EmansrepoÐÅÏ¢ÇÔÈ¡·¨Ê½£ºFortiGuard×·×ÙÆä¸´ÔÓ¹¥»÷Á´

°ä²¼¹¦·ò 2024-09-05
1. EmansrepoÐÅÏ¢ÇÔÈ¡·¨Ê½£ºFortiGuard×·×ÙÆä¸´ÔÓ¹¥»÷Á´


9ÔÂ3ÈÕ £¬FortiGuard³¢ÊÔÊÒµÄÍøÂ簲ȫר¼ÒÕýçÇÃÜ×·×ÙÒ»ÖÖÃûΪ¡°Emansrepo¡±µÄ»ùÓÚPythonµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ £¬¸Ã·¨Ê½×Ô2023Äê11ÔÂÆØ¹âÒÔÀ´ £¬Í¨¹ý¼Ù×°²É¹º¶©µ¥ºÍ·¢Æ±µÄÍøÂç´¹µöÓʼþ´«²¼ £¬¹¹½¨³öÈýÌõ¸´ÔÓ¶à±äµÄ¹¥»÷õè¾¶¡£ÕâЩõè¾¶±ðÀëѡȡAutoIt±àÒëµÄ¿ÉÖ´ÐÐÎļþ¡¢HTAÎļþ¼°BatchShield»ìºÏµÄÅú´¦ÖÃÎļþ×÷ÎªÔØÌå £¬Ã¿ÖÖ¼¿Á©¾ùÖ¼ÔÚÈÆ¹ý°²È«¼ì²â £¬×îÖÕÖ´ÐжñÒâPython¾ç±¾ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£Emansrepo´Ó×î³õµÄµÇ¼ʹ´¦¡¢ÐÅÓþ¿¨ÐÅÏ¢ÍøÂç £¬ÒÑ·¢Õ¹µ½ÄÜÇÔÈ¡PDFÎĵµ¡¢ä¯ÀÀÆ÷À©´ó¡¢¼ÓÃÜÇ®±ÒÇ®°ü¼°ÓÎϷƽ̨Êý¾ÝµÈ¸ü¿í·ºÁìÓò¡£´Ë±í £¬³¢ÊÔÊÒ»¹°ÑÎȵ½ÓëEmansrepo»î¶¯ÀàËÆµÄRemcos¶ñÒâÈí¼þ´«²¼ £¬°µÊ¾±³ºó¿ÉÄÜÓÐͳһÍþв×éÖ¯¡£¼øÓÚ¹¥»÷Õß¼¼ÊõµÄ²»ÐÝÉý¼¶Óë¶àÑù»¯ £¬¸÷×éÖ¯Ðèά³Ö¸ß¶È¾¯Ìè £¬²ÉÈ¡»ý¼«×Ô¶¯µÄÍøÂ簲ȫ·ÀÓùÕ½Êõ £¬ÒÔÓÐЧӦ¶ÔÈÕÒæ¸´ÔÓµÄÍøÂçÍþв»·¾³¡£


https://securityonline.info/emansrepo-stealer-a-multi-faceted-threat-evolving-in-complexity/


