РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ

Ðû²¼Ê±¼ä 2024-03-08
1. РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ


3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬Ô½ÄϵÄÒ»¼Ò½ðÈÚʵÌåÊÇÏÈǰδ¼Í¼µÄÃûΪLotus Bane µÄÍþвÐÐΪÕßµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÐÐΪÕßÓÚ 2023 Äê 3 ÔÂÊ״α»·¢Ã÷¡£¡£¡£¡£¡£¡£Lotus Bane ʹÓõÄÊÖÒÕÓëOceanLotusµÄÊÖÒÕÖØµþ£¬£¬£¬£¬£¬£¬£¬ £¬OceanLotus ÊÇÒ»¸öÓëÔ½ÄϽáÃ˵ÄÍþв×éÖ¯£¬£¬£¬£¬£¬£¬£¬ £¬Ò²³ÆÎª APT32¡¢Canvas Cyclone£¨ÒÔǰ³ÆÎª Bismuth£©ºÍ Cobalt Kitty¡£¡£¡£¡£¡£¡£ÕâÔ´ÓÚʹÓà PIPEDANCE µÈ¶ñÒâÈí¼þ¾ÙÐÐÃüÃû¹ÜµÀͨѶ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ £¬ Elastic Security Labs ÓÚ 2023 Äê 2 ÔÂÊ״μͼÁËPIPEDANCE £¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÊÂÎñÓë 2022 Äê 12 ÔÂÏÂÑ®Õë¶ÔÒ»¸öδ͸¶ÐÕÃûµÄÔ½ÄÏ×éÖ¯µÄÍøÂç¹¥»÷Óйء£¡£¡£¡£¡£¡£ÒÑÍùÒ»Ä꣬£¬£¬£¬£¬£¬£¬ £¬ÑÇÌ«µØÇø (APAC)¡¢Å·ÖÞ¡¢À­¶¡ÃÀÖÞ (LATAM) ºÍ±±ÃÀµÄ½ðÈÚ×éÖ¯ÒѳÉΪBlind EagleºÍLazarus GroupµÈ¶à¸ö¸ß¼¶Ò»Á¬Íþв×éÖ¯µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÖøÃûµÄ³öÓÚ¾­¼ÃÄîÍ·µÄÍþв×éÖ¯ÊÇ UNC1945£¬£¬£¬£¬£¬£¬£¬ £¬¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬ £¬¸Ã×éÖ¯ÒÔ ATM ½»Á÷»úЧÀÍÆ÷ΪĿµÄ£¬£¬£¬£¬£¬£¬£¬ £¬Ä¿µÄÊÇÓÃÃûΪ CAKETAP µÄ×Ô½ç˵¶ñÒâÈí¼þѬȾËüÃÇ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/03/new-apt-group-lotus-bane-behind-recent.html


2. RA World ÀÕË÷Èí¼þ¹¥»÷À­¶¡ÃÀÖÞµÄÒ½ÁƱ£½¡ÐÐÒµ


3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬ÀÕË÷Èí¼þ×éÖ¯ RA World£¨Ò²³ÆÎª RA Group£©ÌᳫÁËÐÂÒ»²¨»î¶¯¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ 2023 Äê 4 ÔÂÌᳫ¶ñÒâÐж¯£¬£¬£¬£¬£¬£¬£¬ £¬ÔÚÆäÈÎÆÚÄÚ¶ÔÖÚ¶à×éÖ¯ÌᳫÁ˹¥»÷£¬£¬£¬£¬£¬£¬£¬ £¬Ö÷ÒªÊÇÃÀ¹ú¡¢µÂ¹ú¡¢Ó¡¶ÈºĮ́ÍåµÄÒ½ÁƱ£½¡ºÍ½ðÈÚÁìÓòµÄ×éÖ¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ £¬RA World µÄ×îй¥»÷Õë¶ÔÀ­¶¡ÃÀÖ޵Ķà¼ÒÒ½ÁÆ»ú¹¹¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇ·Ö½×¶ÎÖ´ÐеÄ£¬£¬£¬£¬£¬£¬£¬ £¬ÒÔ×î´óÏ޶ȵØÌá¸ßÀÖ³ÉÐж¯µÄ×ÜÌåʱ»ú¡£¡£¡£¡£¡£¡£³õʼ»á¼û½×¶Î´ÓºÚ¿Íͨ¹ýÓò¿ØÖÆÆ÷ÉøÍ¸ÅÌËã»úϵͳ×îÏÈ¡£¡£¡£¡£¡£¡£ÔÚÕâÀ£¬£¬£¬£¬£¬£¬ £¬×éÕ½ÂÔ¹¤¾ß (GPO) µÄ±à¼­Æð×ÅÖÁ¹ØÖ÷ÒªµÄ×÷Ó㬣¬£¬£¬£¬£¬£¬ £¬Ê¹·¸·¨ÕßÄܹ»ÔÚÊܺ¦ÕßµÄϵͳÖÐÇ¿¼ÓËûÃǵĹæÔò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ»¹¿ÉÒÔÒÔÌØÊâµÄÇå¾²Ä£Ê½ÖØÐÂÆô¶¯ÏµÍ³£¬£¬£¬£¬£¬£¬£¬ £¬ÒÔÌӱܷÀ²¡¶¾Èí¼þµÄ¼ì²â¡£¡£¡£¡£¡£¡£Ëü»¹Ïû³ýÁ˹¥»÷ºóÆä±£´æµÄºÛ¼££¬£¬£¬£¬£¬£¬£¬ £¬Ê¹Ñо¿Ö°Ô±µÄÆÊÎöÊÂÇé±äµÃÔ½·¢Öش󡣡£¡£¡£¡£¡£


