ÃÀ¹úWelltok͸¶¹¥»÷µ¼Ö½ü850ÍòÃû»¼ÕßµÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-11-23
1¡¢ÃÀ¹úWelltok͸¶¹¥»÷µ¼Ö½ü850ÍòÃû»¼ÕßµÄÐÅϢй¶


¾ÝýÌå11ÔÂ22ÈÕ±¨µÀ£¬ÃÀ¹úÒ½ÁƱ£½¡SaaSÌṩÉÌWelltok͸¶£¬ÆäʹÓõÄÎļþ´«ÊäÓ¦ÓÃÔâµ½¹¥»÷£¬µ¼Ö½ü850ÍòÃû»¼ÕߵĸöÈËÊý¾Ýй¶¡£½ñÄêÔçЩʱºò£¬ClopÀûÓÃMOVEitÖеÄ©¶´ÈëÇÖÁËÈ«ÇòÊýǧ¸öÆóÒµ¡£WelltokÔÚ10Ôµ×Ðû²¼ÁËÒ»·Ý֪ͨ£¬³ÆÆäMOVEit Transfer·þÎñÆ÷ÓÚ7ÔÂ26ÈÕÔâµ½ÈëÇÖ¡£¸Ã¹«Ë¾ÔÚ22ÈÕ͸¶£¬ÒÑÈ·ÈÏ´Ë´Îй¶Ê¼þÓ°ÏìÁË8493379ÈË¡£ÕâÊÇMOVEit©¶´µ¼Öµĵڶþ´óÊý¾Ýй¶Ê¼þ£¬½ö´ÎÓÚй¶ÁË1100ÍòÈËÊý¾ÝµÄ·þÎñ³Ð°üÉÌMaximus¡£


https://www.bleepingcomputer.com/news/security/welltok-data-breach-exposes-data-of-85-million-us-patients/


2¡¢Cofense³ÆQakBot±»µ·»ÙºóDarkGateºÍPikaBot¼¤Ôö


CofenseÔÚ11ÔÂ20Èճƣ¬QakBot±»µ·»ÙºóDarkGateºÍPikaBotµÄ»î¶¯¼¤Ôö¡£½ñÄê8Ô·Ý£¬Ö´·¨»ú¹¹²é»ñÁËQakBotµÄ»ù´¡ÉèÊ©¡£ÐÂÒ»ÂÖµöÓã»î¶¯ÓÚ9Ô·ݿªÊ¼Á÷´«DarkGate£¬ºóÀ´ÓÖ¿ªÊ¼Á÷´«PikaBot¡£Ñо¿ÈËÔ±·¢ÏÖ£¬DarkGateºÍPikabot·Ö·¢»î¶¯Ê¹ÓõļÆÄ±ºÍ¼¼ÊõÓë֮ǰµÄQakbot»î¶¯ÀàËÆ£¬°üÂÞ½Ù³Öµç×ÓÓʼþÏß³Ì×÷Ϊ³õÊ¼Ñ¬È¾ÔØÌå¡¢¾ßÓÐÏÞÖÆÓû§·ÃÎÊµÄÆæÌØÄ£Ê½µÄURLÒÔ¼°ÓëQakBot¼¸ºõÏàͬµÄѬȾÁ´¡£¹¥»÷Õß»¹ÊµÑéÁ˶à¸ö³õʼ¶ñÒâÈí¼þÖ²È뷨ʽ£¬°üÂÞJS Dropper¡¢Excel-DNA Loader¡¢VBS DownloadersºÍLNK Downloader¡£


https://cofense.com/blog/are-darkgate-and-pikabot-the-new-qakbot/


3¡¢ActiveMQ©¶´CVE-2023-46604±»ÓÃÀ´·Ö·¢Kinsing


11ÔÂ20ÈÕ£¬TrendMicro³Æ£¬¹¥»÷ÕßÀûÓÃApache ActiveMQ©¶´£¨CVE-2023-46604£©°²×°Kinsing£¨Ò²³Æh2miner£©ºÍ¶ñÒâ¿ó¹¤¡£ÕâÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬ÒÑÓÚ10Ôµױ»ÐÞ¸´¡£¸Ã¶ñÒâÈí¼þʹÓá°ProcessBuilder¡±ÒªÁìÔÚд´½¨µÄϵͳ¼¶½ø³ÌÖÐÖ´ÐжñÒâbash½Å±¾£¬²¢ÔÚ±»Ñ¬È¾É豸ÉÏÏÂÔØÆäËüpayload¡£Kinsing»¹»áÔÚÏà¹Ø½ø³Ì¡¢crontabºÍ»îÔ¾ÍøÂçÁ¬½ÓÖÐÖ÷¶¯²éÕÒ¾ºÕù¹ØÏµµÄ¿ó¹¤£¬²¢ÖÕÖ¹ËüÃÇ¡£


https://www.trendmicro.com/en_us/research/23/k/cve-2023-46604-exploited-by-kinsing.html


