ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÀûÓÃÓû§

°ä²¼¹¦·ò 2024-10-18

1. ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÀûÓÃÓû§


10ÔÂ16ÈÕ  £¬ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¶ÔÏóÌáÒé¹¥»÷¡£ËûÃÇͨ¹ýTelegram´«²¼¸Ã¶ñÒâÈí¼þ  £¬¼Ù×°³ÉÎÚ¿ËÀ¼Ðµ±¾ÖÀûÓ÷¨Ê½Reserve+µÄ¼¼ÊõÖ§³Ö»úеÈË  £¬ÓÕÆ­Óû§ÉÏ´«Ô̺¬¶ñÒâÎļþµÄZIPµµ°¸¡£Ò»µ©Îļþ±»´ò¿ª  £¬MeduzaStealer¾Í»áϰȾָ±êÉ豸  £¬ÇÔȡӵÓÐÌØ¶¨À©´óÃûµÄÎĵµ  £¬²¢Ëæºó×ÔÎÒɾ³ý¡£Reserve+ÀûÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐʹÃü·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üÐÂÓ×ÎÒÊý¾Ý  £¬ÓÉÓÚÍøÂçµÄÊý¾ÝÃô¸Ð  £¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ö¸±ê¡£½ØÖÁ7Ô  £¬ÒÑÓг¬¹ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÀûÓøüÐÂÊý¾Ý¡£ÎÚ¿ËÀ¼¹ú·À²¿Òѻ㱨·¢ÏÖ¼ÙðµÄReserve+ÀûÓ÷¨Ê½  £¬¿ÉÄÜÖ¼ÔÚÍøÂçÓ×ÎÒÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÉúÀíÐж¯¡£´Ëǰ  £¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÊ¢ÐÐÒÆ¶¯ÀûÓ÷¨Ê½ºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÈËÔ±¡£


https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram


2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý  £¬¿çƽ̨´«²¼ÄÑ·À¿Ø


10ÔÂ16ÈÕ  £¬ÍøÂ簲ȫ×êÑÐÈËÔ±ÔÚTrend MicroµÄ»ã±¨ÖнÒʾÁËÒ»¸ö¸´ÔÓµÄÀÕË÷Èí¼þ²Ù×÷  £¬¸Ã²Ù×÷ÀûÓÃÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þ·ÂÕÕÁ˳ôÃûÔ¶ÑïµÄLockBitÀÕË÷Èí¼þ¼Ò×å  £¬µ«ÏÖʵÉÏÊÇÒ»¸öÆëÈ«·ÖÆçµÄʵÌå¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼Ó¿ì£¨S3TA£©Ö°ÄÜ  £¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß½ÚÔìµÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý  £¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ÔÚ¹¥»÷ʵÏÖʱ  £¬É豸µÄ±ÚÖ½»áÔì³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ  £¬ÒÔÔö³¤Êܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³Ì˵»°±àд  £¬ÓµÓÐ¿çÆ½Ì¨¸öÐÔ  £¬¿ÉÄÜÕë¶ÔWindowsºÍmacOS»·¾³  £¬Ê¹ÆäÓô¦¿í·ºÇÒÄÑÒÔ½ÚÔì¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõĽӼûÃÜÔ¿  £¬µ«Trend Micro½¨Òé×é֯ά³Ö¾¯Ìè  £¬¸üÐÂÈí¼þ  £¬²é³­Ô¶³Ì½Ó¼ûÕ½Êõ  £¬²¢¼à¿ØÓë¶ñÒâ»î¶¯ÓйصÄAWSÕË»§ID  £¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔÆµÄÍþв¡£


