ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÁÙʱÖжÏ
°ä²¼¹¦·ò 2023-04-251¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÁÙʱÖжÏ
¾ÝýÌå4ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷£¬Ó°ÏìÁËÆäµç×ÓÓʼþ·þÎñÆ÷ºÍ²¿ÃÅϵͳ¡£¹¥»÷²úÉúÔÚ4ÔÂ12ÈÕÔ糿£¬¸ÃÔì´¬³§Ð¹Â©£¬¹¥»÷Õë¶ÔµÄ·þÎñÆ÷ÖØÒªÓÃÓÚ±£ÁôÏòÆäÍÆËã»úÊý½ÚÔì×÷É豸ÌṩָÁîµÄÊý¾Ý£¬µ¼ÖÂËüÃÇå´»úÊýÌ졣ĿǰûÓÐÔ±¹¤µÄÓ×ÎÒÐÅÏ¢Êܵ½Ó°Ïì¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬FMGÒѲÉÈ¡´ëÊ©½øÐÐÏìÓ¦£¬Ë®Ê¦ÔÚ»ý¼«¼à¶½ÕâЩ¹¤×÷¡£
https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/
2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ
¾Ý4ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢µï±¤Ö®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ£¬Ðû³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍÎè±×Æ÷µÈ¡£ËüÃÇ»á¼ÓÔØ¼Ù×°³ÉFortniteÒ³ÃæµÄ´¹µöÍøÒ³£¬»ò³ÐŵÌṩÀñÎ│µÄÐéαµÄµ÷²é¡£´Ë±í£¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖݵ±¾ÖµÄÒ»¸öÓ×ÐÍÍøÕ¾£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£
https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/
3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢ÏÖеÄDecoy Dog
InfobloxÓÚ4ÔÂ20Èճƣ¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó£¬·¢ÏÖÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¸Ã¹¤¾ßÖ¼ÔÚÔ®ÊÖ¹¥»÷Õßͨ¹ýÕ½ÊõÐÔµÄÓòÃûÀÏ»¯ºÍDNS²éÎÊÔËÔØÀ´Èƹý¼ì²â£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«Îªº±¼û¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄµ÷²é·¢ÏÖÁ˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò£¬ËüÃǵĴó²¿ÃÅͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£ÕâЩÓòÃûµÄDNSËí·ӵÓÐÖ¸ÏòPupy RATµÄÌØµã£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü²¿ÊðµÄÔ¶³Ì½Ó¼ûľÂí¡£
https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/
4¡¢AquaÅû¶ÀûÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯
AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢ÏÖÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯£¬ÀûÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ½Ó¼û½ÚÔì(RBAC)´´½¨ºóÃŲ¢ÔËÐп󹤡£Í¨¹ýÀûÓÃRBACÖ´ÐжñÒâ½Ó¼û½ÚÔìÕ½Êõ£¬¼´±ãÌṩ³õʼ½Ó¼ûµÄÃýÎóÅäÖÃÔÚ½«À´µÃµ½½¨¸´£¬¹¥»÷ÕßÒ²Äܹ»ÔÚ±»Ï°È¾µÄ¼¯ÈºÉϳÖÐø´æÔÚ¡£¹¥»÷Á´ÀûÓÃÅäÖÃÃýÎóµÄAPI·þÎñÆ÷½øÐгõʼ½Ó¼û£¬¶øºó·¢ËÍHTTPÒªÇóÒÔÁгö»úÃÜ£¬²¢·¢³öAPIÒªÇóÒÔͨ¹ýÁгö¶¨Ãû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£´Ë±í£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´ÊÕÊܺͽٳֱ»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£
https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters
5¡¢×êÑÐÍŶӷ¢ÏÖÀûÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯
4ÔÂ20ÈÕ£¬SecureWorksÅû¶ÁËÀûÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£×êÑÐÈËÔ±·¢ÏÖÒ»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnect°²È«Òƶ¯¿Í»§¶ËÏÂÔØÒ³Ãæ£¬Ëü´´½¨ÓÚ2ÔÂ16ÈÕ£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°Ö÷¨Ê½cisco-anyconnect-4_9_0195.msi£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£´Ë±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÁËÆäËüÓµÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1£¬ChatGPT.msiºÍchch.ps1£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£
https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads
6¡¢Huntress°ä²¼PaperCut·ì϶ÀûÓûµÄ·ÖÎö»ã±¨
4ÔÂ21ÈÕ£¬Huntress°ä²¼»ã±¨£¬³ÆÆä·¢ÏÖÁËÀûÓÃPaperCut MF/NG·ì϶µÄ»î¶¯¡£ÕâÁ½¸ö·ì϶£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ï°È¾µÄPaperCut·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£×êÑÐÈËÔ±·¢ÏÖ´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellºÅÁÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ£¬ÒÔ±ãÔÚÖ¸±êÖ÷»ú³ÖÐø½Ó¼ûºÍÖ´ÐдúÂë¡£»ù´¡ÉèÊ©·ÖÎö·¢ÏÖ£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйء£
https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software


¾©¹«Íø°²±¸11010802024551ºÅ