È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-02

1. È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷


9ÔÂ1ÈÕ£¬£¬ £¬Proofpoint Ñо¿Ö°Ô±½ÒÆÆÁËÒ»ÆðÖØ´óµÄÌØ¹¤»î¶¯£¬£¬ £¬¸Ã»î¶¯Í¨¹ýÃûΪ¡°Voldemort¡±µÄ¶¨ÖƶñÒâÈí¼þ£¬£¬ £¬Ó°ÏìÈ«Çò70¶à¸ö×éÖ¯¡£¡£ ¡£´Ë¶ñÒâÈí¼þͨ¹ýÁè¼Ý20,000·â´¹ÂÚÓʼþÈö²¥£¬£¬ £¬ÌØÊâÊÇ8ÔÂ17ÈÕ¼¤Ôö½ü6,000·â£¬£¬ £¬Óʼþαװ¶à¹ú˰Îñ»ú¹ØÓÕÆ­Óû§¡£¡£ ¡£¹¥»÷Á´Ê¹ÓÃGoogle AMP Cache URL¡¢CloudflareËíµÀ¡¢WebDAV¹²Ïí¼°Python¾ç±¾µÈÊÖÒÕ£¬£¬ £¬ÇÉÃîÖ¸µ¼Óû§ÏÂÔØ²¢Ö´ÐжñÒâLNK»òZIPÎļþ¡£¡£ ¡£VoldemortµÄÒ»´óÌØµãÊÇʹÓÃGoogle±í¸ñ¾ÙÐÐÏÂÁîÓë¿ØÖÆ£¨C2£©£¬£¬ £¬¹æ±Ü¹Å°åÇå¾²¼ì²â£¬£¬ £¬ÏÔʾÁ˸߶ȵÄÒþ²ØÐÔºÍÁ¢ÒìÐÔ¡£¡£ ¡£ÆäÄ¿µÄÖ÷ÒªËø¶¨ÔÚ°ü¹Ü¹«Ë¾¡¢º½¿Õº½Ìì¡¢½»Í¨ÔËÊä¼°´óѧµÈ18¸ö±ÊÖ±ÐÐÒµ£¬£¬ £¬ÇÒ¾«×¼¶¨Î»Êܺ¦ÕßÖÁÆäÆÜÉí¹ú£¬£¬ £¬ÏÔʾ³öÉîÌõÀíµÄÌØ¹¤ÄîÍ·¡£¡£ ¡£±ðµÄ£¬£¬ £¬¸Ã¶ñÒâÈí¼þ»¹½ÓÄÉÓÐÊýµÄWindows .search-msÎļþÃûÌ㬣¬ £¬Î±×°Ô¶³ÌÎļþΪÍâµØÎļþ£¬£¬ £¬Á¬ÏµDLLÐ®ÖÆÊÖÒÕ£¬£¬ £¬½øÒ»²½ÔöÌíѬȾÀÖ³ÉÂÊ¡£¡£ ¡£È»¶ø£¬£¬ £¬¹¥»÷»î¶¯ÖÐҲ̻¶³öһЩ¼òª֮´¦£¬£¬ £¬ÈçʹÓüòÆÓµÄÎļþÃüÃûÔ¼¶¨£¬£¬ £¬Ê¹µÃ¸Ã»î¶¯·ºÆð³ö¡°¸¥À¼¿Ï˹̹ÊÓÑìºÏÌ塱µÄÌØµã£¬£¬ £¬ÄÑÒÔÅжÏÍþвÐÐΪÕßµÄÕæÊµÊÖÒÕˮƽ¡£¡£ ¡£


