MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв
Ðû²¼Ê±¼ä 2024-02-191. MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв
2ÔÂ17ÈÕ£¬Check Point Research (CPR) ·¢Ã÷Microsoft OutlookÖб£´æÑÏÖØÇå¾²Îó²î¡£±»³ÆΪ#MonikerLink£»¸ÃÎó²îÔÊÐíÍþвÐÐΪÕßÔÚÆäÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£²©¿ÍÎÄÕÂÖÐÏêϸÏÈÈÝÁËÕâÏîÑо¿£¬Ç¿µ÷Á˸ÃÎó²î¿ÉÄÜ»áʹÓà Outlook ´¦Öóͷ£Ä³Ð©³¬Á´½ÓµÄ·½·¨¡£¸ÃÎó²î±»¸ú×ÙΪCVE-2024-21413£¬ CVSS ÆÀ·ÖΪ 9.8£¨Âú·Ö 10£©£¬ÕâÒâζןÃÎó²î¾ßÓÐÑÏÖØÑÏÖØÐÔÇҸ߶ȿÉʹÓ㬿ÉÄÜÔÊÐí¹¥»÷Õßͨ¹ý×îÉÙµÄÓû§½»»¥À´ÆÆËðϵͳ¡£Õâ¿ÉÄܻᵼÖÂϵͳÍêÈ«ÊÜË𡢾ܾø·þÎñºÍÊý¾Ýй¶¡£±ðµÄ£¬¹¥»÷Õß¿ÉÒÔÖ´ÐÐí§Òâ´úÂë¡¢ÇÔÈ¡Êý¾ÝºÍ×°ÖöñÒâÈí¼þ¡£¸ÃÎÊÌâµÄ±¬·¢ÊÇÓÉÓÚ Outlook ´¦Öóͷ£¡°file://¡±³¬Á´½ÓµÄ·½·¨Ôì³ÉµÄ£¬´Ó¶øµ¼ÖÂÑÏÖصÄÇå¾²Òþ»¼¡£Íþв¼ÓÈëÕß¿ÉÒÔÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐÐδ¾ÊÚȨµÄ´úÂë¡£CPR µÄÑо¿Åú×¢£¬#MonikerLink Îó²îÀÄÓÃÁË Windows ÉϵÄ×é¼þ¹¤¾ßÄ£×Ó ( COM )£¬´Ó¶øÔÊÐíÖ´ÐÐδ¾ÊÚȨµÄ´úÂ벢й¶ÍâµØ NTLM ƾ֤ÐÅÏ¢¡£¸ÃÎó²îʹÓÃÓû§µÄ NTLM ƾ֤À´Í¨¹ý Windows ÖÐµÄ COM Ö´ÐÐí§Òâ´úÂë¡£µ±Óû§µ¥»÷¶ñÒⳬÁ´½Óʱ£¬Ëü»áÅþÁ¬µ½Óɹ¥»÷Õß¿ØÖƵÄÔ¶³Ì·þÎñÆ÷£¬´Ó¶øÆÆËðÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢²¢¿ÉÄܵ¼Ö´úÂëÖ´ÐС£ÕâʹµÃ¹¥»÷ÕßÄܹ»ÈƹýOffice Ó¦ÓóÌÐòÖеÄÊܱ£»¤ÊÓͼģʽ£¬Ô¶³ÌŲÓà COM ¹¤¾ß²¢ÔÚÊܺ¦ÕßµÄÅÌËã»úÉÏÖ´ÐдúÂë¡£
https://www.hackread.com/monikerlink-bug-microsoft-outlook-data-malware/
2. FBI ͨ¼©·¸ Zeus ºÍ IcedID ¶ñÒâÈí¼þÖ÷ıÈÏ×ï