2. ÐÂÀÕË÷Èí¼þ±äÖÖUndergroundÓëRomCom×éÖ¯¹ØÁª


9ÔÂ3ÈÕ £¬FortiGuard Labs¸æ·¢ÁËÒ»ÖÖÐÂÐÍÀÕË÷Èí¼þ±äÖÖUnderground £¬ËüÓë³ôÃûÔ¶ÑïµÄ¶íÂÞ˹ºÚ¿Í×éÖ¯RomCom£¨±ðºÅStorm-0978£©çÇÃÜÓйØ¡£Õâ¿î¶ñÒâÈí¼þ×Ô2023Äê7ÔÂÆðËÁŰ £¬³Áµã¹¥»÷¹¹Öþ¡¢ÔìÒ©¡¢ÒøÐм°Ôì×÷ÒµµÈ¶à¸ö¹Ø¼üÐÐÒµ £¬Í¨¹ý¼ÓÃÜÊܺ¦ÕßWindowsϵͳÉϵÄÎļþÀ´ÀÕË÷Êê½ð¡£RomCom×éÖ¯²»½öÀûÓÃMicrosoft OfficeºÍWindows HTMLµÄÒÑÖª·ì϶£¨ÈçCVE-2023-36884£©ÈëÇÖ £¬»¹¿ÉÄܲÉÈ¡´¹µöÓʼþºÍ²É°ì³õʼ½Ó¼ûȨÏÞµÈͨÀý¼¿Á©¡£UndergroundÈëÇÖºó £¬»áѸ¿ì½ûÓð²È«»úÔì £¬¶Ï¸ùÓ°×Ó¸±±¾ºÍÈÕÖ¾¼Í¼ £¬ÇÄÎÞÉùÏ¢µØ¼ÓÃÜÎļþ £¬²¢ÁôÏÂÒ»ÕÅÃûΪ¡°!!readme!!!.txt¡±µÄÀÕË÷ÐÅ £¬ÒªÇóÖ§¸¶½âÃÜÓÃ¶È £¬Æä¹ÖÒìÖ®´¦ÔÚÓÚ²»Å¤×ªÎļþÀ©´óÃû £¬Ôö³¤Á˼ø±ðÄѶÈ¡£¸üÁîÈËÓÇÓôµÄÊÇ £¬¸Ã×éÖ¯ÔËÓªÒ»¸öÊý¾ÝÐ¹Â¶ÍøÕ¾ £¬¹«¿ª»Ø¾øÖ§¸¶Êê½ðµÄÊܺ¦ÕßÐÅÏ¢ £¬½øÒ»²½Ê©Ñ¹¡£Ä¿Ç° £¬UndergroundµÄ¹¥»÷ÁìÓòÒÑÀ©´óÖÁÈ«Çò £¬Êý¾ÝÐ¹Â¶ÍøÕ¾ÒÑÁгö16¸ö¹ú¶ÈµÄÊܺ¦ÕßÃûµ¥ £¬º­¸ÇÃÀ¡¢·¨¡¢µÂ¡¢Î÷¡¢º«¡¢Ì¨¡¢Ð¼°¼ÓµÈµØ¡£´Ë±í £¬¸Ã×éÖ¯»¹ÀûÓÃTelegramºÍMegaÔÆ´æ´¢·þÎñÀ©´óÆäÓ°ÏìÁ¦ £¬´«²¼ÇÔÈ¡µÄÊý¾Ý¡£


https://securityonline.info/romcom-groups-underground-ransomware-exploits-microsoft-zero-day-flaw/


