MITRE Ðû²¼Ç¶Èëʽװ±¸ EMB3D ÍøÂçÇå¾²Íþвģ×Ó

Ðû²¼Ê±¼ä 2024-05-15
1. MITRE Ðû²¼Ç¶Èëʽװ±¸ EMB3D ÍøÂçÇå¾²Íþвģ×Ó


5ÔÂ14ÈÕ£¬£¬£¬£¬£¬MITRE Óë Red Balloon Security¡¢Narf Industries ºÍ Niyo Little Thunder Pearson (ONEGas, Inc.) ÏàÖúÍÆ³öÁË EMB3D£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖÖÜÈ«µÄÍþвģ×Ó£¬£¬£¬£¬£¬Ö¼ÔÚ½â¾öÒªº¦»ù´¡ÉèÊ©ÁìÓòǶÈëʽװ±¸ÃæÁÙµÄÈÕÒæÔöÌíµÄÍøÂçÇ徲Σº¦¡£¡£¡£ ¡£¡£¡£¡£Ç¶Èëʽװ±¸ÆÕ±éÓ¦ÓÃÓÚʯÓͺÍ×ÔÈ»Æø¡¢µçÁ¦¡¢Ë®ÖÎÀí¡¢Æû³µ¡¢Ò½ÁÆ¡¢ÎÀÐÇ¡¢×ÔÖ÷ϵͳºÍÎÞÈË»úϵͳµÈÐÐÒµ£¬£¬£¬£¬£¬µ«ÍùÍùȱ·¦Êʵ±µÄÇå¾²¿ØÖÆ£¬£¬£¬£¬£¬²¢ÇÒûÓжÔÎó²î¾ÙÐгä·ÖµÄ²âÊÔ¡£¡£¡£ ¡£¡£¡£¡£Ëæ×ÅÖØ´óµÄÍøÂçµÐÊÖÔ½À´Ô½¶àµØÕë¶ÔÕâЩװ±¸£¬£¬£¬£¬£¬EMB3D Ö¼ÔÚÌṩ¶ÔËù×é³ÉÍþвµÄÅäºÏÃ÷È·ÒÔ¼°»º½âÕâЩÍþвËùÐèµÄÇå¾²»úÖÆ¡£¡£¡£ ¡£¡£¡£¡£EMB3D Óë³£¼ûÈõµãö¾Ù (CWE)¡¢MITRE ATT&CK?ÒÔ¼°³£¼ûÎó²îºÍ̻¶ (CVE) µÈÏÖÓÐÄ£×Ó¼á³ÖÒ»Ö²¢¾ÙÐÐÀ©Õ¹£¬£¬£¬£¬£¬µ«ÌØÊâ¹Ø×¢Ç¶Èëʽװ±¸¡£¡£¡£ ¡£¡£¡£¡£¸Ã¿ò¼ÜÌṩÁËǶÈëʽװ±¸ÍøÂçÍþвµÄ¸»ºñ֪ʶ¿â£¬£¬£¬£¬£¬°üÀ¨ÔÚÏÖ³¡ÇéÐÎÖÐÊӲ쵽µÄ¡¢Í¨¹ý¿´·¨Ñé֤֤ʵµÄ»ò´ÓÀíÂÛÑо¿ÖеóöµÄÍþв¡£¡£¡£ ¡£¡£¡£¡£


