Bling LibraÕ½ÂÔת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷

Ðû²¼Ê±¼ä 2024-08-29
1. Bling LibraÕ½ÂÔת±ä£º´ÓÊý¾Ý͵ÇÔµ½ÔÆÀÕË÷


8ÔÂ27ÈÕ£¬£¬ £¬£¬£¬Unit 42ÍøÂçÇå¾²ÍŶÓÕ¹ÏÖ£¬£¬ £¬£¬£¬ÎÛÃûÕÑÖøµÄBling LibraÍþв×éÖ¯ÒÑÏÔÖø×ª±äÆäÕ½ÂÔ£¬£¬ £¬£¬£¬´ÓÒÔÍùͨ¹ýµØÏÂÊг¡ÏúÊÛÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬×ª±äΪÕë¶ÔÔÆÇéÐÎʵÑéÀÕË÷¹¥»÷¡£¡£¡£¡£¡£Õâһת±äÓÈΪÁîÈ˵£ÐÄ£¬£¬ £¬£¬£¬ÓÉÓÚBling LibraÒÑÀÖ³ÉʹÓÃAWSƾ֤ÈëÇÖ¶à¼ÒÆóÒµµÄÔÆÕË»§£¬£¬ £¬£¬£¬ÌØÊâÊÇͨ¹ýAmazon S3×ÊÔ´¡£¡£¡£¡£¡£ËûÃÇÈ«ÐIJ߻®µÄÈëÇÖÐж¯£¬£¬ £¬£¬£¬°üÀ¨Ï꾡µÄÊý¾Ý̽Ë÷ºÍÒþ²ØµÄ»î¶¯×·×Ù£¬£¬ £¬£¬£¬Ê¹µÃ¹¥»÷³õÆÚÄÑÒÔ±»²ì¾õ¡£¡£¡£¡£¡£Ê¹ÓÃS3ä¯ÀÀÆ÷ºÍWinSCPµÈ¹¤¾ß£¬£¬ £¬£¬£¬Bling Libra²»µ«»æÖÆÁËÊܺ¦ÕߵĴ洢Ͱ½á¹¹£¬£¬ £¬£¬£¬»¹É¾³ýÁËÒªº¦Êý¾Ý£¬£¬ £¬£¬£¬½øÒ»²½¼Ó¾çÁËËðʧ¡£¡£¡£¡£¡£ÓúÉõÕߣ¬£¬ £¬£¬£¬ÔÚÍê³ÉÆÆËðºó£¬£¬ £¬£¬£¬¸Ã×éÖ¯½¨ÉèÁ˼¥Ð¦ÐÔµÄÐÂS3´æ´¢Í°£¬£¬ £¬£¬£¬²¢ÌᳫÀÕË÷Óʼþ£¬£¬ £¬£¬£¬ÒªÇóÖ§¸¶Êê½ðÒÔ»Ö¸´Êý¾ÝºÍ×èÖ¹¹¥»÷¡£¡£¡£¡£¡£Unit 42µÄ±¨¸æÉîÈëÆÊÎöÁËÕâЩ¹¤¾ßµÄʹÓ÷½·¨£¬£¬ £¬£¬£¬Îª·ÀÓùÕßÌṩÁËʶ±ð¶ñÒâ»î¶¯µÄÏßË÷¡£¡£¡£¡£¡£¼øÓÚÔÆÐ§ÀÍµÄÆÕ¼°£¬£¬ £¬£¬£¬±¨¸æÇ¿µ÷×éÖ¯Ó¦½ÓÄÉ×îÐ¡ÌØÈ¨Ô­ÔòºÍÇ¿»¯Çå¾²²½·¥£¬£¬ £¬£¬£¬ÈçʹÓÃIAM»á¼ûÆÊÎöºÍAWSЧÀÍ¿ØÖÆÕ½ÂÔ£¬£¬ £¬£¬£¬ÒÔÓÐÓõÖÓù´ËÀà¸ß¼¶Íþв¡£¡£¡£¡£¡£


https://securityonline.info/bling-libras-tactical-evolution-exploiting-cloud-misconfigurations-for-extortion/


