ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÀûÓÃÓû§
°ä²¼¹¦·ò 2024-10-181. ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÀûÓÃÓû§
10ÔÂ16ÈÕ£¬ºÚ¿ÍÀûÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¶ÔÏóÌáÒé¹¥»÷¡£ËûÃÇͨ¹ýTelegram´«²¼¸Ã¶ñÒâÈí¼þ£¬¼Ù×°³ÉÎÚ¿ËÀ¼Ðµ±¾ÖÀûÓ÷¨Ê½Reserve+µÄ¼¼ÊõÖ§³Ö»úеÈË£¬ÓÕÆÓû§ÉÏ´«Ô̺¬¶ñÒâÎļþµÄZIPµµ°¸¡£Ò»µ©Îļþ±»´ò¿ª£¬MeduzaStealer¾Í»áϰȾָ±êÉ豸£¬ÇÔȡӵÓÐÌØ¶¨À©´óÃûµÄÎĵµ£¬²¢Ëæºó×ÔÎÒɾ³ý¡£Reserve+ÀûÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐʹÃü·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üÐÂÓ×ÎÒÊý¾Ý£¬ÓÉÓÚÍøÂçµÄÊý¾ÝÃô¸Ð£¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ö¸±ê¡£½ØÖÁ7Ô£¬ÒÑÓг¬¹ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÀûÓøüÐÂÊý¾Ý¡£ÎÚ¿ËÀ¼¹ú·À²¿Òѻ㱨·¢ÏÖ¼ÙðµÄReserve+ÀûÓ÷¨Ê½£¬¿ÉÄÜÖ¼ÔÚÍøÂçÓ×ÎÒÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÉúÀíÐж¯¡£´Ëǰ£¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÊ¢ÐÐÒÆ¶¯ÀûÓ÷¨Ê½ºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÈËÔ±¡£
https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram
2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý£¬¿çƽ̨´«²¼ÄÑ·À¿Ø
10ÔÂ16ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±ÔÚTrend MicroµÄ»ã±¨ÖнÒʾÁËÒ»¸ö¸´ÔÓµÄÀÕË÷Èí¼þ²Ù×÷£¬¸Ã²Ù×÷ÀûÓÃÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þ·ÂÕÕÁ˳ôÃûÔ¶ÑïµÄLockBitÀÕË÷Èí¼þ¼Ò×壬µ«ÏÖʵÉÏÊÇÒ»¸öÆëÈ«·ÖÆçµÄʵÌå¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼Ó¿ì£¨S3TA£©Ö°ÄÜ£¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß½ÚÔìµÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý£¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ÔÚ¹¥»÷ʵÏÖʱ£¬É豸µÄ±ÚÖ½»áÔì³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ£¬ÒÔÔö³¤Êܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³Ì˵»°±àд£¬ÓµÓÐ¿çÆ½Ì¨¸öÐÔ£¬¿ÉÄÜÕë¶ÔWindowsºÍmacOS»·¾³£¬Ê¹ÆäÓô¦¿í·ºÇÒÄÑÒÔ½ÚÔì¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõĽӼûÃÜÔ¿£¬µ«Trend Micro½¨Òé×é֯ά³Ö¾¯Ì裬¸üÐÂÈí¼þ£¬²é³Ô¶³Ì½Ó¼ûÕ½Êõ£¬²¢¼à¿ØÓë¶ñÒâ»î¶¯ÓйصÄAWSÕË»§ID£¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔÆµÄÍþв¡£
https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/
3. ClickFixбäÖÖ£ºÀûÓÃGoogle Meetµö¶ü·Ö·¢¶ñÒâÈí¼þ
