Î÷ÃÅ×Ó½¨¸´¿ÉÓ°ÏìµçÍø²»±äµÄ·ì϶CVE-2023-28489
°ä²¼¹¦·ò 2023-05-091¡¢Î÷ÃÅ×Ó½¨¸´¿ÉÓ°ÏìµçÍø²»±äµÄ·ì϶CVE-2023-28489
¾ÝýÌå5ÔÂ5ÈÕ±¨Â·£¬Î÷ÃÅ×Ó½¨¸´ÁËÓ°ÏìSicam A8000 CP-8031ºÍCP-8050²úÆ·µÄCPCI85¹Ì¼þµÄÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2023-28489£©¡£ÕâЩ²úÆ·ÊÇÔ¶³ÌÖն˵¥Ôª(RTU)£¬¹¥»÷Õß¿ÉÀûÓø÷ì϶ÆëÈ«½ÚÔìÉ豸£¬Ó°ÏìµçÍøµÄ²»±ä£¬ÉõÖÁ¿Éͨ¹ý¸ü¸Ä¹Ø¼ü×Ô¶¯»¯²ÎÊýµ¼ÖÂÍ£µç£¬»¹Äܹ»ÀûÓø÷ì϶װÖúóÃÅ¡£²¹¶¡Ôڹ̼þ°æ±¾CPCI85 V05»ò¸ü¸ß°æ±¾ÖпÉÓ㬸ù«Ë¾»¹Ö¸³ö£¬Í¨¹ýʹÓ÷À»ðǽÏ޶ȶÔTCP¶Ë¿Ú80ºÍ443ÉϵÄWeb·þÎñÆ÷µÄ½Ó¼û£¬Ò²Äܹ»»º½â¸Ã·ì϶¡£
https://www.securityweek.com/critical-siemens-rtu-vulnerability-could-allow-hackers-to-destabilize-power-grid/
2¡¢ÃÀ¹úNextGen HealthcareÔ¼100ÍòÓû§µÄÐÅϢй¶
¾Ý5ÔÂ8ÈÕ±¨Â·£¬ÃÀ¹úÈí¼þºÍ·þÎñ¹«Ë¾NextGen Healthcareй¶ÁËÔ¼100ÍòÈ˵ÄÐÅÏ¢¡£¸Ã¹«Ë¾ÖØÒªÎªÒ½ÁƱ£½¡ÐÐÒµ¿ª·¢ºÍÏúÊÛµç×Ó½¡È«¼Í¼£¨EHR£©Èí¼þºÍʵ¼ÊÖÎÀíϵͳ¡£¾ÝϤ£¬Ð¹Â¶ÊÂÎñÓÚ4ÔÂ24ÈÕ±»·¢ÏÖ£¬¸Ã¹«Ë¾µ÷²éÈ·¶¨¹¥»÷ÕßÔÚ3ÔÂ29ÈÕÖÁ4ÔÂ14ÈÕ½Ó¼ûÁ˹«Ë¾µÄϵͳ£¬Ó°ÏìÁË1049375ÈË¡£¹«Ë¾Ð¹Â©¹¥»÷ÕßʹÓÃÁËËÆºõÊÇ´ÓÆäËüÆðÔ´»òÓëNextGenÎ޹صĹ¥»÷ÊÂÎñÖÐÇÔÈ¡µÄ¿Í»§¶ËÍ´´¦½Ó¼ûÊý¾Ý¿â£¬ËüÃdzÁÐÂÉèÖÃÁËÃÜÂëÒÔ½ÚÔì¸ÃÊÂÎñ¡£ÕâÊÇNextGenÔÚ½ñÄê²úÉúµÄµÚ¶þÆðй¶ÊÂÎñ£¬1ÔÂ19ÈÕ£¬ËüÔâµ½ÁËBlackCatµÄÀÕË÷¹¥»÷¡£
https://securityaffairs.com/145935/data-breach/nextgen-healthcare-data-breach.html
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢ÏÖÖ¼ÔÚ·Ö·¢SmokeLoaderµÄ´¹µö»î¶¯
ýÌå5ÔÂ8Èճƣ¬ÎÚ¿ËÀ¼CERT-UAÅû¶ÁËÒÔ¶à˵»°ÎļþµÄ´ó¾Ö·Ö·¢¶ñÒâÈí¼þSmokeLoaderµÄ´¹µö»î¶¯¡£¹¥»÷ÕßÀûÓñ»Ï°È¾ÕÊ»§·¢ËÍÒÔ¡°Õ˵¥/¸¶¿î¡±ÎªÖ÷ÌâµÄÓʼþ£¬¸½¼þΪZIPÎĵµ¡£Õâ¸öZIPÊÇÒ»¸ö¶à˵»°Îļþ£¬Ô̺¬Ò»¸öµö¶üÎĵµºÍÒ»¸öJavaScriptÎļþpax_2023_AB1058..js¡£JavaScriptÎļþʹÓÃPowerShell£¬ÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþportable.exe£¬Ëü½«Æô¶¯¶ñÒâÈí¼þSmokeLoader¡£¶ÔÓòÃû×¢²áÈÕÆÚºÍÎļþ±àÒëÈÕÆÚµÄ·ÖÎöÅú×¢£¬¸Ã»î¶¯Ê¼ÓÚ4Ô·ݣ¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0006¡£
https://securityaffairs.com/145911/malware/cert-ua-smokeloader-campaign.html
