Avanan³ÆÀÄÓÃGoogle SMTPÖмÌÈÆ¹ý¼ì²âµÄ»î¶¯¼¤Ôö

°ä²¼¹¦·ò 2022-05-05

1¡¢Avanan³ÆÀÄÓÃGoogle SMTPÖмÌÈÆ¹ý¼ì²âµÄ»î¶¯¼¤Ôö


¾ÝýÌå5ÔÂ2ÈÕ±¨Â· £¬Óʼþ°²È«¹«Ë¾Avanan³Æ´Ó2022Äê4ÔÂÆðÍ· £¬ÀÄÓùȸèSMTPÖм̷þÎñµÄ¹¥»÷»î¶¯¼¤Ôö ¡£¸Ã¹«Ë¾ÔÚ4ÔµÄǰÁ½Öܼì²âµ½ÖÁÉÙ30000·âͨ¹ýÕâÖÖ²½Öè·Ö·¢µÄÓʼþ ¡£GmailºÍGoogle WorkspaceÓû§Äܹ»Ê¹Óø÷þÎñÀ´Â·ÓÉ±í·¢µç×ÓÓʼþ £¬Avanan°µÊ¾ £¬¹¥»÷ÕßÄܹ»ÀûÓøÃÖм̷þÎñÈÆ¹ýµç×ÓÓʼþ°²È«²úÆ·µÄ¼ì²â ¡£×êÑÐÈËÔ±ÒÑÓÚ4ÔÂ23ÈÕÏòGmail»ã±¨ÁË´ËÀ๥»÷ £¬²¢½¨ÒéÓû§ÉèÖÃÑϸñµÄDMARCÕ½ÊõÀ´Õмܹ¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/google-smtp-relay-service-abused-for-sending-phishing-emails/  


2¡¢F5°ä²¼BIG-IPÖеÄRCE·ì϶CVE-2022-1388µÄ°²È«¹«¸æ


5ÔÂ4ÈÕ £¬F5°ä²¼°²È«²¼¸æÅû¶ÁËBIG-IPÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-1388£©µÄϸ½Ú ¡£¸Ã·ì϶CVSSÆÀ·ÖΪ9.8 £¬´æÔÚÓÚiControl REST×é¼þÖÐ £¬¿Éͨ¹ý·¢ËÍδ¹«¿ªµÄÒªÇóÀ´ÈƹýBIG-IPÖеÄiControl RESTÉí·ÝÑéÖ¤ ¡£Ä¿Ç° £¬¸Ã·ì϶ÒÑÔÚF5°ä²¼µÄ5Ô·ݰ²È«¸üÐÂÖн¨¸´ £¬Õâ´Î¸üл¹½¨¸´ÁËCVE-2022-25946¡¢CVE-2022-27806ºÍCVE-2022-28707µÈ¶à¸öÑϳÁµÄ·ì϶ ¡£


https://www.bleepingcomputer.com/news/security/f5-warns-of-critical-big-ip-rce-bug-allowing-device-takeover/


3¡¢UNC3524ÀûÓÃкóÃÅQUIETEXITÒÔÇÔȡָ±êµÄµç×ÓÓʼþ


MandiantÔÚ5ÔÂ2ÈÕ³Æ £¬Ð·¢ÏÖµÄÒ»¸öAPT×éÖ¯UNC3524 £¬Ö¼ÔÚÇÔÈ¡²Î¼Ó¹«Ë¾ÂòÂô£¨Èç²¢¹º£©µÄÔ±¹¤µÄÓʼþ ¡£×êÑÐÈËÔ±·¢ÏÖ¸ÃÍÅ»ïʹÓÃÁËкóÃÅQUIETEXIT £¬ÔÚ²¿ÃŹ¥»÷Öл¹ÔÚDMZÍøÂç·þÎñÆ÷ÉÏ×°ÖÃÁËreGeorg web shell £¬ÒÔ´´½¨Ò»¸öSOCKSËí·×÷Ϊ±¸ÓýÓÈëµã ¡£ÔÚ»ñµÃ½Ó¼ûȨÏÞ²¢×°ÖúóÃźó £¬¹¥»÷Õ߯ðÍ·ÏòExchangeÓÊÏä·¢ËÍһϵÁÐEWS APIÒªÇó £¬À´ÇÔÈ¡ÓйØÓʼþ ¡£


