Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȹ̵ÄÎó²îCVE-2023-28489
Ðû²¼Ê±¼ä 2023-05-091¡¢Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȹ̵ÄÎó²îCVE-2023-28489
¾ÝýÌå5ÔÂ5ÈÕ±¨µÀ£¬Î÷ÃÅ×ÓÐÞ¸´ÁËÓ°ÏìSicam A8000 CP-8031ºÍCP-8050²úÆ·µÄCPCI85¹Ì¼þµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2023-28489£©¡£ÕâЩ²úÆ·ÊÇÔ¶³ÌÖն˵¥Î»(RTU)£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÍêÈ«¿ØÖÆ×°±¸£¬Ó°ÏìµçÍøµÄÎȹ̣¬ÉõÖÁ¿Éͨ¹ý¸ü¸ÄÒªº¦×Ô¶¯»¯²ÎÊýµ¼ÖÂÍ£µç£¬»¹¿ÉÒÔʹÓøÃÎó²î×°ÖúóÃÅ¡£²¹¶¡Ôڹ̼þ°æ±¾CPCI85 V05»ò¸ü¸ß°æ±¾ÖпÉÓ㬸ù«Ë¾»¹Ö¸³ö£¬Í¨¹ýʹÓ÷À»ðǽÏÞÖÆ¶ÔTCP¶Ë¿Ú80ºÍ443ÉϵÄWeb·þÎñÆ÷µÄ»á¼û£¬Ò²¿ÉÒÔ»º½â¸ÃÎó²î¡£
https://www.securityweek.com/critical-siemens-rtu-vulnerability-could-allow-hackers-to-destabilize-power-grid/
2¡¢ÃÀ¹úNextGen HealthcareÔ¼100ÍòÓû§µÄÐÅϢй¶
¾Ý5ÔÂ8ÈÕ±¨µÀ£¬ÃÀ¹úÈí¼þºÍ·þÎñ¹«Ë¾NextGen Healthcareй¶ÁËÔ¼100ÍòÈ˵ÄÐÅÏ¢¡£¸Ã¹«Ë¾Ö÷ҪΪҽÁƱ£½¡ÐÐÒµ¿ª·¢ºÍÏúÊÛµç×Ó¿µ½¡¼Í¼£¨EHR£©Èí¼þºÍʵ¼ùÖÎÀíϵͳ¡£¾ÝϤ£¬Ð¹Â¶ÊÂÎñÓÚ4ÔÂ24ÈÕ±»·¢Ã÷£¬¸Ã¹«Ë¾ÊÓ²ìÈ·¶¨¹¥»÷ÕßÔÚ3ÔÂ29ÈÕÖÁ4ÔÂ14ÈÕ»á¼ûÁ˹«Ë¾µÄϵͳ£¬Ó°ÏìÁË1049375ÈË¡£¹«Ë¾Í¸Â¶¹¥»÷ÕßʹÓÃÁËËÆºõÊÇ´ÓÆäËüȪԴ»òÓëNextGenÎ޹صĹ¥»÷ÊÂÎñÖÐÇÔÈ¡µÄ¿Í»§¶Ëƾ֤»á¼ûÊý¾Ý¿â£¬ËüÃÇÖØÐÂÉèÖÃÁËÃÜÂëÒÔ¿ØÖƸÃÊÂÎñ¡£ÕâÊÇNextGenÔÚ½ñÄ걬·¢µÄµÚ¶þÆðй¶ÊÂÎñ£¬1ÔÂ19ÈÕ£¬ËüÔâµ½ÁËBlackCatµÄÀÕË÷¹¥»÷¡£
https://securityaffairs.com/145935/data-breach/nextgen-healthcare-data-breach.html
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢Ã÷Ö¼ÔÚ·Ö·¢SmokeLoaderµÄ´¹ÂÚÔ˶¯
ýÌå5ÔÂ8Èճƣ¬ÎÚ¿ËÀ¼CERT-UAÅû¶ÁËÒÔ¶àÓïÑÔÎļþµÄÐÎʽ·Ö·¢¶ñÒâÈí¼þSmokeLoaderµÄ´¹ÂÚÔ˶¯¡£¹¥»÷ÕßʹÓñ»Ñ¬È¾ÕÊ»§·¢ËÍÒÔ¡°Õ˵¥/¸¶¿î¡±ÎªÖ÷ÌâµÄÓʼþ£¬¸½¼þΪZIPÎĵµ¡£Õâ¸öZIPÊÇÒ»¸ö¶àÓïÑÔÎļþ£¬°üÀ¨Ò»¸öÓÕ¶üÎĵµºÍÒ»¸öJavaScriptÎļþpax_2023_AB1058..js¡£JavaScriptÎļþʹÓÃPowerShell£¬ÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþportable.exe£¬Ëü½«Æô¶¯¶ñÒâÈí¼þSmokeLoader¡£¶ÔÓòÃû×¢²áÈÕÆÚºÍÎļþ±àÒëÈͮ򵀮ÊÎöÅú×¢£¬¸ÃÔ˶¯Ê¼ÓÚ4Ô·ݣ¬CERT-UA½«¸ÃÔ˶¯¹éÒòÓÚUAC-0006¡£
