ResecurityÌåÏÖ2022ÄêQ2Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ʼþÔö¼Ó
Ðû²¼Ê±¼ä 2022-07-081¡¢ResecurityÌåÏÖ2022ÄêQ2Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ʼþÔö¼Ó
7ÔÂ6ÈÕ£¬ResecurityÐû²¼³ÂËß³ÆÔÚ2022ÄêµÚ¶þ¼¾¶È£¬Õë¶ÔÖ´·¨»ú¹¹µÄ¹¥»÷ʼþÔö¼Ó¡£Í¨³££¬¹¥»÷Õß»áʹÓÃÉ繤¹¥»÷¼Æı£¬×î½üµÄÇ÷ÊÆÊÇÕë¶ÔÖ÷ÒªµÄ¼¼Êõ¹«Ë¾ºÍÔÚÏß·þÎñ£¨Èç Apple¡¢Facebook (Meta)¡¢Snapchat¡¢Discord£©·¢ËÍαÔìµÄ´«Æ±ºÍEDR£¨½ô¼±Êý¾ÝÇëÇ󣩣¬À´ÊÕ¼¯ÓйØÆäÄ¿±êµÄÐÅÏ¢¡£ResecurityÔÚ¶à¸ö°µÍøÊг¡Öз¢ÏÖ³öÊÛ¾¯²ìµÄÕÊ»§ºÍƾ¾Ý£¨µç×ÓÓʼþ¡¢VPNºÍSSOµÈ£©µÄÇé¿ö¡£Ñо¿±íÃ÷£¬´ËÀà¶ñÒâ»î¶¯ÔÚÀ¶¡ÃÀÖÞ¡¢¶«ÄÏÑǹú¼ÒºÍÀ밶˾·¨¹ÜϽÇøÓÈΪÃ÷ÏÔ¡£
https://resecurity.com/blog/article/cybercriminals-are-targeting-law-enforcement-agencies-worldwide
2¡¢CiscoÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¸ö²úÎïÖеÄ10¸ö©¶´
CiscoÔÚ7ÔÂ6ÈÕÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËÉæ¼°¶à¿î²úÎïµÄ10¸ö©¶´¡£ÆäÖУ¬×îÑÏÖصÄÊÇÓ°ÏìCisco ExpresswayϵÁкÍCisco TelePresence Video Communication Server(VCS)µÄ©¶´£¨CVE-2022-20812ºÍCVE-2022-20813£©£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´ÁýÕÖÈÎÒâÎļþ»ò¶ÔÄ¿±êÉ豸½øÐпÕ×Ö½ÚÖж¾¹¥»÷¡£Æä´Î£¬ÊÇSmart Software Manager On-PremÖеÄÒ»¸ö©¶´£¨CVE-2022-20808£©£¬¿É±»¾¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´Ðоܾø·þÎñ(DoS)¹¥»÷¡£
https://thehackernews.com/2022/07/cisco-and-fortinet-release-security.html
3¡¢Ó볯ÏÊÏà¹ØµÄÀÕË÷Èí¼þMauiÕë¶ÔÃÀ¹ú¸÷µØµÄÒ½ÁÆ»ú¹¹
7ÔÂ6ÈÕ£¬ÃÀ¹úFBI¡¢CISAºÍ²ÆÕþ²¿Ðû²¼ÁªºÏ×Éѯ£¬³ÆÓ볯ÏÊÓйصĹ¥»÷ÕßÀûÓÃÀÕË÷Èí¼þMaui¹¥»÷ÆäÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)×éÖ¯¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021Äê5Ô¿ªÊ¼£¬¹¥»÷ÕßÀûÓÃMaui¼ÓÃÜÂôÁ¦Ò½ÁÆ·þÎñµÄ·þÎñÆ÷£¬°üÂÞµç×Ó½¡¿µ¼Ç¼·þÎñ¡¢Õï¶Ï·þÎñ¡¢³ÉÏñ·þÎñºÍÄÚÍø·þÎñ¡£StairwellÔÚ2022Äê4ÔÂÊÕ¼¯Á˵ÚÒ»¸öMauiÑù±¾£¬µ«ËùÓÐMauiµÄ±àÒëʱ¼ä´Á¾ùΪ2021Äê4ÔÂ15ÈÕ¡£ÓëÆäËüÀÕË÷Èí¼þ²îÒìµÄÊÇ£¬Maui²»»áÔÚ±»¼ÓÃܵÄϵͳÉÏÁôÏÂÀÕË÷×ÖÌõ¡£ÕâЩ»ú¹¹ÌåÏÖ£¬¹¥»÷¿ÉÄÜ»¹»á¼ÌÐø£¬²¢ÎªHPH×éÖ¯ÌṩÁËһϵÁдëÊ©À´×¼±¸¡¢Ô¤·ÀºÍÓ¦¶Ô´ËÀàʼþ¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/07/06/north-korean-state-sponsored-cyber-actors-use-maui-ransomware
