¶à¹ú½áºÏ·¨ÂÉÐж¯TOURNIQUETµ·»Ù°µÍøRaidForums

°ä²¼¹¦·ò 2022-04-14

1¡¢¶à¹ú½áºÏ·¨ÂÉÐж¯TOURNIQUETµ·»Ù°µÍøRaidForums


¾ÝýÌå4ÔÂ12ÈÕ±¨Â·£¬¹ú¼Ê·¨ÂÉÐж¯TOURNIQUETÒѵ·»Ùµ·»Ù°µÍøRaidForums¡£Õâ´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×é֯Эµ÷£¬Éæ¼°ÃÀ¹ú¡¢Ó¢¹ú¡¢Èðµä¡¢ÆÏÌÑÑÀºÍÂÞÂíÄáÑǵķ¨ÂÉ»ú¹¹¡£RaidForumsµÄÊ×´´ÈË£¬ÆÏÌÑÑÀµÄDiogo Santos Coelho£¨±ðÃûOmnipotent£©ÒÑÓÚ1ÔÂ31ÈÕÔÚÓ¢¹ú±»²¶£¬Ëû½ñÄê21Ë꣬ÕâÒâζ×ÅËûÔÚ2015ÄêÍÆ³öRaidForumsʱÄê½öÓÐ14ËꡣĿǰ£¬¾¯·½ÒѲé»ñÁËÈý¸öÍйÜRaidForumµÄÓòraidforums.com¡¢Rf.wsºÍRaid.Lol¡£


https://securityaffairs.co/wordpress/130131/deep-web/authorities-shut-down-raidforums.html


2¡¢HP½¨¸´Teradici PCoIPÖÐÓ°Ïì1500ÍòÉ豸µÄ¶à¸ö·ì϶


»ÝÆÕÔÚ4ÔÂ11ÈÕ°ä²¼°²È«¸üУ¬½¨¸´Windows¡¢Linux ºÍmacOSµÄTeradici PCoIP¿Í»§¶ËºÍ´úÀíÖеÄ10¸ö·ì϶¡£Teradici PCoIP£¨PC over IP£©ÊÇÒ»ÖÖÔ¶³Ì×ÀÃæºÍ̸£¬ÒÑ×°ÖÃÔÚ15000000¸öÉ豸ÖС£Õâ´Î½¨¸´µÄ×îÑϳÁµÄ·ì϶֮һÊÇOpenSSLÖÐÓɽâÎö¶ñÒâÖ¤Êéµ¼ÖµĻؾø·þÎñ·ì϶£¨CVE-2022-0778£©¡£´Ë±í£¬»¹½¨¸´ÁËlibexpatÖеÄ3¸öÕûÊýÒç¶Âí½Å£¨CVE-2022-22822¡¢CVE-2022-22823ºÍCVE-2022-22824£©£¬¿ÉÄܵ¼ÖÂÎÞ·¨½ÚÔìµÄ×ÊÔ´¿÷Ëð¡¢È¨ÏÞÌáÉýºÍÔ¶³Ì´úÂëÖ´ÐС£


https://www.bleepingcomputer.com/news/security/critical-hp-teradici-pcoip-flaws-impact-15-million-endpoints/


3¡¢HafniumÍÅ»ïʹÓÃжñÒâÈí¼þTarraskÀ´Èƹý°²È«¼ì²â


4ÔÂ12ÈÕ£¬Î¢Èí°ä²¼µÄ×îÐÂ×êÑÐÁ˾ÖÅû¶Á˺ڿÍÍÅ»ïHafniumʹÓõÄжñÒâÈí¼þTarraskµÄ¾ßÌåÐÅÏ¢¡£Î¢ÈíÓÚ2021Äê8Ôµ½2022Äê2ÔÂÆÚ¼ä£¬·¢ÏÖ¸ÃÍÅ»ïÕë¶ÔµçÐÅ¡¢»¥ÁªÍø·þÎñÌṩÉ̺ÍÊý¾Ý·þÎñµÈÁìÓòµÄ¹¥»÷»î¶¯¡£½øÒ»²½µÄµ÷²éÏÔʾ£¬¹¥»÷ÕßʹÓÃÁËÓÃÀ´ºáÏòÒÆ¶¯ºÍÖ´ÐеŤ¾ßImpacket£¬ÒÔ¼°ÃûΪTarraskµÄжñÒâÈí¼þ¡£TarraskʹÓÃÁËÒ»¸öÒÔǰδ֪µÄWindows·ì϶£¬Í¨¹ýɾ³ýÓйصݲȫÃèÊö·û×¢²á±íÖ·´½«Æä´Ó¡°schtasks /query¡±ºÍ¹¤×÷´òË㷨ʽÖаµ²ØÆðÀ´¡£


