ÍøÐŰìÐû²¼¡¶ÍøÐŲ¿ÃÅÐÐÕþÖ´·¨·¨Ê½¹æ¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·

Ðû²¼Ê±¼ä 2022-09-09
1¡¢ÍøÐŰìÐû²¼¡¶ÍøÐŲ¿ÃÅÐÐÕþÖ´·¨·¨Ê½¹æ¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·

      

9ÔÂ8ÈÕ £¬¹ú¼Ò»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒÐû²¼¹ØÓÚ¡¶ÍøÐŲ¿ÃÅÐÐÕþÖ´·¨·¨Ê½¹æ¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡·¹ûÈ»Õ÷ÇóÒâ¼ûµÄ֪ͨ¡£ÎªÁ˹淶ºÍ±£ÕÏÍøÐŲ¿ÃÅÒÀ·¨ÂÄÐÐÖ°Ô𠣬±£»¤¹«Ãñ¡¢·¨ÈËºÍÆäËû×éÖ¯µÄºÏ·¨È¨Òæ £¬Î¬»¤¹ú¼ÒÄþ¾²ºÍ¹«¹²ÀûÒæ £¬ÍøÐŰì¶Ô¡¶»¥ÁªÍøÐÅÏ¢ÄÚÈݹÜÀíÐÐÕþÖ´·¨·¨Ê½¹æ¶¨¡·½øÐÐÐÞ¶© £¬ÐγÉÁË¡¶ÍøÐŲ¿ÃÅÐÐÕþÖ´·¨·¨Ê½¹æ¶¨£¨Õ÷ÇóÒâ¼û¸å£©¡· £¬ÏÖÏòÉç»á¹ûÈ»Õ÷ÇóÒâ¼û¡£¹«ÖÚ¿Éͨ¹ýµÇ¼ÖйúÕþ¸®·¨ÖÆÐÅÏ¢Íø¡¢·¢Ë͵ç×ÓÓʼþºÍ¼ÄËÍÐź¯µÄ·½Ê½Ìá³ö·´À¡Òâ¼û¡£


http://www.cac.gov.cn/2022-09/08/c_1664174174624227.htm


2¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛ´ÓÆÏÌÑÑÀÎä×°¶ÓÎé×ÜÕÕÁϲ¿ÇÔÈ¡µÄÎļþ

      

¾ÝýÌå9ÔÂ8ÈÕ±¨µÀ £¬ÆÏÌÑÑÀÎä×°¶ÓÎé×ÜÕÕÁϲ¿£¨EMGFA£©Óë±±Ô¼Ïà¹ØµÄ»úÃÜÎļþ±»ÔÚ°µÍøÉϳöÊÛ¡£EMGFAÊÇÆÏÌÑÑÀµÄ×î¸ß¾üÊ»ú¹¹ £¬ËüÂôÁ¦ÆÏÌÑÑÀÎä×°¶ÓÎéµÄ¹æ»®¡¢Ö¸»ÓºÍ¿ØÖÆ¡£¹¥»÷ÕßÐû²¼Á˱»µÁÎļþµÄÑù±¾×÷Ϊ¹¥»÷Ö¤¾Ý £¬ÃÀ¹úÐÅÏ¢·þÎñ²¿·¢ÏÖÁËÕâЩÎļþ £¬²¢Í¨ÖªÆÏÌÑÑÀÕþ¸®¡£Æ¾¾Ý³õ·¨Ê½²é £¬ÕâЩÎļþÊÇ´ÓEMGFA¡¢ÃØÃܾü¶Ó(CISMIL)ºÍ¹ú·À×ÊÔ´×ֵܾÄϵͳÖÐй¶µÄ¡£Ñо¿ÈËÔ±·¢ÏÖ £¬»úÃÜÎļþ´«ÊäµÄÄþ¾²¹æÔòÒѱ»ÆÆ»µ £¬¹¥»÷ÕßÄܹ»·ÃÎʾüÊÂͨÐÅ×ÛºÏϵͳ(SICOM) £¬²¢½ÓÊÕºÍת·¢»úÃÜÎļþ¡£


https://securityaffairs.co/wordpress/135480/data-breach/nato-docs-stolen-from-portugal.html


3¡¢Î¢ÈíÅû¶DEV-0270½üÆÚµÄÀÕË÷¹¥»÷±³ºóµÄ¼ÆÄ±ºÍ¼¼Êõ

      

΢ÈíÓÚ9ÔÂ7ÈÕ³ÆÆäÍþвÇ鱨ÍŶÓÒ»Ö±ÔÚ¸ú×Ù¶à¸öÀÕË÷¹¥»÷»î¶¯ £¬²¢½«ÕâЩ¹¥»÷ÓëDEV-0270£¨Ò²³ÆNemesis Kitten£©ÁªÏµÆðÀ´¡£¸ÃÍÅ»ïÊÇÒÁÀÊPHOSPHORUSµÄÒ»¸ö×Ó×éÖ¯ £¬ÓÉÒ»¼ÒÒÔ¹ûÈ»±ðÃûSecnerd£¨secnerd[.]ir£©ºÍLifeweb£¨lifeweb[.]ir£©ÔË×÷µÄ¹«Ë¾ÔËÓª¡£DEV-0270ÔÚ¹¥»÷Á´Öй㷺µØÀûÓÃÁËÔ¶³Ì¶þ½øÖÆÎļþ(LOLBIN)½øÐÐÕì²ìºÍƾ¾Ý·ÃÎÊ £¬²¢ÀÄÓÃÄÚÖõÄBitLocker¹¤¾ßÀ´¼ÓÃÜÄ¿±êÉè±¹ØÁ¬ÄÎļþ¡£


https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/


4¡¢LazarusÀûÓÃжñÒâÈí¼þMagicRA¹¥»÷È«ÇòµÄ×éÖ¯

      

