MOVEit TransfeÖЩ¶´CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ

Ðû²¼Ê±¼ä 2023-06-05

1¡¢MOVEit TransfeÖЩ¶´CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ


¾ÝýÌå6ÔÂ1ÈÕ±¨µÀ£¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеÄ©¶´£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý¡£ÕâÊÇÒ»¸öSQL×¢Èë©¶´£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Rapid7Ñо¿ÈËÔ±ÔÚ±»ÀûÓÃÉ豸ÉÏ·¢ÏÖÁËÏàͬµÄÃûΪhuman2.aspµÄwebshell£¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖС£MandiantÌåÏÖ£¬ËûÃǵÄÊý¾ÝÏÔʾ´Ë´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ¡£Ä¿Ç°Éв»Çå³þ¹¥»÷ÕßÉí·Ý£¬µ«¾ÝϤÒѾ­ÓÐÐí¶à×éÖ¯Ôâµ½ÈëÇÖ£¬Êý¾Ý±»µÁ¡£Progress SoftwareÒÑÐû²¼Õë¶Ôµ±µØºÍÔÆµÄ»º½â²½Öè¡£


https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/


2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ5ÈÕ±¨µÀ£¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcaja͸¶£¬ËüÕýÔÚ´¦ÖÃÓ°ÏìÁ˶à¸ö·þÎñ´¦µÄÀÕË÷¹¥»÷¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊУ¬¹ÜÀí×ÅÁè¼Ý46ÒÚÃÀÔªµÄÏû·Ñ´û¿î¡£PlayÉù³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿ÃÅÐÅÏ¢£¬°üÂÞ¸öÈË»úÃÜÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕպͺÏͬµÈ¡£¸Ã»ú¹¹ÌåÏÖ£¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄ½»Ò×£¬µç×ÓÒøÐС¢×Ô¶¯È¡¿î»úºÍ¸÷·þÎñ´¦Ò²¶¼ÔÚÕý³£ÔË×÷¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÓÚÊÇ·ñ½»Êê½ðµÄѯÎÊ¡£


https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack


3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÁè¼Ý250ÍòÈ˵ÄÐÅϢй¶


ýÌå6ÔÂ1Èճƣ¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶¡£ÊӲ췢ÏÖ£¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ£¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬Éæ¼°ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»áÄþ¾²ºÅÂë¡¢ÄÉ˰ÈËʶ±ðºÅºÍÁÙ´²ÐÅÏ¢µÈ¡£´Ë´ÎʼþÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕ¿ªÊ¼×¢²áµÄ³ÉÔ±¡£HPHC½«ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£Ä¿Ç°ÉÐÎÞÀÕË÷ÍÅ»ïÉù³ÆÎª´ËÊÂÂôÁ¦¡£


https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/


4¡¢Ñо¿ÍŶӷ¢ÏÖCamaro DragonÀûÓÃкóÃÅTinyNoteµÄ¹¥»÷


Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËCamaro Dragon½üÆÚ¹¥»÷»î¶¯µÄÏêÇé¡£Ñо¿ÈËÔ±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢·þÎñÆ÷ÉÏ·¢ÏÖÁËеĻùÓÚGoµÄºóÃÅ£¬ÃûΪTinyNote¡£¸ÃºóÃÅͨ¹ýÓëÍâ½»ÊÂÎñÏà¹ØµÄÃû³Æ½øÐзַ¢£¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý¡£Ëü»¹¿ÉÈÆ¹ýÓ¡¶ÈÄáÎ÷ÑÇÁ÷ÐеÄɱ¶¾Èí¼þSmadAV¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ£¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines½øÐлù±¾µÄ»úÆ÷ö¾ÙºÍÃüÁîÖ´ÐС£


https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/


5¡¢KasperskyÅû¶ÀûÓÃÁãµã»÷©¶´¹¥»÷iOSµÄTriangulation»î¶¯


6ÔÂ1ÈÕ£¬KasperskyÅû¶ÁËÀûÓÃÁãµã»÷©¶´¹¥»÷iOSÉ豸µÄTriangulation»î¶¯¡£¸Ã»î¶¯ÖÁÉÙ´Ó2019Ä꿪ʼ£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessage·þÎñÏòiOSÉ豸·¢Ë͵ÄÏûÏ¢£¬¸½¼þÖаüÂÞ©¶´ÀûÓ᣸ÃÏûÏ¢ÔÚûÓÐÈκÎÓû§½»»¥µÄÇé¿öÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´ÐЩ¶´¡£ÀûÓé¶´´ÓC2·þÎñÆ÷ÏÂÔØ¶à¸öºóÐø½×¶Î£¬°üÂÞÓÃÓÚÌáȨµÄÆäËü©¶´ÒÔ¼°×îÖÕpayload¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐУ¬ËüÖ§³ÖÒ»×éÓÃÓÚÊÕ¼¯ÏµÍ³ºÍÓû§ÐÅÏ¢µÄÃüÁ¶øÇÒ¿ÉÒÔÔËÐдÓC2×÷Ϊ²å¼þÄ£¿éÏÂÔØµÄÈÎÒâ´úÂë¡£´Ë´Î¹¥»÷ÀֳɵØÑ¬È¾ÁËÔËÐÐiOS 15.7µÄÉ豸¡£


https://securelist.com/operation-triangulation/109842/


6¡¢Trend MicroÐû²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö³ÂËß


5ÔÂ31ÈÕ£¬Trend MicroÐû²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±¼ì²éÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾£¬·¢ÏÖRoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÏàËÆ¶È¡£»ùÓÚBinDiffµÄ±ÈÁ¦·¢ÏÖ£¬º¯ÊýµÄÏàËÆ¶ÈΪ93.2%£¬»ù±¾¿éµÄÏàËÆ¶ÈΪ99.3%£¬¶øÌø×ªµÄÏàËÆ¶ÈΪ98.4%¡£´ËÍ⣬¶þÕß¶¼Ê¹ÓÃOpenSSLµÄAES½øÐмÓÃÜ£¬²¢ÀûÓÃÀàËÆµÄ¼äЪ¼ÓÃܼ¼ÊõÀ´¼ÓËÙ¼ÓÃܹý³Ì¡£Ñо¿ÈËÔ±ÌåÏÖ£¬BlackSuitҪôÊÇͬһ¿ª·¢Õß¿ª·¢µÄбäÌ壬ҪôÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ£¬»òÕßÊÇRoyalµÄÁ¥Êô»ú¹¹¶Ôԭʼ´úÂë½øÐÐÁËÐ޸ġ£


https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html