΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷

Ðû²¼Ê±¼ä 2024-10-15

1. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷


10ÔÂ13ÈÕ £¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ £¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷ £¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐΡ£Kerberoasting ʹÓà Kerberos Éí·ÝÑé֤ЭÒéÇÔÈ¡ AD ƾ֤ £¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´¡£Î¢ÈíÖ¸³ö £¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±Ñݱä £¬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷Ç°ÑԺͷÀÓù»úÖÆ¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆƽâÊÖÒÕµÄÔËÓà £¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý¡£ÔÚ Kerberoasting ¹¥»÷ÖÐ £¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆƽâʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵķþÎñƱ֤ £¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾­ÊÚȨµÄ»á¼ûȨÏÞ¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§ £¬¸üÒ×Êܵ½¹¥»÷¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£Îª¼õÇá Kerberoasting Σº¦ £¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥ £¬°üÀ¨Ê¹ÓÃ×éÍйܷþÎñÕÊ»§ (gMSA) »òίÍÐÍйܷþÎñÕÊ»§ (dMSA)¡¢Ç¿ÖÆʹÓÃÇ¿ÃÜÂë¡¢ÉèÖ÷þÎñÕÊ»§Ê¹Óà AES ¼ÓÃÜ £¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄ·þÎñÖ÷ÌåÃû³Æ (SPN)¡£±ðµÄ £¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£


https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/


2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ


10ÔÂ14ÈÕ £¬Trend MicroÑо¿Ö°Ô±·¢Ã÷ £¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâÔ˶¯¼¤Ôö £¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£´Ë´ÎÓã²æʽÍøÂç´¹ÂÚÔ˶¯Ö÷ÒªÕë¶ÔÀ­¶¡ÃÀÖ޵Ĺ«Ë¾ £¬ÓÈÆäÊÇ°ÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹ £¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃË°É걨µÄ½ôÆÈÐÔÓÕÆ­Óû§ÏÂÔضñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁî £¬ÓëC&C·þÎñÆ÷½¨ÉèÅþÁ¬¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ £¬µ±Óû§Ö´ÐÐʱ £¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî¡£³ýÁËLNKÎļþ £¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ¡£ÔÚ´Ë´ÎÔ˶¯ÖÐ £¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû £¬Èç.pdf¡¢.jpgµÈ £¬ÒÔÈö²¥¶ñÒâÈí¼þ¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL £¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß £¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£Water MakaraµÄÓã²æʽÍøÂç´¹ÂÚÔ˶¯ÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ £¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù £¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üеÈ £¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£


https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html


3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷ £¬×¨¼ÒÇ××Ô½ÒÃØȦÌ×


10ÔÂ14ÈÕ £¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþ·þÎñ £¬ÓµÓÐÁè¼Ý25ÒÚÓû§ £¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖصãÄ¿µÄ¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑÔ³Æ £¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§ £¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ £¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄڲƭÍøÕ¾ £¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤¡£½Ó×Å £¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»° £¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£Ô˶¯¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷ £¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ £¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó £¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£±ðµÄ £¬Mitrovic»¹Òâʶµ½ £¬Æ­×ÓµÄÉùÒô¹ýÓÚÍêÉÆ £¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ¡£ËûÒÔΪ £¬ÕâÊÇÈ«Çò¹æÄ£ÄڵĺڿÍÔ˶¯ £¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£Òò´Ë £¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾ £¬ÌáÐѸ÷ÈËÕ©Æ­ÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ £¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ £¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÍеÄÈËÇóÖú £¬ÒÔÌá·À´ËÀ๥»÷¡£


https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/


4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ


10ÔÂ14ÈÕ £¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø £¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý £¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£Ë¼¿Æ½²»°ÈËÌåÏÖ £¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ £¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæʵÐÔ £¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£´ËÇ° £¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ £¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿Æϵͳ £¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ £¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîÄ¿Ô´´úÂë¡¢Ó²±àÂëƾ֤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£ÖµµÃ×¢ÖصÄÊÇ £¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¾ÝÐÂÎÅÈËʿ͸¶ £¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйܷþÎñÌṩÉÌ´¦ÇÔÈ¡µÄ¡£È»¶ø £¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´ËÇ°6Ô·ݵÄйÃÜÊÂÎñÓйØ¡£


https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/


5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð


10ÔÂ14ÈÕ £¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ £¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾­ÊÚȨµÄÏÖ½ðÌáÈ¡¡£FASTCashÏÈÇ°Ö÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ £¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£¡£×Ô2016ÄêÒÔÀ´ £¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷ £¬ÇÔÈ¡ÊýÍòÍòÃÀÔª £¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв £¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£2020Äê £¬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´ £¬Ò»Äêºó £¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËß £¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal £¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷·þÎñÆ÷Àú³ÌÖÐ £¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢ £¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ì滻ΪÅú×¼ £¬²¢°üÀ¨Ëæ»ú½ð¶î £¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½ £¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß¡£±ðµÄ £¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆ𠣬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆ乤¾ß¼¯¡£


https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/


6. Gryphon HealthcareÔâÓöÊý¾Ýй¶ £¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡


10ÔÂ14ÈÕ £¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡·þÎñÌṩÉÌ £¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢ鶵ÄÊÂÎñ¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ £¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý £¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾² £¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓà £¬µ«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý±£»¤·þÎñ¡£¾Ý³Æ £¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥·þÎñµÄ×éÖ¯´æ´¢ £¬¿ÉÄÜ°üÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ £¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó¡£Î´À´¼¸¸öÔ £¬Ëæ×Å״ʦÃÇÖƶ©ÕûÌåËßËÏÍýÏë £¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£


https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/