NSAµÈ»ú¹¹½áºÏ°ä²¼ÈôºÎÅäÖÃºÍ¼à¿ØPowerShellµÄÖ¸ÄÏ

°ä²¼¹¦·ò 2022-06-24
1¡¢NSAµÈ»ú¹¹½áºÏ°ä²¼ÈôºÎÅäÖÃºÍ¼à¿ØPowerShellµÄÖ¸ÄÏ


6ÔÂ22ÈÕ£¬ÃÀ¹úCISA¡¢ÐÂÎ÷À¼NZ NCSCºÍÓ¢¹úNCSC-UK°ä²¼ÁËÒ»·Ý½áºÏÍøÂ簲ȫÐÅÏ¢±í(CIS)¡£ÕâЩ»ú¹¹½¨ÒéÊʵ±µÄÅäÖÃºÍ¼à¿ØPowerShell£¬¶ø²»ÊÇÓÉÓÚ¹¥»÷Õß»áÔÚ½Ó¼ûÍøÂçºóʹÓÃËü¶øÆëȫɾ³ý»ò½ûÓÃËü¡£Ö¸ÄϽ¨Ò飬ÀûÓÿò¼ÜÖеÄÖ°ÄÜ£¬ÀýÈçPowerShellÔ¶³Ì´¦Öã»¶ÔÓÚÔ¶³ÌÏνÓ£¬Ê¹ÓÃPowerShell 7ÖÐÖ§³ÖµÄSSH£¬ÒÔÔö³¤¹«Ô¿Éí·ÝÑéÖ¤µÄ·½±ãÐԺͰ²È«ÐÔ£»ÔÚAppLocker»òWindows DefenderÀûÓ÷¨Ê½½ÚÔì(WDAC)µÄÔ®ÊÖÏÂÏ÷¼õPowerShellµÄ²Ù×÷£¬½«¹¤¾ßÉèÖÃΪÊÜÏÞ˵»°Ä£Ê½(CLM)£¬´Ó¶ø»Ø¾øÖÎÀíÔ±½ç˵µÄÕ½ÊõÖ®±íµÄ²Ù×÷¡£ 


https://www.cisa.gov/uscert/ncas/current-activity/2022/06/22/keeping-powershell-measures-use-and-embrace


2¡¢Cyber Spetsnaz½«·æÃ¢¶Ô×¼Á¢ÌÕÍðµÄ¹Ø¼ü»ù´¡ÉèÊ©


¾ÝýÌå6ÔÂ22ÈÕ±¨Â·£¬Cyber SpetsnazÆðÍ·Õë¶Ô¿¹ÌÕÍðÈ·µ±¾Ö»ú¹¹ºÍ¹Ø¼ü»ù´¡ÉèÊ©¡£ÔÚÁ¢ÌÕÍð°ä·¢¶Ô¶íÂÞ˹ʩÐÓ×°½ûÔËÁºó£¬¸ÃÍÅ»ï°ä·¢ÁËЭµ÷DDoS¹¥»÷µÄ¶à¸öÖ¸±ê£¬ÆäÖÐÉæ¼°ÎïÁ÷¹«Ë¾¡¢½»Í¨»ù´¡ÉèÊ©¡¢ÖØÒª½ðÈÚ»ú¹¹¡¢ISP¡¢»ú³¡¡¢ÄÜÔ´¹«Ë¾¡¢ÖØÒªÃ½ÌåºÍµ±¾ÖµÄÍøÕ¾¡£¾Ý6ÔÂ23ÈÕ±¨Â·£¬Á¢ÌÕÍð¹ú¶ÈÍøÂ簲ȫÖÐÐÄ(NKSC)°ä²¼ÁËÒ»Ôò²¼¸æ£¬³ÆÕë¶Ô¸Ã¹úµ±¾ÖµÄDDoS¹¥»÷¼±¾çÔö³¤£¬µ¼ÖÂÁ¢ÌÕÍðµÄÔËÊ乫˾¡¢½ðÈÚ»ú¹¹ºÍÆäËü´óÐÍʵÌå¶¼²úÉúÁ˶ÌÔݵķþÎñÖжÏ¡£


https://securityaffairs.co/wordpress/132518/hacktivism/lithuania-under-cyber-attack.html


3¡¢Check PointÅû¶Tropic Trooper½üÆÚ¹¥»÷µÄÏêÇé


Check PointÔÚ6ÔÂ22ÈÕ°ä²¼Á˹ØÓÚTropic Trooper¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£Õâ´Î»î¶¯Ê¹ÓÃÁËеļÓÔØ·¨Ê½NimbdaºÍľÂíYahoyahµÄбäÖÖ¡£Ï°È¾Á´Ê¼ÓÚ¶ñÒâ°æ±¾µÄSMS Bomber£¬ËüÏÖʵÉÏÊÇNimbda¼ÓÔØ·¨Ê½£¬µ«Ê¹ÓÃÁËSMS Bomberͼ±ê£¬²¢Ô̺¬SMS Bomber×÷ΪǶÈëµÄ¿ÉÖ´ÐÐÎļþ£¬¼ÓÔØºó»á×°ÖÃYahoyah±äÌå²¢ÍøÂçÖ÷»úµÄÊý¾Ý¡£×îÖÕµÄpayloadÓÉYahoyahÏÂÔØ£¬²¢Ê¹ÓÃÒþд¼¼Êõ±àÂëΪJPGͼÏñ£¬Check Point½«Æä¼ø±ðΪTClient£¬ÊÇTropic TrooperÔÚ´Óǰ»î¶¯ÖÐÔøÊ¹ÓùýµÄºóÃÅ¡£´Ë±í£¬ÓÃÓÚ°ü×°YahoyahµÄ¼ÓÃÜÊÇAESµÄ×Ô½ç˵ʵÏÖ£¬ËüÖ´ÐÐÁËÁ½´Îµ¹ÐòµÄÂÖ²Ù×÷£¬Ê¹Ñù±¾·ÖÎö±äµÃ¼«¶ÈÄÑÌâ¡£


https://research.checkpoint.com/2022/chinese-actor-takes-aim-armed-with-nim-language-and-bizarro-aes/


