РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ

Ðû²¼Ê±¼ä 2024-03-08
1. РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ


3ÔÂ6ÈÕ£¬Ô½ÄϵÄÒ»¼Ò½ðÈÚʵÌåÊÇÏÈǰδ¼Ç¼µÄÃûΪLotus Bane µÄÍþвÐÐΪÕßµÄÄ¿±ê£¬¸ÃÐÐΪÕßÓÚ 2023 Äê 3 ÔÂÊ״α»·¢ÏÖ¡£Lotus Bane ʹÓõļ¼ÊõÓëOceanLotusµÄ¼¼ÊõÖØµþ£¬OceanLotus ÊÇÒ»¸öÓëÔ½ÄϽáÃ˵ÄÍþв×éÖ¯£¬Ò²³ÆÎª APT32¡¢Canvas Cyclone£¨ÒÔǰ³ÆÎª Bismuth£©ºÍ Cobalt Kitty¡£ÕâÔ´ÓÚʹÓà PIPEDANCE µÈ¶ñÒâÈí¼þ½øÐÐÃüÃû¹ÜµÀͨÐÅ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬ Elastic Security Labs ÓÚ 2023 Äê 2 ÔÂÊ״μǼÁËPIPEDANCE £¬¸ÃʼþÓë 2022 Äê 12 ÔÂÏÂÑ®Õë¶ÔÒ»¸öδ͸¶ÐÕÃûµÄÔ½ÄÏ×éÖ¯µÄÍøÂç¹¥»÷ÓйØ¡£¹ýÈ¥Ò»Ä꣬ÑÇÌ«µØÓò (APAC)¡¢Å·ÖÞ¡¢À­¶¡ÃÀÖÞ (LATAM) ºÍ±±ÃÀµÄ½ðÈÚ×éÖ¯ÒѳÉΪBlind EagleºÍLazarus GroupµÈ¶à¸ö¸ß¼¶Á¬ÐøÍþв×éÖ¯µÄÄ¿±ê¡£ÁíÒ»¸öÖøÃûµÄ³öÓÚ¾­¼Ã¶¯»úµÄÍþв×éÖ¯ÊÇ UNC1945£¬¾ÝÊӲ죬¸Ã×éÖ¯ÒÔ ATM ½»»»»ú·þÎñÆ÷ΪĿ±ê£¬Ä¿µÄÊÇÓÃÃûΪ CAKETAP µÄ×Ô½ç˵¶ñÒâÈí¼þѬȾËüÃÇ¡£


https://thehackernews.com/2024/03/new-apt-group-lotus-bane-behind-recent.html


2. RA World ÀÕË÷Èí¼þ¹¥»÷À­¶¡ÃÀÖÞµÄÒ½ÁƱ£½¡ÐÐÒµ


3ÔÂ6ÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯ RA World£¨Ò²³ÆÎª RA Group£©ÌᳫÁËÐÂÒ»²¨»î¶¯¡£¸Ã×éÖ¯ÓÚ 2023 Äê 4 ÔÂÌᳫ¶ñÒâÐж¯£¬ÔÚÆäÈÎÆÚÄÚ¶ÔÖÚ¶à×éÖ¯ÌᳫÁ˹¥»÷£¬Ö÷ÒªÊÇÃÀ¹ú¡¢µÂ¹ú¡¢Ó¡¶ÈºĮ́ÍåµÄÒ½ÁƱ£½¡ºÍ½ðÈÚÁìÓòµÄ×éÖ¯¡£Ñо¿ÈËÔ±·¢ÏÖ£¬RA World µÄ×îй¥»÷Õë¶ÔÀ­¶¡ÃÀÖ޵Ķà¼ÒÒ½ÁÆ»ú¹¹¡£ÕâЩ¹¥»÷ÊÇ·Ö½×¶ÎÖ´ÐеÄ£¬ÒÔ×î´óÏ޶ȵØÌá¸ßÀÖ³ÉÐж¯µÄ×ÜÌå»ú»á¡£³õʼ·ÃÎʽ׶δӺڿÍͨ¹ýÓò¿ØÖÆÆ÷ÉøÍ¸¼ÆËã»úϵͳ¿ªÊ¼¡£ÔÚÕâÀ×鼯ı¹¤¾ß (GPO) µÄ±à¼­Æð×ÅÖÁ¹ØÖØÒªµÄ×÷Óã¬Ê¹·¸×ïÕßÄܹ»ÔÚÊܺ¦ÕßµÄϵͳÖÐÇ¿¼ÓËûÃǵĹæÔò¡£´ËÍ⣬¸Ã¶ñÒâÈí¼þ»¹¿ÉÒÔÒÔÌØÊâµÄÄþ¾²Ä£Ê½ÖØÐÂÆô¶¯ÏµÍ³£¬ÒÔÌӱܷÀ²¡¶¾Èí¼þµÄ¼ì²â¡£Ëü»¹Ïû³ýÁ˹¥»÷ºóÆä´æÔڵĺۼ££¬Ê¹Ñо¿ÈËÔ±µÄ·ÖÎöÊÂÇé±äµÃÔ½·¢ÅÓ´ó¡£


