MITRE °ä²¼Ç¶ÈëʽÉ豸 EMB3D ÍøÂ簲ȫÍþвģÐÍ

°ä²¼¹¦·ò 2024-05-15
1. MITRE °ä²¼Ç¶ÈëʽÉ豸 EMB3D ÍøÂ簲ȫÍþвģÐÍ


5ÔÂ14ÈÕ £¬MITRE Óë Red Balloon Security¡¢Narf Industries ºÍ Niyo Little Thunder Pearson (ONEGas, Inc.) ºÏ×÷ÍÆ³öÁË EMB3D £¬ÕâÊÇÒ»ÖÖÈ«ÃæµÄÍþвģÐÍ £¬Ö¼ÔÚ½â¾ö¹Ø¼ü»ù´¡ÉèÊ©ÁìÓòǶÈëʽÉè±¸Ãæ¶ÔµÄÈÕÒæÔö³¤µÄÍøÂ簲ȫ·çÏÕ¡£Ç¶ÈëʽÉ豸¿í·ºÀûÓÃÓÚʯÓͺÍÌìÈ»Æø¡¢µçÁ¦¡¢Ë®ÖÎÀí¡¢Æû³µ¡¢Ò½ÁÆ¡¢ÎÀÐÇ¡¢×ÔÖ÷ϵͳºÍÎÞÈË»úϵͳµÈÐÐÒµ £¬µ«ÍùÍù²»×ãÊʵ±µÄ°²È«½ÚÔì £¬²¢ÇÒûÓжԷì϶½øÐгä·ÖµÄ²âÊÔ¡£Ëæ×Ÿ´ÔÓµÄÍøÂçµÐÊÖÔ½À´Ô½¶àµØÕë¶ÔÕâЩÉ豸 £¬EMB3D Ö¼ÔÚÌṩ¶ÔËù×é³ÉÍþвµÄ¹²Í¬Àí½âÒÔ¼°»º½âÕâЩÍþвËùÐèµÄ°²È«»úÔì¡£EMB3D Óë³£¼ûÈõµãö¾Ù (CWE)¡¢MITRE ATT&CK?ÒÔ¼°³£¼û·ì϶ºÍ¶³ö (CVE) µÈÏÖÓÐÄ£ÐÍά³ÖÒ»Ö²¢½øÐÐÀ©´ó £¬µ«³ö¸ñ¹Ø×¢Ç¶ÈëʽÉ豸¡£¸Ã¿ò¼ÜÌṩÁËǶÈëʽÉè±¸ÍøÂçÍþвµÄ·á˶֪ʶ¿â £¬Ô̺¬ÔÚÏÖ³¡»·¾³Öй۲쵽µÄ¡¢Í¨¹ý¸ÅÏëÑéÖ¤Ö¤Ã÷µÄ»ò´ÓÀíÂÛ×êÑÐÖеóöµÄÍþв¡£