4¡¢VMwareÅû¶NetSupport RATÕë¶Ô½ÌÓýµÈÐÐÒµµÄ¹¥»÷


VMwareÔÚ11ÔÂ20ÈÕ͸¶NetSupport RAT¹¥»÷»î¶¯¼¤Ôö£¬Ñо¿ÈËÔ±ÔÚ¹ýÈ¥¼¸ÖÜÄÚÊӲ쵽Áè¼Ý15ÆðÓëÖ®Ïà¹ØµÄÐÂѬȾ¡£ÊÜÓ°Ïì×îÑÏÖØµÄÊǽÌÓýºÍÉÌÒµ·þÎñÐÐÒµ£¬ÒÔ¼°Õþ¸®»ú¹¹¡£×î½üµÄ¹¥»÷ÖУ¬NetSupport RATͨ¹ýαÔìµÄÍøÕ¾ºÍÐé¼Ùä¯ÀÀÆ÷¸üнøÐзַ¢£¬ÕâЩ¶ñÒâÍøÕ¾ÍйÜ×Å¿´ËÆÊǸüеÄPHP½Å±¾£¬µ±Ä¿±ê»÷ÏÂÔØÁ´½Óʱ£¬»áÏÂÔØÌØ±ðµÄJavascript payload¡£Javascript»á´ÓÍⲿÓòÏÂÔØ²¢Ö´ÐÐPowershell£¬PowershellÓÃÓÚ¼ìË÷°üÂÞNetSupport RATµÄZIPÎĵµ¡£


https://blogs.vmware.com/security/2023/11/netsupport-rat-the-rat-king-returns.html


5¡¢Atomic StealerÀûÓÃαÔìµÄä¯ÀÀÆ÷¸üнøÐÐÁ÷´«


11ÔÂ21ÈÕ£¬MalwarebytesÅû¶ÁËAtomic Stealer£¨Ò²³ÆAMOS£©Õë¶ÔMacϵͳµÄ·Ö·¢»î¶¯¡£Ñо¿ÈËÔ±³Æ£¬AMOSÏÖÔÚÕýͨ¹ýÒ»¸öÃûΪ"ClearFake"µÄÐé¼Ùä¯ÀÀÆ÷¸üÐÂÁ´½øÐзַ¢£¬ÕâºÜ¿ÉÄÜÊǵÚÒ»´Î·¢ÏÖÉ繤¹¥»÷£¨ÒÔǰֻÕë¶ÔWindows£©ÔÚµØÀíλÖúÍÄ¿±êϵͳ·½Ãæ¶¼ÓÐËùÀ©Õ¹¡£¶ñÒâÈí¼þpayloadÊÇÒ»¸ö×Ô³ÆÎªSafari»òChrome¸üеÄDMGÎļþ£¬¼ì²ì¶ñÒâÓ¦ÓÃÖеÄ×Ö·û´®¿ÉÒÔ¿´µ½ÕâЩÃüÁî°üÂÞÃÜÂëºÍÎļþץȡ¹¦Ð§£¬ÔÚͬһ¸öÎļþÖл¹¿ÉÒÔÕÒµ½¶ñÒâÈí¼þµÄC2·þÎñÆ÷¡£


https://www.malwarebytes.com/blog/threat-intelligence/2023/11/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates


6¡¢Î¢ÈíÐû²¼Õë¶ÔÓ¡¶ÈµÄAndroidľÂí»î¶¯µÄ·ÖÎö³ÂËß


11ÔÂ20ÈÕ£¬Î¢ÈíÐû²¼ÁËÕë¶ÔÓ¡¶ÈµÄAndroidľÂí»î¶¯µÄ·ÖÎö³ÂËß¡£¹¥»÷ÕßʹÓÃWhatsAppºÍTelegramµÈÉ罻ýÌåÆ½Ì¨·¢ËÍÏûÏ¢£¬Ö¼ÔÚͨ¹ýð³äÒøÐС¢Õþ¸®·þÎñºÍ¹«ÓÃÊÂÒµµÈºÏ·¨»ú¹¹À´ÓÕʹĿ±êÔÚÆäÒÆ¶¯É豸Éϰ²×°¶ñÒâÓ¦Óá£Ò»µ©°²×°£¬ÕâЩ¶ñÒâÓ¦Óþͻá´ÓÓû§ÄÇÀïÇÔÈ¡ÖÖÖÖÀàÐ͵ÄÐÅÏ¢£¬ÆäÖпÉÄܰüÂÞ¸öÈËÐÅÏ¢¡¢ÒøÐÐÏêϸÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢ºÍÕÊ»§Æ¾¾ÝµÈ¡£±¾³ÂËßͨ¹ý·ÖÎöÁ½¸öÕë¶ÔÓ¡¶ÈÒøÐпͻ§µÄÆÛÕ©ÐÔÓ¦Ó÷¨Ê½µÄ¹¥»÷£¬½ÒʾÁËÓ°Ïì¸÷¸öÐÐÒµµÄÒÆ¶¯ÒøÐÐľÂí¹¥»÷»î¶¯¡£


https://www.microsoft.com/en-us/security/blog/2023/11/20/social-engineering-attacks-lure-indian-users-to-install-android-banking-trojans/