Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ

Ðû²¼Ê±¼ä 2024-05-23
1. Turla APTÀÄÓÃMSBuild·Ö·¢TinyTurlaºóÃÅ


5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»¸öÓë¶íÂÞ˹Óйصĸ߼¶Ò»Á¬ÐÔÍþв (APT) ×éÖ¯Ò»Ö±ÔÚÀÄÓà PDF ºÍ MSBuild ÏîÄ¿Îļþ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÉç½»¹¤³Ìµç×ÓÓʼþ½« TinyTurla ºóÃÅ×÷ΪÎÞÎļþ¸ºÔؾÙÐÐÈö²¥¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯µÄÎÞ·ìÈö²¥³ÌÐòÔÚÖØ´óÐÔ·½ÃæÈ¡µÃÁËÏÔÖøµÄǰ½ø¡£¡£¡£Cyble Ñо¿Ö°Ô±ºÍÇ鱨ʵÑéÊÒ (CRIL) µÄÑо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óõç×ÓÓʼþºÍÔ¼ÇëÈËȨ×êÑлá»òÌṩ¹«¹²×ÉѯµÄÎļþ×÷ΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬£¬ÒÔѬȾ TinyTurla Óû§¡£¡£¡£ËûÃÇÔÚ×òÌìÐû²¼µÄÓйظûµÄ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ã°³äÕýµ±Õþ¸®£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÒýÓÕÊܺ¦ÕßÊÜÆ­¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬TinyTurla ºóÃÅÓë¶íÂÞ˹×ÊÖúµÄºã¾ÃÍþв×éÖ¯TurlaÓйØ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ³£Õë¶Ô·ÇÕþ¸®×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬¡°ÌØÊâÊÇÄÇЩÓëÖ§³ÖÎÚ¿ËÀ¼ÓÐÁªÏµµÄ×éÖ¯¡±¡£¡£¡£Ìû×ӳƣ¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒÔΪ¸Ã×éÖ¯ÊǶñÒâ¹¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russia-turla-apt-msbuild-tinyturla-backdoor


2. CISA ÖÒÑÔʹÓÃMirth ConnectÎó²îµÄ¹¥»÷»î¶¯


5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Mirth Connect ÊÇÒ»ÖÖÆÕ±éʹÓÃµÄ¿çÆ½Ì¨½çÃæÒýÇæ£¬£¬£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡×éÖ¯½«ÆäÓÃÓÚÐÅÏ¢ÖÎÀí¡£¡£¡£Ó°Ï쿪Դ²úÆ·µÄÎó²î CVE-2023-43208 ÊÇÒ»¸öÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£4.4.1 °æÐû²¼Ê±ÒÑÍÆ³ö²¹¶¡¡£¡£¡£¸ÃÎó²îÓÚ 2023 Äê 10 ÔÂÆØ¹â£¬£¬£¬£¬£¬£¬£¬£¬ÆäÊ±ÍøÂçÇå¾²¹«Ë¾ Horizon3.ai ÖÒÑԳƸÃÎó²î¿ÉÄܶÔÒ½ÁƱ£½¡¹«Ë¾Ôì³ÉÓ°Ïì¡£¡£¡£CVE-2023-43208 ÊÇ CVE-2023-37679 µÄÒ»¸ö±äÌ壬£¬£¬£¬£¬£¬£¬£¬Mirth Connect ¿ª·¢Ö°Ô±Ö®Ç°ÒÑÔÚ 4.4.0 °æÐû²¼Ê±¶Ô¸ÃÎó²î¾ÙÐÐÁËÐÞ²¹¡£¡£¡£Horizon3.ai Æäʱ½«¸ÃÎó²îÐÎòΪÒ×ÓÚʹÓ㬣¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳơ°¹¥»÷ÕߺܿÉÄÜʹÓôËÎó²î¾ÙÐгõʼ»á¼û»òÆÆËðÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡±¡£¡£¡£¸ÃÇå¾²¹«Ë¾»¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÁË 1,200 ¶à¸ö̻¶ÔÚ»¥ÁªÍøÉ쵀 NextGen Mirth Connect ʵÀý¡£¡£¡£


https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/


3. ºÚ¿ÍÍÅ»ïʹÓÃÀÕË÷Èí¼þ¹¥»÷·ÆÂɱöÕþ¸®


5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃй¶µÄÀÕË÷Èí¼þ¹¹½¨Õß¶Ô·ÆÂɱöµÄÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷¡ª¡ªÕâÊdzöÓÚÕþÖÎÄîÍ·µÄÕûÌåµÄÇ÷ÊÆµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔ½À´Ô½¶àµØÊÔͼÈÅÂÒÕâ¸ö¶«ÄÏÑǹú¼ÒµÄÉúÑÄ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ SentinelOneµÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Ikaruz Red Team¡±µÄ×éÖ¯ÊÇÉÙÊý¼¸¸öÕë¶Ô·ÆÂɱöÕþ¸®Ä¿µÄµÄºÚ¿Í×éÖ¯Ö®Ò»¡£¡£¡£¸ÃÐж¯Ê¹ÓÃÁ˶àÖÖÀÕË÷Èí¼þ¹¹½¨Õß¡ª¡ª°üÀ¨ LockBit¡¢Vice Society¡¢Clop ºÍ AlphV¡ª¡ªÌᳫ¡°Ð¡¹æÄ£¡±¹¥»÷¡£¡£¡£Ëü»¹ÔÚÍøÉÏÐû´«·ÆÂɱö¶à¸ö×éÖ¯µÄÊý¾Ýй¶ÇéÐΡ£¡£¡£SentinelOne ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Êܺ¦ÕßµÄÌõ×ÓÏÕЩËùÓÐØâÇÔ×Ôԭʼ LockBit Ä£°å£¬£¬£¬£¬£¬£¬£¬£¬¶¥²¿µÄÃû×Ö³ýÍâ¡£¡£¡£Î´ÌṩÁªÏµÐÅÏ¢¡£¡£¡£


https://therecord.media/philippines-hacktivist-groups-leaked-versions-ransomware


4. GhostEngine ÍÚ¿ó¹¥»÷ʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯


5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÒÑ·¢Ã÷´úºÅΪ¡°REF4578¡±µÄ¶ñÒâ¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯°²ÅÅÁËÃûΪ GhostEngine µÄ¶ñÒâ¸ºÔØ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¸ºÔØÊ¹ÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÀ´¹Ø±ÕÇå¾²²úÆ·²¢°²ÅÅ XMRig ÍÚ¿ó³ÌÐò¡£¡£¡£Elastic Security Labs ºÍ °²ÌìµÄÑо¿Ö°Ô±  ÔÚµ¥¶ÀµÄ±¨¸æºÍ¹²ÏíµÄ¼ì²â¹æÔòÖÐÇ¿µ÷ÁËÕâЩ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷µÄÒì³£ÖØ´óÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ×èÖ¹ËüÃÇ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬Á½·Ý±¨¸æ¾ù佫¸Ã»î¶¯¹é×ïÓÚÒÑÖªµÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬£¬Ò²Î´·ÖÏíÓйØÄ¿µÄ/Êܺ¦ÕßµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬Òò´Ë¸Ã»î¶¯µÄÆðÔ´ºÍ¹æÄ£ÈÔȻδ֪¡£¡£¡£ËäÈ»Éв»ÇåÎúЧÀÍÆ÷×î³õÊÇÔõÑù±»ÆÆËðµÄ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕߵĹ¥»÷´ÓÖ´ÐÐÃûΪ¡°Tiworker.exe¡±µÄÎļþ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþαװ³ÉÕýµ±µÄ Windows Îļþ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÊÇ GhostEngine µÄ³õʼµÇ̨ÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬£¬GhostEngine ÊÇÒ»¸ö PowerShell ¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÏÂÔØÖÖÖÖÄ£¿£¿£¿£¿£¿éÒÔÔÚÊÜѬȾµÄ×°±¸ÉÏÖ´Ðвî±ðµÄÐÐΪ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghostengine-mining-attacks-kill-edr-security-using-vulnerable-drivers/


