APT40ʹÓÃScanBoxÕì̽¿ò¼Ü¹¥»÷°Ä´óÀûÑǵÄÕþ¸®»ú¹¹
Ðû²¼Ê±¼ä 2022-09-01
ProofpointÔÚ8ÔÂ30ÈÕÅû¶ÁËAPT40½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷Ö÷ÒªÕë¶Ô°Ä´óÀûÑǵط½ºÍÁª°îÕþ¸®»ú¹¹¼°Ã½Ìå»ú¹¹£¬£¬£¬£¬£¬£¬ºÍΪÄϺ£·çÁ¦ÎÐÂÖ»úÌṩά»¤Ð§À͵ÄÈ«ÇòÖØ¹¤ÒµÖÆÔìÉÌ¡£¡£¡£¡£¡£¡£2022Äê4ÔÂÖÁ6ÔÂʱ´ú£¬£¬£¬£¬£¬£¬¹¥»÷Õßð³ä°Ä´óÀûÑdz¿±¨µÄÔ±¹¤£¬£¬£¬£¬£¬£¬Í¨¹ý´¹Âڻ·Ö·¢ScanBoxÎó²îʹÓÿò¼Ü¡£¡£¡£¡£¡£¡£Æ¾Ö¤×îÐÂÖ¤¾Ý£¬£¬£¬£¬£¬£¬ProofpointµÃ³ö½áÂÛ£¬£¬£¬£¬£¬£¬2022ÄêµÄ»î¶¯ÊÇAPT40×Ô2021Äê3ÔÂÒÔÀ´¾ÙÐеÄͳһÇé±¨ÍøÂçʹÃüµÄµÚÈý½×¶Î£¬£¬£¬£¬£¬£¬Æäʱ¹¥»÷Õßð³äÐÂÎÅýÌ壬£¬£¬£¬£¬£¬Í¨¹ýRTFÄ£°å×¢Èë¼ÓÔØMeterpreter¡£¡£¡£¡£¡£¡£
https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea
2¡¢Òâ´óÀûʯÓ͹«Ë¾Eni³ÆÆäÄÚ²¿ÍøÂçÔ⵽δ¾ÊÚȨµÄ»á¼û
¾Ý8ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Òâ´óÀûʯÓ͹«Ë¾Eni³ÆÆäÄÚ²¿±£»£»£»£»¤ÏµÍ³¼ì²âµ½Õë¶Ô¹«Ë¾ÍøÂçµÄδ¾ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£ÏÖÔÚûÓй¥»÷µÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬ÎÞ·¨È·¶¨¹¥»÷ÕßÉí·Ý¡¢ÔõÑùÈëÇÖµÄÒÔ¼°ËûÃǵÄÄîÍ·¡£¡£¡£¡£¡£¡£ÖªÇéÈËÊ¿³Æ£¬£¬£¬£¬£¬£¬EniËÆºõÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£Òâ´óÀûÄÜÔ´²¿·Ö½üÆÚËÆºõÔâµ½Á˹¥»÷£¬£¬£¬£¬£¬£¬ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬Ä±»®Òâ´óÀûµçÁ¦Êг¡µÄÕþ¸®»ú¹¹Gestore dei Servizi Energetici SpAÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£GSEµÄ»ù´¡ÉèÊ©Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÍøÕ¾ÈÔ´¦ÓÚÖÐֹ״̬¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/135116/hacking/eni-suffered-cyberattack.html
3¡¢SecuronixÅû¶Ð¶ñÒâÈí¼þ»î¶¯GO#WEBBFUSCATORµÄϸ½Ú
¾Ý8ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Securonix·¢Ã÷Ò»Æð»ùÓÚGolangµÄÒ»Á¬¹¥»÷»î¶¯GO#WEBBFUSCATOR¡£¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚÒ»·â´øÓжñÒâÎĵµGeos-Rates.docxµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ëü»áÏÂÔØÄ£°åÎļþ¡£¡£¡£¡£¡£¡£¸ÃÎļþ°üÀ¨Ò»¸ö¾ÓÉ»ìÏýµÄVBSºê£¬£¬£¬£¬£¬£¬ÆôÓúêºó£¬£¬£¬£¬£¬£¬´úÂë»á´ÓÔ¶³Ì×ÊÔ´ÏÂÔØJPGͼÏñ£¬£¬£¬£¬£¬£¬È»ºóʹÓÃcertutil.exe½«Æä½âÂëΪ¿ÉÖ´ÐÐÎļþmsdllupdate.exe²¢Æô¶¯Ëü¡£¡£¡£¡£¡£¡£ÔÚͼÏñÉó²éÆ÷ÖУ¬£¬£¬£¬£¬£¬.JPGÎļþÔòÏÔʾÁËÓÉNASAÓÚ2022Äê7ÔÂÐû²¼µÄÐÇϵÍÅSMACS 0723¡£¡£¡£¡£¡£¡£¶þ½øÖÆmsdllupdate.exe½ÓÄÉÁ˶àÖÖ»ìÏýÊÖÒÕÀ´ÈƹýAVʹÆÊÎö±äµÃÄÑÌâ¡£¡£¡£¡£¡£¡£
https://www.securonix.com/blog/golang-attack-campaign-gowebbfuscator-leverages-office-macros-and-james-webb-images-to-infect-systems/
