Marko PoloºÚ¿Í×éÖ¯£ºÈ«ÇòÊýÍò×°±¸Ôâ´ó¹æÄ£ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2024-09-209ÔÂ19ÈÕ£¬Recorded Future ¼°Æä×Ó¹«Ë¾ Insikt Group Õ¹ÏÖÁËÓɺڿÍ×éÖ¯ Marko Polo ²ß»®µÄ´ó¹æÄ£ÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÒÔ¼ÓÃÜÇ®±ÒڲƺÍÔÚÏßÓÎÏ·Õ©ÆÖøÃû£¬ÆäÔ˶¯²¨¼°È«ÇòÊýÍò×°±¸¡£Marko Polo ¾«×¼Ëø¶¨×ÅÃûÓÎÏ·Íæ¼Ò¡¢¼ÓÃÜÇ®±ÒÓ°ÏìÕß¼° IT רҵÈËÊ¿£¬Ê¹ÓÃÉ罻ýÌåαװÕÐƸְԱ£¬ÓÕÆÊܺ¦ÕßÏÂÔضñÒâÈí¼þ¡£¸ÃÍŻﱻÓ÷Ϊ¿î×ÓÇý¶¯µÄ¡°··¶¾ÍŻ£¬³ÉÔ±ºá¿ç¶íÂÞ˹¡¢ÎÚ¿ËÀ¼¼°Ó¢Óï¹ú¼Ò£¬Ïòµ¼²ãÒÉËÆλÓÚºóËÕÁªµØÇø¡£ÆäÊÖ·¨¶àÑù£¬²»µ«ÈëÇÖ Zoom ÊÓƵ¾Û»áÈí¼þ°æ±¾£¬»¹Éø͸ÉÌÒµÈí¼þ¡¢BitTorrent Îļþ·Ö·¢ÏµÍ³£¬Î±×°³ÉÖÖÖÖÈÈÃÅÓ¦ÓúÍÓÎÏ·£¬Èç PartyWorld Ä£Äâ Fortnite£¬ÊµÔòÏÂÔØÐÅÏ¢ÇÔÈ¡³ÌÐò¡£Nortex Ô˶¯Ôòͨ¹ý¼Ù Web3 ÏîÄ¿ SendingMe Èö²¥Ä¾Âí¡£Marko Polo ¹¥»÷ÒÑÖ´ó×ÚСÎÒ˽¼ÒÓ빫˾Êý¾Ýй¶£¬²»·¨×¬Ç®Êý°ÙÍòÃÀÔª£¬Êܺ¦ÕßÉõÖÁʧȥËùÓлýÖü¡£¸Ã×éÖ¯ÎÞа¶à±ä£¬ÆµÈÔµ÷½âÕ½ÂÔÒÔ¹æ±Ü¼ì²â£¬Ò»Á¬ÍþвÍøÂçÇå¾²£¬²¢Ô¤Ê¾Æ佫һֱÉý¼¶ÊÖ·¨ÒÔÓâÔ½ÏÖÓзÀ»¤ÏµÍ³¡£
https://securityonline.info/unmasking-marko-polo-the-infostealer-gang-targeting-thousands/
2. CISAÖÒÑÔApache HugeGraph-ServerÎó²îÔâÆð¾¢Ê¹ÓÃ
9ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©¾Ö£¨CISA£©½ôÆȸüÐÂÁËÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬ÆäÖÐ×îΪÑÏÖصÄÊÇApache HugeGraph-ServerµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2024-27348£©£¬ÆäCVSS v3.1ÆÀ·Ö¸ß´ï9.8£¬Åú×¢ÆäDZÔÚΣº¦¼«´ó¡£´ËÎó²îÔ´ÓÚ²»µ±µÄ»á¼û¿ØÖÆ£¬Ó°ÏìApache HugeGraph-Server 