TA453 ʹÓÃÐÂÐÍ AnvilEcho ¶ñÒâÈí¼þ¹¥»÷ÓÌÌ«×ÅÃûÈËÎï

Ðû²¼Ê±¼ä 2024-08-22
1. TA453 ʹÓÃÐÂÐÍ AnvilEcho ¶ñÒâÈí¼þ¹¥»÷ÓÌÌ«×ÅÃûÈËÎï


8ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÒÁÀʹú¼ÒÖ§³ÖµÄÍþв×éÖ¯TA453Õë¶ÔÓÌÌ«×ÅÃûÈËÎïÌᳫÁËһϵÁÐÈ«ÐIJ߻®µÄÓã²æÊ½ÍøÂç´¹Âڻ¡£¡£¡£¡£´Ë»î¶¯Ö¼ÔÚÈö²¥ÃûΪAnvilEchoµÄÐÂÐÍÇé±¨ÍøÂ繤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßͨ¹ýBlackSmith¶ñÒâÈí¼þ¹¤¾ß°üÈö²¥£¬£¬£¬£¬£¬£¬²¢Î±×°³ÉÕýµ±Ô¼ÇëÒÔ½¨ÉèÐÅÈΡ£¡£¡£¡£AnvilEcho×÷Ϊһ¿îǿʢµÄPowerShellľÂí£¬£¬£¬£¬£¬£¬¾ß±¸ÏµÍ³Õì̽¡¢½ØÆÁ¡¢ÏÂÔØÔ¶³ÌÎļþ¼°Ãô¸ÐÊý¾ÝÉÏ´«µÈ¹¦Ð§£¬£¬£¬£¬£¬£¬ÏÔמ۽¹ÓÚÇé±¨ÍøÂçºÍй¶¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÉç»á¹¤³ÌѧÊֶΣ¬£¬£¬£¬£¬£¬Èçð³äÑо¿»ú¹¹·¢ËÍÐéαԼÇëºÍÊÜÃÜÂë±£»£»£»¤µÄÎĵµÁ´½Ó£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷¶ñÒâÁ´½ÓºÍÏÂÔØ²¡¶¾¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬ÁíÒ»Ïî·¢Ã÷Õ¹ÏÖÁËÒ»ÖÖеĻùÓÚGoÓïÑԵĶñÒâÈí¼þCyclops£¬£¬£¬£¬£¬£¬¿ÉÄÜ×÷ΪCharming KittenºóÃÅBellaCiaoµÄºóÐø²úÆ·£¬£¬£¬£¬£¬£¬½øÒ»²½Åú×¢¹¥»÷ÕßÕýÆð¾¢¸üÐÂÆäÎäÆ÷¿â¡£¡£¡£¡£CyclopsÖ¼ÔÚͨ¹ýREST API·´ÏòËíµÀ´«ÊäÖÁC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬¿ØÖÆÄ¿µÄ»úе£¬£¬£¬£¬£¬£¬²¢Òѱ»ÓÃÓÚ¹¥»÷Àè°ÍÄۺͰ¢¸»º¹µÄÌØ¶¨×éÖ¯¡£¡£¡£¡£´Ë¶ñÒâÈí¼þµÄÑ¡Ôñ·´Ó¦ÁËGoÓïÑÔÔÚ¶ñÒâÈí¼þ¿ª·¢ÕßÖеÄÊ¢ÐУ¬£¬£¬£¬£¬£¬ÇÒÆäµÍ¼ì²âÂʶÔÇå¾²½â¾ö¼Æ»®×é³ÉÌôÕ½¡£¡£¡£¡£