https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/


3. ClickFixбäÖÖ£ºÀûÓÃGoogle Meetµö¶ü·Ö·¢¶ñÒâÈí¼þ


10ÔÂ17ÈÕ  £¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ  £¬×Ô5Ô·ÝÓÉÍøÂ簲ȫ¹«Ë¾Proofpoint³õ´Î»ã±¨ÒÔÀ´  £¬Æä»î¶¯Óú·¢ÆµÈÔ  £¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¸ÃÕ½Êõͨ¹ý¼ÙÒâ Google Chrome¡¢Microsoft Word ºÍ OneDrive ÃýÎóÐÂÎÅ  £¬ÓÕÆ­Óû§¸´Ôì²¢Ö´ÐÐ PowerShell ´úÂë  £¬´Ó¶øÏ°È¾ÏµÍ³¡£Êܺ¦ÕßÒò¶ø»áÎî¶Ô¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷  £¬Èç DarkGate¡¢Matanbuchus µÈ¡£½üÆÚ  £¬SaaS ÍøÂ簲ȫÌṩÉÌ Sekoia Ö¸³ö  £¬ClickFix »î¶¯ÒѲúÉúÏÔÖø±ä¶¯  £¬Ô̺¬Ê¹Óà Google Meet µö¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂç´¹µöÓʼþµÈ¡£¹¥»÷Õ߻ᷢËÍ¿´ËƺϷ¨µÄ Google Meet Ô¼ÇëÓʼþ  £¬ÓÕʹÊܺ¦Õß½Ó¼ûÐéÎ±Ò³Ãæ¡£Ò»µ©½øÈë  £¬Êܺ¦Õß»áÊÕµ½¼¼ÊõÎÊÌâÌáÐÑ  £¬Èôµã»÷¡°³¢ÊÔ½¨¸´¡±  £¬Ôò»áÆô¶¯ ClickFix ϰȾ¹ý³Ì  £¬µ¼ÖÂÍÆËã»ú±»¶ñÒâÈí¼þϰȾ¡£Windows ÏµÍ³ÖØÒªÔâ·ê Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷  £¬¶ø macOS »úеÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£´Ë±í  £¬Sekoia »¹·¢ÏÖÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢Çþ·  £¬Ô̺¬ Zoom¡¢PDF ÔĶÁÆ÷¡¢ÐéαÊÓÆµÓÎÏ·µÈ¡£


https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/


4. ³¯ÏÊITڲƭÍŻNickel Tapestry¡±ÀûÓùÍÓ¶¹ØÏµÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð


10ÔÂ17ÈÕ  £¬³¯Ïʳ־ÃÒÔÀ´Ò»Ïòµ÷ÅÉITרҵÈËÔ±µ½¸»×ã¹ú¶ÈµÄÆóÒµ¾ÍÖ°  £¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄ±øÆ÷´òËãıȡÊÕÈë¡£ÕâЩڲƭÐÔµÄIT¹¤×÷ÕßʹÓÃÐéα»òÍ·´µÄÉí·Ý  £¬²¢Í¨¹ý±Ê¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´¸²¸ÇÆäÕæÊµµØÎ»¡£ËûÃÇÔ¤·ÀʹÓÃÊÓÆµÍ¨»°»òÔÚÊÓÆµ»áÒéÆÚ¼ä°µ²ØÃ沿  £¬ÒÔÔ¤·À±»·¢ÏÖ¡£¾ÝÍøÂ簲ȫ¹«Ë¾SecureworksµÄµ÷²é  £¬Ò»¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆÎªUNC5267£©µÄ×éÖ¯ÕÆ¹Ü×éÖ¯ºÍЭµ÷ÕâЩ³¯ÏÊIT¹¤×÷Õß¡£ÔÚ¹ÍÓ¶ÕâЩ±í²¿³Ð°üÉ̺ó  £¬Ò»¼Ò¹«Ë¾ÏÕЩµ±¼´Ôâ·êÁËÊý¾ÝÇÔÈ¡  £¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐé¹¹×ÀÃæ»ù´¡ÉèÊ©´«Êäµ½Ó×ÎÒGoogle DriveÔÆ´æ´¢¡£ÔÚ¹ÍÓ¶¹ØÏµÖÕÖ¹ºó  £¬¸Ã¹«Ë¾ÆðÍ·ÊÕµ½ÀÕË÷µç×ÓÓʼþ  £¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜÇ®±ÒÊê½ðÒÔ»»È¡²»¹«¿ªÐ¹Â¶Êý¾Ý¡£Secureworks»¹·¢ÏÖ  £¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬´úÀíºÍAnyDeskµÈ¹¤¾ß¡£×êÑÐÈËÔ±ÖÒ¸æ  £¬³¯ÏʵÄIT¹¤×÷ÕßʱʱÏ໥Эµ÷  £¬Ìá¹©ÍÆ¼ö  £¬Òò¶ø×éÖ¯ÔÚ¹ÍÓÃÔ¶³Ì¹¤×÷ÕßʱӦά³Ö¾¯Ìè  £¬²¢×¢Òâڲƭ¼£Ïó¡£


