ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2024-09-149ÔÂ12ÈÕ£¬£¬£¬ÒÁÀ¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄÈ«ÐIJ߻®¹¥»÷Ä¿µÄ¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Check PointÆÊÎö£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿·Ö£¬£¬£¬Ê¹ÓÃжñÒâÈí¼þVeatyºÍSpearal£¬£¬£¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉøÍ¸ÍøÂç¡£¡£¡£¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÇø»îÔ¾£¬£¬£¬ÉÆÓÚÍøÂç´¹ÂںͶ¨ÖƺóÃŹ¥»÷£¬£¬£¬´Ë´ÎÒ²²»ÆÆÀý£¬£¬£¬Õ¹Ê¾ÁËÆäÆæÒìµÄÏÂÁîÓë¿ØÖÆ»úÖÆ£¬£¬£¬°üÀ¨×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¡£¡£¡£¹¥»÷Á´Í¨¹ýÓÕÆÐÔÎļþÆô¶¯£¬£¬£¬Ö´ÐÐPowerShell»òPyinstaller¾ç±¾£¬£¬£¬É¾³ýºÛ¼£²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£SpearalʹÓÃDNSËíµÀͨѶ£¬£¬£¬VeatyÔòͨ¹ýÌØ¶¨ÓÊÏäÏÂÔØ²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£±ðµÄ£¬£¬£¬»¹·¢Ã÷ÓëSSHËíµÀºóÃźÍIISЧÀÍÆ÷ºóÃÅÏà¹ØµÄ»î¶¯£¬£¬£¬Åú×¢¹¥»÷ÕßÊֶζàÑùÇÒÊÖÒÕÏȽø¡£¡£¡£¡£Check PointÇ¿µ÷£¬£¬£¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÇøÄÚµÄÒ»Á¬ºÍ¼¯ÖÐÆð¾¢£¬£¬£¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£¡£¡£¡£
https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
2. TrickMoÒøÐÐľÂíбäÖÖÆØ¹â£ºÔöÇ¿Íþв£¬£¬£¬ÇÔÈ¡Òþ˽
9ÔÂ12ÈÕ£¬£¬£¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½ÒÆÆÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ£¬£¬£¬ÕâÒ»±äÖÖ²»µ«¼ÌÐø²¢Ç¿»¯ÁËÆäǰÉíÕë¶ÔAndroid×°±¸ÒøÐÐÆ¾Ö¤µÄ¹Å°åÍþвÄÜÁ¦£¬£¬£¬»¹ÒýÈëÁËÆÁÄ»Â¼ÖÆ¡¢¼üÅ̼ͼ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§£¬£¬£¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷¹æÄ£ºÍÆÆËðÁ¦¡£¡£¡£¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô±£¬£¬£¬×Ô2019ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬Ò»Á¬½ø»¯£¬£¬£¬ÏÖÒѳÉΪ½ðÈÚڲƺÍСÎÒ˽¼ÒÒþ˽Çå¾²µÄÖØ´óÒþ»¼¡£¡£¡£¡£Ð±äÖÖ²»µ«ÄÜ×èµ²Ò»´ÎÐÔÃÜÂë(OTP)ÈÆ¹ýË«ÒòËØÈÏÖ¤(2FA)£¬£¬£¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦Õß×°±¸Ö´ÐÐ×°±¸Ú²Æ(ODF)£¬£¬£¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÇå¾²·À»¤¡£¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬Cleafy·¢Ã÷¸Ã±äÖÖ»¹´ÓÊÜѬȾװ±¸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ±£»£»¤µÄÏÂÁîÓë¿ØÖÆ(C2)ЧÀÍÆ÷ÉÏ£¬£¬£¬µ¼ÖÂÊý¾Ýй¶Σº¦¼¤Ôö£¬£¬£¬ÈκεÚÈý·½¶¼ÄÜÈÝÒ×»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£¡£±»µÁÊý¾ÝÁè¼Ý 12 GB£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤¼þ¡¢²ÆÎñÐÅÏ¢£¬£¬£¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕÆ¬¡£¡£¡£¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬£¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐУ¬£¬£¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ²ØÐÔºÍΣº¦ÐÔ¡£¡£¡£¡£
