Winter Vivern ͨ¹ý Roundcube ȱÏÝÃé×¼ 80 ¶à¸ö×éÖ¯

Ðû²¼Ê±¼ä 2024-02-20
1. Winter Vivern Í¨¹ý Roundcube ȱÏÝÃé×¼ 80 ¶à¸ö×éÖ¯


2ÔÂ19ÈÕ £¬Óë°×¶íÂÞ˹ºÍ¶íÂÞ˹ÀûÒæÒ»ÖµÄÍþвÐÐΪÕßÓëÒ»ÏîеÄÍøÂçÌع¤Ô˶¯ÓйØ £¬¸ÃÔ˶¯¿ÉÄÜʹÓà Roundcube ÍøÂçÓʼþ·þÎñÆ÷ÖеĿçÕ¾¾ç±¾ (XSS) Îó²îÀ´Õë¶Ô 80 ¶à¸ö×éÖ¯¡£¾Ý Recorded Future ³Æ £¬ÕâЩʵÌåÖ÷ҪλÓÚ¸ñ³¼ªÑÇ¡¢²¨À¼ºÍÎÚ¿ËÀ¼ £¬¸Ã¹«Ë¾½«Õâ´ÎÈëÇÖ¹éÒòÓÚÃûΪ Winter Vivern µÄÍþвÐÐΪÕß £¬¸ÃÍþвÕßÒ²±»³ÆΪ TA473 ºÍ UAC0114¡£¸ÃÍøÂçÇå¾²¹«Ë¾ÕýÔÚ×·×ÙÃûΪ¡°ÍþвÔ˶¯×éÖ¯ 70¡±(TAG-70) µÄºÚ¿Í×éÖ¯¡£Recorded Future ·¢Ã÷µÄÕⳡÔ˶¯´Ó 2023 Äê 10 ÔÂ×îÏÈÒ»Ö±Ò»Á¬µ½±¾ÔÂÖÐÑ® £¬Ä¿µÄÊÇÍøÂçÓйØÅ·ÖÞÕþÖκ;üÊÂÔ˶¯µÄÇ鱨¡£ÕâЩ¹¥»÷Óë 2023 Äê 3 Ô¼ì²âµ½µÄÕë¶ÔÎÚ×ȱð¿Ë˹̹Õþ¸®Óʼþ·þÎñÆ÷µÄÆäËû TAG-70 Ô˶¯Öصþ¡£Recorded FutureÌåÏÖ £¬»¹·¢Ã÷ÁËTAG-70Õë¶ÔÒÁÀÊפ¶íÂÞ˹ºÍºÉÀ¼´óʹ¹ÝÒÔ¼°¸ñ³¼ªÑÇפÈðµä´óʹ¹ÝµÄÖ¤¾Ý¡£


https://thehackernews.com/2024/02/russian-linked-hackers-breach-80.html


2.ÒÁÀʺڿÍʹÓÃÐ嵀 BASICSTAR ºóÃÅÃé×¼Öж«Õþ²ßר¼Ò


2ÔÂ19ÈÕ £¬ÃûΪ Charming Kitten µÄÒÁÀÊÒáÍþвÐÐΪÕßͨ¹ý½¨ÉèÒ»¸öÐéαµÄÍøÂç×êÑлáÃÅ»§ £¬Í¨¹ýÃûΪBASICSTARµÄкóÃÅ £¬ÓëһϵÁÐÕë¶ÔÖж«Õþ²ßר¼ÒµÄй¥»÷ÓйØ¡£Charming Kitten £¬Ò²³ÆΪ APT35¡¢CharmingCypress¡¢Mint Sandstorm¡¢TA453 ºÍ Yellow Garuda £¬ÓÐ×Ų߻®ÖÖÖÖÉç»á¹¤³ÌÔ˶¯µÄÀúÊ· £¬ÕâЩÔ˶¯ÔÚÆäÄ¿µÄÉÏÈöÏÂÁËÆÕ±éµÄÍøÂç £¬Í¨³£×¨ÃÅÕë¶ÔÖÇ¿â¡¢·ÇÕþ¸®×éÖ¯ºÍ¼ÇÕß¡£¸Ã×éÖ¯±»ÆÀ¹ÀΪÁ¥ÊôÓÚÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó (IRGC) £¬ÔÚÒÑÍùÒ»ÄêÖл¹·Ö·¢ÁËÆäËû¼¸¸öºóÃÅ £¬ÀýÈçPowerLess¡¢BellaCiao¡¢POWERSTAR£¨ÓÖÃû GorjolEcho£©ºÍNokNok  £¬Ç¿µ÷Æä¼ÌÐø¾ÙÐÐÍøÂç¹¥»÷µÄ¿ÌÒâÖ»¹Ü¹ûÕæÆعâ £¬µ«ÈÔµ÷½âÆäÕ½ÂÔºÍÒªÁì¡£2023 Äê 9 ÔÂÖÁ 10 ÔÂʱ´úÊӲ쵽µÄÍøÂç´¹ÂÚ¹¥»÷Éæ¼° Charming Kitten ÔËÓªÉÌð³ä Rasanah ¹ú¼ÊÒÁÀÊÑо¿Ëù (IIIS) Ìᳫ¹¥»÷²¢ÓëÄ¿µÄ½¨ÉèÐÅÍС£¹¥»÷Á´Í¨³£Ê¹ÓðüÀ¨ LNK ÎļþµÄ RAR ´æµµ×÷Ϊ·Ö·¢¶ñÒâÈí¼þµÄÆðµã £¬²¢Í¨¹ýÐÂÎű޲ßDZÔÚÄ¿µÄ¼ÓÈëÓйØËûÃǸÐÐËȤµÄÖ÷ÌâµÄÐéαÍøÂç×êÑлá¡£ÒÑÊӲ쵽°²ÅÅ BASICSTAR ºÍ KORKULOADER£¨Ò»ÖÖ PowerShell ÏÂÔØÆ÷¾ç±¾£©µÄ´ËÀà¶à½×¶ÎѬȾÐòÁС£


