Symantec·¢Ã÷LazarusÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷Ô˶¯

Ðû²¼Ê±¼ä 2022-04-18

1¡¢Symantec·¢Ã÷LazarusÍÅ»ïÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷Ô˶¯


4ÔÂ14ÈÕ £¬SymantecÐû²¼Á˹ØÓÚ³¯ÏʺڿÍÍÅ»ïLazarus×îÐÂÔ˶¯µÄÆÊÎö±¨¸æ¡£´Ë´ÎÔ˶¯ËƺõÊÇOperation Dream JobµÄÑÓÐø £¬×Ô2022Äê1ÔÂ×îÏÈ £¬Ö÷ÒªÕë¶Ô»¯Ñ§ÐÐÒµµÄ×éÖ¯¡£¹¥»÷ʼÓÚ¶ñÒâHTMÎļþ £¬¿ÉÄÜÊÇͨ¹ýÓʼþÖеĶñÒâÁ´½Ó»òWeb·Ö·¢µÄ¡£HTMÎļþ»á±»¸´ÖƵ½DLLÎļþscskapplink.dllÖÐ £¬²¢×¢Èëµ½Õýµ±µÄϵͳÖÎÀíÈí¼þINISAFE Web EX ClientÖС£scskapplink.dllÎļþͨ³£ÊÇ´øÓжñÒâµ¼³öµÄÊðÃûľÂí¹¤¾ß £¬¹¥»÷ÕßʹÓõÄÊðÃû°üÀ¨DOCTER USA,INCºÍ¡°A¡± MEDICAL OFFICE,PLLC¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical


2¡¢CiscoÐÞ¸´ÆäWLCÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2022-20695


ýÌå4ÔÂ14ÈÕ±¨µÀ £¬CiscoÒÑÐÞ¸´ÆäÎÞÏßLAN¿ØÖÆÆ÷(WLC)ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¸ÃÎó²î×·×ÙΪCVE-2022-20695 £¬CVSSÆÀ·ÖΪ10 £¬¿É±»ÓÃÀ´ÈƹýÉí·ÝÑéÖ¤¿ØÖƲ¢Í¨¹ýWLCµÄÖÎÀí½çÃæµÇ¼װ±¸¡£CiscoÔÚͨ¸æÖÐ³Æ £¬Õâ¸öÎó²îÊÇÓÉÓÚÃÜÂëÑéÖ¤Ë㷨ʵÑé²»µ±Ôì³ÉµÄ £¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆµÄƾ֤À´Ê¹ÓôËÎó²î £¬ÀÖ³ÉʹÓúó¿É»ñµÃÖÎÀíԱȨÏÞ²¢ÍêÈ«¿ØÖÆÄ¿µÄ×°±¸¡£¸Ã¹«Ë¾½¨ÒéÓû§¸üе½°æ±¾8.10.171.0ÒÔÐÞ¸´¸ÃÎó²î¡£


https://thehackernews.com/2022/04/critical-auth-bypass-bug-reported-in.html


3¡¢ÎÚ¿ËÀ¼CERT-UA¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄ¹¥»÷Ô˶¯


¾Ý4ÔÂ14Èյı¨µÀ £¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄÐÂÔ˶¯¡£µÚÒ»Æð´¹ÂÚÔ˶¯Í¨¹ýÃûΪMobilization Register.xlsµÄExcelÎĵµ·Ö·¢IcedID£¨ÓÖÃûBankBot£© £¬¸ÃÔ˶¯ÓëUAC-0041ÍÅ»ïÓйØ¡£µÚ¶þÆð´¹ÂÚÔ˶¯ÒÔ×ÜͳV.ZelenskyΪÎä×°²½¶Ó³ÉÔ±½ÒÏþÑ«ÕÂ×÷ΪÓÕ¶ü £¬Ê¹ÓÃÁËZimbra Collaboration SuiteÖеÄXSSÎó²î(CVE-2018-6882) ¹¥»÷Õþ¸®×éÖ¯¡£


https://www.bleepingcomputer.com/news/security/hackers-target-ukrainian-govt-with-icedid-malware-zimbra-exploits/


