Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ

Ðû²¼Ê±¼ä 2024-05-23
1. Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ


5ÔÂ22ÈÕ£¬£¬£¬£¬Ò»¸öÓë¶íÂÞ˹Óйصĸ߼¶Ò»Á¬ÐÔÍþв (APT) ×éÖ¯Ò»Ö±ÔÚÀÄÓà PDF ºÍ MSBuild ÏîÄ¿Îļþ£¬£¬£¬£¬Ê¹ÓÃÉç½»¹¤³Ìµç×ÓÓʼþ½« TinyTurla ºóÃÅ×÷ΪÎÞÎļþ¸ºÔؾÙÐÐÈö²¥¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬¸Ã»î¶¯µÄÎÞ·ìÈö²¥³ÌÐòÔÚÖØ´óÐÔ·½ÃæÈ¡µÃÁËÏÔÖøµÄǰ½ø¡£¡£¡£¡£¡£Cyble Ñо¿Ö°Ô±ºÍÇ鱨ʵÑéÊÒ (CRIL) µÄÑо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óõç×ÓÓʼþºÍÔ¼ÇëÈËȨ×êÑлá»òÌṩ¹«¹²×ÉѯµÄÎļþ×÷ΪÓÕ¶ü£¬£¬£¬£¬ÒÔѬȾ TinyTurla Óû§¡£¡£¡£¡£¡£ËûÃÇÔÚ×òÌìÐû²¼µÄÓйظûµÄ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬£¬£¬¹¥»÷Õß»¹Ã°³äÕýµ±Õþ¸®£¬£¬£¬£¬ÒÔÒýÓÕÊܺ¦ÕßÊÜÆ­¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬TinyTurla ºóÃÅÓë¶íÂÞ˹×ÊÖúµÄºã¾ÃÍþв×éÖ¯TurlaÓйØ£¬£¬£¬£¬¸Ã×é֯ͨ³£Õë¶Ô·ÇÕþ¸®×éÖ¯£¬£¬£¬£¬¡°ÌØÊâÊÇÄÇЩÓëÖ§³ÖÎÚ¿ËÀ¼ÓÐÁªÏµµÄ×éÖ¯¡±¡£¡£¡£¡£¡£Ìû×ӳƣ¬£¬£¬£¬ËûÃÇÒÔΪ¸Ã×éÖ¯ÊǶñÒâ¹¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russia-turla-apt-msbuild-tinyturla-backdoor


2. CISA ÖÒÑÔʹÓÃMirth ConnectÎó²îµÄ¹¥»÷»î¶¯


5ÔÂ21ÈÕ£¬£¬£¬£¬Mirth Connect ÊÇÒ»ÖÖÆÕ±éʹÓÃµÄ¿çÆ½Ì¨½çÃæÒýÇæ£¬£¬£¬£¬Ò½ÁƱ£½¡×éÖ¯½«ÆäÓÃÓÚÐÅÏ¢ÖÎÀí¡£¡£¡£¡£¡£Ó°Ï쿪Դ²úÆ·µÄÎó²î CVE-2023-43208 ÊÇÒ»¸öÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬£¬£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£4.4.1 °æÐû²¼Ê±ÒÑÍÆ³ö²¹¶¡¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ 2023 Äê 10 ÔÂÆØ¹â£¬£¬£¬£¬ÆäÊ±ÍøÂçÇå¾²¹«Ë¾ Horizon3.ai ÖÒÑԳƸÃÎó²î¿ÉÄܶÔÒ½ÁƱ£½¡¹«Ë¾Ôì³ÉÓ°Ïì¡£¡£¡£¡£¡£CVE-2023-43208 ÊÇ CVE-2023-37679 µÄÒ»¸ö±äÌ壬£¬£¬£¬Mirth Connect ¿ª·¢Ö°Ô±Ö®Ç°ÒÑÔÚ 4.4.0 °æÐû²¼Ê±¶Ô¸ÃÎó²î¾ÙÐÐÁËÐÞ²¹¡£¡£¡£¡£¡£Horizon3.ai Æäʱ½«¸ÃÎó²îÐÎòΪÒ×ÓÚʹÓ㬣¬£¬£¬²¢ÖÒÑԳơ°¹¥»÷ÕߺܿÉÄÜʹÓôËÎó²î¾ÙÐгõʼ»á¼û»òÆÆËðÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡±¡£¡£¡£¡£¡£¸ÃÇå¾²¹«Ë¾»¹Ö¸³ö£¬£¬£¬£¬·¢Ã÷ÁË 1,200 ¶à¸ö̻¶ÔÚ»¥ÁªÍøÉ쵀 NextGen Mirth Connect ʵÀý¡£¡£¡£¡£¡£