3. ³¬2.2ÍòÈí¼þ°üÃæ¶ÔRevival HijackµÄ·çÏÕ


9ÔÂ4ÈÕ £¬Ò»ÖÖÃûΪ¡°Revival Hijack¡±µÄÐÂÐ͹©¸øÁ´¹¥»÷¼¼ÊõÕýÍþв×ÅPythonÈí¼þ°üË÷Òý£¨PyPI£©µÄ°²È« £¬¸Ã¼¼ÊõÒѱ»·¢ÏÖ²¢±»ÓÃÓÚ³¢ÊÔÉøÈëÏÂÓÎ×éÖ¯¡£JFrog°²È«¹«Ë¾Ö¸³ö £¬¸Ã¼¼ÊõÄܽٳֳ¬¹ý2.2Íò¸öÏÖÓÐPyPIÈí¼þ°ü £¬Òѵ¼ÖÂÊýÊ®Íò´Î¶ñÒâÏÂÔØ £¬Ó°ÏìÁìÓò¿í·º¡£¹¥»÷ÕßÀûÓÃPyPIµÄÕþ²ß·ì϶ £¬ÔÚÈí¼þ°ü±»Ô­ËùÓÐÕßɾ³ýºó³ÁÐÂ×¢²á²¢ÉÏ´«¶ñÒâ°æ±¾ £¬ÀûÓÃÓû§¿ÉÄÜ´æÔ򵀮´Ð´ÃýÎó»òÐÅÀµ¹ßÐÔ £¬ÓÕµ¼ÏÂÔØ¡£Ó봫ͳÓòÃûÇÀ×¢·ÖÆç £¬Revival HijackרһÓÚÒÑɾ³ýµÄÈí¼þ°ü £¬Ã¿ÔÂÔ¼ÓÐ309¸öÈí¼þ°üÒò¶ø±äµÃ´àÈõ¡£ÕâЩÈí¼þ°üÒò²»×ãÊØ»¤¡¢¸ÄÃû»òÖ°ÄÜÕûºÏ¶ø±»ÒƳý £¬È´Îª¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£JFrogÊý¾ÝÏÔʾ £¬¹¥»÷ÕßÄÜÇÄÎÞÉùÏ¢µØ´úÌæÈí¼þ°ü £¬ÉõÖÁͨ¹ý¡°pip install -upgrade¡±ºÅÁºÏ·¨Èí¼þ°ü´úÌæÎª¶ñÒâ°æ±¾ £¬¶ø¿ª·¢ÕߺÁÎÞ¾õ²ì¡£ÓÈΪÑϳÁµÄÊÇ £¬Ò»¸öÃûΪJinnisµÄÍþвÐÐΪÕßÒÑÏÖʵÀûÓøü¼Êõ¡£ÆóÒµºÍ¿ª·¢ÕßÐè¼ÓÇ¿¾¯Ìè £¬²é³­DevOps¹Ü· £¬È·±£²»×°ÖÃÒÑɾ³ýµÄÈí¼þ°ü £¬²¢²ÉÈ¡±ØÒª´ëÊ©±£»¤×ÔÉíÃâÊÜ´ËÀà½Ù³Ö¼¼ÊõµÄÇÖº¦¡£


https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html


4. ÃÉ´óÄÃÖÝ´òËãÉúÓýЭ»áÔâRansomHubÀÕË÷Èí¼þ¹¥»÷


9ÔÂ4ÈÕ £¬ÃÉ´óÄÃÖÝ´òËãÉúÓýЭ»á½üÆÚÔâ·êÁËÍøÂç¹¥»÷ £¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÐû³ÆÒÑÇÖÈëÆäϵͳ²¢ÇÔÈ¡93GBÊý¾Ý £¬ÍþвÈô²»Ö§¸¶Êê½ð½«¹«¿ªÊý¾Ý¡£¸Ã·ÇͶ»ú×é֯Ѹ¿ìÏìÓ¦ £¬½«²¿ÃÅÍøÂçÀëÏß²¢Õ÷ÕÙÁª¹ú·¨ÂɺÍÐÅÏ¢°²È«×¨¼ÒЭÖúµ÷²éÓë³Á½¨IT»·¾³¡£ÃÀ¹ú´òËãÉúÓý°ì¹«ÊÒÊ×ϯִÐйÙÂêɯ¡¤¸»ÀÕÈ·ÈÏÁËÕâÒ»¡°ÍøÂ簲ȫÊÂÎñ¡± £¬²¢¸Ð¼¤ÍŶӵIJ»Ð¸ÖÂÁ¦ÒÔ¸´Ô­ÏµÍ³ºÍµ÷²éÊÂÎñ¡£Ö»¹Ü¸»ÀÕδй©¾ßÌåÊý¾Ýй¶Çé¿ö £¬µ«È·ÈÏÒÑÏòÁª¹ú·¨Âɲ¿ÃŻ㱨²¢×·ÇóÖ§³Ö¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Õâ´Î¹¥»÷²úÉúǰ £¬FBIµÈÒѰ䲼¹ØÓÚRansomHub»îÔ¾ÐԵݲȫ¾¯±¨ £¬Ö¸³öÆä×Ô2ÔÂÒÔÀ´Òѵ¼ÖÂÖÁÉÙ210ÃûÊܺ¦Õß £¬º­¸Ç¶à¸ö¹Ø¼ü»ù´¡ÉèÊ©ÁìÓò¡£Õâ´ÎÕë¶ÔÌṩÉúÖ³±£½¡·þÎñµÄ·ÇͶ»ú×éÖ¯µÄ¹¥»÷ £¬±»ÊÓΪÓÈΪ¶ñÁÓµÄÐÐΪ¡£


