ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-14
1. ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷


9ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÒÁÀ­¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄÈ«ÐIJ߻®¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Check PointÆÊÎö£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ­¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿·Ö£¬£¬£¬£¬£¬Ê¹ÓÃжñÒâÈí¼þVeatyºÍSpearal£¬£¬£¬£¬£¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉøÍ¸ÍøÂç¡£¡£¡£¡£¡£¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÇø»îÔ¾£¬£¬£¬£¬£¬ÉÆÓÚÍøÂç´¹ÂںͶ¨ÖƺóÃŹ¥»÷£¬£¬£¬£¬£¬´Ë´ÎÒ²²»ÆÆÀý£¬£¬£¬£¬£¬Õ¹Ê¾ÁËÆäÆæÒìµÄÏÂÁîÓë¿ØÖÆ»úÖÆ£¬£¬£¬£¬£¬°üÀ¨×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¡£¡£¡£¡£¡£¹¥»÷Á´Í¨¹ýÓÕÆ­ÐÔÎļþÆô¶¯£¬£¬£¬£¬£¬Ö´ÐÐPowerShell»òPyinstaller¾ç±¾£¬£¬£¬£¬£¬É¾³ýºÛ¼£²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£SpearalʹÓÃDNSËíµÀͨѶ£¬£¬£¬£¬£¬VeatyÔòͨ¹ýÌØ¶¨ÓÊÏäÏÂÔØ²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹·¢Ã÷ÓëSSHËíµÀºóÃźÍIISЧÀÍÆ÷ºóÃÅÏà¹ØµÄ»î¶¯£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÕßÊֶζàÑùÇÒÊÖÒÕÏȽø¡£¡£¡£¡£¡£¡£Check PointÇ¿µ÷£¬£¬£¬£¬£¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÇøÄÚµÄÒ»Á¬ºÍ¼¯ÖÐÆð¾¢£¬£¬£¬£¬£¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html


2. TrickMoÒøÐÐľÂíбäÖÖÆØ¹â£ºÔöÇ¿Íþв£¬£¬£¬£¬£¬ÇÔÈ¡Òþ˽


9ÔÂ12ÈÕ£¬£¬£¬£¬£¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½ÒÆÆÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ£¬£¬£¬£¬£¬ÕâÒ»±äÖÖ²»µ«¼ÌÐø²¢Ç¿»¯ÁËÆäǰÉíÕë¶ÔAndroid×°±¸ÒøÐÐÆ¾Ö¤µÄ¹Å°åÍþвÄÜÁ¦£¬£¬£¬£¬£¬»¹ÒýÈëÁËÆÁÄ»Â¼ÖÆ¡¢¼üÅ̼ͼ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§£¬£¬£¬£¬£¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷¹æÄ£ºÍÆÆËðÁ¦¡£¡£¡£¡£¡£¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô±£¬£¬£¬£¬£¬×Ô2019ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬£¬Ò»Á¬½ø»¯£¬£¬£¬£¬£¬ÏÖÒѳÉΪ½ðÈÚڲƭºÍСÎÒ˽¼ÒÒþ˽Çå¾²µÄÖØ´óÒþ»¼¡£¡£¡£¡£¡£¡£Ð±äÖÖ²»µ«ÄÜ×èµ²Ò»´ÎÐÔÃÜÂë(OTP)ÈÆ¹ýË«ÒòËØÈÏÖ¤(2FA)£¬£¬£¬£¬£¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦Õß×°±¸Ö´ÐÐ×°±¸Ú²Æ­(ODF)£¬£¬£¬£¬£¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÇå¾²·À»¤¡£¡£¡£¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬Cleafy·¢Ã÷¸Ã±äÖÖ»¹´ÓÊÜѬȾװ±¸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ± £»£» £»£»£»£»¤µÄÏÂÁîÓë¿ØÖÆ(C2)ЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶Σº¦¼¤Ôö£¬£¬£¬£¬£¬ÈκεÚÈý·½¶¼ÄÜÈÝÒ×»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£±»µÁÊý¾ÝÁè¼Ý 12 GB£¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤¼þ¡¢²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕÆ¬¡£¡£¡£¡£¡£¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬£¬£¬£¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐУ¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ²ØÐÔºÍΣº¦ÐÔ¡£¡£¡£¡£¡£¡£


