LastPass¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶

Ðû²¼Ê±¼ä 2022-08-26
1¡¢LastPass¹«Ë¾¿ª·¢ÈËÔ±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶

      

¾ÝýÌå8ÔÂ25ÈÕ±¨µÀ£¬LastPass¹«Ë¾Ôâµ½¹¥»÷£¬Ô´´úÂëºÍרÓм¼ÊõÐÅÏ¢¿ÉÄÜй¶¡£LastPassÊÇÈ«Çò×î´óµÄÃÜÂë¹ÜÀí¹«Ë¾Ö®Ò»£¬±»Áè¼Ý3300ÍòÈ˺Í100000¼ÒÆóҵʹÓá£LastPassµÄͨ¸æÖ¸³ö£¬¹¥»÷ÕßÊÇͨ¹ý·ÃÎʹ«Ë¾¿ª·¢ÈËÔ±µÄϵͳÖеÄÊÜËðÕÊ»§ÈëÇֵġ£¿Í»§µÄÊý¾Ý»ò¼ÓÃܵÄÃÜÂë¿âδÊÜÓ°Ï죬µ«¹¥»÷ÕßȷʵÇÔÈ¡ÁËËûÃǵIJ¿ÃÅÔ´´úÂëºÍLastPassµÄרÓм¼ÊõÐÅÏ¢¡£È¥Ä꣬LastPassÔâµ½ÁËײ¿â¹¥»÷£¬¹¥»÷Õ߿ɻñµÃÓû§µÄÖ÷ÃÜÂë¡£ 

   

https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/


2¡¢Á÷ýÌåÆ½Ì¨Plex·¢ÉúÊý¾Ýй¶²¢¶Ø´ÙÓû§¾¡¿ìÖØÖÃÃÜÂë 

      

¾Ý8ÔÂ24ÈÕ±¨µÀ£¬ÃÀ¹úÁ÷ýÌåÆ½Ì¨Plex·¢ÏÖÆäÊý¾Ý¿âÔâµ½ÁËδ¾­ÊÚȨµÄ·ÃÎʺó£¬ÏòÓû§·¢ËÍÁËÃÜÂëÖØÖÃ֪ͨ¡£¹¥»÷Õß¿ÉÄÜ·ÃÎÊÁËÓʼþµØÖ·¡¢Óû§ÃûºÍÃÜÂëµÈÐÅÏ¢£¬Ò»Ð©Óû§³ÂËß±íÃ÷¸ÃÎÊÌâ²»»áÓ°ÏìÃâ·ÑÕÊ»§£¬¿ÉÄÜÖ»Óи¶·ÑÕÊ»§Êܵ½Ó°Ïì¡£Óë´Ëͬʱ£¬Plex.tvÍøÕ¾·ºÆðÁËÖжÏ£¬Plex×´Ì¬Ò³ÃæÌåÏÖÕýÔÚÊÓ²ìÔ­Òò£¬Ä¿Ç°Éв»Çå³þ´ËÖжÏÊÇ·ñÓëδ¾­ÊÚȨµÄ·ÃÎÊÓйØ£¬»¹ÊÇÒ»´ÎÕë¶Ô¸Ãƽ̨µÄDDoS¹¥»÷¡£


https://securityaffairs.co/wordpress/134814/data-breach/plex-data-breach.html


3¡¢RansomEXX³Æ¶ÔÅӰ͵ÏÓéÀÖ²úÎï(BRP)µÄÍøÂç¹¥»÷ÂôÁ¦

      

ýÌå8ÔÂ24ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïRansomEXXÉù³Æ¶Ô¼ÓÄôóÅӰ͵ÏÓéÀÖ²úÎï(BRP)µÄÍøÂç¹¥»÷ÂôÁ¦¡£¸Ã¹«Ë¾Ö÷ÒªÉú²úSki-DooÑ©µØ³µ¡¢Sea-DooÅçÆø»¬Ñ©¡¢ATV¡¢Ä¦Íгµ¡¢Ë®³µºÍRotax·¢¶¯»úµÈ£¬ÄêÏúÊÛ¶î½Ó½ü60ÒÚÃÀÔª£¬ÔÚÔâµ½¹¥»÷ºóËùÓÐÒµÎñÔÝʱֹͣ¡£BRPÔÚ8ÔÂ8ÈÕÅû¶´Ë¹¥»÷ʼþ¡£ÓÚ8ÔÂ15ÈÕ͸¶¼ÓÄô󡢷ÒÀ¼¡¢ÃÀ¹úºÍ°ÂµØÀûµÄ4¸ö¹¤³§»Ö¸´Éú²ú£¬²¢¹ûÈ»Á˳õ·¨Ê½²é½á¹û£¬¹¥»÷ÕßÊÇͨ¹ýµÚÈý·½·þÎñÌṩÉÌÈëÇÖÆäϵͳ¡£8ÔÂ23ÈÕ£¬RansomEXXÉù³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄ29.9GBÎļþ£¬°üÂÞ±£ÃÜЭÒé¡¢»¤ÕÕºÍÉí·ÝÖ¤¡¢ÖÊÁϹ©Ó¦Ð­ÒéºÍÐøÇ©ºÏͬµÈ¡£


https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/ 


4¡¢Microsoft¼ì²âµ½ÀûÓÿªÔ´µÄC2¿ò¼ÜSliverµÄÇ÷ÊÆÔö¼Ó

      

