APT36ʹÓÃCrimsonRATбäÌå¹¥»÷Ó¡¶ÈµÄÏà¹Ø»ú¹¹

Ðû²¼Ê±¼ä 2022-04-01

APT36ʹÓÃCrimsonRATбäÌå¹¥»÷Ó¡¶ÈµÄÏà¹Ø»ú¹¹


Cisco TalosÔÚ3ÔÂ29ÈÕ¹ûÕæÁËAPT36Õë¶ÔÓ¡¶ÈÕþ¸®ºÍ¾üÊ»ú¹¹µÄÐÂÔ˶¯¡£APT36ÓÖ³ÆTransparent Tribe £¬×Ô2016ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬ÒÉËÆÓë°Í»ù˹̹ÓйØ¡£´Ë´ÎÔ˶¯×îÏÈÓÚ2021Äê6Ô £¬Ê¹ÓÃαÔìµÄKavachÉí·ÝÈÏÖ¤Ó¦Ó÷ַ¢¶ñÒâÈí¼þ £¬Ó¡¶ÈÐèÒª»á¼ûÓʼþ·þÎñ»òÊý¾Ý¿âµÈIT×ÊÔ´µÄ¹Ù·½×éÖ¯µÄÔ±¹¤ÆÕ±éʹÓøÃÓ¦ÓᣱðµÄ £¬¹¥»÷ÕßÈÔÔÚʹÓÃCrimsonRAT £¬Æä2022°æ±¾ÐÂÔöÁ˶à¸ö¹¦Ð§ £¬Èç¼üÅ̼ͼ¡¢ÔÚÄ¿µÄϵͳÉÏÖ´ÐÐí§ÒâÏÂÁîÒÔ¼°¶ÁÈ¡ºÍɾ³ýÎļþµÈ¡£


https://blog.talosintelligence.com/2022/03/transparent-tribe-new-campaign.html


LAPSUS$»ØºÏ²¢Ð¹Â¶Èí¼þ¹«Ë¾Globant 70GBµÄÊý¾Ý


¾ÝýÌå3ÔÂ30ÈÕ±¨µÀ £¬ÀÕË÷ÍÅ»ïLAPSUS$ÔÚΪÆÚÒ»ÖܵĶÌÔÝͣЪºóÐû²¼»Ø¹é¡£¸ÃÍÅ»ïÔÚÆäTelegramƵµÀÉÏдµÀ¡°ÎÒÃÇÕýʽ´Ó¼ÙÆÚ»ØÀ´ÁË¡± £¬²¢Ðû²¼ÁËÒ»¸öÎļþ¼ÐÁбíµÄ½ØÍ¼ £¬ÁгöÁËArcserve¡¢Banco Galicia¡¢BNP Paribas Cardif¡¢Citibanamex¡¢DHL¡¢FacebookºÍStifelµÈ¹«Ë¾¡£Ëü»¹Ðû²¼ÁËÒ»¸ötorrentÎļþ £¬¾Ý³ÆÊÇGlobantÔ¼70GBµÄÊý¾Ý £¬°üÀ¨Ô´´úÂëºÍ¸Ã¹«Ë¾AtlassianÌ×¼þÏà¹ØµÄÖÎÀíÔ±ÃÜÂë¡£