4¡¢SecuInfra͸¶Bitter¼ÌÐø¹¥»÷ÃϼÓÀ¹úµÄ¾üÊ»ú¹¹
SecuInfraÔÚ7ÔÂ5ÈÕ͸¶ÆäÔÚ½üÆÚ·¢ÏÖ£¬APT×éÖ¯Bitter£¨Ò²³ÆT-APT-17£©Õë¶ÔÃϼÓÀ¹úµÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2013Äê¾Í¿ªÊ¼»îÔ¾£¬Ö÷ÒªÕë¶Ô°Í»ù˹̹¡£×îÐµĹ¥»÷ÊÇÔÚ2022Äê5ÔÂÖÐÑ®¿ªÊ¼µÄ£¬Ê¼ÓÚÒ»¸öÎäÆ÷»¯µÄExcelÎĵµ£¬¸ÃÎĵµ¿ÉÄÜͨ¹ýÓã²æʽµöÓãÓʼþ·Ö·¢µÄ£¬ÓʼþÔÚ±»´ò¿ªÊ±»áÀûÓÃMicrosoft¹«Ê½±à¼Æ÷©¶´(CVE-2018-0798)´ÓÔ¶³Ì·þÎñÆ÷ÖÐÏÂÔØÏÂÒ»½×¶ÎµÄ¶þ½øÖÆÎļþ£¬ÏÂÔصÄpayloadÊÇZxxZ£¬¹¥»÷»¹ÀûÓÃÁ˶ñÒâÈí¼þBitterRAT¡£
https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-to-target-bangladesh/
5¡¢Unit 42·¢ÏÖºÚ¿ÍÀÄÓúì¶ÓÉø͸¹¤¾ßBRc4µÄ¹¥»÷»î¶¯
¾ÝýÌå7ÔÂ6ÈÕ±¨µÀ£¬Unit 42·¢ÏÖÓÐÒ»¸ö°üÂÞÓëBrute Ratel C4(BRc4)Ïà¹ØµÄpayload¶ñÒâÈí¼þÑù±¾±»ÉÏ´«µ½VirusTotalÊý¾Ý¿â¡£BRc4ÓÉÄþ¾²Ñо¿ÈËÔ±Chetan Nayak¿ª·¢£¬ÀàËÆÓÚCobalt Strike£¬ÊÇ×îÐÂÉÏÊеĺì¶ÓºÍ·´¿¹ÐÔ¹¥»÷Ä£Ä⹤¾ß¡£¸ÃÑù±¾ÊÇ´Ó˹ÀïÀ¼¿¨ÉÏ´«µÄ£¬Î±×°³ÉRoshan BandaraµÄ¸öÈ˼òÀú£¨"Roshan_CV.iso"£©£¬µ«Êµ¼ÊÉÏÊÇÒ»¸ö¹âÅ̾µÏñÎļþ¡£µ±Ä¿±êË«»÷¸ÃÎļþʱ£¬»á½«Æä¹ÒÔØΪһ¸öWindowsÇý¶¯Æ÷£¬ÆäÖаüÂÞÒ»¸ö¿´ËÆÎÞº¦µÄWordÎĵµ¡£Æô¶¯ºó£¬Ëü»áÔÚÄ¿±êÉ豸ÉÏ°²×°BRc4£¬²¢ÓëÔ¶³Ì·þÎñÆ÷½¨Á¢Í¨ÐÅ¡£Í¨¹ý´ò°ü·½Ê½£¬Ñо¿ÈËÔ±½«¸Ã»î¶¯¹éÒòÓÚAPT29¡£
https://thehackernews.com/2022/07/hackers-abusing-brc4-red-team.html
6¡¢IntezerÐû²¼¹ØÓÚÐÂLinux¶ñÒâÈí¼þOrBitµÄ·ÖÎö³ÂËß
7ÔÂ6ÈÕ£¬IntezerÅû¶ÁËÒ»ÖÖȫеÄLinux¶ñÒâÈí¼þOrBit£¬Õâ±êÖ¾×ÅÕë¶ÔÁ÷ÐвÙ×÷ϵͳµÄ¹¥»÷»î¶¯µÄÔö³¤¡£³ÂËßÖ¸³ö£¬¸Ã¶ñÒâÈí¼þʵÏÖÁËÏȽøµÄÈƹý¼¼Êõ£¬²¢Í¨¹ýhookÒªº¦¹¦Ð§ÔÚÉ豸ÉÏ»ñµÃ³Ö¾ÃÐÔ£¬Í¨¹ýSSHΪ¹¥»÷ÕßÌṩԶ³Ì·ÃÎʹ¦Ð§£¬ÊÕ¼¯Æ¾Ö¤²¢¼Ç¼TTYÃüÁî¡£Æ书ЧºÜÏñSymbiote£¬Ö¼ÔÚѬȾĿ±êÉÏËùÓÐÕýÔÚÔËÐеĽø³Ì¡£µ«ºóÕßÀûÓÃLD_PRELOAD»·¾³±äÁ¿À´¼ÓÔع²Ïí¹¤¾ß£¬¶øOrBit½ÓÄÉÁËÁ½ÖÖ²îÒìµÄÒªÁ죺½«¹²Ïí¹¤¾ßÌí¼Óµ½¼ÓÔØ·¨Ê½Ê¹ÓõÄÅäÖÃÎļþÖУ»Ð޸ļÓÔØ·¨Ê½×Ô¼ºµÄ¶þ½øÖÆÎļþÀ´¼ÓÔضñÒâ¹²Ïí¹¤¾ß¡£
https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/