ÍøÐŰìÐû²¼¡¶ÍøÐŲ¿·ÖÐÐÕþÖ´·¨³ÌÐò»®¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·

Ðû²¼Ê±¼ä 2022-09-09
1¡¢ÍøÐŰìÐû²¼¡¶ÍøÐŲ¿·ÖÐÐÕþÖ´·¨³ÌÐò»®¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·

      

9ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬¹ú¼Ò»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒÐû²¼¹ØÓÚ¡¶ÍøÐŲ¿·ÖÐÐÕþÖ´·¨³ÌÐò»®¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·¹ûÕæÕ÷ÇóÒâ¼ûµÄ֪ͨ¡£¡£¡£¡£ÎªÁ˹淶ºÍ°ü¹ÜÍøÐŲ¿·ÖÒÀ·¨ÍÆÐÐÖ°Ô𣬣¬£¬£¬£¬£¬±£»£»£» £» £»£»¤¹«Ãñ¡¢·¨ÈËºÍÆäËû×éÖ¯µÄÕýµ±È¨Ò棬£¬£¬£¬£¬£¬Î¬»¤¹ú¼ÒÇå¾²ºÍ¹«¹²ÀûÒæ£¬£¬£¬£¬£¬£¬ÍøÐŰì¶Ô¡¶»¥ÁªÍøÐÅÏ¢ÄÚÈÝÖÎÀíÐÐÕþÖ´·¨³ÌÐò»®¶¨¡·¾ÙÐÐÐÞ¶©£¬£¬£¬£¬£¬£¬ÐγÉÁË¡¶ÍøÐŲ¿·ÖÐÐÕþÖ´·¨³ÌÐò»®¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·£¬£¬£¬£¬£¬£¬ÏÖÏòÉç»á¹ûÕæÕ÷ÇóÒâ¼û¡£¡£¡£¡£¹«ÖÚ¿Éͨ¹ýµÇ¼ÖйúÕþ¸®·¨ÖÆÐÅÏ¢Íø¡¢·¢Ë͵ç×ÓÓʼþºÍ¼ÄËÍÐź¯µÄ·½·¨Ìá³ö·´ÏìÒâ¼û¡£¡£¡£¡£


http://www.cac.gov.cn/2022-09/08/c_1664174174624227.htm


2¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛ´ÓÆÏÌÑÑÀÎä×°²½¶Ó×ÜÕÕÁϲ¿ÇÔÈ¡µÄÎļþ

      

¾ÝýÌå9ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÆÏÌÑÑÀÎä×°²½¶Ó×ÜÕÕÁϲ¿£¨EMGFA£©Óë±±Ô¼Ïà¹ØµÄÉñÃØÎļþ±»ÔÚ°µÍøÉϳöÊÛ¡£¡£¡£¡£EMGFAÊÇÆÏÌÑÑÀµÄ×î¸ß¾üÊ»ú¹¹£¬£¬£¬£¬£¬£¬ËüÈÏÕæÆÏÌÑÑÀÎä×°²½¶ÓµÄÍýÏë¡¢Ö¸»ÓºÍ¿ØÖÆ¡£¡£¡£¡£¹¥»÷ÕßÐû²¼Á˱»µÁÎļþµÄÑù±¾×÷Ϊ¹¥»÷Ö¤¾Ý£¬£¬£¬£¬£¬£¬ÃÀ¹úÐÅϢЧÀͲ¿·¢Ã÷ÁËÕâЩÎļþ£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÆÏÌÑÑÀÕþ¸®¡£¡£¡£¡£Æ¾Ö¤³õ³ÌÐò²é£¬£¬£¬£¬£¬£¬ÕâЩÎļþÊÇ´ÓEMGFA¡¢ÉñÃØ¾ü¶Ó(CISMIL)ºÍ¹ú·À×ÊÔ´×ֵܾÄϵͳÖÐй¶µÄ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÉñÃØÎļþ´«ÊäµÄÇå¾²¹æÔòÒѱ»ÆÆË𣬣¬£¬£¬£¬£¬¹¥»÷ÕßÄܹ»»á¼û¾üÊÂͨѶ×ÛºÏϵͳ(SICOM)£¬£¬£¬£¬£¬£¬²¢ÎüÊÕºÍת·¢ÉñÃØÎļþ¡£¡£¡£¡£


https://securityaffairs.co/wordpress/135480/data-breach/nato-docs-stolen-from-portugal.html


3¡¢Î¢ÈíÅû¶DEV-0270½üÆÚµÄÀÕË÷¹¥»÷±³ºóµÄÕ½ÂÔºÍÊÖÒÕ

      

΢ÈíÓÚ9ÔÂ7ÈÕ³ÆÆäÍþвÇ鱨ÍŶÓÒ»Ö±ÔÚ¸ú×Ù¶à¸öÀÕË÷¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬²¢½«ÕâЩ¹¥»÷ÓëDEV-0270£¨Ò²³ÆNemesis Kitten£©ÁªÏµÆðÀ´¡£¡£¡£¡£¸ÃÍÅ»ïÊÇÒÁÀÊPHOSPHORUSµÄÒ»¸ö×Ó×éÖ¯£¬£¬£¬£¬£¬£¬ÓÉÒ»¼ÒÒÔ¹ûÕæÓÖÃûSecnerd£¨secnerd[.]ir£©ºÍLifeweb£¨lifeweb[.]ir£©ÔË×÷µÄ¹«Ë¾ÔËÓª¡£¡£¡£¡£DEV-0270ÔÚ¹¥»÷Á´ÖÐÆÕ±éµØÊ¹ÓÃÁËÔ¶³Ì¶þ½øÖÆÎļþ(LOLBIN)¾ÙÐÐÕì̽ºÍƾ֤»á¼û£¬£¬£¬£¬£¬£¬²¢ÀÄÓÃÄÚÖõÄBitLocker¹¤¾ßÀ´¼ÓÃÜÄ¿µÄÉè±¹ØÁ¬ÄÎļþ¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/