https://gbhackers.com/emb3d-cybersecurity-threat-model/


2. Ñо¿ÍŶӷ¢Ã÷SliverÃé×¼macOS²¢×°ÖúóÃÅ


5ÔÂ13ÈÕ£¬£¬£¬£¬£¬Sliver ÊÇÒ»¿î¿çƽ̨£¨Windows¡¢macOS¡¢Linux£© ¿ªÔ´¶Ô¿¹¿ò¼Ü²âÊÔÌ×¼þ£¬£¬£¬£¬£¬×¨Îª¡°ºì¶Ó¡±²Ù×÷¶øÉè¼Æ£¬£¬£¬£¬£¬ÔÚ²âÊÔÍøÂç·ÀÓùʱģÄâµÐÊÖµÄÐÐΪ¡£¡£¡£ ¡£¡£¡£¡£ÆäÖ÷Òª¹¦Ð§°üÀ¨×Ô½ç˵ֲÈëÌìÉú¡¢ÏÂÁîºÍ¿ØÖÆ (C2) ¹¦Ð§¡¢ºóʹÓù¤¾ß/¾ç±¾ÒÔ¼°¸»ºñµÄ¹¥»÷Ä£ÄâÑ¡Ïî¡£¡£¡£ ¡£¡£¡£¡£ÔÚ Phylum ·¢Ã÷µÄ×îй¥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°requests-darwin-lite¡±µÄ macOS ¶ñÒâ Python °ü£¬£¬£¬£¬£¬ËüÊÇÊ¢Ðеġ°requests¡±¿âµÄÁ¼ÐÔ·ÖÖ§¡£¡£¡£ ¡£¡£¡£¡£¸Ã°üÍйÜÔÚ PyPI ÉÏ£¬£¬£¬£¬£¬ÔÚ´øÓÐ Requests »Õ±êµÄ 17MB PNG ͼÏñÎļþÖаüÀ¨ Sliver µÄ¶þ½øÖÆÎļþ¡£¡£¡£ ¡£¡£¡£¡£ÔÚ macOS ϵͳÉÏ×°ÖÃʱ´ú£¬£¬£¬£¬£¬»áÖ´ÐÐ PyInstall ÀàÀ´½âÂë Base64 ±àÂëµÄ×Ö·û´®£¬£¬£¬£¬£¬ÒÔÔËÐмìË÷ϵͳµÄ UUID£¨Í¨ÓÃΨһ±êʶ·û£©µÄÏÂÁî (ioreg)¡£¡£¡£ ¡£¡£¡£¡£UUID ÓÃÓÚÑéÖ¤°üÊÇ·ñ×°ÖÃÔÚÏÖʵĿµÄÉÏ£¬£¬£¬£¬£¬²¢½«ÆäÓëÔ¤½ç˵µÄ UUID ¾ÙÐнÏÁ¿¡£¡£¡£ ¡£¡£¡£¡£µ±±£´æÆ¥Åäʱ£¬£¬£¬£¬£¬»á´ÓÎļþÆ«ÒÆ´¦µÄÌØ¶¨²¿·Ö¶ÁÈ¡²¢ÌáÈ¡ PNG ÎļþÄÚµÄ Go ¶þ½øÖÆÎļþ¡£¡£¡£ ¡£¡£¡£¡£Sliver ¶þ½øÖÆÎļþ±»Ð´ÈëÍâµØÎļþ²¢ÐÞ¸ÄÎļþȨÏÞÒÔʹÆä¿ÉÖ´ÐУ¬£¬£¬£¬£¬²¢×îÖÕÔÚºǫ́Æô¶¯¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/


3. INC ÀÕË÷Èí¼þÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÊÛ¼Û 30 ÍòÃÀÔª


5ÔÂ13ÈÕ£¬£¬£¬£¬£¬Ò»ÃûÃûΪ¡°salfetka¡±µÄÍøÂç·¸·¨·Ö×ÓÉù³ÆÕýÔÚ³öÊÛ INC Ransom µÄÔ´´úÂ룬£¬£¬£¬£¬INC Ransom ÊÇÒ»ÏîÓÚ 2023 Äê 8 ÔÂÍÆ³öµÄÀÕË÷Èí¼þ¼´Ð§ÀÍ (RaaS) ¡£¡£¡£ ¡£¡£¡£¡£INC ´ËǰµÄÄ¿µÄÊÇÊ©ÀÖÉÌÒµ½â¾ö¼Æ»®¹«Ë¾ (XBS) µÄÃÀ¹ú·Ö²¿ ¡¢·ÆÂɱöÑÅÂí¹þÆû³µ¹«Ë¾£¬£¬£¬£¬£¬ÒÔ¼°×î½üµÄËÕ¸ñÀ¼ ¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ (NHS)¡£¡£¡£ ¡£¡£¡£¡£ÔÚÉæÏÓ³öÊÛµÄͬʱ£¬£¬£¬£¬£¬INC Êê½ðÓªÒµÕýÔÚ±¬·¢×ª±ä£¬£¬£¬£¬£¬Õâ¿ÉÄÜÅú×¢Æä½¹µãÍŶӳÉÔ±Ö®¼ä±£´æÁѺۣ¬£¬£¬£¬£¬»òÕßÍýÏë½øÈëÉæ¼°Ê¹ÓÃÐÈÎÃüÜÆ÷µÄÐÂÆªÕ¡£¡£¡£ ¡£¡£¡£¡£ÍþвÐÐΪÕßÐû²¼ÔÚ Exploit ºÍ XSS ºÚ¿ÍÂÛ̳ÉϳöÊÛ INC µÄ Windows ºÍ Linux/ESXi °æ±¾£¬£¬£¬£¬£¬Òª¼Û 30 ÍòÃÀÔª£¬£¬£¬£¬£¬²¢½«Ç±ÔÚÂò¼ÒÊýÄ¿ÏÞÖÆÎªÈý¸ö¡£¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤·¢Ã÷´Ë´ÎÏúÊÛµÄ KELAÍþвÇ鱨ר¼ÒÏò BleepingComputer ÌṩµÄÐÅÏ¢£¬£¬£¬£¬£¬ÂÛ̳Ìû×ÓÖÐÌáµ½µÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬ÀýÈçÔÚ CTR ģʽÏÂʹÓà AES-128 ºÍ Curve25519 Donna Ëã·¨£¬£¬£¬£¬£¬Óë  INC Ransom µÄ¹ûÕæÆÊÎöÒ»ÖÂÑùÆ·¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/