https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/


2. APT×éÖ¯Citrine SleetʹÓÃChrome 0day°²ÅÅFudModule rootkit


8ÔÂ31ÈÕ£¬£¬ £¬Ó볯ÏÊÓйØÁªµÄAPT×éÖ¯Citrine Sleet£¨Òà³ÆAppleJeus¡¢Labyrinth ChollimaµÈ£©Ê¹ÓÃÐÂÐÞ²¹µÄGoogle ChromeÁãÈÕÎó²îCVE-2024-7971£¬£¬ £¬Àֳɰ²ÅÅÁËFudModule rootkit¡£¡£ ¡£¸ÃÎó²î£¨CVSSÆÀ·Ö8.8£©Ó°ÏìÌØ¶¨°æ±¾µÄChromium£¬£¬ £¬ÔÊÐí¹¥»÷ÕßÔÚɳºÐ»¯µÄäÖȾÆ÷Àú³ÌÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£ ¡£Citrine Sleetͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÕ½ÂÔ£¬£¬ £¬ÓÕʹÊܺ¦Õß»á¼ûÆä¿ØÖƵĶñÒâÓòÃû£¬£¬ £¬½ø¶ø´¥·¢CVE-2024-7971Îó²î£¬£¬ £¬ÏÂÔØ²¢Ö´ÐаüÀ¨WindowsɳºÐÌÓÒÝÎó²î£¨CVE-2024-38106£©ºÍFudModule rootkitµÄshellcode¡£¡£ ¡£FudModule rootkit½ÓÄÉÖ±½ÓÄں˹¤¾ß²Ù×÷£¨DKOM£©ÊÖÒÕ£¬£¬ £¬´ÓÓû§Ä£Ê½ÔËÐв¢¸Ä¶¯Äںˣ¬£¬ £¬×ÌÈÅÇå¾²»úÖÆ£¬£¬ £¬Ö»¹ÜÔÚÄ¿µÄ×°±¸ÉÏδ¼ì²âµ½ºóÐø¶ñÒâ»î¶¯¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬CVE-2024-38106ËäÒÑÐÞ¸´£¬£¬ £¬µ«¿ÉÄÜÓëCitrine SleetµÄʹÓûÎÞÖ±½Ó¹ØÁª£¬£¬ £¬ÌåÏÖ¿ÉÄܱ£´æ¡°Îó²îÅöײ¡±Õ÷Ï󡣡£ ¡£MicrosoftÇ¿µ÷£¬£¬ £¬×é֯Ӧȷ±£ÏµÍ³ÊµÊ±¸üУ¬£¬ £¬°²Åž߱¸ÖÜÈ«ÍøÂç¹¥»÷Á´¿É¼ûÐÔµÄÇå¾²½â¾ö¼Æ»®£¬£¬ £¬²¢ÔöÇ¿²Ù×÷ÇéÐÎÉèÖ㬣¬ £¬ÒÔÓÐÓüì²âºÍ×èÖ¹´ËÀà¸ß¼¶Íþв¡£¡£ ¡£


https://securityaffairs.com/167848/breaking-news/north-korea-linked-apt-exploited-chrome-zero-day-cve-2024-7971.html


