Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ

Ðû²¼Ê±¼ä 2024-05-23
1. Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ


5ÔÂ22ÈÕ £¬£¬£¬£¬Ò»¸öÓë¶íÂÞ˹Óйصĸ߼¶Ò»Á¬ÐÔÍþв (APT) ×éÖ¯Ò»Ö±ÔÚÀÄÓà PDF ºÍ MSBuild ÏîÄ¿Îļþ £¬£¬£¬£¬Ê¹ÓÃÉç½»¹¤³Ìµç×ÓÓʼþ½« TinyTurla ºóÃÅ×÷ΪÎÞÎļþ¸ºÔؾÙÐÐÈö²¥ ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬£¬¸Ã»î¶¯µÄÎÞ·ìÈö²¥³ÌÐòÔÚÖØ´óÐÔ·½ÃæÈ¡µÃÁËÏÔÖøµÄǰ½ø ¡£¡£¡£Cyble Ñо¿Ö°Ô±ºÍÇ鱨ʵÑéÊÒ (CRIL) µÄÑо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»»î¶¯ £¬£¬£¬£¬¸Ã»î¶¯Ê¹Óõç×ÓÓʼþºÍÔ¼ÇëÈËȨ×êÑлá»òÌṩ¹«¹²×ÉѯµÄÎļþ×÷ΪÓÕ¶ü £¬£¬£¬£¬ÒÔѬȾ TinyTurla Óû§ ¡£¡£¡£ËûÃÇÔÚ×òÌìÐû²¼µÄÓйظûµÄ²©¿ÍÎÄÕÂÖÐÌåÏÖ £¬£¬£¬£¬¹¥»÷Õß»¹Ã°³äÕýµ±Õþ¸® £¬£¬£¬£¬ÒÔÒýÓÕÊܺ¦ÕßÊÜÆ­ ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬£¬£¬TinyTurla ºóÃÅÓë¶íÂÞ˹×ÊÖúµÄºã¾ÃÍþв×éÖ¯TurlaÓÐ¹Ø £¬£¬£¬£¬¸Ã×é֯ͨ³£Õë¶Ô·ÇÕþ¸®×éÖ¯ £¬£¬£¬£¬¡°ÌØÊâÊÇÄÇЩÓëÖ§³ÖÎÚ¿ËÀ¼ÓÐÁªÏµµÄ×éÖ¯¡± ¡£¡£¡£Ìû×Ó³Æ £¬£¬£¬£¬ËûÃÇÒÔΪ¸Ã×éÖ¯ÊǶñÒâ¹¥»÷»î¶¯µÄÄ»ºóºÚÊÖ ¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russia-turla-apt-msbuild-tinyturla-backdoor


2. CISA ÖÒÑÔʹÓÃMirth ConnectÎó²îµÄ¹¥»÷»î¶¯


5ÔÂ21ÈÕ £¬£¬£¬£¬Mirth Connect ÊÇÒ»ÖÖÆÕ±éʹÓÃµÄ¿çÆ½Ì¨½çÃæÒýÇæ £¬£¬£¬£¬Ò½ÁƱ£½¡×éÖ¯½«ÆäÓÃÓÚÐÅÏ¢ÖÎÀí ¡£¡£¡£Ó°Ï쿪Դ²úÆ·µÄÎó²î CVE-2023-43208 ÊÇÒ»¸öÊý¾Ý·´ÐòÁл¯ÎÊÌâ £¬£¬£¬£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐ ¡£¡£¡£4.4.1 °æÐû²¼Ê±ÒÑÍÆ³ö²¹¶¡ ¡£¡£¡£¸ÃÎó²îÓÚ 2023 Äê 10 ÔÂÆØ¹â £¬£¬£¬£¬ÆäÊ±ÍøÂçÇå¾²¹«Ë¾ Horizon3.ai ÖÒÑԳƸÃÎó²î¿ÉÄܶÔÒ½ÁƱ£½¡¹«Ë¾Ôì³ÉÓ°Ïì ¡£¡£¡£CVE-2023-43208 ÊÇ CVE-2023-37679 µÄÒ»¸ö±äÌå £¬£¬£¬£¬Mirth Connect ¿ª·¢Ö°Ô±Ö®Ç°ÒÑÔÚ 4.4.0 °æÐû²¼Ê±¶Ô¸ÃÎó²î¾ÙÐÐÁËÐÞ²¹ ¡£¡£¡£Horizon3.ai Æäʱ½«¸ÃÎó²îÐÎòΪÒ×ÓÚʹÓà £¬£¬£¬£¬²¢ÖÒÑԳơ°¹¥»÷ÕߺܿÉÄÜʹÓôËÎó²î¾ÙÐгõʼ»á¼û»òÆÆËðÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡± ¡£¡£¡£¸ÃÇå¾²¹«Ë¾»¹Ö¸³ö £¬£¬£¬£¬·¢Ã÷ÁË 1,200 ¶à¸ö̻¶ÔÚ»¥ÁªÍøÉ쵀 NextGen Mirth Connect ʵÀý ¡£¡£¡£