https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/
3. ÍøÂçÍþвж¯Ïò£ºÕýµ±Python¿â³É¹¥»÷ÀûÆ÷
9ÔÂ12ÈÕ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Mertens½üÆÚÐû²¼ÁËÒ»·Ý±¨¸æ£¬£¬£¬Õ¹ÏÖÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑÏËàÇ÷ÊÆ£ºÍøÂç·¸·¨·Ö×ÓÕýÈÕÒæÇÉÃîµØÊ¹ÓÃÕýµ±µÄPython¿âÖ´ÐжñÒâ»î¶¯¡£¡£¡£¡£ÕâЩ¿â£¬£¬£¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip£¬£¬£¬Ô±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯£¬£¬£¬È´±»·¸·¨·Ö×ÓÀÄÓÃÒÔʵÑé¼üÅ̼ͼ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°åÐ®ÖÆµÈ¶ñÒâÐÐΪ¡£¡£¡£¡£MertensÖ¸³ö£¬£¬£¬PyPi.orgµÈÖØ´ó¿âÉú̬ϵͳµÄ±£´æ£¬£¬£¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£¡£¡£¡£Ö»¹ÜÕâЩ¿â×Ô¼ºÎÞº¦£¬£¬£¬µ«ËüÃǵÄǿʢ¹¦Ð§±»²»·¨·Ö×ÓʹÓ㬣¬£¬ÒÔÌӱܼì²â£¬£¬£¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ýй¶µÈÄ¿µÄ¡£¡£¡£¡£ÀýÈ磬£¬£¬discord¿â±»ÖØÐ°üװΪC2ƽ̨£¬£¬£¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ýй¶µÄצÑÀ¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏýÊÖÒÕ£¬£¬£¬ÈçmarshalºÍpy_compile£¬£¬£¬½øÒ»²½Ä£ºý¶ñÒâ´úÂ룬£¬£¬ÔöÌíÄæÏò¹¤³ÌµÄÄѶȡ£¡£¡£¡£ÕâÖÖÕ½ÂÔʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Çå¾²ÆÊÎöʦ²ì¾õ£¬£¬£¬´Ó¶ø¼Ó¾çÁËÍøÂçÇå¾²·ÀÓùµÄÖØ´óÐÔ¡£¡£¡£¡£
https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/
4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷
9ÔÂ13ÈÕ£¬£¬£¬Î÷ÑÅͼ¸Û×÷Ϊî¿ÏµÎ÷ÑÅͼµØÇøº£¸ÛÓë»ú³¡µÄÖ÷ÒªÕþ¸®»ú¹¹£¬£¬£¬½üÆÚÈ·ÈÏÆäϵͳÔÚÒÑÍùÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ8Ô£¬£¬£¬ÆÈʹ¿Ú°¶½ôÆÈ¸ôÀ벿·ÖÒªº¦ÏµÍ³ÒÔ×èÖ¹Ó°Ï죬£¬£¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì£¬£¬£¬µ¼Öº½°àÑÓÎ󡣡£¡£¡£ÈýÖܺ󣬣¬£¬¿Ú°¶¹ÙÆÓֱʽָÈÏRhysidaΪĻºóÔªÐ×£¬£¬£¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨ»î¶¯ÈÅÂÒ£¬£¬£¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÇå¾²¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬RhysidaÍÅ»ïÀÖ³ÉÉøÍ¸¿Ú°¶ÅÌËã»úϵͳ£¬£¬£¬¼ÓÃÜÒªº¦Êý¾Ý£¬£¬£¬µ¼Ö°üÀ¨ÐÐÀî´¦Öóͷ£¡¢×ÔÖúЧÀÍ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸öЧÀÍÖÐÖ¹¡£¡£¡£¡£Ö»¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦£¬£¬£¬»Ö¸´Á˴󲿷Öϵͳ£¬£¬£¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐ֤ЧÀ͵ÈÒªº¦¹¦Ð§¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÇå¾²¡¢²»Ïò·¸·¨Í×еÄ̬¶È¡£¡£¡£¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´£¬£¬£¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£¡£¡£¡££¬£¬£¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³öÖÒÑÔ£¬£¬£¬ÌáÐѸ÷ÐÐÒµÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄË𺦡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/
