FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯£»£»£»HMR¹«Ë¾Ôâµ½ÀÕË÷Èí¼þMaze¹¥»÷

Ðû²¼Ê±¼ä 2020-04-09

1.Ò©Îï²âÊÔ¹«Ë¾HMRÔâµ½ÀÕË÷Èí¼þMaze¹¥»÷


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ò©Îï²âÊÔ¹«Ë¾HMRÔâµ½ÀÕË÷Èí¼þMaze¹¥»÷£¬ £¬£¬£¬ £¬£¬²¢ÇÒ²¿·Ö×ÔÔ¸ÕßÐÅÏ¢±»µÁ¡£¡£ ¡£¡£¸Ã¹¥»÷±¬·¢ÔÚ3ÔÂ14ÈÕ£¬ £¬£¬£¬ £¬£¬Maze¹¥»÷ÕßÇÔÈ¡ÁËHMRÍøÂçÉÏÍйܵÄÊý¾Ý²¢¶ÔÆäÅÌËã»ú¾ÙÐмÓÃÜ¡£¡£ ¡£¡£ÓÉÓڸù«Ë¾¾Ü¾øÖ§¸¶Êê½ð£¬ £¬£¬£¬ £¬£¬MazeÍÅ»ïÓÚ3ÔÂ21ÈÕÔÚÆäÍøÕ¾ÉÏÐû²¼Á˲¿·Ö±»µÁµÄÊý¾Ý¡£¡£ ¡£¡£Æ¾Ö¤HMRµÄÊý¾Ýй¶֪ͨ£¬ £¬£¬£¬ £¬£¬Ê§ÔôµÄ¼Í¼°üÀ¨ÁËÒÔD¡¢G¡¢I»òJ¿ªÍ·µÄ×ÔÔ¸ÕßСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éí·Ý֤ʵÎļþ¡¢¿µ½¡ÊÓ²ì±í¡¢ÔÞ³ÉÊé¡¢²¿·Ö¼ì²âЧ¹ûµÈ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/drug-testing-firm-sends-data-breach-alerts-after-ransomware-attack/


2.BitdefenderÑо¿ÍŶӷ¢Ã÷ÐÂIoT½©Ê¬ÍøÂçdark_nexus


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


BitdefenderÑо¿Ö°Ô±×î½ü·¢Ã÷ÁËÒ»¸öеÄIoT½©Ê¬ÍøÂ磬 £¬£¬£¬ £¬£¬Ëü°üÀ¨ÁËÁè¼Ý´ó´ó¶¼IoT½©Ê¬ÍøÂçºÍ¶ñÒâÈí¼þµÄй¦Ð§¡£¡£ ¡£¡£Ñо¿Ö°Ô±Æ¾Ö¤½©Ê¬ÍøÂçʹÓõĵÄ×Ö·û´®½«ÆäÃüÃûΪ¡°dark_nexus¡±¡£¡£ ¡£¡£Ö»¹Üdark_nexusÖØÓÃÁËһЩQbotºÍMirai´úÂ룬 £¬£¬£¬ £¬£¬µ«Æä½¹µãÄ£¿£¿£¿£¿é´ó¶àÊÇÔ­ÉúµÄ¡£¡£ ¡£¡£Ö»¹Ü¸Ã½©Ê¬ÍøÂç¿ÉÄÜÓëÒÔǰÒÑÖªµÄIoT½©Ê¬ÍøÂç¹²ÏíijЩ¹¦Ð§£¬ £¬£¬£¬ £¬£¬¿ÉÊÇÆä²¿·ÖÄ£¿£¿£¿£¿éµÄ¿ª·¢·½·¨Ê¹Æä¹¦Ð§Ô½·¢Ç¿Ê¢£¬ £¬£¬£¬ £¬£¬ÀýÈôÓÐÓÃÔØºÉÕë¶Ô12ÖÖ²î±ðµÄCPU¼Ü¹¹¾ÙÐбàÒ룬 £¬£¬£¬ £¬£¬²¢Æ¾Ö¤Êܺ¦ÕßµÄÉèÖö¯Ì¬×ª´ï¡£¡£ ¡£¡£dark_nexus»¹ÆæÒìµØÊ¹ÓûùÓÚÈ¨ÖØºÍãÐÖµµÄÆÀ·ÖϵͳÀ´ÆÀ¹ÀÄÄЩÀú³Ì¿ÉÄÜ×é³ÉΣº¦£¬ £¬£¬£¬ £¬£¬²¢É±ËÀËùÓÐÁè¼Ý¿ÉÒÉãÐÖµµÄÆäËüÀú³Ì¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://labs.bitdefender.com/2020/04/new-dark_nexus-iot-botnet-puts-others-to-shame/