https://meterpreter.org/ra-world-ransomware-strikes-latin-american-healthcare/


3. ºÚ¿ÍʹÓÃÎäÆ÷»¯ÈÕÀúÑûÇë°²×° MacOS ¶ñÒâÈí¼þ


3ÔÂ6ÈÕ£¬ºÚ¿ÍʹÓÃÎäÆ÷»¯µÄÈÕÀúÑûÇëÀ´ÀûÓõç×ÓÓʼþϵͳÖеÄ©¶´£¬ÓÕÆ­Óû§µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎ±×°³É»î¶¯¸½¼þµÄ¶ñÒâÈí¼þ¡£Í¨¹ýÀûÓöÔÈÕÀúÑûÇëµÄÐÅÈΣ¬ÍþвÐÐΪÕßÔö¼ÓÁËÀֳɽøÐÐÍøÂçµöÓã¹¥»÷ºÍδ¾­ÊÚȨ·ÃÎÊÃô¸ÐÐÅÏ¢µÄ¿ÉÄÜÐÔ¡£Malwarebytes µÄÍøÂçÄþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖ£¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃÎäÆ÷»¯ÈÕÀúÑûÇëÀ´°²×°macOS ¶ñÒâÈí¼þ¡£ÍþвÐÐΪÕßͨ¹ý Telegram DM ÁªÏµÄ¿±ê£¬Í¨¹ýÌṩͨ»°»ò»áÒéµÄ»ú»áÀ´ÒýÓÕÄ¿±ê¡£¸ÐÐËȤµÄÄ¿±ê»áÊÕµ½Ðé¼ÙµÄ»áÒéÑûÇë¡£µ±Êܺ¦ÕßʵÑé¼ÓÈëʱ£¬Á´½Ó»áʧ°Ü¡£Õ©Æ­Õß½«´Ë¹é¾ÌÓÚÇøÓò·ÃÎÊÏÞÖÆ£¬²¢½¨ÒéÔËÐнÅÔ­À´ÐÞ¸´Ëü¡£ 


