ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§

Ðû²¼Ê±¼ä 2024-10-18

1. ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§


10ÔÂ16ÈÕ £¬ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¹¤¾ßÌᳫ¹¥»÷¡£ËûÃÇͨ¹ýTelegramÁ÷´«¸Ã¶ñÒâÈí¼þ £¬Î±×°³ÉÎÚ¿ËÀ¼ÐÂÕþ¸®Ó¦Ó÷¨Ê½Reserve+µÄ¼¼ÊõÖ§³Ö»úÆ÷ÈË £¬ÓÕÆ­Óû§ÉÏ´«°üÂÞ¶ñÒâÎļþµÄZIPµµ°¸¡£Ò»µ©Îļþ±»´ò¿ª £¬MeduzaStealer¾Í»áѬȾĿ±êÉ豸 £¬ÇÔÈ¡¾ßÓÐÌض¨À©Õ¹ÃûµÄÎĵµ £¬²¢Ëæºó×ÔÎÒɾ³ý¡£Reserve+Ó¦ÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐÒåÎñ·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üиöÈËÊý¾Ý £¬ÓÉÓÚÊÕ¼¯µÄÊý¾ÝÃô¸Ð £¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ä¿±ê¡£½ØÖÁ7Ô £¬ÒÑÓÐÁè¼Ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÓ¦ÓøüÐÂÊý¾Ý¡£ÎÚ¿ËÀ¼¹ú·À²¿ÒѳÂËß·¢ÏÖ¼ÙðµÄReserve+Ó¦Ó÷¨Ê½ £¬¿ÉÄÜÖ¼ÔÚÊÕ¼¯¸öÈËÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÐÄÀíÐж¯¡£´ËÇ° £¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÁ÷ÐÐÒƶ¯Ó¦Ó÷¨Ê½ºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÈËÔ±¡£


https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram


2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý £¬¿çƽ̨Á÷´«ÄÑ·À¿Ø


10ÔÂ16ÈÕ £¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±ÔÚTrend MicroµÄ³ÂËßÖнÒʾÁËÒ»¸öÅÓ´óµÄÀÕË÷Èí¼þ²Ù×÷ £¬¸Ã²Ù×÷ÀûÓÃÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þÄ£·ÂÁËÎÛÃûÕÑÖøµÄLockBitÀÕË÷Èí¼þ¼Ò×å £¬µ«Êµ¼ÊÉÏÊÇÒ»¸öÍêÈ«²îÒìµÄʵÌå¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼ÓËÙ£¨S3TA£©¹¦Ð§ £¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß¿ØÖƵÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý £¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ÔÚ¹¥»÷½áÊøʱ £¬É豸µÄ±ÚÖ½»áÄð³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ £¬ÒÔÔö¼ÓÊܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³ÌÓïÑÔ±àд £¬¾ßÓпçƽ̨ÌØÐÔ £¬Äܹ»Õë¶ÔWindowsºÍmacOS»·¾³ £¬Ê¹ÆäÓÃ;¹ã·ºÇÒÄÑÒÔ¿ØÖÆ¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõķÃÎÊÃÜÔ¿ £¬µ«Trend Micro½¨Òé×éÖ¯±£³Ö¾¯Ìè £¬¸üÐÂÈí¼þ £¬¼ì²éÔ¶³Ì·ÃÎʼÆı £¬²¢¼à¿ØÓë¶ñÒâ»î¶¯Ïà¹ØµÄAWSÕË»§ID £¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔƵÄÍþв¡£