https://thehackernews.com/2024/08/iranian-cyber-group-ta453-targets.html


2. Xeon SenderÔÆ¹¥»÷¹¤¾ß£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±Ð§ÀÍ·Å×ݾÙÐжÌÐÅ´¹ÂÚ


8ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬¶ñÒâÐÐΪÕßÕýʹÓÃÃûΪXeon SenderµÄÔÆ¹¥»÷¹¤¾ß£¬£¬£¬£¬£¬£¬Í¨¹ýÀÄÓÃÕýµ±ÔÆÐ§À;ÙÐдó¹æÄ£µÄ¶ÌÐÅ´¹ÂÚºÍÀ¬»øÓʼþ»î¶¯¡£¡£¡£¡£Õâ¿î¹¤¾ßʹÓöà¸öÈí¼þ¼´Ð§ÀÍ£¨SaaS£©ÌṩÉ̵ÄÓÐÓÃÆ¾Ö¤£¬£¬£¬£¬£¬£¬Í¨¹ýÕýµ±API½Ó¿Ú·¢ËÍÀ¬»øÐÅÏ¢£¬£¬£¬£¬£¬£¬¶ø²»ÒÀÀµÈκιÌÓÐÈõµã¡£¡£¡£¡£SentinelOneÇå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬Xeon Sender¼°Æä±äÌåÈçXeonV5ºÍSVG Sender£¬£¬£¬£¬£¬£¬Ê¹ÓðüÀ¨ÑÇÂíѷ֪ͨЧÀÍ£¨SNS£©ÔÚÄڵĶà¸ö¶ÌÐÅ·Ö·¢Æ½Ì¨£¬£¬£¬£¬£¬£¬Í¨¹ýTelegramºÍºÚ¿ÍÂÛ̳Èö²¥¡£¡£¡£¡£×îа汾µÄXeon SenderÔÚÃûΪOrion ToolxhubµÄTelegramƵµÀÉÏÐû²¼£¬£¬£¬£¬£¬£¬¸ÃƵµÀ»¹ÌṩÆäËûºÚ¿Í¹¤¾ß¡£¡£¡£¡£Xeon Sender²»µ«ÏÞÓÚ¶ÌÐÅ·¢ËÍ£¬£¬£¬£¬£¬£¬»¹¾ß±¸ÑéÖ¤ÕË»§Æ¾Ö¤¡¢ÌìÉúµç»°ºÅÂë¼°¼ì²éºÅÂëÓÐÓÃÐԵȹ¦Ð§¡£¡£¡£¡£Æä»ùÓÚPythonµÄÏÂÁîÐнçÃæÔÊÐíÓû§ÇáËÉÓëAPIͨѶ£¬£¬£¬£¬£¬£¬Ð­µ÷¹¥»÷¡£¡£¡£¡£¸Ã¹¤¾ßËäȻԴ´úÂëÔÓÂÒ£¬£¬£¬£¬£¬£¬µ«ÓÐÓýµµÍÁËÊÖÒÕÃż÷£¬£¬£¬£¬£¬£¬Ê¹µÃµÍÊÖÒÕ¹¥»÷ÕßÒ²ÄÜʹÓᣡ£¡£¡£ÓÉÓÚXeon SenderʹÓÃÌØ¶¨¹©Ó¦ÉÌ¿â¾ÙÐÐAPIÇëÇ󣬣¬£¬£¬£¬£¬¼ì²âÄѶÈÔöÌí£¬£¬£¬£¬£¬£¬ÆóÒµÐè½ÓÄÉ×ÛºÏÊֶΣ¬£¬£¬£¬£¬£¬°üÀ¨APIÈÕÖ¾ÆÊÎöºÍÐÐΪ¼à¿Ø£¬£¬£¬£¬£¬£¬ÒÔʶ±ð²¢·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£


