Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯

Ðû²¼Ê±¼ä 2022-04-06

Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄ»î¶¯


3ÔÂ30ÈÕ£¬FortinetÐû²¼³ÂËß³ÆÆä¼ì²âµ½APT×éÖ¯Deep PandaµÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÀûÓÃLog4Shell©¶´¹¥»÷VMware Horizon·þÎñÆ÷£¬×îÖÕÖ¼ÔÚ°²×°Ò»¸öÃûΪFire ChiliµÄÐÂÐÍrootkit¡£¸ÃrootkitʹÓÃFrostburn Studios£¨ÓÎÏ·¿ª·¢ÉÌ£©ºÍComodo£¨Äþ¾²Èí¼þ£©µÄÖ¤Êé½øÐÐÊý×ÖÇ©Ãû£¬ÈƹýÄþ¾²¼ì²â¡£ÊÓ²ìDeep Panda»î¶¯Ê±£¬Fortinet·¢ÏÖÆäÓëWinntiÓÐÖØµþ¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶Ô½ðÈÚ¡¢Ñ§Êõ¡¢»¯×±Æ·ºÍÂÃÓÎÐÐÒµ¡£


https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits



Kaspersky³ÆLazarusÀûÓÃľÂí»¯DeFi Wallet·Ö·¢ºóÃÅ


KasperskyÔÚ3ÔÂ31ÈÕÐû²¼³ÂË߳ƣ¬³¯ÏʺڿÍÍÅ»ïLazarusÕýÔÚÀûÓÃľÂí»¯DeFiÓ¦Ó÷ַ¢ºóÃÅ¡£Ñо¿ÈËÔ±½üÆÚ·¢ÏÖÒ»¸öľÂí»¯DeFi Wallet£¬±àÒëÈÕÆÚΪ2021Äê11Ô£¬¿ÉÒÔÔÚÄ¿±êϵͳÉϰ²×°Ò»¸ö¹¦Ð§ÆëÈ«µÄºóÃÅ£¬¸ÃºóÃÅαװ³ÉÁËGoogle Chromeä¯ÀÀÆ÷¡£Ä¿Ç°Éв»Çå³þ¸ÃÓ¦Óõķַ¢ÒªÁ죬ÍƲâ¿ÉÄÜÊǵöÓãÓʼþ»òͨ¹ýÉ罻ýÌå¡£´ËÍ⣬¹¥»÷ÕßʹÓÃÁËλÓÚº«¹úµÄ·þÎñÆ÷ÓëºóÃŽøÐÐͨÐÅ¡£


https://securelist.com/lazarus-trojanized-defi-app/106195/



INKYÔÚ½üÆÚ·¢ÏÖÐÂÒ»ÂÖÀûÓÃCalendlyµÄµöÓã¹¥»÷»î¶¯


¾ÝýÌå3ÔÂ31ÈÕ±¨µÀ£¬INKYÑо¿ÍŶӷ¢ÏÖÀûÓÃCalendlyµÄµöÓã»î¶¯¡£CalendlyÊÇÒ»¿îÁ÷ÐеÄÃâ·ÑÈÕÀúÓ¦Ó㬼¯³ÉÁËZoom£¬¿ÉÓÃÓÚ²¿Êð»áÒéºÍÔ¼»á¡£´Ë´Î»î¶¯Ê¼ÓÚ2Ôµ×£¬¹¥»÷Õßͨ¹ýCalendlyƽ̨Éú³ÉµöÓãÓʼþ¡£Ê×ÏÈÀûÓÃCalendlyÌí¼Ó×Ô½ç˵Á´½ÓµÄ¹¦Ð§²åÈë¶ñÒâÁ´½Ó£¬¸ÃÁ´½ÓǶÈëÔÚ¼ì²ìÎĵµ°´¼üÖУ¬Óû§µã»÷ºó»á±»Öض¨Ïòµ½µöÓãÒ³Ãæ£¬×îÖÕÇÔȡĿ±êµÄMicrosoftµÇ¼ƾ¾Ý¡£


https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-microsoft-credentials-phishing/ 



PaloAlto Networks¶Ô¿Í»§ÌṩµÄ¼¼ÊõÖ§³ÖÐÅÏ¢ÒâÍâй¶


ýÌå3ÔÂ31ÈÕ±¨µÀ£¬PaloAlto Networks(PAN) Ö§³ÖϵͳÖÐÅäÖôíÎóµ¼Ö¿ͻ§µÄÃô¸ÐÐÅϢй¶¡£¸ÃÎÊÌâÓÉPANµÄÒ»¸ö¿Í»§ÔÚ±¾Ô·¢ÏÖ£¬Ëû³Æ¿ÉÒÔ¿´µ½Ô¼Äª1989¸ö²»ÊôÓÚËûÃǵÄ×éÖ¯µÄ¼¼ÊõÖ§³Öʼþ¼Ç¼£¬ÆäÖаüÂÞÓÃÓÚÅųý´íÎóµÄ·À»ðǽÈÕÖ¾¡¢ÅäÖÃת´¢ºÍÍøÂçÄþ¾²×é(NSG)½á¹¹µÈ¡£PANÌåÏÖûÓÐÈκÎÊý¾Ý±»ÏÂÔØ£¬²¢ÌåÏÖ´Ë´Îй¶Ê¼þµÄ·¶Î§½öÏÞÓÚһλ¿Í»§¡£¾ÝϤ£¬¸ÃÎÊÌâµÄÐÞ¸´Ô¼ÄªÐèÒª8Ììʱ¼ä¡£


https://www.bleepingcomputer.com/news/security/palo-alto-networks-error-exposed-customer-support-cases-attachments/



