Turla APT ºÚ¿ÍÀûÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯

Ðû²¼Ê±¼ä 2024-04-12
1. Turla APT ºÚ¿ÍÀûÓúóÃŹ¥»÷Å·ÖÞµÄ×éÖ¯


4ÔÂ11ÈÕ  £¬ÍøÂçÄþ¾²×¨¼Ò·¢ÏÖ  £¬¶íÂÞ˹Turla¸ß¼¶Á¬ÐøÍþв (APT) ×éÖ¯ÉøÍ¸µ½°¢¶û°ÍÄáÑǵÄÒ»´Îʧ°ÜʵÑé¡£´ËʼþÊÇÕë¶ÔÅ·ÖÞ¹ú¼ÒµÄ¸ü¹ã·ºÍøÂç¼äµý»î¶¯µÄÒ»²¿ÃÅ  £¬²¨À¼Ò²³ÉΪÕâЩÅÓ´ó¹¥»÷µÄÊܺ¦Õß¡£ÕâÒ»·¢ÏÖÓëÁ¬ÐøµÄµØÔµÕþÖνôÕžÖÊÆÏàÒ»Ö  £¬²¢Í¹ÏÔÁ˹ú¼ÒÁªÃËÐÐΪÕß²»Í£Éý¼¶µÄÍøÂçÕ½¼ÆÄ±¡£Turla APT ×éÖ¯ÒÔÆäÅÓ´óµÄÍøÂç¼äµý»î¶¯¶øÎÅÃû  £¬ÀúÀ´ÒÔÓ벨Â޵ĺ£ºÍ¶«Å·¹ú¼ÒÕþ¸®²¿ÃÅÓÐÁªÏµµÄ×é֯ΪĿ±ê¡£×î½üÔÚ°¢¶û°ÍÄáÑǺͲ¨À¼µÄ»î¶¯Í»ÏÔÁ˸Ã×éÖ¯ÔÚÎÚ¿ËÀ¼Õ½ÕùµÄ¸ü¹ã·ºÅ侰ϲ»Í£Å¬Á¦ÊÕ¼¯Ç鱨²¢Ê©¼ÓÓ°Ïì¡£


https://gbhackers.com/cyber-espionage-turla-apt-hackers-attack-european-organization-with-backdoor/


2. TA547 ÀûÓÃÒÉËÆ AI Éú³ÉµÄ Rhadamanthys Ãé×¼µÂ¹ú


4ÔÂ10ÈÕ  £¬ÔÚProofpoint×î½üÆØ¹âµÄÒ»´ÎºÚ¿Í»î¶¯ÖÐÖ®ºó  £¬µÂ¹ú×éÖ¯ÃæÁÙ¶à·½ÃæµÄ¹¥»÷¡£³öÓÚ¾­¼Ã¶¯»úµÄ×éÖ¯ TA547 Ê״β¿ÊðÁË Rhadamanthys ÐÅÏ¢ÇÔÈ¡¹¤¾ß  £¬Õâ±êÖ¾×ÅËûÃǹßÓüÆÄ±µÄת±ä¡£ÓÐȤµÄÊÇ  £¬ºÚ¿Í¿ÉÄÜ´ÓÒ»¸öÒâÏë²»µ½µÄÀ´Ô´¡ª¡ªÈ˹¤ÖÇÄÜ¡ª¡ªÄÇÀïµÃµ½ÁË×ÊÖú¡£¸Ã»î¶¯µÄ»ùʯÊDz¿ÊðRhadamanthys  £¬ÕâÊÇÒ»ÖÖÔÚ TA547 µÄÎäÆ÷¿âÖÐÒÔÇ°Î´Ôø¼û¹ýµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£ÕâÖÖ¶ñÒâÈí¼þÒÔÆäЧÁ¦ºÍÔÚÍøÂç·¸×ïȦ×ÓÖеĹ㷺ʹÓöøÎÅÃû  £¬±êÖ¾×Å TA547 ÔËÓª¼ÆÄ±µÄÕ½ÂÔÖ§µã¡£¹¥»÷Õßαװ³ÉÀ´×Ե¹úÖøÃûÁãÊÛ¾ÞÍ· Metro µÄͨÐÅ  £¬¾Ý³ÆÓ뷢ƱÓйØ¡£


https://securityonline.info/ta547-targets-germany-with-rhadamanthys-suspected-ai-generated-code/