3. GitHub ÔâÀÄÓãºÊýǧÌõÐéαÐÞ¸´Ì¸ÂÛ·Ö·¢Lumma Stealer¶ñÒâÈí¼þ


8ÔÂ31ÈÕ£¬£¬ £¬GitHub ƽ̨½üÆÚÔâÓöÁËÀÄÓ㬣¬ £¬²»·¨·Ö×Óͨ¹ýÔÚÏîĿ̸ÂÛÖÐÐû²¼ÐéαÐÞ¸´³ÌÐòµÄ·½·¨£¬£¬ £¬ÆÕ±é·Ö·¢ Lumma Stealer ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£ ¡£ÕâÒ»»î¶¯×î³õÓÉteloxide rust¿âµÄТ˳ÕßÔÚRedditÉÏ½ÒÆÆ£¬£¬ £¬ËæºóBleepingComputerÉîÈëÊӲ췢Ã÷£¬£¬ £¬ÊýǧÌõÀàËÆÌ¸ÂÛÒѱ鲼GitHub¶à¸öÏîÄ¿£¬£¬ £¬ÓÕµ¼Óû§ÏÂÔØ²¢Ö´ÐаüÀ¨¶ñÒâÈí¼þµÄÎļþ¡£¡£ ¡£ÕâЩ̸ÂÛαװ³ÉÎÊÌâ½â¾ö¼Æ»®£¬£¬ £¬ÓÕÆ­Óû§´Ómediafire.com»òbit.lyÁ´½ÓÏÂÔØÃûΪ¡°fix.zip¡±µÄ¼ÓÃÜ´æµµ£¬£¬ £¬²¢ÌáÐÑʹÓÃͳһÃÜÂë¡°changeme¡±½âËø¡£¡£ ¡£ÈýÌìÄÚ£¬£¬ £¬´ËÀàÍÆ¹ã¶ñÒâÈí¼þµÄ̸ÂÛÊýÄ¿¼¤ÔöÖÁÁè¼Ý29,000Ìõ¡£¡£ ¡£ÏÂÔØµÄ´æµµÖаüÀ¨DLLÎļþºÍ¿ÉÖ´ÐÐÎļþx86_64-w64-ranlib.exe£¬£¬ £¬¾­ÆÊÎöÈ·ÒÔΪLumma Stealer£¬£¬ £¬Ò»ÖÖÄܹ»ÉîÈëÓû§ä¯ÀÀÆ÷ÇÔÈ¡Ãô¸ÐÐÅÏ¢µÄ¸ß¼¶ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£ ¡£±ðµÄ£¬£¬ £¬Ëü»¹Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üºÍÌØ¶¨ÃüÃûµÄÎı¾Îļþ¾ÙÐÐËÑË÷£¬£¬ £¬ÍøÂç¿ÉÄܰüÀ¨Ë½Ô¿ºÍÃÜÂëµÄÊý¾Ý¡£¡£ ¡£Ö»¹ÜGitHubѸËÙÏìÓ¦²¢É¾³ýÁËÕâЩ¶ñÒâ̸ÂÛ£¬£¬ £¬µ«ÒÑÓÐÓû§Êܺ¦¡£¡£ ¡£ÊÜÓ°ÏìÓû§ÐèÁ¬Ã¦ÎªËùÓÐÕË»§Ì滻ΨһÃÜÂ룬£¬ £¬²¢½«¼ÓÃÜÇ®±Ò×ªÒÆÖÁÐÂÇ®°ü¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-password-stealing-malware-masked-as-fixes/


4. ÖØ´óÍøÂç´¹ÂÚ¹¥»÷½ÒÆÆ£ºAsyncRATÓëInfostealerÁªÊÖÍþвÓû§Çå¾²


8ÔÂ31ÈÕ£¬£¬ £¬eSentire ÍþвÏìÓ¦²¿·Ö£¨TRU£©µÄÑо¿Ö°Ô±½ÒÆÆÁËÒ»ÏîÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬¸Ã¹¥»÷ʹÓÃÈ«ÐÄÉè¼ÆµÄѬȾÁ´·Ö·¢ AsyncRAT Ô¶³Ì»á¼ûľÂí£¨RAT£©¼°ÆäÐÅÏ¢ÇÔÈ¡²å¼þ Infostealer¡£¡£ ¡£¹¥»÷ʼÓÚÒ»·â¿´ËÆÎÞº¦µÄ´¹ÂÚÓʼþ£¬£¬ £¬ÄÚº¬Î±×°³ÉÕý³£ÎļþµÄ¶ñÒâ´æµµ¡£¡£ ¡£Ö´Ðк󣬣¬ £¬ÕâÒ»´æµµ´¥·¢ÁËһϵÁÐÖØ´ó²Ù×÷£¬£¬ £¬°üÀ¨ÏÂÔØ²¢Ö´ÐлìÏýµÄ VBScript ºÍ PowerShell ¾ç±¾£¬£¬ £¬×îÖÕ°²ÅÅ AsyncRAT ¼°Æä²å¼þ¡£¡£ ¡£¹¥»÷Àú³ÌÖУ¬£¬ £¬¶ñÒâÈí¼þͨ¹ýÏÂÔØ¿´ËÆÎÞº¦µÄͼÏñÎļþ£¨ÊµÎª ZIP ´æµµ£©²¢½âѹ³ö¸ü¶à¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ£¬£¬ £¬ÔÚÊܺ¦ÕßϵͳÖÐÔú¸ù¡£¡£ ¡£ËüʹÓÃÍýÏëʹÃüά³Ö³¤ÆÚÐÔ£¬£¬ £¬Ã¿Á½·ÖÖÓÖ´ÐÐÒ»´Î¶ñÒâ´úÂ룬£¬ £¬²¢Í¨¹ýÀú³Ì¿ÕÐÄ»¯ÊÖÒÕ½« AsyncRAT ×¢ÈëÕýµ±Àú³ÌÖÐÒÔÌӱܼì²â¡£¡£ ¡£AsyncRAT ²»µ«Îª¹¥»÷ÕßÌṩ¶ÔÊÜѬȾϵͳµÄÔ¶³Ì¿ØÖÆÈ¨£¬£¬ £¬»¹´îÔØÁË Infostealer ²å¼þ£¬£¬ £¬¸Ã²å¼þרÃÅÃé×¼ÍøÂçä¯ÀÀÆ÷ÖеļÓÃÜÇ®°üÀ©Õ¹ºÍ2FAÑéÖ¤¹¤¾ß£¬£¬ £¬Ö¼ÔÚÇÔÈ¡°üÀ¨ÃÜÂ롢ƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÔÚÄÚµÄÃû¹óÊý¾Ý¡£¡£ ¡£eSentire TRU ºôÓõÓû§¼á³Ö¸ß¶ÈСÐÄ¡£¡£ ¡£