https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/


4¡¢SandwormÀûÓÃIndustroyer2¹¥»÷ÎÚ¿ËÀ¼Ä³ÄÜÔ´¹«Ë¾


ESETÔÚ4ÔÂ12ÈÕ°ä²¼»ã±¨³Æ£¬SandwormÀûÓÃIndustroyer2¹¥»÷ÎÚ¿ËÀ¼Ä³ÄÜÔ´¹«Ë¾¡£Industroyer2ÊÇICS¶ñÒâÈí¼þIndustroyerµÄбäÌ壬ºóÕßÔøÔÚ2016Äê±»ÓÃÓÚÖжÏÎÚ¿ËÀ¼µÄµçÁ¦¹©¸ø¡£´Ë±í£¬¹¥»÷Õß»¹Ê¹ÓÃÁËÕë¶ÔLinuxºÍSolarisϵͳµÄOrcshred¡¢SoloshredºÍAwfulshredµÈ¶ñÒâÈí¼þ¼Ò×塣Ŀǰ£¬¹¥»÷ÕßÈëÇÖÖ¸±êÒÔ¼°´ÓITÏµÍ³×ªÒÆµ½¹¤Òµ½ÚÔìϵͳ(ICS)µÄ·½Ê½Éв»Ã÷È·¡£ 


https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/


5¡¢×êÑÐÍŶӷ¢ÏÖÕë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹·Ö·¢RemcosRATµÄ´¹µö»î¶¯


4ÔÂ12ÈÕ£¬HP Wolf Security¹«¿ªÁËÕë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹µÄ´¹µö»î¶¯¡£Õâ´Î»î¶¯ÖØÒª¶Ô×¼ÒøÐеÄÔ±¹¤£¬´¹µöÓʼþ¼Ù×°³ÉÀ´×ÔÁíÒ»¹«Ë¾£¨Í¨³£ÊǵÐÊÖÒøÐУ©£¬Ðû³ÆÎªÊÕ¼þÈËÌṩÁËÒ»·Ý±¨´ð·á¸»µÄ¹¤×÷»úÓö£¬Ö¸±êµã»÷ÓʼþÖÐÏνӺó»á±»³Á¶¨Ïòµ½´¹µöÍøÕ¾¡£Õâ´Î»î¶¯Ê¹ÓÃHTML×ß˽À´×°ÖöñÒâÈí¼þpayload£¬ÔÚ¾­¹ýһϵÁжñÒâ´úÂëÖ´ÐкÍWindows APIÀÄÓú󣬻áÔÚϵͳ¸ßµÍÔØ²¢Ö´ÐÐGuLoader£¬×îÖÕÖ¼±ÉÈËÔØRemcosRAT¡£


https://threatresearch.ext.hp.com/malware-campaigns-targeting-african-banking-sector/#


6¡¢Kaspersky°ä²¼2021Äê¸ú×ÙÈí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨


4ÔÂ12ÈÕ£¬Kaspersky°ä²¼Á˹ØÓÚ2021Äê¸ú×ÙÈí¼þ£¨Stalkerware£©Ì¬ÊƵķÖÎö»ã±¨¡£¾ÝKasperskyÊý¾ÝÏÔʾ£¬2021ÄêÔÚÈ«ÇòÓÐ32694ÃûÓû§Êܵ½¸ú×ÙÈí¼þµÄÓ°Ï죬Õâ±È2020ÄêµÄÊý×ÖÓÐËùÏ÷¼õ£¬ÍøÂ籩Á¦³ÊÉÏÉýÇ÷Ïò¡£ÊÜÓ°Ïì×îÑϳÁµÄ¹ú¶ÈÒÀÈ»ÊǶíÂÞ˹¡¢°ÍÎ÷ºÍÃÀ¹ú£¬ÕâÓë´ÓǰÁ½ÄêµÄͳ¼ÆÊý¾ÝÒ»Ö¡£CerberusºÍReptilecusÊÇʹÓÃ×î¶àµÄ¸ú×ÙÈí¼þÀûÓã¬ÔÚÈ«Çò±ðÀëÓÐ5575ºÍ4417ÃûÊÜÓ°ÏìÓû§¡£


https://securelist.com/the-state-of-stalkerware-in-2021/106193/