MITRE °ä²¼Ç¶ÈëʽÉ豸 EMB3D ÍøÂ簲ȫÍþвģÐÍ
°ä²¼¹¦·ò 2024-05-155ÔÂ14ÈÕ£¬MITRE Óë Red Balloon Security¡¢Narf Industries ºÍ Niyo Little Thunder Pearson (ONEGas, Inc.) ºÏ×÷ÍÆ³öÁË EMB3D£¬ÕâÊÇÒ»ÖÖÈ«ÃæµÄÍþвģÐÍ£¬Ö¼ÔÚ½â¾ö¹Ø¼ü»ù´¡ÉèÊ©ÁìÓòǶÈëʽÉè±¸Ãæ¶ÔµÄÈÕÒæÔö³¤µÄÍøÂ簲ȫ·çÏÕ¡£Ç¶ÈëʽÉ豸¿í·ºÀûÓÃÓÚʯÓͺÍÌìÈ»Æø¡¢µçÁ¦¡¢Ë®ÖÎÀí¡¢Æû³µ¡¢Ò½ÁÆ¡¢ÎÀÐÇ¡¢×ÔÖ÷ϵͳºÍÎÞÈË»úϵͳµÈÐÐÒµ£¬µ«ÍùÍù²»×ãÊʵ±µÄ°²È«½ÚÔ죬²¢ÇÒûÓжԷì϶½øÐгä·ÖµÄ²âÊÔ¡£Ëæ×Ÿ´ÔÓµÄÍøÂçµÐÊÖÔ½À´Ô½¶àµØÕë¶ÔÕâЩÉ豸£¬EMB3D Ö¼ÔÚÌṩ¶ÔËù×é³ÉÍþвµÄ¹²Í¬Àí½âÒÔ¼°»º½âÕâЩÍþвËùÐèµÄ°²È«»úÔì¡£EMB3D Óë³£¼ûÈõµãö¾Ù (CWE)¡¢MITRE ATT&CK?ÒÔ¼°³£¼û·ì϶ºÍ¶³ö (CVE) µÈÏÖÓÐÄ£ÐÍά³ÖÒ»Ö²¢½øÐÐÀ©´ó£¬µ«³ö¸ñ¹Ø×¢Ç¶ÈëʽÉ豸¡£¸Ã¿ò¼ÜÌṩÁËǶÈëʽÉè±¸ÍøÂçÍþвµÄ·á˶֪ʶ¿â£¬Ô̺¬ÔÚÏÖ³¡»·¾³Öй۲쵽µÄ¡¢Í¨¹ý¸ÅÏëÑéÖ¤Ö¤Ã÷µÄ»ò´ÓÀíÂÛ×êÑÐÖеóöµÄÍþв¡£
https://gbhackers.com/emb3d-cybersecurity-threat-model/
2. ×êÑÐÍŶӷ¢ÏÖSliver¶Ô×¼macOS²¢×°ÖúóÃÅ
5ÔÂ13ÈÕ£¬Sliver ÊÇÒ»¿î¿çƽ̨£¨Windows¡¢macOS¡¢Linux£© ¿ªÔ´Æ¥µÐ¿ò¼Ü²âÊÔÌ×¼þ£¬×¨Îª¡°ºì¶Ó¡±²Ù×÷¶øÉè¼Æ£¬ÔÚ²âÊÔÍøÂç·ÀÓùʱ·ÂÕÕµÐÊÖµÄÐÐΪ¡£ÆäÖØÒªÖ°ÄÜÔ̺¬×Ô½ç˵ֲÈëÌìÉú¡¢ºÅÁîºÍ½ÚÔì (C2) Ö°ÄÜ¡¢ºóÀûÓù¤¾ß/¾ç±¾ÒÔ¼°·á˶µÄ¹¥»÷·ÂÕÕÑ¡Ïî¡£ÔÚ Phylum ·¢ÏÖµÄ×îй¥»÷ÖУ¬¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°requests-darwin-lite¡±µÄ macOS ¶ñÒâ Python °ü£¬ËüÊÇÊ¢Ðеġ°requests¡±¿âµÄÁ¼ÐÔ·ÖÖ§¡£¸Ã°üÍйÜÔÚ PyPI ÉÏ£¬ÔÚ´øÓÐ Requests »Õ±êµÄ 17MB PNG ͼÏñÎļþÖÐÔ̺¬ Sliver µÄ¶þ½øÔìÎļþ¡£ÔÚ macOS ϵͳÉÏ×°ÖÃÆÚ¼ä£¬»áÖ´ÐÐ PyInstall ÀàÀ´½âÂë Base64 ±àÂëµÄ×Ö·û´®£¬ÒÔÔËÐмìË÷ϵͳµÄ UUID£¨Í¨ÓÃΨһ±êʶ·û£©µÄºÅÁî (ioreg)¡£UUID ÓÃÓÚÑéÖ¤°üÊÇ·ñ×°ÖÃÔÚÏÖʵָ±êÉÏ£¬²¢½«ÆäÓëÔ¤Ô¼ÒåµÄ UUID ½øÐбÈÁ¦¡£µ±´æÔÚÆ¥Åäʱ£¬»á´ÓÎļþÆ«ÒÆ´¦µÄÌØ¶¨²¿ÃŶÁÈ¡²¢ÌáÈ¡ PNG ÎļþÄÚµÄ Go ¶þ½øÔìÎļþ¡£Sliver ¶þ½øÔìÎļþ±»Ð´Èë±¾µØÎļþ²¢Åú¸ÄÎļþȨÏÞÒÔʹÆä¿ÉÖ´ÐУ¬²¢×îÖÕÔÚºó¶ÜÆô¶¯¡£
https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/
3. INC ÀÕË÷Èí¼þÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÊÛ¼Û 30 ÍòÃÀÔª
5ÔÂ13ÈÕ£¬Ò»ÃûÃûΪ¡°salfetka¡±µÄÍøÂç·¸×ï·Ö×ÓÐû³ÆÔÚÏúÊÛ INC Ransom µÄÔ´´úÂ룬INC Ransom ÊÇÒ»ÏîÓÚ 2023 Äê 8 ÔÂÍÆ³öµÄÀÕË÷Èí¼þ¼´·þÎñ (RaaS) ¡£INC ´ËǰµÄÖ¸±êÊÇÊ©ÀÖóÒ×½â¾ö¹æ»®¹«Ë¾ (XBS) µÄÃÀ¹ú·Ö²¿ ¡¢·ÆÂɱöÑÅÂí¹þÆû³µ¹«Ë¾£¬ÒÔ¼°×î½üµÄËÕ¸ñÀ¼ ¹ú¶ÈÒ½ÁÆ·þÎñϵͳ (NHS)¡£ÔÚÉæÏÓÏúÊÛµÄͬʱ£¬INC Êê½ðÒµÎñÔÚ²úÉú±ä¶¯£¬Õâ¿ÉÄÜÅú×¢ÆäÖ÷ÌâÍŶӳÉÔ±Ö®¼ä´æÔÚÁѷ죬»òÕß´òËã½øÈëÉæ¼°Ê¹ÓÃмÓÃÜÆ÷µÄÐÂÆªÕ¡£ÍþвÐÐΪÕß°ä·¢ÔÚ Exploit ºÍ XSS ºÚ¿ÍÂÛ̳ÉÏÏúÊÛ INC µÄ Windows ºÍ Linux/ESXi °æ±¾£¬Òª¼Û 30 ÍòÃÀÔª£¬²¢½«Ç±ÔÚÂò¼ÒÊýÁ¿ÏÞ¶ÈΪÈý¸ö¡£Æ¾¾Ý·¢ÏÖÕâ´ÎÏúÊÛµÄ KELAÍþвµý±¨×¨¼ÒÏò BleepingComputer ÌṩµÄÐÅÏ¢£¬ÂÛ̳Ìû×ÓÖÐÌáµ½µÄ¼¼Êõϸ½Ú£¬ÀýÈçÔÚ CTR ģʽÏÂʹÓà AES-128 ºÍ Curve25519 Donna Ëã·¨£¬Óë INC Ransom µÄ¹«¿ª·ÖÎöÒ»ÖÂÑùÆ·¡£
