Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
Ðû²¼Ê±¼ä 2023-08-031¡¢Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷
KasperskyÔÚ7ÔÂ31Èճƣ¬£¬£¬£¬£¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚʹÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²î±ðµÄÖ²Èë³ÌÐò£¬£¬£¬£¬£¬Ã¿¸öÖ²Èë³ÌÐò¶¼ÓÃÓÚ²î±ðµÄ¹¥»÷½×¶Î¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·ݣ¬£¬£¬£¬£¬Éæ¼°Èý¸ö²î±ðµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²Èë³ÌÐò½¨Éè¶ÔÄ¿µÄϵͳµÄ³¤ÆÚÐÔºÍÔ¶³Ì»á¼û£¬£¬£¬£¬£¬²¢ÍøÂçÕì̽Êý¾Ý£»£»£»£»µÚ¶þ½×¶Î£¬£¬£¬£¬£¬APT31»á×°ÖøüרҵµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬À´Ê¹ÓÃUSBÈö²¥´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý£»£»£»£»×îºóµÄµÚÈý½×¶Î£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÖ²Èë³ÌÐò½«ÍøÂçµ½µÄÊý¾ÝÉÏ´«µ½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£
https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/
2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷Ô޳ɽ»45ÍòÃÀÔªÊê½ð
¾Ý8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬¸ÃÕòµÄ°ü¹Ü¹«Ë¾Óë¹¥»÷ÕßÐÉ̸濢ÁË45ÍòÃÀÔªµÄÏ¢ÕùÐÒé¡£¡£¡£¡£¡£ÔÝʱÕò³¤Hartnett³Æ£¬£¬£¬£¬£¬ÏÖÔÚ¹¥»÷ÒѾ»ñµÃÏàʶ¾ö£¬£¬£¬£¬£¬¶Ô¸ÃÕòÓªÒµºÍÔËÓªÖÁ¹ØÖ÷ÒªµÄÊý¾ÝÒ²Òѻָ´¡£¡£¡£¡£¡£¿ÉÊÇһЩÊôÓÚСÎÒ˽¼ÒÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬ºÍÉæ¼°Îª¸ÃÕòЧÀͲ¢´æ´¢ÒÑÍù¼Í¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£¡£¡£¡£¡£ÕâЩɥʧµÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÕæ¹«¹²¼Í¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£¡£¡£¡£¡£
https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/
3¡¢Cofense³Æ½üÆÚʹÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿Ôö¶à
CofenseÓÚ8ÔÂ1ÈÕ͸¶£¬£¬£¬£¬£¬Ê¹ÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔöÌí¡£¡£¡£¡£¡£Google AMPÊÇÓÉGoogleÓë30¸öÏàÖúͬ°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü£¬£¬£¬£¬£¬Ö¼ÔÚÌá¸ßÒÆ¶¯×°±¸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙÂÊ¡£¡£¡£¡£¡£ÕâÖÖеĴ¹ÂÚÕ½ÂÔ½«AMP URLǶÈë´¹ÂÚÓʼþÖУ¬£¬£¬£¬£¬ÕâЩ¶ñÒâURLÓÚ5Ô·Ý×îÏÈ·ºÆð£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚÈö²¥£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡԱ¹¤µÇ¼ƾ֤¡£¡£¡£¡£¡£´ËÀà»î¶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷»î¶¯ºÜÊÇÒþ²Ø£¬£¬£¬£¬£¬²»µ«Ê¹ÓÃÁËGoogle AMP URL£¬£¬£¬£¬£¬»¹Á¬ÏµÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÇå¾²»ù´¡ÉèÊ©¡£¡£¡£¡£¡£
https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/
4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûÕæÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â
¾Ý7ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪUsNsAµÄºÚ¿Í¹ûÕæÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â£¬£¬£¬£¬£¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É£¬£¬£¬£¬£¬×ܾÞϸԼΪ1.8 GB£¬£¬£¬£¬£¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ£¬£¬£¬£¬£¬°üÀ¨Ñо¿ÂÛÎĵȡ£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢ÈëÎó²îÀ´»ñµÃδ¾ÊÚȨµÄ»á¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â£¬£¬£¬£¬£¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£¡£¡£¡£¡£
https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum
5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½·¨Collide+PowerÓ°ÏìÏÕЩËùÓÐCPU
¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬Ó°ÏìÁËÏÕЩËùÓÐCPU£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£ÆäÖ÷Òª¿´·¨ÊÇ£¬£¬£¬£¬£¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦ÓóÌÐò·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖб¬·¢Êý¾Ý¡°³åÍ»¡±²¢ÁýÕÖǰÕßʱ£¬£¬£¬£¬£¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2023-20583£¬£¬£¬£¬£¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¸ÃÎó²î¾ßÓÐÑо¿ÒâÒ壬£¬£¬£¬£¬µ«Ê¹ÓÃÆðÀ´½ÏÁ¿ÄÑÌ⣬£¬£¬£¬£¬Òò´ËÑÏÖØË®Æ½½ÏµÍ¡£¡£¡£¡£¡£ÖÁÓÚ»º½â²½·¥£¬£¬£¬£¬£¬ÐèÒªÖØÐÂÉè¼ÆCPU£¬£¬£¬£¬£¬ÒÔÊǸüÏÖʵµÄ»º½â²½·¥ÊDZÜÃâ¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźš£¡£¡£¡£¡£
https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/
6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ1ÈÕ£¬£¬£¬£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»¸öеĴ¹Âڻ£¬£¬£¬£¬£¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2022Äê12ÔÂ×óÓÒ×îÏÈ£¬£¬£¬£¬£¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer£¬£¬£¬£¬£¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄ»î¶¯Éæ¼°Á½¸ö±äÌ壬£¬£¬£¬£¬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§£¬£¬£¬£¬£¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±Ò×ʽðµÈ£»£»£»£»µÚ¶þ¸öÖ§³ÖÌØÊ⹦Ч£¬£¬£¬£¬£¬ÀýÈçÆÊÎöOutlookÓʼþ¡¢Í¨¹ýTelegram¾ÙÐÐÊý¾Ýй¶¡¢Ð®ÖÆFacebookÕË»§ºÍ·´ÆÊÎöµÈ¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/


¾©¹«Íø°²±¸11010802024551ºÅ