https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/


3. ÍøÂçÍþвж¯Ïò£ºÕýµ±Python¿â³É¹¥»÷ÀûÆ÷


9ÔÂ12ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Mertens½üÆÚÐû²¼ÁËÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬Õ¹ÏÖÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑÏËàÇ÷ÊÆ£ºÍøÂç·¸·¨·Ö×ÓÕýÈÕÒæÇÉÃîµØÊ¹ÓÃÕýµ±µÄPython¿âÖ´ÐжñÒâ»î¶¯¡£¡£¡£¡£¡£¡£ÕâЩ¿â£¬£¬£¬£¬£¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip£¬£¬£¬£¬£¬Ô­±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯£¬£¬£¬£¬£¬È´±»·¸·¨·Ö×ÓÀÄÓÃÒÔʵÑé¼üÅ̼ͼ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°åÐ®ÖÆµÈ¶ñÒâÐÐΪ¡£¡£¡£¡£¡£¡£MertensÖ¸³ö£¬£¬£¬£¬£¬PyPi.orgµÈÖØ´ó¿âÉú̬ϵͳµÄ±£´æ£¬£¬£¬£¬£¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¿â×Ô¼ºÎÞº¦£¬£¬£¬£¬£¬µ«ËüÃǵÄǿʢ¹¦Ð§±»²»·¨·Ö×ÓʹÓ㬣¬£¬£¬£¬ÒÔÌӱܼì²â£¬£¬£¬£¬£¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ýй¶µÈÄ¿µÄ¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬discord¿â±»ÖØÐ°üװΪC2ƽ̨£¬£¬£¬£¬£¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ýй¶µÄצÑÀ¡£¡£¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬ÈçmarshalºÍpy_compile£¬£¬£¬£¬£¬½øÒ»²½Ä£ºý¶ñÒâ´úÂ룬£¬£¬£¬£¬ÔöÌíÄæÏò¹¤³ÌµÄÄѶȡ£¡£¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Çå¾²ÆÊÎöʦ²ì¾õ£¬£¬£¬£¬£¬´Ó¶ø¼Ó¾çÁËÍøÂçÇå¾²·ÀÓùµÄÖØ´óÐÔ¡£¡£¡£¡£¡£¡£


https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/


4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ13ÈÕ£¬£¬£¬£¬£¬Î÷ÑÅͼ¸Û×÷Ϊî¿ÏµÎ÷ÑÅͼµØÇøº£¸ÛÓë»ú³¡µÄÖ÷ÒªÕþ¸®»ú¹¹£¬£¬£¬£¬£¬½üÆÚÈ·ÈÏÆäϵͳÔÚÒÑÍùÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ8Ô£¬£¬£¬£¬£¬ÆÈʹ¿Ú°¶½ôÆÈ¸ôÀ벿·ÖÒªº¦ÏµÍ³ÒÔ×èÖ¹Ó°Ï죬£¬£¬£¬£¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì£¬£¬£¬£¬£¬µ¼Öº½°àÑÓÎ󡣡£¡£¡£¡£¡£ÈýÖܺ󣬣¬£¬£¬£¬¿Ú°¶¹ÙÆÓֱʽָÈÏRhysidaΪĻºóÔªÐ×£¬£¬£¬£¬£¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨ»î¶¯ÈÅÂÒ£¬£¬£¬£¬£¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÇå¾²¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬RhysidaÍÅ»ïÀÖ³ÉÉøÍ¸¿Ú°¶ÅÌËã»úϵͳ£¬£¬£¬£¬£¬¼ÓÃÜÒªº¦Êý¾Ý£¬£¬£¬£¬£¬µ¼Ö°üÀ¨ÐÐÀî´¦Öóͷ£¡¢×ÔÖúЧÀÍ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸öЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£Ö»¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦£¬£¬£¬£¬£¬»Ö¸´Á˴󲿷Öϵͳ£¬£¬£¬£¬£¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐ֤ЧÀ͵ÈÒªº¦¹¦Ð§¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÇå¾²¡¢²»Ïò·¸·¨Í×ЭµÄ̬¶È¡£¡£¡£¡£¡£¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬£¬£¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬£¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡££¬£¬£¬£¬£¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬ÌáÐѸ÷ÐÐÒµÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬£¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄË𺦡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/


