ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-04-25

1¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷£¬£¬Ó°ÏìÁËÆäµç×ÓÓʼþЧÀÍÆ÷ºÍ²¿·Öϵͳ¡£¡£¹¥»÷±¬·¢ÔÚ4ÔÂ12ÈÕÇåÔ磬£¬¸ÃÔì´¬³§Í¸Â¶£¬£¬¹¥»÷Õë¶ÔµÄЧÀÍÆ÷Ö÷ÒªÓÃÓÚÉúÑÄÏòÆäÅÌËã»úÊý¿ØÖÆÔì×°±¸ÌṩָÁîµÄÊý¾Ý£¬£¬µ¼ÖÂËüÃÇå´»úÊýÌì¡£¡£ÏÖÔÚûÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬FMGÒѽÓÄɲ½·¥¾ÙÐÐÏìÓ¦£¬£¬Ë®Ê¦ÕýÔÚÆð¾¢¼àÊÓÕâЩÊÂÇé¡£¡£


https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/


2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ


¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢±¤ÀÝÖ®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ£¬£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ£¬£¬Éù³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍ×÷±×Æ÷µÈ¡£¡£ËüÃÇ»á¼ÓÔØÎ±×°³ÉFortniteÒ³ÃæµÄ´¹ÂÚÍøÒ³£¬£¬»òÔÊÐíÌṩÀñÎ│µÄÐéαµÄÊӲ졣¡£±ðµÄ£¬£¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖÝÕþ¸®µÄÒ»¸öСÐÍÍøÕ¾£¬£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£¡£


https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/


3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢Ã÷еÄDecoy Dog


InfobloxÓÚ4ÔÂ20Èճƣ¬£¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó£¬£¬·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¡£¸Ã¹¤¾ßÖ¼ÔÚ×ÊÖú¹¥»÷Õßͨ¹ýÕ½ÂÔÐÔµÄÓòÃûÀÏ»¯ºÍDNSÅÌÎÊÔËÔØÀ´Èƹý¼ì²â£¬£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«ÎªÓÐÊý¡£¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄÊӲ췢Ã÷Á˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò£¬£¬ËüÃǵĴ󲿷ÖͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£¡£ÕâЩÓòÃûµÄDNSËíµÀ¾ßÓÐÖ¸ÏòPupy RATµÄÌØÕ÷£¬£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü°²ÅŵÄÔ¶³Ì»á¼ûľÂí¡£¡£


https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/


4¡¢AquaÅû¶ʹÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯


AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯£¬£¬Ê¹ÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ(RBAC)½¨ÉèºóÃŲ¢ÔËÐп󹤡£¡£Í¨¹ýʹÓÃRBACʵÑé¶ñÒâ»á¼û¿ØÖÆÕ½ÂÔ£¬£¬×ÝÈ»Ìṩ³õʼ»á¼ûµÄ¹ýʧÉèÖÃÔÚδÀ´»ñµÃÐÞ¸´£¬£¬¹¥»÷ÕßÒ²¿ÉÒÔÔÚ±»Ñ¬È¾µÄ¼¯ÈºÉÏÒ»Á¬±£´æ¡£¡£¹¥»÷Á´Ê¹ÓÃÉèÖùýʧµÄAPIЧÀÍÆ÷¾ÙÐгõʼ»á¼û£¬£¬È»ºó·¢ËÍHTTPÇëÇóÒÔÁгöÉñÃØ£¬£¬²¢·¢³öAPIÇëÇóÒÔͨ¹ýÁгöÃüÃû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£¡£±ðµÄ£¬£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´½ÓÊܺÍÐ®ÖÆ±»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£¡£


https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters


5¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯


4ÔÂ20ÈÕ£¬£¬SecureWorksÅû¶ÁËʹÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÏÂÔØÒ³Ãæ£¬£¬Ëü½¨ÉèÓÚ2ÔÂ16ÈÕ£¬£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°ÖóÌÐòcisco-anyconnect-4_9_0195.msi£¬£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£¡£±ðµÄ£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËü¾ßÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü£¬£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1£¬£¬ChatGPT.msiºÍchch.ps1£¬£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£¡£


https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads


6¡¢HuntressÐû²¼PaperCutÎó²îʹÓûµÄÆÊÎö±¨¸æ


4ÔÂ21ÈÕ£¬£¬HuntressÐû²¼±¨¸æ£¬£¬³ÆÆä·¢Ã÷ÁËʹÓÃPaperCut MF/NGÎó²îµÄ»î¶¯¡£¡£ÕâÁ½¸öÎó²î£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ñ¬È¾µÄPaperCutЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£Ñо¿Ö°Ô±·¢Ã÷´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellÏÂÁ£¬ÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ£¬£¬ÒÔ±ãÔÚÄ¿µÄÖ÷»úÒ»Á¬»á¼ûºÍÖ´ÐдúÂë¡£¡ £»£»£»£»ù´¡ÉèÊ©ÆÊÎö·¢Ã÷£¬£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á£¬£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ£¬£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйØ¡£¡£


https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software