2. Poortry¹¤¾ß¼¯½ø»¯£º´ÓEDRɱÊÖµ½ÖÜÈ«²Á³ýÕß


8ÔÂ27ÈÕ£¬£¬ £¬£¬£¬Sophos X-Ops×îб¨¸æÕ¹ÏÖÁ˶ñÒ⹤¾ß¼¯PoortryµÄ×îÐÂÏ£Íû£¬£¬ £¬£¬£¬¸Ã¹¤¾ßÖ¼ÔÚÕë¶ÔWindowsϵͳÉϵĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Èí¼þÌᳫ¹¥»÷¡£¡£¡£¡£¡£×Ô2022Äê±»Mandiant·¢Ã÷ÒÔÀ´£¬£¬ £¬£¬£¬Poortryͨ¹ýÆä¼ÓÔØ³ÌÐò¡°Stonestop¡±³ÉΪ¶à¸öÀÕË÷Èí¼þ×éÖ¯µÄÒªº¦¹¤¾ß£¬£¬ £¬£¬£¬Ò»Ö±½ø»¯ÒÔÌӱܼì²â¡£¡£¡£¡£¡£×îа汾µÄPoortry²»µ«ÏÞÓÚ½ûÓÃEDRÈí¼þ£¬£¬ £¬£¬£¬¸üÄÜ´Ó´ÅÅÌÖг¹µ×ɨ³ýÇå¾²Èí¼þµÄÒªº¦×é¼þ£¬£¬ £¬£¬£¬´Ó¶øÎªÆä±³ºóµÄÀÕË÷Èí¼þ¹¥»÷ɨÇåõè¾¶¡£¡£¡£¡£¡£PoortryµÄ½¹µãÕ½ÂÔÊÇʹÓÃWindowsÄÚºËģʽÇý¶¯³ÌÐòµÄÆÕ±éȨÏÞ£¬£¬ £¬£¬£¬Í¨¹ýɨ³ý¹Ò¹³ºÍÖÕÖ¹±£»£» £»£»£»£»¤Àú³ÌÀ´ÈƹýÇå¾²»úÖÆ¡£¡£¡£¡£¡£Æä¿ª·¢ÕßʹÓöàÖÖÒªÁìÈÆ¹ý´úÂëÊðÃûÑéÖ¤£¬£¬ £¬£¬£¬°üÀ¨ÀÄÓÃй¶µÄÖ¤Ê顢αÔìʱ¼ä´ÁÒÔ¼°ÊµÑéÖ±½Óͨ¹ýMicrosoftµÄWHQL֤ʵÊðÃûÊ¿³Ì»ñÈ¡Õýµ±Ö¤Êé¡£¡£¡£¡£¡£Ö»¹ÜÃæÁÙ΢ÈíºÍSophosµÄÆØ¹âÓë·â¶Â£¬£¬ £¬£¬£¬PoortryÒÀȻͨ¹ýÎÞаµ÷½âÕ½ÂÔ¼á³Ö»îÔ¾¡£¡£¡£¡£¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬£¬ £¬£¬£¬PoortryÔÚ2024Äê7ÔµÄÒ»´ÎÊÂÎñÖÐÊ×´ÎչʾÁËÆäɾ³ýEDR×é¼þµÄÐÂÄÜÁ¦£¬£¬ £¬£¬£¬ÕâÏÔÖøÔöÌíÁË×éÖ¯ÃæÁÙµÄΣº¦¡£¡£¡£¡£¡£


https://securityonline.info/poortry-edr-killer-evolves-now-wipes-security-software-from-windows-systems/