https://thehackernews.com/2022/03/lapsus-claims-to-have-breached-it-firm.html 


Morphisec·¢Ã÷Õë¶Ô¼ÓÄôó·Ö·¢Mars StealerµÄÔ˶¯


3ÔÂ29ÈÕ £¬Morphisec¹ûÕæÁËÕë¶ÔMars StealerµÄ×îÐÂÑо¿Ð§¹û¡£Mars»ùÓھɵÄOski Stealer £¬ÓÚ2021Äê6ÔÂÊ״η¢Ã÷ £¬ÔÚRaccoon StealerͻȻ¹Ø±Õºó £¬³ÉΪÆäÌæ»»¼Æ»®¡£´Ë´ÎÐÂÔ˶¯Î±Ô쿪Դ°ì¹«Ì×¼þOpenOfficeµÄ¹Ù·½ÍøÕ¾ £¬Ê¹ÓÃGoogle Ads¹ã¸æÓÕʹĿµÄ»á¼û¸Ã¶ñÒâÍøÕ¾²¢ÏÂÔØMars Stealer¡£ÓÉÓÚ±»µÁÐÅÏ¢µÄĿ¼ÒòÉèÖò»µ±¶ø¼á³Ö¹ûÕæµÄ״̬ £¬Ñо¿Ö°Ô±·¢Ã÷·¢Ã÷¾ø´ó´ó¶¼Ä¿µÄÀ´×Ô¼ÓÄôó¡£


https://blog.morphisec.com/threat-research-mars-stealer


Wyze CamÉãÏñÍ·±£´æ¿ÉÓÃÀ´Ô¶³Ì»á¼ûSD¿¨ÄÚÈݵÄÎó²î


ýÌå3ÔÂ29ÈÕ±¨µÀ £¬Wyze CamÍøÂçÉãÏñÍ·Öб£´æÎó²î¡£¸ÃÎó²îδ·ÖÅÉCVE ID £¬ÔÊÐíÔ¶³ÌÓû§Í¨¹ýÕìÌý¶Ë¿Ú80»á¼ûÏà»úÖÐSD¿¨µÄÄÚÈÝ £¬ÇÒÎÞÐèÉí·ÝÑéÖ¤¡£SD¿¨Í¨³£ÓÃÀ´´æ´¢ÊÓÆµ¡¢Í¼ÏñºÍÒôƵ¼Í¼¡£ÔÚWyze Cam IoTÉϲåÈëSD¿¨ºó £¬»áÔÚwwwĿ¼ÖÐ×Ô¶¯½¨ÉèÖ¸ÏòËüµÄ·ûºÅÁ´½Ó £¬¸ÃĿ¼ÓÉweb·þÎñÆ÷Ìṩ·þÎñÇÒûÓÐÈκλá¼ûÏÞÖÆ¡£Îó²îÓÉBitdefenderÓÚ2019Äê3Ô·¢Ã÷²¢Éϱ¨ £¬Ö±µ½2022Äê1ÔÂ29ÈÕ²ÅÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-remotely-access-your-saved-videos/


ѹËõ³ÌÐòZlibÐû²¼¸üР£¬ÐÞ¸´Òѱ£´æ17ÄêµÄÇå¾²Îó²î


¾Ý3ÔÂ29ÈÕ±¨µÀ £¬Ñ¹Ëõ³ÌÐòZlibÐÞ¸´ÁËÒѱ£´æ17ÄêµÄÇå¾²Îó²î¡£GoogleµÄÑо¿Ö°Ô±Tavis Ormandy·¢Ã÷ZlibÖб£´æÒ»¸öÎó²î £¬ÔÚÉϱ¨Ê±·¢Ã÷¸ÃÎó²îÔçÔÚ2018Äê¾Í±»±¨¸æ²¢ÐÞ¸´¹ý £¬Æäʱ³ÆÆäÒѱ£´æ13ÄꡣȻ¶ø £¬²»ÖªÎªºÎ2018Äê4ÔÂ20ÈÕÌá½»µÄ²¹¶¡²¢Ã»ÓгÉΪZlibµÄ¸üС£Ö±µ½2022Äê03ÔÂ27ÈÕ £¬¸Ã¿âµÄÉÏÒ»¸ö°æ±¾²ÅÔÚ2017Äê01ÔÂ15ÈÕÐû²¼¡£¸ÃÎó²îÔÚ±¾Öܲű»·ÖÅɱàºÅCVE-2018-25032 £¬µ±Ñ¹ËõijЩÊäÈëʱ»á·ºÆðÎÊÌâ £¬²¢±£´æÇ±ÔڵĻº³åÇøÒç³öÎÊÌâ¡£


https://nakedsecurity.sophos.com/2022/03/29/zlib-data-compressor-fixes-17-year-old-security-bug-patch-errr-now/


