Turla APT ºÚ¿ÍʹÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯

Ðû²¼Ê±¼ä 2024-04-12
1. Turla APT ºÚ¿ÍʹÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯


4ÔÂ11ÈÕ£¬ÍøÂçÇ徲ר¼Ò·¢Ã÷£¬¶íÂÞ˹Turla¸ß¼¶Ò»Á¬Íþв (APT) ×éÖ¯Éø͸µ½°¢¶û°ÍÄáÑǵÄÒ»´Îʧ°ÜʵÑé¡£´ËÊÂÎñÊÇÕë¶ÔÅ·ÖÞ¹ú¼ÒµÄ¸üÆÕ±éÍøÂçÌع¤Ô˶¯µÄÒ»²¿·Ö£¬²¨À¼Ò²³ÉΪÕâЩÖØ´ó¹¥»÷µÄÊܺ¦Õß¡£ÕâÒ»·¢Ã÷ÓëÒ»Á¬µÄµØÔµÕþÖÎÖ÷ҪʱÊÆÏàÒ»Ö£¬²¢Í¹ÏÔÁ˹ú¼ÒͬÃËÐÐΪÕßÒ»Ö±Éý¼¶µÄÍøÂçÕ½Õ½ÂÔ¡£Turla APT ×éÖ¯ÒÔÆäÖØ´óµÄÍøÂçÌع¤Ô˶¯¶øÖøÃû£¬ÏòÀ´ÒÔÓ벨Â޵ĺ£ºÍ¶«Å·¹ú¼ÒÕþ¸®²¿·ÖÓÐÁªÏµµÄ×é֯ΪĿµÄ¡£×î½üÔÚ°¢¶û°ÍÄáÑǺͲ¨À¼µÄÔ˶¯Í»ÏÔÁ˸Ã×éÖ¯ÔÚÎÚ¿ËÀ¼Õ½ÕùµÄ¸üÆÕ±éÅä¾°ÏÂÒ»Ö±Æð¾¢ÍøÂçÇ鱨²¢Ê©¼ÓÓ°Ïì¡£


https://gbhackers.com/cyber-espionage-turla-apt-hackers-attack-european-organization-with-backdoor/


2. TA547 ʹÓÃÒÉËÆ AI ÌìÉúµÄ Rhadamanthys Ãé×¼µÂ¹ú


4ÔÂ10ÈÕ£¬ÔÚProofpoint×î½üÆعâµÄÒ»´ÎºÚ¿ÍÔ˶¯ÖÐÖ®ºó£¬µÂ¹ú×éÖ¯ÃæÁٶ෽ÃæµÄ¹¥»÷¡£³öÓÚ¾­¼ÃÄîÍ·µÄ×éÖ¯ TA547 Ê״ΰ²ÅÅÁË Rhadamanthys ÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬Õâ±ê¼Ç×ÅËûÃÇÏ°ÓÃÕ½ÂÔµÄת±ä¡£ÓÐȤµÄÊÇ£¬ºÚ¿Í¿ÉÄÜ´ÓÒ»¸öÒâÏë²»µ½µÄȪԴ¡ª¡ªÈ˹¤ÖÇÄÜ¡ª¡ªÄÇÀï»ñµÃÁË×ÊÖú¡£¸ÃÔ˶¯µÄ»ùʯÊÇ°²ÅÅRhadamanthys£¬ÕâÊÇÒ»ÖÖÔÚ TA547 µÄÎäÆ÷¿âÖÐÒÔǰδÔø¼û¹ýµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£ÕâÖÖ¶ñÒâÈí¼þÒÔÆäЧÁ¦ºÍÔÚÍøÂç·¸·¨È¦×ÓÖеÄÆÕ±éʹÓöøÖøÃû£¬±ê¼Ç×Å TA547 ÔËÓªÕ½ÂÔµÄÕ½ÂÔÖ§µã¡£¹¥»÷Õßαװ³ÉÀ´×Ե¹úÖøÃûÁãÊÛ¾ÞÍ· Metro µÄͨѶ£¬¾Ý³ÆÓ뷢ƱÓйØ¡£


https://securityonline.info/ta547-targets-germany-with-rhadamanthys-suspected-ai-generated-code/