3. Raspberry Robin ʹÓà Windows ½Å±¾Îļþ½øÐÐÁ÷´«


4ÔÂ10ÈÕ  £¬Raspberry Robin ÊÇÒ»ÖÖÊÊÓ¦ÐÔÇ¿¡¢¹æ±ÜÐÔÇ¿µÄÈ䳿ºÍ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½  £¬ÓÚ 2021 ÄêÊ״ηºÆðÔÚÍøÂçÍþв³¡¾°ÖÐ  £¬ÏÖÔÚÕýÔÚʹÓÃÒ»ÖÖÐÂÒªÁìÀ´Á÷´«Æä¶ñÒâ´úÂ롣ƾ¾Ý HP Wolf Security ÍþвÑо¿ÈËÔ±±¾ÖÜÐû²¼µÄÒ»·Ý³ÂËß  £¬ÉϸöÔ¼ì²âµ½µÄÒ»Ïîл±íÃ÷ Raspberry Robin ±³ºóµÄÔËÓªÉÌÕýÔÚʹÓöñÒâ Windows ½Å±¾Îļþ(WSF) À´Á÷´«Æä¶ñÒâÈí¼þ  £¬ÕâÓëËûÃǸüÆÕ±éµÄʹÓÃÒªÁì²îÒì¡£×î½ü  £¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ýʹÓà Discord ÏûÏ¢·þÎñÒÔ¸½¼þÐÎʽ·¢Ë͵Ĵ浵ÎļþÏÂÔØ£¨½«×ÔÉíαװ³ÉºÏ·¨ÇÒÒÑÇ©ÃûµÄ Windows ¿ÉÖ´ÐÐÎļþ£©ÒÔ¼°Í¨¹ýÄ¿±ê Web ä¯ÀÀÆ÷ÏÂÔØµÄ 7-Zip ´æµµ½øÐÐÁ÷´«¡£


https://securityboulevard.com/2024/04/raspberry-robin-malware-now-using-windows-script-files-to-spread/


 4. Spectre v2 ¹¥»÷Ó°Ïì Intel CPU É쵀 Linux ϵͳ

 

4ÔÂ10ÈÕ  £¬Spectre V2 Êǰ¢Ä·Ë¹Ìص¤×ÔÓÉ´óѧ VUSec С×éµÄÒ»×éÑо¿ÈËÔ±·¢ÏÖµÄԭʼ Spectre ¹¥»÷µÄбäÌå¡£Ñо¿ÈËÔ±»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß  £¬¸Ã¹¤¾ßʹÓ÷ûºÅÖ´ÐÐÀ´Ê¶±ð Linux ÄÚºËÖпÉÀûÓõĴúÂë¶Î  £¬ÒÔ×ÊÖú»º½âÎÊÌâ¡£Õâһз¢ÏÖÇ¿µ÷ÁËÆ½ºâÐÔÄÜÓÅ»¯ÓëÄþ¾²ÐÔµÄÌôÕ½  £¬ÕâʹµÃ½â¾ö»ù±¾µÄ CPU ȱÏݱäµÃÅÓ´ó  £¬¼´Ê¹ÊÇÔÚ Spectre ·¢ÏÖÁùÄêºó ¡£Ó¢Ìضû»¹¸üÐÂÁËÕë¶Ô Spectre v2 µÄ»º½â½¨Òé  £¬ÏÖÔÚ½¨Òé½ûÓ÷ÇÌØÈ¨À©Õ¹²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷ (eBPF) ¹¦Ð§  £¬ÆôÓÃÔöÇ¿Ðͼä½Ó·ÖÖ§ÏÞÖÆÍÆ²â (eIBRS)  £¬²¢ÆôÓùÜÀíԱģʽִÐб£»¤ (SMEP)¡£

 

