Ñо¿Ö°Ô±·¢Ã÷WindowsȱÏݿɵ¼ÖÂÀàËÆRootkitµÄ¹¦Ð§

Ðû²¼Ê±¼ä 2024-04-24

1. Ñо¿Ö°Ô±·¢Ã÷WindowsȱÏݿɵ¼ÖÂÀàËÆRootkitµÄ¹¦Ð§


4ÔÂ22ÈÕ£¬£¬ £¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓà DOS µ½ NT ·¾¶×ª»»Àú³ÌÀ´ÊµÏÖÀàËÆ rootkit µÄ¹¦Ð§£¬£¬ £¬£¬ÒÔÒþ²ØºÍÄ£ÄâÎļþ¡¢Ä¿Â¼ºÍÀú³Ì¡£¡£ ¡£¡£Çå¾²Ñо¿Ô± Or YairÔÚºÚñ´ó»áÉϽÒÏþµÄÒ»·ÝÆÊÎö±¨¸æÖÐÌåÏÖ£º¡°µ±Óû§ÔÚ Windows ÖÐÖ´ÐдøÓз¾¶²ÎÊýµÄº¯Êýʱ£¬£¬ £¬£¬Îļþ»òÎļþ¼ÐËùÔÚµÄ DOS ·¾¶½«×ª»»Îª NT ·¾¶¡£¡£ ¡£¡£¡±ÔÚ´Ëת»»Àú³ÌÖУ¬£¬ £¬£¬±£´æÒ»¸öÒÑÖªÎÊÌ⣬£¬ £¬£¬¼´¸Ãº¯Êý»áɾ³ýÈκη¾¶ÔªËØÖеÄÎ²ËæµãÒÔ¼°×îºóÒ»¸ö·¾¶ÔªËØÖеÄÈκÎÎ²Ëæ¿Õ¸ñ¡£¡£ ¡£¡£´Ë²Ù×÷ÓÉ Windows ÖеĴó´ó¶¼Óû§¿Õ¼ä API Íê³É¡£¡£ ¡£¡£ÕâЩËùνµÄ MagicDot ·¾¶ÔÊÐíÈκηÇÌØÈ¨Óû§»á¼ûÀàËÆ rootkit µÄ¹¦Ð§£¬£¬ £¬£¬È»ºóÕâЩÓû§¿ÉÒÔ½«ÆäÎäÆ÷»¯£¬£¬ £¬£¬ÔÚûÓÐÖÎÀíԱȨÏÞµÄÇéÐÎÏÂÖ´ÐÐһϵÁжñÒâ²Ù×÷£¬£¬ £¬£¬²¢ÇÒ²»»á±»·¢Ã÷¡£¡£ ¡£¡£


https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html?&web_view=true


2. ¶íÂÞ˹SandwormºÚ¿ÍÍÅ»ïÃé×¼ÁËÎÚ¿ËÀ¼20¸öÖ÷Òª×éÖ¯


4ÔÂ22ÈÕ£¬£¬ £¬£¬Æ¾Ö¤ÎÚ¿ËÀ¼ÅÌËã»ú½ôÆÈÏìӦС×é (CERT-UA) µÄÒ»·Ý±¨¸æ£¬£¬ £¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯ Sandworm Ö¼ÔÚÆÆËðÎÚ¿ËÀ¼Ô¼ 20 ¸öÒªº¦»ù´¡ÉèÊ©µÄÔËÐС£¡£ ¡£¡£ÕâЩºÚ¿ÍÒ²±»³ÆÎª BlackEnergy¡¢Seashell Blizzard¡¢Voodoo Bear ºÍ APT44£¬£¬ £¬£¬¾ÝÐÅÓë¶íÂÞ˹Îä×°²½¶Ó×ÜÕÕÁϲ¿ (GRU) ÓйØ£¬£¬ £¬£¬¶ÔÖÖÖÖÄ¿µÄ¾ÙÐÐÍøÂçÌØ¹¤»î¶¯ºÍÆÆËðÐÔ¹¥»÷¡£¡£ ¡£¡£CERT-UA ±¨¸æ³Æ£¬£¬ £¬£¬2024 Äê 3 Ô£¬£¬ £¬£¬APT44 ¾ÙÐÐÁËÆÆËðÎÚ¿ËÀ¼ 10 ¸öµØÇøÄÜÔ´¡¢Ë®ºÍ¹©Å¯¹©Ó¦ÉÌÐÅÏ¢ºÍͨѶϵͳµÄÐж¯¡£¡£ ¡£¡£¹¥»÷±¬·¢ÔÚÈýÔ·Ý£¬£¬ £¬£¬ÔÚijЩÇéÐÎÏ£¬£¬ £¬£¬ºÚ¿ÍÄܹ»Í¨¹ýÆÈº¦¹©Ó¦Á´À´ÌṩÊÜËð»òÒ×Êܹ¥»÷µÄÈí¼þ£¬£¬ £¬£¬»òÕßͨ¹ýÈí¼þÌṩÉÌ»á¼û×é֯ϵͳ¾ÙÐÐά»¤ºÍÊÖÒÕÖ§³ÖµÄÄÜÁ¦À´ÉøÍ¸Ä¿µÄÍøÂç¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-targeted-20-critical-orgs-in-ukraine/


