Ñо¿ÈËÔ±ÔÚ¶à¸öÄ¿±êϵͳÉϼì²âµ½Â©¶´ÀûÓù¤¾ßIceApple

Ðû²¼Ê±¼ä 2022-05-13
1¡¢Ñо¿ÈËÔ±ÔÚ¶à¸öÄ¿±êϵͳÉϼì²âµ½Â©¶´ÀûÓù¤¾ßIceApple


¾ÝýÌå5ÔÂ11ÈÕ±¨µÀ £¬CrowdStrike·¢ÏÖÁËÒ»ÖÖеĩ¶´ÀûÓù¤¾ßIceApple¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äêµ×Ê״α»·¢ÏÖ £¬Ä¿Ç°ÈÔÔÚ»ý¼«¿ª·¢ÖС£IceAppleÊǹ¥»÷ÕßÔÚ»ñµÃÖÖÖÖÐÐÒµ£¨¼¼Êõ¡¢Ñ§ÊõºÍÕþ¸®£©×éÖ¯ÍøÂçµÄ³õʼ·ÃÎÊȨÏÞºó°²×°µÄ £¬Ä¿Ç°ÒÑÔÚ¶à¸öÄ¿±êµÄMicrosoft Exchange ServerʵÀýÉϼì²âµ½ £¬µ«ËüÒ²¿ÉÒÔÔÚIISÉÏÔËÐС£¸Ã¶ñÒâ¿ò¼Ü»ùÓÚ.NET £¬¾ßÓÐÖÁÉÙ18¸öÄ£¿é £¬Ã¿¸öÄ£¿éÓÃÓÚÌض¨ÈÎÎñ £¬¿ÉÓÃÀ´·¢ÏÖÍøÂçÉϵÄÏà¹ØÉ豸¡¢ÇÔȡƾ¾Ý¡¢É¾³ýÎļþºÍĿ¼ÒÔ¼°ÇÔÈ¡ÓмÛÖµµÄÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/new-iceapple-exploit-toolset-deployed-on-microsoft-exchange-servers/


2¡¢ÐµÄNerbian RATÃé×¼Òâ´óÀûºÍÎ÷°àÑÀµÈÅ·ÖÞ¹ú¼Ò


5ÔÂ11ÈÕ £¬ProofpointÅû¶ÁËÐÂNerbian RATµÄ¹¥»÷»î¶¯µÄϸ½ÚÐÅÏ¢¡£¹¥»÷»î¶¯×Ô4ÔÂ26ÈÕ¿ªÊ¼ £¬Í¨¹ýÒÔCOVID-19ºÍºÍÊÀ½çÎÀÉú×é֯ΪÖ÷ÌâµÄµöÓã»î¶¯·Ö·¢¶ñÒâÈí¼þ £¬Ö÷ÒªÕë¶ÔÒâ´óÀû¡¢Î÷°àÑÀºÍÓ¢¹úµÄ×éÖ¯¡£NerbianÓÉGoÓïÑÔ±àд £¬Îª64λϵͳ±àÒë £¬ÀûÓÃÁ˶à¸ö¼ÓÃܹý³ÌÈƹýÄþ¾²·ÖÎö¡£Dropper»¹ÀûÓÃÁË¿ªÔ´ChacalµÄ¡°·´VM¿ò¼Ü¡±À´Ôö¼ÓÄæÏò¹¤³ÌµÄÄѶÈ¡£¾ÝϤ £¬DropperºÍRAT¶¼ÊÇÓÉͬһ¿ª·¢Õß¿ª·¢µÄ £¬µ«¹¥»÷ÕßµÄÉí·ÝÈÔȻδ֪¡£


https://www.proofpoint.com/us/blog/threat-insight/nerbian-rat-using-covid-19-themes-features-sophisticated-evasion-techniques


3¡¢Ó¢¹úÄÐ×Ó±»Ö¸¿ØÈëÇÖÃÀ¹úij½ðÈÚ»ú¹¹ËðʧÁè¼Ý500ÍòÃÀÔª


¾Ý5ÔÂ11ÈÕ±¨µÀ £¬32ËêµÄÓ¢¹úÄÐ×ÓIdris Dayo Mustapha±»Ö¸¿ØÈëÇÖÃÀ¹úij½ðÈÚ»ú¹¹ £¬Ôì³ÉÁè¼Ý500ÍòÃÀÔªµÄËðʧ¡£5ÔÂ10ÈÕ¹ûÈ»µÄͶËßÏÔʾ £¬¸ÃÄÐ×ÓÊÇijºÚ¿ÍÍÅ»ïµÄÒ»Ô± £¬ËûÃÇÔÚ2011Äê1ÔÂÖÁ2018Äê3ÔÂÆÚ¼äʹÓõöÓãµÈ¹¥»÷·½Ê½»ñÈ¡Óû§Æ¾¾Ý £¬ÒÔÇÔÈ¡ÍøÉÏÒøÐÐÕË»§ºÍ֤ȯ¾­¼ÍÕË»§ÖеÄ×ʽð¡£Èç¹û×ïÃû½¨Á¢ £¬Mustapha½«Òòµç»ãÕ©Æ­¡¢Ö¤È¯Õ©Æ­ºÍÏ´Ç®µÈÖ¸¿ØÃæÁÙ³¤´ï20ÄêµÄ¼à½û¡£


