΢Èí8Ô·ݵķÇÓ¢ÓïExchangeÇå¾²¸üб£´æBugÒѻعö
Ðû²¼Ê±¼ä 2023-08-111¡¢Î¢Èí8Ô·ݵķÇÓ¢ÓïExchangeÇå¾²¸üб£´æBugÒѻعö
¾ÝýÌå8ÔÂ10ÈÕ±¨µÀ£¬Î¢Èí·¢Ã÷8Ô·ÝMicrosoft Exchange ServerÇå¾²¸üб£´æÎÊÌ⣬Òѽ«Æä´ÓWindows UpdateÖÐɾ³ý¡£Î¢ÈíÔÚ8ÔÂ8ÈÕÐû²¼Á˴˸üУ¬×ܹ²ÐÞ¸´ÁË6¸öÎó²î¡£È»¶ø£¬µ±ÖÎÀíÔ±ÔÚ·ÇÓ¢Óï·þÎñÆ÷ÉÏ×°Öøüк󣬷¢Ã÷Exchange Windows·þÎñÎÞ·¨Æô¶¯¡£×°ÖÃʧ°Ü£¬¹ýʧ´úÂëΪ1603£¬²¢ÁôϹýʧµÄExchange×°Öá£Ñо¿Ö°Ô±Ö¸³ö£¬¸ÃÎÊÌâÊÇÓÉ¡°Exchange Server 2023Äê8ÔÂSU×°ÖóÌÐòÖеÄÍâµØ»¯ÎÊÌ⡱µ¼Öµġ£ÔÚ·ÇÓ¢Óï²Ù×÷ϵͳÉÏ×°ÖÃ΢ÈíExchange Server 2019»ò2016Çå¾²¸üÐÂʱ£¬×°ÖóÌÐò½«×èÖ¹²¢»Ø¹ö¸ü¸Ä£¬Ê¹Exchange Server·þÎñ´¦ÓÚ½ûÓÃ״̬¡£Îª´Ë£¬Î¢ÈíÌṩÏàʶ¾ö²½·¥¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-updates-pulled-after-breaking-non-english-installs/
2¡¢Ñо¿Ö°Ô±·¢Ã÷´ó¹æģЮÖÆÔÆÕÊ»§µÄEvilProxy´¹ÂÚ¹¥»÷
ProofpointÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÃEvilProxy´ó¹æģЮÖÆÔÆÕÊ»§µÄ´¹ÂÚÔ˶¯¡£Ñо¿Ö°Ô±Í¸Â¶£¬ÔÚ3ÔÂÖÁ6ÔÂʱ´ú£¬Ô¼Äª120000·â´¹ÂÚÓʼþ±»·¢Ë͵½È«ÇòÉÏ°Ù¸öÄ¿µÄÆóÒµ£¬ÒÔÇÔÈ¡Microsoft 365ÕÊ»§¡£Ô¼39%µÄÄ¿µÄÊÇC¼¶¸ß¹Ü£¬ÆäÖÐ17%ÊÇÊ×ϯ²ÆÎñ¹Ù£¬9%ÊÇ×ܲúÍÊ×ϯִÐй١£ÕâЩ¹¥»÷ʹÓÃÁË»ùÓÚ·´ÏòÊðÀí¼Ü¹¹µÄ´¹ÂÚ¹¤¾ßEvilProxy£¬²¢ÍŽáʹÓÃÁËÆ·ÅÆð³ä¡¢»úеÈ˼ì²âÈƹýºÍ¿ª·ÅÖض¨ÏòµÈÊÖÒÕ¡£
https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level
3¡¢LockBitÉù³ÆÒª¹ûÕæÍßÀï°²Ò½ÁÆϵͳ°©Ö¢»¼ÕßµÄÊý¾Ý
¾Ý8ÔÂ9ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÍßÀï°²Ò½ÁÆϵͳ(Varian Medical Systems)£¬²¢ÍþвҪ¹ûÕ滼ÕßµÄÒ½ÁÆÊý¾Ý¡£¸Ã¹«Ë¾Á¥ÊôÓÚÎ÷ÃÅ×ÓÒ½ÁƼ¯ÍÅ£¬ÊÕÈë´ï30ÒÚÃÀÔª£¬Ö÷Òª¿ª·¢ºÍÏúÊÛÓÃÓÚÖÎÁÆ°©Ö¢µÈ¼²²¡µÄÒ½ÁÆ×°±¸ºÍÈí¼þ¡£LockbitÔÚÍøÕ¾ÉÏдµÀ£¬ËùÓÐÊý¾Ý¿âºÍ»¼ÕßÊý¾Ý¶¼Òѱ»Ð¹Â¶²¢×¼±¸ÔÚ²©¿ÍÉÏÐû²¼£¬»¹½«¸¶Êê½ðµÄ×èÖ¹ÈÕÆÚ¶¨Îª8ÔÂ17ÈÕ¡£¸Ã¹«Ë¾ÉÐδÅû¶´Ë´ÎÇå¾²ÊÂÎñ¡£
https://securityaffairs.com/149307/cyber-crime/varian-medical-systems-lockbit-ransomware.html
4¡¢Freeze.rsºÍSYK Crypter±»ÓÃÓÚ·Ö·¢XWormµÈ¶ñÒâÈí¼þ