https://gbhackers.com/emb3d-cybersecurity-threat-model/


2. ×êÑÐÍŶӷ¢ÏÖSliver¶Ô×¼macOS²¢×°ÖúóÃÅ


5ÔÂ13ÈÕ £¬Sliver ÊÇÒ»¿î¿çƽ̨£¨Windows¡¢macOS¡¢Linux£© ¿ªÔ´Æ¥µÐ¿ò¼Ü²âÊÔÌ×¼þ £¬×¨Îª¡°ºì¶Ó¡±²Ù×÷¶øÉè¼Æ £¬ÔÚ²âÊÔÍøÂç·ÀÓùʱ·ÂÕÕµÐÊÖµÄÐÐΪ¡£ÆäÖØÒªÖ°ÄÜÔ̺¬×Ô½ç˵ֲÈëÌìÉú¡¢ºÅÁîºÍ½ÚÔì (C2) Ö°ÄÜ¡¢ºóÀûÓù¤¾ß/¾ç±¾ÒÔ¼°·á˶µÄ¹¥»÷·ÂÕÕÑ¡Ïî¡£ÔÚ Phylum ·¢ÏÖµÄ×îй¥»÷ÖÐ £¬¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°requests-darwin-lite¡±µÄ macOS ¶ñÒâ Python °ü £¬ËüÊÇÊ¢Ðеġ°requests¡±¿âµÄÁ¼ÐÔ·ÖÖ§¡£¸Ã°üÍйÜÔÚ PyPI ÉÏ £¬ÔÚ´øÓÐ Requests »Õ±êµÄ 17MB PNG ͼÏñÎļþÖÐÔ̺¬ Sliver µÄ¶þ½øÔìÎļþ¡£ÔÚ macOS ϵͳÉÏ×°ÖÃÆÚ¼ä £¬»áÖ´ÐÐ PyInstall ÀàÀ´½âÂë Base64 ±àÂëµÄ×Ö·û´® £¬ÒÔÔËÐмìË÷ϵͳµÄ UUID£¨Í¨ÓÃΨһ±êʶ·û£©µÄºÅÁî (ioreg)¡£UUID ÓÃÓÚÑéÖ¤°üÊÇ·ñ×°ÖÃÔÚÏÖʵָ±êÉÏ £¬²¢½«ÆäÓëÔ¤Ô¼ÒåµÄ UUID ½øÐбÈÁ¦¡£µ±´æÔÚÆ¥Åäʱ £¬»á´ÓÎļþÆ«ÒÆ´¦µÄÌØ¶¨²¿ÃŶÁÈ¡²¢ÌáÈ¡ PNG ÎļþÄÚµÄ Go ¶þ½øÔìÎļþ¡£Sliver ¶þ½øÔìÎļþ±»Ð´Èë±¾µØÎļþ²¢Åú¸ÄÎļþȨÏÞÒÔʹÆä¿ÉÖ´ÐÐ £¬²¢×îÖÕÔÚºó¶ÜÆô¶¯¡£


https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/


3. INC ÀÕË÷Èí¼þÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÊÛ¼Û 30 ÍòÃÀÔª


5ÔÂ13ÈÕ £¬Ò»ÃûÃûΪ¡°salfetka¡±µÄÍøÂç·¸×ï·Ö×ÓÐû³ÆÔÚÏúÊÛ INC Ransom µÄÔ´´úÂë £¬INC Ransom ÊÇÒ»ÏîÓÚ 2023 Äê 8 ÔÂÍÆ³öµÄÀÕË÷Èí¼þ¼´·þÎñ (RaaS) ¡£INC ´ËǰµÄÖ¸±êÊÇÊ©ÀÖóÒ×½â¾ö¹æ»®¹«Ë¾ (XBS) µÄÃÀ¹ú·Ö²¿ ¡¢·ÆÂɱöÑÅÂí¹þÆû³µ¹«Ë¾ £¬ÒÔ¼°×î½üµÄËÕ¸ñÀ¼ ¹ú¶ÈÒ½ÁÆ·þÎñϵͳ (NHS)¡£ÔÚÉæÏÓÏúÊÛµÄͬʱ £¬INC Êê½ðÒµÎñÔÚ²úÉú±ä¶¯ £¬Õâ¿ÉÄÜÅú×¢ÆäÖ÷ÌâÍŶӳÉÔ±Ö®¼ä´æÔÚÁÑ·ì £¬»òÕß´òËã½øÈëÉæ¼°Ê¹ÓÃмÓÃÜÆ÷µÄÐÂÆªÕ¡£ÍþвÐÐΪÕß°ä·¢ÔÚ Exploit ºÍ XSS ºÚ¿ÍÂÛ̳ÉÏÏúÊÛ INC µÄ Windows ºÍ Linux/ESXi °æ±¾ £¬Òª¼Û 30 ÍòÃÀÔª £¬²¢½«Ç±ÔÚÂò¼ÒÊýÁ¿ÏÞ¶ÈΪÈý¸ö¡£Æ¾¾Ý·¢ÏÖÕâ´ÎÏúÊÛµÄ KELAÍþвµý±¨×¨¼ÒÏò BleepingComputer ÌṩµÄÐÅÏ¢ £¬ÂÛ̳Ìû×ÓÖÐÌáµ½µÄ¼¼Êõϸ½Ú £¬ÀýÈçÔÚ CTR ģʽÏÂʹÓà AES-128 ºÍ Curve25519 Donna Ëã·¨ £¬Óë  INC Ransom µÄ¹«¿ª·ÖÎöÒ»ÖÂÑùÆ·¡£


