Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ

Ðû²¼Ê±¼ä 2024-05-23
1. Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ


5ÔÂ22ÈÕ£¬£¬ £¬£¬Ò»¸öÓë¶íÂÞ˹Óйصĸ߼¶Ò»Á¬ÐÔÍþв (APT) ×éÖ¯Ò»Ö±ÔÚÀÄÓà PDF ºÍ MSBuild ÏîÄ¿Îļþ£¬£¬ £¬£¬Ê¹ÓÃÉç½»¹¤³Ìµç×ÓÓʼþ½« TinyTurla ºóÃÅ×÷ΪÎÞÎļþ¸ºÔؾÙÐÐÈö²¥¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬¸Ã»î¶¯µÄÎÞ·ìÈö²¥³ÌÐòÔÚÖØ´óÐÔ·½ÃæÈ¡µÃÁËÏÔÖøµÄǰ½ø¡£¡£¡£Cyble Ñо¿Ö°Ô±ºÍÇ鱨ʵÑéÊÒ (CRIL) µÄÑо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬ £¬£¬¸Ã»î¶¯Ê¹Óõç×ÓÓʼþºÍÔ¼ÇëÈËȨ×êÑлá»òÌṩ¹«¹²×ÉѯµÄÎļþ×÷ΪÓÕ¶ü£¬£¬ £¬£¬ÒÔѬȾ TinyTurla Óû§¡£¡£¡£ËûÃÇÔÚ×òÌìÐû²¼µÄÓйظûµÄ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬ £¬£¬¹¥»÷Õß»¹Ã°³äÕýµ±Õþ¸®£¬£¬ £¬£¬ÒÔÒýÓÕÊܺ¦ÕßÊÜÆ­¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬£¬TinyTurla ºóÃÅÓë¶íÂÞ˹×ÊÖúµÄºã¾ÃÍþв×éÖ¯TurlaÓйØ£¬£¬ £¬£¬¸Ã×é֯ͨ³£Õë¶Ô·ÇÕþ¸®×éÖ¯£¬£¬ £¬£¬¡°ÌØÊâÊÇÄÇЩÓëÖ§³ÖÎÚ¿ËÀ¼ÓÐÁªÏµµÄ×éÖ¯¡±¡£¡£¡£Ìû×ӳƣ¬£¬ £¬£¬ËûÃÇÒÔΪ¸Ã×éÖ¯ÊǶñÒâ¹¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russia-turla-apt-msbuild-tinyturla-backdoor


2. CISA ÖÒÑÔʹÓÃMirth ConnectÎó²îµÄ¹¥»÷»î¶¯


5ÔÂ21ÈÕ£¬£¬ £¬£¬Mirth Connect ÊÇÒ»ÖÖÆÕ±éʹÓÃµÄ¿çÆ½Ì¨½çÃæÒýÇæ£¬£¬ £¬£¬Ò½ÁƱ£½¡×éÖ¯½«ÆäÓÃÓÚÐÅÏ¢ÖÎÀí¡£¡£¡£Ó°Ï쿪Դ²úÆ·µÄÎó²î CVE-2023-43208 ÊÇÒ»¸öÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬ £¬£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£4.4.1 °æÐû²¼Ê±ÒÑÍÆ³ö²¹¶¡¡£¡£¡£¸ÃÎó²îÓÚ 2023 Äê 10 ÔÂÆØ¹â£¬£¬ £¬£¬ÆäÊ±ÍøÂçÇå¾²¹«Ë¾ Horizon3.ai ÖÒÑԳƸÃÎó²î¿ÉÄܶÔÒ½ÁƱ£½¡¹«Ë¾Ôì³ÉÓ°Ïì¡£¡£¡£CVE-2023-43208 ÊÇ CVE-2023-37679 µÄÒ»¸ö±äÌ壬£¬ £¬£¬Mirth Connect ¿ª·¢Ö°Ô±Ö®Ç°ÒÑÔÚ 4.4.0 °æÐû²¼Ê±¶Ô¸ÃÎó²î¾ÙÐÐÁËÐÞ²¹¡£¡£¡£Horizon3.ai Æäʱ½«¸ÃÎó²îÐÎòΪÒ×ÓÚʹÓ㬣¬ £¬£¬²¢ÖÒÑԳơ°¹¥»÷ÕߺܿÉÄÜʹÓôËÎó²î¾ÙÐгõʼ»á¼û»òÆÆËðÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡±¡£¡£¡£¸ÃÇå¾²¹«Ë¾»¹Ö¸³ö£¬£¬ £¬£¬·¢Ã÷ÁË 1,200 ¶à¸ö̻¶ÔÚ»¥ÁªÍøÉ쵀 NextGen Mirth Connect ʵÀý¡£¡£¡£


