Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ

Ðû²¼Ê±¼ä 2024-05-23
1. Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ


5ÔÂ22ÈÕ£¬£¬£¬Ò»¸öÓë¶íÂÞ˹Óйصĸ߼¶Ò»Á¬ÐÔÍþв (APT) ×éÖ¯Ò»Ö±ÔÚÀÄÓà PDF ºÍ MSBuild ÏîÄ¿Îļþ£¬£¬£¬Ê¹ÓÃÉç½»¹¤³Ìµç×ÓÓʼþ½« TinyTurla ºóÃÅ×÷ΪÎÞÎļþ¸ºÔؾÙÐÐÈö²¥¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬¸Ã»î¶¯µÄÎÞ·ìÈö²¥³ÌÐòÔÚÖØ´óÐÔ·½ÃæÈ¡µÃÁËÏÔÖøµÄǰ½ø¡£¡£¡£Cyble Ñо¿Ö°Ô±ºÍÇ鱨ʵÑéÊÒ (CRIL) µÄÑо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬¸Ã»î¶¯Ê¹Óõç×ÓÓʼþºÍÔ¼ÇëÈËȨ×êÑлá»òÌṩ¹«¹²×ÉѯµÄÎļþ×÷ΪÓÕ¶ü£¬£¬£¬ÒÔѬȾ TinyTurla Óû§¡£¡£¡£ËûÃÇÔÚ×òÌìÐû²¼µÄÓйظûµÄ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬£¬¹¥»÷Õß»¹Ã°³äÕýµ±Õþ¸®£¬£¬£¬ÒÔÒýÓÕÊܺ¦ÕßÊÜÆ­¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬TinyTurla ºóÃÅÓë¶íÂÞ˹×ÊÖúµÄºã¾ÃÍþв×éÖ¯TurlaÓйØ£¬£¬£¬¸Ã×é֯ͨ³£Õë¶Ô·ÇÕþ¸®×éÖ¯£¬£¬£¬¡°ÌØÊâÊÇÄÇЩÓëÖ§³ÖÎÚ¿ËÀ¼ÓÐÁªÏµµÄ×éÖ¯¡±¡£¡£¡£Ìû×ӳƣ¬£¬£¬ËûÃÇÒÔΪ¸Ã×éÖ¯ÊǶñÒâ¹¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russia-turla-apt-msbuild-tinyturla-backdoor


2. CISA ÖÒÑÔʹÓÃMirth ConnectÎó²îµÄ¹¥»÷»î¶¯


5ÔÂ21ÈÕ£¬£¬£¬Mirth Connect ÊÇÒ»ÖÖÆÕ±éʹÓÃµÄ¿çÆ½Ì¨½çÃæÒýÇæ£¬£¬£¬Ò½ÁƱ£½¡×éÖ¯½«ÆäÓÃÓÚÐÅÏ¢ÖÎÀí¡£¡£¡£Ó°Ï쿪Դ²úÆ·µÄÎó²î CVE-2023-43208 ÊÇÒ»¸öÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£4.4.1 °æÐû²¼Ê±ÒÑÍÆ³ö²¹¶¡¡£¡£¡£¸ÃÎó²îÓÚ 2023 Äê 10 ÔÂÆØ¹â£¬£¬£¬ÆäÊ±ÍøÂçÇå¾²¹«Ë¾ Horizon3.ai ÖÒÑԳƸÃÎó²î¿ÉÄܶÔÒ½ÁƱ£½¡¹«Ë¾Ôì³ÉÓ°Ïì¡£¡£¡£CVE-2023-43208 ÊÇ CVE-2023-37679 µÄÒ»¸ö±äÌ壬£¬£¬Mirth Connect ¿ª·¢Ö°Ô±Ö®Ç°ÒÑÔÚ 4.4.0 °æÐû²¼Ê±¶Ô¸ÃÎó²î¾ÙÐÐÁËÐÞ²¹¡£¡£¡£Horizon3.ai Æäʱ½«¸ÃÎó²îÐÎòΪÒ×ÓÚʹÓ㬣¬£¬²¢ÖÒÑԳơ°¹¥»÷ÕߺܿÉÄÜʹÓôËÎó²î¾ÙÐгõʼ»á¼û»òÆÆËðÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡±¡£¡£¡£¸ÃÇå¾²¹«Ë¾»¹Ö¸³ö£¬£¬£¬·¢Ã÷ÁË 1,200 ¶à¸ö̻¶ÔÚ»¥ÁªÍøÉ쵀 NextGen Mirth Connect ʵÀý¡£¡£¡£