https://thehackernews.com/2024/02/iranian-hackers-target-middle-east.html


3.ºÚ¿ÍÉù³ÆÈËÁ¦×ÊÔ´¾ÞÍ· Robert Half Êý¾Ýй¶²¢³öÊÛÃô¸ÐÊý¾Ý


2ÔÂ18ÈÕ £¬ÕâЩÎÛÃûÕÑÖøµÄºÚ¿Í»®·ÖÊÇ IntelBroker ºÍ Sanggiero £¬ËûÃÇÉù³ÆÓµÓÐ Robert Half µÄ´ó×ÚÊý¾Ý £¬ÕâЩÊý¾ÝÕýÔÚÒÔÃÅÂÞ±Ò (XMR) ¼ÓÃÜÇ®±ÒµÄ¼ÛÇ®³öÊÛ £¬ÊÛ¼ÛΪ 20,000 ÃÀÔª¡£2022 Äê 6 Ô £¬È«ÇòÈËÁ¦×ÊÔ´ºÍÉÌÒµ×Éѯ·þÎñ¹«Ë¾ Robert Half International Inc. ÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»ÁËÊý¾Ýй¶֪ͨ¡£Í¨Öª³Æ £¬¸Ã¹«Ë¾ÔâÓöÊý¾Ýй¶ £¬ºÚ¿ÍÕë¶Ô 1000 ¶àÃû¿Í»§ £¬ÀֳɻñÈ¡ÁËËûÃǵÄÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂëºÍË°ÎñÐÅÏ¢¡£ºÚ¿Í»¹·ÖÏíÁ˾ݳÆÏÔʾ±»µÁÊý¾Ý¡¢Git ´æ´¢¿âºÍ AWS Ïà¹ØϵͳÉèÖõÄÆÁÄ»½Øͼ¡£Ò»ÕÅÆÁÄ»½ØͼËƺõÏÔʾÁËÒ»·Ý¿Í»§Áбí £¬¡°ÕÊ»§Ãû³Æ¡±ÏÂÁгöÁ˹«Ë¾ £¬²¢¸½ÓÐÈ«Ãû¡¢Ö÷ÒªÖ°ÄܽÇÉ«¡¢Í·Ïκ͵绰ºÅÂë¡£


https://www.hackread.com/hackers-claim-robert-half-data-breach/


4.Turla APT ʹÓÃTinyTurla-NGÖ¼ÔÚÇÔÈ¡µÇ¼ƾ֤


2ÔÂ19ÈÕ £¬¶íÂÞ˹ÍøÂçÌع¤Íþв×éÖ¯¡°Turla APT ×éÖ¯¡±±»·¢Ã÷ʹÓÃеĺóÞÙÐжñÒâ²Ù×÷¡£Õâ¸öеĺóÃű»³ÆΪ¡°TinyTurla-NG¡±£¨TTNG£© £¬ËüÓë֮ǰÅû¶µÄÖ²Èë³ÌÐòTinyTurlaÔÚ±àÂëÆø¸ÅºÍ¹¦Ð§ÊµÏÖ·½ÃæÓÐÏàËÆÖ®´¦¡£È»¶ø £¬Õâ¸öеĺóÃÅ×Ô 2023 Äê 12 ÔÂÒÔÀ´Ò»Ö±ÔÚÈö²¥ £¬Ä¿µÄÊÇÔÚ¶íÂÞ˹ÈëÇÖʱ´úÖ§³ÖÎÚ¿ËÀ¼µÄ²¨À¼·ÇÕþ¸®×éÖ¯¡£±ðµÄ £¬¸ÃºóÃÅ»¹Ê¹ÓÃPowerShell ¾ç±¾¾ÙÐÐÉø͸¡£ËûÃǵÄÄ¿µÄ°üÀ¨ÃÀ¹ú¡¢Å·ÃË¡¢ÎÚ¿ËÀ¼ºÍÑÇÖÞ¡£±ðµÄ £¬¸ÃÍþвÐÐΪÕß´ËÇ°ÔøÕë¶ÔÎÚ¿ËÀ¼¹ú·À¾üʹÓùý CAPIBAR ºÍ KAZUAR ¶ñÒâÈí¼þϵÁС£Ñо¿Ö°Ô±Õվɷ¢Ã÷ÁËÈý¸ö²î±ðµÄ TinyTurla-NG Ñù±¾ £¬ÆäÖÐ×îÔçµÄÍ×ЭÊÇÔÚ 2023 Äê 12 Ô 18 ÈÕ·¢Ã÷µÄ £¬²¢ÇÒÒ»Ö±»îÔ¾µ½ 2024 Äê 1 Ô 27 ÈÕ¡£×îеÄÔ˶¯Ê¹ÓûùÓÚ WordPress µÄÍøÕ¾×÷ΪÏÂÁîºÍ¿ØÖÆ (C2) ¶ËµãTTNGºóÃÅ¡£

