΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
Ðû²¼Ê±¼ä 2024-10-151. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
10ÔÂ13ÈÕ£¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ£¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷£¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐΡ£Kerberoasting ʹÓà Kerberos Éí·ÝÑéÖ¤ÐÒéÇÔÈ¡ AD ƾ֤£¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´¡£Î¢ÈíÖ¸³ö£¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±Ñݱ䣬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷Ç°ÑԺͷÀÓù»úÖÆ¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆƽâÊÖÒÕµÄÔËÓã¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆƽâʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵķþÎñƱ֤£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾ÊÚȨµÄ»á¼ûȨÏÞ¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬¸üÒ×Êܵ½¹¥»÷¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£Îª¼õÇá Kerberoasting Σº¦£¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥£¬°üÀ¨Ê¹ÓÃ×éÍйܷþÎñÕÊ»§ (gMSA) »òίÍÐÍйܷþÎñÕÊ»§ (dMSA)¡¢Ç¿ÖÆʹÓÃÇ¿ÃÜÂë¡¢ÉèÖ÷þÎñÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄ·þÎñÖ÷ÌåÃû³Æ (SPN)¡£±ðµÄ£¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£
https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/
2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ
10ÔÂ14ÈÕ£¬Trend MicroÑо¿Ö°Ô±·¢Ã÷£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâÔ˶¯¼¤Ôö£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£´Ë´ÎÓã²æʽÍøÂç´¹ÂÚÔ˶¯Ö÷ÒªÕë¶ÔÀ¶¡ÃÀÖ޵Ĺ«Ë¾£¬ÓÈÆäÊÇ°ÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹£¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃË°É걨µÄ½ôÆÈÐÔÓÕÆÓû§ÏÂÔضñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁÓëC&C·þÎñÆ÷½¨ÉèÅþÁ¬¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ£¬µ±Óû§Ö´ÐÐʱ£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî¡£³ýÁËLNKÎļþ£¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ¡£ÔÚ´Ë´ÎÔ˶¯ÖУ¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû£¬Èç.pdf¡¢.jpgµÈ£¬ÒÔÈö²¥¶ñÒâÈí¼þ¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL£¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß£¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£Water MakaraµÄÓã²æʽÍøÂç´¹ÂÚÔ˶¯ÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù£¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üеȣ¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£
https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html
3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷£¬×¨¼ÒÇ××Ô½ÒÃØȦÌ×
10ÔÂ14ÈÕ£¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþ·þÎñ£¬ÓµÓÐÁè¼Ý25ÒÚÓû§£¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖصãÄ¿µÄ¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑԳƣ¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²ÆÍøÕ¾£¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤¡£½Ó×Å£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£Ô˶¯¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷£¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ£¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó£¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£±ðµÄ£¬Mitrovic»¹Òâʶµ½£¬Æ×ÓµÄÉùÒô¹ýÓÚÍêÉÆ£¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ¡£ËûÒÔΪ£¬ÕâÊÇÈ«Çò¹æÄ£ÄڵĺڿÍÔ˶¯£¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£Òò´Ë£¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾£¬ÌáÐѸ÷ÈËÕ©ÆÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ£¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ£¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÍеÄÈËÇóÖú£¬ÒÔÌá·À´ËÀ๥»÷¡£
https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/
4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ
10ÔÂ14ÈÕ£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£Ë¼¿Æ½²»°ÈËÌåÏÖ£¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ£¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæʵÐÔ£¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£´ËÇ°£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ£¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿Æϵͳ£¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîÄ¿Ô´´úÂë¡¢Ó²±àÂëƾ֤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£ÖµµÃ×¢ÖصÄÊÇ£¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¾ÝÐÂÎÅÈËʿ͸¶£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйܷþÎñÌṩÉÌ´¦ÇÔÈ¡µÄ¡£È»¶ø£¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´ËÇ°6Ô·ݵÄйÃÜÊÂÎñÓйء£
https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/
5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð
10ÔÂ14ÈÕ£¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾ÊÚȨµÄÏÖ½ðÌáÈ¡¡£FASTCashÏÈÇ°Ö÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£¡£×Ô2016ÄêÒÔÀ´£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷£¬ÇÔÈ¡ÊýÍòÍòÃÀÔª£¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв£¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£2020Ä꣬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬Ò»Äêºó£¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËߣ¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal£¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷·þÎñÆ÷Àú³ÌÖУ¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢£¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ì滻ΪÅú×¼£¬²¢°üÀ¨Ëæ»ú½ð¶î£¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß¡£±ðµÄ£¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð£¬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆ乤¾ß¼¯¡£
https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/
6. Gryphon HealthcareÔâÓöÊý¾Ýй¶£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡
10ÔÂ14ÈÕ£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡·þÎñÌṩÉÌ£¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢ鶵ÄÊÂÎñ¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾²£¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬵«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý±£»¤·þÎñ¡£¾Ý³Æ£¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥·þÎñµÄ×éÖ¯´æ´¢£¬¿ÉÄÜ°üÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó¡£Î´À´¼¸¸öÔ£¬Ëæ×Å״ʦÃÇÖƶ©ÕûÌåËßËÏÍýÏ룬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£
https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/