https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/
4. ¹È¸èÒâ±íɾ³ýÁ˼ÛÖµ1250ÒÚÃÀÔªµÄÑøÀÏ»ù½ðÕË»§
5ÔÂ13ÈÕ£¬¹È¸è×î½ü·¸ÁËÒ»¸ö´óÃýÎ󡣸ù«Ë¾²»Ó×ÐÄɾ³ýÁ˼ÛÖµ 1250 ÒÚÃÀÔªµÄ°Ä´óÀûÑÇÑøÀÏ»ù½ð UniSuper µÄ¸öÈË Google Cloud ÕË»§¡£Á˾ÖÊÇ£º¾Ý¡¶ÎÀ±¨¡·ÉÏÖܱ¨Â·£¬³¬¹ý 50 Íò UniSuper »ù½ð»áÔ±ÔÚԼĪһÖܵŦ·òÀïÎÞ·¨½Ó¼û×Ô¼ºµÄÕË»§¡£UniSuperÔÚÁíÒ»¼ÒÔÆÌṩÉÌÓÐÒ»¸ö±¸·ÝÕÊ»§£¬·þÎñÓÚ5ÔÂ2ÈÕ¸´Ô¡£¹ÌÈ»¹È¸è°µÊ¾£¬ÕâÖÖÃýÎóÒÔǰ´ÓδÔÚÔÆÉϲúÉú¹ý£¬µ«³öÏÖ¹ÊÕϺÍÖжϵĿÉÄÜÐÔÒýÆðÁËÔ½À´Ô½¶àµØ½«Êý¾Ý×ªÒÆµ½ÔÆÈí¼þÌṩÉ̵Ĺ«Ë¾ºÍµ±¾ÖµÄÓÇÓô¡£¸Ã¹«Ë¾½ñÄ갵ʾ£¬È«Çò 1000 ¼Ò×î´ó¹«Ë¾ÖÐÔ¼60% µÄ¹«Ë¾ºÍ 90% µÄÌìÉúÐÍÈËΪÖÇÄܶÀ½ÇÊÞ¹«Ë¾¶¼ÊǸù«Ë¾µÄ¿Í»§¡£È«Çò½ü 50 Íò¼Ò¹«Ë¾Ê¹Óà Google Cloud ×÷Ϊ¡°Æ½Ì¨¼´·þÎñ¡±»òÃæÏò¿Í»§µÄ¹¤¾ß£¬ÆäÖÐÔ̺¬¹«¹²Æû³µºÍ¼ÓÄôó»Ê¼ÒÒøÐС£
https://qz.com/google-cloud-pension-fund-unisuper-1851472990
5. LockBit Black ÀÕË÷¹¥»÷»î¶¯ÒÑ·¢ËÍÊý°ÙÍò·âµç×ÓÓʼþ
5ÔÂ13ÈÕ£¬×Ô 4 Ô·ÝÒÔÀ´£¬ÒÑͨ¹ý Phorpiex ½©Ê¬ÍøÂç·¢ËÍÁËÊý°ÙÍò·â´¹µöµç×ÓÓʼþ£¬ÒÔ·¢Õ¹´ó¹æÄ£µÄ LockBit Black ÀÕË÷Èí¼þ»î¶¯¡£ÕýÈçÐÂÔóÎ÷ÖÝÍøÂ簲ȫºÍͨѶ¼¯³ÉÓ××é (NJCCIC) ÖÜÎåÖÒ¸æµÄÄÇÑù£¬¹¥»÷ÕßʹÓÃÔ̺¬²¿Êð LockBit Black ÓÐЧ¸ºÔصĿÉÖ´ÐÐÎļþµÄ ZIP ¸½¼þ£¬¸ÃÓÐЧ¸ºÔØÒ»µ©Æô¶¯¾Í»á¶Ô½Ó¹ÜÕßµÄϵͳ½øÐмÓÃÜ¡£ÕâЩ¹¥»÷Öв¿ÊðµÄ LockBit Black ¼ÓÃÜÆ÷ºÜ¿ÉÄÜÊÇʹÓÃÒ»ÃûÐÄ»³²»ÂúµÄ¿ª·¢ÈËÔ±ÓÚ 