https://www.infosecurity-magazine.com/news/british-charged-hacking-us-bank/


4¡¢ÄϷǹ«Ë¾Dis-ChemÔâµ½¹¥»÷й¶Áè¼Ý360ÍòÈ˵ÄÐÅÏ¢


ýÌå5ÔÂ11ÈÕ±¨µÀ £¬ÄÏ·Ç×î´óµÄÒ©Æ·ÁãÊÛÉÌÖ®Ò»Dis-ChemÒÑй¶Áè¼Ý360ÍòÈ˵ÄÐÅÏ¢¡£¾Ý¸Ã¹«Ë¾³Æ £¬´Ë´ÎʼþÊÇÓÉÆäµÚÈý·½·þÎñÌṩÉÌÔâµ½ÍøÂç¹¥»÷µ¼ÖµÄ £¬Éæ¼°¿Í»§µÄÐÕÃû¡¢ÓʼþµØÖ·ºÍÊÖ»úºÅÂëµÈÐÅÏ¢¡£Ð¹Â¶·¢ÉúÔÚ4ÔÂ28ÈÕ £¬ÔÚ5ÔÂ1Èղű»·¢ÏÖ¡£½üÆÚ £¬¹¥»÷ÕßÔ½À´Ô½¶àµØÕë¶ÔÄϷǵÄ×éÖ¯ £¬2¸öÔÂÇ° £¬ÃÀ¹úÏû·ÑÕßÐÅÓóÂËß»ú¹¹TransUnion³ÆÆäλÓÚÄϷǵķþÎñÆ÷±»ÈëÇÖ £¬Ð¹Â¶ÁË5400ÍòÓû§µÄÐÅÏ¢¡£


https://www.itweb.co.za/content/PmxVE7KEABOqQY85


5¡¢CiscoÐû²¼BitterÍŻ﹥»÷ÃϼÓÀ­Õþ¸®Ä³»ú¹¹µÄ³ÂËß


Cisco TalosÔÚ5ÔÂ11ÈÕÐû²¼Á˹ØÓÚAPT×éÖ¯Bitter¹¥»÷ÃϼÓÀ­¹úµÄ·ÖÎö³ÂËß¡£¹¥»÷»î¶¯¿ªÊ¼×Ô2021Äê8Ô £¬Õë¶ÔÃϼÓÀ­ÄÚ²¿µÄÖÖÖÖ×éÖ¯ £¬¾ßÓÐÁ½ÌõѬȾÁ´ £¬¾ùͨ¹ýÓã²æʽµöÓã»î¶¯½øÐС£µöÓãÓʼþÀ´×Ô°Í»ù˹̹µÄÕþ¸®»ú¹¹ £¬Õâ¿ÉÄÜÊÇÀûÓÃÓʼþ·þÎñÆ÷ZimbraÖеÄÒ»¸ö©¶´À´ÊµÏÖ¡£Á½ÌõѬȾÁ´Ö®¼äµÄÇø±ðÔÚÓÚ¸½¼ÓµÄ¶ñÒâÎļþÀàÐÍ£ºÒ»¸öÊÇ.RTF £¬ÁíÒ»¸öÊÇ.XLSXÎĵµ¡£RTFÎĵµÀûÓÃÁË©¶´CVE-2017-11882²¢ÔÚÄ¿±êÖÐÔ¶³ÌÖ´ÐдúÂë £¬ExcelÎĵµ´¥·¢Á˶ÔCVE-2018-0798ºÍCVE-2018-0802µÄ©¶´ÀûÓá£


https://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html


6¡¢¶à¹úÕþ¸®Ðû²¼Õë¶ÔMSP¼°Æä¿Í»§µÄÍøÂçÍþвµÄÁªºÏ×Éѯ 


5ÔÂ11ÈÕ £¬°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢Ó¢¹úºÍÃÀ¹úµÄ¶à¸öÍøÂçÄþ¾²»ú¹¹Ðû²¼ÁËÕë¶ÔÍйܷþÎñÌṩÉÌ(MSP)¼°Æä¿Í»§µÄÍøÂçÍþвµÄÁªºÏ×Éѯ¡£MSPÒѳÉΪ¹¥»÷ÕßÀ©´ó¹¥»÷¹æÄ£µÄ;¾¶ £¬ÒòΪÒ×Êܹ¥»÷µÄÌṩÉÌ¿ÉÒÔ±»ÎäÆ÷»¯²¢×÷Ϊ³õʼ·ÃÎÊÔØÌå £¬ÒÔͬʱ¹¥»÷¶à¸öÏÂÓοͻ§¡£×ÉѯÖн¨Òé £¬Ê¶±ðºÍ½ûÓò»ÔÙʹÓõÄÕÊ»§£»¶Ô·ÃÎÊ¿Í»§»·¾³µÄMSPÕË»§ÊµÊ©MFA £¬²¢¼à²âδ½âÊ͵Äʧ°ÜÈÏÖ¤£»È·±£MSP¿Í»§ºÏͬÀí½âÐÅÏ¢ºÍͨÐż¼Êõ(ICT)Äþ¾²½ÇÉ«ºÍÔðÈεÄËùÓÐȨ¡£


https://thehackernews.com/2022/05/government-agencies-warned-of-increase.html