https://thehackernews.com/2024/08/xeon-sender-tool-exploits-cloud-apis.html


3. CERT-UAÖÒÑÔ£ºÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷ʹÓÃVermin¼¯ÈºÈö²¥¶ñÒâÈí¼þ


8ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±·´Ó¦Ð¡×飨CERT-UA£©¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öÒ»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷ÕýÔÚ»îÔ¾£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓöñÒâÈí¼þÍýÏëѬȾÓû§×°±¸£¬£¬£¬£¬£¬£¬Æä±³ºóÍþв¼¯Èº±»±ê¼ÇΪUAC-0020£¬£¬£¬£¬£¬£¬ÓÖ³ÆVermin¡£¡£¡£¡£Ö»¹Ü¹¥»÷µÄÏêϸ¹æÄ£ºÍ¹æÄ£Éв»ÇåÀÊ£¬£¬£¬£¬£¬£¬µ«ÒÑÖªÆäͨ¹ýαװ³É¿â¶û˹¿ËµØÇøÕ½·ýÕÕÆ¬µÄÍøÂç´¹ÂÚÓʼþÌᳫ£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷Á´½ÓÏÂÔØZIPÎļþ¡£¡£¡£¡£ÕâЩZIPÎļþÄÚº¬Ç¶ÓÐJavaScript´úÂëµÄMicrosoft CHMÎļþ£¬£¬£¬£¬£¬£¬¸Ã´úÂë½øÒ»²½´¥·¢»ìÏýµÄPowerShell¾ç±¾Ö´ÐС£¡£¡£¡£Ò»µ©Óû§·­¿ªÕâЩÎļþ£¬£¬£¬£¬£¬£¬²»µ«»á×°ÖÃÒÑÖªÌØ¹¤Èí¼þSPECTRµÄ×é¼þ£¬£¬£¬£¬£¬£¬»¹»áÒýÈëÃûΪFIRMACHAGENTµÄжñÒâÈí¼þ¡£¡£¡£¡£FIRMACHAGENTµÄÖ÷ҪʹÃüÊÇËѼ¯SPECTRÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢½«Æä»Ø´«ÖÁÔ¶³ÌЧÀÍÆ÷¡£¡£¡£¡£SPECTR×÷Ϊһ¿î¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬×Ô2019ÄêÆð±ãÓëVermin×éÖ¯Ïà¹ØÁª£¬£¬£¬£¬£¬£¬ÇÒ¾ÝÐÅÓ문Ê˹¿ËÈËÃñ¹²ºÍ¹ú£¨LPR£©µÄÇå¾²»ú¹¹ÓÐÁªÏµ¡£¡£¡£¡£SPECTRÄܹ»ÆÕ±éÍøÂçÓû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨µ«²»ÏÞÓÚ¼´Ê±Í¨Ñ¶Ó¦Óã¨Element¡¢Signal¡¢Skype¡¢TelegramµÈ£©ÖеÄÎļþ¡¢ÆÁÄ»½ØÍ¼¡¢µÇ¼ƾ֤¼°Ãô¸ÐÊý¾Ý¡£¡£¡£¡£


https://thehackernews.com/2024/08/cert-ua-warns-of-new-vermin-linked.html


4. CannonDesignÔâÀÕË÷Èí¼þAvos Locker¹¥»÷£¬£¬£¬£¬£¬£¬1.3 Íò¿Í»§Êý¾Ýй¶


8ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬×ÅÃûÃÀ¹úÐÞ½¨Éè¼Æ¹«Ë¾CannonDesign½üÆÚÏòÆäÖØ´óµÄ13,000ÓàÃû¿Í»§Èº·¢ËÍÁËÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁË2023ÄêÍ·ÔâÓöµÄÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ1ÔÂ19ÈÕÖÁ25ÈÕÖ®¼ä£¬£¬£¬£¬£¬£¬ºÚ¿Í²»·¨ÇÖÈëÁ˹«Ë¾ÏµÍ³²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬Ö»¹Ü¹«Ë¾Ñ¸ËÙÓÚ1ÔÂ25ÈÕ·¢Ã÷²¢½éÈ룬£¬£¬£¬£¬£¬µ«ÖÜÈ«µÄÊÓ²ìÊÂÇéÖ±ÖÁ2024Äê5ÔÂ3ÈղŸæÒ»¶ÎÂä¡£¡£¡£¡£¾Ýת´ï£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢¿ÉÄܰüÀ¨¿Í»§µÄÃô¸ÐСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝʻִÕպţ¬£¬£¬£¬£¬£¬¶Ô´Ë£¬£¬£¬£¬£¬£¬CannonDesign¾öÒéΪÊܺ¦ÕßÌṩΪÆÚ24¸öÔµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÓëAvos LockerÀÕË÷Èí¼þ¹¥»÷ϸÃÜÏà¹Ø£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÓÚ2023Äê2Ô¹ûÕæÐû³Æ¹¥»÷ÁËCannonDesign²¢ÕÆÎÕ5.7 TB µÄ±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨¹«Ë¾ºÍ¿Í»§Îļþ¡£¡£¡£¡£ÔÚÀÕË÷δ¹ûºó£¬£¬£¬£¬£¬£¬Êý¾Ý±»×ª½»¸øÁËDark Angels ÀÕË÷Èí¼þ×éÖ¯µÄÊý¾ÝÐ¹Â¶ÍøÕ¾ Dunghill Leaks£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Ðû²¼ÁËÉæ¼°¿Í»§ÏêÇé¡¢ÏîÄ¿×ÊÁϼ°¹«Ë¾ÄÚ²¿ÐÅÏ¢µÈ2TB Êý¾Ý¡£¡£¡£¡£2024 Äê 2 Ô£¬£¬£¬£¬£¬£¬Í³Ò»Êý¾Ý¼¯ÔÚ°µÍøÖеĺڿÍÂÛ̳ÉÏÐû²¼£¬£¬£¬£¬£¬£¬°üÀ¨ ClubHydra£¬£¬£¬£¬£¬£¬¶øÊý¾Ý¼¯µÄÒ»²¿·ÖÔÚ 2024 Äê 7 ÔÂͨ¹ý torrent ÔÚ Breached Forums ÉÏ·ÖÏí¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cannondesign-confirms-avos-locker-ransomware-data-breach/