10ÔÂ17ÈÕ£¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ£¬×Ô5Ô·ÝÓÉÍøÂ簲ȫ¹«Ë¾Proofpoint³õ´Î»ã±¨ÒÔÀ´£¬Æä»î¶¯Óú·¢ÆµÈÔ£¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¸ÃÕ½Êõͨ¹ý¼ÙÒâ Google Chrome¡¢Microsoft Word ºÍ OneDrive ÃýÎóÐÂÎÅ£¬ÓÕÆÓû§¸´Ôì²¢Ö´ÐÐ PowerShell ´úÂ룬´Ó¶øÏ°È¾ÏµÍ³¡£Êܺ¦ÕßÒò¶ø»áÎî¶Ô¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷£¬Èç DarkGate¡¢Matanbuchus µÈ¡£½üÆÚ£¬SaaS ÍøÂ簲ȫÌṩÉÌ Sekoia Ö¸³ö£¬ClickFix »î¶¯ÒѲúÉúÏÔÖø±ä¶¯£¬Ô̺¬Ê¹Óà Google Meet µö¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂç´¹µöÓʼþµÈ¡£¹¥»÷Õ߻ᷢËÍ¿´ËƺϷ¨µÄ Google Meet Ô¼ÇëÓʼþ£¬ÓÕʹÊܺ¦Õß½Ó¼ûÐéÎ±Ò³Ãæ¡£Ò»µ©½øÈ룬Êܺ¦Õß»áÊÕµ½¼¼ÊõÎÊÌâÌáÐÑ£¬Èôµã»÷¡°³¢ÊÔ½¨¸´¡±£¬Ôò»áÆô¶¯ ClickFix ϰȾ¹ý³Ì£¬µ¼ÖÂÍÆËã»ú±»¶ñÒâÈí¼þϰȾ¡£Windows ÏµÍ³ÖØÒªÔâ·ê Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷£¬¶ø macOS »úеÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£´Ë±í£¬Sekoia »¹·¢ÏÖÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢Çþ·£¬Ô̺¬ Zoom¡¢PDF ÔĶÁÆ÷¡¢ÐéαÊÓÆµÓÎÏ·µÈ¡£
https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/
4. ³¯ÏÊITÚ²ÆÍŻNickel Tapestry¡±ÀûÓùÍÓ¶¹ØÏµÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð
10ÔÂ17ÈÕ£¬³¯Ïʳ־ÃÒÔÀ´Ò»Ïòµ÷ÅÉITרҵÈËÔ±µ½¸»×ã¹ú¶ÈµÄÆóÒµ¾ÍÖ°£¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄ±øÆ÷´òËãıȡÊÕÈë¡£ÕâЩڲÆÐÔµÄIT¹¤×÷ÕßʹÓÃÐéα»òÍ·´µÄÉí·Ý£¬²¢Í¨¹ý±Ê¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´¸²¸ÇÆäÕæÊµµØÎ»¡£ËûÃÇÔ¤·ÀʹÓÃÊÓÆµÍ¨»°»òÔÚÊÓÆµ»áÒéÆÚ¼ä°µ²ØÃ沿£¬ÒÔÔ¤·À±»·¢ÏÖ¡£¾ÝÍøÂ簲ȫ¹«Ë¾SecureworksµÄµ÷²é£¬Ò»¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆÎªUNC5267£©µÄ×éÖ¯ÕÆ¹Ü×éÖ¯ºÍе÷ÕâЩ³¯ÏÊIT¹¤×÷Õß¡£ÔÚ¹ÍÓ¶ÕâЩ±í²¿³Ð°üÉ̺ó£¬Ò»¼Ò¹«Ë¾ÏÕЩµ±¼´Ôâ·êÁËÊý¾ÝÇÔÈ¡£¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐé¹¹×ÀÃæ»ù´¡ÉèÊ©´«Êäµ½Ó×ÎÒGoogle DriveÔÆ´æ´¢¡£ÔÚ¹ÍÓ¶¹ØÏµÖÕÖ¹ºó£¬¸Ã¹«Ë¾ÆðÍ·ÊÕµ½ÀÕË÷µç×ÓÓʼþ£¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜÇ®±ÒÊê½ðÒÔ»»È¡²»¹«¿ªÐ¹Â¶Êý¾Ý¡£Secureworks»¹·¢ÏÖ£¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬´úÀíºÍAnyDeskµÈ¹¤¾ß¡£×êÑÐÈËÔ±ÖҸ棬³¯ÏʵÄIT¹¤×÷ÕßʱʱÏ໥е÷£¬Ìá¹©ÍÆ¼ö£¬Òò¶ø×éÖ¯ÔÚ¹ÍÓÃÔ¶³Ì¹¤×÷ÕßʱӦά³Ö¾¯Ì裬²¢×¢ÒâڲƼ£Ïó¡£
https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/
5. BianLianÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ½¡È«Ò½Éú²¢ÇÔÈ¡Êý¾Ý