3. Park'N FlyÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬°ÙÍò¿Í»§Êý¾Ýй¶


8ÔÂ27ÈÕ£¬£¬ £¬£¬£¬Park'N FlyÊǼÓÄôó×ÅÃû»ú³¡ÍâÍ£³µÐ§ÀÍÌṩÉÌ£¬£¬ £¬£¬£¬½üÆÚÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Ô¼100Íò¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»ºÚ¿Í²»·¨»ñÈ¡¡£¡£¡£¡£¡£ÍþвÕßʹÓÃÇÔÈ¡µÄVPNƾ֤£¬£¬ £¬£¬£¬ÔÚ7ÔÂÖÐÑ®ÇÖÈë¹«Ë¾ÍøÂ磬£¬ £¬£¬£¬²¢ÔÚ7ÔÂ11ÈÕÖÁ13ÈÕʱ´úʵÑéÁËδÊÚȨ»á¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§È«Ãû¡¢µç×ÓÓʼþ¡¢×¡Ö·¡¢º½°àºÅ¼°Ãñº½¾ÖºÅÂ룬£¬ £¬£¬£¬µ«ÐÒÔ˵ÄÊÇ£¬£¬ £¬£¬£¬²ÆÎñºÍÖ§¸¶¿¨ÐÅϢδ±»²¨¼°¡£¡£¡£¡£¡£Park'N FlyѸËÙ½ÓÄÉÐж¯£¬£¬ £¬£¬£¬ÎåÌìÄÚ»Ö¸´ÁËÊÜÓ°ÏìµÄϵͳ£¬£¬ £¬£¬£¬²¢ÔöÇ¿ÁËÇå¾²²½·¥ÒÔ±ÜÃâδÀ´ÀàËÆÊÂÎñµÄ±¬·¢¡£¡£¡£¡£¡£¹«Ë¾CEO¿¨ÂÞ¡¤ÂíÀ×ÂåÏò¿Í»§¼°ÏàÖúͬ°éÖÂǸ£¬£¬ £¬£¬£¬²¢ÔÊÐí½«È«Á¦±£»£» £»£»£»£»¤Óû§ÐÅÏ¢¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¿Í»§ÔÚÉ罻ýÌåÉϱí´ïÁ˶ÔÊý¾Ýй¶µÄµ£ÐÄ£¬£¬ £¬£¬£¬²¢¶Ô¹«Ë¾Êý¾Ý±£´æÕþ²ßÌá³öÖÊÒÉ¡£¡£¡£¡£¡£Park'N FlyÌáÐÑËùÓÐÊÜÓ°ÏìµÄ¿Í»§¼á³Ö¸ß¶ÈСÐÄ£¬£¬ £¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/parkn-fly-notifies-1-million-customers-of-data-breach/


4. ʹÓÃAtlassian ConfluenceÎó²îCVE-2023-22527¾ÙÐмÓÃÜÐ®ÖÆ


8ÔÂ28ÈÕ£¬£¬ £¬£¬£¬Trend Micro Ñо¿Ö°Ô±Õ¹ÏÖÁËÕë¶Ô Atlassian Confluence Êý¾ÝÖÐÐĺÍЧÀÍÆ÷°æ±¾µÄÑÏÖØÎó²î£¨CVE-2023-22527£©µÄÆÕ±é¼ÓÃÜÐ®ÖÆ»î¶¯¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2024Äê1ÔÂ16ÈÕÓÉAtlassian¹ûÕæ£¬£¬ £¬£¬£¬ÆäCVSSÆÀ·ÖΪÂú·Ö10£¬£¬ £¬£¬£¬Åú×¢Æä¼«¸ßΣº¦ÐÔ¡£¡£¡£¡£¡£¸ÃÎó²îͨ¹ýÄ£°å×¢Èë»úÖÆ£¬£¬ £¬£¬£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂ룬£¬ £¬£¬£¬¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£×Ô2024Äê6ÔÂÖÐÑ®Æð£¬£¬ £¬£¬£¬Ê¹ÓôËÎó²îµÄ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¼±¾çÔöÌí£¬£¬ £¬£¬£¬Ö÷ÒªÓÉÈý¸öÍþвÐÐΪÕßÖ÷µ¼£¬£¬ £¬£¬£¬ËûÃǽÓÄɲî±ðÕ½ÂÔ°²ÅÅXMRigÍÚ¿ó»ú£¬£¬ £¬£¬£¬µÁÓÃÅÌËã×ÊÔ´ÒÔIJÀû¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÐÐΪÕßÖ±½ÓʹÓÃELFÎļþ¸ºÔذ²ÅÅÍÚ¿ó»ú£¬£¬ £¬£¬£¬¶øÁíÒ»ÐÐΪÕßÔò½ÓÄÉÖØ´óÊֶΣ¬£¬ £¬£¬£¬Í¨¹ýSSH¾ç±¾ÉøÍ¸ÏµÍ³£¬£¬ £¬£¬£¬É¨³ý¾ºÕùÍÚ¿óÀú³Ì£¬£¬ £¬£¬£¬½ûÓÃÔÆÇ徲ЧÀÍ£¬£¬ £¬£¬£¬²¢ÍøÂçÃô¸ÐÐÅÏ¢ÒÔÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£ÕâЩÐÐΪÕß»¹Í¨¹ý½¨Éè¶à¸öcron×÷ÒµÀ´Î¬³Ö¶ÔÊÜѬȾЧÀÍÆ÷µÄ¿ØÖÆ£¬£¬ £¬£¬£¬È·±£ÍÚ¿ó»î¶¯Ò»Á¬¾ÙÐУ¬£¬ £¬£¬£¬²¢Ïû³ýDZÔÚµÄÇå¾²Õϰ­¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÍþв£¬£¬ £¬£¬£¬ÖÎÀíÔ±Ó¦Á¬Ã¦¸üÐÂConfluenceÖÁ×îа汾£¬£¬ £¬£¬£¬²¢Ç¿»¯Çå¾²²½·¥¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html