AquaÐû²¼Õë¶ÔJupyter NotebookµÄÀÕË÷Èí¼þµÄ·ÖÎö³ÂËß


Aqua SecurityÓÚ3ÔÂ29ÈÕÐû²¼ÁËÕë¶ÔJupyterµÄ»ùÓÚPythonµÄÀÕË÷Èí¼þµÄ·ÖÎö³ÂËß¡£Jupyter NotebookÊÇÊý¾ÝרҵÈËÔ±ÓÃÀ´´¦ÖÃÊý¾Ý¡¢±àдºÍÖ´ÐдúÂëÒÔ¼°¿ÉÊÓ»¯½á¹ûµÄ¿ªÔ´WebÓ¦Ó᣹¥»÷ÕßÊ×ÏÈͨ¹ýÅäÖôíÎóµÄÓ¦Ó÷ÃÎÊ·þÎñÆ÷£¬ÏÂÔØÓÃÓÚ¹¥»÷µÄ¿âºÍ¹¤¾ß£¨ÀýÈç¼ÓÃÜ·¨Ê½£©£¬È»ºóͨ¹ýÕ³ÌùPython´úÂë²¢Ö´Ðнű¾ÊÖ¶¯´´½¨ÀÕË÷Èí¼þ¡£¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬Ñо¿ÈËÔ±ÈÏΪ¿ÉÄÜÓë¶íÂÞ˹µÄºÚ¿ÍÍÅ»ïÓйØ¡£


https://blog.aquasec.com/python-ransomware-jupyter-notebook



Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroid¼äµýÈí¼þµÄ¼¼Êõ³ÂËß


4ÔÂ1ÈÕ£¬Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroid¼äµýÈí¼þµÄ¼¼Êõ³ÂËß¡£½üÆÚ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪProcess ManagerµÄ¶ñÒâAPK¡£Ò»µ©°²×°£¬Ëü»áʹÓóÝÂÖÐÎͼ±êÒþ²ØÔÚAndroidÉ豸ÉÏ£¬Î±×°³Éϵͳ×é¼þ£¬²¢ÒªÇó»ñÈ¡É豸µÄλÖᢷ¢ËͺÍÔĶÁÎı¾¡¢·ÃÎÊ´æ´¢¡¢Ê¹ÓÃÏà»úÅÄÕÕÒÔ¼°Â¼ÖÆÒôƵµÈ18ÏîȨÏÞ¡£Ëü»¹»áÏÂÔØÆäËüµÄpayload£¬ÀýÈçRoz Dhan£¬¸Ã¼äµýÈí¼þ¿ÉÄÜ»áͨ¹ý´ËÖÖ·½Ê½£¬×¬È¡ÍƼöÓ¦ÓõÄÓ¶½ð¡£


https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/




Äþ¾²¹¤¾ß


Socid-Extractor


´Ó¸öÈË×ÊÁÏÍøÒ³/API ÏìÓ¦ÖÐÌáÈ¡ÓйØÓû§µÄÐÅÏ¢£¬²¢½«ÆäÉú´æÎª»úÆ÷¿É¶Á¸ñʽ¡£


https://github.com/soxoj/socid-extractor


GitBleed Tools


ÓÃÓÚ´Ó¾µÏñ git ´æ´¢¿âÖÐÌáÈ¡Êý¾Ý¡£


https://github.com/nightwatchcybersecurity/gitbleed_tools


ggshield


ÊÇÒ»¸ö CLI Ó¦Ó÷¨Ê½£¬¼ì²âÔ´´úÂëÖеÄÃÜÂë¡£


https://github.com/GitGuardian/ggshield


PackMyPayload


ÓÃÓÚ½«payload´ò°üµ½×÷Ϊ´æµµ/ÈÝÆ÷µÄÊä³öÎļþÖС£


https://securityonline.info/packmypayload-packages-payloads-into-output-containers/




Äþ¾²·ÖÎö


ºÚ¿ÍÂÛ̳ÉϳöÊÛµÄРBlackGuard ÃÜÂëÇÔÈ¡¶ñÒâÈí¼þ


https://www.bleepingcomputer.com/news/security/new-blackguard-password-stealing-malware-sold-on-hacker-forums/


FORCEDENTRY£ºÉ³ºÐÌÓÒÝ


https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html


Microsoft Build ½«ÓÚ 5 Ô 24 ÈÕÆô¶¯


https://news.softpedia.com/news/microsoft-build-will-kick-off-on-may-24-535139.shtml


Atento³ÆÈ¥ÄêµÄLockBitÀÕË÷¹¥»÷Ôì³É4200ÍòÃÀÔªËðʧ


https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/


Anonymous¹¥»÷¶íÂÞ˹Ͷ×ʹ«Ë¾Thozis Corp


https://securityaffairs.co/wordpress/129651/hacktivism/anonymous-hacked-thozis-corp.html


ÍøÂçµöÓãʹÓà Azure ¾²Ì¬ÍøÒ³Ã°³ä΢Èí


https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-web-pages-to-impersonate-microsoft/