Symantec·¢Ã÷LazarusÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2022-04-18

1¡¢Symantec·¢Ã÷LazarusÍÅ»ïÕë¶Ô»¯¹¤ÐÐÒµµÄ¹¥»÷»î¶¯


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ £¬SymantecÐû²¼Á˹ØÓÚ³¯ÏʺڿÍÍÅ»ïLazarus×îлµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£¡£´Ë´Î»î¶¯ËƺõÊÇOperation Dream JobµÄÑÓÐø£¬£¬£¬£¬£¬£¬ £¬×Ô2022Äê1ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬ £¬Ö÷ÒªÕë¶Ô»¯Ñ§ÐÐÒµµÄ×éÖ¯¡£¡£¡£¡£ ¡£¡£¡£¹¥»÷ʼÓÚ¶ñÒâHTMÎļþ£¬£¬£¬£¬£¬£¬ £¬¿ÉÄÜÊÇͨ¹ýÓʼþÖеĶñÒâÁ´½Ó»òWeb·Ö·¢µÄ¡£¡£¡£¡£ ¡£¡£¡£HTMÎļþ»á±»¸´ÖƵ½DLLÎļþscskapplink.dllÖУ¬£¬£¬£¬£¬£¬ £¬²¢×¢Èëµ½Õýµ±µÄϵͳÖÎÀíÈí¼þINISAFE Web EX ClientÖС£¡£¡£¡£ ¡£¡£¡£scskapplink.dllÎļþͨ³£ÊÇ´øÓжñÒâµ¼³öµÄÊðÃûľÂí¹¤¾ß£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓõÄÊðÃû°üÀ¨DOCTER USA,INCºÍ¡°A¡± MEDICAL OFFICE,PLLC¡£¡£¡£¡£ ¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical


2¡¢CiscoÐÞ¸´ÆäWLCÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2022-20695


ýÌå4ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬CiscoÒÑÐÞ¸´ÆäÎÞÏßLAN¿ØÖÆÆ÷(WLC)ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¡£ ¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-20695£¬£¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ10£¬£¬£¬£¬£¬£¬ £¬¿É±»ÓÃÀ´ÈƹýÉí·ÝÑéÖ¤¿ØÖƲ¢Í¨¹ýWLCµÄÖÎÀí½çÃæµÇ¼װ±¸¡£¡£¡£¡£ ¡£¡£¡£CiscoÔÚͨ¸æÖгƣ¬£¬£¬£¬£¬£¬ £¬Õâ¸öÎó²îÊÇÓÉÓÚÃÜÂëÑéÖ¤Ë㷨ʵÑé²»µ±Ôì³ÉµÄ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆµÄƾ֤À´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬£¬ £¬ÀÖ³ÉʹÓúó¿É»ñµÃÖÎÀíԱȨÏÞ²¢ÍêÈ«¿ØÖÆÄ¿µÄ×°±¸¡£¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾½¨ÒéÓû§¸üе½°æ±¾8.10.171.0ÒÔÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£ ¡£¡£¡£


https://thehackernews.com/2022/04/critical-auth-bypass-bug-reported-in.html


3¡¢ÎÚ¿ËÀ¼CERT-UA¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄ¹¥»÷»î¶¯


¾Ý4ÔÂ14Èյı¨µÀ£¬£¬£¬£¬£¬£¬ £¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)¼ì²âµ½Á½ÆðÕë¶ÔÆä¹Ù·½»ú¹¹µÄл¡£¡£¡£¡£ ¡£¡£¡£µÚÒ»Æð´¹Âڻͨ¹ýÃûΪMobilization Register.xlsµÄExcelÎĵµ·Ö·¢IcedID£¨ÓÖÃûBankBot£©£¬£¬£¬£¬£¬£¬ £¬¸Ã»î¶¯ÓëUAC-0041ÍÅ»ïÓйØ¡£¡£¡£¡£ ¡£¡£¡£µÚ¶þÆð´¹ÂڻÒÔ×ÜͳV.ZelenskyΪÎä×°²½¶Ó³ÉÔ±½ÒÏþÑ«ÕÂ×÷ΪÓÕ¶ü£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÁËZimbra Collaboration SuiteÖеÄXSSÎó²î(CVE-2018-6882) ¹¥»÷Õþ¸®×éÖ¯¡£¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-ukrainian-govt-with-icedid-malware-zimbra-exploits/


