ÍøÂç·¸×ï·Ö×Ó¶Ô×¼AWS»·¾³ £¬ÀûÓÃÅäÖÃÃýÎóÍÆËÍ´¹µö»î¶¯

°ä²¼¹¦·ò 2025-03-04

1. ÍøÂç·¸×ï·Ö×Ó¶Ô×¼AWS»·¾³ £¬ÀûÓÃÅäÖÃÃýÎóÍÆËÍ´¹µö»î¶¯


3ÔÂ3ÈÕ £¬¾ÝPalo Alto Networks Unit 42µÄµ÷²é £¬ÍøÂç·¸×ï·Ö×ÓÕýÕë¶ÔÑÇÂíÑ·ÍøÂç·þÎñ£¨AWS£©»·¾³ £¬ÏòÖ¸±êÍÆËÍÍøÂç´¹µö»î¶¯¡£Ò»¸öÃûΪTGR-UNK-0011µÄ»î¶¯¼¯Èº£¨ÓëJavaGhost×éÖ¯ÓгÁµþ£©×Ô2019ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬º¹ÇàÉÏרһÓÚÍøÕ¾´Û¸Ä £¬µ«×Ô2022ÄêÆðתÏò·¢ËÍÍøÂç´¹µöÓʼþÒÔıȡ¾­¼ÃÀûÒæ¡£ÕâЩ¹¥»÷²¢Î´ÀûÓÃAWS·ì϶ £¬¶øÊÇÀûÓÃÊܺ¦Õß»·¾³ÖÐAWS½Ó¼ûÃÜÔ¿µÄÅäÖÃÃýÎó £¬Í¨¹ýÀÄÓÃSESºÍWorkMail·þÎñ·¢ËÍ´¹µöÐÂÎÅ £¬´Ó¶øÈƹýµç×ÓÓʼþ±£»¤¡£¹¥»÷ÕßÒ»µ©»ñµÃ¶ÔAWSÕË»§µÄ½Ó¼ûȨÏÞ £¬¾Í»áÌìÉúһʱƾ֤ºÍµÇ¼URL £¬°µ²ØÉí·Ý²¢²é¿´ÕË»§×ÊÔ´¡£ËûÃÇ»¹ÀûÓÃSESºÍWorkMail³ÉÁ¢´¹µö»ù´¡ÉèÊ© £¬´´½¨ÐÂÓû§²¢ÉèÖÃSMTPƾ֤·¢ËÍÓʼþ¡£JavaGhost´´½¨Á˶àÖÖIAMÓû§ £¬ÆäÖÐδʹÓõÄÓû§Ëƺõ×÷Ϊ³Ö¾ÃÓÆ¾ÃÐÔ»úÔì¡£´Ë±í £¬ËûÃÇ»¹´´½¨ÁËÒ»¸öÐÂIAM½ÇÉ« £¬ÔÊÐí´ÓÁíÒ»¸ö½ÚÔìµÄAWSÕË»§½Ó¼ûÖ¸±êÕË»§¡£Unit 42Ö¸³ö £¬¸Ã×éÖ¯ÔÚ¹¥»÷¹ý³ÌÖÐÁôÏÂÒ»ÑùÏóÕ÷ £¬Í¨¹ý´´½¨ÃûΪJava_GhostµÄEC2°²È«×é £¬×éÃèÊöΪ¡°ÎÒÃÇ´æÔÚµ«²»Ë½¼û¡± £¬ÕâЩ°²È«×é²»Ô̺¬Èκΰ²È«¹æ¶¨¡£