https://gbhackers.com/malware-weaponized-calendar-invites/


4. ºÚ¿ÍÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷½øÐÐÒþÃØ C2 ͨÐÅ


3ÔÂ6ÈÕ£¬QEMU ÊÇÒ»¸ö¿ªÔ´Æ½Ì¨£¬ÌṩÄþ¾²ÇÒ˽ÓеÄÐéÄ⻯¿Õ¼ä£¬ÓÃÓÚÔÚ×Ô¼ºµÄ»·¾³ÖÐʵÑé¶ñÒâ´úÂ롢©¶´ÀûÓú͹¥»÷¡£Õâ¸öÊܿصIJâÊÔ³¡×î´óÏ޶ȵؽµµÍÁ˱»·¢ÏÖºÍÖ´·¨ÎÊÌâµÄ·çÏÕ¡£??´ËÍ⣬QEMU ÔÊÐíºÚ¿Í¿ª·¢¿ÉÒÔÔÚ²îÒìÓ²¼þ¼Ü¹¹ºÍ²Ù×÷ϵͳÉÏÔËÐеĶñÒâÈí¼þ¡£¿¨°Í˹»ùʵÑéÊÒµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖ£¬ºÚ¿ÍÕýÔÚÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷À´ÃØÃÜÇÔÈ¡±»µÁÊý¾Ý¡£¹¥»÷Õßϲ»¶Ê¹ÓÃÕý°æ¹¤¾ßÒÔÖÆÖ¹¼ì²â£¬Í¬Ê±Ò²¼õÉÙ¶ñÒâÈí¼þÖ§³ö¡£Êý¾Ýй¶¡¢Çý¶¯Æ÷¼ÓÃÜ¡¢Ô¶³ÌÖ´ÐкÍÄÚ´æ×ª´¢ÊÇ¿ÉÐÅÈí¼þÖ§³ÖµÄÒ»Ð©ÍøÂçɨÃè»î¶¯¡£Ô¤°²×°µÄ¶ñÒâÈí¼þ»òÄ£·ÂÔ±¹¤µÄ RDP/ VPN·ÃÎʳ䵱ÊÜѬȾϵͳµÄÁ¢×ãµã¡£ÍøÂçËíµÀºÍ¶Ë¿Úת·¢ÊµÓ÷¨Ê½Ê¹Óû§Äܹ»Èƹý NAT ºÍ·À»ðǽ£¬´Ó¶ø½øÈëÄÚ²¿ÏµÍ³¡£ÓÐÐí¶à¹¤¾ß¿ÉÓÃÓÚÔÚϵͳ֮¼ä´´½¨ÍøÂçËíµÀ£¬ÆäÖÐһЩÊÇÖ±½ÓµÄ£¬ÁíһЩÔòʹÓÃÊðÀíÀ´Ñڸǹ¥»÷Õß IP¡£


https://gbhackers.com/hackers-qemu-data-exfiltration/


5. ¼ÓÄôóµÄ·´Ï´Ç®»ú¹¹ÒòÍøÂç¹¥»÷¶ø¹Ø±Õ


3ÔÂ6ÈÕ£¬¼ÓÄôó½ðÈÚ½»Ò׺ͳÂËß·ÖÎöÖÐÐÄ (FINTRAC) Ðû²¼£¬×÷ΪԤ·À´ëÊ©£¬Ò»´Î¡°ÍøÂçʼþ¡±ÆÈʹÆä¹«Ë¾ÏµÍ³ÏÂÏß¡£FINTRAC ÊǼÓÄôóµÄÒ»¸öÕþ¸®»ú¹¹£¬×÷Ϊ¸Ã¹úµÄ½ðÈÚÇ鱨»ú¹¹ÔË×÷¡£Ëü´ÓÊÂÏ´Ç®ÊӲ죬ÿÄê×·×ÙÊý°ÙÍò±Ê¿ÉÒɽ»Ò×£¬²¢Ïò¾¯·½Åû¶ÊýǧÆð·Ç·¨×ʽðÁ÷Ïò¡£¸Ã»ú¹¹ÔÚÆäÍøÕ¾ÉÏ·¢±íÁËÒ»·Ý¼ò¶ÌµÄÐÂÎÅÉùÃ÷£¬Ö¸³ö¸ÃÖÐÐĵÄÇ鱨»ò»úÃÜϵͳδ±»·ÃÎÊ£¬Òò´ËÓëÆäºËÐÄÈÎÎñÏà¹ØµÄÃô¸ÐÐÅÏ¢ºÍ²Ù×÷ÄÜÁ¦ÈÔÈ»Äþ¾²¡£FINTRAC Óë°üÂÞ¼ÓÄôóÍøÂçÄþ¾²ÖÐÐÄÔÚÄÚµÄÁª°îºÏ×÷»ï°éºÏ×÷£¬»Ö¸´ÔËÓª²¢¼ÓÇ¿·ÀÓù£¬ÒÔ·ÀֹδÀ´·¢Éúʼþ¡£¸ÃÍøÂçʼþ·¢ÉúÔÚÖÜÄ©£¬½ñºóûÓзÖÏí½øÒ»²½µÄ¸üС£BleepingComputer ÉÐδ·¢ÏÖÈκÎÀÕË÷Èí¼þ»òÊý¾ÝÀÕË÷Íþв×éÖ¯¶Ô FINTRAC µÄ¹¥»÷ÂôÁ¦£¬Òò´ËÍþвÐÐΪÕßÈÔȻδ֪¡£×Ô½ñÄêÄê³õÒÔÀ´£¬¼ÓÄôóÔÚÍøÂçÄþ¾²·½Ãæ¾­ÀúÁ˳äÂúÌôÕ½µÄʱÆÚ£¬·ºÆðÁ˶àÆðÒýÈËעĿµÄÊܺ¦ÕߺÍʼþ¡£


https://www.bleepingcomputer.com/news/security/canadas-anti-money-laundering-agency-offline-after-cyberattack/


