ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§

Ðû²¼Ê±¼ä 2024-10-18

1. ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§


10ÔÂ16ÈÕ£¬ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¹¤¾ßÌᳫ¹¥»÷¡£ËûÃÇͨ¹ýTelegramÈö²¥¸Ã¶ñÒâÈí¼þ£¬Î±×°³ÉÎÚ¿ËÀ¼ÐÂÕþ¸®Ó¦ÓóÌÐòReserve+µÄÊÖÒÕÖ§³Ö»úеÈË£¬ÓÕÆ­Óû§ÉÏ´«°üÀ¨¶ñÒâÎļþµÄZIPµµ°¸¡£Ò»µ©Îļþ±»·­¿ª£¬MeduzaStealer¾Í»áѬȾĿµÄ×°±¸£¬ÇÔÈ¡¾ßÓÐÌض¨À©Õ¹ÃûµÄÎĵµ£¬²¢Ëæºó×ÔÎÒɾ³ý¡£Reserve+Ó¦ÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐÒåÎñ·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üÐÂСÎÒ˽¼ÒÊý¾Ý£¬ÓÉÓÚÍøÂçµÄÊý¾ÝÃô¸Ð£¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ä¿µÄ¡£×èÖ¹7Ô£¬ÒÑÓÐÁè¼Ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÓ¦ÓøüÐÂÊý¾Ý¡£ÎÚ¿ËÀ¼¹ú·À²¿Òѱ¨¸æ·¢Ã÷ð³äµÄReserve+Ó¦ÓóÌÐò£¬¿ÉÄÜÖ¼ÔÚÍøÂçСÎÒ˽¼ÒÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÐÄÀíÐж¯¡£´ËÇ°£¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÊ¢ÐÐÒƶ¯Ó¦ÓóÌÐòºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÖ°Ô±¡£


https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram


2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý£¬¿çƽ̨Èö²¥ÄÑ·À¿Ø


10ÔÂ16ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚTrend MicroµÄ±¨¸æÖÐÕ¹ÏÖÁËÒ»¸öÖØ´óµÄÀÕË÷Èí¼þ²Ù×÷£¬¸Ã²Ù×÷ʹÓÃÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þÄ£ÄâÁËÎÛÃûÕÑÖøµÄLockBitÀÕË÷Èí¼þ¼Ò×壬µ«ÏÖʵÉÏÊÇÒ»¸öÍêÈ«²î±ðµÄʵÌå¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼ÓËÙ£¨S3TA£©¹¦Ð§£¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß¿ØÖƵÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý£¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ÔÚ¹¥»÷¿¢ÊÂʱ£¬×°±¸µÄ±ÚÖ½»áÄð³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ£¬ÒÔÔöÌíÊܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³ÌÓïÑÔ±àд£¬¾ßÓпçƽ̨ÌØÕ÷£¬Äܹ»Õë¶ÔWindowsºÍmacOSÇéÐΣ¬Ê¹ÆäÓÃ;ÆÕ±éÇÒÄÑÒÔ¿ØÖÆ¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõĻá¼ûÃÜÔ¿£¬µ«Trend Micro½¨Òé×éÖ¯¼á³ÖСÐÄ£¬¸üÐÂÈí¼þ£¬¼ì²éÔ¶³Ì»á¼ûÕ½ÂÔ£¬²¢¼à¿ØÓë¶ñÒâÔ˶¯Ïà¹ØµÄAWSÕË»§ID£¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔƵÄÍþв¡£