https://www.mandiant.com/resources/unc3524-eye-spy-email


4¡¢Moshen DragonÀûÓÃPlugXµÈ¶ñÒâÈí¼þ¹¥»÷ÖÐÑǵØÓò


5ÔÂ2ÈÕ £¬SentinelLabsÏêÊöÁËMoshen DragonÕë¶ÔÖÐÑǵØÓòµÄµçÐŲ¿ÃŵĹ¥»÷»î¶¯ ¡£¹¥»÷Õß³¢ÊÔ½«¶ñÒâWindows DLL¼ÓÔØµ½É±¶¾²úÆ·ÖÐ £¬Éæ¼°TrendMicro¡¢Bitdefender¡¢McAfee¡¢SymantecºÍKasperskyµÈ¹«Ë¾ ¡£ÓÉÓÚÕâЩAV²úÆ·ÔÚ²Ù×÷ϵͳÉÏÒԽϸߵÄȨÏÞÔËÐÐ £¬Òò¶øÔÚÆä¹ý³ÌÖвàÔØ¶ñÒâDLLʹ¹¥»÷Õß¿ÉÄÜÔÚÏÕЩûÓÐÏ޶ȵÄÇé¿öÏÂÖ´ÐдúÂë²¢ÈÆ¹ý¼ì²â ¡£¸ÃÍÅ»ïÓëRedFoxtrotºÍNomad PandaÓв¿ÃųÁµþ £¬Ô̺¬¶¼Ê¹ÓÃÁËShadowPadºÍPlugX ¡£


https://www.sentinelone.com/labs/moshen-dragons-triad-and-error-approach-abusing-security-software-to-sideload-plugx-and-shadowpad/


5¡¢Google°ä²¼½üÆÚ¹ØÓÚ¹¥»÷¶«Å·µÄ»î¶¯µÄ·ÖÎö»ã±¨


5ÔÂ3ÈÕ £¬Google TAG°ä²¼Á˽üÆÚ¹ØÓÚ¹¥»÷¶«Å·µÄ»î¶¯µÄ·ÖÎö»ã±¨ ¡£»ã±¨Ö¸³ö £¬¹¥»÷ÕßÔ½À´Ô½¶àµØÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ© £¬Ô̺¬Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐźÍÔì×÷ÐÐÒµµÈ ¡£¹¥»÷»î¶¯Ô̺¬ £¬APT28ÍÅ»ïÔÚͨ¹ý´¹µöÓʼþ·Ö·¢ÐµĶñÒâÈí¼þ±äÌ壻Turla¶Ô×¼²¨Â޵ĺ£µØÓòµÄ¹ú·ÀºÍÍøÂ簲ȫ»ú¹¹£»ColdriverʹÓÃGmailÕÊ»§·¢ËÍÕë¶Ôµ±¾ÖºÍ¹ú·À»ú¹¹¡¢·Çµ±¾Ö×éÖ¯¡¢ÖÇÄÒÍźÍýÌåÐÐÒµµÄ´¹µöÓʼþºÍGhostwriterͨ¹ý´¹µö¹¥»÷ÇÔȡʹ´¦µÈ ¡£


https://blog.google/threat-analysis-group/update-on-cyber-activity-in-eastern-europe/


6¡¢Cybereason°ä²¼WinntiÕë¶ÔÃÀ¹úµÄ¹¥»÷»î¶¯µÄ»ã±¨


5ÔÂ4ÈÕ £¬Cybereason°ä²¼ÁËÁ½·Ý»ã±¨ÏêÊöÁËWinnti¸´ÔӵĹ¥»÷»î¶¯ ¡£Õâ´Î»î¶¯ÆðÍ·ÓÚ2019Äê £¬µ«ÔÚ×î½ü²Å±»ÆØ¹â ¡£¹¥»÷Õß¶Ô×¼ÁËÅ·ÖÞ¡¢ÑÇÖ޺ͱ±ÃÀµÄ¼¼ÊõºÍÔì×÷¹«Ë¾ £¬×¨Ò»ÓÚ¼äµý»î¶¯ºÍÊý¾ÝÇÔÈ¡ ¡£Winnti¸´ÔӵĶà½×¶ÎϰȾÁ´±»³ÆÎªOperation CuckooBees £¬ÀûÓÃÁËERPÈí¼þÖеķì϶ £¬Æä¶ñÒâÈí¼þÔ̺¬Spyder¡¢STASHLOG¡¢SPARKLOG¡¢PRIVATELOG¡¢DEPLOYLOGºÍWINNKIT ¡£Ä¿Ç° £¬¸Ã°²È«¹«Ë¾ÒÑÏòFBIºÍÃÀ¹ú˾·¨²¿Åû¶ÁËÕâ´ÎAPT¹¥»÷»î¶¯ ¡£


https://www.cybereason.com/blog/operation-cuckoobees-deep-dive-into-stealthy-winnti-techniques