Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆø϶ϵͳµÄ¹¥»÷
Ðû²¼Ê±¼ä 2023-08-031¡¢Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆø϶ϵͳµÄ¹¥»÷
KasperskyÔÚ7ÔÂ31Èճƣ¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚʹÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯£¬Ö¼ÔÚ´ÓÆø϶ϵͳÖÐÇÔÈ¡Êý¾Ý¡£ÊӲ췢Ã÷£¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²î±ðµÄÖ²Èë³ÌÐò£¬Ã¿¸öÖ²Èë³ÌÐò¶¼ÓÃÓÚ²î±ðµÄ¹¥»÷½×¶Î¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·ݣ¬Éæ¼°Èý¸ö²î±ðµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²Èë³ÌÐò½¨Éè¶ÔÄ¿µÄϵͳµÄ³¤ÆÚÐÔºÍÔ¶³Ì»á¼û£¬²¢ÍøÂçÕì̽Êý¾Ý£»µÚ¶þ½×¶Î£¬APT31»á×°ÖøüרҵµÄ¶ñÒâÈí¼þ£¬À´Ê¹ÓÃUSBÈö²¥´ÓÆø϶ϵͳÖÐÇÔÈ¡Êý¾Ý£»×îºóµÄµÚÈý½×¶Î£¬ºÚ¿ÍʹÓÃÖ²Èë³ÌÐò½«ÍøÂçµ½µÄÊý¾ÝÉÏ´«µ½C2·þÎñÆ÷¡£
https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/
2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷Ô޳ɽ»45ÍòÃÀÔªÊê½ð
¾Ý8ÔÂ1ÈÕ±¨µÀ£¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷£¬¸ÃÕòµÄ°ü¹Ü¹«Ë¾Óë¹¥»÷ÕßÐÉ̸濢ÁË45ÍòÃÀÔªµÄÏ¢ÕùÐÒé¡£ÔÝʱÕò³¤Hartnett³Æ£¬ÏÖÔÚ¹¥»÷ÒѾ»ñµÃÏàʶ¾ö£¬¶Ô¸ÃÕòÓªÒµºÍÔËÓªÖÁ¹ØÖ÷ÒªµÄÊý¾ÝÒ²Òѻָ´¡£¿ÉÊÇһЩÊôÓÚСÎÒ˽¼ÒÓû§µÄÊý¾Ý£¬ºÍÉ漰Ϊ¸ÃÕò·þÎñ²¢´æ´¢ÒÑÍù¼Í¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£ÕâЩɥʧµÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÕ湫¹²¼Í¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£
https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/
3¡¢Cofense³Æ½üÆÚʹÓÃGoogle AMPµÄ´¹ÂÚÔ˶¯ÊýÄ¿Ôö¶à
CofenseÓÚ8ÔÂ1ÈÕ͸¶£¬Ê¹ÓÃGoogle AMPµÄ´¹ÂÚÔ˶¯ÊýÄ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔöÌí¡£Google AMPÊÇÓÉGoogleÓë30¸öÏàÖúͬ°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü£¬Ö¼ÔÚÌá¸ßÒƶ¯×°±¸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙÂÊ¡£ÕâÖÖеĴ¹ÂÚÕ½ÂÔ½«AMP URLǶÈë´¹ÂÚÓʼþÖУ¬ÕâЩ¶ñÒâURLÓÚ5Ô·Ý×îÏÈ·ºÆð£¬ÏÖÔÚÈÔÔÚÈö²¥£¬Ö¼ÔÚÇÔÈ¡Ô±¹¤µÇ¼ƾ֤¡£´ËÀàÔ˶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£±ðµÄ£¬¹¥»÷Ô˶¯ºÜÊÇÒþ²Ø£¬²»µ«Ê¹ÓÃÁËGoogle AMP URL£¬»¹ÍŽáÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÇå¾²»ù´¡ÉèÊ©¡£
https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/
4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûÕæÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â
¾Ý7ÔÂ31ÈÕ±¨µÀ£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪUsNsAµÄºÚ¿Í¹ûÕæÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â£¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É£¬×ܾÞϸԼΪ1.8 GB£¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ£¬°üÀ¨Ñо¿ÂÛÎĵȡ£Ñо¿Ö°Ô±Ö¸³ö£¬¹¥»÷ÕßʹÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢ÈëÎó²îÀ´»ñµÃδ¾ÊÚȨµÄ»á¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â£¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£
https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum
5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½·¨Collide+PowerÓ°ÏìÏÕЩËùÓÐCPU
¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½·¨£¬Ó°ÏìÁËÏÕЩËùÓÐCPU£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£ÆäÖ÷Òª¿´·¨ÊÇ£¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦ÓóÌÐò·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖб¬·¢Êý¾Ý¡°³åÍ»¡±²¢ÁýÕÖÇ°Õßʱ£¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¸ÃÎó²î±»×·×ÙΪCVE-2023-20583£¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦Öóͷ£Æ÷¡£¸ÃÎó²î¾ßÓÐÑо¿ÒâÒ壬µ«Ê¹ÓÃÆðÀ´½ÏÁ¿ÄÑÌ⣬Òò´ËÑÏÖØˮƽ½ÏµÍ¡£ÖÁÓÚ»º½â²½·¥£¬ÐèÒªÖØÐÂÉè¼ÆCPU£¬ÒÔÊǸüÏÖʵµÄ»º½â²½·¥ÊDZÜÃâ¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźš£
https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/
6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
8ÔÂ1ÈÕ£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»¸öеĴ¹ÂÚÔ˶¯£¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¸ÃÔ˶¯ÓÚ2022Äê12ÔÂ×óÓÒ×îÏÈ£¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÊØÐÅÏ¢¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer£¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£´Ë´Î·¢Ã÷µÄÔ˶¯Éæ¼°Á½¸ö±äÌ壬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§£¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±Ò×ʽðµÈ£»µÚ¶þ¸öÖ§³ÖÌØÊ⹦Ч£¬ÀýÈçÆÊÎöOutlookÓʼþ¡¢Í¨¹ýTelegram¾ÙÐÐÊý¾Ýй¶¡¢Ð®ÖÆFacebookÕË»§ºÍ·´ÆÊÎöµÈ¡£
https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/