1.0.0ÖÁ1.2.x°æ±¾£¬µ«1.3.0°æ±¾ÒÑÐû²¼ÐÞ¸´¡£Apache¹Ù·½ÓÚ4ÔÂ22ÈÕÐû²¼ÁË1.3.0°æ±¾ÒÔÓ¦¶Ô´ËÇå¾²Íþв£¬²¢½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬Í¬Ê±ÆôÓÃJava 11ºÍAuthϵͳÒÔÔöÇ¿Çå¾²ÐÔ¡£±ðµÄ£¬Îª½øÒ»²½ÌáÉýRESTful-APIµÄÇå¾²ÐÔ£¬ÆôÓá°°×Ãûµ¥IP/¶Ë¿Ú¡±¹¦Ð§Ò²±»ÊÓΪÖ÷Òª²½·¥Ö®Ò»£¬ÒÔ×è¶ÏDZÔڵĹ¥»÷·¾¶¡£¼øÓÚCVE-2024-27348ÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Óã¬CISAÏòÁª°î»ú¹¹¼°Òªº¦»ù´¡ÉèÊ©×éÖ¯·¢³öÖÒÑÔ£¬ÒªÇóÕâЩ×éÖ¯Îñ±ØÔÚ2024Äê10ÔÂ9ÈÕÇ°½ÓÄÉÐëÒªµÄ»º½â²½·¥»ò×èֹʹÓÃÊÜÓ°ÏìµÄHugeGraph-Server°æ±¾¡£Apache HugeGraph-Server×÷Ϊ¿ªÔ´Í¼ÐÎÊý¾Ý¿âµÄ½¹µã×é¼þ£¬ÆÕ±éÓ¦ÓÃÓÚµçÐÅ¡¢½ðÈÚ·þÎñºÍÉç½»ÍøÂçµÈÁìÓò£¬Ñ¸ËÙÓ¦ÓÃÇå¾²¸üкͽÓÄÉ»º½â²½·¥¹ØÓÚ±£»¤Óû§Êý¾ÝºÍϵͳÇå¾²ÖÁ¹ØÖ÷Òª¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-actively-exploited-apache-hugegraph-server-bug/
3. Vice SocietyʹÓÃÀÕË÷Èí¼þ¹¥»÷ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµ
9ÔÂ20ÈÕ£¬IncÀÕË÷Èí¼þ½üÆÚÔÚÃÀ¹úÒ½ÁƱ£½¡ÁìÓòÐËÆ𣬳ÉΪеÄÍþв½¹µã¡£Î¢ÈíÍþвÇ鱨ÖÐÐÄ(MSTIC)Õ¹ÏÖ£¬×Ô2022Äê7ÔÂÒÔÀ´Ò»Ö±»îÔ¾µÄVice Society£¨»ò³ÆVanilla Tempest£©×éÖ¯£¬ÏÖ½ÓÄÉIncÀÕË÷Èí¼þ×÷ΪÆä¹¥»÷ÎäÆ÷Ö®Ò»£¬À©´óÁËÆäË«ÖØÀÕË÷Õ½ÂԵĹæÄ£¡£¸Ã×é֯ʹÓöàÖÖÀÕË÷Èí¼þ¼Ò×壬°üÀ¨Inc¡¢BlackCatµÈ£¬Õë¶Ô°üÀ¨Ò½ÁƱ£½¡ÔÚÄڵĶà¸öÐÐÒµ¾ÙÐй¥»÷¡£Vice Societyͨ¹ýѬȾGootloaderºóÃųÌÐòµÈÆðÔ´ÊֶλñµÃ»á¼ûȨÏÞ£¬ËæºóʹÓÃSupperºóÃÅ¡¢AnyDeskÔ¶³ÌÖÎÀí¹¤¾ß¼°MEGAÊý¾Ýͬ²½¹¤¾ßµÈÕýµ±ÉÌÒµ²úÆ·¾ÙÐкáÏòÒƶ¯£¬×îÖÕͶ·ÅIncÀÕË÷Èí¼þ¡£¸Ã×é֯ȫÐIJ߻®µÄ̸ÅÐÕ½ÂԺͽṹ»¯µÄ²Ù×÷·½·¨£¬Ê¹µÃÆäÀÕË÷Ô˶¯¸üΪרҵºÍÄÑÒÔÓ¦¶Ô¡£Òò´Ë£¬ÔöÇ¿Ò½ÁƱ£½¡×éÖ¯µÄÇå¾²·ÀÓù£¬ÊµÊ±Ó¦ÓÃÇå¾²¸üлººÍ½â²½·¥£¬¹ØÓÚÌá·À´ËÀàÀÕË÷Èí¼þ¹¥»÷ÖÁ¹ØÖ÷Òª¡£