https://meterpreter.org/ra-world-ransomware-strikes-latin-american-healthcare/


3. ºÚ¿ÍʹÓÃÎäÆ÷»¯ÈÕÀúÑûÖÂÒâ×° MacOS ¶ñÒâÈí¼þ


3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬ºÚ¿ÍʹÓÃÎäÆ÷»¯µÄÈÕÀúÔ¼ÇëÀ´Ê¹Óõç×ÓÓʼþϵͳÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬ £¬ÓÕÆ­Óû§µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎ±×°³É»î¶¯¸½¼þµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Í¨¹ýʹÓöÔÈÕÀúÔ¼ÇëµÄÐÅÈΣ¬£¬£¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßÔöÌíÁËÀֳɾÙÐÐÍøÂç´¹ÂÚ¹¥»÷ºÍδ¾­ÊÚȨ»á¼ûÃô¸ÐÐÅÏ¢µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£Malwarebytes µÄÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ £¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃÎäÆ÷»¯ÈÕÀúÔ¼ÇëÀ´×°ÖÃmacOS ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßͨ¹ý Telegram DM ÁªÏµÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ £¬Í¨¹ýÌṩͨ»°»ò¾Û»áµÄʱ»úÀ´ÒýÓÕÄ¿µÄ¡£¡£¡£¡£¡£¡£¸ÐÐËȤµÄÄ¿µÄ»áÊÕµ½ÐéαµÄ¾Û»áÔ¼Çë¡£¡£¡£¡£¡£¡£µ±Êܺ¦ÕßʵÑé¼ÓÈëʱ£¬£¬£¬£¬£¬£¬£¬ £¬Á´½Ó»áʧ°Ü¡£¡£¡£¡£¡£¡£Õ©Æ­Õß½«´Ë¹é×ïÓÚÇøÓò»á¼ûÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬ £¬²¢½¨ÒéÔËÐнÅÔ­À´ÐÞ¸´Ëü¡£¡£¡£¡£¡£¡£ 


