MOVEitÎó²îÖÂÊý¾Ýй¶£¬Nam3L3ss×éÖ¯ÆعâÊý°ÙÍòÔ±¹¤¼Í¼
Ðû²¼Ê±¼ä 2024-12-051. MOVEitÎó²îÖÂÊý¾Ýй¶£¬Nam3L3ss×éÖ¯ÆعâÊý°ÙÍòÔ±¹¤¼Í¼
12ÔÂ3ÈÕ£¬Ò»ÆðÉæ¼°MOVEitÎļþ´«Ê乤¾ßµÄÇå¾²Îó²îÊÂÎñÒý·¢ÁËÆÕ±é¹Ø×¢¡£¸ÃÎó²î±»Cl0pÀÕË÷²¡¶¾ÍÅ»ïʹÓ㬵¼ÖÂÊýǧ¼Ò¹«Ë¾µÄÃô¸ÐÊý¾Ý±»µÁ£¬ÆäÖаüÀ¨À´×Ô27¼ÒÖÁ¹«Ë¾µÄÁè¼Ý760,000·ÝÔ±¹¤¼Í¼£¬ÒÔ¼°ÖÙÁ¿ÁªÐй«Ë¾(JLL.com)µÄ1200ÍòÐÐÊý¾Ý£¬×ÜÊýµÖ´ï1312ÍòÌõ¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢µØµãºÍ¹«Ë¾Î»ÖÃ×ø±êµÈÃô¸ÐÐÅÏ¢£¬±»Ð¹Â¶ºó¿ÉÄܻᱻÓÃÓÚÉç»á¹¤³Ì¹¥»÷¡¢Éí·Ý͵ÇÔ»òÍøÂç´¹ÂÚթƵȶñÒâÐÐΪ¡£Ð¹Â¶Êý¾ÝµÄ×éÖ¯Nam3L3ss×Գơ°Êý¾ÝÒåÓ¾ü¡±£¬ÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÐû²¼ÁËÕâЩÐÅÏ¢£¬²¢Éù³ÆÊÇ´ÓMOVEitÎó²îÖлñµÃµÄÊý¾Ý¡£´Ë´ÎйÃÜÊÂÎñÉæ¼°µÄ¹«Ë¾°üÀ¨ÃÀ¹úÒøÐС¢Åµ»ùÑÇ¡¢Ä¦¸ùÊ¿µ¤ÀûµÈÐÐÒµ¾ÞÍ·£¬×ÜÊýµÖ´ï½ü1ÒÚСÎÒ˽¼Ò¡£ËäÈ»Nam3L3ssµÄÄîÍ·Éв»Ã÷È·£¬µ«ËûÃǵÄÐÐΪÎÞÒÉ̻¶ÁËMOVEitÎó²îµÄÖØ´óÓ°ÏìÒÔ¼°±»µÁÔ±¹¤Êý¾Ý´øÀ´µÄΣº¦¡£ÊÜÓ°Ï칫˾µÄÔ±¹¤Ó¦¼á³ÖСÐÄ£¬ÒÔ·ÀÍøÂç´¹Âڵȹ¥»÷¡£
https://hackread.com/data-vigilante-leaks-772k-employee-record-database/
2. KimsukyʹÓô¹ÂÚÓʼþ¾ÙÐÐƾ֤ÇÔÈ¡£¬ÀÄÓöíÂÞ˹·¢¼þÈ˵صã
12ÔÂ3ÈÕ£¬Ó볯ÏʽáÃ˵ÄÍþвÐÐΪÕßKimsuky£¬±»Ö¸ÓëһϵÁÐÍøÂç´¹ÂÚ¹¥»÷ÓйØÁª¡£ÕâЩ¹¥»÷Ö÷Ҫͨ¹ý·¢ËÍÔ´×Ô¶íÂÞ˹·¢¼þÈ˵صãµÄµç×ÓÓʼþ¾ÙÐУ¬Ö¼ÔÚÇÔȡƾ֤¡£¾Ýº«¹úÍøÂçÇå¾²¹«Ë¾GeniansÊӲ죬´¹ÂÚÓʼþ×î³õÖ÷Ҫͨ¹ýÈÕ±¾ºÍº«¹úµÄµç×ÓÓʼþ·þÎñ·¢ËÍ£¬µ«´Ó9ÔÂÖÐÑ®×îÏÈ£¬Î±×°³ÉÀ´×Ô¶íÂÞ˹µÄ´¹ÂÚÓʼþÖð½¥Ôö¶à£¬ÀÄÓÃVKµÄMail.ruµç×ÓÓʼþ·þÎñ£¬¸Ã·þÎñÖ§³ÖÎå¸öÌåÃûÓò¡£Kimsuky¹¥»÷ÕßʹÓÃÕâЩ·¢¼þÈËÓòαװ³É½ðÈÚ»ú¹¹ºÍ»¥ÁªÍøÃÅ»§ÍøÕ¾£¬ÈçNaver£¬¾ÙÐÐÍøÂç´¹ÂÚÔ˶¯¡£±ðµÄ£¬»¹·¢ËÍÄ£ÄâNaver