³¯ÏÊLazarus GroupʹÓÃChromeÁãÈÕÎó²îÌᳫ¹¥»÷

Ðû²¼Ê±¼ä 2024-10-28
1. ³¯ÏÊLazarus GroupʹÓÃChromeÁãÈÕÎó²îÌᳫ¹¥»÷


10ÔÂ24ÈÕ £¬³¯ÏʺڿÍ×éÖ¯Lazarus Group±»Ö¸Ê¹ÓÃGoogle ChromeµÄÏÖÒÑÐÞ²¹Çå¾²Îó²îCVE-2024-4947¾ÙÐÐÁãÈÕ¹¥»÷ £¬¿ØÖÆÊÜѬȾװ±¸¡ £¿¨°Í˹»ù¹«Ë¾ÔÚ2024Äê5Ô·¢Ã÷ÁËÒ»ÌõÕë¶Ô¶íÂÞ˹¹«ÃñµÄ¹¥»÷Á´ £¬¹¥»÷ͨ¹ýÐéαµÄ¼ÓÃÜÇ®±ÒÁìÓòÓÎÏ·ÍøÕ¾"detankzone[.]com"´¥·¢Îó²î¡£¸ÃÍøÕ¾Î±×°³ÉÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©NFTµÄ¶àÈËÔÚÏßÕ½¶·¾º¼¼³¡£¨MOBA£©Ì¹¿ËÓÎÏ· £¬ÊµÔò°üÀ¨Òþ²Ø¾ç±¾ £¬ÔÚÓû§ä¯ÀÀÆ÷ÖÐÔËÐÐÎó²î £¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊܺ¦ÕßPCµÄÍêÈ«¿ØÖÆ¡£±ðµÄ £¬Lazarus Group»¹±»ÏÓÒÉÇÔÈ¡ÁËÒ»¿îÕýµ±Çø¿éÁ´±ßÍæ±ß׬£¨P2E£©ÓÎÏ·µÄÔ´´úÂëºÍÇ®±Ò £¬ÓÃÓÚʵÏÖÆä¹¥»÷Ä¿µÄ¡ £¿¨°Í˹»ùÖ¸³ö £¬LazarusÊÇ×î»îÔ¾¡¢×îÖØ´óµÄAPT¹¥»÷ÕßÖ®Ò» £¬¾­¼ÃÀûÒæÊÇÆäÖ÷ÒªÄîÍ· £¬ÇÒÆäÕ½ÂÔÔÚÒ»Ö±Ñݱä £¬Ê¹ÓÃÌìÉúʽÈ˹¤ÖÇÄܵÈÐÂÊÖÒÕÌᳫ¸üÖØ´óµÄ¹¥»÷¡£


https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html


2. Fortinet FortiManager RCEÁãÈÕÎó²îÔÚÒ°ÍⱻʹÓÃ


10ÔÂ24ÈÕ £¬ÍøÂçÇå¾²¹«Ë¾Fortinet¿ËÈÕÅû¶ÁËÆäÈí¼þ²úÆ·FortiManager±£´æÒ»¸öÒªº¦ÁãÈÕÎó²î£¨CVE-2024-47575£© £¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî £¬ÇÒÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó᣸ÃÎó²îµÄCVSS v3ÆÀ·Ö¸ß´ï9.8 £¬Ó°Ïì¶à¸ö°æ±¾µÄFortiManager¼°FortiManager Cloud¡£FortinetÒÑÐû²¼²¹¶¡²¢ÌṩÁ˶àÖÖ½â¾öÒªÁì¡£¾Ý±¨¸æ £¬¸ÃÎó²îÒѱ»ÓÃÓÚй¶Ãô¸ÐÎļþ £¬°üÀ¨IPµØµã¡¢Æ¾Ö¤ºÍ×°±¸ÉèÖà £¬µ«ÉÐδ·¢Ã÷¶ñÒâÈí¼þ»òºóÃÅ×°Öá£Íþв×éÖ¯UNC5820×Ô2024Äê6ÔÂ27ÈÕÆð¾ÍʹÓôËÎó²î £¬»ñÈ¡ÁËFortiGate×°±¸ÉèÖÃÊý¾Ý £¬°üÀ¨Óû§¼ÓÃÜÃÜÂë £¬¿ÉÄÜÓÃÓÚ½øÒ»²½ÆÆËðºÍºáÏòÒÆ¶¯¡£MandiantÎÞ·¨È·¶¨¹¥»÷ÕßÉí·ÝºÍÄ¿µÄ £¬½¨ÒéËùÓÐ̻¶ÔÚ»¥ÁªÍøÉϵÄFortiManager×éÖ¯Á¬Ã¦¾ÙÐÐȡ֤ÊӲ졣Fortinet±Þ²ßÓû§Á¬Ã¦Éý¼¶ÖÁÇå¾²°æ±¾ £¬²¢½ÓÄÉ×èֹδ֪װ±¸×¢²á¡¢Ê¹ÓÃ×Ô½ç˵֤ÊéÉí·ÝÑéÖ¤µÈ½â¾öÒªÁì¡£