5. BlackByte ÀÕË÷Èí¼þй¥ÊÆ£ºÊ¹ÓÃVMware ESXiÎó²îÓëVPN»á¼û


8ÔÂ29ÈÕ£¬£¬ £¬£¬£¬BlackByte ÀÕË÷Èí¼þ×éÖ¯Õý½èÖúз¢Ã÷µÄ VMware ESXi Îó²î¼°VPN»á¼û;¾¶£¬£¬ £¬£¬£¬¶ÔÈ«ÇòÆóÒµÌᳫÐÂÒ»ÂÖÇ¿ÁÒ¹¥»÷¡£¡£¡£¡£¡£Ë¼¿ÆTalos ÍÅ¶Ó½ÒÆÆÁËÆä¹¥»÷Õ½ÂÔ£¬£¬ £¬£¬£¬BlackByte ²»µ«Ê¹ÓÃCVE-2024-37085Îó²îÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬ £¬£¬£¬»¹Í¨¹ýVPNµÈÔ¶³Ì»áÊ¶È¤ÖÆÒþÃØÉøÍ¸£¬£¬ £¬£¬£¬ÒԵͿɼûÐÔ·½·¨À©´óѬȾ¹æÄ£¡£¡£¡£¡£¡£¸Ã×éÖ¯»¹ÉÆÓÚʹÓÃÇÔÈ¡µÄActive Directoryƾ֤×ÔÎÒÈö²¥£¬£¬ £¬£¬£¬¼Ó¾çÁËÆäÆÆËðÁ¦¡£¡£¡£¡£¡£Ö»¹ÜÆä¹ûÕæÊý¾ÝÐ¹Â¶ÍøÕ¾½öչʾ²¿·Ö¹¥»÷°¸Àý£¬£¬ £¬£¬£¬µ«Talos Ñо¿ÏÔʾ×Åʵ¼Ê»î¶¯Ô¶³¬Ô¤ÆÚ¡£¡£¡£¡£¡£ÖÆÔìÒµ¡¢ÔËÊä/²Ö´¢¡¢×¨ÒµÐ§ÀÍ¡¢ÐÅÏ¢ÊÖÒÕ¼°¹«¹²ÐÐÕþ³ÉΪÆäÖØµã¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÍþв£¬£¬ £¬£¬£¬×éÖ¯Ðè½ôÆÈÐÞ²¹VMware ESXiµÈϵͳ£¬£¬ £¬£¬£¬ÊµÑéMFA£¬£¬ £¬£¬£¬ÉóºËVPNÉèÖ㬣¬ £¬£¬£¬²¢ÏÞÖÆÒªº¦ÍøÂç»á¼û¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬½ûÓûòÏÞÖÆNTLMʹÓ㬣¬ £¬£¬£¬°²ÅŸßЧµÄ¶Ëµã¼ì²âºÍÏìӦϵͳ£¬£¬ £¬£¬£¬²¢¹¹½¨ÖÜÈ«µÄÇå¾²Õ½ÂÔ£¬£¬ £¬£¬£¬ÈÚºÏ×Ô¶¯ÍþвÇ鱨ÓëÊÂÎñÏìÓ¦ÄÜÁ¦£¬£¬ £¬£¬£¬ÒÔÖÜÈ«µÖÓùBlackByteµÈÀÕË÷Èí¼þµÄË𺦡£¡£¡£¡£¡£


https://hackread.com/blackbyte-ransomware-vmware-flaw-vpn-based-attacks/


6. ÒÁÀÊAPT33ʹÓÃTickler¶ñÒâÈí¼þ¹¥»÷ÃÀ¹úÕþ¸®ºÍ¹ú·ÀµÈ»ú¹¹


8ÔÂ28ÈÕ£¬£¬ £¬£¬£¬ÒÁÀʺڿÍ×éÖ¯APT33£¬£¬ £¬£¬£¬ÓÖÃûPeach SandstormºÍRefined Kitten£¬£¬ £¬£¬£¬½üÄêÀ´ÆµÈÔ·¢¶¯ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬Æä×îÐÂÊÖ¶ÎÉæ¼°Ê¹ÓÃÐÂÐÍTickler¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬ÖصãÕë¶ÔÃÀ¹úºÍ°¢ÁªÇõµÄÕþ¸®¡¢¹ú·À¡¢ÎÀÐÇ¡¢Ê¯Óͼ°×ÔÈ»Æø²¿·ÖµÄ×éÖ¯¡£¡£¡£¡£¡£2024Äê4ÔÂÖÁ7Լ䣬£¬ £¬£¬£¬¸Ã×é֯ͨ¹ýMicrosoft Azure»ù´¡ÉèʩʵÑéÏÂÁîÓë¿ØÖÆ£¨C2£©£¬£¬ £¬£¬£¬Ê¹ÓÃڲƭÐÔAzure¶©ÔľÙÐÐÇé±¨ÍøÂç¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬APT33ÒÑÀÖ³ÉʹÓÃÃÜÂëÅçÈ÷¹¥»÷ÇÖÈë¹ú·À¡¢º½Ìì¡¢½ÌÓý¼°Õþ¸®²¿·Ö£¬£¬ £¬£¬£¬ÓÈÆäÊÇͨ¹ý½ÌÓýÐÐÒµµÁÓÃÕË»§À´»ñÈ¡Azure×ÊÔ´¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬APT33ÔÚ2023Ä껹½ÓÄÉÀàËÆÕ½ÂÔ£¬£¬ £¬£¬£¬Ê¹ÓÃFalseFontºóÃŶñÒâÈí¼þ¹¥»÷È«Çò¹ú·À³Ð°üÉÌ¡£¡£¡£¡£¡£Î¢Èí¶Ô´ËÀ๥»÷¼á³Ö¸ß¶ÈСÐÄ£¬£¬ £¬£¬£¬Ö¸³öAPT33×Ô2023Äê2ÔÂÒÔÀ´£¬£¬ £¬£¬£¬ÒѶÔÈ«ÇòÊýǧ¸ö×éÖ¯¾ÙÐÐÁË´ó¹æÄ£ÃÜÂëÅçÈ÷¹¥»÷£¬£¬ £¬£¬£¬ÍþвÁìÓò½øÒ»²½À©Õ¹µ½ÖÆÒ©Òµ¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬£¬ £¬£¬£¬Î¢ÈíÐû²¼×Ô10ÔÂ15ÈÕÆð£¬£¬ £¬£¬£¬ËùÓÐAzureµÇ¼ʵÑé¾ùÐèͨ¹ý¶àÖØÉí·ÝÑéÖ¤£¨MFA£©£¬£¬ £¬£¬£¬Ö¼ÔÚÏÔÖøÔöÇ¿ÕË»§Çå¾²ÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/APT33-Iranian-hacking-group-uses-new-tickler-malware-to-backdoor-us-govt-defense-orgs/