https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/


3. ClickFixбäÖÖ£ºÀûÓÃGoogle MeetÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ


10ÔÂ17ÈÕ £¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³Ì¼Æı £¬×Ô5Ô·ÝÓÉÍøÂçÄþ¾²¹«Ë¾ProofpointÊ״γÂËßÒÔÀ´ £¬Æä»î¶¯Óú·¢Æµ·± £¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¸Ã¼Æıͨ¹ýð³ä Google Chrome¡¢Microsoft Word ºÍ OneDrive ´íÎóÏûÏ¢ £¬ÓÕÆ­Óû§¸´ÖƲ¢Ö´ÐÐ PowerShell ´úÂë £¬´Ó¶øѬȾϵͳ¡£Êܺ¦ÕßÒò´Ë»áÃæÁÙ¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷ £¬Èç DarkGate¡¢Matanbuchus µÈ¡£½üÆÚ £¬SaaS ÍøÂçÄþ¾²ÌṩÉÌ Sekoia Ö¸³ö £¬ClickFix »î¶¯ÒÑ·¢ÉúÏÔÖø±ä»¯ £¬°üÂÞʹÓà Google Meet ÓÕ¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂçµöÓãÓʼþµÈ¡£¹¥»÷Õ߻ᷢËÍ¿´ËƺϷ¨µÄ Google Meet ÑûÇëÓʼþ £¬ÓÕʹÊܺ¦Õß·ÃÎÊÐé¼ÙÒ³Ãæ¡£Ò»µ©½øÈë £¬Êܺ¦Õß»áÊÕµ½¼¼ÊõÎÊÌâÌáʾ £¬Èôµã»÷¡°ÊµÑéÐÞ¸´¡± £¬Ôò»áÆô¶¯ ClickFix ѬȾ¹ý³Ì £¬µ¼Ö¼ÆËã»ú±»¶ñÒâÈí¼þѬȾ¡£Windows ϵͳÖ÷ÒªÔâÊÜ Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷ £¬¶ø macOS »úÆ÷ÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£´ËÍâ £¬Sekoia »¹·¢ÏÖÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢ÇþµÀ £¬°üÂÞ Zoom¡¢PDF ÔĶÁÆ÷¡¢Ðé¼ÙÊÓƵÓÎÏ·µÈ¡£


https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/


4. ³¯ÏÊITÆÛÕ©ÍŻNickel Tapestry¡±ÀûÓùÍÓ¶¹ØϵÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð


10ÔÂ17ÈÕ £¬³¯Ïʺã¾ÃÒÔÀ´Ò»Ö±ÅÉDzITרҵÈËÔ±µ½¸»×ã¹ú¼ÒµÄÆóÒµ¾ÍÖ° £¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄÎäÆ÷¼Æ»®Ä±È¡ÊÕÈë¡£ÕâЩÆÛÕ©ÐÔµÄITÊÂÇéÕßʹÓÃÐé¼Ù»ò͵À´µÄÉí·Ý £¬²¢Í¨¹ýÌõ¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´ÑÚ¸ÇÆäÕæʵλÖá£ËûÃÇÖÆֹʹÓÃÊÓƵͨ»°»òÔÚÊÓƵ»áÒéÆÚ¼äÒþ²ØÃ沿 £¬ÒÔ·ÀÖ¹±»·¢ÏÖ¡£¾ÝÍøÂçÄþ¾²¹«Ë¾SecureworksµÄÊÓ²ì £¬Ò»¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆΪUNC5267£©µÄ×éÖ¯ÂôÁ¦×éÖ¯ºÍЭµ÷ÕâЩ³¯ÏÊITÊÂÇéÕß¡£ÔÚ¹ÍÓ¶ÕâЩÍⲿ³Ð°üÉ̺ó £¬Ò»¼Ò¹«Ë¾¼¸ºõÁ¢¼´ÔâÓöÁËÊý¾ÝÇÔÈ¡ £¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐéÄâ×ÀÃæ»ù´¡ÉèÊ©´«Êäµ½¸öÈËGoogle DriveÔÆ´æ´¢¡£ÔÚ¹ÍÓ¶¹ØϵÖÕÖ¹ºó £¬¸Ã¹«Ë¾¿ªÊ¼ÊÕµ½ÀÕË÷µç×ÓÓʼþ £¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜ»õ±ÒÊê½ðÒÔ»»È¡²»¹ûȻй¶Êý¾Ý¡£Secureworks»¹·¢ÏÖ £¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬ÊðÀíºÍAnyDeskµÈ¹¤¾ß¡£Ñо¿ÈËÔ±¾¯¸æ £¬³¯ÏʵÄITÊÂÇéÕß¾­³£Ï໥Эµ÷ £¬ÌṩÍƼö £¬Òò´Ë×éÖ¯ÔÚÕÐƸԶ³ÌÊÂÇéÕßʱӦ±£³Ö¾¯Ìè £¬²¢ÁôÒâÆÛÕ©¼£Ïó¡£