4¡¢ÀÕË÷ÍÅ»ïOldGremlinʹÓÃкóÃÅTinyFluffÃé×¼¶íÂÞ˹


ýÌå4ÔÂ14ÈÕ³Æ £¬Group-IB·¢Ã÷ÁËÀÕË÷ÍÅ»ïOldGremlinÕë¶Ô¶íÂÞ˹µÄÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷¡£¹¥»÷Õßð³ä¶íÂÞ˹һ¼Ò½ðÈÚ»ú¹¹µÄ¸ß¼¶»á¼ÆÊ¦ £¬Éù³Æ½üÆÚ¶Ô¶íÂÞ˹ʵÑéµÄÖÆ²Ã½«ÔÝÍ£VisaºÍMastercardÖ§¸¶´¦Öóͷ£ÏµÍ³µÄÔËÓª¡£´¹ÂÚÓʼþ½«ÊÕ¼þÈËÖØ¶¨Ïòµ½´æ´¢ÔÚDropboxÖеĶñÒâÎĵµ £¬²¢ÏÂÔØÒ»¸öÃûΪTinyFluffµÄ×Ô½ç˵ºóÃÅ £¬¸ÃºóÃÅÊÇTinyNodeµÄбäÖÖ £¬Ëü»áÆô¶¯Node.jsÚ¹ÊÍÆ÷²¢Ê¹¹¥»÷ÕßÔ¶³Ì»á¼ûÄ¿µÄϵͳ¡£


https://www.bleepingcomputer.com/news/security/oldgremlin-ransomware-gang-targets-russia-with-new-malware/


5¡¢Î÷°àÑÀ×ãЭRFEFÔâµ½¹¥»÷µ¼ÖÂÓʼþºÍÒôƵµÈÊý¾Ýй¶


¾ÝýÌå4ÔÂ15ÈÕ±¨µÀ £¬Î÷°àÑÀ»Ê¼Ò×ãÇòЭ»á£¨RFEF£©Ïò¾¯·½±¨¸æÆäÔâµ½ÍøÂç¹¥»÷¡£´Ë´Î¹¥»÷µ¼ÖÂЭ»áÖ÷ϯLuis RubialesºÍÃØÊ鳤Andreu CampsÔÚÄڵĸ߼¶ÖÎÀíÖ°Ô±µÄµç×ÓÓʼþÕÊ»§¡¢Ë½ÈËÎı¾ºÍÒôƵ¶Ô»°µÈÏà¹ØÐÅϢй¶¡£RFEFÔÚÉÏÖÜËĵÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ £¬±»µÁÐÅÏ¢ºÜ¿ÉÄÜÒÑÌṩӦ²î±ðµÄýÌå¡£ÓÐýÌåÉù³ÆÒÑͨ¹ýµÚÈý·½ÊÕµ½ÁËÉñÃØÌõÔ¼¡¢Ë½ÈËWhatsApp¶Ô»°¡¢µç×ÓÓʼþºÍ´ó×ÚÓйØRFEFÖÎÀíµÄÎļþ¡£


https://www.espn.com/soccer/spain-esp/story/4642921/spanish-fa-report-cyber-attack-to-police-after-email-accounts-private-texts-stolen


6¡¢Segran?a-InformaticaÐû²¼ÀÕË÷Èí¼þSunnyDayÆÊÎö±¨¸æ


4ÔÂ11ÈÕ £¬Segran?a-InformaticaÐû²¼Á˹ØÓÚÀÕË÷Èí¼þSunnyDayµÄÊÖÒÕÆÊÎö±¨¸æ¡£ËüÊÇÒ»¸ö»ùÓÚSALSA20Á÷ÃÜÂëµÄ¼òÆÓÀÕË÷Èí¼þ £¬´øÓÐǶÈëµÄRSA¹«Ô¿blob £¬ÓÃÓÚ¼ÓÃܶԳÆSALSA20ʹÓõÄÌìÉúÃÜÔ¿ £¬¸ÃÃÜÔ¿ÓÃÀ´¼ÓÃÜÄ¿µÄ×°±¸ÖеÄËùÓпÉÓÃÎļþ¡£ÆÊÎö·¢Ã÷ £¬SunnyDayÓëÆäËüÀÕË÷Èí¼þÑù±¾Ö®¼ä±£´æÏàËÆÖ®´¦ £¬ÀýÈçEver101¡¢Medusa Locker¡¢CuratorºÍPayment45 £¬µ«ÈÔÎÞ·¨¶ÔÆä¾ÙÐйéÒò¡£


https://seguranca-informatica.pt/analysis-of-the-sunnyday-ransomware/