FortinetÔÚ8ÔÂ9ÈÕÅû¶ÁËʹÓÃFreeze.rsºÍSYK Crypter·Ö·¢¶ñÒâÈí¼þµÄÔ˶¯¡£Ñо¿Ö°Ô±ÓÚ7ÔÂ13ÈÕ¼ì²âµ½´¹ÂÚ¹¥»÷Ô˶¯£¬¹¥»÷Á´Ê¼ÓÚ¶ñÒâPDFÎļþ¡£¸ÃÎļþÖض¨Ïòµ½HTMLÎļþ£¬²¢Ê¹Óá°search-ms¡±ÐÒé»á¼ûÔ¶³Ì·þÎñÆ÷ÉϵÄLNKÎļþ¡£·¿ªLNKÎļþºó£¬PowerShell¾ç±¾»áÖ´ÐÐFreeze.rsºÍSYK Crypter£¬ÒÔÖ´ÐнøÒ»²½µÄ¹¥»÷¡£×îÖÕ£¬»á¼ÓÔØXWormºÍRemcos£¬²¢ÓëC2·þÎñÆ÷½¨ÉèͨѶ¡£
https://www.fortinet.com/blog/threat-research/malware-distributed-via-freezers-and-syk-crypter
5¡¢Trend MicroÏêÊöRhysidaÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄ¹¥»÷
8ÔÂ9ÈÕ£¬Trend Micro¸ÅÊöÁËÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÐÂÐÍRhysidaÀÕË÷Èí¼þµÄ¹¥»÷Ô˶¯¡£RhysidaÖ÷ÒªÕë¶ÔÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉúÆø¹¹£¬Í¨³£Ê×ÏÈͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÄ¿µÄµÄÅÌËã»ú£¬È»ºóʹÓÃCobalt StrikeÔÚϵͳÄÚºáÏòÒƶ¯¡£¹¥»÷ÕßÖ´ÐÐPsExecÀ´×°ÖÃPowerShell¾ç±¾ºÍRhysida payload¡£PowerShell¾ç±¾±»ÓÃÓÚÖÕÖ¹AVÀú³Ì¡¢É¾³ý¾íÓ°¸±±¾²¢ÐÞ¸ÄRDPÉèÖã¬ÕâÅú×¢¼ÓÃܳÌÐòÈÔÔÚÆ𾢿ª·¢ÖС£±ðµÄ£¬ÀÕË÷Èí¼þ½ÓÄÉ4096λRSAÃÜÔ¿ºÍAES-CTRÀ´¼ÓÃÜÎļþ¡£
https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html
6¡¢Check PointÐû²¼2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ±¨¸æ
8ÔÂ9ÈÕ£¬Check PointÐû²¼ÁË2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ¡£7Ô·Ý×îÊ¢ÐеĶñÒâÈí¼þÊÇQbot£¬Ó°ÏìÁËÈ«Çò5%µÄ×éÖ¯£¬Æä´ÎÊÇFormbook£¨4%£©ºÍRemcos£¨2%£©¡£È«ÇòÔâµ½¹¥»÷×î¶àµÄÐÐÒµÊǽÌÓýºÍÑо¿ÐÐÒµ£¬Æä´ÎÊÇÕþ¸®ºÍ¾üÊÂÐÐÒµ£¬È»ºóÊÇÒ½ÁƱ£½¡ÐÐÒµ¡£×î³£±»Ê¹ÓõÄÎó²îWeb·þÎñÆ÷¶ñÒâURLĿ¼±éÀúÎó²î£¬Ó°ÏìÁËÈ«Çò49%µÄ×éÖ¯£¬Æä´ÎÊÇApache Log4jÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨45%£©ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨42%£©¡£×î³£¼ûµÄÒƶ¯¶ñÒâÈí¼þAnubis£¬È»ºóÊÇSpinOkºÍAhMyth¡£
https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/