MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ

°ä²¼¹¦·ò 2023-06-05

1¡¢MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ


¾ÝýÌå6ÔÂ1ÈÕ±¨Â·£¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеķì϶£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý ¡£ÕâÊÇÒ»¸öSQL×¢Èë·ì϶£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£Rapid7×êÑÐÈËÔ±ÔÚ±»ÀûÓÃÉ豸ÉÏ·¢ÏÖÁËÒ»ÑùµÄÃûΪhuman2.aspµÄwebshell£¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖÐ ¡£Mandiant°µÊ¾£¬ËûÃǵÄÊý¾ÝÏÔʾÕâ´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÉí·Ý£¬µ«¾ÝϤÒѾ­Óкܶà×éÖ¯Ôâµ½ÈëÇÖ£¬Êý¾Ý±»µÁ ¡£Progress SoftwareÒѰ䲼Õë¶Ô±¾µØºÍÔÆµÄ»º½â²½Öè ¡£


https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/


2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ5ÈÕ±¨Â·£¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcajaй©£¬ËüÔÚ´¦ÖÃÓ°ÏìÁ˶à¸ö´¦Ê´¦µÄÀÕË÷¹¥»÷ ¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊУ¬ÖÎÀí×ų¬¹ý46ÒÚÃÀÔªµÄÏû·Ñ´û¿î ¡£PlayÐû³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿ÃÅÐÅÏ¢£¬Ô̺¬Ó×ÎÒ»úÃÜÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕպͺÏÒ»Ö ¡£¸Ã»ú¹¹°µÊ¾£¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄÂòÂô£¬µç×ÓÒøÐÓ×¢×Ô¶¯È¡¿î»úºÍ¸÷´¦Ê´¦Ò²¶¼ÔÚÕý³£ÔË×÷ ¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÒò¶ø·ñ½»Êê½ðµÄѯÎÊ ¡£


https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack


3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼Ö³¬¹ý250ÍòÈ˵ÄÐÅϢй¶


ýÌå6ÔÂ1Èճƣ¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶ ¡£µ÷²é·¢ÏÖ£¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ£¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬Éæ¼°ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»á°²È«ºÅÂë¡¢ÄÉ˰È˼ø±ðºÅºÍÁÙ´²ÐÅÏ¢µÈ ¡£Õâ´ÎÊÂÎñÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕÆðÍ·×¢²áµÄ³ÉÔ± ¡£HPHC½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ ¡£Ä¿Ç°ÉÐÎÞÀÕË÷ÍÅ»ïÐû³ÆÎª´ËÊÂÕÆ¹Ü ¡£


https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/


4¡¢×êÑÐÍŶӷ¢ÏÖCamaro DragonÀûÓÃкóÃÅTinyNoteµÄ¹¥»÷


Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËCamaro Dragon½üÆÚ¹¥»÷»î¶¯µÄÏêÇé ¡£×êÑÐÈËÔ±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢·þÎñÆ÷ÉÏ·¢ÏÖÁËеĻùÓÚGoµÄºóÃÅ£¬ÃûΪTinyNote ¡£¸ÃºóÃÅͨ¹ýÓë±í½»ÊÂÎñÓйصÄÃû³Æ½øÐзַ¢£¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý ¡£Ëü»¹¿ÉÈÆ¹ýÓ¡¶ÈÄáÎ÷ÑÇÊ¢ÐеÄɱ¶¾Èí¼þSmadAV ¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ£¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines½øÐиù»ùµÄ»úеö¾ÙºÍºÅÁîÖ´ÐÐ ¡£


https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/


5¡¢KasperskyÅû¶ÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSµÄTriangulation»î¶¯


6ÔÂ1ÈÕ£¬KasperskyÅû¶ÁËÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSÉ豸µÄTriangulation»î¶¯ ¡£¸Ã»î¶¯ÖÁÉÙ´Ó2019ÄêÆðÍ·£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖÐ ¡£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessage·þÎñÏòiOSÉ豸·¢Ë͵ÄÐÂÎÅ£¬¸½¼þÖÐÔ̺¬·ì϶ÀûÓà ¡£¸ÃÐÂÎÅÔÚûÓÐÈκÎÓû§½»»¥µÄÇé¿öÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´Ðзì϶ ¡£ÀûÓ÷ì϶´ÓC2·þÎñÆ÷ÏÂÔØ¶à¸öºóÐø½×¶Î£¬Ô̺¬ÓÃÓÚÌáȨµÄÆäËü·ì϶ÒÔ¼°×îÖÕpayload ¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐУ¬ËüÖ§³ÖÒ»×éÓÃÓÚÍøÂçϵͳºÍÓû§ÐÅÏ¢µÄºÅÁ²¢ÇÒÄܹ»ÔËÐдÓC2×÷Ϊ²å¼þÄ£¿éÏÂÔØµÄËÁÒâ´úÂë ¡£Õâ´Î¹¥»÷³É¹¦µØÏ°È¾ÁËÔËÐÐiOS 15.7µÄÉ豸 ¡£


https://securelist.com/operation-triangulation/109842/


6¡¢Trend Micro°ä²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨


5ÔÂ31ÈÕ£¬Trend Micro°ä²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨ ¡£×êÑÐÈËÔ±²é³­ÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾£¬·¢ÏÖRoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÀàËÆ¶È ¡£»ùÓÚBinDiffµÄ±ÈÁ¦·¢ÏÖ£¬º¯ÊýµÄÀàËÆ¶ÈΪ93.2%£¬¸ù»ù¿éµÄÀàËÆ¶ÈΪ99.3%£¬¶øÌø×ªµÄÀàËÆ¶ÈΪ98.4% ¡£´Ë±í£¬¶þÕß¶¼Ê¹ÓÃOpenSSLµÄAES½øÐмÓÃÜ£¬²¢ÀûÓÃÀàËÆµÄ¼äЪ¼ÓÃܼ¼ÊõÀ´¼Ó¿ì¼ÓÃܹý³Ì ¡£×êÑÐÈËÔ±°µÊ¾£¬BlackSuitҪôÊÇͳһ¿ª·¢Õß¿ª·¢µÄбäÌ壬ҪôÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ£¬»òÕßÊÇRoyalµÄ´ÓÊô»ú¹¹¶Ôԭʼ´úÂë½øÐÐÁËÅú¸Ä ¡£


https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html