https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/


5. BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ½¡¿µÒ½Éú²¢ÇÔÈ¡Êý¾Ý


10ÔÂ17ÈÕ £¬BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô²¨Ê¿¶Ù¶ùͯ½¡¿µÒ½Éú£¨BCHP£©·¢¶¯ÁËÍøÂç¹¥»÷ £¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂç £¬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öËùÔÚÌṩҽÁÆ·þÎñ¡£9ÔÂ6ÈÕ £¬BCHPµÄIT¹©Ó¦ÉÌÔâÊÜÁËÍøÂç¹¥»÷ £¬¼¸Ììºó £¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾­ÊÚȨµÄ»î¶¯ £¬²¢Á¢¼´Æô¶¯ÁËʼþÏìӦЭÒé £¬°üÂ޹رÕϵͳ×÷Ϊ±£»¤´ëÊ©¡£¾­ÊÓ²ìÈ·ÈÏ £¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾­ÊÚȨµÄ·ÃÎÊ £¬²¢ÇÔÈ¡ÁË°üÂÞÈ«Ãû¡¢Éç»á±£ÕϺÅÂë¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƼǼ±àºÅ¡¢½¡¿µ±£ÏÕÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÖÎÁÆÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ïì £¬ÒòΪËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£È·ÈÏÊܵ½Ó°ÏìµÄ¸öÈ˽«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ £¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓüà¿ØºÍ±£»¤·þÎñ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû²¼¶Ô´Ë´Î¹¥»÷ÂôÁ¦ £¬²¢Éù³ÆÓµÓвÆÕþºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨÐÅ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢ £¬µ«ÉÐδй¶ÈκÎÄÚÈÝ £¬Ò²Î´Åû¶×îºóÆÚÏÞ £¬±íÃ÷ËûÃÇÈÔÏ£ÍûÓëBCHP½øÐÐ̸ÅС£


https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/


6. SideWinder APT×éÖ¯À©´ó¹¥»÷·¶Î§ £¬½ÓÄÉÐÂÐÍÅӴ󹤾߰ü


10ÔÂ17ÈÕ £¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶ÈÓйØÁªµÄ¸ß¼¶Á¬ÐøÐÔÍþв£¨APT£©ÐÐΪÕß £¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸öÖªÃûʵÌåºÍÕ½ÂÔ»ù´¡ÉèÊ©·¢¶¯Á˹¥»÷¡£¸Ã×éÖ¯Ò²±»³ÆΪAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£¾¡¹ÜÆäʹÓùûÈ»µÄ©¶´ÀûÓ÷¨Ê½ºÍ¶ñÒâÎļþ×÷ΪѬȾý½é £¬¿´ËƼ¼Êõˮƽ½ÏµÍ £¬µ«×Ðϸ·ÖÎöÆäÐж¯Ï¸½Úºó £¬·¢ÏÖÆäÕæʵÄÜÁ¦²»ÈÝСêï¡£¹¥»÷Ä¿±ê°üÂÞÃϼÓÀ­¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¼ÒµÄÕþ¸®ºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£×î½ü £¬SideWinderʹÓöà½×¶ÎѬȾÁ´Í¨±¨ÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü £¬Í¨¹ýÓã²æʽÍøÂçµöÓãµç×ÓÓʼþ¿ªÊ¼ £¬Ö´ÐÐһϵÁÐÏÂÔØ·¨Ê½ £¬×îÖÕ²¿Êð¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÄܹ»ÊÕ¼¯ÏµÍ³ÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬²¢Í¨¹ýºóÃżÓÔØÄ£¿éÖ²ÈëStealerBot £¬ÓÃÓÚ¼äµý»î¶¯ £¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Ç¼»÷¼üµÈ¡£´ËÍâ £¬SideWinderµÄµØÀíÁýÕÖ·¶Î§²»Í£À©´ó £¬Ê¹ÓÃÁËеÄÅӴ󹤾߰ü £¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36½¨Á¢ÁªÏµ¡£


https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html