΢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
Ðû²¼Ê±¼ä 2023-04-181¡¢Î¢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
4ÔÂ13ÈÕ£¬£¬£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£´¹ÂÚÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬£¬£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£¡£¡£¡£ZIPÎĵµ°üÀ¨Ðí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬£¬£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½·¨¡£¡£¡£¡£¿£¿£¿£¿£¿ì½Ý·½·¨Ö´ÐÐPowerShell£¬£¬£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£¡£¡£¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬£¬£¬½ø¶ø×°ÖÃRemcos RAT¡£¡£¡£¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËȨÏÞ½øÒ»²½Èö²¥£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/
2¡¢ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª
ýÌå4ÔÂ15Èճƣ¬£¬£¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬£¬£¬ËðʧԼ2300ÍòÃÀÔª¡£¡£¡£¡£ÉùÃ÷ÌåÏÖ£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬£¬£¬°üÀ¨ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£¡£¡£¡£Bitrue³Æ£¬£¬£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø»á¼ûµÄÈÈÇ®°ü£¬£¬£¬Ö»°üÀ¨Bitrue×Ü×ʽðµÄ²»µ½5%£¬£¬£¬ÆäÓàÇ®°üÈÔÈ»Çå¾²¡£¡£¡£¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬£¬£¬Í¬Ê±¾ÙÐÐÇå¾²¼ì²é£¬£¬£¬ÍýÏëÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£¡£¡£¡£
https://therecord.media/bitrue-23million-stolen-cryptocurrency
3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ
²¨À¼¾üÊ·´Ç鱨¾Ö¼°ÅÌËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬£¬£¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷Óйء£¡£¡£¡£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬£¬£¬½üÆÚ»î¶¯µÄÐí¶àÒªËØ£¬£¬£¬°üÀ¨»ù´¡ÉèÊ©¡¢Ê¹ÓõÄÊÖÒպ͹¤¾ß£¬£¬£¬¶¼ÓëÒÑÍùµÄAPT29»î¶¯Öصþ¡£¡£¡£¡£¹¥»÷Õë¶ÔÍâ½»Ö°Ô±£¬£¬£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬£¬£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬°üÀ¨SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£
https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html
4¡¢AhnLab·¢Ã÷ÀÕË÷Èí¼þTrigona¹¥»÷MS-SQLЧÀÍÆ÷µÄ»î¶¯
AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQLЧÀÍÆ÷µÄ»î¶¯¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£¡£¡£¡£CLR ShellÓÐÒ»¸öʹÓÃÌáȨÎó²îµÄÀý³Ì£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£¡£¡£¡£MS-SQLÀú³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£¡£¡£¡£svcservice.exeÊÇÒ»¸ödropper£¬£¬£¬ËüÔÚͳһÆð¾¶ÉϽ¨Éè²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬£¬£¬¼´svchost.exe¡£¡£¡£¡£
https://asec.ahnlab.com/en/51343/
5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄÆÊÎö±¨¸æ
4ÔÂ14ÈÕ£¬£¬£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢Ö°Ô±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£¡£¡£¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬£¬£¬»®·ÖΪDomino BackdoorºÍDomino Loader¡£¡£¡£¡£Í¨³££¬£¬£¬Dave Loader»á·Ö·¢Domino Backdoor¡£¡£¡£¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬£¬£¬È»ºóÏÂÔØDomino Loader¡£¡£¡£¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£DominoµÄ´úÂëÓëLizarÓдó×ÚÖØµþ£¬£¬£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬£¬£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬£¬£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£¡£¡£¡£
https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/
6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄÆÊÎö±¨¸æ
4ÔÂ13ÈÕ£¬£¬£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸ÃÍÅ»ïµÄÕ½ÂÔֻרעÓÚÒ»¼þÊ£¬£¬£¬¼´µÍµ÷ÐÐÊ¡£¡£¡£¡£ËûÃǵÄÄ¿µÄ²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬£¬£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇéÐÎÏÂ׬Ǯ¡£¡£¡£¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿·ÖµÈ£¬£¬£¬ÒÔ¾¡¿ÉÄÜïÔ̹Ø×¢¡£¡£¡£¡£¸ÃÍÅ»ïµÄÓªÒµÉèÖ㬣¬£¬ÒªÇóÁ¥Êô»ú¹¹¼á³Ö»îÔ¾£¬£¬£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£¡£¡£¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬£¬£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£¡£¡£¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html