3. APT28 ʹÓà Windows ´òÓ¡ºǫ́´¦Öóͷ£³ÌÐòȱÏݰ²ÅÅGooseEgg


4ÔÂ23ÈÕ£¬£¬ £¬£¬APT28½« Microsoft Windows Print Spooler ×é¼þÖеÄÇå¾²Îó²îÎäÆ÷»¯£¬£¬ £¬£¬ÒÔÈö²¥Ò»ÖÖÃûΪ GooseEgg µÄÏÈǰδ֪µÄ×Ô½ç˵¶ñÒâÈí¼þ¡£¡£ ¡£¡£¾Ý³Æ£¬£¬ £¬£¬¸Ãй¶ºó¹¤¾ßÖÁÉÙ´Ó 2020 Äê 6 ÔÂ×îÏÈʹÓ㬣¬ £¬£¬¿ÉÄÜ×îÔç´Ó 2019 Äê 4 ÔÂ×îÏÈʹÓ㬣¬ £¬£¬ËüʹÓÃÁËÒ»¸öÏÖÒÑÐÞ²¹µÄȱÏÝ£¬£¬ £¬£¬ÔÊÐíȨÏÞÉý¼¶£¨CVE-2022-38028£¬£¬ £¬£¬CVSS ÆÀ·Ö£º7.8£©¡£¡£ ¡£¡£Microsoft ÔÚ 2022 Äê 10 ÔÂÐû²¼µÄ¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌ⣬£¬ £¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö (NSA) Æäʱ±¨¸æÁ˸ÃȱÏÝ¡£¡£ ¡£¡£Æ¾Ö¤Õâ¼Ò¿Æ¼¼¾ÞÍ·ÍþвÇ鱨ÍŶӵÄ×îз¢Ã÷£¬£¬ £¬£¬APT28£¨Ò²³ÆÎª Fancy Bear ºÍ Forest Blizzard£¨ÒÔǰ³ÆÎª Strontium£©£©½«¸ÃÎó²îÎäÆ÷»¯£¬£¬ £¬£¬ÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼¡¢Î÷Å·ºÍ±±ÃÀÕþ¸®¡¢·ÇÕþ¸®¡¢½ÌÓýºÍ½»Í¨µÄ¹¥»÷²¿·Ö×éÖ¯¡£¡£ ¡£¡£½ü¼¸¸öÔÂÀ´£¬£¬ £¬£¬APT28 ºÚ¿Í»¹ÀÄÓÃÁËMicrosoft Outlook ÖеÄȨÏÞÉý¼¶Îó²î£¨CVE-2023-23397£¬£¬ £¬£¬CVSS µÃ·Ö£º9.8£©ºÍ WinRAR ÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2023-38831£¬£¬ £¬£¬CVSS µÃ·Ö£º7.8£©¡£¡£ ¡£¡£


https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html


4. ToddyCat APT ÕýÔÚÍøÂçÑÇÌ«µØÇø¹¤¿ØÐÐÒµµÄÊý¾Ý


4ÔÂ23ÈÕ£¬£¬ £¬£¬Ò»¸öÃûΪ ToddyCat µÄ¸ß¼¶Ò»Á¬Íþв (APT) ×éÖ¯ÕýÔÚ´ÓÑÇÌ«µØÇøµÄÕþ¸®ºÍ¹ú·ÀÄ¿µÄÍøÂ繤ҵ¹æÄ £»£»£»¯µÄÊý¾Ý¡£¡£ ¡£¡£¿£¿£¿£¿¨°Í˹»ùʵÑéÊÒ¸ú×ٸûµÄÑо¿Ö°Ô±±¾Öܽ«ÍþвÐÐΪÕßÐÎòΪʹÓöà¸öͬʱÅþÁ¬µ½Êܺ¦ÕßÇéÐÎÀ´Î¬³Ö³¤ÆÚÐÔ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£ ¡£¡£ËûÃÇ»¹·¢Ã÷ÁË ToddyCatʹÓõÄÒ»×éй¤¾ß£¬£¬ £¬£¬ÓÃÓÚ´ÓÊܺ¦ÕßϵͳºÍä¯ÀÀÆ÷ÍøÂçÊý¾Ý¡£¡£ ¡£¡£ToddyCat ºÜ¿ÉÄÜÊÇÒ»¸ö½²ÖÐÎĵÄÍþвÐÐΪÕߣ¬£¬ £¬£¬¿¨°Í˹»ùÒѽ«ÆäÓëÖÁÉÙ¿É×·Ëݵ½ 2020 Äê 12 ÔµĹ¥»÷ÁªÏµÆðÀ´¡£¡£ ¡£¡£ÔÚ×î³õ½×¶Î£¬£¬ £¬£¬¸Ã×éÖ¯ËÆºõÖ»¹Ø×¢Ì¨ÍåºÍÔ½ÄϵÄÉÙÊý×éÖ¯¡£¡£ ¡£¡£µ«ÔÚ 2021 Äê 2 Ô¹ûÕæÅû¶ Microsoft Exchange Server ÖеÄËùνProxyLogon Îó²îºó£¬£¬ £¬£¬ÍþвÐÐΪÕßѸËÙ¼Ó´óÁ˹¥»÷Á¦¶È¡£¡£ ¡£¡£


