Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ£»·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2020-03-16

1.Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Turla APTÊÇÒ»¸ö³ÉÊì¡¢ÖØ´óÇÒ¾ßÓÐÕ½ÂÔÖØµãµÄÍøÂçÌØ¹¤×éÖ¯£¬¸Ã×éÖ¯Õë¶ÔÈ«Çò¿ÆÑС¢Íâ½»ºÍ¾üÊ»ú¹¹µÄ¹¥»÷ÒÑÓÐÊ®¶àÄêµÄÀúÊ·£¬²¢ÇÒÒ»Ö±ÔÚÕë¶Ô±±´óÎ÷ÑóÌõÔ¼×éÖ¯£¨NATO£©ºÍ¶ÀÁªÌ壨CIS£©¹ú¼Ò¡£TurlaÒ»Ö±¿ª·¢×Ô¼º¶ÀÍ̵ġ¢ÏȽøµÄ¶ñÒâÈí¼þºÍ¹¤¾ß£¬²¢½ÓÄÉÐµĹ¥»÷ºÍ»ìÏýÒªÁ죬Insikt GroupÆÀ¹ÀÒÔΪTurlaÔÚδÀ´¼¸ÄêÄÚÈÔ½«ÊÇÒ»¸ö»îÔ¾µÄ¡¢ÏȽøµÄÍþв¡£Recorded FutureµÄÐÂÑо¿ÌṩÁË×Ô¶¯¸ú×ÙºÍʶ±ðTurla»ù´¡¼Ü¹¹µÄÒªÁì£¬ÖØµã¹Ø×¢¼¸ÖÖÓëTurlaÓйصĶñÒâÈí¼þÀàÐÍ£¬°üÀ¨MosquitoºóÃźÍÐ®ÖÆµÄÒÁÀÊTwoFace ASPX Web Shell¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.recordedfuture.com/turla-apt-infrastructure/


2.ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄDDR4ÄÚ´æÈÔÊÜRowhammer¹¥»÷Ó°Ïì


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


VUSecÑо¿Ö°Ô±·¢Ã÷ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄÏÖ´úÄÚ´æÄ £¿éÈÔ½«ÃæÁÙRowhammer£¨ÄÚ´æÎ»·­×ª£©¹¥»÷Σº¦¡£ÏÖÔÚÕë¶ÔRowhammer¹¥»÷µÄ·À»¤²½·¥¹ØÓÚÒÑÖªµÄRowhammer±äÖÖÊÇÓÐÓõÄ£¬µ«Ñо¿Ö°Ô±ÑÝʾÁË¿ÉÈÆ¹ýÄ¿½ñ»º½â²½·¥µÄÐÂÐÍRowhammer¹¥»÷£¨CVE2020-10255£©¡£ÐµÄÄÚ´æÎ»·­×ª¹¥»÷¿ÉÔÚÐí¶à×°±¸ÉÏÔËÐУ¬°üÀ¨¹È¸è¡¢ÈýÐǺÍÒ»¼ÓµÄÖÇÄÜÊÖ»ú¡£VUSecÓÚ2019Äê11ÔÂÏòËùÓÐÊÜÓ°ÏìµÄ¸÷·½Åû¶ÁËеÄRowhammer¹¥»÷£¬µ«ÐµĻº½â²½·¥ÊµÑéÆðÀ´²¢½ûÖ¹Ò×£¬²¢ÇÒÐè񻮮·ÑһЩʱ¼äÀ´°²ÅÅ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/


3.BlackWaterºóÃÅÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


MalwareHunterTeam·¢Ã÷Ò»¸öÃûΪBlackWaterµÄÐÂÐͺóÃÅ£¬¸ÃºóÃÅÔÚαװ³ÉÐéαCOVID-19ÐÅÏ¢µÄͬʱ»¹ÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ¡£BlackWaterͨ¹ýÒ»¸öÃûΪImportant-COVID-19.rarµÄRARÎļþÈö²¥£¬ÏÖÔÚÉв»ÇåÎú¸ÃÎļþͨ¹ýºÎÖÖ·½·¨·Ö·¢£¬µ«ºÜ¿ÉÄÜÊÇͨ¹ý´¹ÂÚÓʼþ·Ö·¢¡£ÎļþÖаüÀ¨ÃûΪImportant-COVID-19.docx.exeµÄÎļþ£¬ÓÉÓÚWindowsĬÈÏÒþ²ØÎļþÀ©Õ¹Ãû£¬Òò´ËÐí¶àÈË¿ÉÄÜ»áÎóÒÔΪ¸ÃÎļþÊÇdocxÎļþ¶ø½«Æä·­¿ª¡£BlackWaterʹÓÃCloud Workers¾ÙÐÐC2ͨѶ£¬ÕâʹµÃ¼ì²âºÍ×èÖ¹¶ñÒâÁ÷Á¿±äµÃÔ½·¢ÄÑÌâ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/


