ºÚ¿ÍʹÓÃCR4TºóÃÅÃé×¼Öж«µØÇøµÄÕþ¸®»ú¹¹

Ðû²¼Ê±¼ä 2024-04-22
1. ºÚ¿ÍʹÓÃCR4TºóÃÅÃé×¼Öж«µØÇøµÄÕþ¸®»ú¹¹


4ÔÂ20ÈÕ£¬CR4T£¨¡°CR4T.pdb¡±£©ÊÇÒ»ÖÖ»ùÓÚ C/C++ µÄ´¿ÄÚ´æÖ²Èë³ÌÐò£¬ÔÊÐí¹¥»÷Õß»á¼û¿ØÖÆ̨£¬ÒÔ±ãÔÚÊÜѬȾµÄÅÌËã»úÉÏÖ´ÐÐÏÂÁîÐС¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°ÔÚÁªÏµ C2 ·þÎñÆ÷ºóÉÏ´«ºÍÏÂÔØÎļþ¡£¿¨°Í˹»ùÌåÏÖ£¬Ëü»¹·¢Ã÷Á˾ßÓÐÏàͬ¹¦Ð§µÄ Golang °æ±¾µÄ CR4T£¬±ðµÄ»¹¾ßÓÐÖ´ÐÐí§ÒâÏÂÁîºÍʹÓÃGo-ole ¿â½¨ÉèÍýÏëʹÃüµÄÄÜÁ¦¡£×îÖ÷ÒªµÄÊÇ£¬Golang CR4T ºóÃÅ¿ÉÒÔʹÓÃCOM ¹¤¾ßЮÖÆÊÖÒÕʵÏÖ³¤ÆÚÐÔ£¬²¢Ê¹Óà Telegram API ¾ÙÐÐ C2 ͨѶ¡£¶íÂÞ˹ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ùÌåÏÖ£¬ËüÓÚ 2024 Äê 2 Ô·¢Ã÷Á˸ÃÔ˶¯£¬ÓÐÖ¤¾ÝÅú×¢¸ÃÔ˶¯¿ÉÄÜÖÁÉÙ´ÓÒ»ÄêÇ°¾Í×îÏÈ»îÔ¾¡£¸ÃÔ˶¯µÄ´úºÅΪDuneQuixote¡£Golang ±äÌåµÄ±£´æÅú×¢£¬DuneQuixote ±³ºóµÄÉí·Ý²»Ã÷µÄÍþв¼ÓÈëÕßÕýÔÚÆð¾¢Ê¹Óÿçƽ̨¶ñÒâÈí¼þË¢ÐÂËûÃǵĹ¥»÷·½·¨¡£


https://thehackernews.com/2024/04/hackers-target-middle-east-governments.html


2. Frontier Communications ÔÚÍøÂç¹¥»÷ºó¹Ø±Õϵͳ


4ÔÂ20ÈÕ£¬µçОÞÍ· Frontier Communications ÒÑ֪ͨÃÀ¹ú֤ȯÉúÒâίԱ»á (SEC)£¬Ä³Ð©ÏµÍ³ÔÚÍøÂç¹¥»÷ºó±»¹Ø±Õ¡£¸ÃÊÂÎñÊÇÔÚ 4 Ô 14 ÈÕ·¢Ã÷µÄ£¬ÆäʱµÚÈý·½¡°Î´¾­ÊÚȨ»á¼ûÁËÆ䲿·ÖÐÅÏ¢ÊÖÒÕÇéÐΡ£Frontier ÌåÏÖ£¬ËüÁ¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬²¢½ÓÄɲ½·¥¿ØÖÆÊÂÎñ£¬°üÀ¨¹Ø±ÕijЩϵͳ£¬Õâ¡°µ¼ÖÂÁË¿ÉÄܱ»ÊÓΪÖØ´óµÄÔËÓªÖÐÖ¹¡±¡£¾Ý Frontier ³Æ£¬Õâ´Î¹¥»÷ºÜ¿ÉÄÜÊÇÒ»¸öÍøÂç·¸·¨×éÖ¯ËùΪ£¬¸Ã×éÖ¯»ñµÃÁËÖÖÖÖÀàÐ͵ÄÊý¾Ý£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¸Ã¹«Ë¾»¹Ö¸³ö£¬ËüÒÑִ֪ͨ·¨²¿·Ö£¬¸ÃÊÂÎñ¿ÉÄܲ»»á¶ÔÆä²ÆÎñ״̬»òÔËÓªÒµ¼¨±¬·¢ÖØ´óÓ°Ïì¡£ËäÈ» Frontier ûÓÐ˵Ã÷ËüÔâÊÜÁËÄÄÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬µ«ºÜ¿ÉÄÜÉæ¼°Îļþ¼ÓÃÜÀÕË÷Èí¼þ£¬ÓÉÓڹرÕϵͳÊǶÔÀÕË÷Èí¼þµÄµä·¶ÏìÓ¦¡£Õâ¼ÒµçОÞÍ·»¹ÔÚÆäÍøÕ¾ÉÏÐû²¼ÁË֪ͨ£¬¼û¸æ»á¼ûÕßËüÕýÔÚÂÄÀú¡°ÎÒÃǵÄÄÚ²¿Ö§³ÖϵͳµÄÊÖÒÕÎÊÌ⡱¡£¿Í»§µÄ»¥ÁªÍø·þÎñ²¢Î´Êܵ½¹¥»÷µÄÓ°Ï죬µ«½öͨ¹ýµç»°Ìṩ×ÊÖú¡£