https://securityonline.info/evasive-phishing-campaign-delivers-asyncrat-and-infostealer/


5. People Data Labs1.7ÒÚÌõÃô¸ÐÐÅÏ¢ÎÞÃÜÂë̻¶


8ÔÂ30ÈÕ£¬£¬ £¬CybernewsÑо¿ÍŶӽüÆÚ·¢Ã÷ÁËÒ»ÏîÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬Éæ¼°Áè¼Ý1.7ÒÚÌõÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚ»¥ÁªÍøÉϹûÕæÌ»Â¶£¬£¬ £¬Êý¾ÝÄÚÈÝÏ꾡£¬£¬ £¬°üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢µØµã¡¢½ÌÓýÅä¾°¼°ÊÂÇéÂÄÀúµÈ¡£¡£ ¡£´Ë´Îй¶µÄÊý¾Ý¼¯±êÓС°PDL¡±±êʶ£¬£¬ £¬Ö¸Ïò¾É½ðɽµÄÊý¾Ý¾­¼Í¹«Ë¾People Data Labs£¨PDL£©£¬£¬ £¬¸Ã¹«Ë¾×Ô³ÆÓµÓÐ15ÒÚСÎÒ˽¼Òµµ°¸Êý¾Ý¿â£¬£¬ £¬Ð§ÀÍÓÚÆóÒµÓªÏú¡¢ÏúÊÛ¼°ÕÐÆ¸µÈÁìÓò¡£¡£ ¡£Ö»¹ÜÊý¾Ýй¶ԴͷÉÐδÃ÷È·£¬£¬ £¬µ«ElasticsearchЧÀÍÆ÷δÉèÃÜÂëµÄÑÏÖØÇå¾²Îó²î³ÉΪ½¹µã£¬£¬ £¬ÕâÖÖÉèÖü«Ò×±»ºÚ¿ÍʹÓ㬣¬ £¬Ñ¸ËÙÇÔÈ¡Êý¾Ý£¬£¬ £¬¶ÔСÎÒ˽¼ÒÒþ˽×é³ÉÖØ´óÍþв£¬£¬ £¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ­¼°ÍøÂç´¹ÂÚΣº¦¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬PDL´ËǰÒѱ¬·¢¹ýÀàËÆµÄÊý¾Ýй¶Ê¹Ê£¬£¬ £¬Í¬ÑùÒòδ±£»£»£»¤µÄElasticsearchЧÀÍÆ÷µ¼Ö£¬£¬ £¬Éæ¼°Êý¾Ý¹æÄ£¸üÎªÖØ´ó¡£¡£ ¡£´Ë´Îй¶µÄ¡°Version 26.2¡±Êý¾Ý¼¯¿ÉÄÜÓë´ËǰÊÂÎñÓйØÁª£¬£¬ £¬ÔÙ´Î̻¶ÁËPDLÔÚÊý¾ÝÇå¾²·½ÃæµÄÖØ´óȱÏÝ¡£¡£ ¡£