https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/


4. ¹È¸èÒâ±íɾ³ýÁ˼ÛÖµ1250ÒÚÃÀÔªµÄÑøÀÏ»ù½ðÕË»§


5ÔÂ13ÈÕ £¬¹È¸è×î½ü·¸ÁËÒ»¸ö´óÃýÎ󡣸ù«Ë¾²»Ó×ÐÄɾ³ýÁ˼ÛÖµ 1250 ÒÚÃÀÔªµÄ°Ä´óÀûÑÇÑøÀÏ»ù½ð UniSuper µÄ¸öÈË Google Cloud ÕË»§¡£Á˾ÖÊÇ£º¾Ý¡¶ÎÀ±¨¡·ÉÏÖܱ¨Â· £¬³¬¹ý 50 Íò UniSuper »ù½ð»áÔ±ÔÚԼĪһÖܵŦ·òÀïÎÞ·¨½Ó¼û×Ô¼ºµÄÕË»§¡£UniSuperÔÚÁíÒ»¼ÒÔÆÌṩÉÌÓÐÒ»¸ö±¸·ÝÕÊ»§ £¬·þÎñÓÚ5ÔÂ2ÈÕ¸´Ô­¡£¹ÌÈ»¹È¸è°µÊ¾ £¬ÕâÖÖÃýÎóÒÔǰ´ÓδÔÚÔÆÉϲúÉú¹ý £¬µ«³öÏÖ¹ÊÕϺÍÖжϵĿÉÄÜÐÔÒýÆðÁËÔ½À´Ô½¶àµØ½«Êý¾Ý×ªÒÆµ½ÔÆÈí¼þÌṩÉ̵Ĺ«Ë¾ºÍµ±¾ÖµÄÓÇÓô¡£¸Ã¹«Ë¾½ñÄ갵ʾ £¬È«Çò 1000 ¼Ò×î´ó¹«Ë¾ÖÐÔ¼60% µÄ¹«Ë¾ºÍ 90% µÄÌìÉúÐÍÈËΪÖÇÄܶÀ½ÇÊÞ¹«Ë¾¶¼ÊǸù«Ë¾µÄ¿Í»§¡£È«Çò½ü 50 Íò¼Ò¹«Ë¾Ê¹Óà Google Cloud ×÷Ϊ¡°Æ½Ì¨¼´·þÎñ¡±»òÃæÏò¿Í»§µÄ¹¤¾ß £¬ÆäÖÐÔ̺¬¹«¹²Æû³µºÍ¼ÓÄôó»Ê¼ÒÒøÐС£