https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/


3. ºÚ¿ÍÍÅ»ïʹÓÃÀÕË÷Èí¼þ¹¥»÷·ÆÂɱöÕþ¸®


5ÔÂ22ÈÕ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃй¶µÄÀÕË÷Èí¼þ¹¹½¨Õß¶Ô·ÆÂɱöµÄÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷¡ª¡ªÕâÊdzöÓÚÕþÖÎÄîÍ·µÄÕûÌåµÄÇ÷ÊÆµÄÒ»²¿·Ö£¬£¬£¬£¬ËûÃÇÔ½À´Ô½¶àµØÊÔͼÈÅÂÒÕâ¸ö¶«ÄÏÑǹú¼ÒµÄÉúÑÄ¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ SentinelOneµÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬Ò»¸öÃûΪ¡°Ikaruz Red Team¡±µÄ×éÖ¯ÊÇÉÙÊý¼¸¸öÕë¶Ô·ÆÂɱöÕþ¸®Ä¿µÄµÄºÚ¿Í×éÖ¯Ö®Ò»¡£¡£¡£¡£¡£¸ÃÐж¯Ê¹ÓÃÁ˶àÖÖÀÕË÷Èí¼þ¹¹½¨Õß¡ª¡ª°üÀ¨ LockBit¡¢Vice Society¡¢Clop ºÍ AlphV¡ª¡ªÌᳫ¡°Ð¡¹æÄ£¡±¹¥»÷¡£¡£¡£¡£¡£Ëü»¹ÔÚÍøÉÏÐû´«·ÆÂɱö¶à¸ö×éÖ¯µÄÊý¾Ýй¶ÇéÐΡ£¡£¡£¡£¡£SentinelOne ÌåÏÖ£¬£¬£¬£¬Êܺ¦ÕßµÄÌõ×ÓÏÕЩËùÓÐØâÇÔ×Ôԭʼ LockBit Ä£°å£¬£¬£¬£¬¶¥²¿µÄÃû×Ö³ýÍâ¡£¡£¡£¡£¡£Î´ÌṩÁªÏµÐÅÏ¢¡£¡£¡£¡£¡£


https://therecord.media/philippines-hacktivist-groups-leaked-versions-ransomware


4. GhostEngine ÍÚ¿ó¹¥»÷ʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯


5ÔÂ22ÈÕ£¬£¬£¬£¬ÒÑ·¢Ã÷´úºÅΪ¡°REF4578¡±µÄ¶ñÒâ¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯°²ÅÅÁËÃûΪ GhostEngine µÄ¶ñÒâ¸ºÔØ£¬£¬£¬£¬¸Ã¸ºÔØÊ¹ÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÀ´¹Ø±ÕÇå¾²²úÆ·²¢°²ÅÅ XMRig ÍÚ¿ó³ÌÐò¡£¡£¡£¡£¡£Elastic Security Labs ºÍ °²ÌìµÄÑо¿Ö°Ô±  ÔÚµ¥¶ÀµÄ±¨¸æºÍ¹²ÏíµÄ¼ì²â¹æÔòÖÐÇ¿µ÷ÁËÕâЩ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷µÄÒì³£ÖØ´óÐÔ£¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ×èÖ¹ËüÃÇ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Á½·Ý±¨¸æ¾ù佫¸Ã»î¶¯¹é×ïÓÚÒÑÖªµÄÍþвÐÐΪÕߣ¬£¬£¬£¬Ò²Î´·ÖÏíÓйØÄ¿µÄ/Êܺ¦ÕßµÄÏêϸÐÅÏ¢£¬£¬£¬£¬Òò´Ë¸Ã»î¶¯µÄÆðÔ´ºÍ¹æÄ£ÈÔȻδ֪¡£¡£¡£¡£¡£ËäÈ»Éв»ÇåÎúЧÀÍÆ÷×î³õÊÇÔõÑù±»ÆÆËðµÄ£¬£¬£¬£¬µ«ÍþвÐÐΪÕߵĹ¥»÷´ÓÖ´ÐÐÃûΪ¡°Tiworker.exe¡±µÄÎļþ×îÏÈ£¬£¬£¬£¬¸ÃÎļþαװ³ÉÕýµ±µÄ Windows Îļþ¡£¡£¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÊÇ GhostEngine µÄ³õʼµÇ̨ÓÐÓøºÔØ£¬£¬£¬£¬GhostEngine ÊÇÒ»¸ö PowerShell ¾ç±¾£¬£¬£¬£¬¿ÉÏÂÔØÖÖÖÖÄ£¿£¿£¿éÒÔÔÚÊÜѬȾµÄ×°±¸ÉÏÖ´Ðвî±ðµÄÐÐΪ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghostengine-mining-attacks-kill-edr-security-using-vulnerable-drivers/