https://cybersecuritynews.com/fortimanager-zero-day-vulnerability/#google_vignette


3. FogÓëAkiraÀÕË÷Èí¼þʹÓÃSonicWall VPNÎó²îƵÈÔÈëÇÖÆóÒµÍøÂç


10ÔÂ27ÈÕ £¬FogºÍAkiraÀÕË÷Èí¼þÔËÓªÉÌÕýÔ½À´Ô½¶àµØÊ¹ÓÃSonicWall VPNÕÊ»§ÈëÇÖÆóÒµÍøÂç £¬Òªº¦Îó²îCVE-2024-40766±»ÒÔΪÊÇÆäÈëÇÖµÄÖ÷ҪͨµÀ¡£SonicWallÓÚ2024Äê8ÔÂÏÂÑ®ÐÞ¸´Á˸ÃÎó²î £¬µ«Ò»Öܺó±ãÖÒÑÔ³ÆÎó²îÒѱ»Æð¾¢Ê¹Óᣱ±¼«ÀÇÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬AkiraÀÕË÷Èí¼þÁ¥Êô»ú¹¹ÒÑʹÓøÃÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¾ÝArctic Wolf±¨¸æ £¬AkiraºÍFogÖÁÉÙ¾ÙÐÐÁË30´ÎÈëÇÖ £¬¾ùʼÓÚͨ¹ýSonicWall VPNÕÊ»§Ô¶³Ì»á¼û¡£ÆäÖÐ £¬75%µÄ°¸¼þÓëAkiraÓÐ¹Ø £¬ÆäÓàΪFogËùΪ¡£ÕâÁ½¸ö×éÖ¯ËÆºõ¹²Ïí»ù´¡ÉèÊ© £¬Åú×¢ÈÔ±£´æ·ÇÕýʽÏàÖú¡£ËùÓб»¹¥ÆÆµÄ¶Ëµã¶¼ÔËÐÐÒ×Êܹ¥»÷µÄδÐÞ²¹°æ±¾ £¬ÇÒ´ÓÈëÇÖµ½Êý¾Ý¼ÓÃܵÄʱ¼äͨ³£½Ï¶Ì £¬×î¿ì½öÐè1.5-2Сʱ¡£ÍþвÐÐΪÕßͨ¹ýVPN/VPS»á¼û¶Ëµã²¢»ìÏýÕæÊµIPµØµã¡£ÊÜѬȾ×é֯δÆôÓöàÒòËØÉí·ÝÑéÖ¤ £¬Ò²Î´ÔÚĬÈ϶˿ÚÉÏÔËÐзþÎñ¡£ÈëÇÖÀú³ÌÖÐ £¬ÊÓ²ìµ½ÌØ¶¨ÐÂÎÅÊÂÎñIDÅú×¢Ô¶³ÌÓû§µÇ¼ºÍIP·ÖÅÉÀֳɡ£ÍþвÐÐΪÕßÖ÷ÒªÕë¶ÔÐéÄâ»ú¼°Æä±¸·ÝÌᳫ¿ìËÙ¼ÓÃܹ¥»÷ £¬²¢ÇÔÈ¡ÎĵµºÍרÓÐÈí¼þ £¬µ«²»¹Ø×¢Áè¼ÝÁù¸öÔ»ò30¸öÔµÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/