2ÔÂ18ÈÕ£¬Ò»ÃûÎÚ¿ËÀ¼¹«ÃñÔÚÃÀ¹úÈÏ¿É×Ô¼ºÔÚ 2009 Äê 5 ÔÂÖÁ 2021 Äê 2 ÔÂʱ´ú¼ÓÈëÁËÁ½¸ö²î±ðµÄ¶ñÒâÈí¼þÍýÏ루Zeus ºÍ IcedID£©¡£37 ËêµÄάÑÇÇÐ˹À·ò¡¤ÒÁ¸êÁÐάÆ桤Åí³þ¿Æ·òÓÚ 2022 Äê 10 Ô±»ÈðÊ¿Õþ¸®¾Ð²¶£¬²¢ÓÚÈ¥Äê±»Òý¶Éµ½ÃÀ¹ú¡£2012Ä꣬Ëû±»ÁÐÈëÁª°îÊÓ²ì¾ÖµÄͨ¼©Ãûµ¥¡£ÃÀ¹ú˾·¨²¿ (DoJ)½« PenchukovÐÎòΪ¡°Á½¸ö¶à²ú¶ñÒâÈí¼þ×éÖ¯µÄÏòµ¼Õß¡±£¬¸Ã×éÖ¯ÓöñÒâÈí¼þѬȾÁËÊýǧ̨ÅÌËã»ú£¬µ¼ÖÂÀÕË÷Èí¼þºÍÊý°ÙÍòÃÀÔª±»µÁ¡£ÆäÖаüÀ¨ Zeus ÒøÐÐľÂí£¬¸ÃľÂíÓÐÖúÓÚÇÔÈ¡ÒøÐÐÕË»§ÐÅÏ¢¡¢ÃÜÂ롢СÎÒ˽¼Òʶ±ðÂëÒÔ¼°µÇ¼ÍøÉÏÒøÐÐÕË»§ËùÐèµÄÆäËûÏêϸÐÅÏ¢¡£±»¸æ»¹±»Ö¸¿ØÖÁÉÙ´Ó 2018 Äê 11 ÔÂÆð×ÊÖúÏòµ¼Éæ¼°IcedID£¨ÓÖÃû BokBot£©¶ñÒâÈí¼þµÄ¹¥»÷£¬´Ó¶øΪ¶ñÒâÔ˶¯Ìṩ±ãµ±¡£¸Ã¶ñÒâÈí¼þÄܹ»³äµ±ÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÆäËûÓÐÓøºÔØ£¨ÀýÈçÀÕË÷Èí¼þ£©µÄ¼ÓÔسÌÐò¡£×îÖÕ£¬ÕýÈçÊÓ²ì¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹ (Brian Krebs)ÔÚ 2022 Ä걨µÀµÄÄÇÑù£¬ÓÉÓÚÓëÎÚ¿ËÀ¼Ç°×Üͳά¿ËÍС¤ÑÇŬ¿ÆάÆæ (Victor Yanukovych) µÄÕþÖιØϵ£¬Ëû¶àÄêÀ´ÀÖ³ÉÌÓ±ÜÎÚ¿ËÀ¼ÍøÂç·¸·¨ÊÓ²ìÖ°Ô±µÄÆðËß¡£
https://thehackernews.com/2024/02/fbis-most-wanted-zeus-and-icedid.html
3. CISA ³Æ Akira ÀÕË÷ÍÅ»ïÕýÔÚʹÓà Cisco ASA/FTD Îó²îCVE-2020-3259
2ÔÂ17ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ÔÚÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖÐÌí¼ÓÁË Ò»¸ö Cisco ASA ºÍ FTD Îó²î£¬±àºÅΪCVE-2020-3259 £¨CVSS ÆÀ·Ö£º7.5£©¡£Îó²î CVE-2020-3259 ÊÇÒ»¸ö±£´æÓÚ ASA ºÍ FTD Web ·þÎñ½Ó¿ÚÖеÄÐÅϢй¶ÎÊÌ⡣˼¿ÆÓÚ 2020 Äê 5 ÔÂÐÞ¸´Á˸ÃÎó²î¡£CISA ½«¸ÃÎÊÌâÁÐΪÒÑÖªÓÃÓÚÀÕË÷Èí¼þÔ˶¯µÄÎÊÌ⣬µ«¸Ã»ú¹¹Ã»ÓÐ͸¶ÄÄЩÀÕË÷Èí¼þ×éÖ¯ÕýÔÚÆð¾¢Ê¹ÓøÃÎÊÌâ¡£Truesec CSIRT ÍÅ¶Ó ·¢Ã÷È¡Ö¤Êý¾ÝÅú×¢ Akira ÀÕË÷Èí¼þ×éÖ¯¿ÉÄÜÕýÔÚÆð¾¢Ê¹ÓÃ¾ÉµÄ Cisco ASA£¨×Ô˳ӦÇå¾²×°±¸£©ºÍ FTD£¨Firepower Íþв·ÀÓù£©Îó²î£¬¸ú×Ù±àºÅΪ CVE-2020-3259¡£Akira ÀÕË÷Èí¼þ ×Ô 2023 Äê 3 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒѾÈëÇÖÁ˶à¸öÐÐÒµµÄ¶à¸ö×éÖ¯£¬°üÀ¨½ÌÓý¡¢½ðÈںͷ¿µØ²ú¡£ÓëÆäËûÀÕË÷Èí¼þÍÅ»ïÒ»Ñù£¬¸Ã×éÖ¯¿ª·¢ÁËÒ»¿îÕë¶Ô VMware ESXi ·þÎñÆ÷µÄ Linux ¼ÓÃÜÆ÷¡£
https://securityaffairs.com/159244/cyber-crime/cisa-cisco-cve-2020-3259-akira-ransomware.html
4. ÒÔÉ«ÁÐ NSO ×éÖ¯ÉæÏÓ¶Ô WhatsApp ¾ÙÐС°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷
2ÔÂ16ÈÕ£¬ÒÔÉ«ÁÐÌع¤Èí¼þ¹«Ë¾ NSO Group ÉæÏÓʹÓÃÒ»ÖÖÐÂÓ±µÄ¡°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷À´Õë¶Ô WhatsApp ÉÏδ¾ÏÓÒɵÄÓû§£¬ÎÞÐèÓû§½»»¥¼´¿É̻¶ËûÃǵÄ×°±¸ÐÅÏ¢¡£¸Ã¹«Ë¾ÓÚ 2023 Äê 15 ÈÕÐÇÆÚËÄÏò Hackread.com ·ÖÏíµÄ±¨¸æÏÔʾ£¬WhatsApp ÔÚ 2019 Äê 5 Ô·¢Ã÷Æäϵͳ±£´æÎó²î£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§×°±¸ÉÏ×°Öà Pegasus Ìع¤Èí¼þ¡£Ëæºó£¬¸ÃÎó²î±»Ê¹ÓÃÀ´Õë¶ÔÈ«ÇòµÄÕþ¸®¹ÙÔ±ºÍ»î¸ÐÈËÊ¿¡£WhatsApp ¾ÍÕâÖÖʹÓÃÐÐΪÆðËßNSO ¼¯ÍÅ£¬µ«ÔÚÃÀ¹úÉÏËß·¨ÔººÍ×î¸ß·¨ÔºÉÏËß¾ùʧ°Ü¡£Enea ÌᳫÁËÒ»ÏîÊӲ죬ÒÔ²éÃ÷²ÊÐÅÖ¸Îƹ¥»÷ÊÇÔõÑù±¬·¢µÄ¡£ËûÃÇ·¢Ã÷£¬Ëü¿ÉÒÔͨ¹ý·¢ËͲÊÐÅÀ´ÏÔʾĿµÄ×°±¸ºÍ²Ù×÷ϵͳ°æ±¾£¬¶øÎÞÐèÓû§½»»¥¡£MMS UserAgent ÊÇÒ»¸ö±êʶ²Ù×÷ϵͳºÍ×°±¸£¨ÀýÈçÔËÐÐ Android µÄÈýÐÇÊÖ»ú£©µÄ×Ö·û´®£¬¶ñÒâÐÐΪÕß¿ÉÒÔʹÓà MMS UserAgent À´Ê¹ÓÃÎó²î¡¢¶¨ÖƶñÒ⸺ÔØ»ò²ß»®ÍøÂç´¹ÂÚÔ˶¯¡£
https://www.hackread.com/israeli-nso-group-mms-fingerprint-attack-whatsapp/
5. Ñо¿ÍŶӷ¢Ã÷Turla APT °²ÅÅÐ嵀 TinyTurla-NG ºóÃÅ