https://www.darkreading.com/cyber-risk/-toddycat-apt-is-stealing-data-on-an-industrial-scale-


5. Synlab Italia ÒòÀÕË÷Èí¼þ¹¥»÷¶øÔÝÍ£ÔËÓª


4ÔÂ22ÈÕ£¬£¬ £¬£¬ÔÚÀÕË÷Èí¼þ¹¥»÷ÆÈʹ IT ϵͳÀëÏߺ󣬣¬ £¬£¬Synlab Italia ÔÝÍ£ÁËËùÓÐÒ½ÁÆÕï¶ÏºÍ²âÊÔЧÀÍ¡£¡£ ¡£¡£Synlab Italia ÍøÂçÁ¥ÊôÓڱ鲼ȫÇò 30 ¸ö¹ú¼Ò/µØÇøµÄ Synlab ¼¯ÍÅ£¬£¬ £¬£¬ÔÚÒâ´óÀû¸÷µØÔËÓª×Å 380 ¸öʵÑéÊÒºÍÒ½ÁÆÖÐÐÄ¡£¡£ ¡£¡£ËüµÄÄêÓªÒµ¶îΪ 4.26 ÒÚÃÀÔª£¬£¬ £¬£¬Ã¿Äê¾ÙÐÐ 3500 Íò´ÎÆÊÎö¡£¡£ ¡£¡£¸Ã¹«Ë¾Ðû²¼ÔÚ 4 Ô 18 ÈÕÆÆÏþÔâÓöÇå¾²Îó²î£¬£¬ £¬£¬ÆÈʹÆä¹Ø±ÕËùÓÐÅÌËã»úÒÔÏÞÖÆÆÆËð»î¶¯¡£¡£ ¡£¡£Ö»¹Ü¸Ã¹«Ë¾ÉÐδ֤ʵ£¬£¬ £¬£¬µ«Ò»Ð©Ãô¸ÐµÄÒ½ÁÆÊý¾Ý¿ÉÄÜÒÑ̻¶¸ø¹¥»÷Õß¡£¡£ ¡£¡£ÉÐÎÞÖ÷ÒªÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô Synlab Italia µÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/synlab-italia-suspends-operations-following-ransomware-attack/


6. ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö (NSA) Ðû²¼Çå¾²È˹¤ÖÇÄܰ²ÅÅÖ¸ÄÏ


4ÔÂ22ÈÕ£¬£¬ £¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÓëÃÀ¹úºÍÆäËûÎåÑÛ¹ú¼ÒµÄÁù¸öÕþ¸®»ú¹¹ÏàÖúÐû²¼ÁËÓйØÔõÑùÇå¾²°²ÅÅÈ˹¤ÖÇÄÜϵͳµÄÐÂÖ¸ÄÏ¡£¡£ ¡£¡£ËüÌṩÁË·ÖΪÈýÀàµÄ×î¼Ñʵ¼ùÁбí£¬£¬ £¬£¬Éæ¼°È˹¤ÖÇÄܰ²ÅŵÄÈý¸öÖ÷Òª°ì·¨£º± £»£»£»¤°²ÅÅÇéÐΡ¢Ò»Á¬± £»£»£»¤AIϵͳºÍÇå¾²AIÔËά¡£¡£ ¡£¡£± £»£»£»¤È˹¤ÖÇÄÜÏµÍ³Éæ¼°Ê¶±ðΣº¦¡¢ÊµÑéÊʵ±µÄ»º½â²½·¥ºÍ¼à¿ØÎÊÌâµÄÒ»Á¬Àú³Ì¡£¡£ ¡£¡£Í¨¹ý½ÓÄɱ¾±¨¸æÖиÅÊöµÄ°ì·¨À´È·±£È˹¤ÖÇÄÜϵͳµÄ°²ÅźÍÔËÐÐÇå¾²£¬£¬ £¬£¬×éÖ¯¿ÉÒÔÏÔ׎µµÍËùÉæ¼°µÄΣº¦¡£¡£ ¡£¡£ÕâЩ°ì·¨ÓÐÖúÓÚ± £»£»£»¤×éÖ¯µÄ֪ʶ²úȨ¡¢Ä£×ÓºÍÊý¾ÝÃâÔâ͵ÇÔ»òÀÄÓᣡ£ ¡£¡£


https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/