https://www.securityweek.com/frontier-communications-shuts-down-systems-following-cyberattack/


3. ÍŽá¹ú¿ª·¢ÍýÏëÊð (UNDP) ÊÓ²ìÆäÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ


4ÔÂ21ÈÕ£¬ÍŽá¹ú¿ª·¢ÍýÏëÊð (UNDP) ÕýÔÚÊÓ²ìÍþвÐÐΪÕßÈëÇÖÆä IT ϵͳÇÔÈ¡ÈËÁ¦×ÊÔ´Êý¾Ýºó±¬·¢µÄÍøÂç¹¥»÷¡£ÍŽá¹ú¿ª·¢ÍýÏëÊðÊÇÍŽá¹úµÄÈ«ÇòÉú³¤ÍøÂ磬ÔÚ 170 ¶à¸ö¹ú¼ÒºÍµØÇø¿ªÕ¹ÊÂÇ飬ÒÀÀµÍŽá¹ú³ÉÔ±¹úºÍ˽Ӫ²¿·Ö/¶à±ß×éÖ¯µÄ¾èÇ®À´×ÊÖúÏû³ýƶÀ§¡¢Ïû³ý²»Ò»ÂɺÍÇãÔþ¡£3 Ô 27 ÈÕ£¬¿ª·¢ÊðÊÕµ½ÍþвÇ鱨֪ͨ£¬³ÆÒ»ÃûÊý¾ÝÀÕË÷ÕßÇÔÈ¡ÁËÊý¾Ý£¬ÆäÖаüÀ¨Ä³Ð©ÈËÁ¦×ÊÔ´ºÍ²É¹ºÐÅÏ¢£¬ÍŽá¹ú¿ª·¢ÍýÏëÊðÏÖÔÚÕýÔÚÊÓ²ì¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ££¬²¢ÆÀ¹À´Ë´Î¹¥»÷¶ÔÐÅÏ¢±»µÁСÎÒ˽¼ÒµÄÓ°Ïì¡£Ëü»¹ÏòÊܸÃÎó²îÓ°ÏìµÄÈË·¢³ö¾¯±¨£¬ÏÖÔÚÕýÔÚÓëËûÃÇÏàÖú£¬ÒÔ±ãËûÃÇÄܹ»± £»¤×Ô¼ºµÄСÎÒ˽¼ÒÐÅÏ¢ÃâÔâÀÄÓá£ËäȻ͎á¹ú»ú¹¹ÉÐ佫´Ë´Î¹¥»÷ÓëÌض¨Íþв×éÖ¯ÁªÏµÆðÀ´£¬µ« 8Base ÀÕË÷Èí¼þÍÅ»ïÓÚ 3 Ô 27 ÈÕÔÚÆä°µÍøÊý¾Ýй¶ÍøÕ¾ÉÏÌí¼ÓÁËÐ嵀 UNDP ÌõÄ¿¡£¹¥»÷ÕßÌåÏÖ£¬ËûÃǵIJÙ×÷Ô±ÔÚй¶ʱ´úÏ뷨鶵ÄÎļþ°üÀ¨´ó×ÚÃô¸ÐÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/united-nations-agency-investigates-ransomware-attack-claimed-by-8Base-gang/