MYBOXÔÆ´æ´¢·þÎñµÄÐÂÎÅ£¬ÓÕµ¼Óû§µã»÷Á´½Ó£¬Éù³ÆÔÚÆäÕÊ»§Öмì²âµ½¶ñÒâÎļþ²¢ÐèҪɾ³ý£¬ÒÔ´ËÓÕÆÓû§¡£ÕâЩÐÂÎÅËäÈ»ÍâòÉÏÊÇ´ÓÌض¨ÓòÃû·¢Ë͵ģ¬µ«ÏÖʵÉÏÊÇʹÓÃÊÜѬȾµÄµç×ÓÓʼþ·þÎñÆ÷·¢Ë͵ġ£Kimsuky»¹ÉÆÓÚʹÓÃÕýµ±µç×ÓÓʼþ¹¤¾ßÈçPHPMailerºÍStar£¬ÒÔÌÓ±ÜÇå¾²¼ì²é¡£ÕâЩ¹¥»÷µÄ×îÖÕÄ¿µÄÊÇƾ֤͵ÇÔ£¬½ø¶øЮÖÆÊܺ¦ÕßÕË»§£¬²¢Ê¹ÓÃËüÃǶÔÆäËûÔ±¹¤»òÊìÈËÌᳫºóÐø¹¥»÷¡£
https://thehackernews.com/2024/12/north-korean-kimsuky-hackers-use.html
3. Å·¾¯µ·»Ù¼ÓÃÜ·¸·¨Æ½Ì¨MATRIX£¬½É»ñ´ó×Ú²»·¨×ʲú
12ÔÂ4ÈÕ£¬Å·ÖÞÐ̾¯×éÖ¯Ðû²¼£¬·¨¹úºÍºÉÀ¼Ö´·¨²¿·ÖÒѵ·»ÙÓë¹ú¼Ê··¶¾¡¢ÎäÆ÷··Ô˺ÍÏ´Ç®µÈÑÏÖØ·¸·¨ÓйصÄÃûΪMATRIXµÄ¼ÓÃÜÐÅÏ¢·þÎñ¡£¸Ãƽ̨×î³õÓɺÉÀ¼Õþ¸®ÔÚÒ»Ãû×ï·¸ÊÖ»úÖз¢Ã÷£¬ÓµÓнü8000ÃûÓû§£¬·þÎñÆ÷±é²¼¶à¸ö¹ú¼Ò£¬Ö÷ÒªÔڵ¹úºÍ·¨¹ú¡£¾¯·½ÔÚÈý¸öÔµÄÊÓ²ìÖнػñ²¢ÆÆÒëÁË230¶àÍòÌõÐÅÏ¢£¬²¢ÔÚ¹ú¼ÊÐж¯ÖдݻÙÁË·þÎñÆ÷£¬¾Ð²¶ÁËÈýÃûÏÓÒÉÈË£¬°üÀ¨Æ½Ì¨µÄÏÓÒÉËùÓÐÕߺÍÔËÓªÉÌ¡£MATRIXÓµÓÐÖØ´óµÄ»ù´¡ÉèÊ©£¬Ìṩ¼ÓÃÜÐÂÎÅת´ï¡¢Ç徲ͨ»°¡¢ÊÓƵºÍÓïÒô¹²ÏíÒÔ¼°ÄäÃûÍøÒ³ä¯ÀÀµÈ·þÎñ£¬ÉõÖÁÍƳöÁ˶IJ©Ó¦ÓóÌÐòºÍÇ®±Ò¡£Å·ÖÞÐ̾¯×éÖ¯ÌåÏÖ£¬MATRIX±È֮ǰ±»È¡µÞµÄSky ECCºÍEncroChatµÈƽ̨¸üΪÖØ´ó£¬Óû§Ö»ÄÜͨ¹ýÔ¼Çë¼ÓÈë¡£¾¯·½½«¼ÌÐøÊÓ²ìÓë¸Ãƽ̨Ïà¹ØµÄ·¸·¨Ô˶¯¡£
https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police
4. CISA½«Èý¸öÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼
12ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ¸üÐÂÁËÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬ÐÂÔöÁËÈý¸öÎó²î£¬»®·ÖÊÇProjectSendµÄÉí·ÝÑéÖ¤²»µ±Îó²î£¨CVE-2024-11680£©¡¢North Grid ProselfµÄXMLÍⲿʵÌ壨XEE£©ÒýÓÃÎó²î£¨CVE-2023-45727£©ÒÔ¼°Zyxel¶à·À»ðǽµÄ·¾¶±éÀúÎó²î£¨CVE-2024-11667£©¡£ÆäÖУ¬ProselfµÄÎó²îÔÊÐíδ¾ÊÚȨµÄ¹¥»÷Õ߶ÁÈ¡·þÎñÆ÷Îļþ£¬°üÀ¨ÕË»§Êý¾Ý£»ProjectSendµÄÎó²îÔòÓ°Ïìr1720֮ǰµÄ°æ±¾£¬¹¥»÷Õ߿ɽè´Ëδ¾ÊÚȨÐÞ¸ÄÓ¦ÓÃÉèÖ㬽¨ÉèÕË»§£¬ÉÏ´«¶ñÒâÈí¼þ£»¶øZyxelµÄÎó²îÔò¿ÉÄÜÈù¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄURLÏÂÔØ»òÉÏ´«Îļþ¡£¾ÝVulnCheckÑо¿Ö°Ô±³Æ£¬ProjectSendµÄÎó²îËƺõÒѱ»Ò°Íâ¹¥»÷ÕßʹÓã¬ÇÒ¹¥»÷ÕßÒѽÓÄÉһϵÁÐÐж¯£¬Èç¸ü¸ÄµÇ¼ҳÃæÎÊÌ⣬ÆôÓÃÓû§×¢²áÒÔ»ñÈ¡Éí·ÝÑéÖ¤ºóµÄ»á¼ûȨÏÞ£¬²¢ÉÏ´«Webshell¡£CISAÒÑÒªÇóÁª°î»ú¹¹ÔÚ2024Äê12ÔÂ24ÈÕ֮ǰÐÞ¸´ÕâЩÎó²î£¬²¢½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬ÒÔ±£»¤ÍøÂçÃâÊܹ¥»÷¡£
https://securityaffairs.com/171638/security/u-s-cisa-adds-projectsend-north-grid-proself-and-zyxel-firewalls-bugs-to-its-known-exploited-vulnerabilities-catalog.html
5. DroidBot£ºÐÂÐÍAndroidÒøÐжñÒâÈí¼þÇÔÈ¡¶à¹ú¼ÓÃÜÇ®±Ò¼°ÒøÐÐƾ֤
12ÔÂ4ÈÕ£¬DroidBotÊÇÒ»ÖÖÐÂÐÍAndroidÒøÐжñÒâÈí¼þ£¬×Ô2024Äê6ÔÂÆð»îÔ¾£¬ÒÔ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÐÎʽÔËÓª£¬Ã¿ÔÂÊÛ¼Û3000ÃÀÔª¡£ËüÊÔͼÇÔÈ¡Ó¢¹ú¡¢Òâ´óÀû¡¢·¨¹ú¡¢Î÷°àÑÀ¡¢ÆÏÌÑÑÀµÈ¹úµÄ77¶à¸ö¼ÓÃÜÇ®±ÒÉúÒâËùºÍÒøÐÐÓ¦ÓõÄƾ֤¡£Ö»¹Ü¹¦Ð§²¢²»ÐÂÓ±Öش󣬵«DroidBotÔÚÓ¢¹ú¡¢Òâ´óÀû¡¢·¨¹ú¡¢ÍÁ¶úÆäºÍµÂ¹úÒÑÔì³É776ÆðÆæÒìѬȾ£¬ÏÔʾÆä¸ß¶È»îÔ¾¡£´Ë¶ñÒâÈí¼þÕý¶¦Á¦´ó¾Ù¿ª·¢ÖУ¬²¢ÊÔͼÀ©Õ¹ÖÁеØÇø£¬°üÀ¨À¶¡ÃÀÖÞ¡£DroidBotÓÉÍÁ¶úÆ俪·¢Õß½¨É裬ΪͬÃ˳ÉÔ±Ìṩ¶ñÒâÈí¼þ¹¹½¨Æ÷¡¢ÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷¼°ÖÐÑëÖÎÀíÃæ°åµÈ¹¤¾ß£¬Ê¹ÍøÂç·¸·¨·Ö×ÓÒ×ÓÚʹÓá£Ëü³£Î±×°³ÉGoogle