5. Î÷ϤÄá´óѧÔâµ½ºÚ¿Í¹¥»÷²¿·ÖѧÉúÊý¾Ýй¶


5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÍþвÐÐΪÕ߯ÆËðÁËÆä Microsoft 365 ºÍ Sharepoint ÇéÐκ󣬣¬£¬£¬£¬£¬£¬£¬Î÷ϤÄá´óѧ (WSU) ÒÑÏòѧÉúºÍѧÊõְԱת´ïÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£WSU ÊǰĴóÀûÑǵÄÒ»Ëù½ÌÓý»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬Ìṩ¿çѧ¿ÆµÄÆÕ±é±¾¿Æ¡¢Ñо¿ÉúºÍÑо¿¿Î³Ì¡£¡£¡£ËüÓµÓÐ 47,000 ÃûѧÉúºÍ 4,500 ¶àÃûÕýʽºÍ¼¾½ÚÐÔÔ±¹¤£¬£¬£¬£¬£¬£¬£¬£¬ÔËÓªÔ¤ËãΪ 6 ÒÚÃÀÔª¡£¡£¡£Î÷ϤÄá´óÑ§ÍøÕ¾½ñÈÕÐû²¼Í¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÖÒÑԳƺڿÍÒÑ»á¼ûÆä Microsoft Office 365 ÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍ SharePoint Îļþ¡£¡£¡£Ëù̻¶µÄÊý¾ÝÒòÈ˶øÒ죬£¬£¬£¬£¬£¬£¬£¬Ïêϸȡ¾öÓÚµç×ÓÓʼþͨѶµÄÄÚÈÝÒÔ¼°´óѧ SharePoint ÇéÐÎÖд洢µÄÎĵµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-data-breach-exposed-student-data/#google_vignette


6. Void ManticoreÃé×¼ÒÔÉ«ÁкͰ¢¶û°ÍÄáÑÇ


5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÃûΪ Void Manticore (Storm-0842)£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ²î±ð¹ú¼ÒÒÔÖÖÖÖ¼ÙÃû¿ªÕ¹»î¶¯¡£¡£¡£×îÖøÃûµÄÓÖÃû°üÀ¨Õë¶Ô°¢¶û°ÍÄáÑÇÏ®»÷µÄ¡°ÁìÍÁÕýÒ塱ºÍÕë¶ÔÒÔÉ«ÁÐÐж¯µÄ¡°Òò¹û±¨Ó¦¡±¡£¡£¡£Õë¶Ô²î±ðµÄÇøÓò£¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ôÿ¸öÄ¿µÄ½ÓÄÉÆæÒìµÄÒªÁì¡£¡£¡£¸Ã×éÖ¯µÄ»î¶¯ÓëÁíÒ»¸öÒÁÀÊ×éÖ¯ Scarred Manticore µÄ»î¶¯Öصþ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÅúעЭЭµ÷ϵͳµÄÊܺ¦ÕßÑ¡ÔñÊÇËûÃÇΪÒÁÀÊÇ鱨ºÍÇå¾²²¿ (MOIS) ÊÂÇéµÄÒ»²¿·Ö¡£¡£¡£×¨¼ÒÖÒÑÔ˵£¬£¬£¬£¬£¬£¬£¬£¬Ðé¿ÕЫʨ¶ÔÈκÎ×èµ²ÒÁÀÊÀûÒæµÄÈË×é³ÉÖØ´óÍþв¡£¡£¡£¸Ã×é֯ʹÓÃÖØ´óµÄ¼ÙÃûÍøÂç¡¢Õ½ÂÔЭ×÷ºÍÖØ´óµÄ¹¥»÷ÒªÁì¡£¡£¡£¸Ã×éÖ¯ÒÔÆäË«ÖØÍøÂç¹¥»÷·½·¨¶øÖøÃû£¬£¬£¬£¬£¬£¬£¬£¬½«ÎïÀíÊý¾ÝÆÆËðÓëÐÄÀíѹÁ¦ÏàÁ¬Ïµ¡£¡£¡£Void Manticore ʹÓÃÎåÖÖ²î±ðµÄÒªÁ죬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Õë¶Ô Windows ºÍ Linux µÄ×Ô½ç˵²Á³ýÆ÷£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýɾ³ýÎļþºÍʹÓù²Ïí´ÅÅÌÀ´ÆÆËðϵͳ¡£¡£¡£


https://meterpreter.org/void-manticore-iranian-state-sponsored-hackers-target-israel-albania/