4. ¹È¸èÒâÍâɾ³ýÁ˼ÛÖµ1250ÒÚÃÀÔªµÄÑøÀÏ»ù½ðÕË»§


5ÔÂ13ÈÕ£¬£¬£¬£¬£¬¹È¸è×î½ü·¸ÁËÒ»¸ö´ó¹ýʧ¡£¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾²»Ð¡ÐÄɾ³ýÁ˼ÛÖµ 1250 ÒÚÃÀÔªµÄ°Ä´óÀûÑÇÑøÀÏ»ù½ð UniSuper µÄ˽ÈË Google Cloud ÕË»§¡£¡£¡£ ¡£¡£¡£¡£Ð§¹ûÊÇ£º¾Ý¡¶ÎÀ±¨¡·ÉÏÖܱ¨µÀ£¬£¬£¬£¬£¬Áè¼Ý 50 Íò UniSuper »ù½ð»áÔ±ÔÚԼĪһÖܵÄʱ¼äÀïÎÞ·¨»á¼û×Ô¼ºµÄÕË»§¡£¡£¡£ ¡£¡£¡£¡£UniSuperÔÚÁíÒ»¼ÒÔÆÌṩÉÌÓÐÒ»¸ö±¸·ÝÕÊ»§£¬£¬£¬£¬£¬Ð§ÀÍÓÚ5ÔÂ2ÈÕ»Ö¸´¡£¡£¡£ ¡£¡£¡£¡£ËäÈ»¹È¸èÌåÏÖ£¬£¬£¬£¬£¬ÕâÖÖ¹ýʧÒÔǰ´ÓδÔÚÔÆÉϱ¬·¢¹ý£¬£¬£¬£¬£¬µ«·ºÆð¹ÊÕϺÍÖÐÖ¹µÄ¿ÉÄÜÐÔÒýÆðÁËÔ½À´Ô½¶àµØ½«Êý¾Ý×ªÒÆµ½ÔÆÈí¼þÌṩÉ̵Ĺ«Ë¾ºÍÕþ¸®µÄµ£ÐÄ¡£¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾½ñÄêÌåÏÖ£¬£¬£¬£¬£¬È«Çò 1000 ¼Ò×îÖÁ¹«Ë¾ÖÐÔ¼60% µÄ¹«Ë¾ºÍ 90% µÄÌìÉúÐÍÈ˹¤ÖÇÄܶÀ½ÇÊÞ¹«Ë¾¶¼ÊǸù«Ë¾µÄ¿Í»§¡£¡£¡£ ¡£¡£¡£¡£È«Çò½ü 50 Íò¼Ò¹«Ë¾Ê¹Óà Google Cloud ×÷Ϊ¡°Æ½Ì¨¼´Ð§ÀÍ¡±»òÃæÏò¿Í»§µÄ¹¤¾ß£¬£¬£¬£¬£¬ÆäÖаüÀ¨¹«¹²Æû³µºÍ¼ÓÄôó»Ê¼ÒÒøÐС£¡£¡£ ¡£¡£¡£¡£


