ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-14
1. ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷


9ÔÂ12ÈÕ £¬ÒÁÀ­¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄÈ«ÐIJ߻®¹¥»÷Ä¿µÄ¡£¾ÝÍøÂçÇå¾²¹«Ë¾Check PointÆÊÎö £¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ­¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿·Ö £¬Ê¹ÓÃжñÒâÈí¼þVeatyºÍSpearal £¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉø͸ÍøÂç¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÇø»îÔ¾ £¬ÉÆÓÚÍøÂç´¹ÂںͶ¨ÖƺóÃŹ¥»÷ £¬´Ë´ÎÒ²²»ÆÆÀý £¬Õ¹Ê¾ÁËÆäÆæÒìµÄÏÂÁîÓë¿ØÖÆ»úÖÆ £¬°üÀ¨×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¹¥»÷Á´Í¨¹ýÓÕÆ­ÐÔÎļþÆô¶¯ £¬Ö´ÐÐPowerShell»òPyinstaller¾ç±¾ £¬É¾³ýºÛ¼£²¢°²ÅŶñÒâÈí¼þ¡£SpearalʹÓÃDNSËíµÀͨѶ £¬VeatyÔòͨ¹ýÌض¨ÓÊÏäÏÂÔز¢Ö´ÐÐÏÂÁî¡£±ðµÄ £¬»¹·¢Ã÷ÓëSSHËíµÀºóÃźÍIIS·þÎñÆ÷ºóÃÅÏà¹ØµÄÔ˶¯ £¬Åú×¢¹¥»÷ÕßÊֶζàÑùÇÒÊÖÒÕÏȽø¡£Check PointÇ¿µ÷ £¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÇøÄÚµÄÒ»Á¬ºÍ¼¯ÖÐÆð¾¢ £¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£


https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html


2. TrickMoÒøÐÐľÂíбäÖÖÆع⣺ÔöÇ¿Íþв £¬ÇÔÈ¡Òþ˽


9ÔÂ12ÈÕ £¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½ÒÆÆÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ £¬ÕâÒ»±äÖÖ²»µ«¼ÌÐø²¢Ç¿»¯ÁËÆäÇ°ÉíÕë¶ÔAndroid×°±¸ÒøÐÐƾ֤µÄ¹Å°åÍþвÄÜÁ¦ £¬»¹ÒýÈëÁËÆÁĻ¼ÖÆ¡¢¼üÅ̼ͼ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§ £¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷¹æÄ£ºÍÆÆËðÁ¦¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô± £¬×Ô2019ÄêÊ״α»·¢Ã÷ÒÔÀ´ £¬Ò»Á¬½ø»¯ £¬ÏÖÒѳÉΪ½ðÈÚڲƭºÍСÎÒ˽¼ÒÒþ˽Çå¾²µÄÖØ´óÒþ»¼¡£Ð±äÖÖ²»µ«ÄÜ×èµ²Ò»´ÎÐÔÃÜÂë(OTP)ÈƹýË«ÒòËØÈÏÖ¤(2FA) £¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦Õß×°±¸Ö´ÐÐ×°±¸Ú²Æ­(ODF) £¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÇå¾²·À»¤¡£ÓÈΪÑÏÖصÄÊÇ £¬Cleafy·¢Ã÷¸Ã±äÖÖ»¹´ÓÊÜѬȾװ±¸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý £¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ±£»¤µÄÏÂÁîÓë¿ØÖÆ(C2)·þÎñÆ÷ÉÏ £¬µ¼ÖÂÊý¾Ýй¶Σº¦¼¤Ôö £¬ÈκεÚÈý·½¶¼ÄÜÈÝÒ×»ñÈ¡ÕâЩÊý¾Ý¡£±»µÁÊý¾ÝÁè¼Ý 12 GB £¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤¼þ¡¢²ÆÎñÐÅÏ¢ £¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕƬ¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§·þÎñ £¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐÐ £¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ²ØÐÔºÍΣº¦ÐÔ¡£


https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/


3. ÍøÂçÍþвж¯Ïò£ºÕýµ±Python¿â³É¹¥»÷ÀûÆ÷


9ÔÂ12ÈÕ £¬Çå¾²Ñо¿Ö°Ô±Mertens½üÆÚÐû²¼ÁËÒ»·Ý±¨¸æ £¬Õ¹ÏÖÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑÏËàÇ÷ÊÆ£ºÍøÂç·¸·¨·Ö×ÓÕýÈÕÒæÇÉÃîµØʹÓÃÕýµ±µÄPython¿âÖ´ÐжñÒâÔ˶¯¡£ÕâЩ¿â £¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip £¬Ô­±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯ £¬È´±»·¸·¨·Ö×ÓÀÄÓÃÒÔʵÑé¼üÅ̼ͼ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°åЮÖƵȶñÒâÐÐΪ¡£MertensÖ¸³ö £¬PyPi.orgµÈÖØ´ó¿âÉú̬ϵͳµÄ±£´æ £¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£Ö»¹ÜÕâЩ¿â×Ô¼ºÎÞº¦ £¬µ«ËüÃǵÄÇ¿Ê¢¹¦Ð§±»²»·¨·Ö×ÓʹÓà £¬ÒÔÌӱܼì²â £¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ý鶵ÈÄ¿µÄ¡£ÀýÈç £¬discord¿â±»ÖØаüװΪC2ƽ̨ £¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ý鶵ÄצÑÀ¡£¸üÁîÈ˵£ÐĵÄÊÇ £¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏýÊÖÒÕ £¬ÈçmarshalºÍpy_compile £¬½øÒ»²½Ä£ºý¶ñÒâ´úÂë £¬ÔöÌíÄæÏò¹¤³ÌµÄÄѶÈ¡£ÕâÖÖÕ½ÂÔʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Çå¾²ÆÊÎöʦ²ì¾õ £¬´Ó¶ø¼Ó¾çÁËÍøÂçÇå¾²·ÀÓùµÄÖØ´óÐÔ¡£