5. Chrome½ôÆÈÐÞ²¹ÒÑÔâºÚ¿ÍÆð¾¢Ê¹ÓõÄÁãÈÕÎó²îCVE-2024-7971


8ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Google½üÆÚ½ôÆÈÐû²¼ÁËChromeä¯ÀÀÆ÷µÄ×îа汾£¨128.0.6613.84/85£©£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇΪÁËÓ¦¶ÔÒ»¸öÒѱ»ºÚ¿ÍÆð¾¢Ê¹ÓõÄÁãÈÕÎó²îCVE-2024-7971¡£¡£¡£¡£ÕâÒ»¸ßΣÎó²î±£´æÓÚV8 JavaScriptÒýÇæÖУ¬£¬£¬£¬£¬£¬ÏêϸÌåÏÖΪÀàÐÍ»ìÏýÎÊÌ⣬£¬£¬£¬£¬£¬ËüÔÊÐí¹¥»÷ÕßÔÚ²»·¨»á¼ûÓû§×°±¸Ê±Ö´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬ÑÏÖØÍþвÓû§Êý¾ÝÇå¾²£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢²»·¨»á¼û»ò¶ñÒâÈí¼þÖ²Èë¡£¡£¡£¡£¼øÓÚ¸ÃÎó²îÒÑÔÚÏÖʵÖÐÔ⵽ʹÓ㬣¬£¬£¬£¬£¬´Ë´Î¸üÐÂÏÔµÃÓÈΪÆÈÇС£¡£¡£¡£³ýÁËÕë¶ÔCVE-2024-7971µÄÐÞ¸´Í⣬£¬£¬£¬£¬£¬Chrome 128°æ±¾»¹Ò»²¢½â¾öÁ˰üÀ¨CVE-2024-7964ºÍCVE-2024-7965ÔÚÄڵĶà¸ö¸ßÑÏÖØÐÔÇå¾²Îó²î¡£¡£¡£¡£ËùÓÐChromeÓû§±»Ç¿ÁÒ½¨ÒéÁ¬Ã¦ÊÖ¶¯¼ì²é²¢¸üÐÂÖÁ128.0.6613.84»ò¸ü¸ß°æ±¾¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹ØÓÚÒÀÀµChrome´¦Öóͷ£Ãô¸ÐÊý¾ÝµÄ×éÖ¯¶øÑÔ£¬£¬£¬£¬£¬£¬Ñ¸ËÙÓ¦Óô˸üв¢Ë¼Á¿ÊµÑéÌØÁíÍâÇå¾²·À»¤²½·¥£¨ÈçÓ¦ÓÃɳºÐ¸ôÀ롢ǿ»¯ÍøÂç·Ö¶ÎµÈ£©±äµÃÓÈΪҪº¦£¬£¬£¬£¬£¬£¬ÒÔ½øÒ»²½½µµÍCVE-2024-7971¼°ÆäËûDZÔÚÎó²î´øÀ´µÄÇ徲Σº¦¡£¡£¡£¡£


https://securityonline.info/urgent-chrome-update-active-zero-day-exploit-detected-cve-2024-7971/