https://www.darkreading.com/threat-intelligence/vice-society-inc-ransomware-healthcare-attack
4. ´÷¶û10,863·ÝÔ±¹¤¼Í¼ÔâºÚ¿Íй¶
9ÔÂ19ÈÕ£¬ºÚ¿Í¡°grep¡±ÔÚºÚ¿ÍÂÛ̳Breach ForumsÉÏÉù³Æ£¬¿Æ¼¼¾ÞÍ·´÷¶ûÔâÓöÁË¡°ÉÔ΢¡±Êý¾Ýй¶£¬Éæ¼°10,863·ÝÔ±¹¤¼Í¼¡£´Ë´Î鶵ÄÊý¾Ý°üÀ¨Ô±¹¤µÄÈ«Ãû¡¢ID¡¢»îԾ״̬¡¢DNO¼°ÄÚ²¿IDµÈÃô¸ÐÐÅÏ¢£¬Ö»¹Üδ°üÀ¨Ã÷ÎÄÃÜÂë»òСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬µ«ÈÔ¶Ô´÷¶û×é³ÉÖØ´óÇå¾²Íþв¡£´÷¶û´Ë´ÎÊÂÎñ²¢·Ç¹ÂÀý£¬½ñÄêÔçЩʱ¼äÒ²ÔøÆسöÁíÒ»ÆðÉæ¼°4900ÍòÌõ¿Í»§¼Í¼µÄÊý¾Ýй¶¡£ÕâÔÙ´Î͹ÏÔÁË´óÐͿƼ¼¹«Ë¾ÃæÁÙµÄÒ»Á¬ÍøÂçÇå¾²ÌôÕ½¡£Ö»¹Ü´÷¶ûÉÐδÕýʽȷÈÏ´Ë´ÎÔ±¹¤¼Í¼й¶ÊÂÎñ£¬µ«Ç徲ר¼ÒÖÒÑԳƣ¬Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓڲ߻®¸üÓÐÕë¶ÔÐÔµÄÍøÂç¹¥»÷¡£×éÖ¯ÐèÔöÇ¿Çå¾²²½·¥£¬°üÀ¨½ÓÄÉÏȽøµÄÍþв¼ì²âϵͳºÍ°´ÆÚ¾ÙÐÐÇå¾²Éó¼Æ£¬ÒÔ±£»¤Ãô¸ÐÊý¾ÝºÍÔ±¹¤ÐÅÏ¢¡£Í¬Ê±£¬ÊµÊ±ÏìÓ¦ÊÂÎñ²¢ÓëÊÜÓ°ÏìÖ°Ô±¼á³Ö͸Ã÷Ïàͬ£¬¹ØÓÚ¼õÇáDZÔÚËðº¦ÖÁ¹ØÖ÷Òª¡£ÕâһϵÁÐÊÂÎñÇ¿µ÷ÁËÍøÂçÇå¾²·À»¤µÄÆÈÇÐÐÔºÍÖØ´óÐÔ¡£
https://hackread.com/hacker-dell-data-breach-employee-details-leak/
5. FOUNDATION»á¼ÆÈí¼þÔâÉø͸¹¥»÷£¬ÐÞ½¨ÐÐÒµÃæÁÙÐÂÍþв
9ÔÂ19ÈÕ£¬Huntress ÍøÂçÇå¾²¹«Ë¾×îнÒÆÆ£¬ÐÞ½¨ÐÐÒµÕýÃæÁÙÀ´×ÔÍþвÐÐΪÕßµÄÐÂÒ»²¨¹¥»÷£¬ÕâЩ¹¥»÷Õßͨ¹ýÉø͸ FOUNDATION »á¼ÆÈí¼þʵÑé¡£¹¥»÷ÕßʹÓÃÈí¼þµÄĬÈÏƾ֤£¬Í¨¹ý´ó¹æÄ£±©Á¦ÆƽâÊÖ¶ÎÈÝÒ×»ñÈ¡»á¼ûȨÏÞ¡£ÊÜÓ°ÏìµÄ×ÓÐÐÒµÆձ飬°üÀ¨¹ÜµÀ¡¢Å¯Í¨¿Õµ÷¡¢»ìÄýÍÁµÈÒªº¦ÁìÓò¡£FOUNDATION Èí¼þÒÀÀµ Microsoft SQL ·þÎñÆ÷£¬²¢¿ÉÄÜ¿ª·Å TCP ¶Ë¿Ú 4243 ÒÔÖ§³ÖÒƶ¯Ó¦ÓÃÖ±½Ó»á¼ûÊý¾Ý¿â£¬ÕâΪ¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£ÓÈΪÑÏÖصÄÊÇ£¬¸ÃÈí¼þÄÚÖõġ°sa¡±ºÍ¡°dba¡±¸ßȨÏÞÕË»§³£±£´æĬÈÏÃÜÂ룬ʹµÃ¹¥»÷ÕßÄÜÈÝÒ×ʹÓà xp_cmdshell