https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/


3. ºÚ¿ÍÍÅ»ïʹÓÃÀÕË÷Èí¼þ¹¥»÷·ÆÂɱöÕþ¸®


5ÔÂ22ÈÕ£¬£¬ £¬£¬ºÚ¿ÍÕýÔÚʹÓÃй¶µÄÀÕË÷Èí¼þ¹¹½¨Õß¶Ô·ÆÂɱöµÄÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷¡ª¡ªÕâÊdzöÓÚÕþÖÎÄîÍ·µÄÕûÌåµÄÇ÷ÊÆµÄÒ»²¿·Ö£¬£¬ £¬£¬ËûÃÇÔ½À´Ô½¶àµØÊÔͼÈÅÂÒÕâ¸ö¶«ÄÏÑǹú¼ÒµÄÉúÑÄ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ SentinelOneµÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬Ò»¸öÃûΪ¡°Ikaruz Red Team¡±µÄ×éÖ¯ÊÇÉÙÊý¼¸¸öÕë¶Ô·ÆÂɱöÕþ¸®Ä¿µÄµÄºÚ¿Í×éÖ¯Ö®Ò»¡£¡£¡£¸ÃÐж¯Ê¹ÓÃÁ˶àÖÖÀÕË÷Èí¼þ¹¹½¨Õß¡ª¡ª°üÀ¨ LockBit¡¢Vice Society¡¢Clop ºÍ AlphV¡ª¡ªÌᳫ¡°Ð¡¹æÄ£¡±¹¥»÷¡£¡£¡£Ëü»¹ÔÚÍøÉÏÐû´«·ÆÂɱö¶à¸ö×éÖ¯µÄÊý¾Ýй¶ÇéÐΡ£¡£¡£SentinelOne ÌåÏÖ£¬£¬ £¬£¬Êܺ¦ÕßµÄÌõ×ÓÏÕЩËùÓÐØâÇÔ×Ôԭʼ LockBit Ä£°å£¬£¬ £¬£¬¶¥²¿µÄÃû×Ö³ýÍâ¡£¡£¡£Î´ÌṩÁªÏµÐÅÏ¢¡£¡£¡£


https://therecord.media/philippines-hacktivist-groups-leaked-versions-ransomware


4. GhostEngine ÍÚ¿ó¹¥»÷ʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯


5ÔÂ22ÈÕ£¬£¬ £¬£¬ÒÑ·¢Ã÷´úºÅΪ¡°REF4578¡±µÄ¶ñÒâ¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯°²ÅÅÁËÃûΪ GhostEngine µÄ¶ñÒâ¸ºÔØ£¬£¬ £¬£¬¸Ã¸ºÔØÊ¹ÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÀ´¹Ø±ÕÇå¾²²úÆ·²¢°²ÅÅ XMRig ÍÚ¿ó³ÌÐò¡£¡£¡£Elastic Security Labs ºÍ °²ÌìµÄÑо¿Ö°Ô±  ÔÚµ¥¶ÀµÄ±¨¸æºÍ¹²ÏíµÄ¼ì²â¹æÔòÖÐÇ¿µ÷ÁËÕâЩ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷µÄÒì³£ÖØ´óÐÔ£¬£¬ £¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ×èÖ¹ËüÃÇ¡£¡£¡£È»¶ø£¬£¬ £¬£¬Á½·Ý±¨¸æ¾ù佫¸Ã»î¶¯¹é×ïÓÚÒÑÖªµÄÍþвÐÐΪÕߣ¬£¬ £¬£¬Ò²Î´·ÖÏíÓйØÄ¿µÄ/Êܺ¦ÕßµÄÏêϸÐÅÏ¢£¬£¬ £¬£¬Òò´Ë¸Ã»î¶¯µÄÆðÔ´ºÍ¹æÄ£ÈÔȻδ֪¡£¡£¡£ËäÈ»Éв»ÇåÎúЧÀÍÆ÷×î³õÊÇÔõÑù±»ÆÆËðµÄ£¬£¬ £¬£¬µ«ÍþвÐÐΪÕߵĹ¥»÷´ÓÖ´ÐÐÃûΪ¡°Tiworker.exe¡±µÄÎļþ×îÏÈ£¬£¬ £¬£¬¸ÃÎļþαװ³ÉÕýµ±µÄ Windows Îļþ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÊÇ GhostEngine µÄ³õʼµÇ̨ÓÐÓøºÔØ£¬£¬ £¬£¬GhostEngine ÊÇÒ»¸ö PowerShell ¾ç±¾£¬£¬ £¬£¬¿ÉÏÂÔØÖÖÖÖÄ£¿£¿£¿£¿£¿£¿éÒÔÔÚÊÜѬȾµÄ×°±¸ÉÏÖ´Ðвî±ðµÄÐÐΪ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghostengine-mining-attacks-kill-edr-security-using-vulnerable-drivers/


