΢ÈíÅû¶ÀûÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
°ä²¼¹¦·ò 2023-04-181¡¢Î¢ÈíÅû¶ÀûÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
4ÔÂ13ÈÕ£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú¹ÜÕʺͱ¨Ë°¹«Ë¾µÄ´¹µö¹¥»÷»î¶¯¡£´¹µöÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£ZIPÎĵµÔ̺¬ºÜ¶à¼Ù×°³É¸÷Àà˰±íPDFµÄÎļþ£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½Ê½¡£¿ì½Ý·½Ê½Ö´ÐÐPowerShell£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬½ø¶ø×°ÖÃRemcos RAT¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ½Ó¼ûȨÏÞ£¬¹¥»÷Õß¿ÉÀûÓôËȨÏÞ½øÒ»²½´«²¼£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£
https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/
2¡¢ÐÂ¼ÓÆÂ¼ÓÃÜÇ®±ÒÂòÂôƽ̨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª
ýÌå4ÔÂ15Èճƣ¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÂòÂôƽ̨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬ËðʧԼ2300ÍòÃÀÔª¡£ÉêÃ÷°µÊ¾£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬Ô̺¬ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£Bitrue³Æ£¬ÊÜÓ°ÏìµÄÊÇÄܹ»Í¨¹ý»¥ÁªÍø½Ó¼ûµÄÈÈÇ®°ü£¬Ö»Ô̺¬Bitrue×Ü×ʽðµÄ²»µ½5%£¬ÆäÓàÇ®°üÒÀÈ»°²È«¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬Í¬Ê±½øÐа²È«²é³£¬´òËãÓÚ4ÔÂ18ÈÕ³ÁÐÂÊ¢¿ª¡£
https://therecord.media/bitrue-23million-stolen-cryptocurrency
3¡¢²¨À¼µý±¨»ú¹¹Ð¹Â©APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ
²¨À¼¾üÊ·´µý±¨¾Ö¼°ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××éÔÚ4ÔÂ13Èճƣ¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷Óйء£¸Ãµý±¨»ú¹¹Ö¸³ö£¬½üÆÚ»î¶¯µÄºÜ¶àÉí·Ö£¬Ô̺¬»ù´¡ÉèÊ©¡¢Ê¹Óõļ¼ÊõºÍ¹¤¾ß£¬¶¼Óë´ÓǰµÄAPT29»î¶¯³Áµþ¡£¹¥»÷Õë¶Ô±í½»ÈËÔ±£¬Ê¹ÓüÙÒâÅ·ÖÞ¹ú¶È´óʹ¹ÝµÄÓã²æÊ½´¹µöÓʼþ£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬Ô̺¬SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£Ä¿Ç°£¬¸Ã»î¶¯ÈÔÔÚ½øÐÐÖС£
https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html
4¡¢AhnLab·¢ÏÖÀÕË÷Èí¼þTrigona¹¥»÷MS-SQL·þÎñÆ÷µÄ»î¶¯
AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢ÏÖÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQL·þÎñÆ÷µÄ»î¶¯¡£¾Ý´§Ä¦£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£CLR ShellÓÐÒ»¸öÀûÓÃÌáȨ·ì϶µÄÀý³Ì£¬¿ÉÄÜÊÇÓÉÓÚTrigona±ØÒª¸ßȨÏÞ¡£MS-SQL¹ý³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£svcservice.exeÊÇÒ»¸ödropper£¬ËüÔÚͳһõè¾¶ÉÏ´´½¨²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬¼´svchost.exe¡£
https://asec.ahnlab.com/en/51343/
5¡¢IBM°ä²¼¹ØÓÚÓëFIN7ÓйصĶñÒâÈí¼þDominoµÄ·ÖÎö»ã±¨
4ÔÂ14ÈÕ£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢ÈËÔ±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬±ðÀëΪDomino BackdoorºÍDomino Loader¡£Í¨³££¬Dave Loader»á·Ö·¢Domino Backdoor¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬¶øºóÏÂÔØDomino Loader¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡·¨Ê½¡£DominoµÄ´úÂëÓëLizarÓдóÁ¿³Áµþ£¬LizarÊÇÓëFIN7ÓйصŤ¾ß°ü£¬Òò¶øIBM½«Æä¹éÒòÓÚFIN7¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬Òò¶ø¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£
https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/
6¡¢Trellix°ä²¼ÐÂRaaSÌṩÉÌRTM LockerµÄ·ÖÎö»ã±¨
4ÔÂ13ÈÕ£¬Trellix°ä²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´·þÎñ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ïµÄÕ½ÊõֻרһÓÚÒ»¼þÊ£¬¼´µÍµ÷ÐÐÊ¡£ËûÃǵÄÖ¸±ê²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇé¿öÏÂÓ®Àû¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÓйØ×éÖ¯¡¢¹Ø¼ü»ù´¡ÉèÊ©ºÍ·¨Âɲ¿Ãŵȣ¬ÒÔ¾¡¿ÉÄÜÏ÷¼õ¹Ø×¢¡£¸ÃÍÅ»ïµÄÒµÎñÉèÖã¬ÒªÇó´ÓÊô»ú¹¹Î¬³Ö»îÔ¾£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»¹Û²ìµ½¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html


¾©¹«Íø°²±¸11010802024551ºÅ