https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/


5. BianLianÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ½¡È«Ò½Éú²¢ÇÔÈ¡Êý¾Ý


10ÔÂ17ÈÕ  £¬BianLianÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô²¨Ê¿¶Ù¶ùͯ½¡È«Ò½Éú£¨BCHP£©·¢ÆðÁËÍøÂç¹¥»÷  £¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂç  £¬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öµØÖ·ÌṩҽÁÆ·þÎñ¡£9ÔÂ6ÈÕ  £¬BCHPµÄIT¹©¸øÉÌÔâ·êÁËÍøÂç¹¥»÷  £¬¼¸Ììºó  £¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾­ÊÚȨµÄ»î¶¯  £¬²¢µ±¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸  £¬Ô̺¬¹Ø¹ØÏµÍ³×÷Ϊ±£»¤´ëÊ©¡£¾­µ÷²éÈ·ÈÏ  £¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾­ÊÚȨµÄ½Ó¼û  £¬²¢ÇÔÈ¡ÁËÔ̺¬È«Ãû¡¢Éç»á±£ÏÕºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢Ò½ÁƼͼ±àºÅ¡¢½¡È«±£ÏÕÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÒ½ÖÎÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ïì  £¬ÓÉÓÚËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£È·ÈÏÊܵ½Ó°ÏìµÄÓ×ÎÒ½«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ  £¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓþ¼à¿ØºÍ±£»¤·þÎñ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒѰ䷢¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü  £¬²¢Ðû³ÆÕ¼ÓвÆÕþºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨѶ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢  £¬µ«ÉÐδй¶ÈκÎÄÚÈÝ  £¬Ò²Î´Åû¶×îºóÆÚÏÞ  £¬Åú×¢ËûÃÇÈÔµ«Ô¸ÓëBCHP½øÐн»Éæ¡£


https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/


6. SideWinder APT×éÖ¯À©´ó¹¥»÷ÁìÓò  £¬Ñ¡È¡ÐÂÐ͸´ÔÓ¹¤¾ß°ü


10ÔÂ17ÈÕ  £¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶Å×йØÁªµÄ¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©ÐÐΪÕß  £¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸ö³ÛÃûʵÌåºÍÕ½Êõ»ù´¡ÉèÊ©·¢ÆðÁ˹¥»÷¡£¸Ã×éÖ¯Ò²±»³ÆÎªAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£Ö»¹ÜÆäʹÓù«¿ªµÄ·ì϶ÀûÓ÷¨Ê½ºÍ¶ñÒâÎļþ×÷ΪϰȾý½é  £¬¿´ËƼ¼Êõˮƽ½ÏµÍ  £¬µ«×Ðϸ·ÖÎöÆäÐж¯Ï¸½Úºó  £¬·¢ÏÔìäÕæÊµÄÜÁ¦²»ÈÝÓ×êï¡£¹¥»÷Ö¸±êÔ̺¬ÃϼÓÀ­¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¶ÈÈ·µ±¾ÖºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£×î½ü  £¬SideWinderʹÓöà½×¶ÎϰȾÁ´´«µÝÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü  £¬Í¨¹ýÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþÆðÍ·  £¬Ö´ÐÐһϵÁÐÏÂÔØ·¨Ê½  £¬×îÖÕ²¿Êð¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þ¿ÉÄÜÍøÂçϵͳÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐЧ¸ºÔØ  £¬²¢Í¨¹ýºóÃżÓÔØÄ£¿éÖ²ÈëStealerBot  £¬ÓÃÓÚ¼äµý»î¶¯  £¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Í¼»÷¼üµÈ¡£´Ë±í  £¬SideWinderµÄµØÀí¸²¸ÇÁìÓò²»ÐÝÀ©´ó  £¬Ê¹ÓÃÁËеĸ´ÔÓ¹¤¾ß°ü  £¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36³ÉÁ¢ÁªÏµ¡£


https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html