8ÔÂ24ÈÕ£¬MicrosoftÌåÏÖÒѼì²âµ½ÀûÓÿªÔ´C2¿ò¼ÜSliverµÄÇ÷ÊÆÉÏÉý¡£SliverÓÚ2019Äêµ×Ê״ιûÈ»£¬Ö÷ÒªÃæÏòÄþ¾²Ñо¿ÈËÔ±£¬¿ÉÔÚGitHubÉÏʹÓ㬰üÂÞÐí¶à³£¼ûµÄC2¿ò¼Ü¹¦Ð§¡£×Ô2020Äê12ÔÂÒÔÀ´£¬Ðí¶à¹¥»÷Õß½«SliverÄÉÈëÎäÆ÷¿â£¬ÆäÖÐÖ®Ò»ÊÇRaaSÁ¥Êô×éÖ¯DEV-0237¡£½üÆÚ£¬Ñо¿ÈËÔ±·¢ÏÖ¹¥»÷ÕßʹÓÃBumblebee£¨Ò²³ÆCOLDTRAIN£©×÷Ϊ³õʼ·ÃÎʼÓÔØ·¨Ê½£¬À´°²×°SliverµÈ¶àÖÖpost-compromise¹¤¾ß¡£


https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/


5¡¢Zscaler·¢ÏÖÖ÷ÒªÕë¶ÔG SuiteÓû§µÄAiTMµöÓã¹¥»÷

      

ýÌå8ÔÂ24Èճƣ¬Ñо¿ÈËÔ±·¢ÏÖÁËÕë¶ÔGoogle G SuiteÓû§µÄÐÂÒ»ÂÖAiTMµöÓã¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ½ñÄê7ÔÂÖÐÑ®¿ªÊ¼£¬×¨ÃÅÕë¶ÔʹÓÃGoogle WorkspaceµÄÖÖÖÖ×éÖ¯µÄÊ×ϯִÐйٵȸ߹Ü¡£Ñо¿ÈËÔ±·¢Ïִ˴ι¥»÷ʹÓõÄTTPºÍ»ù´¡¼Ü¹¹Óë¹ýÈ¥¼¸¸öÔÂÖÐÕë¶Ô΢ÈíÓû§µÄÓÐËùÖØµþ£¬µ«Óë΢ÈíAiTMµöÓã¹¥»÷Ïà±ÈÄ¿±êÊýÁ¿ÒªÉٵöà¡£ÊÓ²ì±íÃ÷£¬µ¥¿¿¶àÒòËØÉí·ÝÑéÖ¤ÎÞ·¨µÖÓù¸ß¼¶µöÓã¹¥»÷£¬Òò´ËÓû§±ØÐëÔÚÊäÈëÆ¾¾Ý֮ǰ×Ðϸ¼ì²éURL£¬²¢ÖÆÖ¹´ò¿ªÎ´ÖªÀ´Ô´ºÍ²»ÊÜÐŵĸ½¼þ»òÁ´½Ó¡£


https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html


6¡¢KasperskyÐû²¼Kimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß

      

KasperskyÔÚ8ÔÂ25ÈÕÐû²¼Á˹ØÓÚKimsuky½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÓ뺫¹úÏà¹ØµÄʵÌ壬²¢Ôڷdz£¼°Ê±µØ¸üÐÂÆä¹¤¾ß¡£ÔÚÐµĹ¥»÷ÖУ¬¹¥»÷ÕßÀûÓÃHTMLÓ¦Ó÷¨Ê½Îļþ¸ñʽÀ´Ñ¬È¾Ä¿±ê£¬²¢Å¼¶ûʹÓÃHangeulÓÕ¶üÎĵµ£¬³õʼѬȾºó»á°²×°Ò»¸öVisual Basic½Å±¾¡£Ö²ÈëµÄVBSÎļþÄܹ»·µ»ØÓйØÄ¿±êÉ豸µÄÐÅÏ¢²¢ÏÂÔØ±àÂë¸ñʽµÄÆäËüpayload¡£×îºóÒ»¸ö½×¶ÎÊÇWindows¿ÉÖ´ÐÐÀàÐ͵ĶñÒâÈí¼þ£¬¿É´ÓÄ¿±êÇÔÈ¡ÐÅÏ¢¡£´ËÍ⣬¸Ã³ÂËß»¹Ö÷Òª½éÉÜÁ˸ÃÍÅ»ïÊÇÈçºÎÔËÓªC2µÄ¡£


https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/