LastPass¹«Ë¾¿ª·¢Ö°Ô±µÄϵͳÔâµ½¹¥»÷µ¼ÖÂÔ´´úÂëй¶
Ðû²¼Ê±¼ä 2022-08-26
¾ÝýÌå8ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬LastPass¹«Ë¾Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Ô´´úÂëºÍרÓÐÊÖÒÕÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¡£LastPassÊÇÈ«Çò×î´óµÄÃÜÂëÖÎÀí¹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬±»Áè¼Ý3300ÍòÈ˺Í100000¼ÒÆóҵʹÓᣡ£¡£¡£¡£¡£¡£LastPassµÄͨ¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÇͨ¹ý»á¼û¹«Ë¾¿ª·¢Ö°Ô±µÄϵͳÖеÄÊÜËðÕÊ»§ÈëÇֵġ£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿Í»§µÄÊý¾Ý»ò¼ÓÃܵÄÃÜÂë¿âδÊÜÓ°Ï죬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßȷʵÇÔÈ¡ÁËËûÃǵIJ¿·ÖÔ´´úÂëºÍLastPassµÄרÓÐÊÖÒÕÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£È¥Ä꣬£¬£¬£¬£¬£¬LastPassÔâµ½ÁËײ¿â¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɻñµÃÓû§µÄÖ÷ÃÜÂë¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/
2¡¢Á÷ýÌåÆ½Ì¨Plex±¬·¢Êý¾Ýй¶²¢±Þ²ßÓû§¾¡¿ìÖØÖÃÃÜÂë
¾Ý8ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁ÷ýÌåÆ½Ì¨Plex·¢Ã÷ÆäÊý¾Ý¿âÔâµ½ÁËδ¾ÊÚȨµÄ»á¼ûºó£¬£¬£¬£¬£¬£¬ÏòÓû§·¢ËÍÁËÃÜÂëÖØÖÃ֪ͨ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜ»á¼ûÁËÓʼþµØµã¡¢Óû§ÃûºÍÃÜÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬Ò»Ð©Óû§±¨¸æÅú×¢¸ÃÎÊÌâ²»»áÓ°ÏìÃâ·ÑÕÊ»§£¬£¬£¬£¬£¬£¬¿ÉÄÜÖ»Óи¶·ÑÕÊ»§Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬Plex.tvÍøÕ¾·ºÆðÁËÖÐÖ¹£¬£¬£¬£¬£¬£¬Plex×´Ì¬Ò³ÃæÌåÏÖÕýÔÚÊÓ²ìÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÆäÖÐÖ¹ÊÇ·ñÓëδ¾ÊÚȨµÄ»á¼ûÓйأ¬£¬£¬£¬£¬£¬ÕÕ¾ÉÒ»´ÎÕë¶Ô¸Ãƽ̨µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/134814/data-breach/plex-data-breach.html
3¡¢RansomEXX³Æ¶ÔÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÈÏÕæ
ýÌå8ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïRansomEXXÉù³Æ¶Ô¼ÓÄôóÅӰ͵ÏÓéÀÖ²úÆ·(BRP)µÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ÒªÉú²úSki-DooÑ©µØ³µ¡¢Sea-DooÅçÆø»¬Ñ©¡¢ATV¡¢Ä¦Íгµ¡¢Ë®³µºÍRotax·¢ÄîÍ·µÈ£¬£¬£¬£¬£¬£¬ÄêÏúÊÛ¶î¿¿½ü60ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÔÚÔâµ½¹¥»÷ºóËùÓÐÓªÒµÔÝʱ×èÖ¹¡£¡£¡£¡£¡£¡£¡£BRPÔÚ8ÔÂ8ÈÕÅû¶´Ë¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÓÚ8ÔÂ15ÈÕ͸¶¼ÓÄô󡢷ÒÀ¼¡¢ÃÀ¹úºÍ°ÂµØÀûµÄ4¸ö¹¤³§»Ö¸´Éú²ú£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁ˳õ³ÌÐò²éЧ¹û£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÇͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉÌÈëÇÖÆäϵͳ¡£¡£¡£¡£¡£¡£¡£8ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬RansomEXXÉù³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄ29.9GBÎļþ£¬£¬£¬£¬£¬£¬°üÀ¨±£ÃÜÐÒé¡¢»¤ÕÕºÍÉí·ÝÖ¤¡¢ÖÊÁϹ©Ó¦ÐæÅºÍÐøÇ©ÌõÔ¼µÈ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/