https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/


3. ºÚ¿ÍÍÅ»ïʹÓÃÀÕË÷Èí¼þ¹¥»÷·ÆÂɱöÕþ¸®


5ÔÂ22ÈÕ £¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃй¶µÄÀÕË÷Èí¼þ¹¹½¨Õß¶Ô·ÆÂɱöµÄÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷¡ª¡ªÕâÊdzöÓÚÕþÖÎÄîÍ·µÄÕûÌåµÄÇ÷ÊÆµÄÒ»²¿·Ö £¬£¬£¬£¬ËûÃÇÔ½À´Ô½¶àµØÊÔͼÈÅÂÒÕâ¸ö¶«ÄÏÑǹú¼ÒµÄÉúÑÄ ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ SentinelOneµÄÑо¿Ö°Ô±ÌåÏÖ £¬£¬£¬£¬Ò»¸öÃûΪ¡°Ikaruz Red Team¡±µÄ×éÖ¯ÊÇÉÙÊý¼¸¸öÕë¶Ô·ÆÂɱöÕþ¸®Ä¿µÄµÄºÚ¿Í×éÖ¯Ö®Ò» ¡£¡£¡£¸ÃÐж¯Ê¹ÓÃÁ˶àÖÖÀÕË÷Èí¼þ¹¹½¨Õß¡ª¡ª°üÀ¨ LockBit¡¢Vice Society¡¢Clop ºÍ AlphV¡ª¡ªÌᳫ¡°Ð¡¹æÄ£¡±¹¥»÷ ¡£¡£¡£Ëü»¹ÔÚÍøÉÏÐû´«·ÆÂɱö¶à¸ö×éÖ¯µÄÊý¾Ýй¶ÇéÐÎ ¡£¡£¡£SentinelOne ÌåÏÖ £¬£¬£¬£¬Êܺ¦ÕßµÄÌõ×ÓÏÕЩËùÓÐØâÇÔ×Ôԭʼ LockBit Ä£°å £¬£¬£¬£¬¶¥²¿µÄÃû×Ö³ýÍâ ¡£¡£¡£Î´ÌṩÁªÏµÐÅÏ¢ ¡£¡£¡£


https://therecord.media/philippines-hacktivist-groups-leaked-versions-ransomware


4. GhostEngine ÍÚ¿ó¹¥»÷ʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯


5ÔÂ22ÈÕ £¬£¬£¬£¬ÒÑ·¢Ã÷´úºÅΪ¡°REF4578¡±µÄ¶ñÒâ¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯°²ÅÅÁËÃûΪ GhostEngine µÄ¶ñÒâ¸ºÔØ £¬£¬£¬£¬¸Ã¸ºÔØÊ¹ÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÀ´¹Ø±ÕÇå¾²²úÆ·²¢°²ÅÅ XMRig ÍÚ¿ó³ÌÐò ¡£¡£¡£Elastic Security Labs ºÍ °²ÌìµÄÑо¿Ö°Ô±  ÔÚµ¥¶ÀµÄ±¨¸æºÍ¹²ÏíµÄ¼ì²â¹æÔòÖÐÇ¿µ÷ÁËÕâЩ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷µÄÒì³£ÖØ´óÐÔ £¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ×èÖ¹ËüÃÇ ¡£¡£¡£È»¶ø £¬£¬£¬£¬Á½·Ý±¨¸æ¾ù佫¸Ã»î¶¯¹é×ïÓÚÒÑÖªµÄÍþвÐÐΪÕß £¬£¬£¬£¬Ò²Î´·ÖÏíÓйØÄ¿µÄ/Êܺ¦ÕßµÄÏêϸÐÅÏ¢ £¬£¬£¬£¬Òò´Ë¸Ã»î¶¯µÄÆðÔ´ºÍ¹æÄ£ÈÔȻδ֪ ¡£¡£¡£ËäÈ»Éв»ÇåÎúЧÀÍÆ÷×î³õÊÇÔõÑù±»ÆÆËðµÄ £¬£¬£¬£¬µ«ÍþвÐÐΪÕߵĹ¥»÷´ÓÖ´ÐÐÃûΪ¡°Tiworker.exe¡±µÄÎļþ×îÏÈ £¬£¬£¬£¬¸ÃÎļþαװ³ÉÕýµ±µÄ Windows Îļþ ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÊÇ GhostEngine µÄ³õʼµÇ̨ÓÐÓøºÔØ £¬£¬£¬£¬GhostEngine ÊÇÒ»¸ö PowerShell ¾ç±¾ £¬£¬£¬£¬¿ÉÏÂÔØÖÖÖÖÄ£¿£¿£¿£¿£¿£¿£¿éÒÔÔÚÊÜѬȾµÄ×°±¸ÉÏÖ´Ðвî±ðµÄÐÐΪ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghostengine-mining-attacks-kill-edr-security-using-vulnerable-drivers/