3. Raspberry Robin ʹÓà Windows ¾ç±¾Îļþ¾ÙÐÐÈö²¥


4ÔÂ10ÈÕ£¬Raspberry Robin ÊÇÒ»ÖÖ˳ӦÐÔÇ¿¡¢¹æ±ÜÐÔÇ¿µÄÈä³æºÍ¶ñÒâÈí¼þ¼ÓÔسÌÐò£¬ÓÚ 2021 ÄêÊ״ηºÆðÔÚÍøÂçÍþв³¡¾°ÖУ¬ÏÖÔÚÕýÔÚʹÓÃÒ»ÖÖÐÂÒªÁìÀ´Èö²¥Æä¶ñÒâ´úÂ롣ƾ֤ HP Wolf Security ÍþвÑо¿Ö°Ô±±¾ÖÜÐû²¼µÄÒ»·Ý±¨¸æ£¬ÉϸöÔ¼ì²âµ½µÄÒ»ÏîÐÂÔ˶¯Åú×¢ Raspberry Robin ±³ºóµÄÔËÓªÉÌÕýÔÚʹÓöñÒâ Windows ¾ç±¾Îļþ(WSF) À´Èö²¥Æä¶ñÒâÈí¼þ£¬ÕâÓëËûÃǸüÆÕ±éµÄʹÓÃÒªÁì²î±ð¡£×î½ü£¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ýʹÓà Discord ÐÂÎÅ·þÎñÒÔ¸½¼þÐÎʽ·¢Ë͵Ĵ浵ÎļþÏÂÔØ£¨½«×ÔÉíαװ³ÉÕýµ±ÇÒÒÑÊðÃûµÄ Windows ¿ÉÖ´ÐÐÎļþ£©ÒÔ¼°Í¨¹ýÄ¿µÄ Web ä¯ÀÀÆ÷ÏÂÔØµÄ 7-Zip ´æµµ¾ÙÐÐÈö²¥¡£


https://securityboulevard.com/2024/04/raspberry-robin-malware-now-using-windows-script-files-to-spread/


 4. Spectre v2 ¹¥»÷Ó°Ïì Intel CPU É쵀 Linux ϵͳ

 

4ÔÂ10ÈÕ£¬Spectre V2 ÊÇ°¢Ä·Ë¹Ìص¤×ÔÓÉ´óѧ VUSec С×éµÄÒ»×éÑо¿Ö°Ô±·¢Ã÷µÄԭʼ Spectre ¹¥»÷µÄбäÌå¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬¸Ã¹¤¾ßʹÓ÷ûºÅÖ´ÐÐÀ´Ê¶±ð Linux ÄÚºËÖпÉʹÓõĴúÂë¶Î£¬ÒÔ×ÊÖú»º½âÎÊÌâ¡£Õâһз¢Ã÷Ç¿µ÷ÁËƽºâÐÔÄÜÓÅ»¯ÓëÇå¾²ÐÔµÄÌôÕ½£¬ÕâʹµÃ½â¾ö»ù±¾µÄ CPU ȱÏݱäµÃÖØ´ó£¬×ÝÈ»ÊÇÔÚ Spectre ·¢Ã÷ÁùÄêºó ¡£Ó¢Ìضû»¹¸üÐÂÁËÕë¶Ô Spectre v2 µÄ»º½â½¨Ò飬ÏÖÔÚ½¨Òé½ûÓ÷ÇÌØȨÀ©Õ¹²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷ (eBPF) ¹¦Ð§£¬ÆôÓÃÔöÇ¿Ðͼä½Ó·ÖÖ§ÏÞÖÆÍƲâ (eIBRS)£¬²¢ÆôÓÃÖÎÀíԱģʽִÐб £»¤ (SMEP)¡£

 