5. Î÷ϤÄá´óѧÔâµ½ºÚ¿Í¹¥»÷²¿·ÖѧÉúÊý¾Ýй¶


5ÔÂ21ÈÕ£¬£¬£¬£¬ÔÚÍþвÐÐΪÕ߯ÆËðÁËÆä Microsoft 365 ºÍ Sharepoint ÇéÐκ󣬣¬£¬£¬Î÷ϤÄá´óѧ (WSU) ÒÑÏòѧÉúºÍѧÊõְԱת´ïÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£WSU ÊǰĴóÀûÑǵÄÒ»Ëù½ÌÓý»ú¹¹£¬£¬£¬£¬Ìṩ¿çѧ¿ÆµÄÆÕ±é±¾¿Æ¡¢Ñо¿ÉúºÍÑо¿¿Î³Ì¡£¡£¡£¡£¡£ËüÓµÓÐ 47,000 ÃûѧÉúºÍ 4,500 ¶àÃûÕýʽºÍ¼¾½ÚÐÔÔ±¹¤£¬£¬£¬£¬ÔËÓªÔ¤ËãΪ 6 ÒÚÃÀÔª¡£¡£¡£¡£¡£Î÷ϤÄá´óÑ§ÍøÕ¾½ñÈÕÐû²¼Í¨¸æ£¬£¬£¬£¬ÖÒÑԳƺڿÍÒÑ»á¼ûÆä Microsoft Office 365 ÇéÐΣ¬£¬£¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍ SharePoint Îļþ¡£¡£¡£¡£¡£Ëù̻¶µÄÊý¾ÝÒòÈ˶øÒ죬£¬£¬£¬Ïêϸȡ¾öÓÚµç×ÓÓʼþͨѶµÄÄÚÈÝÒÔ¼°´óѧ SharePoint ÇéÐÎÖд洢µÄÎĵµ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-data-breach-exposed-student-data/#google_vignette


6. Void ManticoreÃé×¼ÒÔÉ«ÁкͰ¢¶û°ÍÄáÑÇ


5ÔÂ22ÈÕ£¬£¬£¬£¬¸Ã×éÖ¯ÃûΪ Void Manticore (Storm-0842)£¬£¬£¬£¬ÔÚ²î±ð¹ú¼ÒÒÔÖÖÖÖ¼ÙÃû¿ªÕ¹»î¶¯¡£¡£¡£¡£¡£×îÖøÃûµÄÓÖÃû°üÀ¨Õë¶Ô°¢¶û°ÍÄáÑÇÏ®»÷µÄ¡°ÁìÍÁÕýÒ塱ºÍÕë¶ÔÒÔÉ«ÁÐÐж¯µÄ¡°Òò¹û±¨Ó¦¡±¡£¡£¡£¡£¡£Õë¶Ô²î±ðµÄÇøÓò£¬£¬£¬£¬Õë¶Ôÿ¸öÄ¿µÄ½ÓÄÉÆæÒìµÄÒªÁì¡£¡£¡£¡£¡£¸Ã×éÖ¯µÄ»î¶¯ÓëÁíÒ»¸öÒÁÀÊ×éÖ¯ Scarred Manticore µÄ»î¶¯Öصþ£¬£¬£¬£¬ÕâÅúעЭЭµ÷ϵͳµÄÊܺ¦ÕßÑ¡ÔñÊÇËûÃÇΪÒÁÀÊÇ鱨ºÍÇå¾²²¿ (MOIS) ÊÂÇéµÄÒ»²¿·Ö¡£¡£¡£¡£¡£×¨¼ÒÖÒÑÔ˵£¬£¬£¬£¬Ðé¿ÕЫʨ¶ÔÈκÎ×èµ²ÒÁÀÊÀûÒæµÄÈË×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃÖØ´óµÄ¼ÙÃûÍøÂç¡¢Õ½ÂÔЭ×÷ºÍÖØ´óµÄ¹¥»÷ÒªÁì¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÔÆäË«ÖØÍøÂç¹¥»÷·½·¨¶øÖøÃû£¬£¬£¬£¬½«ÎïÀíÊý¾ÝÆÆËðÓëÐÄÀíѹÁ¦ÏàÁ¬Ïµ¡£¡£¡£¡£¡£Void Manticore ʹÓÃÎåÖÖ²î±ðµÄÒªÁ죬£¬£¬£¬°üÀ¨Õë¶Ô Windows ºÍ Linux µÄ×Ô½ç˵²Á³ýÆ÷£¬£¬£¬£¬Í¨¹ýɾ³ýÎļþºÍʹÓù²Ïí´ÅÅÌÀ´ÆÆËðϵͳ¡£¡£¡£¡£¡£


https://meterpreter.org/void-manticore-iranian-state-sponsored-hackers-target-israel-albania/