https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/


4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ13ÈÕ £¬Î÷ÑÅͼ¸Û×÷Ϊî¿ÏµÎ÷ÑÅͼµØÇøº£¸ÛÓë»ú³¡µÄÖ÷ÒªÕþ¸®»ú¹¹ £¬½üÆÚÈ·ÈÏÆäϵͳÔÚÒÑÍùÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¸Ã¹¥»÷ʼÓÚ8Ô £¬ÆÈʹ¿Ú°¶½ôÆȸôÀ벿·ÖÒªº¦ÏµÍ³ÒÔ×èÖ¹Ó°Ïì £¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì £¬µ¼Öº½°àÑÓÎó¡£ÈýÖܺó £¬¿Ú°¶¹ÙÆÓֱʽָÈÏRhysidaΪĻºóÔªÐ× £¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨÔ˶¯ÈÅÂÒ £¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÇå¾²¡£´Ë´Î¹¥»÷ÖÐ £¬RhysidaÍÅ»ïÀÖ³ÉÉø͸¿Ú°¶ÅÌËã»úϵͳ £¬¼ÓÃÜÒªº¦Êý¾Ý £¬µ¼Ö°üÀ¨ÐÐÀî´¦Öóͷ£¡¢×ÔÖú·þÎñ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸ö·þÎñÖÐÖ¹¡£Ö»¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦ £¬»Ö¸´Á˴󲿷Öϵͳ £¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐÖ¤·þÎñµÈÒªº¦¹¦Ð§¡£ÖµµÃ×¢ÖصÄÊÇ £¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð £¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÇå¾²¡¢²»Ïò·¸·¨Í×ЭµÄ̬¶È¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£© £¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´ £¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£ £¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³öÖÒÑÔ £¬ÌáÐѸ÷ÐÐÒµÔöÇ¿ÍøÂçÇå¾²·À»¤ £¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄË𺦡£


https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/


5. Ivanti CSA¸ßΣÎó²îÔâʹÓà £¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹


9ÔÂ13ÈÕ £¬IvantiÈ·ÈÏÆäÔÆ·þÎñ×°±¸£¨CSA£©½â¾ö¼Æ»®Öб£´æ¸ßΣÎó²îCVE-2024-8190 £¬¸ÃÎó²îÒÑÔâ¹¥»÷ÕßʹÓá£ÔçÏÈ £¬Ivanti±¨¸æ³Æδ·¢Ã÷¿Í»§ÊÜÓ°Ïì £¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¸ÃÎó²îÔÊÐíÔ¶³ÌÈÏÖ¤µÄÖÎÀíԱͨ¹ýÏÂÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£Ivanti½¨Òé½ÓÄÉÌض¨ÉèÖýµµÍΣº¦ £¬²¢¼ì²éÖÎÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑ顣ͬʱ £¬¹«Ë¾±Þ²ß¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾ £¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£±ðµÄ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ £¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕÇ°ÐÞ¸´¡£CISAÇ¿µ÷´ËÀàÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£IvantiÔÚÈ«ÇòÓµÓÐÆÕ±éµÄÏàÖúͬ°éÍøÂç £¬Æä²úÆ·ºÍ·þÎñ±»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳÖÎÀí £¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁËʵʱÐÞ¸´Çå¾²Îó²îµÄÖ÷ÒªÐÔ¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/


6. Trojan Ajina.BankerËÁÅ°ÖÐÑÇ£ºÎ±×°Õýµ±Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢


9ÔÂ13ÈÕ £¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁÅ°ÖÐÑǵØÇø £¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°Öеĺݶ¾¾«ÁéÃüÃû £¬Í¨¹ýαװ³ÉÕýµ±Ó¦ÓóÌÐòÈçÒøÐзþÎñºÍÕþ¸®ÃÅ»§ £¬Ê¹ÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³ÌÕ½ÂÔÓÕµ¼Óû§ÏÂÔز¢ÔËÐжñÒâÎļþ¡£×Ô2023Äê11ÔÂÒÔÀ´ £¬ÒÑ·¢Ã÷Ô¼1,400ÖÖ±äÖÖ £¬Ö÷ҪĿµÄΪÎÚ×ȱð¿Ë˹̹Óû§ £¬µ«¹¥»÷¹æÄ£ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó £¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó £¬Ê¹ÓÃÓû§µÄºÃÆæÐľÙÐÐÈö²¥¡£ÆäÍâµØ»¯ÍƹãÕ½ÂÔÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆȸÐ £¬´ÙʹÓû§²»¾­Ë¼Ë÷¼´µã»÷Á´½Ó¡£¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÍøÂç½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇé £¬»¹ÄÜ×èµ²¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Âë £¬Õ¹ÏÖ³ö¸ß¶È˳ӦÐԺͽø»¯ÄÜÁ¦¡£ÖµµÃ×¢ÖصÄÊÇ £¬Ajina.Banker½ÓÄÉͬÃËÍýÏëģʽÔËÓª £¬½¹µãÍŶÓÓëͬÃËÍøÂçÏàÖú £¬Í¨Ì«¹ýÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£ÃæÁÙÕâÒ»Íþв £¬×¨¼Ò½¨Òé¼á³ÖСÐÄ £¬×èÖ¹µã»÷δ¾­ÇëÇóµÄÐÂÎźÍÏÂÔØÁ´½Ó £¬¼á³ÖʹÓùٷ½Ó¦ÓÃÊÐËÁÏÂÔØÓ¦Óà £¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£


https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/