5. Î÷ϤÄá´óѧÔâµ½ºÚ¿Í¹¥»÷²¿·ÖѧÉúÊý¾Ýй¶


5ÔÂ21ÈÕ £¬£¬£¬£¬ÔÚÍþвÐÐΪÕ߯ÆËðÁËÆä Microsoft 365 ºÍ Sharepoint ÇéÐÎºó £¬£¬£¬£¬Î÷ϤÄá´óѧ (WSU) ÒÑÏòѧÉúºÍѧÊõְԱת´ïÁËÊý¾Ýй¶ÊÂÎñ ¡£¡£¡£WSU ÊǰĴóÀûÑǵÄÒ»Ëù½ÌÓý»ú¹¹ £¬£¬£¬£¬Ìṩ¿çѧ¿ÆµÄÆÕ±é±¾¿Æ¡¢Ñо¿ÉúºÍÑо¿¿Î³Ì ¡£¡£¡£ËüÓµÓÐ 47,000 ÃûѧÉúºÍ 4,500 ¶àÃûÕýʽºÍ¼¾½ÚÐÔÔ±¹¤ £¬£¬£¬£¬ÔËÓªÔ¤ËãΪ 6 ÒÚÃÀÔª ¡£¡£¡£Î÷ϤÄá´óÑ§ÍøÕ¾½ñÈÕÐû²¼Í¨¸æ £¬£¬£¬£¬ÖÒÑԳƺڿÍÒÑ»á¼ûÆä Microsoft Office 365 ÇéÐÎ £¬£¬£¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍ SharePoint Îļþ ¡£¡£¡£Ëù̻¶µÄÊý¾ÝÒòÈ˶øÒì £¬£¬£¬£¬Ïêϸȡ¾öÓÚµç×ÓÓʼþͨѶµÄÄÚÈÝÒÔ¼°´óѧ SharePoint ÇéÐÎÖд洢µÄÎĵµ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-data-breach-exposed-student-data/#google_vignette


6. Void ManticoreÃé×¼ÒÔÉ«ÁкͰ¢¶û°ÍÄáÑÇ


5ÔÂ22ÈÕ £¬£¬£¬£¬¸Ã×éÖ¯ÃûΪ Void Manticore (Storm-0842) £¬£¬£¬£¬ÔÚ²î±ð¹ú¼ÒÒÔÖÖÖÖ¼ÙÃû¿ªÕ¹»î¶¯ ¡£¡£¡£×îÖøÃûµÄÓÖÃû°üÀ¨Õë¶Ô°¢¶û°ÍÄáÑÇÏ®»÷µÄ¡°ÁìÍÁÕýÒ塱ºÍÕë¶ÔÒÔÉ«ÁÐÐж¯µÄ¡°Òò¹û±¨Ó¦¡± ¡£¡£¡£Õë¶Ô²î±ðµÄÇøÓò £¬£¬£¬£¬Õë¶Ôÿ¸öÄ¿µÄ½ÓÄÉÆæÒìµÄÒªÁì ¡£¡£¡£¸Ã×éÖ¯µÄ»î¶¯ÓëÁíÒ»¸öÒÁÀÊ×éÖ¯ Scarred Manticore µÄ»î¶¯Öصþ £¬£¬£¬£¬ÕâÅúעЭЭµ÷ϵͳµÄÊܺ¦ÕßÑ¡ÔñÊÇËûÃÇΪÒÁÀÊÇ鱨ºÍÇå¾²²¿ (MOIS) ÊÂÇéµÄÒ»²¿·Ö ¡£¡£¡£×¨¼ÒÖÒÑÔ˵ £¬£¬£¬£¬Ðé¿ÕЫʨ¶ÔÈκÎ×èµ²ÒÁÀÊÀûÒæµÄÈË×é³ÉÖØ´óÍþв ¡£¡£¡£¸Ã×é֯ʹÓÃÖØ´óµÄ¼ÙÃûÍøÂç¡¢Õ½ÂÔЭ×÷ºÍÖØ´óµÄ¹¥»÷ÒªÁì ¡£¡£¡£¸Ã×éÖ¯ÒÔÆäË«ÖØÍøÂç¹¥»÷·½·¨¶øÖøÃû £¬£¬£¬£¬½«ÎïÀíÊý¾ÝÆÆËðÓëÐÄÀíѹÁ¦ÏàÁ¬Ïµ ¡£¡£¡£Void Manticore ʹÓÃÎåÖÖ²î±ðµÄÒªÁì £¬£¬£¬£¬°üÀ¨Õë¶Ô Windows ºÍ Linux µÄ×Ô½ç˵²Á³ýÆ÷ £¬£¬£¬£¬Í¨¹ýɾ³ýÎļþºÍʹÓù²Ïí´ÅÅÌÀ´ÆÆËðϵͳ ¡£¡£¡£


https://meterpreter.org/void-manticore-iranian-state-sponsored-hackers-target-israel-albania/