5. Ivanti CSA¸ßΣÎó²îÔâʹÓ㬣¬£¬£¬£¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹


9ÔÂ13ÈÕ£¬£¬£¬£¬£¬IvantiÈ·ÈÏÆäÔÆÐ§ÀÍ×°±¸£¨CSA£©½â¾ö¼Æ»®Öб£´æ¸ßΣÎó²îCVE-2024-8190£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔâ¹¥»÷ÕßʹÓᣡ£¡£¡£¡£¡£ÔçÏÈ£¬£¬£¬£¬£¬Ivanti±¨¸æ³ÆÎ´·¢Ã÷¿Í»§ÊÜÓ°Ï죬£¬£¬£¬£¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³ÌÈÏÖ¤µÄÖÎÀíԱͨ¹ýÏÂÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£Ivanti½¨Òé½ÓÄÉÌØ¶¨ÉèÖýµµÍΣº¦£¬£¬£¬£¬£¬²¢¼ì²éÖÎÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑé¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¹«Ë¾±Þ²ß¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾£¬£¬£¬£¬£¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕǰÐÞ¸´¡£¡£¡£¡£¡£¡£CISAÇ¿µ÷´ËÀàÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¡£IvantiÔÚÈ«ÇòÓµÓÐÆÕ±éµÄÏàÖúͬ°éÍøÂ磬£¬£¬£¬£¬Æä²úÆ·ºÍЧÀͱ»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳÖÎÀí£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁËʵʱÐÞ¸´Çå¾²Îó²îµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/


6. Trojan Ajina.BankerËÁŰÖÐÑÇ£ºÎ±×°Õýµ±Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢


9ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁŰÖÐÑǵØÇø£¬£¬£¬£¬£¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°Öеĺݶ¾¾«ÁéÃüÃû£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕýµ±Ó¦ÓóÌÐòÈçÒøÐÐЧÀͺÍÕþ¸®ÃÅ»§£¬£¬£¬£¬£¬Ê¹ÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³ÌÕ½ÂÔÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐжñÒâÎļþ¡£¡£¡£¡£¡£¡£×Ô2023Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬ÒÑ·¢Ã÷Ô¼1,400ÖÖ±äÖÖ£¬£¬£¬£¬£¬Ö÷ҪĿµÄΪÎÚ×ȱð¿Ë˹̹Óû§£¬£¬£¬£¬£¬µ«¹¥»÷¹æÄ£ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£¡£¡£¡£¡£¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó£¬£¬£¬£¬£¬Ê¹ÓÃÓû§µÄºÃÆæÐľÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£ÆäÍâµØ»¯ÍƹãÕ½ÂÔÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆÈ¸Ð£¬£¬£¬£¬£¬´ÙʹÓû§²»¾­Ë¼Ë÷¼´µã»÷Á´½Ó¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÍøÂç½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇ飬£¬£¬£¬£¬»¹ÄÜ×èµ²¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Â룬£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶È˳ӦÐԺͽø»¯ÄÜÁ¦¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Ajina.Banker½ÓÄÉͬÃËÍýÏëģʽÔËÓª£¬£¬£¬£¬£¬½¹µãÍŶÓÓëͬÃËÍøÂçÏàÖú£¬£¬£¬£¬£¬Í¨Ì«¹ýÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£¡£¡£¡£¡£¡£ÃæÁÙÕâÒ»Íþв£¬£¬£¬£¬£¬×¨¼Ò½¨Òé¼á³ÖСÐÄ£¬£¬£¬£¬£¬×èÖ¹µã»÷δ¾­ÇëÇóµÄÐÂÎźÍÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬¼á³ÖʹÓùٷ½Ó¦ÓÃÊÐËÁÏÂÔØÓ¦Ó㬣¬£¬£¬£¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£¡£¡£¡£¡£¡£


https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/