Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
Ðû²¼Ê±¼ä 2023-08-031¡¢Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
KasperskyÔÚ7ÔÂ31Èճƣ¬£¬£¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚʹÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯£¬£¬£¬Ö¼ÔÚ´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²î±ðµÄÖ²Èë³ÌÐò£¬£¬£¬Ã¿¸öÖ²Èë³ÌÐò¶¼ÓÃÓÚ²î±ðµÄ¹¥»÷½×¶Î¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·ݣ¬£¬£¬Éæ¼°Èý¸ö²î±ðµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²Èë³ÌÐò½¨Éè¶ÔÄ¿µÄϵͳµÄ³¤ÆÚÐÔºÍÔ¶³Ì»á¼û£¬£¬£¬²¢ÍøÂçÕì̽Êý¾Ý£»£»£»£»£»µÚ¶þ½×¶Î£¬£¬£¬APT31»á×°ÖøüרҵµÄ¶ñÒâÈí¼þ£¬£¬£¬À´Ê¹ÓÃUSBÈö²¥´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý£»£»£»£»£»×îºóµÄµÚÈý½×¶Î£¬£¬£¬ºÚ¿ÍʹÓÃÖ²Èë³ÌÐò½«ÍøÂçµ½µÄÊý¾ÝÉÏ´«µ½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£
https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/
2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷Ô޳ɽ»45ÍòÃÀÔªÊê½ð
¾Ý8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬¸ÃÕòµÄ°ü¹Ü¹«Ë¾Óë¹¥»÷ÕßÐÉ̸濢ÁË45ÍòÃÀÔªµÄÏ¢ÕùÐÒé¡£¡£¡£¡£¡£¡£ÔÝʱÕò³¤Hartnett³Æ£¬£¬£¬ÏÖÔÚ¹¥»÷ÒѾ»ñµÃÏàʶ¾ö£¬£¬£¬¶Ô¸ÃÕòÓªÒµºÍÔËÓªÖÁ¹ØÖ÷ÒªµÄÊý¾ÝÒ²Òѻָ´¡£¡£¡£¡£¡£¡£¿ÉÊÇһЩÊôÓÚСÎÒ˽¼ÒÓû§µÄÊý¾Ý£¬£¬£¬ºÍÉæ¼°Îª¸ÃÕòЧÀͲ¢´æ´¢ÒÑÍù¼Í¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£¡£¡£¡£¡£¡£ÕâЩɥʧµÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÕæ¹«¹²¼Í¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/
3¡¢Cofense³Æ½üÆÚʹÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿Ôö¶à
CofenseÓÚ8ÔÂ1ÈÕ͸¶£¬£¬£¬Ê¹ÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£Google AMPÊÇÓÉGoogleÓë30¸öÏàÖúͬ°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü£¬£¬£¬Ö¼ÔÚÌá¸ßÒÆ¶¯×°±¸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙÂÊ¡£¡£¡£¡£¡£¡£ÕâÖÖеĴ¹ÂÚÕ½ÂÔ½«AMP URLǶÈë´¹ÂÚÓʼþÖУ¬£¬£¬ÕâЩ¶ñÒâURLÓÚ5Ô·Ý×îÏÈ·ºÆð£¬£¬£¬ÏÖÔÚÈÔÔÚÈö²¥£¬£¬£¬Ö¼ÔÚÇÔȡԱ¹¤µÇ¼ƾ֤¡£¡£¡£¡£¡£¡£´ËÀà»î¶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷»î¶¯ºÜÊÇÒþ²Ø£¬£¬£¬²»µ«Ê¹ÓÃÁËGoogle AMP URL£¬£¬£¬»¹Á¬ÏµÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÇå¾²»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£
https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/
4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûÕæÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â
¾Ý7ÔÂ31ÈÕ±¨µÀ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪUsNsAµÄºÚ¿Í¹ûÕæÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â£¬£¬£¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É£¬£¬£¬×ܾÞϸԼΪ1.8 GB£¬£¬£¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ£¬£¬£¬°üÀ¨Ñо¿ÂÛÎĵȡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬¹¥»÷ÕßʹÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢ÈëÎó²îÀ´»ñµÃδ¾ÊÚȨµÄ»á¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â£¬£¬£¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£¡£¡£¡£¡£¡£
https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum
5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½·¨Collide+PowerÓ°ÏìÏÕЩËùÓÐCPU
¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½·¨£¬£¬£¬Ó°ÏìÁËÏÕЩËùÓÐCPU£¬£¬£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ÆäÖ÷Òª¿´·¨ÊÇ£¬£¬£¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦ÓóÌÐò·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖб¬·¢Êý¾Ý¡°³åÍ»¡±²¢ÁýÕÖǰÕßʱ£¬£¬£¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2023-20583£¬£¬£¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£¸ÃÎó²î¾ßÓÐÑо¿ÒâÒ壬£¬£¬µ«Ê¹ÓÃÆðÀ´½ÏÁ¿ÄÑÌ⣬£¬£¬Òò´ËÑÏÖØË®Æ½½ÏµÍ¡£¡£¡£¡£¡£¡£ÖÁÓÚ»º½â²½·¥£¬£¬£¬ÐèÒªÖØÐÂÉè¼ÆCPU£¬£¬£¬ÒÔÊǸüÏÖʵµÄ»º½â²½·¥ÊDZÜÃâ¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźš£¡£¡£¡£¡£¡£
https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/
6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ1ÈÕ£¬£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»¸öеĴ¹Âڻ£¬£¬£¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2022Äê12ÔÂ×óÓÒ×îÏÈ£¬£¬£¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer£¬£¬£¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄ»î¶¯Éæ¼°Á½¸ö±äÌ壬£¬£¬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§£¬£¬£¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±Ò×ʽðµÈ£»£»£»£»£»µÚ¶þ¸öÖ§³ÖÌØÊ⹦Ч£¬£¬£¬ÀýÈçÆÊÎöOutlookÓʼþ¡¢Í¨¹ýTelegram¾ÙÐÐÊý¾Ýй¶¡¢Ð®ÖÆFacebookÕË»§ºÍ·´ÆÊÎöµÈ¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/