2022 Äê 9 ÔÂÔÚ Twitter ÉÏй¶µÄ LockBit 3.0 ¹¹½¨Æ÷¹¹½¨µÄ¡£²»Í⣬¾ÝПûÓëÏÖʵµÄ LockBit ÀÕË÷Èí¼þ²Ù×÷ûÓÐÈκθÉϵ¡£ÕâÐ©ÍøÂç´¹µöµç×ÓÓʼþ´øÓÓ×°ÄúµÄÎĵµ¡±ºÍ¡°ÄúµÄÕÕÆ¬£¿£¿£¿¡±Ö÷ÌâÐÐʹÓá°Jenny Brown¡±»ò¡°Jenny Green¡±±ðºÅ´ÓÈ«Çò 1,500 ¶à¸öΨһ IP µØÖ··¢ËÍ£¬ÆäÖÐÔ̺¬¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹¡¢ÒÁÀÊ¡¢¶íÂÞ˹ºÍÖйú¡£µ±ÊÕ¼þÈË´ò¿ª¶ñÒâ ZIP ´æµµ¸½¼þ²¢Ö´ÐÐÆäÖеĶþ½øÔìÎļþʱ£¬¹¥»÷Á´¾ÍÆðÍ·ÁË¡£
https://www.bleepingcomputer.com/news/security/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign/
6. ºÚ¿ÍÀûÓà DNS Ëí·½øÐÐÍøÂçɨÃèºÍ¸ú×ÙÊܺ¦Õß
5ÔÂ14ÈÕ£¬ÍþвÐÐΪÕßÔÚʹÓÃÓòÃûϵͳ (DNS) Ëí·À´¸ú×ÙÆäÖ¸±êºÎʱ´ò¿ªÍøÂç´¹µöµç×ÓÓʼþ²¢µ¥»÷¶ñÒâÁ´½Ó£¬²¢É¨ÃèÍøÂçÒÔ²éÕÒDZÔÚ·ì϶¡£DNS Ëí·ÊǶÔͨ¹ý DNS ²éÎÊ·¢ËͺͼìË÷µÄÊý¾Ý»òºÅÁî½øÐбàÂ룬ÐÔÖÊÉÏÊǽ« DNS£¨¸ù»ùÍøÂçͨѶ×é¼þ£©×ª±äΪÒñ±ÎµÄͨѶͨ·¡£ÍþвÐÐΪÕßÒÔ¸÷À෽ʽ¶ÔÊý¾Ý½øÐбàÂ룬ÀýÈç Base16 »ò Base64 »ò×Ô½ç˵Îı¾±àÂëËã·¨£¬Òò¶øÄܹ»ÔÚ²éÎÊ DNS ¼Í¼£¨ÀýÈç TXT¡¢MX¡¢CNAME ºÍµØÖ·¼Í¼£©Ê±·µ»ØËüÃÇ¡£ºÚ¿Íͨ³£Ê¹Óà DNS Ëí·À´ÈƹýÍøÂç·À»ðǽºÍ¹ýÂËÆ÷£¬ÀûÓøü¼Êõ½øÐкÅÁîºÍ½ÚÔì (C2) ÒÔ¼°Ð鹹רÓÃÍøÂç (VPN) ²Ù×÷¡£»¹ÓкϷ¨µÄ DNS Ëí·ÀûÓ÷¨Ê½£¬ÀýÈçÓÃÓÚÈÆ¹ýÉó²éÔì¶È¡£×î½ü·¢ÏÖµÄÁ½¸ö¹¥»÷»î¶¯±ðÀëÊÇTrkCdnºÍSecShow¡£
https://www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/


¾©¹«Íø°²±¸11010802024551ºÅ