2ÔÂ17ÈÕ£¬Ë¼¿Æ Talos µÄר¼Ò·¢Ã÷ÓÉ Turla APT ×éÖ¯²ß»®µÄÕë¶Ô²¨À¼·ÇÕþ¸®×éÖ¯µÄÔ˶¯¡£Õâ´Î¹¥»÷ʹÓÃÁËÒ»ÖÖÐÂÓ±µÄºóÃÅ£¬TinyTurla-NG¡£TinyTurla-NG µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÄܹ»³äµ±ºóÃÅ£¬µ±¼ì²âµ½»ò×èÖ¹ÆäËûºÚ¿ÍÒªÁìʱ£¬ºóÞͻᱻ¼¤»î¡£¼Í¼ÔÚ°¸µÄ¹¥»÷Ô˶¯´Ó 2023 Äê 12 Ô 18 ÈÕÒ»Á¬µ½ 2024 Äê 1 Ô 27 ÈÕ£¬²»¹ýÓÐÈËÍƲ⹥»÷¿ÉÄÜÔçÔÚ 2023 Äê 11 Ô¾Í×îÏÈÁË¡£²¡¶¾Í¨¹ýÊÜѬȾµÄ WordPress ÍøÕ¾Èö²¥£¬¸ÃÍøÕ¾³äµ±ÏÂÁîºÍ¿ØÖÆ (C2) ·þÎñÆ÷¡£TinyTurla-NG Äܹ»´Ó C2 ·þÎñÆ÷Ö´ÐÐÏÂÁî¡¢ÉÏ´«ºÍÏÂÔØÎļþÒÔ¼°°²Åž籾ÒÔ´ÓÃÜÂëÖÎÀíÊý¾Ý¿âÇÔÈ¡ÃÜÂë¡£±ðµÄ£¬TinyTurla-NG ³äµ±½»¸¶ PowerShell ¾ç±¾µÄÇþµÀ£¬³ÆΪ TurlaPower-NG£¬Ö¼ÔÚÌáÈ¡ÓÃÓÚ±£»¤Ê¢ÐÐÃÜÂëÖÎÀíÆ÷Êý¾Ý¿âµÄÐÅÏ¢¡£
https://meterpreter.org/turla-apt-deploys-new-tinyturla-ng-backdoor/
6. Alpha ÀÕË÷Èí¼þ´Ó NetWalker »Ò½ýÖÐáÈÆð
2ÔÂ16ÈÕ£¬Alpha ÊÇÒ»ÖÖÐÂÀÕË÷Èí¼þ£¬ÓÚ 2023 Äê 2 ÔÂÊ״ηºÆ𣬲¢ÔÚ×î½ü¼¸ÖÜÔöÇ¿ÁËÔË×÷£¬ÓëÔçÒѲ»±£´æµÄ NetWalker ÀÕË÷Èí¼þºÜÊÇÏàËÆ£¬NetWalker ÀÕË÷Èí¼þÓÚ 2021 Äê 1 ÔÂÔÚÒ»´Î ¹ú¼ÊÖ´·¨Ðж¯ºóÏûÊÅ¡£¶Ô Alpha µÄÆÊÎöÕ¹ÏÖÁËÓë¾É°æ NetWalker ÀÕË÷Èí¼þµÄÏÔÖøÏàËÆÖ®´¦¡£ÕâÁ½ÖÖÍþв¶¼Ê¹ÓÃÀàËƵĻùÓÚ PowerShell µÄ¼ÓÔسÌÐòÀ´×ª´ïÓÐÓøºÔØ¡£³ý´ËÖ®Í⣬Alpha ºÍ NetWalker ÓÐÓøºÔØÖ®¼ä±£´æ´ó×Ú´úÂëÖصþ¡£Õâ°üÀ¨£ºÁ½¸öÓÐÓøºÔØÖ÷Òª¹¦Ð§µÄÒ»Ñùƽ³£Ö´ÐÐÁ÷³Ì£»ÔÚµ¥¸öÏß³ÌÖд¦Öóͷ£Á½¸ö¹¦Ð§£ºÀú³ÌÖÕÖ¹ºÍ·þÎñÖÕÖ¹£»ÒÑÆÊÎö API µÄÀàËÆÁÐ±í¡£ËäÈ» API ÊÇʹÓùþÏ£ÖµÆÊÎöµÄ£¬µ«ËùʹÓõĹþÏ£Öµ²¢²»Ïàͬ£»Á½¸öÓÐÓøºÔؾßÓÐÏàËƵÄÉèÖ㬰üÀ¨Ìø¹ýµÄÎļþ¼Ð¡¢ÎļþºÍÀ©Õ¹ÃûµÄÁÐ±í£»ÒÔ¼°ÒªkillµÄÀú³ÌºÍ·þÎñµÄÁÐ±í£»¼ÓÃÜÍê³Éºó£¬Á½¸öÓÐÓøºÔض¼»áʹÓÃÔÝʱÅú´¦Öóͷ£Îļþɾ³ý×ÔÉí£»Á½Õ߶¼ÓÐÀàËƵÄÖ§¸¶ÃÅ»§£¬°üÀ¨ÏàͬµÄÐÂÎÅ£º¡°ÈçÐèÊäÈ룬ÇëʹÓÃÓû§´úÂ롱¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/alpha-netwalker-ransomware?web_view=true