4. BlackBastaÀÕË÷Èí¼þÐж¯Ê¹ÓÃMicrosoft Teams¾ÙÐÐÉç»á¹¤³Ì¹¥»÷


10ÔÂ25ÈÕ £¬BlackBastaÀÕË÷Èí¼þÐж¯×Ô2022Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾ £¬¶ÔÈ«ÇòÊý°ÙÆðÆóÒµ¹¥»÷ÈÏÕæ¡£¸Ã×é֯ͨ¹ýÎó²î¡¢ÏàÖú¡¢¶ñÒâÈí¼þ½©Ê¬ÍøÂçºÍÉç»á¹¤³ÌѧµÈ¶àÖÖÒªÁìÆÆËðÍøÂç¡£×î½ü £¬BlackBastaµÄÁ¥Êô»ú¹¹½«Éç»á¹¤³Ì¹¥»÷×ªÒÆµ½ÁËMicrosoft TeamsÉÏ £¬ËûÃÇðûÊÕ˾IT×ÊÖų́ÁªÏµÔ±¹¤ £¬Ð­Öú½â¾öÀ¬»øÓʼþÎÊÌâ¡£¹¥»÷ÕßÊ×ÏÈÓõç×ÓÓʼþÑÍûԱ¹¤µÄÊÕ¼þÏä £¬È»ºóÒÔÍⲿÓû§µÄÉí·Ýͨ¹ýMicrosoft TeamsÁªÏµÔ±¹¤ £¬ÕâЩÕÊ»§ÊÇÔÚEntra ID×⻧Ͻ¨ÉèµÄ £¬Ãû³Æ¿´ÆðÀ´ÏñÊÇ×ÊÖų́¡£ÔÚ̸ÌìÖÐ £¬¹¥»÷Õß·¢ËͶþάÂë»òÓÕÆ­Óû§×°ÖÃAnyDeskÔ¶³ÌÖ§³Ö¹¤¾ß»òÆô¶¯Windows Quick AssistÔ¶³Ì¿ØÖÆºÍÆÁÄ»¹²Ïí¹¤¾ß £¬ÒÔ±ãÔ¶³Ì»á¼ûÓû§µÄ¹«Ë¾×°±¸¡£Ò»µ©ÅþÁ¬ £¬¹¥»÷Õß»á×°ÖÃÖÖÖÖÓÐÓÃÔØºÉ £¬ÈçScreenConnect¡¢NetSupport ManagerºÍCobalt Strike £¬ÒÔÒ»Á¬Ô¶³Ì»á¼ûÓû§µÄ¹«Ë¾×°±¸ £¬²¢ºáÏòÀ©É¢µ½ÆäËû×°±¸ £¬Í¬Ê±ÌáÉýȨÏÞ¡¢ÇÔÈ¡Êý¾Ý £¬²¢×îÖÕ°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÆ÷¡£ReliaQuest½¨Òé×éÖ¯ÏÞÖÆMicrosoft TeamsÖÐÀ´×ÔÍⲿÓû§µÄͨѶ £¬²¢ÆôÓÃÈÕÖ¾¼Í¼ÒÔ²éÕÒ¿ÉÒÉ̸Ìì¡£