4¡¢ÀÕË÷ÍÅ»ïOldGremlinʹÓÃкóÃÅTinyFluffÃé×¼¶íÂÞ˹


ýÌå4ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬ £¬Group-IB·¢Ã÷ÁËÀÕË÷ÍÅ»ïOldGremlinÕë¶Ô¶íÂÞ˹µÄÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷¡£¡£¡£¡£ ¡£¡£¡£¹¥»÷Õßð³ä¶íÂÞ˹һ¼Ò½ðÈÚ»ú¹¹µÄ¸ß¼¶»á¼ÆÊ¦£¬£¬£¬£¬£¬£¬ £¬Éù³Æ½üÆÚ¶Ô¶íÂÞ˹ʵÑéµÄÖÆ²Ã½«ÔÝÍ£VisaºÍMastercardÖ§¸¶´¦Öóͷ£ÏµÍ³µÄÔËÓª¡£¡£¡£¡£ ¡£¡£¡£´¹ÂÚÓʼþ½«ÊÕ¼þÈËÖØ¶¨Ïòµ½´æ´¢ÔÚDropboxÖеĶñÒâÎĵµ£¬£¬£¬£¬£¬£¬ £¬²¢ÏÂÔØÒ»¸öÃûΪTinyFluffµÄ×Ô½ç˵ºóÃÅ£¬£¬£¬£¬£¬£¬ £¬¸ÃºóÃÅÊÇTinyNodeµÄбäÖÖ£¬£¬£¬£¬£¬£¬ £¬Ëü»áÆô¶¯Node.jsÚ¹ÊÍÆ÷²¢Ê¹¹¥»÷ÕßÔ¶³Ì»á¼ûÄ¿µÄϵͳ¡£¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/oldgremlin-ransomware-gang-targets-russia-with-new-malware/


5¡¢Î÷°àÑÀ×ãЭRFEFÔâµ½¹¥»÷µ¼ÖÂÓʼþºÍÒôƵµÈÊý¾Ýй¶


¾ÝýÌå4ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬Î÷°àÑÀ»Ê¼Ò×ãÇòЭ»á£¨RFEF£©Ïò¾¯·½±¨¸æÆäÔâµ½ÍøÂç¹¥»÷¡£¡£¡£¡£ ¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂЭ»áÖ÷ϯLuis RubialesºÍÃØÊ鳤Andreu CampsÔÚÄڵĸ߼¶ÖÎÀíÖ°Ô±µÄµç×ÓÓʼþÕÊ»§¡¢Ë½ÈËÎı¾ºÍÒôƵ¶Ô»°µÈÏà¹ØÐÅϢй¶¡£¡£¡£¡£ ¡£¡£¡£RFEFÔÚÉÏÖÜËĵÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬±»µÁÐÅÏ¢ºÜ¿ÉÄÜÒÑÌṩӦ²î±ðµÄýÌå¡£¡£¡£¡£ ¡£¡£¡£ÓÐýÌåÉù³ÆÒÑͨ¹ýµÚÈý·½ÊÕµ½ÁËÉñÃØÌõÔ¼¡¢Ë½ÈËWhatsApp¶Ô»°¡¢µç×ÓÓʼþºÍ´ó×ÚÓйØRFEFÖÎÀíµÄÎļþ¡£¡£¡£¡£ ¡£¡£¡£


https://www.espn.com/soccer/spain-esp/story/4642921/spanish-fa-report-cyber-attack-to-police-after-email-accounts-private-texts-stolen


6¡¢Segran?a-InformaticaÐû²¼ÀÕË÷Èí¼þSunnyDayÆÊÎö±¨¸æ


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ £¬Segran?a-InformaticaÐû²¼Á˹ØÓÚÀÕË÷Èí¼þSunnyDayµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£¡£ËüÊÇÒ»¸ö»ùÓÚSALSA20Á÷ÃÜÂëµÄ¼òÆÓÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬ £¬´øÓÐǶÈëµÄRSA¹«Ô¿blob£¬£¬£¬£¬£¬£¬ £¬ÓÃÓÚ¼ÓÃܶԳÆSALSA20ʹÓõÄÌìÉúÃÜÔ¿£¬£¬£¬£¬£¬£¬ £¬¸ÃÃÜÔ¿ÓÃÀ´¼ÓÃÜÄ¿µÄ×°±¸ÖеÄËùÓпÉÓÃÎļþ¡£¡£¡£¡£ ¡£¡£¡£ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬SunnyDayÓëÆäËüÀÕË÷Èí¼þÑù±¾Ö®¼ä±£´æÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬ £¬ÀýÈçEver101¡¢Medusa Locker¡¢CuratorºÍPayment45£¬£¬£¬£¬£¬£¬ £¬µ«ÈÔÎÞ·¨¶ÔÆä¾ÙÐйéÒò¡£¡£¡£¡£ ¡£¡£¡£


https://seguranca-informatica.pt/analysis-of-the-sunnyday-ransomware/