4. MITRE ÔâÓöÍøÂç¹¥»÷£¬ºÚ¿ÍʹÓà Ivanti ÁãÈÕÎó²î


4ÔÂ19ÈÕ£¬ÍøÂçÇå¾²Ñо¿ºÍ¿ª·¢ÁìÓòµÄÁìÏÈ×éÖ¯ MITRE ×î½üÅû¶ÁËÒ»ÆðÖØ´óµÄÍøÂçÎó²î£¬Í¹ÏÔÁËÏÖ´úÍøÂçÍþвһֱÑݱäµÄÐÔ×ÓÒÔ¼°Ç¿ÓÐÁ¦µÄÍøÂçÇå¾²²½·¥µÄÖ÷ÒªÐÔ¡£¸ÃÊÂÎñÓÚ 2024 Äê 4 Ô»ñµÃ֤ʵ£¬Éæ¼° MITRE µÄÍøÂçʵÑé¡¢Ñо¿ºÍÐéÄ⻯ÇéÐÎ (NERVE) µÄй¶£¬NERVE ÊÇÒ»¸öÓÃÓÚÑо¿¡¢¿ª·¢ºÍÔ­ÐÍÉè¼ÆµÄЭ×÷ÍøÂç¡£ÔÚ¼ì²âµ½¿ÉÒÉÔ˶¯ºó£¬MITRE Á¬Ã¦½ÓÄÉÐж¯¿ØÖÆÊÂÎñ£¬°üÀ¨Ê¹ NERVE ÇéÐÎÏÂÏߣ¬²¢ÔÚÄÚ²¿ºÍÁìÏȵĵÚÈý·½×¨¼ÒµÄÖ§³ÖÏÂÕö¿ªÊӲ졣¼ì²âµ½Îó²îºó£¬MITRE ÁªÏµÁËÕþ¸®£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¸÷·½£¬²¢ÕýÔÚÆð¾¢»Ö¸´ÒÔÇå¾²·½·¨¾ÙÐÐЭ×÷µÄ²Ù×÷Ìæ»»¼Æ»®¡£ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬ÒÔÈ·¶¨¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢¹æÄ£¡£¸Ã¹«Ë¾ÔÊÐíËæ×ÅÊÓ²ìµÄ¼ÌÐøºÍ¿¢Ê£¬·ÖÏí¸ü¶àÐÅÏ¢¡£Ëæ×ÅÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬MITREÌáµ½£¬Ã»Óм£ÏóÅú×¢MITREµÄ½¹µãÆóÒµÍøÂç»òÏàÖúͬ°éµÄϵͳÊܵ½´ËÊÂÎñµÄÓ°Ïì¡£


https://www.cyberkendra.com/2024/04/mitre-suffers-cyber-breach-hacker.html#google_vignette