https://gbhackers.com/malware-weaponized-calendar-invites/


4. ºÚ¿ÍÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷¾ÙÐÐÒþÃØ C2 ͨѶ


3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬QEMU ÊÇÒ»¸ö¿ªÔ´Æ½Ì¨£¬£¬£¬£¬£¬£¬£¬ £¬ÌṩÇå¾²ÇÒ˽ÓеÄÐéÄ⻯¿Õ¼ä£¬£¬£¬£¬£¬£¬£¬ £¬ÓÃÓÚÔÚ×Ô¼ºµÄÇéÐÎÖÐʵÑé¶ñÒâ´úÂë¡¢Îó²îʹÓú͹¥»÷¡£¡£¡£¡£¡£¡£Õâ¸öÊܿصIJâÊÔ³¡×î´óÏ޶ȵؽµµÍÁ˱»·¢Ã÷ºÍÖ´·¨ÎÊÌâµÄΣº¦¡£¡£¡£¡£¡£¡£??±ðµÄ£¬£¬£¬£¬£¬£¬£¬ £¬QEMU ÔÊÐíºÚ¿Í¿ª·¢¿ÉÒÔÔÚ²î±ðÓ²¼þ¼Ü¹¹ºÍ²Ù×÷ϵͳÉÏÔËÐеĶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ £¿£¿¨°Í˹»ùʵÑéÊÒµÄÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ £¬ºÚ¿ÍÕýÔÚÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷À´ÉñÃØÇÔÈ¡±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷Õßϲ»¶Ê¹ÓÃÕý°æ¹¤¾ßÒÔ×èÖ¹¼ì²â£¬£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±Ò²ïÔÌ­¶ñÒâÈí¼þÖ§³ö¡£¡£¡£¡£¡£¡£Êý¾Ýй¶¡¢Çý¶¯Æ÷¼ÓÃÜ¡¢Ô¶³ÌÖ´ÐкÍÄÚ´æ×ª´¢ÊÇ¿ÉÐÅÈí¼þÖ§³ÖµÄÒ»Ð©ÍøÂçɨÃè»î¶¯¡£¡£¡£¡£¡£¡£Ô¤×°ÖõĶñÒâÈí¼þ»òÄ£ÄâÔ±¹¤µÄ RDP/ VPN»á¼û³äµ±ÊÜѬȾϵͳµÄפ×ãµã¡£¡£¡£¡£¡£¡£ÍøÂçËíµÀºÍ¶Ë¿Úת·¢ÊÊÓóÌÐòʹÓû§Äܹ»Èƹý NAT ºÍ·À»ðǽ£¬£¬£¬£¬£¬£¬£¬ £¬´Ó¶ø½øÈëÄÚ²¿ÏµÍ³¡£¡£¡£¡£¡£¡£ÓÐÐí¶à¹¤¾ß¿ÉÓÃÓÚÔÚϵͳ֮¼ä½¨ÉèÍøÂçËíµÀ£¬£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐһЩÊÇÖ±½ÓµÄ£¬£¬£¬£¬£¬£¬£¬ £¬ÁíһЩÔòʹÓÃÊðÀíÀ´ÑÚÊι¥»÷Õß IP¡£¡£¡£¡£¡£¡£


https://gbhackers.com/hackers-qemu-data-exfiltration/


5. ¼ÓÄôóµÄ·´Ï´Ç®»ú¹¹ÒòÍøÂç¹¥»÷¶ø¹Ø±Õ


3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ (FINTRAC) Ðû²¼£¬£¬£¬£¬£¬£¬£¬ £¬×÷ΪԤ·À²½·¥£¬£¬£¬£¬£¬£¬£¬ £¬Ò»´Î¡°ÍøÂçÊÂÎñ¡±ÆÈʹÆä¹«Ë¾ÏµÍ³ÏÂÏß¡£¡£¡£¡£¡£¡£FINTRAC ÊǼÓÄôóµÄÒ»¸öÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬£¬ £¬×÷Ϊ¸Ã¹úµÄ½ðÈÚÇ鱨»ú¹¹ÔË×÷¡£¡£¡£¡£¡£¡£Ëü´ÓÊÂÏ´Ç®ÊӲ죬£¬£¬£¬£¬£¬£¬ £¬Ã¿Äê×·×ÙÊý°ÙÍò±Ê¿ÉÒÉÉúÒ⣬£¬£¬£¬£¬£¬£¬ £¬²¢Ïò¾¯·½Åû¶ÊýǧÆð²»·¨×ʽðÁ÷Ïò¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÔÚÆäÍøÕ¾ÉϽÒÏþÁËÒ»·Ý¼ò¶ÌµÄÐÂÎÅÉùÃ÷£¬£¬£¬£¬£¬£¬£¬ £¬Ö¸³ö¸ÃÖÐÐĵÄÇ鱨»òÉñÃØÏµÍ³Î´±»»á¼û£¬£¬£¬£¬£¬£¬£¬ £¬Òò´ËÓëÆä½¹µãʹÃüÏà¹ØµÄÃô¸ÐÐÅÏ¢ºÍ²Ù×÷ÄÜÁ¦ÈÔÈ»Çå¾²¡£¡£¡£¡£¡£¡£FINTRAC Óë°üÀ¨¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÔÚÄÚµÄÁª°îÏàÖúͬ°éÏàÖú£¬£¬£¬£¬£¬£¬£¬ £¬»Ö¸´ÔËÓª²¢ÔöÇ¿·ÀÓù£¬£¬£¬£¬£¬£¬£¬ £¬ÒÔ±ÜÃâδÀ´±¬·¢ÊÂÎñ¡£¡£¡£¡£¡£¡£¸ÃÍøÂçÊÂÎñ±¬·¢ÔÚÖÜÄ©£¬£¬£¬£¬£¬£¬£¬ £¬ÒÔºóûÓзÖÏí½øÒ»²½µÄ¸üС£¡£¡£¡£¡£¡£BleepingComputer ÉÐδ·¢Ã÷ÈκÎÀÕË÷Èí¼þ»òÊý¾ÝÀÕË÷Íþв×éÖ¯¶Ô FINTRAC µÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬ £¬Òò´ËÍþвÐÐΪÕßÈÔȻδ֪¡£¡£¡£¡£¡£¡£×Ô½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ £¬¼ÓÄôóÔÚÍøÂçÇå¾²·½ÃæÂÄÀúÁ˳äÂúÌôÕ½µÄʱÆÚ£¬£¬£¬£¬£¬£¬£¬ £¬·ºÆðÁ˶àÆðÒýÈËעĿµÄÊܺ¦ÕߺÍÊÂÎñ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadas-anti-money-laundering-agency-offline-after-cyberattack/