https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/


3. ClickFixбäÖÖ£ºÊ¹ÓÃGoogle MeetÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ


10ÔÂ17ÈÕ£¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½ÂÔ£¬×Ô5Ô·ÝÓÉÍøÂçÇå¾²¹«Ë¾ProofpointÊ״α¨¸æÒÔÀ´£¬ÆäÔ˶¯Óú·¢ÆµÈÔ£¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¸ÃÕ½ÂÔͨ¹ýð³ä Google Chrome¡¢Microsoft Word ºÍ OneDrive ¹ýʧÐÂÎÅ£¬ÓÕÆ­Óû§¸´ÖƲ¢Ö´ÐÐ PowerShell ´úÂ룬´Ó¶øѬȾϵͳ¡£Êܺ¦ÕßÒò´ËÅöÃæÁÙ¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷£¬Èç DarkGate¡¢Matanbuchus µÈ¡£½üÆÚ£¬SaaS ÍøÂçÇå¾²ÌṩÉÌ Sekoia Ö¸³ö£¬ClickFix Ô˶¯Òѱ¬·¢ÏÔÖøת±ä£¬°üÀ¨Ê¹Óà Google Meet ÓÕ¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂç´¹ÂÚÓʼþµÈ¡£¹¥»÷Õ߻ᷢËÍ¿´ËÆÕýµ±µÄ Google Meet Ô¼ÇëÓʼþ£¬ÓÕʹÊܺ¦Õß»á¼ûÐéαҳÃæ¡£Ò»µ©½øÈ룬Êܺ¦Õß»áÊÕµ½ÊÖÒÕÎÊÌâÌáÐÑ£¬Èôµã»÷¡°ÊµÑéÐÞ¸´¡±£¬Ôò»áÆô¶¯ ClickFix ѬȾÀú³Ì£¬µ¼ÖÂÅÌËã»ú±»¶ñÒâÈí¼þѬȾ¡£Windows ϵͳÖ÷ÒªÔâÊÜ Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷£¬¶ø macOS »úеÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£±ðµÄ£¬Sekoia »¹·¢Ã÷ÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢ÇþµÀ£¬°üÀ¨ Zoom¡¢PDF ÔĶÁÆ÷¡¢ÐéαÊÓƵÓÎÏ·µÈ¡£


https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/


4. ³¯ÏÊITڲƭÍŻNickel Tapestry¡±Ê¹ÓùÍÓ¶¹ØϵÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð


10ÔÂ17ÈÕ£¬³¯Ïʺã¾ÃÒÔÀ´Ò»Ö±ÅÉDzITרҵְԱµ½¸»×ã¹ú¼ÒµÄÆóÒµ¾ÍÖ°£¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄÎäÆ÷ÍýÏëıȡÊÕÈë¡£ÕâЩڲƭÐÔµÄITÊÂÇéÕßʹÓÃÐéα»ò͵À´µÄÉí·Ý£¬²¢Í¨¹ýÌõ¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´ÑÚÊÎÆäÕæʵλÖá£ËûÃÇ×èֹʹÓÃÊÓƵͨ»°»òÔÚÊÓƵ¾Û»áʱ´úÒþ²ØÃ沿£¬ÒÔ±ÜÃâ±»·¢Ã÷¡£¾ÝÍøÂçÇå¾²¹«Ë¾SecureworksµÄÊӲ죬һ¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆΪUNC5267£©µÄ×éÖ¯ÈÏÕæ×éÖ¯ºÍЭµ÷ÕâЩ³¯ÏÊITÊÂÇéÕß¡£ÔÚ¹ÍÓ¶ÕâЩÍⲿ³Ð°üÉ̺ó£¬Ò»¼Ò¹«Ë¾ÏÕЩÁ¬Ã¦ÔâÓöÁËÊý¾ÝÇÔÈ¡£¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐéÄâ×ÀÃæ»ù´¡ÉèÊ©´«Ê䵽СÎÒ˽¼ÒGoogle DriveÔÆ´æ´¢¡£ÔÚ¹ÍÓ¶¹ØϵÖÕÖ¹ºó£¬¸Ã¹«Ë¾×îÏÈÊÕµ½ÀÕË÷µç×ÓÓʼþ£¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜÇ®±ÒÊê½ðÒÔ»»È¡²»¹ûÕæй¶Êý¾Ý¡£Secureworks»¹·¢Ã÷£¬Nickel TapestryÔÚ¹¥»÷Ô˶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬ÊðÀíºÍAnyDeskµÈ¹¤¾ß¡£Ñо¿Ö°Ô±ÖÒÑÔ£¬³¯ÏʵÄITÊÂÇéÕß¾­³£Ï໥Эµ÷£¬ÌṩÍƼö£¬Òò´Ë×éÖ¯ÔÚÕÐƸԶ³ÌÊÂÇéÕßʱӦ¼á³ÖСÐÄ£¬²¢×¢ÖØڲƭ¼£Ïó¡£