https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/


5. RUBYCARP SSH ±©Á¦½©Ê¬ÍøÂçͨ¹ýй¤¾ß»Ø¹é


4ÔÂ10ÈÕ  £¬ÓÉÓÚÒÔ SSH ±©Á¦¹¥»÷¶øÎÅÃûµÄÎÛÃûÕÑÖøµÄ½©Ê¬ÍøÂç×éÖ¯ RUBYCARP ƾ½èÐµĹ¤¾ßºÍ¼ÆÄ±ÖØÐ·ºÆð  £¬ÍøÂçÄþ¾²ÉçÇøÔٴδ¦Óڸ߶Ƚ䱸״̬¡£Sysdig ÍþвÑо¿ÍÅ¶Ó (Sysdig TRT) Ò»Ö±ÔÚÃÜÇмàÊÓÕâ¸öÂÞÂíÄáÑÇÍþв×éÖ¯µÄ»î¶¯  £¬¸Ã×éÖ¯ÒѾ­»îÔ¾ÁËÊ®¶àÄê  £¬×î½ü·¢ÏÖÆäÐж¯·ºÆðÁËÖØ´ó½øÕ¹¡£RUBYCARP ÔÙÆðµÄºËÐÄÊÇÀûÓà Laravel Ó¦Ó÷¨Ê½ÖеÄÒ»¸öÒªº¦Â©¶´ CVE-2021-3129¡£´Ë©¶´Ò»Ö±ÊǸÃ×éÖ¯µÄÄ¿±êºÍÀûÓÃÊÂÇéµÄ½¹µã  £¬Ê¹ËûÃÇÄܹ»»ñµÃ¶ÔϵͳµÄδ¾­ÊÚȨµÄ·ÃÎʲ¢À©´óÆä½©Ê¬ÍøÂç¡£³ýÁËÀûÓà CVE-2021-3129 Ö®Íâ  £¬RUBYCARP »¹Ê¹ÓÃSSH ±©Á¦¹¥»÷½øÈëÄ¿±êÍøÂç¡£¸Ã×éÖ¯µÄ¼á³ÖºÍ¼ÆÄ±µÄÑݱäÇ¿µ÷ÁËÐÞ²¹ÒÑ֪©¶´ºÍ¼ÓÇ¿ SSH Äþ¾²´ëÊ©ÒÔ×èÖ¹´ËÀ๥»÷µÄÖØÒªÐÔ¡£Sysdig TRT µÄ×îз¢ÏÖ±íÃ÷  £¬RUBYCARP ²»½ö¼ÌÐøÆä´«Í³µÄ±©Á¦ÆÆ½âºÍÀûÓû  £¬¶øÇÒ»¹Ìí¼ÓÁËм¼Êõ¡£


https://gbhackers.com/rubycarp-ssh-brute-botnet/


6. Ð嵀 SharePoint ¼¼Êõ¿ÉÈúڿÍÈÆ¹ýÄþ¾²´ëÊ©


4ÔÂ10ÈÕ  £¬SharePoint Öз¢ÏÖµÄÁ½ÖÖм¼Êõʹ¶ñÒâÐÐΪÕßÄܹ»Èƹý´«Í³Äþ¾²´ëÊ©²¢ÔÚ²»´¥·¢³ß¶È¼ì²â»úÖÆµÄÇé¿öÏÂй¶Ãô¸ÐÊý¾Ý¡£·Ç·¨ÎļþÏÂÔØ¿ÉÄÜ»áαװ³ÉÎÞº¦µÄ»î¶¯  £¬Ê¹ÍøÂçÄþ¾²·ÀÓù´ëÊ©ÄÑÒÔ¼ì²âµ½ËüÃÇ¡£µÚÒ»ÖÖ¼¼Êõ±»³ÆÎª¡°ÔÚÓ¦Ó÷¨Ê½Öдò¿ªÒªÁ족  £¬ËüÀûÓÃÁË SharePoint ¹¦Ð§  £¬¸Ã¹¦Ð§ÔÊÐíÓû§Ö±½ÓÔÚ¹ØÁªµÄÓ¦Ó÷¨Ê½Öдò¿ªÎĵµ¡£ËäÈ»Õâ¸ö¹¦Ð§ÊÇΪÁË·½±ãÓû§¶øÉè¼ÆµÄ  £¬µ«È´ÎÞÒâÖÐÔì³ÉÁËÊý¾Ýй¶µÄ©¶´¡£¹¥»÷Õß¿ÉÒÔʹÓô˹¦Ð§µÄµ×²ã´úÂëÀ´·ÃÎʺÍÏÂÔØÎļþ  £¬Ö»ÔÚÎļþµÄÉóºËÈÕÖ¾ÖÐÁôÏ·ÃÎÊʼþ¡£µÚ¶þÖÖ¼¼ÊõÉæ¼°¶Ô Microsoft SkyDriveSync£¨ÏÖÔÚ³ÆÎª OneDrive£©µÄÓû§ÊðÀí×Ö·û´®µÄ²Ù×÷¡£Í¨¹ýαװ³Éͬ²½¿Í»§¶Ë  £¬¹¥»÷Õß¿ÉÒÔÏÂÔØÎļþÉõÖÁÕû¸öSharePointÍøÕ¾¡£ÕâЩÏÂÔØ±»´íÎ󵨱ê־ΪÎļþͬ²½Ê¼þ¶ø²»ÊÇʵ¼ÊÏÂÔØ  £¬´Ó¶øÈƹýÁËÖ¼ÔÚ¼ì²âºÍ¼Ç¼ÎļþÏÂÔØµÄÄþ¾²´ëÊ©¡£ÕâÖÖÒªÁìÌØ±ðÒõÏÕ  £¬ÒòΪËü¿ÉÓÃÓÚ´ó¹æÄ£ÇÔÈ¡Êý¾Ý  £¬¶øÇÒͬ²½Î±×°Ê¹Äþ¾²¹¤¾ß¸üÄÑÒÔÇø·ÖºÏ·¨»î¶¯ºÍ¶ñÒâ»î¶¯¡£


https://gbhackers.com/sharepoint-technique-bypas/