6. »ùÓÚÍøÂçµÄ PLC ¶ñÒâÈí¼þ½«ÖØÐ½ç˵¹¤ÒµÍøÂçÇå¾²Íþв


3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬×ôÖÎÑÇÀí¹¤Ñ§ÔºµÄÑо¿Ö°Ô±Ìá³öÁËÒ»ÖÖ¿ª·¢¿É±à³ÌÂß¼­¿ØÖÆÆ÷ (PLC) ¶ñÒâÈí¼þµÄÐÂÒªÁ죬£¬£¬£¬£¬£¬£¬ £¬¸ÃÒªÁ챻֤ʵ±ÈÄ¿½ñÕ½ÂÔ¸üÎÞа¡¢¸üÓе¯ÐԺ͸üÓÐÓ°ÏìÁ¦¡£¡£¡£¡£¡£¡£¸Ã¼Æ»®ÔÊÐí¶ñÒâÈí¼þʹÓÃÖÎÀíÃÅ»§ÍøÕ¾¹ûÕæµÄÕýµ± Web Ó¦ÓóÌÐò½Ó¿Ú (API) ÉñÃØ¹¥»÷µ×²ãµÄÏÖʵÌìÏ»úе¡£¡£¡£¡£¡£¡£´ËÀ๥»÷°üÀ¨Î±Ôì´«¸ÐÆ÷¶ÁÊý¡¢½ûÓÃÇå¾²¾¯±¨ÒÔ¼°Ê¹ÓÃÎïÀíÖ´ÐÐÆ÷¡£¡£¡£¡£¡£¡£Ñо¿Ð¡×éµÄÊÓ²ìÅú×¢£¬£¬£¬£¬£¬£¬£¬ £¬ËûÃÇÌá³öµÄ¹¥»÷½«¶Ôÿ¸öÖ÷ÒªÖÆÔìÉÌÉú²úµÄ PLC Æð×÷Óᣡ£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÒªÁì±ÈÏÖÓÐµÄ PLC ¶ñÒâÈí¼þÊÖÒÕ£¨¿ØÖÆÂß¼­ºÍ¹Ì¼þ£©¾ßÓÐÏÔ×ÅÓÅÊÆ£¬£¬£¬£¬£¬£¬£¬ £¬ÀýÈçÆ½Ì¨×ÔÁ¦ÐÔ¡¢Ò×ÓÚ°²Åź͸ü¸ß¼¶±ðµÄ³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Åú×¢£¬£¬£¬£¬£¬£¬£¬ £¬¹¤Òµ¿ØÖÆÇéÐÎÖÐÍøÂçÊÖÒյķºÆð´øÀ´ÁË IT ÁìÓò»òÏûºÄÎïÁªÍø×°±¸Öв»±£´æµÄÐÂÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£¡£ÓëÆÕ±é¿´·¨Ïà·´£¬£¬£¬£¬£¬£¬£¬ £¬¹Ì¼þºÍ¿ØÖÆÂß¼­²¢²»ÊÇ PLC ÅÌËãµÄΨһ¼¶±ð¡£¡£¡£¡£¡£¡£ÏÖ´ú PLC ÏÖÔÚ°üÀ¨Ò»¸ö¿É±à³ÌǶÈëÊ½ÍøÂçЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐ×Ô½ç˵¿Í»§¶Ë JavaScript ´úÂëʹÓÃÈÕÒæÇ¿Ê¢µÄ API À´¼àÊӺͿØÖÆÎïÀíÀú³Ì¡£¡£¡£¡£¡£¡£ÕâÖÖÇéÐÎÌṩÁËÒ»¸öеġ¢ÁîÈ˾ªÑȵÄÀíÏëÆ½Ì¨À´ÔËÐÐ PLC ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ £¬Õâ¶Ô¹¤Òµ¿ØÖÆÏµÍ³×é³ÉÁËеÄÍþв¡£¡£¡£¡£¡£¡£


https://industrialcyber.co/industrial-cyber-attacks/georgia-tech-researchers-warn-of-stuxnet-style-web-based-plc-malware-redefining-industrial-cybersecurity-threats/?web_view=true