https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/


5. BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú²¢ÇÔÈ¡Êý¾Ý


10ÔÂ17ÈÕ£¬BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú£¨BCHP£©·¢¶¯ÁËÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂ磬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öËùÔÚÌṩҽÁÆ·þÎñ¡£9ÔÂ6ÈÕ£¬BCHPµÄIT¹©Ó¦ÉÌÔâÊÜÁËÍøÂç¹¥»÷£¬¼¸Ììºó£¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾­ÊÚȨµÄÔ˶¯£¬²¢Á¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬°üÀ¨¹Ø±Õϵͳ×÷Ϊ±£»¤²½·¥¡£¾­ÊÓ²ìÈ·ÈÏ£¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾­ÊÚȨµÄ»á¼û£¬²¢ÇÔÈ¡ÁË°üÀ¨È«Ãû¡¢Éç»á°ü¹ÜºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƼͼ±àºÅ¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÖÎÁÆÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ï죬ÓÉÓÚËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£È·ÈÏÊܵ½Ó°ÏìµÄСÎÒ˽¼Ò½«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ£¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓüà¿ØºÍ±£»¤·þÎñ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕ棬²¢Éù³ÆÓµÓвÆÎñºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨѶ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢£¬µ«ÉÐδй¶ÈκÎÄÚÈÝ£¬Ò²Î´Åû¶×îºóÏÞÆÚ£¬Åú×¢ËûÃÇÈÔÏ£ÍûÓëBCHP¾ÙÐÐ̸ÅС£


https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/


6. SideWinder APT×éÖ¯À©´ó¹¥»÷¹æÄ££¬½ÓÄÉÐÂÐÍÖش󹤾߰ü


10ÔÂ17ÈÕ£¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶ÈÓйØÁªµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©ÐÐΪÕߣ¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸ö×ÅÃûʵÌåºÍÕ½ÂÔ»ù´¡ÉèÊ©·¢¶¯Á˹¥»÷¡£¸Ã×éÖ¯Ò²±»³ÆΪAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£Ö»¹ÜÆäʹÓùûÕæµÄÎó²îʹÓóÌÐòºÍ¶ñÒâÎļþ×÷ΪѬȾǰÑÔ£¬¿´ËÆÊÖÒÕˮƽ½ÏµÍ£¬µ«×ÐϸÆÊÎöÆäÐж¯Ï¸½Úºó£¬·¢Ã÷ÆäÕæʵÄÜÁ¦½ûֹСêï¡£¹¥»÷Ä¿µÄ°üÀ¨ÃϼÓÀ­¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¼ÒµÄÕþ¸®ºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£×î½ü£¬SideWinderʹÓöà½×¶ÎѬȾÁ´×ª´ïÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü£¬Í¨¹ýÓã²æʽÍøÂç´¹ÂÚµç×ÓÓʼþ×îÏÈ£¬Ö´ÐÐһϵÁÐÏÂÔسÌÐò£¬×îÖÕ°²ÅŶñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçϵͳÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐÓøºÔØ£¬²¢Í¨ÊºóÃżÓÔØÄ£¿éÖ²ÈëStealerBot£¬ÓÃÓÚÌع¤Ô˶¯£¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Í¼»÷¼üµÈ¡£±ðµÄ£¬SideWinderµÄµØÀíÁýÕÖ¹æÄ£Ò»Ö±À©´ó£¬Ê¹ÓÃÁËеÄÖش󹤾߰ü£¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36½¨ÉèÁªÏµ¡£


https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html