5. Ivanti CSA¸ßΣÎó²îÔâʹÓ㬣¬£¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹
9ÔÂ13ÈÕ£¬£¬£¬IvantiÈ·ÈÏÆäÔÆÐ§ÀÍ×°±¸£¨CSA£©½â¾ö¼Æ»®Öб£´æ¸ßΣÎó²îCVE-2024-8190£¬£¬£¬¸ÃÎó²îÒÑÔâ¹¥»÷ÕßʹÓᣡ£¡£¡£ÔçÏÈ£¬£¬£¬Ivanti±¨¸æ³ÆÎ´·¢Ã÷¿Í»§ÊÜÓ°Ï죬£¬£¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³ÌÈÏÖ¤µÄÖÎÀíԱͨ¹ýÏÂÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£Ivanti½¨Òé½ÓÄÉÌØ¶¨ÉèÖýµµÍΣº¦£¬£¬£¬²¢¼ì²éÖÎÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑé¡£¡£¡£¡£Í¬Ê±£¬£¬£¬¹«Ë¾±Þ²ß¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾£¬£¬£¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕǰÐÞ¸´¡£¡£¡£¡£CISAÇ¿µ÷´ËÀàÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£IvantiÔÚÈ«ÇòÓµÓÐÆÕ±éµÄÏàÖúͬ°éÍøÂ磬£¬£¬Æä²úÆ·ºÍЧÀͱ»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳÖÎÀí£¬£¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁËʵʱÐÞ¸´Çå¾²Îó²îµÄÖ÷ÒªÐÔ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/
6. Trojan Ajina.BankerËÁŰÖÐÑÇ£ºÎ±×°Õýµ±Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢
9ÔÂ13ÈÕ£¬£¬£¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁŰÖÐÑǵØÇø£¬£¬£¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°Öеĺݶ¾¾«ÁéÃüÃû£¬£¬£¬Í¨¹ýαװ³ÉÕýµ±Ó¦ÓóÌÐòÈçÒøÐÐЧÀͺÍÕþ¸®ÃÅ»§£¬£¬£¬Ê¹ÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³ÌÕ½ÂÔÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐжñÒâÎļþ¡£¡£¡£¡£×Ô2023Äê11ÔÂÒÔÀ´£¬£¬£¬ÒÑ·¢Ã÷Ô¼1,400ÖÖ±äÖÖ£¬£¬£¬Ö÷ҪĿµÄΪÎÚ×ȱð¿Ë˹̹Óû§£¬£¬£¬µ«¹¥»÷¹æÄ£ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£¡£¡£¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó£¬£¬£¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó£¬£¬£¬Ê¹ÓÃÓû§µÄºÃÆæÐľÙÐÐÈö²¥¡£¡£¡£¡£ÆäÍâµØ»¯ÍƹãÕ½ÂÔÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆÈ¸Ð£¬£¬£¬´ÙʹÓû§²»¾Ë¼Ë÷¼´µã»÷Á´½Ó¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÍøÂç½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇ飬£¬£¬»¹ÄÜ×èµ²¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Â룬£¬£¬Õ¹ÏÖ³ö¸ß¶È˳ӦÐԺͽø»¯ÄÜÁ¦¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Ajina.Banker½ÓÄÉͬÃËÍýÏëģʽÔËÓª£¬£¬£¬½¹µãÍŶÓÓëͬÃËÍøÂçÏàÖú£¬£¬£¬Í¨Ì«¹ýÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£¡£¡£¡£ÃæÁÙÕâÒ»Íþв£¬£¬£¬×¨¼Ò½¨Òé¼á³ÖСÐÄ£¬£¬£¬×èÖ¹µã»÷δ¾ÇëÇóµÄÐÂÎźÍÏÂÔØÁ´½Ó£¬£¬£¬¼á³ÖʹÓùٷ½Ó¦ÓÃÊÐËÁÏÂÔØÓ¦Ó㬣¬£¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£¡£¡£¡£
https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/