https://securityaffairs.com/145911/malware/cert-ua-smokeloader-campaign.html
4¡¢Ñо¿Ö°Ô±Åû¶AkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢
5ÔÂ7ÈÕ±¨µÀ³Æ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËAkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷¡£AkiraÓÚ3Ô·ÝÍÆ³ö£¬Éù³ÆÒѹ¥»÷ÁË16¼Ò¹«Ë¾£¬Éæ¼°½ÌÓý¡¢½ðÈÚ¡¢·¿µØ²ú¡¢ÖÆÔìºÍ×ÉѯµÈ¸÷¸öÐÐÒµ¡£ËäÈ»ÁíÒ»¸öÃûΪAkiraµÄÀÕË÷Èí¼þÒÑÓÚ2017ÄêÐû²¼£¬µ«¾ÝÐÅÓëÕâЩÔ˶¯²¢²»Ïà¹Ø¡£Akira»áÔËÐÐPowerShellÏÂÁîɾ³ý¾íÓ°¸±±¾£¬¼ÓÃÜÎļþ²¢¸½¼ÓÀ©Õ¹Ãû.akira£¬È»ºóÔÚÿ¸öÎļþ¼ÐÁôÏÂÊê½ð¼Í¼akira_readme.txt¡£ÆäÊê½ðÒªÇó´Ó20ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£
https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
5¡¢FortiGuard·¢Ã÷SideCopyÍÅ»ïÕë¶ÔÓ¡¶ÈµÄ¹¥»÷Ô˶¯
5ÔÂ4ÈÕ£¬FortiGuard³ÆÆä·¢Ã÷ÁËSideCopyÍÅ»ïʹÓÃÓ¡¶È¾üÊÂÑо¿×éÖ¯Ïà¹ØÖ÷ÌâµÄ¹¥»÷Ô˶¯¡£¹¥»÷ÕßʹÓÃÓëÓ¡¶È¹ú·ÀÑо¿ÓëÉú³¤×éÖ¯(DRDO)ÓйصÄZIPÎļþÀ´·Ö·¢¶ñÒâÈí¼þ¡£ZipÎļþ°üÀ¨Ò»¸ö¿ì½Ý·½·¨Îļþ£¬Ëü»áʹÓÃHTAs³ÌÐò»òmshta.exe¶¨Ïòµ½¹¥»÷ÕßµÄÓò¡£ÔÚÕâÀÏÂÁîÐвÎÊýÖ¸ÏòÒ»¸öURL£¬»áÏÂÔØ²¢Ö´ÐÐÒ»¸ö¶ñÒâÎļþPantomime.hta¡£±ðµÄ£¬ÓëÒÔÍùµÄÔ˶¯ÓÐËù²î±ð£¬´Ë´ÎµÄpayloadËÆºõÊÇʹÓù¤¾ßSILENTTRINITY½¨ÉèµÄ¡£
https://www.fortinet.com/blog/threat-research/clean-rooms-nuclear-missiles-and-sidecopy
6¡¢CleafyÐû²¼drIBANÕë¶ÔÒâ´óÀûµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
5ÔÂ4ÈÕ£¬CleafyÐû²¼Á˹ØÓÚʹÓÃеÄWeb×¢È빤¾ß°üDrIBANµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£ÕâЩÔ˶¯µÄÒªº¦×é¼þdrIBAN£¬ÊÇÒ»¸ö¾ßÓÐǿʢATSÒýÇæµÄWeb×¢È빤¾ß°ü£¬¹¥»÷ÕßʹÓÃËüÀÖ³ÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬ÀýÈçÒøÐкͽðÈÚ»ú¹¹ÔڵǼºÍÖ§¸¶Àú³ÌÖнÓÄɵÄMFAºÍSCAÊÚȨ½×¶Î¡£¹¥»÷Á´Ê¼ÓÚ¾ÓÉÈÏÖ¤µÄÓʼþ£¨»òPECÓʼþ£©£¬¸½´øÒ»¸ö¿ÉÖ´ÐÐÎļþ£¬×÷ΪsLoad¶ñÒâÈí¼þµÄÏÂÔØ³ÌÐò¡£sLoadÊÇÒ»ÖÖÕì̽¹¤¾ß£¬»¹Í¨¹ýÀÄÓÃÕýµ±µÄWindows¹¤¾ß£¨ÈçPowerShellºÍBITSAdmin£©À´Ê¹ÓÃLotLÊÖÒÕ¡£´Ë´ÎÔ˶¯Ö÷ÒªÕë¶ÔÒâ´óÀû½ðÈÚÐÐÒµ¡£
https://www.cleafy.com/cleafy-labs/uncovering-driban-fraud-operations-chapter1


¾©¹«Íø°²±¸11010802024551ºÅ