4¡¢QNAP½¨¸´ÒÑ´æÔÚÈýÄêµÄPHP·ì϶CVE-2019-11043


6ÔÂ22ÈÕ£¬QNAP°ä²¼°²È«¸üУ¬½¨¸´ÁËÒ»¸öÒÑ´æÔÚÈýÄêÖ®¾ÃµÄPHP·ì϶£¨CVE-2019-11043£©¡£QNAPÔÚ²¼¸æÖÐÚ¹ÊÍ£¬·ì϶»áÓ°ÏìµÍÓÚ7.1.33µÄPHP°æ±¾7.1.x¡¢µÍÓÚ7.2.24µÄ7.2.xºÍµÍÓÚ7.3.11µÄ7.3.x£¬ÈôÊDZ»ÀûÓ㬿ɵ¼ÖÂÔ¶³ÌÖ´ÐдúÂë¡£¸Ã·ì϶CVSSÆÀ·ÖΪ9.8£¬Ó°ÏìÁËQNAPµÄ¶à¸ö°æ±¾µÄQTS¡¢QuTS heroºÍQuTScloudÉ豸¡£¸Ã¹«Ë¾½¨ÒéÓû§µ±¼´¸üе½×îеİ汾£¬ÒÔ½¨¸´´Ë·ì϶¡£


https://www.bleepingcomputer.com/news/security/critical-php-flaw-exposes-qnap-nas-devices-to-rce-attacks/


5¡¢Proofpoint°ä²¼2022ÄêÉç»á¹¤³ÌµÄ¹¥»÷»î¶¯»ã±¨


ProofpointÔÚ6ÔÂ22ÈÕ°ä²¼ÁË×îеÄÉç»á¹¤³Ìѧ»ã±¨¡£»ã±¨·ÖÎöÁËÉç»á¹¤³ÌµÄÖØÒªÇ÷ÏòºÍÐÐΪ£¬Ô̺¬£¬¹¥»÷ÕßÄܹ»Í¨¹ýµ¢¸é¶Ô»°ÓëÖ¸±ê³ÉÁ¢ÐÅÀµ¡¢À©´óÁ˶ÔÓÐЧսÊõµÄÀÄÓã¨ÈçʹÓÃÊÜÐÅÀµ¹«Ë¾µÄ·þÎñ£©¡¢ÔÚÆä¹¥»÷Á´ÖÐÀûÓÃÕý½»¼¼Êõ£¨Èçµç»°£©¡¢ÖªÂ·²¢ÀûÓÃͬÊÂÖ®¼äÏÖÓеĶԻ°¡¢ÀûÓÃÈȵãºÍÓëÉç»áÓйصÄÖ÷ÌâµÈ¡£´Ë±í£¬¸Ã»ã±¨»¹×ÅÑÛÓÚʱʱ±»ÀÄÓõķþÎñ£¬ºÃ±È¹È¸èDriveºÍDiscord¡£


https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-hijack-attention-2022-social-engineering-report


6¡¢ÈÕ±¾Æû³µÁã¼þÔì×÷ÉÌNichirin³ÆÆäÔâµ½ÀÕË÷¹¥»÷

      

¾Ý6ÔÂ23ÈÕ±¨Â·£¬ÈÕ±¾Æû³µºÍĦÍгµÈí¹ÜÔì×÷ÉÌNichirinµÄ×Ó¹«Ë¾Nichirin-Flex USAÔâµ½ÁËÀÕË÷¹¥»÷£¬µ¼Ö¸ù«Ë¾µÄÍøÂçÖжÏ¡£¹¥»÷²úÉúÔÚ6ÔÂ14ÈÕ£¬¸Ã¹«Ë¾ÔÚ¼ì²âµ½ÆäÍøÂçÉÏδ¾­ÊÚȨµÄ½Ó¼ûºóµ±¼´½«²Ù×÷Çл»µÃÊÖ¶¯Ä£Ê½¡£ÓÉÓÚÍøÂç¹¥»÷Ò²Ó°ÏìÁ˲úÆ··ÖÏú£¬²¢ÇÒ¶©µ¥ÊÇÊÖ¶¯ÊµÏֵģ¬Òò¶ø¿Í»§µÄ¶©µ¥Ó¦¸Ã»áÑÓ³¤¡£¸Ã¹«Ë¾µÄÉêÃ÷°µÊ¾£¬¸´Ô­ÏµÍ³ÒѳÉΪ¸´Ô­ÒµÎñÔËÓªµÄÓÅÏÈÊÂÏÆäĿǰÔÚµ÷²éδ¾­ÊÚȨµÄ½Ó¼ûÊÇÈôºÎ²úÉúµÄ£¬²¢ÊÔͼȷ¶¨ÐÅϢй¶µÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/