SymantecÐû²¼¹ØÓÚжñÒâÈí¼þVerbleconµÄÆÊÎö±¨¸æ


3ÔÂ29ÈÕ £¬SymantecÐû²¼Á˹ØÓÚжñÒâÈí¼þVerbleconµÄÆÊÎö±¨¸æ¡£Ñо¿Ö°Ô±ÓÚ½ñÄê1Ô·¢Ã÷ÁËVerblecon £¬ËüÒѱ»ÓÃÓÚ×°ÖüÓÃܿ󹤵ÄÔ˶¯ÖС£¸Ã¶ñÒâÈí¼þ»ùÓÚJava £¬ÓÉÓÚÆä´úÂëµÄ¶à̬ÐÔʹµÃÆäÑù±¾µÄ¼ì²âÂʺܵÍ¡£¸Ã¶ñÒâÈí¼þ»á¼ì²éËüÊÇ·ñÔÚÐéÄâÇéÐÎÖÐÔËÐÐ £¬È»ºó»ñÈ¡ÕýÔÚÔËÐеÄÀú³ÌÁбíÒÔ¼ì²éÊÇ·ñÓÐÓëÐéÄâ»úϵͳÏà¹ØµÄÎļþ £¬ËùÓмì²é¶¼Í¨Êºó»á½«×ÔÉí¸´ÖÆµ½ÍâµØÄ¿Â¼£¨%ProgramData%¡¢%LOCALAPPDATA%¡¢Users£© £¬²¢°´ÆÚʵÑéÅþÁ¬ÓòÃûhxxps://gaymers[.]ax/ºÍhxxp://[DGA_NAME][.]tk/¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/verblecon-sophisticated-malware-cryptocurrency-mining-discord





Çå¾²¹¤¾ß


Privid


¼à¿ØÊÓÆµÆÊÎöϵͳ £¬Äܹ»ÒÔ±£»¤Òþ˽µÄ·½·¨¾ÙÐÐÊÓÆµÆÊÎö £¬ÒÔÓ¦¶ÔÇÖÈëÐÔ¸ú×ٵĵ£ÐÄ¡£


https://thehackernews.com/2022/03/privid-privacy-preserving-surveillance.html


Live Forensicator


ÓÃÓÚ×ÊÖúʵʱȡ֤ºÍÊÂÎñÏìÓ¦µÄ POWERSHELL ¾ç±¾¡£


https://github.com/Johnng007/Live-Forensicator#dependencies


nettrust


ÊÇÒ»¸ö¶¯Ì¬µÄ³öÕ¾·À»ðǽÊÚȨÆ÷¡£


https://github.com/ulfox/nettrust




Çå¾²ÆÊÎö


Google Chrome 100 Ðû²¼ £¬°üÀ¨Ð¹¦Ð§¡¢Í¼±êµÈ


https://www.bleepingcomputer.com/news/google/google-chrome-100-released-with-new-features-icon-and-more/


ÔõÑù½« Wslink ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòÓÃÓÚ»ìÏýµÄÐéÄâ»ú


https://thehackernews.com/2022/03/experts-detail-virtual-machine-used-by.html


Yandex ÕýÔÚÏò¶íÂÞ˹·¢ËÍ iOS Óû§Êý¾Ý


https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/


´ó×ڿ󹤺ͺóÃÅʹÓà Log4J ¹¥»÷ VMware Horizon ·þÎñÆ÷


https://news.sophos.com/en-us/2022/03/29/horde-of-miner-bots-and-backdoors-leveraged-log4j-to-attack-vmware-horizon-servers/


Proofpoint·¢Ã÷Õë¶ÔÃÀ¹ú½ÌÓýÐÐÒµµÄ´ó¹æÄ£´¹ÂÚÔ˶¯


https://www.proofpoint.com/us/blog/threat-insight/school-hard-knocks-job-fraud-threats-target-university-students