https://qz.com/google-cloud-pension-fund-unisuper-1851472990


5. LockBit Black ÀÕË÷¹¥»÷»î¶¯ÒÑ·¢ËÍÊý°ÙÍò·âµç×ÓÓʼþ


5ÔÂ13ÈÕ£¬£¬£¬£¬£¬×Ô 4 Ô·ÝÒÔÀ´£¬£¬£¬£¬£¬ÒÑͨ¹ý Phorpiex ½©Ê¬ÍøÂç·¢ËÍÁËÊý°ÙÍò·â´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬ÒÔ¿ªÕ¹´ó¹æÄ£µÄ LockBit Black ÀÕË÷Èí¼þ»î¶¯¡£¡£¡£ ¡£¡£¡£¡£ÕýÈçÐÂÔóÎ÷ÖÝÍøÂçÇå¾²ºÍͨѶ¼¯³ÉС×é (NJCCIC) ÖÜÎåÖÒÑÔµÄÄÇÑù£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓðüÀ¨°²ÅÅ LockBit Black ÓÐÓøºÔصĿÉÖ´ÐÐÎļþµÄ ZIP ¸½¼þ£¬£¬£¬£¬£¬¸ÃÓÐÓøºÔØÒ»µ©Æô¶¯¾Í»á¶ÔÎüÊÕÕßµÄϵͳ¾ÙÐмÓÃÜ¡£¡£¡£ ¡£¡£¡£¡£ÕâЩ¹¥»÷Öа²ÅÅµÄ LockBit Black ¼ÓÃÜÆ÷ºÜ¿ÉÄÜÊÇʹÓÃÒ»ÃûÐÄ»³²»ÂúµÄ¿ª·¢Ö°Ô±ÓÚ 2022 Äê 9 ÔÂÔÚ Twitter ÉÏй¶µÄ LockBit 3.0 ¹¹½¨Æ÷¹¹½¨µÄ¡£¡£¡£ ¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬¾ÝПûÓëÏÖʵµÄ LockBit ÀÕË÷Èí¼þ²Ù×÷ûÓÐÈκιØÏµ¡£¡£¡£ ¡£¡£¡£¡£ÕâÐ©ÍøÂç´¹ÂÚµç×ÓÓʼþ´øÓС°ÄúµÄÎĵµ¡±ºÍ¡°ÄúµÄÕÕÆ¬ £¿£¿£¿£¿£¿£¿ £¿£¿£¿£¿£¿£¿ £¿£¿£¿£¿£¿£¿¡±Ö÷ÌâÐÐʹÓá°Jenny Brown¡±»ò¡°Jenny Green¡±ÓÖÃû´ÓÈ«Çò 1,500 ¶à¸öΨһ IP µØµã·¢ËÍ£¬£¬£¬£¬£¬ÆäÖаüÀ¨¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹¡¢ÒÁÀÊ¡¢¶íÂÞ˹ºÍÖйú¡£¡£¡£ ¡£¡£¡£¡£µ±ÊÕ¼þÈË·­¿ª¶ñÒâ ZIP ´æµµ¸½¼þ²¢Ö´ÐÐÆäÖеĶþ½øÖÆÎļþʱ£¬£¬£¬£¬£¬¹¥»÷Á´¾Í×îÏÈÁË¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign/


6. ºÚ¿ÍʹÓà DNS ËíµÀ¾ÙÐÐÍøÂçɨÃèºÍ¸ú×ÙÊܺ¦Õß


5ÔÂ14ÈÕ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓÃÓòÃûϵͳ (DNS) ËíµÀÀ´¸ú×ÙÆäÄ¿µÄºÎʱ·­¿ªÍøÂç´¹ÂÚµç×ÓÓʼþ²¢µ¥»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬²¢É¨ÃèÍøÂçÒÔ²éÕÒDZÔÚÎó²î¡£¡£¡£ ¡£¡£¡£¡£DNS ËíµÀÊǶÔͨ¹ý DNS ÅÌÎÊ·¢ËͺͼìË÷µÄÊý¾Ý»òÏÂÁî¾ÙÐбàÂ룬£¬£¬£¬£¬ÊµÖÊÉÏÊǽ« DNS£¨»ù±¾ÍøÂçͨѶ×é¼þ£©×ª±äΪÒþ²ØµÄͨѶͨµÀ¡£¡£¡£ ¡£¡£¡£¡£ÍþвÐÐΪÕßÒÔÖÖÖÖ·½·¨¶ÔÊý¾Ý¾ÙÐбàÂ룬£¬£¬£¬£¬ÀýÈç Base16 »ò Base64 »ò×Ô½ç˵Îı¾±àÂëËã·¨£¬£¬£¬£¬£¬Òò´Ë¿ÉÒÔÔÚÅÌÎÊ DNS ¼Í¼£¨ÀýÈç TXT¡¢MX¡¢CNAME ºÍµØµã¼Í¼£©Ê±·µ»ØËüÃÇ¡£¡£¡£ ¡£¡£¡£¡£ºÚ¿Íͨ³£Ê¹Óà DNS ËíµÀÀ´ÈƹýÍøÂç·À»ðǽºÍ¹ýÂËÆ÷£¬£¬£¬£¬£¬Ê¹ÓøÃÊÖÒÕ¾ÙÐÐÏÂÁîºÍ¿ØÖÆ (C2) ÒÔ¼°ÐéÄâרÓÃÍøÂç (VPN) ²Ù×÷¡£¡£¡£ ¡£¡£¡£¡£»£»£ÉÐÓÐÕýµ±µÄ DNS ËíµÀÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÀýÈçÓÃÓÚÈÆ¹ýÉó²éÖÆ¶È¡£¡£¡£ ¡£¡£¡£¡£×î½ü·¢Ã÷µÄÁ½¸ö¹¥»÷»î¶¯»®·ÖÊÇTrkCdnºÍSecShow¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/