https://gbhackers.com/turla-aptc-new-tool/


5.ESET ÐÞ¸´ WINDOWS ²úÆ·ÖеÄÑÏÖØÐÔÍâµØȨÏÞÉý¼¶Îó²î


2ÔÂ18ÈÕ £¬ESET ½â¾öÁËÆä Windows ²úÆ·ÖеÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î £¬±àºÅΪ CVE-2024-0353£¨CVSS ÆÀ·Ö 7.8£©¡£¸ÃÎó²îÊÇÒ»¸öÍâµØȨÏÞÉý¼¶ÎÊÌâ £¬ÓÉÁãÈÕÍýÏë (ZDI) Ìá½»¸ø¸Ã¹«Ë¾¡£Æ¾Ö¤¸Ãת´ï £¬¹¥»÷Õß¿ÉÒÔÀÄÓà ESET µÄÎļþ²Ù×÷£¨ÓÉʵʱÎļþϵͳ±£»¤Ö´ÐУ© £¬ÔÚûÓÐÊʵ±È¨ÏÞµÄÇéÐÎÏÂɾ³ýÎļþ¡£ÓÉ Windows ²Ù×÷ϵͳÉϵÄʵʱÎļþϵͳ±£»¤¹¦Ð§Ö´ÐеÄÎļþ²Ù×÷´¦Öóͷ£ÖеÄÎó²î £¬¿ÉÄÜÔÊÐíÄܹ»ÔÚÄ¿µÄϵͳÉÏÖ´ÐеÍÌØȨ´úÂëµÄ¹¥»÷Õßɾ³ý NT AUTHORITY\SYSTEM ϵÄí§ÒâÎļþ £¬ÌáÉýËûÃǵÄÌØȨ¡£ESET ÉÐδ·¢Ã÷ʹÓôËÎó²î¾ÙÐеÄÒ°Íâ¹¥»÷Ô˶¯¡£


https://securityaffairs.com/159280/breaking-news/eset-local-privilege-escalation-windows.html


6. SOLARWINDS ÐÞ¸´ ACCESS RIGHTS MANAGER ÖеÄÒªº¦ RCE


2ÔÂ19ÈÕ £¬SolarWinds ½â¾öÁËÆä»á¼ûȨÏÞÖÎÀíÆ÷ (ARM) ½â¾ö¼Æ»®ÖеÄÈý¸öÒªº¦Îó²î £¬ÆäÖаüÀ¨Á½¸ö RCE ¹ýʧ¡£»á¼ûȨÏÞÖÎÀíÆ÷ (ARM) ÊÇÒ»¿îÈí¼þ½â¾ö¼Æ»® £¬Ö¼ÔÚ×ÊÖú×éÖ¯ÖÎÀíºÍ¼à¿ØÆä IT »ù´¡ÉèÊ©ÄڵĻá¼ûȨÏÞºÍȨÏÞ¡£´ËÀ๤¾ß¹ØÓÚά»¤Óû§¶ÔÖÖÖÖ×ÊÔ´¡¢ÏµÍ³ºÍÊý¾ÝµÄ»á¼ûµÄÇå¾²ÐÔ¡¢ºÏ¹æÐԺ͸ßЧÖÎÀíÖÁ¹ØÖ÷Òª¡£Èý¸öÑÏÖصÄÔ¶³Ì´úÂëÖ´ÐÐȱÏÝÊÇ£ºCVE-2023-40057£¨CVSS ÆÀ·Ö 9.0£©£º²»ÊÜÐÅÍÐÊý¾ÝµÄ·´ÐòÁл¯ÎÊÌâ¡£¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§¿ÉÒÔʹÓôËÎó²îÀÄÓà SolarWinds ·þÎñ £¬´Ó¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£CVE-2024-23479£¨CVSS ÆÀ·Ö 9.6£©£ºÄ¿Â¼±éÀúÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉÒÔʹÓôËÎÊÌâʵÏÖÔ¶³Ì´úÂëÖ´ÐС£CVE-2024-23476£¨CVSS ÆÀ·Ö 9.6£©Ä¿Â¼±éÀúÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£ÈôÊDZ»Ê¹Óà £¬Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉÒÔʵÏÖÔ¶³ÌÖ´ÐдúÂë¡£


https://securityaffairs.com/159294/security/solarwinds-access-rights-manager-flaws.html