6. »ùÓÚÍøÂçµÄ PLC ¶ñÒâÈí¼þ½«ÖØÐ½ç˵¹¤ÒµÍøÂçÄþ¾²Íþв


3ÔÂ4ÈÕ£¬×ôÖÎÑÇÀí¹¤Ñ§ÔºµÄÑо¿ÈËÔ±Ìá³öÁËÒ»ÖÖ¿ª·¢¿É±à³ÌÂß¼­¿ØÖÆÆ÷ (PLC) ¶ñÒâÈí¼þµÄÐÂÒªÁ죬¸ÃÒªÁì±»Ö¤Ã÷±Èµ±Ç°¼ÆÄ±¸üÁé»î¡¢¸üÓе¯ÐԺ͸üÓÐÓ°ÏìÁ¦¡£¸Ã·½°¸ÔÊÐí¶ñÒâÈí¼þʹÓùÜÀíÃÅ»§ÍøÕ¾¹ûÈ»µÄºÏ·¨ Web Ó¦Ó÷¨Ê½½Ó¿Ú (API) ÃØÃܹ¥»÷µ×²ãµÄÏÖʵÊÀ½ç»úÆ÷¡£´ËÀ๥»÷°üÂÞαÔì´«¸ÐÆ÷¶ÁÊý¡¢½ûÓÃÄþ¾²¾¯±¨ÒÔ¼°ÀûÓÃÎïÀíÖ´ÐÐÆ÷¡£Ñо¿Ð¡×éµÄÊÓ²ì±íÃ÷£¬ËûÃÇÌá³öµÄ¹¥»÷½«¶Ôÿ¸öÖ÷ÒªÖÆÔìÉÌÉú²úµÄ PLC Æð×÷ÓᣴËÍ⣬¸ÃÒªÁì±ÈÏÖÓÐµÄ PLC ¶ñÒâÈí¼þ¼¼Êõ£¨¿ØÖÆÂß¼­ºÍ¹Ì¼þ£©¾ßÓÐÏÔ×ÅÓÅÊÆ£¬ÀýÈçÆ½Ì¨¶ÀÁ¢ÐÔ¡¢Ò×ÓÚ²¿ÊðºÍ¸ü¸ß¼¶´ËÍâ³Ö¾ÃÐÔ¡£Ñо¿ÈËÔ±»¹±íÃ÷£¬¹¤Òµ¿ØÖÆ»·¾³ÖÐÍøÂç¼¼ÊõµÄ·ºÆð´øÀ´ÁË IT ÁìÓò»òÏû·ÑÎïÁªÍøÉ豸Öв»´æÔÚµÄÐÂÄþ¾²ÎÊÌâ¡£ÓëÆÕ±é¿´·¨Ïà·´£¬¹Ì¼þºÍ¿ØÖÆÂß¼­²¢²»ÊÇ PLC ¼ÆËãµÄΨһ¼¶±ð¡£ÏÖ´ú PLC ÏÖÔÚ°üÂÞÒ»¸ö¿É±à³ÌǶÈëÊ½ÍøÂç·þÎñÆ÷£¬ÆäÖÐ×Ô½ç˵¿Í»§¶Ë JavaScript ´úÂëʹÓÃÈÕÒæÇ¿´óµÄ API À´¼àÊӺͿØÖÆÎïÀí¹ý³Ì¡£ÕâÖÖ»·¾³ÌṩÁËÒ»¸öеġ¢ÁîÈ˾ªÑȵÄÀíÏëÆ½Ì¨À´ÔËÐÐ PLC ¶ñÒâÈí¼þ£¬Õâ¶Ô¹¤Òµ¿ØÖÆÏµÍ³×é³ÉÁËеÄÍþв¡£


https://industrialcyber.co/industrial-cyber-attacks/georgia-tech-researchers-warn-of-stuxnet-style-web-based-plc-malware-redefining-industrial-cybersecurity-threats/?web_view=true