5. MadMxShell ÒÔ IT ÍŶÓΪĿµÄ¿ªÕ¹¶ñÒâ¹ã¸æÔ˶¯


4ÔÂ21ÈÕ£¬ÔÚÍøÂç¹¥»÷Ò»Ö±ÑݱäµÄÅä¾°Ï£¬Ð·¢Ã÷µÄÃûΪ¡°MadMxShell¡±µÄºóÃÅ¶Ô IT Çå¾²×é³ÉÁËÆæÒìµÄÍþв¡£Zscaler ThreatLabz×î½üµÄÒ»·Ý±¨¸æÏêϸÏÈÈÝÁËÕâ¸öºóÃÅ£¬Ëü¾­ÓÉÈ«ÐÄÉè¼Æ£¬Ö¼ÔÚÌӱܼì²â£¬Í¬Ê±Õë¶ÔÈÏÕæ×éÖ¯ÍøÂç·ÀÓùµÄСÎÒ˽¼Ò¡£MadMxShell Ô˶¯ÌåÏÖÁ˸߼¶ÍøÂç·¸·¨·Ö×ӵĽÆÕ©ºÍÄÍÐÄ¡£¹¥»÷ÕßÈ«ÐĽ¨ÉèڲƭÐÔÍøÕ¾£¬Ä£Äâ IT רҵְԱ³£ÓõÄÕýµ±Èí¼þ£¨ÀýÈçÍøÂçɨÃèÒǺÍϵͳÖÎÀí¹¤¾ß£©µÄÍâ¹Û¡£Ñ©ÉϼÓ˪µÄÊÇ£¬ÕâЩÐéαÍøÕ¾»¹Ê¹Óà Google Ads ¾ÙÐÐÆð¾¢Íƹ㣬½«ÆäÍÆÖÁËÑË÷Ч¹ûµÄ¶¥²¿£¬²¢Ìá¸ßÁËÄ¿µÄÊÜÖڵĿɼû¶È¡£Õë¶Ô IT רҵְԱµÄÈ«ÐÄÑ¡ÔñÒâζ×Å¿ÉÄÜÔì³ÉÆÕ±éµÄË𺦡£ÕâЩÈËÓµÓжÔÃô¸ÐϵͳºÍÍøÂçÊý¾ÝµÄ»á¼ûȨÏÞ¡£Êܵ½ MadMxShell ¹¥»÷µÄ IT ÍŶӿÉÄÜ»áΪ¹¥»÷ÕßÌṩÆÆËðÐÔÆÆËðµÄÊֶΣ¬ÉõÖÁΪËûÃÇÌṩÃû¹óµÄ»á¼ûȨÏÞÒÔ½«Æä³öÊÛ¸øÆäËû·¸·¨¼¯ÍÅ¡£


https://securityonline.info/stealthy-madmxshell-backdoor-targets-it-teams-in-malvertising-campaign/


6. Ð嵀 RedLine Stealer ±äÖÖαװ³ÉÓÎÏ·Íâ¹Ò¾ÙÐй¥»÷


4ÔÂ22ÈÕ£¬Âõ¿Ë·ÆʵÑéÊÒµÄÊÓ²ìЧ¹ûÏÔʾ£¬ÒѾ­·¢Ã÷Ò»ÖÖеÄÐÅÏ¢ÇÔÈ¡³ÌÐòʹÓà Lua ×Ö½ÚÂëÀ´ÔöÇ¿Òþ²ØÐÔºÍÖØ´óÐÔ¡£¸ÃÍøÂçÇå¾²¹«Ë¾Òѽ«ÆäÆÀ¹ÀΪÃûΪ RedLine Stealer µÄÒÑÖª¶ñÒâÈí¼þµÄ±äÌ壬ÓÉÓÚÏÂÁîÓë¿ØÖÆ (C2) ·þÎñÆ÷IP µØµã֮ǰÒѱ»Ê¶±ðΪÓë¸Ã¶ñÒâÈí¼þÏà¹Ø¡£RedLine StealerÓÚ 2020 Äê 3 ÔÂÊ״μͼ£¬Í¨³£Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æÔ˶¯Ö±½Ó»òͨ¹ýÎó²îʹÓù¤¾ß°üºÍ¼ÓÔØÆ÷¶ñÒâÈí¼þ£¨ÈçdotRunpeXºÍHijackLoader £©Èö²¥¡£ÕâÖÖÏֳɵĶñÒâÈí¼þÄܹ»´Ó¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN Èí¼þºÍÍøÂçä¯ÀÀÆ÷ÖÐÍøÂçÐÅÏ¢£¬ÀýÈçÉúÑĵÄƾ֤¡¢×Ô¶¯Íê³ÉÊý¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍ»ùÓÚÊܺ¦Õß IP µØµãµÄµØÀíλÖ᣶àÄêÀ´£¬RedLine Stealer Òѱ»¶à¸öÍþв¼ÓÈëÕßÄÉÈëÆä¹¥»÷Á´£¬Ê¹Æä³ÉΪºá¿ç±±ÃÀ¡¢ÄÏÃÀ¡¢Å·ÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵÄÊ¢Ðв¡¶¾¡£McAfee ·¢Ã÷µÄѬȾÐòÁÐÀÄÓÃÁË GitHub£¬Ê¹Óà Microsoft µÄÁ½¸ö¹Ù·½´æ´¢¿âÀ´ÊµÏÖ C++ ±ê×¼¿â ( STL ) ºÍvcpkg£¬ÒÔ ZIP ´æµµµÄÐÎʽÍйܳäÂú¶ñÒâÈí¼þµÄÓÐÓøºÔØ¡£


https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html