×êÑÐÈËÔ±ÔÚ¶à¸öÖ¸±êϵͳÉϼì²âµ½·ì϶ÀûÓù¤¾ßIceApple

°ä²¼¹¦·ò 2022-05-13
1¡¢×êÑÐÈËÔ±ÔÚ¶à¸öÖ¸±êϵͳÉϼì²âµ½·ì϶ÀûÓù¤¾ßIceApple


¾ÝýÌå5ÔÂ11ÈÕ±¨Â· £¬CrowdStrike·¢ÏÖÁËÒ»ÖÖеķì϶ÀûÓù¤¾ßIceApple¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äêµ×³õ´Î±»·¢ÏÖ £¬Ä¿Ç°ÈÔÔÚ»ý¼«¿ª·¢ÖС£IceAppleÊǹ¥»÷ÕßÔÚ»ñµÃ¸÷ÀàÐÐÒµ£¨¼¼Êõ¡¢Ñ§ÊõºÍµ±¾Ö£©×éÖ¯ÍøÂçµÄ³õʼ½Ó¼ûȨÏÞºó×°ÖõÄ £¬Ä¿Ç°ÒÑÔÚ¶à¸öÖ¸±êµÄMicrosoft Exchange ServerÊ·ýÉϼì²âµ½ £¬µ«ËüÒ²Äܹ»ÔÚIISÉÏÔËÐС£¸Ã¶ñÒâ¿ò¼Ü»ùÓÚ.NET £¬ÓµÓÐÖÁÉÙ18¸öÄ£¿é £¬Ã¿¸öÄ£¿éÓÃÓÚÌØ¶¨¹¤×÷ £¬¿ÉÓÃÀ´·¢ÏÖÍøÂçÉϵÄÓйØÉ豸¡¢ÇÔȡʹ´¦¡¢É¾³ýÎļþºÍĿ¼ÒÔ¼°ÇÔÈ¡ÓмÛÖµµÄÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/new-iceapple-exploit-toolset-deployed-on-microsoft-exchange-servers/


2¡¢ÐµÄNerbian RAT¶Ô×¼Òâ´óÀûºÍÎ÷°àÑÀµÈÅ·ÖÞ¹ú¶È


5ÔÂ11ÈÕ £¬ProofpointÅû¶ÁËÐÂNerbian RATµÄ¹¥»÷»î¶¯µÄϸ½ÚÐÅÏ¢¡£¹¥»÷»î¶¯×Ô4ÔÂ26ÈÕÆðÍ· £¬Í¨¹ýÒÔCOVID-19ºÍºÍÊÀ½çÎÀÉú×é֯ΪÖ÷ÌâµÄ´¹µö»î¶¯·Ö·¢¶ñÒâÈí¼þ £¬ÖØÒªÕë¶ÔÒâ´óÀû¡¢Î÷°àÑÀºÍÓ¢¹úµÄ×éÖ¯¡£NerbianÓÉGo˵»°±àд £¬Îª64λϵͳ±àÒë £¬ÀûÓÃÁ˶à¸ö¼ÓÃܹý³ÌÈÆ¹ý°²È«·ÖÎö¡£Dropper»¹ÀûÓÃÁË¿ªÔ´ChacalµÄ¡°·´VM¿ò¼Ü¡±À´Ôö³¤ÄæÏò¹¤³ÌµÄÄѶÈ¡£¾ÝϤ £¬DropperºÍRAT¶¼ÊÇÓÉͳһ¿ª·¢Õß¿ª·¢µÄ £¬µ«¹¥»÷ÕßµÄÉí·ÝÒÀȻδ֪¡£


https://www.proofpoint.com/us/blog/threat-insight/nerbian-rat-using-covid-19-themes-features-sophisticated-evasion-techniques


3¡¢Ó¢¹úÄÐ×Ó±»Ö¸¿ØÈëÇÖÃÀ¹úij½ðÈÚ»ú¹¹Ëðʧ³¬¹ý500ÍòÃÀÔª


¾Ý5ÔÂ11ÈÕ±¨Â· £¬32ËêµÄÓ¢¹úÄÐ×ÓIdris Dayo Mustapha±»Ö¸¿ØÈëÇÖÃÀ¹úij½ðÈÚ»ú¹¹ £¬Ôì³É³¬¹ý500ÍòÃÀÔªµÄËðʧ¡£5ÔÂ10ÈÕ¹«¿ªµÄͶËßÏÔʾ £¬¸ÃÄÐ×ÓÊÇijºÚ¿ÍÍÅ»ïµÄÒ»Ô± £¬ËûÃÇÔÚ2011Äê1ÔÂÖÁ2018Äê3ÔÂÆÚ¼äʹÓô¹µöµÈ¹¥»÷·½Ê½»ñÈ¡Óû§Í´´¦ £¬ÒÔÇÔÈ¡ÍøÉÏÒøÐÐÕË»§ºÍ֤ȯ¾­¼ÍÕË»§ÖеÄ×ʽð¡£ÈôÊÇ×ïÃû³ÉÁ¢ £¬Mustapha½«Òòµç»ãÚ¿Æ­¡¢Ö¤È¯Ú¿Æ­ºÍÏ´Ç®µÈÖ¸¿ØÃæ¶Ô³¤´ï20ÄêµÄ½ûïÀ¡£


