Avanan³ÆÀÄÓÃGoogle SMTPÖмÌÈÆ¹ý¼ì²âµÄ»î¶¯¼¤Ôö
°ä²¼¹¦·ò 2022-05-051¡¢Avanan³ÆÀÄÓÃGoogle SMTPÖмÌÈÆ¹ý¼ì²âµÄ»î¶¯¼¤Ôö
¾ÝýÌå5ÔÂ2ÈÕ±¨Â·£¬Óʼþ°²È«¹«Ë¾Avanan³Æ´Ó2022Äê4ÔÂÆðÍ·£¬ÀÄÓùȸèSMTPÖм̷þÎñµÄ¹¥»÷»î¶¯¼¤Ôö¡£¸Ã¹«Ë¾ÔÚ4ÔµÄǰÁ½Öܼì²âµ½ÖÁÉÙ30000·âͨ¹ýÕâÖÖ²½Öè·Ö·¢µÄÓʼþ¡£GmailºÍGoogle WorkspaceÓû§Äܹ»Ê¹Óø÷þÎñÀ´Â·ÓÉ±í·¢µç×ÓÓʼþ£¬Avanan°µÊ¾£¬¹¥»÷ÕßÄܹ»ÀûÓøÃÖм̷þÎñÈÆ¹ýµç×ÓÓʼþ°²È«²úÆ·µÄ¼ì²â¡£×êÑÐÈËÔ±ÒÑÓÚ4ÔÂ23ÈÕÏòGmail»ã±¨ÁË´ËÀ๥»÷£¬²¢½¨ÒéÓû§ÉèÖÃÑϸñµÄDMARCÕ½ÊõÀ´Õмܹ¥»÷¡£
https://www.bleepingcomputer.com/news/security/google-smtp-relay-service-abused-for-sending-phishing-emails/
2¡¢F5°ä²¼BIG-IPÖеÄRCE·ì϶CVE-2022-1388µÄ°²È«¹«¸æ
5ÔÂ4ÈÕ£¬F5°ä²¼°²È«²¼¸æÅû¶ÁËBIG-IPÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-1388£©µÄϸ½Ú¡£¸Ã·ì϶CVSSÆÀ·ÖΪ9.8£¬´æÔÚÓÚiControl REST×é¼þÖУ¬¿Éͨ¹ý·¢ËÍδ¹«¿ªµÄÒªÇóÀ´ÈƹýBIG-IPÖеÄiControl RESTÉí·ÝÑéÖ¤¡£Ä¿Ç°£¬¸Ã·ì϶ÒÑÔÚF5°ä²¼µÄ5Ô·ݰ²È«¸üÐÂÖн¨¸´£¬Õâ´Î¸üл¹½¨¸´ÁËCVE-2022-25946¡¢CVE-2022-27806ºÍCVE-2022-28707µÈ¶à¸öÑϳÁµÄ·ì϶¡£
https://www.bleepingcomputer.com/news/security/f5-warns-of-critical-big-ip-rce-bug-allowing-device-takeover/
3¡¢UNC3524ÀûÓÃкóÃÅQUIETEXITÒÔÇÔȡָ±êµÄµç×ÓÓʼþ
MandiantÔÚ5ÔÂ2Èճƣ¬Ð·¢ÏÖµÄÒ»¸öAPT×éÖ¯UNC3524£¬Ö¼ÔÚÇÔÈ¡²Î¼Ó¹«Ë¾ÂòÂô£¨Èç²¢¹º£©µÄÔ±¹¤µÄÓʼþ¡£×êÑÐÈËÔ±·¢ÏÖ¸ÃÍÅ»ïʹÓÃÁËкóÃÅQUIETEXIT£¬ÔÚ²¿ÃŹ¥»÷Öл¹ÔÚDMZÍøÂç·þÎñÆ÷ÉÏ×°ÖÃÁËreGeorg web shell£¬ÒÔ´´½¨Ò»¸öSOCKSËí·×÷Ϊ±¸ÓýÓÈëµã¡£ÔÚ»ñµÃ½Ó¼ûȨÏÞ²¢×°ÖúóÃź󣬹¥»÷Õ߯ðÍ·ÏòExchangeÓÊÏä·¢ËÍһϵÁÐEWS APIÒªÇó£¬À´ÇÔÈ¡ÓйØÓʼþ¡£
https://www.mandiant.com/resources/unc3524-eye-spy-email
4¡¢Moshen DragonÀûÓÃPlugXµÈ¶ñÒâÈí¼þ¹¥»÷ÖÐÑǵØÓò