À©Õ¹´æ´¢Àú³ÌÖ´ÐÐí§Òâ²Ù×÷ϵͳÏÂÁ´Ó¶øÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄϵͳ¡£×Ô2024Äê9ÔÂ14ÈÕÊ״η¢Ã÷ÒÔÀ´£¬Huntress ¼à²âµ½¶Ô MS SQL ·þÎñÆ÷µÄ±©Á¦µÇ¼ʵÑé¸ß´ï35,000´Î£¬ÀÖ³É̻¶ÁËÆä±£»¤µÄ500̨ÔËÐÐ FOUNDATION Èí¼þÖ÷»úÖеÄ33̨¡£ÎªÓ¦¶Ô´ËÍþв£¬Huntress ½¨ÒéÁ¬Ã¦ÂÖ»»Ä¬ÈÏÕË»§ÃÜÂ룬ÏÞÖÆÓ¦ÓóÌÐò¶Ô»¥ÁªÍøµÄ¹ûÕæ»á¼û£¬²¢ÔÚÐëҪʱ½ûÓà xp_cmdshell ¹¦Ð§£¬ÒÔÓÐÓüõÇáDZÔÚΣº¦£¬±£»¤ÐÞ½¨ÐÐÒµµÄÍøÂçÇå¾²¡£
https://thehackernews.com/2024/09/hackers-exploit-default-credentials-in.html
6. ¼ÓÃÜÇ®±ÒЮÖÆÍÅ»ïTeamTNT¾íÍÁÖØÀ´
9ÔÂ19ÈÕ£¬Ö»¹ÜTeamTNT×éÖ¯ÔÚ2022Äê±»ÒÔΪÒÑÏûÊÅ£¬µ«Çå¾²Ñо¿ÁìÓòµÄ×îз¢Ã÷Õ¹ÏÖÁ˸ÃÍþвÐÐΪÕßÔÚ2023ÄêÈÔÔÚÔ˶¯µÄ¼£Ïó¡£TeamTNTÒÔÆä¼ÓÃÜЮÖƹ¥»÷ÖøÃû£¬Í¨¹ýʹÓÃÊܺ¦ÕßµÄIT×ÊÔ´²»·¨ÍÚ¾ò¼ÓÃÜÇ®±Ò¡£×Ô2019ÄêÊ״ζÃæÒÔÀ´£¬¸Ã×éÖ¯¾ÍÒòÆäÖØ´óµÄShell¾ç±¾ºÍ¶ñÒâ¶þ½øÖÆÎļþ¹¤¾ß°üÖÆ×÷µÄ¶ñÒâÈí¼þ¶øÎÛÃûÕÑÖø¡£×îб¨¸æÖ¸³ö£¬TeamTNTµÄÕ½Êõ¡¢ÊÖÒպͳÌÐò£¨TTP£©ÓëÈ¥ÄêÔ˶¯ÏàËÆ£¬ÇÒÒÑÓ°Ïì»ùÓÚCentOS²Ù×÷ϵͳµÄVPSÔÆ»ù´¡ÉèÊ©¡£¾ÝGroup-IBÆÊÎö£¬TeamTNTͨ¹ýSSH±©Á¦¹¥»÷½øÈëÊܺ¦Õßϵͳ£¬ÉÏ´«²¢Ö´ÐжñÒâ¾ç±¾£¬¸Ã¾ç±¾²»µ«¼ì²éÖ÷»úÊÇ·ñÒѱ»ÆäËû¿ó¹¤ÈëÇÖ£¬»¹½ûÓÃÇå¾²¹¦Ð§¡¢É¾³ýÈÕÖ¾¡¢ÐÞ¸ÄϵͳÎļþ£¬²¢ÖÕÖ¹ÏÖÓмÓÃÜÇ®±ÒÍÚ¾òÀú³Ì¡£¸ü½øÒ»²½£¬¸Ã¾ç±¾×°ÖÃDiamorphine rootkitÒÔʵÏÖÒþÉíºÍ»ñÈ¡rootȨÏÞ£¬²¢Ê¹Óö¨Öƹ¤¾ß¼á³Ö¶ÔϵͳµÄ³¤ÆÚ¿ØÖÆ¡£ÆäÕ½ÂÔ°üÀ¨ÐÞ¸ÄÎļþÊôÐÔ¡¢½¨ÉèºóÃÅÓû§ÕË»§¼°É¨³ýÏÂÁîÀúÊ·£¬ÒÔÖÜÈ«Òþ²ØÔ˶¯ºÛ¼£¡£´Ë´Î·¢Ã÷͹ÏÔÁËTeamTNTÔÚ×Ô¶¯»¯¹¥»÷ÁìÓòµÄ¸ßÃ÷ÎäÒÕ£¬Æä¹¥»÷Õ½ÂÔ´Ó³õʼÈëÇÖµ½±ÜÃâ»Ö¸´ÊµÑéµÄÿ¸ö»·½Ú¶¼¾ÓÉÈ«ÐÄÉè¼Æ£¬Ö¼ÔÚ¸øÊܺ¦Õß´øÀ´ÑÏÖØË𺦡£
https://www.infosecurity-magazine.com/news/cryptojacking-gang-teamtnt-comeback/