ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§

Ðû²¼Ê±¼ä 2024-10-18

1. ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¹¤¾ßÌᳫ¹¥»÷¡£ ¡£¡£¡£¡£ËûÃÇͨ¹ýTelegramÈö²¥¸Ã¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬Î±×°³ÉÎÚ¿ËÀ¼ÐÂÕþ¸®Ó¦ÓóÌÐòReserve+µÄÊÖÒÕÖ§³Ö»úеÈË£¬£¬£¬ £¬£¬ÓÕÆ­Óû§ÉÏ´«°üÀ¨¶ñÒâÎļþµÄZIPµµ°¸¡£ ¡£¡£¡£¡£Ò»µ©Îļþ±»·­¿ª£¬£¬£¬ £¬£¬MeduzaStealer¾Í»áѬȾĿµÄ×°±¸£¬£¬£¬ £¬£¬ÇÔÈ¡¾ßÓÐÌØ¶¨À©Õ¹ÃûµÄÎĵµ£¬£¬£¬ £¬£¬²¢Ëæºó×ÔÎÒɾ³ý¡£ ¡£¡£¡£¡£Reserve+Ó¦ÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐÒåÎñ·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üÐÂСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬ £¬£¬ÓÉÓÚÍøÂçµÄÊý¾ÝÃô¸Ð£¬£¬£¬ £¬£¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ä¿µÄ¡£ ¡£¡£¡£¡£×èÖ¹7Ô£¬£¬£¬ £¬£¬ÒÑÓÐÁè¼Ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÓ¦ÓøüÐÂÊý¾Ý¡£ ¡£¡£¡£¡£ÎÚ¿ËÀ¼¹ú·À²¿Òѱ¨¸æ·¢Ã÷ð³äµÄReserve+Ó¦ÓóÌÐò£¬£¬£¬ £¬£¬¿ÉÄÜÖ¼ÔÚÍøÂçСÎÒ˽¼ÒÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÐÄÀíÐж¯¡£ ¡£¡£¡£¡£´Ëǰ£¬£¬£¬ £¬£¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÊ¢ÐÐÒÆ¶¯Ó¦ÓóÌÐòºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÖ°Ô±¡£ ¡£¡£¡£¡£


https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram


2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý£¬£¬£¬ £¬£¬¿çƽ̨Èö²¥ÄÑ·À¿Ø


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚTrend MicroµÄ±¨¸æÖÐÕ¹ÏÖÁËÒ»¸öÖØ´óµÄÀÕË÷Èí¼þ²Ù×÷£¬£¬£¬ £¬£¬¸Ã²Ù×÷ʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þÄ£ÄâÁËÎÛÃûÕÑÖøµÄLockBitÀÕË÷Èí¼þ¼Ò×壬£¬£¬ £¬£¬µ«ÏÖʵÉÏÊÇÒ»¸öÍêÈ«²î±ðµÄʵÌå¡£ ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼ÓËÙ£¨S3TA£©¹¦Ð§£¬£¬£¬ £¬£¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß¿ØÖƵÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý£¬£¬£¬ £¬£¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£ ¡£¡£¡£¡£ÔÚ¹¥»÷¿¢ÊÂʱ£¬£¬£¬ £¬£¬×°±¸µÄ±ÚÖ½»áÄð³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ£¬£¬£¬ £¬£¬ÒÔÔöÌíÊܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£ ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³ÌÓïÑÔ±àд£¬£¬£¬ £¬£¬¾ßÓÐ¿çÆ½Ì¨ÌØÕ÷£¬£¬£¬ £¬£¬Äܹ»Õë¶ÔWindowsºÍmacOSÇéÐΣ¬£¬£¬ £¬£¬Ê¹ÆäÓÃ;ÆÕ±éÇÒÄÑÒÔ¿ØÖÆ¡£ ¡£¡£¡£¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõĻá¼ûÃÜÔ¿£¬£¬£¬ £¬£¬µ«Trend Micro½¨Òé×éÖ¯¼á³ÖСÐÄ£¬£¬£¬ £¬£¬¸üÐÂÈí¼þ£¬£¬£¬ £¬£¬¼ì²éÔ¶³Ì»á¼ûÕ½ÂÔ£¬£¬£¬ £¬£¬²¢¼à¿ØÓë¶ñÒâ»î¶¯Ïà¹ØµÄAWSÕË»§ID£¬£¬£¬ £¬£¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔÆµÄÍþв¡£ ¡£¡£¡£¡£


https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/


3. ClickFixбäÖÖ£ºÊ¹ÓÃGoogle MeetÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ


10ÔÂ17ÈÕ£¬£¬£¬ £¬£¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½ÂÔ£¬£¬£¬ £¬£¬×Ô5Ô·ÝÓÉÍøÂçÇå¾²¹«Ë¾ProofpointÊ״α¨¸æÒÔÀ´£¬£¬£¬ £¬£¬Æä»î¶¯Óú·¢ÆµÈÔ£¬£¬£¬ £¬£¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£ ¡£¡£¡£¡£¸ÃÕ½ÂÔͨ¹ýð³ä Google Chrome¡¢Microsoft Word ºÍ OneDrive ¹ýʧÐÂÎÅ£¬£¬£¬ £¬£¬ÓÕÆ­Óû§¸´ÖƲ¢Ö´ÐÐ PowerShell ´úÂ룬£¬£¬ £¬£¬´Ó¶øÑ¬È¾ÏµÍ³¡£ ¡£¡£¡£¡£Êܺ¦ÕßÒò´ËÅöÃæÁÙ¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷£¬£¬£¬ £¬£¬Èç DarkGate¡¢Matanbuchus µÈ¡£ ¡£¡£¡£¡£½üÆÚ£¬£¬£¬ £¬£¬SaaS ÍøÂçÇå¾²ÌṩÉÌ Sekoia Ö¸³ö£¬£¬£¬ £¬£¬ClickFix »î¶¯Òѱ¬·¢ÏÔÖø×ª±ä£¬£¬£¬ £¬£¬°üÀ¨Ê¹Óà Google Meet ÓÕ¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂç´¹ÂÚÓʼþµÈ¡£ ¡£¡£¡£¡£¹¥»÷Õ߻ᷢËÍ¿´ËÆÕýµ±µÄ Google Meet Ô¼ÇëÓʼþ£¬£¬£¬ £¬£¬ÓÕʹÊܺ¦Õß»á¼ûÐéÎ±Ò³Ãæ¡£ ¡£¡£¡£¡£Ò»µ©½øÈ룬£¬£¬ £¬£¬Êܺ¦Õß»áÊÕµ½ÊÖÒÕÎÊÌâÌáÐÑ£¬£¬£¬ £¬£¬Èôµã»÷¡°ÊµÑéÐÞ¸´¡±£¬£¬£¬ £¬£¬Ôò»áÆô¶¯ ClickFix ѬȾÀú³Ì£¬£¬£¬ £¬£¬µ¼ÖÂÅÌËã»ú±»¶ñÒâÈí¼þѬȾ¡£ ¡£¡£¡£¡£Windows ϵͳÖ÷ÒªÔâÊÜ Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷£¬£¬£¬ £¬£¬¶ø macOS »úеÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬Sekoia »¹·¢Ã÷ÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢ÇþµÀ£¬£¬£¬ £¬£¬°üÀ¨ Zoom¡¢PDF ÔĶÁÆ÷¡¢ÐéαÊÓÆµÓÎÏ·µÈ¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/


4. ³¯ÏÊITڲƭÍŻNickel Tapestry¡±Ê¹ÓùÍÓ¶¹ØÏµÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð


10ÔÂ17ÈÕ£¬£¬£¬ £¬£¬³¯Ïʺã¾ÃÒÔÀ´Ò»Ö±ÅÉDzITרҵְԱµ½¸»×ã¹ú¼ÒµÄÆóÒµ¾ÍÖ°£¬£¬£¬ £¬£¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄÎäÆ÷ÍýÏëıȡÊÕÈë¡£ ¡£¡£¡£¡£ÕâЩڲƭÐÔµÄITÊÂÇéÕßʹÓÃÐéα»ò͵À´µÄÉí·Ý£¬£¬£¬ £¬£¬²¢Í¨¹ýÌõ¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´ÑÚÊÎÆäÕæÊµÎ»Öᣠ¡£¡£¡£¡£ËûÃÇ×èֹʹÓÃÊÓÆµÍ¨»°»òÔÚÊÓÆµ¾Û»áʱ´úÒþ²ØÃ沿£¬£¬£¬ £¬£¬ÒÔ±ÜÃâ±»·¢Ã÷¡£ ¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾SecureworksµÄÊӲ죬£¬£¬ £¬£¬Ò»¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆÎªUNC5267£©µÄ×éÖ¯ÈÏÕæ×éÖ¯ºÍЭµ÷ÕâЩ³¯ÏÊITÊÂÇéÕß¡£ ¡£¡£¡£¡£ÔÚ¹ÍÓ¶ÕâЩÍⲿ³Ð°üÉ̺󣬣¬£¬ £¬£¬Ò»¼Ò¹«Ë¾ÏÕЩÁ¬Ã¦ÔâÓöÁËÊý¾ÝÇÔÈ¡£¬£¬£¬ £¬£¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐéÄâ×ÀÃæ»ù´¡ÉèÊ©´«Ê䵽СÎÒ˽¼ÒGoogle DriveÔÆ´æ´¢¡£ ¡£¡£¡£¡£ÔÚ¹ÍÓ¶¹ØÏµÖÕÖ¹ºó£¬£¬£¬ £¬£¬¸Ã¹«Ë¾×îÏÈÊÕµ½ÀÕË÷µç×ÓÓʼþ£¬£¬£¬ £¬£¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜÇ®±ÒÊê½ðÒÔ»»È¡²»¹ûÕæÐ¹Â¶Êý¾Ý¡£ ¡£¡£¡£¡£Secureworks»¹·¢Ã÷£¬£¬£¬ £¬£¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬ÊðÀíºÍAnyDeskµÈ¹¤¾ß¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬£¬ £¬£¬³¯ÏʵÄITÊÂÇéÕß¾­³£Ï໥Эµ÷£¬£¬£¬ £¬£¬Ìá¹©ÍÆ¼ö£¬£¬£¬ £¬£¬Òò´Ë×éÖ¯ÔÚÕÐÆ¸Ô¶³ÌÊÂÇéÕßʱӦ¼á³ÖСÐÄ£¬£¬£¬ £¬£¬²¢×¢ÖØÚ²Æ­¼£Ïó¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/


5. BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú²¢ÇÔÈ¡Êý¾Ý


10ÔÂ17ÈÕ£¬£¬£¬ £¬£¬BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú£¨BCHP£©·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂ磬£¬£¬ £¬£¬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öËùÔÚÌṩҽÁÆÐ§ÀÍ¡£ ¡£¡£¡£¡£9ÔÂ6ÈÕ£¬£¬£¬ £¬£¬BCHPµÄIT¹©Ó¦ÉÌÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬¼¸Ììºó£¬£¬£¬ £¬£¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾­ÊÚȨµÄ»î¶¯£¬£¬£¬ £¬£¬²¢Á¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬£¬£¬ £¬£¬°üÀ¨¹Ø±Õϵͳ×÷Ϊ±£»£»£»£»£» £»¤²½·¥¡£ ¡£¡£¡£¡£¾­ÊÓ²ìÈ·ÈÏ£¬£¬£¬ £¬£¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾­ÊÚȨµÄ»á¼û£¬£¬£¬ £¬£¬²¢ÇÔÈ¡Á˰üÀ¨È«Ãû¡¢Éç»á°ü¹ÜºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƼͼ±àºÅ¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÖÎÁÆÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£ ¡£¡£¡£¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ï죬£¬£¬ £¬£¬ÓÉÓÚËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£ ¡£¡£¡£¡£È·ÈÏÊܵ½Ó°ÏìµÄСÎÒ˽¼Ò½«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ£¬£¬£¬ £¬£¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓÃ¼à¿ØºÍ±£»£»£»£»£» £»¤Ð§ÀÍ¡£ ¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬ £¬£¬²¢Éù³ÆÓµÓвÆÎñºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨѶ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬µ«ÉÐδй¶ÈκÎÄÚÈÝ£¬£¬£¬ £¬£¬Ò²Î´Åû¶×îºóÏÞÆÚ£¬£¬£¬ £¬£¬Åú×¢ËûÃÇÈÔÏ£ÍûÓëBCHP¾ÙÐÐ̸ÅС£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/


6. SideWinder APT×éÖ¯À©´ó¹¥»÷¹æÄ££¬£¬£¬ £¬£¬½ÓÄÉÐÂÐÍÖØ´ó¹¤¾ß°ü


10ÔÂ17ÈÕ£¬£¬£¬ £¬£¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶ÈÓйØÁªµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©ÐÐΪÕߣ¬£¬£¬ £¬£¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸ö×ÅÃûʵÌåºÍÕ½ÂÔ»ù´¡ÉèÊ©·¢¶¯Á˹¥»÷¡£ ¡£¡£¡£¡£¸Ã×éÖ¯Ò²±»³ÆÎªAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£ ¡£¡£¡£¡£Ö»¹ÜÆäʹÓùûÕæµÄÎó²îʹÓóÌÐòºÍ¶ñÒâÎļþ×÷ΪѬȾǰÑÔ£¬£¬£¬ £¬£¬¿´ËÆÊÖÒÕˮƽ½ÏµÍ£¬£¬£¬ £¬£¬µ«×ÐϸÆÊÎöÆäÐж¯Ï¸½Úºó£¬£¬£¬ £¬£¬·¢Ã÷ÆäÕæÊµÄÜÁ¦½ûֹСêï¡£ ¡£¡£¡£¡£¹¥»÷Ä¿µÄ°üÀ¨ÃϼÓÀ­¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¼ÒµÄÕþ¸®ºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£ ¡£¡£¡£¡£×î½ü£¬£¬£¬ £¬£¬SideWinderʹÓöà½×¶ÎѬȾÁ´×ª´ïÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü£¬£¬£¬ £¬£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ×îÏÈ£¬£¬£¬ £¬£¬Ö´ÐÐһϵÁÐÏÂÔØ³ÌÐò£¬£¬£¬ £¬£¬×îÖÕ°²ÅŶñÒâÈí¼þ¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçϵͳÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐÓøºÔØ£¬£¬£¬ £¬£¬²¢Í¨ÊºóÃżÓÔØÄ£¿£¿£¿ £¿£¿£¿éÖ²ÈëStealerBot£¬£¬£¬ £¬£¬ÓÃÓÚÌØ¹¤»î¶¯£¬£¬£¬ £¬£¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Í¼»÷¼üµÈ¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬SideWinderµÄµØÀíÁýÕÖ¹æÄ£Ò»Ö±À©´ó£¬£¬£¬ £¬£¬Ê¹ÓÃÁËеÄÖØ´ó¹¤¾ß°ü£¬£¬£¬ £¬£¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36½¨ÉèÁªÏµ¡£ ¡£¡£¡£¡£


https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html