https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/


3. ºÚ¿ÍÍÅ»ïʹÓÃÀÕË÷Èí¼þ¹¥»÷·ÆÂɱöÕþ¸®


5ÔÂ22ÈÕ£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃй¶µÄÀÕË÷Èí¼þ¹¹½¨Õß¶Ô·ÆÂɱöµÄÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷¡ª¡ªÕâÊdzöÓÚÕþÖÎÄîÍ·µÄÕûÌåµÄÇ÷ÊÆµÄÒ»²¿·Ö£¬£¬£¬ËûÃÇÔ½À´Ô½¶àµØÊÔͼÈÅÂÒÕâ¸ö¶«ÄÏÑǹú¼ÒµÄÉúÑÄ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ SentinelOneµÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬Ò»¸öÃûΪ¡°Ikaruz Red Team¡±µÄ×éÖ¯ÊÇÉÙÊý¼¸¸öÕë¶Ô·ÆÂɱöÕþ¸®Ä¿µÄµÄºÚ¿Í×éÖ¯Ö®Ò»¡£¡£¡£¸ÃÐж¯Ê¹ÓÃÁ˶àÖÖÀÕË÷Èí¼þ¹¹½¨Õß¡ª¡ª°üÀ¨ LockBit¡¢Vice Society¡¢Clop ºÍ AlphV¡ª¡ªÌᳫ¡°Ð¡¹æÄ£¡±¹¥»÷¡£¡£¡£Ëü»¹ÔÚÍøÉÏÐû´«·ÆÂɱö¶à¸ö×éÖ¯µÄÊý¾Ýй¶ÇéÐΡ£¡£¡£SentinelOne ÌåÏÖ£¬£¬£¬Êܺ¦ÕßµÄÌõ×ÓÏÕЩËùÓÐØâÇÔ×Ôԭʼ LockBit Ä£°å£¬£¬£¬¶¥²¿µÄÃû×Ö³ýÍâ¡£¡£¡£Î´ÌṩÁªÏµÐÅÏ¢¡£¡£¡£


https://therecord.media/philippines-hacktivist-groups-leaked-versions-ransomware


4. GhostEngine ÍÚ¿ó¹¥»÷ʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯


5ÔÂ22ÈÕ£¬£¬£¬ÒÑ·¢Ã÷´úºÅΪ¡°REF4578¡±µÄ¶ñÒâ¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯°²ÅÅÁËÃûΪ GhostEngine µÄ¶ñÒâ¸ºÔØ£¬£¬£¬¸Ã¸ºÔØÊ¹ÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÀ´¹Ø±ÕÇå¾²²úÆ·²¢°²ÅÅ XMRig ÍÚ¿ó³ÌÐò¡£¡£¡£Elastic Security Labs ºÍ °²ÌìµÄÑо¿Ö°Ô±  ÔÚµ¥¶ÀµÄ±¨¸æºÍ¹²ÏíµÄ¼ì²â¹æÔòÖÐÇ¿µ÷ÁËÕâЩ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷µÄÒì³£ÖØ´óÐÔ£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ×èÖ¹ËüÃÇ¡£¡£¡£È»¶ø£¬£¬£¬Á½·Ý±¨¸æ¾ù佫¸Ã»î¶¯¹é×ïÓÚÒÑÖªµÄÍþвÐÐΪÕߣ¬£¬£¬Ò²Î´·ÖÏíÓйØÄ¿µÄ/Êܺ¦ÕßµÄÏêϸÐÅÏ¢£¬£¬£¬Òò´Ë¸Ã»î¶¯µÄÆðÔ´ºÍ¹æÄ£ÈÔȻδ֪¡£¡£¡£ËäÈ»Éв»ÇåÎúЧÀÍÆ÷×î³õÊÇÔõÑù±»ÆÆËðµÄ£¬£¬£¬µ«ÍþвÐÐΪÕߵĹ¥»÷´ÓÖ´ÐÐÃûΪ¡°Tiworker.exe¡±µÄÎļþ×îÏÈ£¬£¬£¬¸ÃÎļþαװ³ÉÕýµ±µÄ Windows Îļþ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÊÇ GhostEngine µÄ³õʼµÇ̨ÓÐÓøºÔØ£¬£¬£¬GhostEngine ÊÇÒ»¸ö PowerShell ¾ç±¾£¬£¬£¬¿ÉÏÂÔØÖÖÖÖÄ£¿£¿£¿£¿£¿£¿éÒÔÔÚÊÜѬȾµÄ×°±¸ÉÏÖ´Ðвî±ðµÄÐÐΪ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghostengine-mining-attacks-kill-edr-security-using-vulnerable-drivers/