https://cybernews.com/security/people-data-labs-data-leak/


6. Roblox¿ª·¢Ö°Ô±ÆµÔâ¹¥»÷£¬£¬ £¬Î±Ôìnpm°üÈö²¥¶ñÒâÈí¼þ


9ÔÂ2ÈÕ£¬£¬ £¬Roblox ¿ª·¢Ö°Ô±³ÉΪһϵÁжñÒâ¹¥»÷µÄÄ¿µÄ£¬£¬ £¬ÕâЩ¹¥»÷ͨ¹ýαÔì npm °ü£¬£¬ £¬ÓÈÆäÊÇÄ£ÄâÊ¢ÐÐµÄ noblox.js ¿â£¬£¬ £¬ÍýÏëÇÔÈ¡Ãô¸ÐÊý¾ÝºÍÆÆËðϵͳ¡£¡£ ¡£×Ô½ñÄêÍ·ÒÔÀ´£¬£¬ £¬¶à¸öÃûΪ noblox.js ±äÖÖµÄÈí¼þ°ü±»È·ÒÔΪ¶ñÒ⣬£¬ £¬°üÀ¨ noblox.js-proxy-server ºÍ noblox-ts£¬£¬ £¬ËüÃÇͨ¹ýÆ·ÅÆÐ®ÖÆ¡¢×éºÏÇÀ×¢ºÍÐǺÅÐ®ÖÆµÈÊÖÒÕαװ³ÉÕýµ±¿â£¬£¬ £¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¡£¡£ ¡£ÕâЩ¶ñÒâ°üÈç noblox.js-async¡¢noblox.js-thread µÈ£¬£¬ £¬Ö»¹ÜÏÂÔØÁ¿ÓÐÏÞ£¬£¬ £¬È´ÀÖ³ÉÓÕÆ­ÁËÓû§¡£¡£ ¡£±ðµÄ£¬£¬ £¬¹¥»÷Õß»¹½ÓÄÉ starjacking ÊÖ·¨£¬£¬ £¬½«ÐéαÈí¼þ°üµÄÔ´´æ´¢¿â±ê¼ÇΪÏÖʵ noblox.js ¿â£¬£¬ £¬ÔöÇ¿ÐÅÈζÈ¡£¡£ ¡£ÕâЩ¶ñÒâÈí¼þ°üÄÚǶµÄ´úÂë²»µ«ÇÔÈ¡ Discord ÁîÅÆ£¬£¬ £¬»¹Í¨¹ýÐÞ¸Ä Windows ×¢²á±íºÍ¸üзÀ²¡¶¾É¨³ýÁбíÀ´Ìӱܼì²âºÍά³Ö³¤ÆÚÐÔ¡£¡£ ¡£Ã¿µ±Óû§ÊµÑé·­¿ª Windows ÉèÖÃÓ¦ÓÃʱ£¬£¬ £¬¶ñÒâÈí¼þ±ã»á±»¼¤»î¡£¡£ ¡£×îÖÕÄ¿µÄÊǰ²ÅÅ Quasar RAT£¬£¬ £¬Ê¹¹¥»÷ÕßÄÜÔ¶³Ì¿ØÖÆÊÜѬȾϵͳ£¬£¬ £¬²¢½«ÍøÂçµ½µÄÐÅϢͨ¹ý Discord webhook ·¢ËÍÖÁ C2 ЧÀÍÆ÷¡£¡£ ¡£Ö»¹ÜÒÑÓв½·¥É¨³ýÕâЩ¶ñÒâÈí¼þ£¬£¬ £¬µ«ÐÂÈí¼þ°üÈÔÒ»Ö±·ºÆð£¬£¬ £¬ÌáÐÑ¿ª·¢Ö°Ô±Ðè¼á³Ö¸ß¶ÈСÐÄ¡£¡£ ¡£


https://thehackernews.com/2024/09/malicious-npm-packages-mimicking.html