https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html


2. ÅÁÀÍÎÀÉú²¿Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ºóѸ¿ì¸´Ô­


3ÔÂ4ÈÕ £¬ÉýƽÑ󵺹úÅÁÀ͵ÄÎÀÉú²¿½üÆÚÔâ·êÁËÒ»´ÎÓɳÛÃû·¸×ïÍÅ»ïQilinÌáÒéµÄÀÕË÷Èí¼þ¹¥»÷¡£Õâ´Î¹¥»÷µ¼ÖÂÅÁÀÍÎÀÉúÓ빫¼Ò·þÎñ²¿£¨MHHS£©µÄITϵͳ±»ÈëÇÖ £¬²¿ÃÅÎļþ±»ÇÔÈ¡¡£ÅÁÀ͹ú¶ÈÒ½Ôº×÷Ϊ¸Ã¹ú¹Ø¼üÒ½ÁÆ»ú¹¹ £¬ÆäÔËÓªÒò¶øÊܵ½Íþв¡£È»¶ø £¬ÔÚÅÁÀÍ¡¢°Ä´óÀûÑÇÍøÂ簲ȫר¼ÒºÍ²ÆÕþ²¿¹ÙÔ±µÄЭÖúÏ £¬µ±¾ÖѸ¿ì²éÃ÷ÊÂÎñÕæÏà £¬²¢ÔÚ48Ó×ʱÄÚ¸´Ô­ÁËÒ½ÔºµÄÕý³£ÔËÓª¡£Í¬Ê± £¬ÃÀ¹úÍøÂç˾Á¡°Ç°ÑØ·ÀÓù¡±Ó××éÒ²ÔÚÏÖ³¡½øÐÐÈ¡Ö¤ÍøÂçºÍ·ÖÎö¡£÷è÷ëºÚ¿ÍÍþвҪ°ä²¼ÇÔÈ¡µÄÊý¾Ý £¬µ«ÅÁÀ͹ÙÔ±²¢Î´ÊÔͼЭÉÌÊê½ð¡£Ö»¹Ü²¿Ãű»µÁÐÅÏ¢Òѱ»°ä²¼ £¬Ô̺¬»¼ÕßÕ˵¥ÌáÒªµÈÓ×ÎÒÐÅÏ¢ £¬µ«MHHSÒÔΪÕâЩÐÅϢй¶²»»á¶ÔÅÁÀÍÓ×ÎҵݲȫÔì³É³Á´óÓ°Ïì £¬µ«ÈÔ½¨ÒéÃñ¶àά³Ö¾¯Ìè £¬·À±¸Ç±ÔÚµÄڲƭºÍÍøÂç´¹µöÓʼþ¡£´Ë±í £¬÷è÷ëÀÕË÷Èí¼þÍÅ»ï½üÆÚ»¹Õë¶ÔÆäËûÒ½ÁÆ»ú¹¹¡¢´¦Ëùµ±¾ÖºÍ´óÐ͹«Ë¾·¢Õ¹Á˹¥»÷ £¬ÒýÆðÁË¿í·º¹Ø×¢¡£


https://therecord.media/palau-health-ministry-ransomware-recover


3. ¼Ù¼¼ÊõÖ§³ÖʹÓõ绰ºÍMicrosoft TeamsÓÕÆ­Óû§×°ÖÃÀÕË÷Èí¼þ


3ÔÂ3ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢³öÖÒ¸æ £¬Ò»ÖÖеÄȦÌ×ÔÚËÁŰ £¬ÍøÂç·¸×ï·Ö×Ó¼Ù°ç³É¼¼ÊõÖ§³ÖÈËÔ± £¬Í¨¹ý·¢ËÍ´óÁ¿µç×ÓÓʼþ²¢ÀûÓà Microsoft Teams »òµç»°ÓÕÆ­Êܺ¦ÕߵǼ £¬½ø¶ø»ñȡԶ³Ì½Ó¼ûȨÏÞ¡£ËûÃÇʹÓúϷ¨µÄWindows·¨Ê½Quick AssistÀ´ÌṩԶ³Ì¼¼ÊõÖ§³Ö £¬µ«ÊµÔòÔÚ×°ÖÃÃûΪBackConnectµÄºóÃŶñÒâÈí¼þ £¬Ê¹¹¥»÷Õß¿ÉÄÜÆëÈ«½ÚÔìÊÜϰȾµÄϵͳ¡£ÕâһȦÌ×Óë³ôÃûÔ¶ÑïµÄBlack BastaÀÕË÷Èí¼þ×éÖ¯çÇÃÜÓÐ¹Ø £¬¸Ã×éÖ¯ÔøÔÚ2024ÄêÒòÀàËÆÊÖ·¨±»ÏóÕ÷ £¬²¢¾Ý±¨Â·ÔÚ2023Äê´ÓÊܺ¦ÕßÄÇÀï׬ȡÁ˳¬¹ý1ÒÚÃÀÔª¡£´Ë±í £¬Ò»Ð©Black Basta³ÉÔ±ÒѾ­×ªÏòCactusÀÕË÷Èí¼þÍÅ»ï £¬×î½üµÄCactus¹¥»÷ÖÐʹÓõIJ½ÖèÓëBlack Basta¾ªÈ˵ØÀàËÆ¡£ÕâЩ¹¥»÷ÖØÒªÕë¶Ô±±ÃÀµÄÔì×÷Òµ¡¢½ðÈÚ¡¢Í¶×ÊÕ÷ѯºÍ·¿µØ²úÐÐÒµ £¬×Ô2024Äê10ÔÂÒÔÀ´ÓÈΪ»îÔ¾¡£¹¥»÷ÕßÀûÓÃÉç½»¹¤³ÌºÍÀÄÓÃÕý°æÈí¼þºÍÔÆ·þÎñÏà½áºÏµÄ·½Ê½ £¬Ê¹¶ñÒâÐÐΪ¿´ÆðÀ´ÏñÕý³£µÄÍÆËã»ú»î¶¯¡£ÍøÂ簲ȫ²»½öÔÚÓÚÕ¼ÓÐÕýÈ·µÄÈí¼þ £¬¸üÔÚÓÚÒâʶµ½·¸×ï·Ö×ÓÈôºÎÊÔͼºýŪÈËÃÇ¡£Òò¶ø £¬Microsoft TeamsÓû§Ó¦Î¬³Ö¾¯Ìè £¬Ô¤·ÀÊܵ½´ËÀàȦÌ×µÄÇÖº¦¡£


https://hackread.com/fake-it-support-calls-microsoft-teams-users-install-ransomware/