6. ³¯ÏʺڿÍUAT-5394°²ÅÅÐÂÐͶñÒâÈí¼þMoonPeak


8ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐÍÔ¶³Ì»á¼ûľÂíMoonPeak±»½ÒÆÆÎª¹ú¼ÒÖ§³ÖµÄ³¯ÏÊÍþв»î¶¯¼¯ÍŵÄй¤¾ß¡£¡£¡£¡£Ë¼¿ÆTalos½«ÆäÓë±àºÅΪUAT-5394µÄºÚ¿Í×éÖ¯ÁªÏµÆðÀ´£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÕ½ÊõÉÏÓëÒÑÖªµÄKimsuky¹ú¼ÒÐÐΪÕß±£´æ½»¼¯¡£¡£¡£¡£MoonPeak×÷ΪXeno RAT¶ñÒâÈí¼þµÄ±äÖÖ£¬£¬£¬£¬£¬£¬±»Éè¼ÆÓÃÓÚ´ÓÔÆÐ§ÀÍÖмìË÷¶ñÒâ¸ºÔØ£¬£¬£¬£¬£¬£¬¾ß±¸¼ÓÔØ²å¼þ¡¢¿ØÖÆÀú³Ì¼°ÓëC2ЧÀÍÆ÷ͨѶµÈ¹¦Ð§¡£¡£¡£¡£TalosÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬UAT-5394¿ÉÄÜÊÇKimsukyµÄ·ÖÖ§»ò³¯ÏÊÍøÂç»ú¹¹ÄÚÁíÒ»½ÓÄÉÏàËÆÕ½ÊõµÄÍŶÓ¡£¡£¡£¡£´Ë´Î»î¶¯ÏÔÖøÌØµãÊǹ¹½¨ÁËеĻù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬°üÀ¨C2ЧÀÍÆ÷¡¢¸ºÔØÍйܵãºÍ²âÊÔÇéÐΣ¬£¬£¬£¬£¬£¬ÒÔÖ§³ÖMoonPeakµÄÒ»Á¬µü´ú¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕ߯µÈÔ¸üÐÂЧÀÍÆ÷ÉϵĶñÒâÎļþ£¬£¬£¬£¬£¬£¬²¢ÍøÂçѬȾÈÕÖ¾£¬£¬£¬£¬£¬£¬ÏÔʾ³ö¸ß¶ÈµÄÎÞаÐÔºÍÒþ²ØÐÔ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬MoonPeakµÄ½ø»¯Óëлù´¡ÉèÊ©µÄ½¨ÉèϸÃÜÏàÁ¬£¬£¬£¬£¬£¬£¬Ã¿´Î¸üж¼ÒýÈë¸ü¶à»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬ÒÔ×è°­ÆÊÎöºÍ¸Ä±äͨѶ»úÖÆ¡£¡£¡£¡£ÕâÖÖÉè¼ÆÈ·±£ÁËMoonPeakµÄÌØ¶¨°æ±¾½öÓëÆ¥ÅäµÄC2ЧÀÍÆ÷ЭͬÊÂÇ飬£¬£¬£¬£¬£¬ÔöÌíÁË·ÀÓùÄѶÈ¡£¡£¡£¡£UAT-5394ѸËÙ¹¹½¨Ð»ù´¡ÉèÊ©µÄÄÜÁ¦Åú×¢£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÕýÆð¾¢À©´ó»î¶¯¹æÄ££¬£¬£¬£¬£¬£¬ÔöÉèͶ·ÅµãºÍC2ЧÀÍÆ÷¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú´Ë´Î»î¶¯µÄÄ¿µÄ¡£¡£¡£¡£


https://thehackernews.com/2024/08/north-korean-hackers-deploy-new.html