4¡¢Microsoft¼ì²âµ½Ê¹ÓÿªÔ´µÄC2¿ò¼ÜSliverµÄÇ÷ÊÆÔöÌí
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬MicrosoftÌåÏÖÒѼì²âµ½Ê¹ÓÿªÔ´C2¿ò¼ÜSliverµÄÇ÷ÊÆÉÏÉý¡£¡£¡£¡£¡£¡£¡£SliverÓÚ2019Äêµ×Ê״ιûÕæ£¬£¬£¬£¬£¬£¬Ö÷ÒªÃæÏòÇå¾²Ñо¿Ö°Ô±£¬£¬£¬£¬£¬£¬¿ÉÔÚGitHubÉÏʹÓ㬣¬£¬£¬£¬£¬°üÀ¨Ðí¶à³£¼ûµÄC2¿ò¼Ü¹¦Ð§¡£¡£¡£¡£¡£¡£¡£×Ô2020Äê12ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ðí¶à¹¥»÷Õß½«SliverÄÉÈëÎäÆ÷¿â£¬£¬£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÇRaaSÁ¥Êô×éÖ¯DEV-0237¡£¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßʹÓÃBumblebee£¨Ò²³ÆCOLDTRAIN£©×÷Ϊ³õʼ»á¼û¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬£¬À´×°ÖÃSliverµÈ¶àÖÖpost-compromise¹¤¾ß¡£¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
5¡¢Zscaler·¢Ã÷Ö÷ÒªÕë¶ÔG SuiteÓû§µÄAiTM´¹ÂÚ¹¥»÷
ýÌå8ÔÂ24Èճƣ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔGoogle G SuiteÓû§µÄÐÂÒ»ÂÖAiTM´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ½ñÄê7ÔÂÖÐÑ®×îÏÈ£¬£¬£¬£¬£¬£¬×¨ÃÅÕë¶ÔʹÓÃGoogle WorkspaceµÄÖÖÖÖ×éÖ¯µÄÊ×ϯִÐйٵȸ߹ܡ£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷´Ë´Î¹¥»÷ʹÓõÄTTPºÍ»ù´¡¼Ü¹¹ÓëÒÑÍù¼¸¸öÔÂÖÐÕë¶Ô΢ÈíÓû§µÄÓÐËùÖØµþ£¬£¬£¬£¬£¬£¬µ«Óë΢ÈíAiTM´¹ÂÚ¹¥»÷Ïà±ÈÄ¿µÄÊýĿҪÉٵöࡣ¡£¡£¡£¡£¡£¡£ÊÓ²ìÅú×¢£¬£¬£¬£¬£¬£¬µ¥¿¿¶àÒòËØÉí·ÝÑéÖ¤ÎÞ·¨µÖÓù¸ß¼¶´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Òò´ËÓû§±ØÐèÔÚÊäÈëÆ¾Ö¤Ö®Ç°×Ðϸ¼ì²éURL£¬£¬£¬£¬£¬£¬²¢×èÖ¹·¿ªÎ´ÖªÈªÔ´ºÍ²»ÊÜÐŵĸ½¼þ»òÁ´½Ó¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
6¡¢KasperskyÐû²¼Kimsuky½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
KasperskyÔÚ8ÔÂ25ÈÕÐû²¼Á˹ØÓÚKimsuky½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÓ뺫¹úÏà¹ØµÄʵÌ壬£¬£¬£¬£¬£¬²¢ÔÚºÜÊÇʵʱµØ¸üÐÂÆä¹¤¾ß¡£¡£¡£¡£¡£¡£¡£ÔÚÐµĹ¥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃHTMLÓ¦ÓóÌÐòÎļþÃûÌÃÀ´Ñ¬È¾Ä¿µÄ£¬£¬£¬£¬£¬£¬²¢ÎÞÒâʹÓÃHangeulÓÕ¶üÎĵµ£¬£¬£¬£¬£¬£¬³õʼѬȾºó»á×°ÖÃÒ»¸öVisual Basic¾ç±¾¡£¡£¡£¡£¡£¡£¡£Ö²ÈëµÄVBSÎļþÄܹ»·µ»ØÓйØÄ¿µÄ×°±¸µÄÐÅÏ¢²¢ÏÂÔØ±àÂëÃûÌÃµÄÆäËüpayload¡£¡£¡£¡£¡£¡£¡£×îºóÒ»¸ö½×¶ÎÊÇWindows¿ÉÖ´ÐÐÀàÐ͵ĶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¿É´ÓÄ¿µÄÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹Ö÷ÒªÏÈÈÝÁ˸ÃÍÅ»ïÊÇÔõÑùÔËÓªC2µÄ¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/