4.Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2ÏàÖúͬ°éµÄ¿Í»§Êý¾Ý±»µÁ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2×î´óµÄÏàÖúͬ°éÖ®Ò»Aerial DirectÔâºÚ¿ÍÈëÇÖ£¬¿Í»§Êý¾Ý±»µÁ¡£¸Ã¹«Ë¾ÌåÏÖ2ÔÂ26ÈÕδ¾­ÊÚȨµÄµÚÈý·½Í¨¹ýÍⲿ±¸·ÝµÄÊý¾Ý¿â»á¼ûÁËÆä¿Í»§Êý¾Ý£¬¸ÃÊý¾Ý¿âÖаüÀ¨ÁùÄêÄÚµÄÄ¿½ñºÍÒÑÓâÆÚ¶©»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¹«Ë¾µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍ²úÆ·ÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÈκÎÃÜÂë»ò²ÆÎñÐÅÏ¢±»µÁ¡£¸Ã¹«Ë¾ÒÑΪÊÜÓ°ÏìµÄ¿Í»§½¨ÉèÁËÒ»¸öÖ§³ÖÍøÕ¾£¬²¢½¨ÒéËûÃǸü¸ÄÃÜÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.co.uk/2020/03/13/o2_customer_data_slurped_through_partner_databse/


5.·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬Ñ¡¾ÙδÊÜÓ°Ïì


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


·¨¹úÂíÈüÊÐÔÚ¼´½«ÓÚ3ÔÂ15ÈÕÖÁ3ÔÂ22ÈÕ¾ÙÐÐÊÐÕþÑ¡¾Ù֮ǰÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷¡£¸Ã´ÎÑ¡¾ÙµÄÄ¿µÄÊÇÑ¡¾Ù¸ÃÊа˸ö²¿·ÖµÄÒé»á¡¢ÊÐÒé»áºÍ°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒé»á¡£Æ¾Ö¤¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨Anssi£©µÄÐÂÎÅ£¬¸Ã´Î¹¥»÷Ôì³É°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒÔ¼°ÂíÌá¸ñȺµºµÄ300̨»úе̱»¾£¬ÕâЩ»úеÓÃÓÚ½¨ÉèÊðÀíÊðÃûÁбí£¬Òò´ËÕâЩÊÂÇ鱨ÐèÊÖ¶¯Íê³É¡£ÊÐÕþÌüÒѾ­È·ÈÏÊÐÕþÑ¡¾Ù½«Õý³£¾ÙÐС£¾ÝÖªÇéÈËʿ͸¶£¬¸ÃÍøÂç¹¥»÷µÄ¹æÄ£ÊÇØ¨¹ÅδÓеÄ£¬ÂíÈüÊкʹ󶼻áÊÐÕþÌüÊܵ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬µ«ÏÖÔÚÉÐÎÞÓë¹¥»÷»òÀÕË÷Èí¼þ¼Ò×åÓйصÄÏêϸÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/99658/malware/marseille-city-massive-attack.html


6.½Ý¿Ëйڲ¡¶¾¼ì²âʵÑéÊÒÔâÍøÂç¹¥»÷£¬ITϵͳÔÝʱ¹Ø±Õ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


½Ý¿Ë×î´óµÄCOVID-19¼ì²âʵÑéÊÒÖ®Ò»£¨²¼¶ûŵ´óѧҽԺ£©Ôâµ½ÍøÂç¹¥»÷¡£Ò½Ôº¹ÙÔ±ÉÐδ͸¶Çå¾²ÊÂÎñµÄÐÔ×Ó£¬µ«¾ÝÍâµØÃ½Ì屨µÀ£¬¸ÃÊÂÎñÒѾ­ÑÏÖØµ½±ØÐèÍÆ³Ù½ôÆÈÍâ¿ÆÊÖÊõºÍ½«Ðµļ±Ö¢»¼Õß×ªÒÆµ½ÖÜΧµÄÊ¥°²ÄÝ´óѧҽԺ¡£ÔÚÊÂÎñ±¬·¢Ê±´ú£¬²¼¶ûŵ´óѧҽԺ±»ÆÈ¹Ø±ÕÁËÕû¸öITÍøÂ磬ÆäÁíÍâÁ½¸ö·ÖÖ§»ú¹¹-¶ùͯҽԺºÍ¸¾²úÒ½ÔºÒ²Êܵ½ÁËÓ°Ïì¡£ÊÂÎñ±¬·¢ºó£¬½Ý¿Ë¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©¡¢½Ý¿Ë¾¯Ô±£¨NCOZ£©ºÍÒ½ÔºµÄITÖ°Ô±ÕýÔÚÏàÖúÒÔ»Ö¸´Ò½ÔºµÄITÍøÂç¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/