΢Èí͸¶APT28ʹÓÃOutlookÎó²îÐ®ÖÆExchangeÕÊ»§

Ðû²¼Ê±¼ä 2023-12-06
1¡¢Î¢Èí͸¶APT28ʹÓÃOutlookÎó²îÐ®ÖÆExchangeÕÊ»§


¾ÝýÌå12ÔÂ4ÈÕ±¨µÀ£¬£¬£¬Î¢Èí͸¶APT28£¨ÓÖÃûFancybear£©Ê¹ÓÃOutlookÎó²î£¨CVE-2023-23397£©Ð®ÖÆMicrosoft ExchangeÕÊ»§£¬£¬£¬²¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Å·ÖÞºÍÖж«µÄÕþ¸®»ú¹¹ÒÔ¼°ÄÜÔ´ºÍ½»Í¨µÈÐÐÒµ¡£¡£¡£ÕâÊÇWindows°æOutlookÖеÄÒ»¸öÌáȨÎó²î£¬£¬£¬ÒÑÓÚ½ñÄê3Ô±»ÐÞ¸´¡£¡£¡£Ñо¿Ö°Ô±×¢Öص½£¬£¬£¬¹¥»÷Õß»¹¾­³£Ê¹Óöà¸öÒÑÖªÎó²î£¬£¬£¬°üÀ¨WinRARÎó²î£¨CVE-2023-38831ºÍWindows MSHTMLÎó²î£¨CVE-2021-40444£©¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/russian-hackers-exploiting-outlook-bug-to-hijack-exchange-accounts/


2¡¢AlphVÉù³ÆÒÑ»ñµÃ»á¼ÆÈí¼þ¹«Ë¾Tipalti 256GBÊý¾Ý


12ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬»á¼ÆÈí¼þÌṩÉÌTipaltiÕýÔÚÊÓ²ì¹ØÓÚÆäÔâµ½ALPHVµÄ¹¥»÷ÇÒÊý¾Ýй¶µÄÖ¸¿Ø¡£¡£¡£¸Ã¹«Ë¾Éú²ú»á¼ÆºÍÖ§¸¶×Ô¶¯»¯Èí¼þ£¬£¬£¬Ã¿Äêͨ¹ý3500¶à¸ö¿Í»§´¦Öóͷ£Áè¼Ý500ÒÚÃÀÔªµÄÖ§¸¶¡£¡£¡£ÉÏÖÜÁù£¬£¬£¬ALPHV·¢Ìû³ÆËûÃÇ×Ô9ÔÂ8ÈÕÒÔÀ´¾Í¿ÉÒÔ»á¼ûTipaltiµÄϵͳ£¬£¬£¬ÔÚ´Ëʱ´úÒÑÇÔÈ¡ÁË265 GBÊý¾Ý£¬£¬£¬ÆäÖаüÀ¨TwitchºÍRobloxµÄÊý¾Ý¡£¡£¡£AlphVÔÚ±¾ÖÜÒ»½«¸Ã¹«Ë¾ÖØÐÂÐû²¼µ½ÆäÍøÕ¾ÉÏ£¬£¬£¬Éù³ÆÕýÔÚÓëй¶×î´ó¶¼¾ÝµÄTipalti¿Í»§ÁªÏµ¡£¡£¡£


https://therecord.media/tipalti-alleged-ransomware-attack


3¡¢BlackBerryÅû¶AeroBladeÕë¶ÔÃÀ¹úº½¿ÕÁìÓòµÄ¹¥»÷


BlackBerryÔÚ11ÔÂ30ÈÕÅû¶ÁËкڿÍÍÅ»ïAeroBladeÕë¶ÔÃÀ¹úº½¿ÕÁìÓòµÄ¹¥»÷¡£¡£¡£ÓÐÖ¤¾ÝÅú×¢£¬£¬£¬¹¥»÷ÕßµÄÍøÂç»ù´¡ÉèÊ©ºÍÎäÆ÷»¯ÔÚ2022Äê9ÔÂ×óÓÒͶÈëÔËÐУ¬£¬£¬¹¥»÷µÄ½ø¹¥½×¶Î±¬·¢ÔÚ2023Äê7Ô¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÉæ¼°Ç¶ÈëʽԶ³ÌÄ£°å×¢ÈëºÍ¶ñÒâVBAºê´úÂëµÄÎäÆ÷»¯ÎĵµÖ´ÐÐÓã²æÊ½´¹ÂÚ¹¥»÷£¬£¬£¬ÒÔʵÏÖ¶ÔÄ¿µÄµÄ³õʼ»á¼û£¬£¬£¬²¢·Ö·¢Äܹ»ÁгöÎļþºÍÇÔÈ¡Êý¾ÝµÄ·´ÏòshellµÄpayload¡£¡£¡£BlackBerryÍÆ²â£¬£¬£¬ÕâÊÇÉÌÒµÌØ¹¤»î¶¯£¬£¬£¬Ö¼ÔÚÍøÂçÓмÛÖµµÄÐÅÏ¢¡£¡£¡£


https://blogs.blackberry.com/en/2023/11/aeroblade-on-the-hunt-targeting-us-aerospace-industry