4¡¢McAfee·¢Ã÷5¸ö¶ñÒâChromeÀ©Õ¹Òѱ»×°ÖÃÁè¼Ý140Íò´Î
McAfeeÔÚ8ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË5¸ö¿ÉÒÔÇÔÈ¡Óû§ä¯ÀÀ»î¶¯µÄGoogle ChromeÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬×ÜÏÂÔØÁ¿ÒÑÁè¼Ý140Íò´Î¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÀ©Õ¹µÄÄ¿µÄÊÇ¼à¿ØÓû§»á¼ûµçÉÌÍøÕ¾£¬£¬£¬£¬£¬£¬²¢Ð޸Ļá¼ûÕßµÄcookie£¬£¬£¬£¬£¬£¬Ê¹Æä¿´ÆðÀ´ÊÇͨ¹ýÍÆ¼öÁ´½ÓÀ´µÄ£¬£¬£¬£¬£¬£¬ÕâÑù£¬£¬£¬£¬£¬£¬À©Õ¹³ÌÐòµÄ¿ª·¢Ö°Ô±¿ÉÒÔÔÚÕâЩ¹ºÖûÖлñµÃÁªÓª·Ñ¡£¡£¡£¡£¡£¡£¶ñÒâÀ©Õ¹»®·ÖΪNetflix Party¡¢Netflix Party 2¡¢Full Page Screenshot Capture¡¢FlipShopeºÍAutoBuy Flash Sales£¬£¬£¬£¬£¬£¬ËäÈ»ËüÃDz»»áÖ±½ÓÓ°ÏìÓû§£¬£¬£¬£¬£¬£¬µ«»á´øÀ´ÑÏÖØµÄÒþ˽Σº¦¡£¡£¡£¡£¡£¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/
5¡¢ÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¹Ø±ÕijºÚ¿ÍÍÅ»ïʹÓõĺô½ÐÖÐÐÄÍøÂç
ýÌå8ÔÂ30Èճƣ¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±(NPU)¹Ø±ÕÁËÒ»¸öºÚ¿ÍÍÅ»ïʹÓõĺô½ÐÖÐÐÄÍøÂç¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï»¹ÉæÏÓթƶԼÓÃÜÇ®±Ò¡¢Ö¤È¯¡¢»Æ½ðºÍʯÓÍͶ×ʸÐÐËȤµÄÎÚ¿ËÀ¼ºÍÅ·ÓѰî¼ÒµÄ¹«Ãñ¡£¡£¡£¡£¡£¡£ÔÚթƻÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÈí¼þºÍ¸ß¿Æ¼¼×°±¸£¬£¬£¬£¬£¬£¬Ã°³ä¹úÓÐÒøÐлú¹¹µÄÔ±¹¤£¬£¬£¬£¬£¬£¬Ú²ÆÄ¿µÄµÄÒøÐп¨ÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬ÔÚÓÕÆÄ¿µÄ½«×ʽð×ªÒÆµ½¹¥»÷ÕßµÄÕË»§ºóÖÐÖ¹ËùÓÐͨѶ¡£¡£¡£¡£¡£¡£Ö´·¨Ö°Ô±ËѲéÁËÓë´Ë´Î»î¶¯Ïà¹ØµÄ¶à¸öºô½ÐÖÐÐIJ¢Ã»ÊÕÁËÅÌËã»ú¡¢ÊÖ»úºÍÊý¾Ý¼Í¼£¬£¬£¬£¬£¬£¬Ïà¹ØÏÓÒÉÈ˽«ÃæÁÙ×î¸ß12ÄêµÄî¿Ïµ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ukraine-takes-down-cybercrime-group-hitting-crypto-fraud-victims/
6¡¢CiscoÐû²¼3¸ö·Ö·¢¶àÖÖ¶ñÒâÈí¼þµÄ»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬Cisco TalosÐû²¼±¨¸æ³ÆÊӲ쵽2022Äê3ÔÂÖÁ6ÔÂʱ´úµÄ3¸ö×ÔÁ¦µ«Ïà¹ØµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ÕâЩ»î¶¯·Ö·¢Á˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨ModernLoader bot¡¢ÐÅÏ¢ÇÔÈ¡³ÌÐòRedLineºÍÍÚ¿ó¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃPowerShell¡¢.NET³ÌÐò¼¯ÒÔ¼°HTAºÍVBSÎļþÔÚÄ¿µÄÖÐÈö²¥£¬£¬£¬£¬£¬£¬×îÖÕ×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÈçSystemBCľÂíºÍDCRAT¡£¡£¡£¡£¡£¡£×îÖÕµÄpayloadËÆºõÊÇModernLoader£¬£¬£¬£¬£¬£¬Ëü¿Éͨ¹ýÍøÂçϵͳÐÅÏ¢ºÍ×°ÖÃÖÖÖÖÄ£¿£¿£¿£¿£¿£¿éÀ´³äµ±Ô¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£
https://blog.talosintelligence.com/2022/08/modernloader-delivers-multiple-stealers.html


¾©¹«Íø°²±¸11010802024551ºÅ