https://qz.com/google-cloud-pension-fund-unisuper-1851472990


5. LockBit Black ÀÕË÷¹¥»÷»î¶¯ÒÑ·¢ËÍÊý°ÙÍò·âµç×ÓÓʼþ


5ÔÂ13ÈÕ £¬×Ô 4 Ô·ÝÒÔÀ´ £¬ÒÑͨ¹ý Phorpiex ½©Ê¬ÍøÂç·¢ËÍÁËÊý°ÙÍò·â´¹µöµç×ÓÓʼþ £¬ÒÔ·¢Õ¹´ó¹æÄ£µÄ LockBit Black ÀÕË÷Èí¼þ»î¶¯¡£ÕýÈçÐÂÔóÎ÷ÖÝÍøÂ簲ȫºÍͨѶ¼¯³ÉÓ××é (NJCCIC) ÖÜÎåÖÒ¸æµÄÄÇÑù £¬¹¥»÷ÕßʹÓÃÔ̺¬²¿Êð LockBit Black ÓÐЧ¸ºÔصĿÉÖ´ÐÐÎļþµÄ ZIP ¸½¼þ £¬¸ÃÓÐЧ¸ºÔØÒ»µ©Æô¶¯¾Í»á¶Ô½Ó¹ÜÕßµÄϵͳ½øÐмÓÃÜ¡£ÕâЩ¹¥»÷Öв¿ÊðµÄ LockBit Black ¼ÓÃÜÆ÷ºÜ¿ÉÄÜÊÇʹÓÃÒ»ÃûÐÄ»³²»ÂúµÄ¿ª·¢ÈËÔ±ÓÚ 2022 Äê 9 ÔÂÔÚ Twitter ÉÏй¶µÄ LockBit 3.0 ¹¹½¨Æ÷¹¹½¨µÄ¡£²»Íâ £¬¾ÝПûÓëÏÖʵµÄ LockBit ÀÕË÷Èí¼þ²Ù×÷ûÓÐÈκθÉϵ¡£ÕâÐ©ÍøÂç´¹µöµç×ÓÓʼþ´øÓÓ×°ÄúµÄÎĵµ¡±ºÍ¡°ÄúµÄÕÕÆ¬£¿£¿£¿¡±Ö÷ÌâÐÐʹÓá°Jenny Brown¡±»ò¡°Jenny Green¡±±ðºÅ´ÓÈ«Çò 1,500 ¶à¸öΨһ IP µØÖ··¢ËÍ £¬ÆäÖÐÔ̺¬¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹¡¢ÒÁÀÊ¡¢¶íÂÞ˹ºÍÖйú¡£µ±ÊÕ¼þÈË´ò¿ª¶ñÒâ ZIP ´æµµ¸½¼þ²¢Ö´ÐÐÆäÖеĶþ½øÔìÎļþʱ £¬¹¥»÷Á´¾ÍÆðÍ·ÁË¡£


https://www.bleepingcomputer.com/news/security/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign/


6. ºÚ¿ÍÀûÓà DNS Ëí·½øÐÐÍøÂçɨÃèºÍ¸ú×ÙÊܺ¦Õß


5ÔÂ14ÈÕ £¬ÍþвÐÐΪÕßÔÚʹÓÃÓòÃûϵͳ (DNS) Ëí·À´¸ú×ÙÆäÖ¸±êºÎʱ´ò¿ªÍøÂç´¹µöµç×ÓÓʼþ²¢µ¥»÷¶ñÒâÁ´½Ó £¬²¢É¨ÃèÍøÂçÒÔ²éÕÒDZÔÚ·ì϶¡£DNS Ëí·ÊǶÔͨ¹ý DNS ²éÎÊ·¢ËͺͼìË÷µÄÊý¾Ý»òºÅÁî½øÐбàÂë £¬ÐÔÖÊÉÏÊǽ« DNS£¨¸ù»ùÍøÂçͨѶ×é¼þ£©×ª±äΪÒñ±ÎµÄͨѶͨ·¡£ÍþвÐÐΪÕßÒÔ¸÷À෽ʽ¶ÔÊý¾Ý½øÐбàÂë £¬ÀýÈç Base16 »ò Base64 »ò×Ô½ç˵Îı¾±àÂëËã·¨ £¬Òò¶øÄܹ»ÔÚ²éÎÊ DNS ¼Í¼£¨ÀýÈç TXT¡¢MX¡¢CNAME ºÍµØÖ·¼Í¼£©Ê±·µ»ØËüÃÇ¡£ºÚ¿Íͨ³£Ê¹Óà DNS Ëí·À´ÈƹýÍøÂç·À»ðǽºÍ¹ýÂËÆ÷ £¬ÀûÓøü¼Êõ½øÐкÅÁîºÍ½ÚÔì (C2) ÒÔ¼°Ð鹹רÓÃÍøÂç (VPN) ²Ù×÷¡ £»¹ÓкϷ¨µÄ DNS Ëí·ÀûÓ÷¨Ê½ £¬ÀýÈçÓÃÓÚÈÆ¹ýÉó²éÔì¶È¡£×î½ü·¢ÏÖµÄÁ½¸ö¹¥»÷»î¶¯±ðÀëÊÇTrkCdnºÍSecShow¡£


https://www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/