Chrome¡¢Google PlayÊÐËÁ»òAndroidÇå¾²ÖÐÐÄ£¬ÓÕÆÓû§×°Ö㬳䵱ľÂí½ÇÉ«ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£Ö÷ÒªÌØÕ÷°üÀ¨¼üÅ̼ͼ¡¢ÁýÕÖÕýµ±ÒøÐÐÓ¦ÓýçÃæÏÔʾÐéαµÇ¼ҳÃæ¡¢¶ÌÐÅ×èµ²ºÍVNCÄ£¿é¡£Ëü»¹ÀÄÓÃAndroid¸¨Öú¹¦Ð§·þÎñ¼à¿ØÓû§²Ù×÷¡£ÎªÁ˼õÇáÍþв£¬½¨ÒéAndroidÓû§½ö´ÓGoogle PlayÏÂÔØÓ¦Óã¬×Ðϸ¼ì²éȨÏÞÇëÇ󣬲¢È·±£Play Protect´¦ÓÚÔ˶¯×´Ì¬¡£
https://www.bleepingcomputer.com/news/security/new-droidbot-android-malware-targets-77-banking-crypto-apps/
6. BT¼¯ÍÅÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷£¬²¿·Ö·þÎñÆ÷ÒѹرÕ
12ÔÂ4ÈÕ£¬¿ç¹úµçОÞÍ·BT¼¯ÍÅ£¨Ç°ÉíΪӢ¹úµçÐÅ£©È·ÈÏÆäBT¾Û»áÓªÒµ²¿·ÖÔÚÔâÊÜBlack BastaÀÕË÷Èí¼þ¹¥»÷ºó£¬Òѹرղ¿·Ö·þÎñÆ÷¡£Ö»¹Ü´Ë´ÎÇå¾²ÊÂÎñδӰÏìBT¼¯ÍŵÄÔËÓª»òBT¾Û»á·þÎñ£¬µ«Black BastaÍÅ»ïÉù³ÆÒÑÈëÇָù«Ë¾·þÎñÆ÷²¢ÇÔÈ¡500GBÊý¾Ý£¬°üÀ¨²ÆÎñ¡¢×éÖ¯¡¢Óû§Êý¾ÝºÍСÎÒ˽¼ÒÎĵµµÈ¡£¸ÃÍŻﻹÔÚ°µÍøйÃÜÍøÕ¾ÉÏÌí¼ÓÁ˵¹¼Æʱ£¬Éù³Æ½«ÓÚÏÂÖÜй¶¾Ý³Æ±»µÁµÄÊý¾Ý¡£BT¼¯ÕûÌåÏÖ½«¼ÌÐøÆð¾¢ÊÓ²ì´ËÊ£¬²¢ÓëÏà¹Ø»ú¹¹ÏàÖúÓ¦¶Ô¡£Black BastaÀÕË÷Èí¼þÐж¯×Ô2022Äê4ÔÂÒÔÀ´ÒÑÔì³ÉÐí¶à×ÅÃûÊܺ¦Õߣ¬°üÀ¨Ò½ÁƱ£½¡¹«Ë¾¡¢Õþ¸®³Ð°üÉ̵ȣ¬Æä·ÖÖ§»ú¹¹ÒÑÈëÇÖ500¶à¸ö×éÖ¯£¬²¢´Ó90¶àÃûÊܺ¦ÕßÊÖÖÐÊÕÈ¡ÖÁÉÙ1ÒÚÃÀÔªµÄÊê½ð¡£
https://www.bleepingcomputer.com/news/security/bt-conferencing-division-took-servers-offline-after-black-basta-ransomware-attack/