10ÔÂ17ÈÕ£¬BianLianÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô²¨Ê¿¶Ù¶ùͯ½¡È«Ò½Éú£¨BCHP£©·¢ÆðÁËÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂ磬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öµØÖ·ÌṩҽÁÆ·þÎñ¡£9ÔÂ6ÈÕ£¬BCHPµÄIT¹©¸øÉÌÔâ·êÁËÍøÂç¹¥»÷£¬¼¸Ììºó£¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾ÊÚȨµÄ»î¶¯£¬²¢µ±¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬Ô̺¬¹Ø¹ØÏµÍ³×÷Ϊ±£»¤´ëÊ©¡£¾µ÷²éÈ·ÈÏ£¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾ÊÚȨµÄ½Ó¼û£¬²¢ÇÔÈ¡ÁËÔ̺¬È«Ãû¡¢Éç»á±£ÏÕºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢Ò½ÁƼͼ±àºÅ¡¢½¡È«±£ÏÕÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÒ½ÖÎÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ï죬ÓÉÓÚËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£È·ÈÏÊܵ½Ó°ÏìµÄÓ×ÎÒ½«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ£¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓþ¼à¿ØºÍ±£»¤·þÎñ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒѰ䷢¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢Ðû³ÆÕ¼ÓвÆÕþºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨѶ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢£¬µ«ÉÐδй¶ÈκÎÄÚÈÝ£¬Ò²Î´Åû¶×îºóÆÚÏÞ£¬Åú×¢ËûÃÇÈÔµ«Ô¸ÓëBCHP½øÐн»Éæ¡£
https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/
6. SideWinder APT×éÖ¯À©´ó¹¥»÷ÁìÓò£¬Ñ¡È¡ÐÂÐ͸´ÔÓ¹¤¾ß°ü
10ÔÂ17ÈÕ£¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶Å×йØÁªµÄ¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©ÐÐΪÕߣ¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸ö³ÛÃûʵÌåºÍÕ½Êõ»ù´¡ÉèÊ©·¢ÆðÁ˹¥»÷¡£¸Ã×éÖ¯Ò²±»³ÆÎªAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£Ö»¹ÜÆäʹÓù«¿ªµÄ·ì϶ÀûÓ÷¨Ê½ºÍ¶ñÒâÎļþ×÷ΪϰȾý½é£¬¿´ËƼ¼Êõˮƽ½ÏµÍ£¬µ«×Ðϸ·ÖÎöÆäÐж¯Ï¸½Úºó£¬·¢ÏÔìäÕæÊµÄÜÁ¦²»ÈÝÓ×êï¡£¹¥»÷Ö¸±êÔ̺¬ÃϼÓÀ¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¶ÈÈ·µ±¾ÖºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£×î½ü£¬SideWinderʹÓöà½×¶ÎϰȾÁ´´«µÝÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþÆðÍ·£¬Ö´ÐÐһϵÁÐÏÂÔØ·¨Ê½£¬×îÖÕ²¿Êð¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þ¿ÉÄÜÍøÂçϵͳÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬²¢Í¨¹ýºóÃżÓÔØÄ£¿éÖ²ÈëStealerBot£¬ÓÃÓÚ¼äµý»î¶¯£¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Í¼»÷¼üµÈ¡£´Ë±í£¬SideWinderµÄµØÀí¸²¸ÇÁìÓò²»ÐÝÀ©´ó£¬Ê¹ÓÃÁËеĸ´ÔÓ¹¤¾ß°ü£¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36³ÉÁ¢ÁªÏµ¡£
https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html


¾©¹«Íø°²±¸11010802024551ºÅ