Cisco TalosÔÚ9ÔÂ7ÈÕÅû¶ÐµÄÔ¶³Ì·ÃÎÊľÂíMagicRATÓ볯ÏÊLazarusÓйØ¡£ÐÂRAT×î³õÊÇͨ¹ý̻¶µÄVMware Horizonƽ̨ÈëÇÖÄ¿±ê £¬Ëü¾ßÓÐÏà¶Ô¼òµ¥µÄRAT¹¦Ð§ £¬½èÖúQt¿ò¼Ü¹¹½¨ £¬¶øÇÒ²»Ì«¿ÉÄÜͨ¹ý»úÆ÷ѧϰºÍÆô·¢Ê½½øÐÐ×Ô¶¯¼ì²â¡£MagicRATÒ»µ©°²×°¾Í»áÖ´ÐÐÌØ±ðµÄpayload £¬ÀýÈç¶¨ÖÆµÄ¶Ë¿ÚɨÃ蹤¾ß¡£´ËÍâ £¬MagicRATµÄC2»ù´¡ÉèÊ©»¹ÓÃÓÚÍйÜLazarusÖ²È뷨ʽµÄ±äÌå £¬ÈçTigerRAT¡£ÔÚÒ°Íâ·¢ÏÖµÄMagicRAT±íÃ÷LazarusÓж¯»ú¿ìËÙ¹¹½¨ÐµÄ×Ô½ç˵¶ñÒâÈí¼þ £¬ÓÃÓÚÓëÆä֮ǰµÄ¶ñÒâÈí¼þ£¨ÈçTigerRAT£©Ò»ÆðÀûÓà £¬À´¹¥»÷È«ÇòµÄ×éÖ¯¡£


https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html


5¡¢¹È¸è³ÆContiǰ³ÉÔ±½«Æä¼¼ÊõÖØÐÂÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼µÄ»î¶¯

      

¹È¸èTAGÔÚ9ÔÂ7ÈÕ¹ûÈ»ÁË2022Äê4ÔÂÖÁ8ÔÂÆÚ¼ä¿ªÕ¹µÄ5¸öÓëUAC-0098Ïà¹ØµÄ»î¶¯µÄϸ½Ú¡£UAC-0098ÊÇÒ»¸ö³õʼ·ÃÎÊÊðÀí £¬ÀûÓÃIcedIDΪÀÕË÷ÍÅ»ïÌṩ¶ÔÆóҵϵͳµÄ·ÃÎÊ¡£TAGÍÆ¶ÏUAC-0098µÄһЩ³ÉÔ±ÊÇContiÍÅ»ïµÄǰ³ÉÔ± £¬ËûÃǽ«Æä¼¼ÊõÖØÐÂÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼µÄ¹¥»÷»î¶¯¡£2022Äê4ÔÂÏÂÑ® £¬Ñо¿ÈËÔ±·¢ÏÖÁËÁ÷´«AnchorMail£¨±»³ÆÎª¡°LackeyBuilder¡±£©µÄµöÓã»î¶¯ £¬Ö®ºó¿ªÊ¼¸ú×ÙUAC-0098¡£ÔÚºóÐøµÄ»î¶¯ÖÐ £¬UAC-0098»¹¹¥»÷ÁËÎÚ¿ËÀ¼×éÖ¯ºÍÅ·ÖÞ·ÇÕþ¸®×éÖ¯¡£


https://blog.google/threat-analysis-group/initial-access-broker-repurposing-techniques-in-targeted-attacks-against-ukraine/


6¡¢KasperskyÐû²¼2022ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ¸ÅÊö

      

9ÔÂ6ÈÕ £¬KasperskyÐû²¼ÁË2022ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ¸ÅÊö¡£2021Äê1ÔÂÖÁ2022Äê6ÔÂÆÚ¼ä £¬Óöµ½ÓëÓÎÏ·ÓйصĶñÒâÈí¼þºÍÀ¬»øÈí¼þµÄÓû§×ÜÊýΪ384224ÈË£»ÓëMinecraftÏà¹ØµÄÎļþԼռͨ¹ýÓÎÏ·ÀÄÓÃÁ÷´«µÄ¶ñÒâÎļþµÄ25% £¬Æä´ÎÊÇFIFA(11%)¡¢Roblox(9.5%)¡¢Far Cry(9.4%£©ºÍʹÃüÕÙ»½£¨9%£©¡£2022ÄêÉϰëÄê £¬±»ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¹¥»÷µÄÓû§ÊýÁ¿Ã÷ÏÔÔö¼Ó £¬±È2021ÄêÉϰëÄêÔö¼ÓÁË13%£»¹¥»÷Õß¼Ó´óÁË·Ö·¢Trojan-PSWµÄÁ¦¶È £¬77%µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄѬȾ°¸ÀýÓëTrojan-PSWÓйØ¡£


https://securelist.com/gaming-related-cyberthreats-2021-2022/107346/