https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/


5. RUBYCARP SSH ±©Á¦½©Ê¬ÍøÂçͨ¹ýй¤¾ß»Ø¹é


4ÔÂ10ÈÕ£¬ÓÉÓÚÒÔ SSH ±©Á¦¹¥»÷¶øÖøÃûµÄÎÛÃûÕÑÖøµÄ½©Ê¬ÍøÂç×éÖ¯ RUBYCARP ÒÀ¸½ÐµĹ¤¾ßºÍÕ½ÂÔÖØзºÆð£¬ÍøÂçÇå¾²ÉçÇøÔٴδ¦Óڸ߶Ⱦ¯±¸×´Ì¬¡£Sysdig ÍþвÑо¿ÍÅ¶Ó (Sysdig TRT) Ò»Ö±ÔÚÇ×½ü¼àÊÓÕâ¸öÂÞÂíÄáÑÇÍþв×éÖ¯µÄÔ˶¯£¬¸Ã×éÖ¯ÒѾ­»îÔ¾ÁËÊ®¶àÄ꣬×î½ü·¢Ã÷ÆäÐж¯·ºÆðÁËÖØ´óÏ£Íû¡£RUBYCARP ÔÙÆðµÄ½¹µãÊÇʹÓà Laravel Ó¦ÓóÌÐòÖеÄÒ»¸öÒªº¦Îó²î CVE-2021-3129¡£´ËÎó²îÒ»Ö±ÊǸÃ×éÖ¯µÄÄ¿µÄºÍʹÓÃÊÂÇéµÄ½¹µã£¬Ê¹ËûÃÇÄܹ»»ñµÃ¶ÔϵͳµÄδ¾­ÊÚȨµÄ»á¼û²¢À©´óÆ佩ʬÍøÂç¡£³ýÁËʹÓà CVE-2021-3129 Ö®Í⣬RUBYCARP »¹Ê¹ÓÃSSH ±©Á¦¹¥»÷½øÈëÄ¿µÄÍøÂç¡£¸Ã×éÖ¯µÄ¼á³ÖºÍÕ½ÂÔµÄÑݱäÇ¿µ÷ÁËÐÞ²¹ÒÑÖªÎó²îºÍÔöÇ¿ SSH Çå¾²²½·¥ÒÔ×èÖ¹´ËÀ๥»÷µÄÖ÷ÒªÐÔ¡£Sysdig TRT µÄ×îз¢Ã÷Åú×¢£¬RUBYCARP ²»µ«¼ÌÐøÆä¹Å°åµÄ±©Á¦ÆƽâºÍʹÓÃÔ˶¯£¬²¢ÇÒ»¹Ìí¼ÓÁËÐÂÊÖÒÕ¡£


https://gbhackers.com/rubycarp-ssh-brute-botnet/


6. Ð嵀 SharePoint ÊÖÒÕ¿ÉÈúڿÍÈƹýÇå¾²²½·¥


4ÔÂ10ÈÕ£¬SharePoint Öз¢Ã÷µÄÁ½ÖÖÐÂÊÖÒÕʹ¶ñÒâÐÐΪÕßÄܹ»Èƹý¹Å°åÇå¾²²½·¥²¢ÔÚ²»´¥·¢±ê×¼¼ì²â»úÖƵÄÇéÐÎÏÂй¶Ãô¸ÐÊý¾Ý¡£²»·¨ÎļþÏÂÔØ¿ÉÄÜ»áαװ³ÉÎÞº¦µÄÔ˶¯£¬Ê¹ÍøÂçÇå¾²·ÀÓù²½·¥ÄÑÒÔ¼ì²âµ½ËüÃÇ¡£µÚÒ»ÖÖÊÖÒÕ±»³ÆΪ¡°ÔÚÓ¦ÓóÌÐòÖз­¿ªÒªÁ족£¬ËüʹÓÃÁË SharePoint ¹¦Ð§£¬¸Ã¹¦Ð§ÔÊÐíÓû§Ö±½ÓÔÚ¹ØÁªµÄÓ¦ÓóÌÐòÖз­¿ªÎĵµ¡£ËäÈ»Õâ¸ö¹¦Ð§ÊÇΪÁËÀû±ãÓû§¶øÉè¼ÆµÄ£¬µ«È´ÎÞÒâÖÐÔì³ÉÁËÊý¾Ý鶵ÄÎó²î¡£¹¥»÷Õß¿ÉÒÔʹÓô˹¦Ð§µÄµ×²ã´úÂëÀ´»á¼ûºÍÏÂÔØÎļþ£¬Ö»ÔÚÎļþµÄÉóºËÈÕÖ¾ÖÐÁôÏ»á¼ûÊÂÎñ¡£µÚ¶þÖÖÊÖÒÕÉæ¼°¶Ô Microsoft SkyDriveSync£¨ÏÖÔÚ³ÆΪ OneDrive£©µÄÓû§ÊðÀí×Ö·û´®µÄ²Ù×÷¡£Í¨¹ýαװ³Éͬ²½¿Í»§¶Ë£¬¹¥»÷Õß¿ÉÒÔÏÂÔØÎļþÉõÖÁÕû¸öSharePointÍøÕ¾¡£ÕâЩÏÂÔر»¹ýʧµØ±ê¼ÇΪÎļþͬ²½ÊÂÎñ¶ø²»ÊÇÏÖʵÏÂÔØ£¬´Ó¶øÈƹýÁËÖ¼ÔÚ¼ì²âºÍ¼Í¼ÎļþÏÂÔصÄÇå¾²²½·¥¡£ÕâÖÖÒªÁìÌØÊâÒõÏÕ£¬ÓÉÓÚËü¿ÉÓÃÓÚ´ó¹æÄ£ÇÔÈ¡Êý¾Ý£¬²¢ÇÒͬ²½Î±×°Ê¹Çå¾²¹¤¾ß¸üÄÑÒÔÇø·ÖÕýµ±Ô˶¯ºÍ¶ñÒâÔ˶¯¡£


https://gbhackers.com/sharepoint-technique-bypas/