https://www.theregister.com/2024/09/04/planned_parenthood_cybersecurity_incident/


5. ºÚ¿Í×éÖ¯½áºÏ¶Ô·¨·¢ÆðDDoS¹¥»÷ £¬ÒªÇó¿ªÊÍTelegramÊ×´´ÈË


9ÔÂ4ÈÕ £¬Telegram Ê×ϯִÐйÙÅÁά¶û¡¤¶ÅÂÞ·ò±»²¶ºó £¬Ò»ÏµÁкڿÍ×é֯Ѹ¿ì¼¯½á £¬ÌáÒéÃûΪ #FreeDurov »ò #OpDurov µÄÈ«ÇòÍøÂçÐж¯ £¬·æÃ¢Ö±Ö¸·¨¹ú £¬Í¨¹ýÖ´Ðдó¹æÄ£µÄÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷ºÍºÚ¿Í¼¼ÊõÈëÇÖ £¬¶Ô³¬¹ý50¸ö·¨¹úµ±¾Ö»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢½»Í¨ÊàŦ¡¢½ÌÓý»ú¹¹¼°Ë½ÓªÆóÒµÌáÒéÌôÕ½¡£ÕâЩºÚ¿Í×éÖ¯ £¬Ô̺¬¶íÂÞË¹ÍøÂç¾ü³ÁÉú£¨CARR£©¡¢RipperSec¡¢EvilWeb¡¢CyberDragon µÈ £¬ÎÞÊýÓµÓÐÇ×¶í»òÇ×ÒÁ˹À¼Æ«²î £¬ËûÃÇÀûÓÃ×ÔÉí¼¼Êõ×ÊÔ´ºÍ Telegram ƽ̨¿í·º´øÍ· £¬ÒªÇ󷨹ú¿ªÊͶÅÂÞ·ò¡£CARR ×÷ΪÕâ´ÎÐж¯µÄÁìÍ·Ñò £¬Æ¾½èÆäÓë¶íÂÞ˹¾üʵý±¨²¿ÃŵÄÁªÏµ¼°ÖØ´óµÄÉçȺ»ù´¡ £¬Õë¶Ô¶à¸ö·¨¹ú³ÁÒª»ú¹¹·¢Æð¹¥»÷¡£RipperSec µÈ×éÖ¯Ò²²»¸ÊÂäºó £¬Ñ¡È¡×¨Òµ¹¤¾ßÈç MegaMedusa ¶Ô·¨¹ú˾·¨ºÍ¾¯·½ÏµÍ³Ö´ÐоçÁÒ½ø¹¥¡£ºÚ¿ÍÃDz»½öͨ¹ý DDoS ¹¥»÷̱»¾Ö¸±êÍøÕ¾ £¬»¹Ðû³ÆÈëÇÖ²¢ÇÔÈ¡Á˲¿ÃÅÃô¸ÐÊý¾Ý £¬ÔÚ Telegram ÉÏ¿äÒ«Õ½¹û¡£Ö»¹Ü¶¯»ú¸÷±ð £¬´ÓÖ§³Ö¶ÅÂÞ·òÓ×ÎÒµ½ÊØ»¤ Telegram µÄÔËÓª°²È« £¬µ«¹²Í¬µÄËßÇóÊÇ´Ùʹ·¨¹úµ±¾Ö³ÁÐÂ˼¿¼ÆäÐж¯¡£