4¡¢ÃÀ¹úÌǹû¹«Ë¾ºÃʱÔâµ½´¹ÂÚ¹¥»÷µ¼Ö²¿·ÖÊý¾Ýй¶


¾Ý12ÔÂ6ÈÕ±¨µÀ£¬£¬£¬ÃÀ¹úÌǹû¹«Ë¾£¨Hershey£©Ôâµ½¹¥»÷£¬£¬£¬Áè¼Ý2200È˵ÄÊý¾Ý¿ÉÄÜй¶¡£¡£¡£ºÃʱÌåÏÖ¹¥»÷±¬·¢ÔÚ9Ô³õ£¬£¬£¬ºÚ¿Í»ñµÃÁ˹«Ë¾²¿·Öµç×ÓÓʼþÕÊ»§µÄ»á¼ûȨÏÞ£¬£¬£¬²¢ÇÒ¿ÉÄÜÒѾ­»á¼ûÁËijЩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾½«´Ë´ÎÊÂÎñ¹éÀàΪ´¹ÂÚ¹¥»÷¡£¡£¡£±»µÁÊý¾ÝÒòÈ˶øÒ죬£¬£¬°üÀ¨ÐÕÃû¡¢Ò½ÁÆÐÅÏ¢¡¢Êý×ÖÊðÃû¡¢¼ÝʻִÕÕ¡¢ÐÅÓÿ¨ºÅÒÔ¼°ÔÚÏßÕÊ»§ºÍ½ðÈÚÕÊ»§Æ¾Ö¤µÈ¡£¡£¡£¸ÃÌǹû¹«Ë¾ÔÚ2011ÄêÔøÔâµ½¹¥»÷£¬£¬£¬¹¥»÷ÕßÈëÇÖÁËÆäЧÀÍÆ÷²¢¸ü¸ÄÁËÆäʳÆ×ÍøÕ¾ÉÏÐû²¼µÄºæ±ºÊ³Æ×¡£¡£¡£


https://therecord.media/hershey-data-breach-phishing


5¡¢Cado·¢Ã÷Õë¶ÔMIPS¼Ü¹¹µÄ½©Ê¬ÍøÂçP2PinfectбäÌå


12ÔÂ4ÈÕ£¬£¬£¬Cado³ÆÆä·¢Ã÷½©Ê¬ÍøÂçP2PinfectµÄбäÌåÖ÷ҪѬȾʹÓÃ32λMIPS£¨ÎÞ»¥ËøÁ÷Ë®Ï߽׶εÄ΢´¦Öóͷ£Æ÷£©¼Ü¹¹µÄ×°±¸¡£¡£¡£MIPSоƬÆÕ±éÓ¦ÓÃÓÚ·ÓÉÆ÷¡¢×¡Õ¬Íø¹ØºÍÊÓÆµÓÎÏ·»úµÈǶÈëʽϵͳÖС£¡£¡£×îй¥»÷»áɨÃèʹÓÃÈõƾ֤µÄSSHЧÀÍÆ÷£¬£¬£¬²¢ÊµÑéͨ¹ýSFTPºÍSCPÉÏ´«MIPS¶þ½øÖÆÎļþ¡£¡£¡£¸ÃMIPS±äÌåµÄÈö²¥²»µ«ÏÞÓÚSSH£¬£¬£¬ÉÐÓÐÈËÊÔͼͨ¹ýÃûΪredis-serverµÄOpenWRTÈí¼þ°üÔÚMIPS×°±¸ÉÏÔËÐÐRedisЧÀÍÆ÷¡£¡£¡£±ðµÄ£¬£¬£¬ÕâһбäÌåʵÑéÁ˸üÖØ´óÇÒ¶à·½ÃæµÄÈÆ¹ý»úÖÆ£¬£¬£¬Ê¹Æä¼ì²âºÍÆÊÎö¸ü¾ßÌôÕ½ÐÔ¡£¡£¡£


https://www.cadosecurity.com/p2pinfect-new-variant-targets-mips-devices/


6¡¢KasperskyÐû²¼2023ÄêQ3Çå¾²Ì¬ÊÆ·ÇÒÆ¶¯Í³¼Æ±¨¸æ


12ÔÂ1ÈÕ£¬£¬£¬KasperskyÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈÇå¾²Ì¬ÊÆ·ÇÒÆ¶¯Í³¼Æ±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬KasperskyÔÚQ3¼ì²âµ½694400301´Î¹¥»÷£¬£¬£¬·¢Ã÷ÁË169194807¸ö¶ñÒâÁ´½Ó¡£¡£¡£×î³£¼ûµÄ½ðÈÚ¶ñÒâÈí¼þÊÇRamnit/Nimnul£¨34.0%£©¡¢Zbot/Zeus£¨16.0%£©ºÍEmotet£¨12.6%£©¡£¡£¡£ÀÕË÷ÍÅ»ïÔÚ±¾¼¾¶ÈʹÓÃÁËÖÖÖÖÎó²î²¢¸ü¶àµØÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµ£¬£¬£¬×î³£¼ûµÄÊÇLockbit£¨23.32%£©¡¢BlackCat£¨12.22%£©ºÍBlack Basta£¨12.03%£©¡£¡£¡£µÚÈý¼¾¶È£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË9¸öеÄÀÕË÷Èí¼þϵÁÐÒÔ¼°11387¸öбäÌå¡£¡£¡£ÖµµÃ×¢ÖØµÄÎó²îÊÇCVE-2023-36884ºÍCVE-2023-38831µÈ¡£¡£¡£


https://securelist.com/it-threat-evolution-q3-2023-non-mobile-statistics/111228/