5. Î÷ϤÄá´óѧÔâµ½ºÚ¿Í¹¥»÷²¿·ÖѧÉúÊý¾Ýй¶


5ÔÂ21ÈÕ£¬£¬£¬ÔÚÍþвÐÐΪÕ߯ÆËðÁËÆä Microsoft 365 ºÍ Sharepoint ÇéÐκ󣬣¬£¬Î÷ϤÄá´óѧ (WSU) ÒÑÏòѧÉúºÍѧÊõְԱת´ïÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£WSU ÊǰĴóÀûÑǵÄÒ»Ëù½ÌÓý»ú¹¹£¬£¬£¬Ìṩ¿çѧ¿ÆµÄÆÕ±é±¾¿Æ¡¢Ñо¿ÉúºÍÑо¿¿Î³Ì¡£¡£¡£ËüÓµÓÐ 47,000 ÃûѧÉúºÍ 4,500 ¶àÃûÕýʽºÍ¼¾½ÚÐÔÔ±¹¤£¬£¬£¬ÔËÓªÔ¤ËãΪ 6 ÒÚÃÀÔª¡£¡£¡£Î÷ϤÄá´óÑ§ÍøÕ¾½ñÈÕÐû²¼Í¨¸æ£¬£¬£¬ÖÒÑԳƺڿÍÒÑ»á¼ûÆä Microsoft Office 365 ÇéÐΣ¬£¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍ SharePoint Îļþ¡£¡£¡£Ëù̻¶µÄÊý¾ÝÒòÈ˶øÒ죬£¬£¬Ïêϸȡ¾öÓÚµç×ÓÓʼþͨѶµÄÄÚÈÝÒÔ¼°´óѧ SharePoint ÇéÐÎÖд洢µÄÎĵµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-data-breach-exposed-student-data/#google_vignette


6. Void ManticoreÃé×¼ÒÔÉ«ÁкͰ¢¶û°ÍÄáÑÇ


5ÔÂ22ÈÕ£¬£¬£¬¸Ã×éÖ¯ÃûΪ Void Manticore (Storm-0842)£¬£¬£¬ÔÚ²î±ð¹ú¼ÒÒÔÖÖÖÖ¼ÙÃû¿ªÕ¹»î¶¯¡£¡£¡£×îÖøÃûµÄÓÖÃû°üÀ¨Õë¶Ô°¢¶û°ÍÄáÑÇÏ®»÷µÄ¡°ÁìÍÁÕýÒ塱ºÍÕë¶ÔÒÔÉ«ÁÐÐж¯µÄ¡°Òò¹û±¨Ó¦¡±¡£¡£¡£Õë¶Ô²î±ðµÄÇøÓò£¬£¬£¬Õë¶Ôÿ¸öÄ¿µÄ½ÓÄÉÆæÒìµÄÒªÁì¡£¡£¡£¸Ã×éÖ¯µÄ»î¶¯ÓëÁíÒ»¸öÒÁÀÊ×éÖ¯ Scarred Manticore µÄ»î¶¯Öصþ£¬£¬£¬ÕâÅúעЭЭµ÷ϵͳµÄÊܺ¦ÕßÑ¡ÔñÊÇËûÃÇΪÒÁÀÊÇ鱨ºÍÇå¾²²¿ (MOIS) ÊÂÇéµÄÒ»²¿·Ö¡£¡£¡£×¨¼ÒÖÒÑÔ˵£¬£¬£¬Ðé¿ÕЫʨ¶ÔÈκÎ×èµ²ÒÁÀÊÀûÒæµÄÈË×é³ÉÖØ´óÍþв¡£¡£¡£¸Ã×é֯ʹÓÃÖØ´óµÄ¼ÙÃûÍøÂç¡¢Õ½ÂÔЭ×÷ºÍÖØ´óµÄ¹¥»÷ÒªÁì¡£¡£¡£¸Ã×éÖ¯ÒÔÆäË«ÖØÍøÂç¹¥»÷·½·¨¶øÖøÃû£¬£¬£¬½«ÎïÀíÊý¾ÝÆÆËðÓëÐÄÀíѹÁ¦ÏàÁ¬Ïµ¡£¡£¡£Void Manticore ʹÓÃÎåÖÖ²î±ðµÄÒªÁ죬£¬£¬°üÀ¨Õë¶Ô Windows ºÍ Linux µÄ×Ô½ç˵²Á³ýÆ÷£¬£¬£¬Í¨¹ýɾ³ýÎļþºÍʹÓù²Ïí´ÅÅÌÀ´ÆÆËðϵͳ¡£¡£¡£


https://meterpreter.org/void-manticore-iranian-state-sponsored-hackers-target-israel-albania/