Unit 42·¢ÏÖMiraiµÄ±äÌåIZ1H9ÀûÓöà¸ö·ì϶½øÐзַ¢

°ä²¼¹¦·ò 2023-05-30

1¡¢Unit 42·¢ÏÖMiraiµÄ±äÌåIZ1H9ÀûÓöà¸ö·ì϶½øÐзַ¢


Unit 42ÔÚ5ÔÂ25ÈÕÅû¶ÁËÒ»¸öÃûΪIZ1H9µÄMirai±äÌåÀûÓöà¸ö·ì϶½øÐд«²¼µÄ»î¶¯¡£×êÑÐÈËÔ±ÔÚ4ÔÂ10ÈÕ·¢Ïָû£¬¹¥»÷ÕßʹÓÃÁËTenda G103ºÅÁî×¢Èë·ì϶£¨CVE-2023-27076£©¡¢LB-LinkºÅÁî×¢Èë·ì϶£¨CVE-2023-26801£©¡¢DCN DCBI-Netlog-LABÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-26802£©ÒÔ¼°ZyxelÔ¶³Ì´úÂëÖ´Ðзì϶£¬À´¹¥»÷Ö¸±ê·þÎñÆ÷ºÍÍøÂçÉ豸¡£±»Ï°È¾É豸¿É±»¹¥»÷Õß½ÚÔì³ÉΪ½©Ê¬ÍøÂçµÄÒ»²¿ÃÅ£¬²¢±»ÓÃÓÚ½øÒ»²½¹¥»÷£¬ÀýÈçDDoS¹¥»÷¡£


https://unit42.paloaltonetworks.com/mirai-variant-iz1h9/


2¡¢Ò½ÁÆ»ú¹¹AENTй©ÆäÔâµ½¹¥»÷Ó°ÏìÔ¼22Íò»¼ÕߺÍÔ±¹¤


¾Ý5ÔÂ26ÈÕ±¨Â·£¬Albany ENT & Allergy Services֪ͨÁË224486ÃûÔ±¹¤ºÍ»¼Õß¹ØÓÚÐÅϢй¶ÊÂÎñ¡£Í¨ÖªÖÐд·£¬AENTÔÚ3ÔÂ27ÈÕǰºó·¢ÏÖ¿ÉÒɻ£¬µ÷²éÈ·¶¨¹¥»÷ÕßÔÚ3ÔÂ23ÈÕÖÁ4ÔÂ4ÈÕ¿ÉÄܽӼûÁ˲¿ÃÅ´æ´¢Ó×ÎҺͽ¡È«ÐÅÏ¢µÄϵͳ¡£²»¾Ãǰ£¬Á½¸öÀÕË÷ÍÅ»ïÔøÐû³Æ¹¥»÷ÁËAENT¡£4ÔÂ23ÈÕ£¬BianLianÔÚÆäÍøÕ¾ÁгöÁ˸ù«Ë¾£¬²¢³ÆÒѾ­ÏÂÔØÁË630 GBµÄÎļþ¡£4ÔÂ28ÈÕ£¬RansomHouseÒ²ÁгöÁ˸ù«Ë¾£¬Ðû³ÆÔÚ3ÔÂ27ÈÕ¼ÓÃÜÁËAENTµÄϵͳ£¬²¢ÏÂÔØÁË2 TBÊý¾Ý¡£È»¶ø£¬AENTÔÚ¸Ã֪ͨÖÐûÓÐÌá¼°ÈκθÉÓÚÀÕË÷¹¥»÷µÄÐÅÏ¢¡£


https://www.databreaches.net/two-ransomware-groups-claimed-to-have-attacked-albany-ent-allergy-services-and-leaked-data-but-aent-doesnt-mention-that-at-all-in-their-notification/


3¡¢Symantec³ÆÐÂBuhtiÀûÓÃй¶µÄLockBitºÍBabuk´úÂë


 5ÔÂ25ÈÕ£¬Symantec³ÆÃûΪBuhtiµÄÀÕË÷¹¥»÷»î¶¯£¬ÀûÓÃÁËй¶µÄLockBitºÍBabukµÄ´úÂëÕë¶ÔWindowsºÍLinuxϵͳ¡£BuhtiÓÚ2Ô³õ´Î±»·¢ÏÖ£¬×î³õ½ö¹¥»÷LinuxÍÆËã»ú£¬SymantecÕâ´Î·¢ÏÖÁËÆä¹¥»÷WindowsÍÆËã»úµÄ̰ͼ¡£¸ÃÀÕË÷»î¶¯Ã»ÓÐ×Ô¼ºµÄÀÕË÷Èí¼þpayload£¬µ«ËüʹÓÃÁË×Ô½ç˵ÐÅÏ¢ÇÔÈ¡·¨Ê½À´Õë¶ÔÖ¸¶¨µÄÎļþÀàÐÍ¡£´Ë±í£¬¸ÃÍÅ»ïËÆºõºÜ¿ì¾ÍÀûÓÃÁË×îÐÂÅû¶µÄ·ì϶£¬ËûÃÇÔÚ×î½üµÄÒ»´Î¹¥»÷ÀûÓÃÁË×îн¨¸´µÄPaperCut NGºÍMFÖеķì϶(CVE-2023-27350)¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/buhti-ransomware