4¡¢×êÑÐÈËÔ±Åû¶AkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷µÄ¾ßÌåÐÅÏ¢
5ÔÂ7ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±·¢ÏÖÁËAkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷¡£AkiraÓÚ3Ô·ÝÍÆ³ö£¬Ðû³ÆÒѹ¥»÷ÁË16¼Ò¹«Ë¾£¬Éæ¼°½ÌÓý¡¢½ðÈÚ¡¢·¿µØ²ú¡¢Ôì×÷ºÍÕ÷ѯµÈ¸÷¸öÐÐÒµ¡£¹ÌÈ»ÁíÒ»¸öÃûΪAkiraµÄÀÕË÷Èí¼þÒÑÓÚ2017Äê°ä²¼£¬µ«¾ÝÐÅÓëÕâЩ»î¶¯²¢²»Óйء£Akira»áÔËÐÐPowerShellºÅÁîɾ³ý¾íÓ°¸±±¾£¬¼ÓÃÜÎļþ²¢¸½¼ÓÀ©´óÃû.akira£¬¶øºóÔÚÿ¸öÎļþ¼ÐÁôÏÂÊê½ð¼Í¼akira_readme.txt¡£ÆäÊê½ðÒªÇó´Ó20ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£
https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
5¡¢FortiGuard·¢ÏÖSideCopyÍÅ»ïÕë¶ÔÓ¡¶ÈµÄ¹¥»÷»î¶¯
5ÔÂ4ÈÕ£¬FortiGuard³ÆÆä·¢ÏÖÁËSideCopyÍÅ»ïÀûÓÃÓ¡¶È¾üÊÂ×êÑÐ×éÖ¯ÓйØÖ÷ÌâµÄ¹¥»÷»î¶¯¡£¹¥»÷ÕßʹÓÃÓëÓ¡¶È¹ú·À×êÑÐÓë·¢Õ¹×éÖ¯(DRDO)ÓйصÄZIPÎļþÀ´·Ö·¢¶ñÒâÈí¼þ¡£ZipÎļþÔ̺¬Ò»¸ö¿ì½Ý·½Ê½Îļþ£¬Ëü»áʹÓÃHTAs·¨Ê½»òmshta.exe¶¨Ïòµ½¹¥»÷ÕßµÄÓò¡£ÔÚÕâÀºÅÁîÐвÎÊýÖ¸ÏòÒ»¸öURL£¬»áÏÂÔØ²¢Ö´ÐÐÒ»¸ö¶ñÒâÎļþPantomime.hta¡£´Ë±í£¬ÓëÒÔÍùµÄ»î¶¯ÓÐËù·ÖÆç£¬Õâ´ÎµÄpayloadËÆºõÊÇʹÓù¤¾ßSILENTTRINITY´´½¨µÄ¡£
https://www.fortinet.com/blog/threat-research/clean-rooms-nuclear-missiles-and-sidecopy
6¡¢Cleafy°ä²¼drIBANÕë¶ÔÒâ´óÀûµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
5ÔÂ4ÈÕ£¬Cleafy°ä²¼Á˹ØÓÚÀûÓÃеÄWeb×¢È빤¾ß°üDrIBANµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£ÕâЩ»î¶¯µÄ¹Ø¼ü×é¼þdrIBAN£¬ÊÇÒ»¸öÓµÓÐ׳´óATSÒýÇæµÄWeb×¢È빤¾ß°ü£¬¹¥»÷ÕßÀûÓÃËü³É¹¦ÈƹýÉí·ÝÑéÖ¤»úÔ죬ÀýÈçÒøÐкͽðÈÚ»ú¹¹ÔڵǼºÍÖ§¸¶¹ý³Ìµ±Ñ¡È¡µÄMFAºÍSCAÊÚȨ½×¶Î¡£¹¥»÷Á´Ê¼ÓÚ¾¹ýÈÏÖ¤µÄÓʼþ£¨»òPECÓʼþ£©£¬¸½´øÒ»¸ö¿ÉÖ´ÐÐÎļþ£¬×÷ΪsLoad¶ñÒâÈí¼þµÄÏÂÔØ·¨Ê½¡£sLoadÊÇÒ»ÖÖ¿úËŹ¤¾ß£¬»¹Í¨¹ýÀÄÓúϷ¨µÄWindows¹¤¾ß£¨ÈçPowerShellºÍBITSAdmin£©À´ÀûÓÃLotL¼¼Êõ¡£Õâ´Î»î¶¯ÖØÒªÕë¶ÔÒâ´óÀû½ðÈÚÐÐÒµ¡£
https://www.cleafy.com/cleafy-labs/uncovering-driban-fraud-operations-chapter1


¾©¹«Íø°²±¸11010802024551ºÅ