4¡¢LazarusʹÓÃжñÒâÈí¼þMagicRA¹¥»÷È«ÇòµÄ×éÖ¯

      

Cisco TalosÔÚ9ÔÂ7ÈÕÅû¶ÐµÄÔ¶³Ì»á¼ûľÂíMagicRATÓ볯ÏÊLazarusÓйØ¡£¡£¡£¡£ÐÂRAT×î³õÊÇͨ¹ý̻¶µÄVMware Horizonƽ̨ÈëÇÖÄ¿µÄ£¬£¬£¬£¬£¬£¬Ëü¾ßÓÐÏà¶Ô¼òÆÓµÄRAT¹¦Ð§£¬£¬£¬£¬£¬£¬½èÖúQt¿ò¼Ü¹¹½¨£¬£¬£¬£¬£¬£¬²¢ÇÒ²»Ì«¿ÉÄÜͨ¹ý»úеѧϰºÍÆô·¢Ê½¾ÙÐÐ×Ô¶¯¼ì²â¡£¡£¡£¡£MagicRATÒ»µ©×°ÖþͻáÖ´ÐÐÌØÁíÍâpayload£¬£¬£¬£¬£¬£¬ÀýÈç¶¨ÖÆµÄ¶Ë¿ÚɨÃ蹤¾ß¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬MagicRATµÄC2»ù´¡ÉèÊ©»¹ÓÃÓÚÍйÜLazarusÖ²Èë³ÌÐòµÄ±äÌ壬£¬£¬£¬£¬£¬ÈçTigerRAT¡£¡£¡£¡£ÔÚÒ°Íâ·¢Ã÷µÄMagicRATÅú×¢LazarusÓÐÄîÍ·¿ìËÙ¹¹½¨ÐµÄ×Ô½ç˵¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÓÃÓÚÓëÆä֮ǰµÄ¶ñÒâÈí¼þ£¨ÈçTigerRAT£©Ò»ÆðʹÓ㬣¬£¬£¬£¬£¬À´¹¥»÷È«ÇòµÄ×éÖ¯¡£¡£¡£¡£


https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html


5¡¢¹È¸è³ÆContiǰ³ÉÔ±½«ÆäÊÖÒÕÖØÐÂÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼µÄ»î¶¯

      

¹È¸èTAGÔÚ9ÔÂ7ÈÕ¹ûÕæÁË2022Äê4ÔÂÖÁ8ÔÂʱ´ú¿ªÕ¹µÄ5¸öÓëUAC-0098Ïà¹ØµÄ»î¶¯µÄϸ½Ú¡£¡£¡£¡£UAC-0098ÊÇÒ»¸ö³õʼ»á¼ûÊðÀí£¬£¬£¬£¬£¬£¬Ê¹ÓÃIcedIDΪÀÕË÷ÍÅ»ïÌṩ¶ÔÆóҵϵͳµÄ»á¼û¡£¡£¡£¡£TAGÍÆ¶ÏUAC-0098µÄһЩ³ÉÔ±ÊÇContiÍÅ»ïµÄǰ³ÉÔ±£¬£¬£¬£¬£¬£¬ËûÃǽ«ÆäÊÖÒÕÖØÐÂÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼µÄ¹¥»÷»î¶¯¡£¡£¡£¡£2022Äê4ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÈö²¥AnchorMail£¨±»³ÆÎª¡°LackeyBuilder¡±£©µÄ´¹Âڻ£¬£¬£¬£¬£¬£¬Ö®ºó×îÏȸú×ÙUAC-0098¡£¡£¡£¡£ÔÚºóÐøµÄ»î¶¯ÖУ¬£¬£¬£¬£¬£¬UAC-0098»¹¹¥»÷ÁËÎÚ¿ËÀ¼×éÖ¯ºÍÅ·ÖÞ·ÇÕþ¸®×éÖ¯¡£¡£¡£¡£


https://blog.google/threat-analysis-group/initial-access-broker-repurposing-techniques-in-targeted-attacks-against-ukraine/


6¡¢KasperskyÐû²¼2022ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ¸ÅÊö

      

9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2022ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ¸ÅÊö¡£¡£¡£¡£2021Äê1ÔÂÖÁ2022Äê6ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Óöµ½ÓëÓÎÏ·ÓйصĶñÒâÈí¼þºÍÀ¬»øÈí¼þµÄÓû§×ÜÊýΪ384224ÈË£»£»£» £» £»£»ÓëMinecraftÏà¹ØµÄÎļþԼռͨ¹ýÓÎÏ·ÀÄÓÃÈö²¥µÄ¶ñÒâÎļþµÄ25%£¬£¬£¬£¬£¬£¬Æä´ÎÊÇFIFA(11%)¡¢Roblox(9.5%)¡¢Far Cry(9.4%£©ºÍʹÃüÕÙ»½£¨9%£©¡£¡£¡£¡£2022ÄêÉϰëÄ꣬£¬£¬£¬£¬£¬±»ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¹¥»÷µÄÓû§ÊýÄ¿ÏÔ×ÅÔöÌí£¬£¬£¬£¬£¬£¬±È2021ÄêÉϰëÄêÔöÌíÁË13%£»£»£» £» £»£»¹¥»÷Õß¼Ó´óÁË·Ö·¢Trojan-PSWµÄÁ¦¶È£¬£¬£¬£¬£¬£¬77%µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄѬȾ°¸ÀýÓëTrojan-PSWÓйØ¡£¡£¡£¡£


https://securelist.com/gaming-related-cyberthreats-2021-2022/107346/