4¡¢RaidForumsµÄÓû§Êý¾Ý¿âÒÑÔÚij¸öºÚ¿ÍÂÛ̳Éϱ»¹«¿ª


 ¾ÝýÌå5ÔÂ29ÈÕ±¨Â·£¬RaidForumsµÄÓû§Êý¾Ý¿âÒÑÔÚij¸öºÚ¿ÍÂÛ̳Éϱ»¹«¿ª£¬Õâ¿ÉÄÜ»áÈÃijЩÈ˸ÐÓ¦ÓеãÑÏÖØ¡£¸ÃÊý¾Ý¿âµÄÈÕÆÚÏÔʾΪ2020Äê9Ô¡£ËüÔ̺¬ÍøÕ¾ËùÓÐÕß¡¢Omnipotent¡¢°æÖ÷ºÍ³ÛÃûÓû§µÄÌõ¿î¡£×êÑÐÈËÔ±³é²éÊý¾Ý¿â£¬·¢ÏÖÁ˲¿ÃÅÓ×ÎÒµÄÓû§Ãû¡¢µç×ÓÓʼþµØÖ·ºÍjabber ID¡£°ä²¼¸ÃÊý¾Ý¿âµÄÖÎÀíÔ±Ö¸³ö£¬ÓÐһЩ±»É¾³ýµÄÓû§¡£Ä¿Ç°»¹Ã»Óм£ÏóÅú×¢Õâ¸öÊý¾Ý¿âÊÇÈôºÎй¶µÄ¡¢ÊÇË­Ê×ÏÈй¶µÄ»òÕßΪʲô´Ë¿Ì±»¹«¿ª¡£


https://www.databreaches.net/developing-raidforums-users-db-leaked/


5¡¢×êÑÐÈËÔ±·¢ÏÖʹÓüÓÃÜRPMSGÐÂÎŵÄMicrosoft 365´¹µö»î¶¯


TrustwaveÔÚ5ÔÂ24ÈÕ³ÆÆä·¢ÏÖÁËͨ¹ý±»Ï°È¾µÄMicrosoft 365ÕÊ»§·¢ËͼÓÃÜRPMSG¸½¼þµÄ´¹µö»î¶¯¡£RPMSGÎļþÓÃÓÚ·¢ËÍÆôÓÃÁËȨÏÞÖÎÀíµç×ÓÓʼþ¶ÔÏóºÍ̸µÄµç×ÓÓʼþ£¬ÊÕ¼þÈËÖ»ÓÐÔÚʹÓÃÆäMicrosoftÕÊ»§½øÐÐÉí·ÝÑéÖ¤»ò»ñµÃÒ»´ÎÐÔÃÜÂëºóÄÜÁ¦ÔĶÁ¼ÓÃÜÓʼþ¡£ÔÚ±¾°¸ÀýÖд¹µöÓʼþÀ´×ÔÖ§¸¶´¦Öù«Ë¾Talus Pay£¬ÊÕ¼þÈ˹«Ë¾¼Æ·Ñ²¿ÃŵÄÓû§£¬»î¶¯Ö¼ÔÚÇÔȡָ±êMicrosoftÍ´´¦¡£×êÑÐÈËÔ±³Æ£¬´ËÀ๥»÷µÄÊýÁ¿ÉÙÇÒÓµÓÐÕë¶ÔÐÔ£¬Òò¶ø¶ÔÆäµÄ¼ì²âºÍÓ¦¶Ô¼«¾ßÌôÕ½ÐÔ¡£ 


https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-encrypted-restricted-permission-messages-deliver-phishing/


6¡¢ESET°ä²¼¼ÓÃÜ·¨Ê½AceCryptor¼°Æä»î¶¯µÄ·ÖÎö»ã±¨


5ÔÂ25ÈÕ£¬ESET°ä²¼Á˹ØÓÚ¼ÓÃÜ·¨Ê½AceCryptor¼°Æä»î¶¯µÄ·ÖÎö»ã±¨¡£Õâ¸ö¼ÓÃÜ·¨Ê½×Ô2016Äê³õ´Î³öÏÖ£¬±»ºÜ¶à¶ñÒâÈí¼þ¿ª·¢ÕßʹÓã¬ÈçEmotet¡£ÔÚ2021ÄêÖÁ2022Ä꣬ESET¼ì²âµ½³¬¹ý80000¸ö¹ÖÒìµÄAceCryptorÑù±¾¡£Ä¿Ç°AceCryptorʹÓö༶µÄÈý²ã¼Ü¹¹£¬ÒÑÖªµÄµÚÒ»²ãÓÐÁ½¸ö°æ±¾£¬Ò»¸ö°æ±¾Ê¹ÓÃTEA½âÃܵڶþ²ã£¬ÁíÒ»¸ö°æ±¾Ê¹ÓÃ΢ÈíVisual/Quick/C++µÄÏßÐÔÍ¬Î»ËØ²úÉúÆ÷£¨LCG£©½âÃܵڶþ²ã¡£µÚ¶þ²ãÊÇÖ´ÐÐshell code£¬¶øºó½âÃܲ¢Æô¶¯µÚÈý²ã¡£µÚÈý²ãÊǸü¶àµÄshellcode£¬Æä¹¤×÷ÊÇÆô¶¯payload¡£


https://www.welivesecurity.com/2023/05/25/shedding-light-acecryptor-operation/