https://www.infosecurity-magazine.com/news/british-charged-hacking-us-bank/


4¡¢ÄϷǹ«Ë¾Dis-ChemÔâµ½¹¥»÷й¶³¬¹ý360ÍòÈ˵ÄÐÅÏ¢


ýÌå5ÔÂ11ÈÕ±¨Â· £¬ÄÏ·Ç×î´óµÄÒ©Æ·ÁãÊÛÉÌÖ®Ò»Dis-ChemÒÑй¶³¬¹ý360ÍòÈ˵ÄÐÅÏ¢¡£¾Ý¸Ã¹«Ë¾³Æ £¬Õâ´ÎÊÂÎñÊÇÓÉÆäµÚÈý·½·þÎñÌṩÉÌÔâµ½ÍøÂç¹¥»÷µ¼ÖµÄ £¬Éæ¼°¿Í»§µÄÐÕÃû¡¢ÓʼþµØÖ·ºÍÊÖ»úºÅÂëµÈÐÅÏ¢¡£Ð¹Â¶²úÉúÔÚ4ÔÂ28ÈÕ £¬ÔÚ5ÔÂ1Èղű»·¢ÏÖ¡£½üÆÚ £¬¹¥»÷ÕßÔ½À´Ô½¶àµØÕë¶ÔÄϷǵÄ×éÖ¯ £¬2¸öÔÂǰ £¬ÃÀ¹úÏû·ÑÕßÐÅÓþ»ã±¨»ú¹¹TransUnion³ÆÆäλÓÚÄϷǵķþÎñÆ÷±»ÈëÇÖ £¬Ð¹Â¶ÁË5400ÍòÓû§µÄÐÅÏ¢¡£


https://www.itweb.co.za/content/PmxVE7KEABOqQY85


5¡¢Cisco°ä²¼BitterÍŻ﹥»÷ÃϼÓÀ­µ±¾Öij»ú¹¹µÄ»ã±¨


Cisco TalosÔÚ5ÔÂ11ÈÕ°ä²¼Á˹ØÓÚAPT×éÖ¯Bitter¹¥»÷ÃϼÓÀ­¹úµÄ·ÖÎö»ã±¨¡£¹¥»÷»î¶¯ÆðÍ·×Ô2021Äê8Ô £¬Õë¶ÔÃϼÓÀ­ÄÚ²¿µÄ¸÷Àà×éÖ¯ £¬ÓµÓÐÁ½ÌõϰȾÁ´ £¬¾ùͨ¹ýÓã²æÊ½´¹µö»î¶¯½øÐС£´¹µöÓʼþÀ´×Ô°Í»ù˹̹ȷµ±¾Ö»ú¹¹ £¬Õâ¿ÉÄÜÊÇÀûÓÃÓʼþ·þÎñÆ÷ZimbraÖеÄÒ»¸ö·ì϶À´ÊµÏÖ¡£Á½ÌõϰȾÁ´Ö®¼äµÄÇø±ðÔÚÓÚ¸½¼ÓµÄ¶ñÒâÎļþÀàÐÍ£ºÒ»¸öÊÇ.RTF £¬ÁíÒ»¸öÊÇ.XLSXÎĵµ¡£RTFÎĵ·ûÓÃÁË·ì϶CVE-2017-11882²¢ÔÚÖ¸±êÖÐÔ¶³ÌÖ´ÐдúÂë £¬ExcelÎĵµ´¥·¢Á˶ÔCVE-2018-0798ºÍCVE-2018-0802µÄ·ì϶ÀûÓá£


https://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html


6¡¢¶à¹úµ±¾Ö°ä²¼Õë¶ÔMSP¼°Æä¿Í»§µÄÍøÂçÍþвµÄ½áºÏÕ÷ѯ 


5ÔÂ11ÈÕ £¬°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢Ó¢¹úºÍÃÀ¹úµÄ¶à¸öÍøÂ簲ȫ»ú¹¹°ä²¼ÁËÕë¶ÔÍйܷþÎñÌṩÉÌ(MSP)¼°Æä¿Í»§µÄÍøÂçÍþвµÄ½áºÏÕ÷ѯ¡£MSPÒѳÉΪ¹¥»÷ÕßÀ©´ó¹¥»÷¹æÄ£µÄõè¾¶ £¬ÓÉÓÚÒ×Êܹ¥»÷µÄÌṩÉÌÄܹ»±»±øÆ÷»¯²¢×÷Ϊ³õʼ½Ó¼ûÔØÌå £¬ÒÔͬʱ¹¥»÷¶à¸öÏÂÓοͻ§¡£Õ÷ѯÖн¨Òé £¬¼ø±ðºÍ½ûÓò»ÔÙʹÓõÄÕÊ»§£»¶Ô½Ó¼û¿Í»§»·¾³µÄMSPÕË»§Ö´ÐÐMFA £¬²¢¼à²âδڹÊ͵Äʧ°ÜÈÏÖ¤£»È·±£MSP¿Í»§ºÏͬÀí½âÐÅÏ¢ºÍͨѶ¼¼Êõ(ICT)°²È«½ÇÉ«ºÍÔðÈεÄËùÓÐȨ¡£


https://thehackernews.com/2022/05/government-agencies-warned-of-increase.html