5ÔÂ2ÈÕ£¬SentinelLabsÏêÊöÁËMoshen DragonÕë¶ÔÖÐÑǵØÓòµÄµçÐŲ¿ÃŵĹ¥»÷»î¶¯¡£¹¥»÷Õß³¢ÊÔ½«¶ñÒâWindows DLL¼ÓÔØµ½É±¶¾²úÆ·ÖУ¬Éæ¼°TrendMicro¡¢Bitdefender¡¢McAfee¡¢SymantecºÍKasperskyµÈ¹«Ë¾¡£ÓÉÓÚÕâЩAV²úÆ·ÔÚ²Ù×÷ϵͳÉÏÒԽϸߵÄȨÏÞÔËÐУ¬Òò¶øÔÚÆä¹ý³ÌÖвàÔØ¶ñÒâDLLʹ¹¥»÷Õß¿ÉÄÜÔÚÏÕЩûÓÐÏ޶ȵÄÇé¿öÏÂÖ´ÐдúÂë²¢ÈÆ¹ý¼ì²â¡£¸ÃÍÅ»ïÓëRedFoxtrotºÍNomad PandaÓв¿ÃųÁµþ£¬Ô̺¬¶¼Ê¹ÓÃÁËShadowPadºÍPlugX¡£
https://www.sentinelone.com/labs/moshen-dragons-triad-and-error-approach-abusing-security-software-to-sideload-plugx-and-shadowpad/
5¡¢Google°ä²¼½üÆÚ¹ØÓÚ¹¥»÷¶«Å·µÄ»î¶¯µÄ·ÖÎö»ã±¨
5ÔÂ3ÈÕ£¬Google TAG°ä²¼Á˽üÆÚ¹ØÓÚ¹¥»÷¶«Å·µÄ»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬¹¥»÷ÕßÔ½À´Ô½¶àµØÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ©£¬Ô̺¬Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐźÍÔì×÷ÐÐÒµµÈ¡£¹¥»÷»î¶¯Ô̺¬£¬APT28ÍÅ»ïÔÚͨ¹ý´¹µöÓʼþ·Ö·¢ÐµĶñÒâÈí¼þ±äÌ壻Turla¶Ô×¼²¨Â޵ĺ£µØÓòµÄ¹ú·ÀºÍÍøÂ簲ȫ»ú¹¹£»ColdriverʹÓÃGmailÕÊ»§·¢ËÍÕë¶Ôµ±¾ÖºÍ¹ú·À»ú¹¹¡¢·Çµ±¾Ö×éÖ¯¡¢ÖÇÄÒÍźÍýÌåÐÐÒµµÄ´¹µöÓʼþºÍGhostwriterͨ¹ý´¹µö¹¥»÷ÇÔȡʹ´¦µÈ¡£
https://blog.google/threat-analysis-group/update-on-cyber-activity-in-eastern-europe/
6¡¢Cybereason°ä²¼WinntiÕë¶ÔÃÀ¹úµÄ¹¥»÷»î¶¯µÄ»ã±¨
5ÔÂ4ÈÕ£¬Cybereason°ä²¼ÁËÁ½·Ý»ã±¨ÏêÊöÁËWinnti¸´ÔӵĹ¥»÷»î¶¯¡£Õâ´Î»î¶¯ÆðÍ·ÓÚ2019Ä꣬µ«ÔÚ×î½ü²Å±»ÆØ¹â¡£¹¥»÷Õß¶Ô×¼ÁËÅ·ÖÞ¡¢ÑÇÖ޺ͱ±ÃÀµÄ¼¼ÊõºÍÔì×÷¹«Ë¾£¬×¨Ò»ÓÚ¼äµý»î¶¯ºÍÊý¾ÝÇÔÈ¡¡£Winnti¸´ÔӵĶà½×¶ÎϰȾÁ´±»³ÆÎªOperation CuckooBees£¬ÀûÓÃÁËERPÈí¼þÖеķì϶£¬Æä¶ñÒâÈí¼þÔ̺¬Spyder¡¢STASHLOG¡¢SPARKLOG¡¢PRIVATELOG¡¢DEPLOYLOGºÍWINNKIT¡£Ä¿Ç°£¬¸Ã°²È«¹«Ë¾ÒÑÏòFBIºÍÃÀ¹ú˾·¨²¿Åû¶ÁËÕâ´ÎAPT¹¥»÷»î¶¯¡£
https://www.cybereason.com/blog/operation-cuckoobees-deep-dive-into-stealthy-winnti-techniques


¾©¹«Íø°²±¸11010802024551ºÅ