5. Î÷ϤÄá´óѧÔâµ½ºÚ¿Í¹¥»÷²¿·ÖѧÉúÊý¾Ýй¶


5ÔÂ21ÈÕ£¬£¬ £¬£¬ÔÚÍþвÐÐΪÕ߯ÆËðÁËÆä Microsoft 365 ºÍ Sharepoint ÇéÐκ󣬣¬ £¬£¬Î÷ϤÄá´óѧ (WSU) ÒÑÏòѧÉúºÍѧÊõְԱת´ïÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£WSU ÊǰĴóÀûÑǵÄÒ»Ëù½ÌÓý»ú¹¹£¬£¬ £¬£¬Ìṩ¿çѧ¿ÆµÄÆÕ±é±¾¿Æ¡¢Ñо¿ÉúºÍÑо¿¿Î³Ì¡£¡£¡£ËüÓµÓÐ 47,000 ÃûѧÉúºÍ 4,500 ¶àÃûÕýʽºÍ¼¾½ÚÐÔÔ±¹¤£¬£¬ £¬£¬ÔËÓªÔ¤ËãΪ 6 ÒÚÃÀÔª¡£¡£¡£Î÷ϤÄá´óÑ§ÍøÕ¾½ñÈÕÐû²¼Í¨¸æ£¬£¬ £¬£¬ÖÒÑԳƺڿÍÒÑ»á¼ûÆä Microsoft Office 365 ÇéÐΣ¬£¬ £¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍ SharePoint Îļþ¡£¡£¡£Ëù̻¶µÄÊý¾ÝÒòÈ˶øÒ죬£¬ £¬£¬Ïêϸȡ¾öÓÚµç×ÓÓʼþͨѶµÄÄÚÈÝÒÔ¼°´óѧ SharePoint ÇéÐÎÖд洢µÄÎĵµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-data-breach-exposed-student-data/#google_vignette


6. Void ManticoreÃé×¼ÒÔÉ«ÁкͰ¢¶û°ÍÄáÑÇ


5ÔÂ22ÈÕ£¬£¬ £¬£¬¸Ã×éÖ¯ÃûΪ Void Manticore (Storm-0842)£¬£¬ £¬£¬ÔÚ²î±ð¹ú¼ÒÒÔÖÖÖÖ¼ÙÃû¿ªÕ¹»î¶¯¡£¡£¡£×îÖøÃûµÄÓÖÃû°üÀ¨Õë¶Ô°¢¶û°ÍÄáÑÇÏ®»÷µÄ¡°ÁìÍÁÕýÒ塱ºÍÕë¶ÔÒÔÉ«ÁÐÐж¯µÄ¡°Òò¹û±¨Ó¦¡±¡£¡£¡£Õë¶Ô²î±ðµÄÇøÓò£¬£¬ £¬£¬Õë¶Ôÿ¸öÄ¿µÄ½ÓÄÉÆæÒìµÄÒªÁì¡£¡£¡£¸Ã×éÖ¯µÄ»î¶¯ÓëÁíÒ»¸öÒÁÀÊ×éÖ¯ Scarred Manticore µÄ»î¶¯Öصþ£¬£¬ £¬£¬ÕâÅúעЭЭµ÷ϵͳµÄÊܺ¦ÕßÑ¡ÔñÊÇËûÃÇΪÒÁÀÊÇ鱨ºÍÇå¾²²¿ (MOIS) ÊÂÇéµÄÒ»²¿·Ö¡£¡£¡£×¨¼ÒÖÒÑÔ˵£¬£¬ £¬£¬Ðé¿ÕЫʨ¶ÔÈκÎ×èµ²ÒÁÀÊÀûÒæµÄÈË×é³ÉÖØ´óÍþв¡£¡£¡£¸Ã×é֯ʹÓÃÖØ´óµÄ¼ÙÃûÍøÂç¡¢Õ½ÂÔЭ×÷ºÍÖØ´óµÄ¹¥»÷ÒªÁì¡£¡£¡£¸Ã×éÖ¯ÒÔÆäË«ÖØÍøÂç¹¥»÷·½·¨¶øÖøÃû£¬£¬ £¬£¬½«ÎïÀíÊý¾ÝÆÆËðÓëÐÄÀíѹÁ¦ÏàÁ¬Ïµ¡£¡£¡£Void Manticore ʹÓÃÎåÖÖ²î±ðµÄÒªÁ죬£¬ £¬£¬°üÀ¨Õë¶Ô Windows ºÍ Linux µÄ×Ô½ç˵²Á³ýÆ÷£¬£¬ £¬£¬Í¨¹ýɾ³ýÎļþºÍʹÓù²Ïí´ÅÅÌÀ´ÆÆËðϵͳ¡£¡£¡£


https://meterpreter.org/void-manticore-iranian-state-sponsored-hackers-target-israel-albania/