üÊÂÇ鱨²¿·ÖµÄÁªÏµ¼°ÖØ´óµÄÉçȺ»ù´¡£¬Õë¶Ô¶à¸ö·¨¹úÖ÷Òª»ú¹¹·¢¶¯¹¥»÷¡£RipperSec µÈ×éÖ¯Ò²²»¸ÊÂäÎ飬½ÓÄÉרҵ¹¤¾ßÈç MegaMedusa ¶Ô·¨¹ú˾·¨ºÍ¾¯·½ÏµÍ³ÊµÑéÇ¿ÁÒ¹¥»÷¡£ºÚ¿ÍÃDz»µ«Í¨¹ý DDoS ¹¥»÷̱»¾Ä¿µÄÍøÕ¾£¬»¹Éù³ÆÈëÇÖ²¢ÇÔÈ¡Á˲¿·ÖÃô¸ÐÊý¾Ý£¬ÔÚ Telegram ÉÏìÅÒ«Õ½¹û¡£Ö»¹ÜÄîÍ·¸÷Ò죬´ÓÖ§³Ö¶ÅÂÞ·òСÎÒ˽¼Òµ½Î¬»¤ Telegram µÄÔËÓªÇå¾²£¬µ«ÅäºÏµÄËßÇóÊÇ´Ùʹ·¨¹úÕþ¸®ÖØÐÂ˼Á¿ÆäÐж¯¡£
https://hackread.com/ddos-attacks-france-telegrams-pavel-durov-arrest/
6. MacroPack¹¤¾ßÔâÀÄÓ㬶à¹ú·¢Ã÷¶ñÒâÎĵµ
9ÔÂ4ÈÕ£¬MacroPackÊÇÒ»¿îÔΪºì¶ÓÑÝÁ·Éè¼ÆµÄ¹¤¾ß£¬½üÆÚ±»²»·¨·Ö×ÓÀÄÓã¬ÓÃÓÚÈö²¥Havoc¡¢Brute RatelºÍPhatomCoreµÈ¶ñÒ⸺ÔØ£¬Ó°Ïì¹æÄ£²¨¼°¶à¸ö¹ú¼ÒºÍµØÇø¡£¸Ã¹¤¾ßÓÉ·¨¹ú¿ª·¢ÕßEmeric Nasi¿ª·¢£¬¾ß±¸·´¶ñÒâÈí¼þÈƹý¡¢´úÂë»ìÏýµÈ¸ß¼¶¹¦Ð§£¬Ê¹µÃ¹¹½¨Òþ²ØµÄ¶ñÒâÎĵµ³ÉΪ¿ÉÄÜ¡£Cisco TalosµÄÑо¿Õ¹ÏÖ£¬ÕâЩ¶ñÒâÎĵµÍ¨¹ýVirusTotalƽ̨Ìá½»µÄÑù±¾ÏÔʾ³ö¸ß¶È¶àÑùÐÔ£¬°üÀ¨²î±ðÓÕ¶ü¡¢ÅÓºéˮƽºÍѬȾÊֶΣ¬Åú×¢MacroPackÒѳÉΪºÚ¿Í¹¥»÷µÄг衣±»²¶»ñµÄ¶ñÒâÑù±¾ÖУ¬¾ùÁôÓÐMacroPack½¨ÉèµÄÌØÕ÷£¬ÈçÂí¶û¿É·òÁ´ÃüÃûµÄº¯ÊýºÍ±äÁ¿¡¢É¾³ý×¢Êͼ°¿Õ¸ñÒÔïÔ̾²Ì¬ÆÊÎö¼ì²âµÈ¡£Êܺ¦ÕßÒ»µ©·¿ªÕâЩαװ³É¼ÓÃܱí¸ñ¡¢¾üÊÂ֪ͨ»ò¾ÍҵȷÈÏÊéµÄOfficeÎĵµ£¬±ã»á´¥·¢VBA´úÂ룬¼ÓÔضñÒâDLL²¢ÅþÁ¬µ½¹¥»÷ÕßµÄC2·þÎñÆ÷¡£²î±ðµØÇøµÄ¹¥»÷°¸Àý¸÷¾ßÌØÉ«£ºÃÀ¹ú°¸ÀýÖУ¬¶ñÒâÎĵµÎ±×°³É¼ÓÃܸüбí¸ñ£¬Ê¹ÓÃmshta.exeÏÂÔØδ֪Ôغɣ»¶íÂÞ˹°¸ÀýÖУ¬ExcelÊÂÇé²¾ÍýÏëÏÂÔØPhantomCoreºóÃÅ£»°Í»ù˹̹°¸ÀýÖУ¬ÔòÒÔ¾üÊÂÏà¹ØÖ÷Ìâαװ£¬Ê¹ÓÃHTTPS DNSºÍÑÇÂíÑ·CloudFrontͨѶ£¬ÉõÖÁǶÈëAdobe Experience Cloud¸ú×Ù´úÂë¡£
https://www.bleepingcomputer.com/news/security/red-team-tool-macropack-abused-in-attacks-to-deploy-brute-ratel/