https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/


5. ÑÇÂíÑ·²é·âAPT29ºÚ¿Í×éÖ¯¹¥»÷ÓòÃû


10ÔÂ25ÈÕ £¬ÑÇÂíÑ·ÒѲé·â¶íÂÞ˹APT29ºÚ¿Í×éÖ¯ÓÃÓÚÕþ¸®ºÍ¾üÊÂ×éÖ¯Õë¶ÔÐÔ¹¥»÷µÄÓòÃû¡£APT29 £¬Óֳơ°Cozy Bear¡±ºÍ¡°Midnight Blizzard¡± £¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾ÖÓÐÁªÏµ £¬ÉÆÓÚʹÓÃÍøÂç´¹ÂںͶñÒâÈí¼þÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£´Ë´Î¹¥»÷ÖÐ £¬APT29ͨ¹ýαװ³ÉAWSÓòÃûµÄÍøÂç´¹ÂÚÒ³Ãæ £¬ÓÕÆ­Ä¿µÄÐÅÍв¢Ê¹ÓöñÒâÔ¶³Ì×ÀÃæÐ­ÒéÅþÁ¬Îļþ £¬ÒÔÇÔÈ¡Windowsƾ֤ºÍÊý¾Ý¡£Ö»¹ÜÑÇÂíÑ·³ÎÇåÆäÔÆÆ½Ì¨²¢·ÇÖ±½ÓÄ¿µÄ £¬µ«ÈÔÁ¬Ã¦Æô¶¯Á˲é·âð³äAWSÓòÃûµÄ³ÌÐò¡£APT29ÒԸ߶ÈÖØ´óµÄ¹¥»÷ÖøÃû £¬Õë¶ÔÈ«ÇòÕþ¸®¡¢ÖÇ¿âºÍÑо¿»ú¹¹ £¬ÇÒ×î½üÔ˶¯¹æÄ£ÆÕ±é £¬°üÀ¨Ïò¸ü¶àÄ¿µÄ·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ¡£ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±·´Ó¦Ð¡×éÒ²Ðû²¼ÁËÏà¹ØÖÒÑÔ £¬²¢½¨Òé½ÓÄɶàÏî²½·¥ïÔÌ­¹¥»÷Ãæ £¬Èç×èÖ¹¡°.rdp¡±Îļþ¡¢ÏÞÖÆRDPÅþÁ¬µÈ¡£APT29ÈÔÊǶíÂÞ˹×îǿʢµÄÍøÂçÍþв֮һ £¬ÒÑÍùÒ»ÄêÖÐÔøÈëÇÖ¶à¸öÖ÷ÒªÈí¼þ¹©Ó¦ÉÌ £¬²¢Ê¹Ó÷þÎñÆ÷Îó²îÈëÇÖÈ«ÇòÖ÷Òª×éÖ¯¡£


https://www.bleepingcomputer.com/news/security/amazon-seizes-domains-used-in-rogue-remote-desktop-campaign-to-steal-data/


6. RansomHubºÚ¿Í×éÖ¯Éù³Æ¶ÔÄ«Î÷¸ç13¸ö»ú³¡ÔËÓªÉÌÌᳫ¹¥»÷


10ÔÂ26ÈÕ £¬ºÚ¿Í×éÖ¯RansomHub×î½üÉù³Æ¶ÔÄ«Î÷¸ç13¸ö»ú³¡ÔËÓªÉÌGrupo Aeroportuario del Centro Norte£¨OMA£©µÄÍøÂç¹¥»÷ÈÏÕæ £¬²¢ÍþвÈôÊDz»Ö§¸¶Êê½ð £¬½«Ð¹Â¶3TB±»µÁÊý¾Ý¡£OMAÔËÓª×ÅÄ«Î÷¸çÖв¿ºÍ±±²¿µØÇøµÄ»ú³¡ £¬½ñÄêÒѽӴý³¬1900ÍòÃûÂÿÍ¡£´Ë´ÎÍøÂçÊÂÎñÆÈʹOMAתÏò±¸ÓÃϵͳÒÔά³ÖÔËÓª £¬µ«ÏÔʾº½°àº½Õ¾Â¥Î»ÖÃµÄÆÁÄ»ÈÔÎÞ·¨Ê¹Óá£OMAÌåÏÖÕýÔÚÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¹æÄ£ £¬²¢ÒÑÖð²½»Ö¸´Ä³Ð©·þÎñ £¬µ«¶Ô¹«Ë¾ÔËÓªºÍ²ÆÎñ״̬δÔì³ÉÖØ´óµ¹ÔËÓ°Ï졣΢Èí±¾ÖÜÖ¸³ö £¬RansomHubÈÔÊÇÀÕË÷Èí¼þÁìÓò×î»îÔ¾µÄÍþв֮һ £¬¶à¸öÆäËûÍþвÐÐΪÕßÒ²¼ÌÐøÊ¹ÓÃÆä¶ñÒâÈí¼þ¾ÙÐй¥»÷¡£


https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator