΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷

Ðû²¼Ê±¼ä 2024-10-15

1. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷


10ÔÂ13ÈÕ£¬£¬ £¬£¬£¬£¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ£¬£¬ £¬£¬£¬£¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷£¬£¬ £¬£¬£¬£¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐΡ£¡£¡£¡£¡£Kerberoasting ʹÓà Kerberos Éí·ÝÑé֤ЭÒéÇÔÈ¡ AD ƾ֤£¬£¬ £¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬ £¬£¬£¬£¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±Ñݱ䣬£¬ £¬£¬£¬£¬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷ǰÑԺͷÀÓù»úÖÆ¡£¡£¡£¡£¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆÆ½âÊÖÒÕµÄÔËÓ㬣¬ £¬£¬£¬£¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý¡£¡£¡£¡£¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬£¬ £¬£¬£¬£¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆÆ½âʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵÄЧÀÍÆ±Ö¤£¬£¬ £¬£¬£¬£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾­ÊÚȨµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬£¬ £¬£¬£¬£¬¸üÒ×Êܵ½¹¥»÷¡£¡£¡£¡£¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£¡£¡£¡£¡£Îª¼õÇá Kerberoasting Σº¦£¬£¬ £¬£¬£¬£¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥£¬£¬ £¬£¬£¬£¬°üÀ¨Ê¹ÓÃ×éÍйÜЧÀÍÕÊ»§ (gMSA) »òίÍÐÍйÜЧÀÍÕÊ»§ (dMSA)¡¢Ç¿ÖÆÊ¹ÓÃÇ¿ÃÜÂë¡¢ÉèÖÃЧÀÍÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬£¬ £¬£¬£¬£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄЧÀÍÖ÷ÌåÃû³Æ (SPN)¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£¡£¡£¡£¡£


https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/


2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ


10ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬Trend MicroÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâ»î¶¯¼¤Ôö£¬£¬ £¬£¬£¬£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£¡£¡£¡£¡£´Ë´ÎÓã²æÊ½ÍøÂç´¹ÂڻÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖ޵Ĺ«Ë¾£¬£¬ £¬£¬£¬£¬ÓÈÆäÊǰÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹£¬£¬ £¬£¬£¬£¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃ˰É걨µÄ½ôÆÈÐÔÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁ£¬ £¬£¬£¬£¬ÓëC&CЧÀÍÆ÷½¨ÉèÅþÁ¬¡£¡£¡£¡£¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ£¬£¬ £¬£¬£¬£¬µ±Óû§Ö´ÐÐʱ£¬£¬ £¬£¬£¬£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî¡£¡£¡£¡£¡£³ýÁËLNKÎļþ£¬£¬ £¬£¬£¬£¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû£¬£¬ £¬£¬£¬£¬Èç.pdf¡¢.jpgµÈ£¬£¬ £¬£¬£¬£¬ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL£¬£¬ £¬£¬£¬£¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß£¬£¬ £¬£¬£¬£¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£¡£¡£¡£¡£Water MakaraµÄÓã²æÊ½ÍøÂç´¹ÂڻÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬£¬ £¬£¬£¬£¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù£¬£¬ £¬£¬£¬£¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üеÈ£¬£¬ £¬£¬£¬£¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html


3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬£¬×¨¼ÒÇ××Ô½ÒÃØÈ¦Ì×


10ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþЧÀÍ£¬£¬ £¬£¬£¬£¬ÓµÓÐÁè¼Ý25ÒÚÓû§£¬£¬ £¬£¬£¬£¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖØµãÄ¿µÄ¡£¡£¡£¡£¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑԳƣ¬£¬ £¬£¬£¬£¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§£¬£¬ £¬£¬£¬£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£¡£¡£¡£¡£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ£¬£¬ £¬£¬£¬£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²Æ­ÍøÕ¾£¬£¬ £¬£¬£¬£¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£¡£¡£½Ó×Å£¬£¬ £¬£¬£¬£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬£¬ £¬£¬£¬£¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£»£»£»î¶¯¡£¡£¡£¡£¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷£¬£¬ £¬£¬£¬£¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ£¬£¬ £¬£¬£¬£¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó£¬£¬ £¬£¬£¬£¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬Mitrovic»¹Òâʶµ½£¬£¬ £¬£¬£¬£¬Æ­×ÓµÄÉùÒô¹ýÓÚÍêÉÆ£¬£¬ £¬£¬£¬£¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ¡£¡£¡£¡£¡£ËûÒÔΪ£¬£¬ £¬£¬£¬£¬ÕâÊÇÈ«Çò¹æÄ£Äڵĺڿͻ£¬£¬ £¬£¬£¬£¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£¡£¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬£¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾£¬£¬ £¬£¬£¬£¬ÌáÐѸ÷ÈËÕ©Æ­ÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ£¬£¬ £¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ£¬£¬ £¬£¬£¬£¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÈεÄÈËÇóÖú£¬£¬ £¬£¬£¬£¬ÒÔÌá·À´ËÀ๥»÷¡£¡£¡£¡£¡£


https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/


4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ


10ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø£¬£¬ £¬£¬£¬£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬£¬ £¬£¬£¬£¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£¡£¡£¡£¡£Ë¼¿Æ½²»°ÈËÌåÏÖ£¬£¬ £¬£¬£¬£¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ£¬£¬ £¬£¬£¬£¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæÊµÐÔ£¬£¬ £¬£¬£¬£¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ£¬£¬ £¬£¬£¬£¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿ÆÏµÍ³£¬£¬ £¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬£¬ £¬£¬£¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîĿԴ´úÂë¡¢Ó²±àÂëÆ¾Ö¤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ¡£¡£¡£¡£¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËʿ͸¶£¬£¬ £¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйÜЧÀÍÌṩÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´Ëǰ6Ô·ݵÄйÃÜÊÂÎñÓйØ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/


5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð


10ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬£¬ £¬£¬£¬£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾­ÊÚȨµÄÏÖ½ðÌáÈ¡¡£¡£¡£¡£¡£FASTCashÏÈǰÖ÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬£¬ £¬£¬£¬£¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬ £¬£¬£¬£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷£¬£¬ £¬£¬£¬£¬ÇÔÈ¡ÊýÍòÍòÃÀÔª£¬£¬ £¬£¬£¬£¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв£¬£¬ £¬£¬£¬£¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£¡£¡£¡£¡£2020Ä꣬£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬£¬ £¬£¬£¬£¬Ò»Äêºó£¬£¬ £¬£¬£¬£¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËߣ¬£¬ £¬£¬£¬£¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£¡£¡£¡£¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal£¬£¬ £¬£¬£¬£¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷ЧÀÍÆ÷Àú³ÌÖУ¬£¬ £¬£¬£¬£¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢£¬£¬ £¬£¬£¬£¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ìæ»»ÎªÅú×¼£¬£¬ £¬£¬£¬£¬²¢°üÀ¨Ëæ»ú½ð¶î£¬£¬ £¬£¬£¬£¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣡£¡£¡£¡£¸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬£¬ £¬£¬£¬£¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð£¬£¬ £¬£¬£¬£¬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆä¹¤¾ß¼¯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/


6. Gryphon HealthcareÔâÓöÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡


10ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡Ð§ÀÍÌṩÉÌ£¬£¬ £¬£¬£¬£¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢй¶µÄÊÂÎñ¡£¡£¡£¡£¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬£¬ £¬£¬£¬£¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬£¬ £¬£¬£¬£¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾²£¬£¬ £¬£¬£¬£¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬣¬ £¬£¬£¬£¬µ«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬£¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥Ð§À͵Ä×éÖ¯´æ´¢£¬£¬ £¬£¬£¬£¬¿ÉÄܰüÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£¡£¡£¡£¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬£¬ £¬£¬£¬£¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó¡£¡£¡£¡£¡£Î´À´¼¸¸öÔ£¬£¬ £¬£¬£¬£¬Ëæ×Å״ʦÃÇÖÆ¶©ÕûÌåËßËÏÍýÏ룬£¬ £¬£¬£¬£¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£


https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/