4. ¶íÂÞ˹µçОÞÍ·BeelineÔÙÔâDDoS¹¥»÷


3ÔÂ3ÈÕ £¬¶íÂÞ˹µçÐŹ«Ë¾BeelineÔâ·êÁ˶¨ÏòÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬µ¼Ö²¿ÃÅÓû§»¥ÁªÍøÖÐ¶Ï £¬ÕâÊǽü¼¸ÖÜÄÚÕë¶Ô¸Ã¹«Ë¾µÄµÚ¶þ´Î³Á´ó¹¥»÷¡£Õâ´Î¹¥»÷Ó°ÏìÁËBeelineµÄÒÆ¶¯ÀûÓ÷¨Ê½¡¢ÍøÕ¾ºÍ»¥ÁªÍø·þÎñ £¬Óû§ÔÚ½Ó¼ûʱÓöµ½ÄÑÌâ £¬ÄªË¹¿ÆºÍÖܱߵØÓòµÄÓû§·×·×ͶËßÏνÓÎÊÌâ¡£BeelineÒѲÉÈ¡´ëÊ©²»±ä·þÎñ £¬µ«Î´Ìṩ¸ü¶àϸ½Ú¡£½ñÄê2Ô £¬BeelineÒ²ÔøÔâ·êÀàËÆ¹¥»÷ £¬µ¼Ö´óÃæ»ý·þÎñÖжÏ¡£Õâ´Î¹¥»÷Óë1Ô¶íÂÞ˹µçОÞÍ·MegaFonÔâ·êµÄ¹¥»÷ÀàËÆ £¬¾ùÓÉ´ó¹æÄ£DDoS¹¥»÷Ôì³É £¬±»ÒÔΪÊÇÕë¶ÔµçÐÅÐÐÒµµÄÑϳÁºÚ¿Í»î¶¯Ö÷ÒåÍøÂç¹¥»÷Ö®Ò»¡£Beeline֮ǰ¹éºÉÀ¼¹«Ë¾VeonËùÓÐ £¬VeonÔÚÈëÇÖÎÚ¿ËÀ¼ºóÆðÍ·°þÀëÆä¶íÂÞ˹ҵÎñ¡£Õâ´Î¹¥»÷ÊǶíÂÞ˹µçÐÅÐÐҵһϵÁÐÍøÂçÊÂÎñÖ®Ò» £¬Ô̺¬RostelecomÒÉËÆÔâ·êÍøÂç¹¥»÷¡¢ÎÚ¿ËÀ¼ÍøÂçͬÃËÐû³Æ¶Ô¶íÂÞ˹»¥ÁªÍøÌṩÉÌNodexµÄ¹¥»÷ÕÆ¹Ü £¬ÒÔ¼°Rapporto»ã±¨Æä»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷µÈ¡£


https://therecord.media/russian-telecom-beeline-outages-cyber


5. еÄClickFix¹¥»÷ͨ¹ýMicrosoft Sharepoint²¿ÊðHavoc¿ò¼Ü


3ÔÂ3ÈÕ £¬Ð·¢ÏÖµÄClickFixÍøÂç´¹µö»î¶¯ÓÕÆ­Êܺ¦ÕßÖ´ÐжñÒâPowerShellºÅÁî £¬ÒÔ²¿ÊðHavocºóÀûÓÿò¼ÜÀ´Ô¶³Ì½Ó¼ûÊÜϰȾÉ豸¡£ClickFix ÊÇÈ¥Äê³öÏÖµÄÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ £¬ÍþвÐÐΪÕßͨ¹ý´´½¨ÏÔʾÐéαÃýÎóµÄÍøÕ¾»ò¸½¼þ £¬ÌáÐÑÓû§µ¥»÷°´Å¥½¨¸´ÃýÎó¡£µ¥»÷ºó £¬¶ñÒâPowerShellºÅÁî»á±»¸´Ôìµ½¼ôÌù°å £¬¶øºóÌáÐÑÓû§Õ³Ìùµ½ºÅÁîÌáÐÑ·ûÖÐ £¬ÏÖʵÉÏÖ´ÐеÄÊÇÔ¶³ÌÕ¾µãÉϵĶñÒâ¾ç±¾ £¬ÏÂÔØ²¢×°ÖöñÒâÈí¼þ¡£ÔÚ×î½üµÄÒ»´ÎClickFix»î¶¯ÖÐ £¬ÍþвÐÐΪÕßÀûÓÃMicrosoftÔÆ·þÎñ £¬·¢ËÍ´¹µöÓʼþÐû³ÆÓÓ×°ÏÞ¶È֪ͨ¡± £¬ÓÕʹÓû§´ò¿ªHTMLÎĵµºóÏÔʾ¼ÙµÄÃýÎóÌáÐÑ £¬Êèµ¼Óû§Ö´ÐÐPowerShellºÅÁî¡£¸ÃºÅÁîÆô¶¯ÍйÜÔÚÍþвÐÐΪÕßSharePoint·þÎñÆ÷Éϵľ籾 £¬²é³­É豸ÊÇ·ñÔÚɳºÐ»·¾³ÖÐ £¬¶øºóÅú¸Ä×¢²á±í¡¢×°ÖÃPythonÚ¹ÊÍÆ÷ £¬²¢ÏÂÔØ²¢Ö´ÐÐPython¾ç±¾ÒÔ²¿ÊðHavoc¿ò¼Ü¡£Havoc¿ò¼ÜÔÊÐí¹¥»÷ÕßÔ¶³Ì½ÚÔìÉ豸 £¬Í¨¹ýMicrosoft Graph APIÓëÍþвÐÐΪÕߵķþÎñͨѶ £¬»ìÈëͨÀýÍøÂçͨѶÒÔÌӱܼì²â¡£ClickFix¹¥»÷Ô½À´Ô½ÊÜÓ­½Ó £¬±»ÓÃÓÚ²¿Êð¸÷Àà¶ñÒâÈí¼þ £¬ÍþвÐÐΪÕß»¹²»ÐݸĽø¼¼Êõ £¬ÀûÓÃÉ罻ýÌåÆ½Ì¨ÓÕÆ­Óû§¡£


https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/


6. ²¨À¼º½Ìì¾ÖÔâÍøÂç¹¥»÷ £¬Ì«¿Õ»ú×é³ÉºÚ¿ÍÐÂÖ¸±ê


3ÔÂ3ÈÕ £¬²¨À¼º½Ìì¾Ö£¨POLSA£©ÖÜÈÕ°ä·¢ÆäÔâ·êÁËÍøÂç¹¥»÷ £¬²¢ÒѶϿªÓ뻥ÁªÍøµÄÏνӽøÐе÷²é £¬Í¬Ê±ÆäÍøÕ¾½ØÖÁÖÜÒ»ÈÔÎÞ·¨½Ó¼û¡£¹ú¶ÈÍøÂ簲ȫ·þÎñ²¿ÃÅÒѼì²âµ½¶ÔPOLSA IT»ù´¡ÉèÊ©µÄδ¾­ÊÚȨ½Ó¼û £¬²¢ÔÚ±£»¤ÊÜÓ°ÏìµÄϵͳ £¬Í¬Ê±ÖÂÁ¦¼ø±ð¹¥»÷Õß¡£Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷ÊÇÓÉÀÕË÷Èí¼þ×éÖ¯»¹ÊÇÕþÖζ¯»úµÄºÚ¿ÍÌáÒé £¬Ò²Î´Ð¹Â©ºÚ¿ÍÈëÇÖϵͳµÄ¾ßÌåϸ½Ú¡£POLSAÊDz¨À¼ÕƹÜÌ«¿Õ»î¶¯È·µ±¾Ö»ú¹¹ £¬Ò²ÊÇÅ·ÖÞº½Ìì¾Ö³ÉÔ± £¬Æä¿ÉÄܳÉΪºÚ¿ÍµÄÓÕÈËÖ¸±ê £¬ÓÉÓÚÓë¾üʺ͵ý±¨»ú¹¹µÄºÏ×÷¿ÉÄܶ³öÃô¸ÐµÄ¹ú·ÀÓйØÐÅÏ¢¡¢ÎÀÐÇÔËÓª»ò»úÃÜ×êÑÐ £¬Î£¼°¹ú¶È°²È«¡£²¨À¼ÒѳÉΪÇ×¶íºÚ¿ÍµÄÖØÒªÖ¸±ê £¬½ñÄêÍøÂç¹¥»÷ÊýÁ¿·­±¶ £¬Îª´Ë²¨À¼ÒÑͶ×Ê7.6ÒÚÃÀÔª¼ÓÇ¿ÍøÂ簲ȫ¡£


https://therecord.media/poland-space-cyberattack-agency-investigate