https://hackread.com/ddos-attacks-france-telegrams-pavel-durov-arrest/


6. MacroPack¹¤¾ßÔâÀÄÓà £¬¶à¹ú·¢ÏÖ¶ñÒâÎĵµ


9ÔÂ4ÈÕ £¬MacroPackÊÇÒ»¿îԭΪºì¶ÓÑÝÁ·Éè¼ÆµÄ¹¤¾ß £¬½üÆÚ±»·¸·¨·Ö×ÓÀÄÓà £¬ÓÃÓÚ´«²¼Havoc¡¢Brute RatelºÍPhatomCoreµÈ¶ñÒâ¸ºÔØ £¬Ó°ÏìÁìÓò²¨¼°¶à¸ö¹ú¶ÈºÍµØÓò¡£¸Ã¹¤¾ßÓÉ·¨¹ú¿ª·¢ÕßEmeric Nasi¿ª·¢ £¬¾ß±¸·´¶ñÒâÈí¼þÈÆ¹ý¡¢´úÂë»ìºÏµÈ¸ß¼¶Ö°ÄÜ £¬Ê¹µÃ¹¹½¨Òñ±ÎµÄ¶ñÒâÎĵµ³ÉΪ¿ÉÄÜ¡£Cisco TalosµÄ×êÑнÒʾ £¬ÕâЩ¶ñÒâÎĵµÍ¨¹ýVirusTotalƽ̨Ìá½»µÄÑù±¾ÏÔʾ³ö¸ß¶È¶àÑùÐÔ £¬Ô̺¬·ÖÆçµö¶ü¡¢¸´ÔÓˮƽºÍϰȾ¼¿Á© £¬Åú×¢MacroPackÒѳÉΪºÚ¿Í¹¥»÷µÄгè¡£±»²¶»ñµÄ¶ñÒâÑù±¾ÖÐ £¬¾ùÁôÓÐMacroPack´´½¨µÄÌØµã £¬ÈçÂí¶û¿É·òÁ´¶¨ÃûµÄº¯ÊýºÍ±äÁ¿¡¢É¾³ý×¢½â¼°¿Õ¸ñÒÔÏ÷¼õ¾²Ì¬·ÖÎö¼ì²âµÈ¡£Êܺ¦ÕßÒ»µ©´ò¿ªÕâЩ¼Ù×°³É¼ÓÃܱí¸ñ¡¢¾üÊÂ֪ͨ»ò¾ÍҵȷÈÏÊéµÄOfficeÎĵµ £¬±ã»á´¥·¢VBA´úÂë £¬¼ÓÔØ¶ñÒâDLL²¢Ïνӵ½¹¥»÷ÕßµÄC2·þÎñÆ÷¡£·ÖÆçµØÓòµÄ¹¥»÷°¸Àý¸÷¾ßÌØÉ«£ºÃÀ¹ú°¸ÀýÖÐ £¬¶ñÒâÎĵµ¼Ù×°³É¼ÓÃܸüбí¸ñ £¬ÀûÓÃmshta.exeÏÂÔØÎ´ÖªÔØºÉ£»¶íÂÞ˹°¸ÀýÖÐ £¬Excel¹¤×÷²¾Ì°Í¼ÏÂÔØPhantomCoreºóÃÅ£»°Í»ù˹̹°¸ÀýÖÐ £¬ÔòÒÔ¾üÊÂÓйØÖ÷Ìâ¼Ù×° £¬ÀûÓÃHTTPS DNSºÍÑÇÂíÑ·CloudFrontͨѶ £¬ÉõÖÁǶÈëAdobe Experience Cloud¸ú×Ù´úÂë¡£


https://www.bleepingcomputer.com/news/security/red-team-tool-macropack-abused-in-attacks-to-deploy-brute-ratel/