3.FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


IBM X-ForceÑо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬ £¬£¬ÔÚ×î½üµÄÍøÂç¹¥»÷Öз¢Ã÷ÁËFIN6µÄºÛ¼££¬ £¬£¬£¬ £¬£¬ÕâЩ¹¥»÷»î¶¯×î³õʹÓÃTrickBotľÂíѬȾÊܺ¦Õߣ¬ £¬£¬£¬ £¬£¬È»ºó×îÖÕÏÂÔØÁËAnchorºóÃÅ¡£¡£ ¡£¡£Ñо¿Ö°Ô±³ÆÕâÁ½¸ö·¸·¨×éÖ¯-TrickBotµÄÔËÓªÍÅ»ïÒÔ¼°FIN6-ÒѾ­¾ÙÐÐÏàÖú£¬ £¬£¬£¬ £¬£¬ÕâÊÇÍøÂç·¸·¨ÕûÌåÏÖÓÐÏàÖúÇ÷ÊÆÖеġ°ÐµÄΣÏÕתÕÛ¡±¡£¡£ ¡£¡£AnchorÖÁÉÙ¿ÉÒÔ×·Ëݵ½2018Ä꣬ £¬£¬£¬ £¬£¬ËƺõÊÇÓÉTrickBotµÄÔËÓªÍÅ»ï±àдµÄ¡°¡°¶àºÏÒ»¹¥»÷¿ò¼Ü¡±£¬ £¬£¬£¬ £¬£¬ËüÓÉÖÖÖÖ×ÓÄ£¿£¿£¿£¿é×é³É£¬ £¬£¬£¬ £¬£¬¿ÉÒÔ×ÊÖú¹¥»÷ÕßÔÚÍøÂçÉϺáÏòÈö²¥£¨ÀýÈç×°ÖúóÃÅ£©¡£¡£ ¡£¡£Í¬Ê±TrickBotµÄÁíÒ»¸ö¹¤¾ßPowerTrickÖ÷ÒªÓÃÓÚÔÚÊÜѬȾµÄ¸ß¼ÛֵĿµÄ£¨ÀýÈç½ðÈÚ»ú¹¹£©ÄÚ²¿¾ÙÐÐÒþÉí¡¢³¤ÆÚÐÔºÍÕì̽¡£¡£ ¡£¡£IBM X-ForceÖ¸³öFIN6¼ÓÈëÁËʹÓÃAnchorºÍPowerTrickµÄ¹¥»÷£¬ £¬£¬£¬ £¬£¬Æä±£´æµÄ×î´óÖ¸±êÊǹ¥»÷ÖÐʹÓõÄ×°ÔØ³ÌÐò£¨Terraloader£©ºÍºóÃÅ£¨More_eggs£©¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fin6-and-trickbot-combine-forces-in-anchor-attacks/154508/


4.¹¥»÷ÕßÀÄÓÃMalwarebytesÆ·ÅÆ·Ö·¢RaccoonľÂí


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÀÄÓÃMalwarebytesÆ·ÅÆµÄ¶ñÒâ»î¶¯£¬ £¬£¬£¬ £¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸ö·ÂðµÄMalwarebytesÍøÕ¾£¬ £¬£¬£¬ £¬£¬¸ÃÍøÕ¾ÓÃÓÚ·Ö·¢RaccoonľÂí¡£¡£ ¡£¡£¸Ã¶ñÒâÓòÃûÊÇmalwarebytes-free[.]com£¬ £¬£¬£¬ £¬£¬ÔÚ3ÔÂ29ÈÕͨ¹ýÓòÃû×¢²áÉÌREG.RU LLC×¢²á£¬ £¬£¬£¬ £¬£¬Ä¿½ñÍйÜÔÚ¶íÂÞ˹µÄIP 173.192.139[.]27ÉÏ¡£¡£ ¡£¡£¸ÃÍøÕ¾ÉϵÄJavaScript´úÂë¶Î»áÉó²é·Ã¿ÍµÄä¯ÀÀÆ÷ÀàÐÍ£¬ £¬£¬£¬ £¬£¬ÈôÊÇÊÇInternet Explorer£¬ £¬£¬£¬ £¬£¬Ôò»á½«Óû§Öض¨ÏòÖÁFallout EKµÄ¶ñÒâURL£¬ £¬£¬£¬ £¬£¬²¢×îÖÕ×°ÖÃRaccoon¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/exploits-and-vulnerabilities/2020/04/copycat-criminals-abuse-malwarebytes-brand-in-malvertising-campaign/


5.¹È¸èÐû²¼ChromeÇå¾²¸üУ¬ £¬£¬£¬ £¬£¬ÐÞ¸´32¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¹È¸èÒÑÓÚ4ÔÂ7ÈÕÏòWindows¡¢macOSºÍLinuxÐû²¼ÁËChrome 81£¬ £¬£¬£¬ £¬£¬³ýÁËbugÐÞ¸´¡¢Ð¹¦Ð§Ö®Í⣬ £¬£¬£¬ £¬£¬¸Ã°æ±¾»¹ÐÞ¸´ÁË32¸öÇå¾²Îó²î¡£¡£ ¡£¡£ÆäÖÐ3¸öÎó²îµÄÑÏÖØÐÔÆ·¼¶Îª¸ß£¬ £¬£¬£¬ £¬£¬°üÀ¨À©Õ¹ÖеÄUAFÎó²î£¨CVE-2020-6454£©¡¢ÒôƵ×é¼þÖеÄUAFÎó²î£¨CVE-2020-6423£©ºÍWebSQLÖеÄÔ½½ç¶ÁÎó²î£¨CVE-2020-6455£©¡£¡£ ¡£¡£ÆäÓàÎó²îµÄÑÏÖØÐÔÆ·¼¶ÎªÖлòµÍ¡£¡£ ¡£¡£±ðµÄ£¬ £¬£¬£¬ £¬£¬¹È¸èÔ­ÍýÏëÔÚChrome 81ÖÐÍêȫɾ³ý¶ÔTLS 1.0ºÍ1.1µÄÖ§³Ö£¬ £¬£¬£¬ £¬£¬µ«ÓÉÓÚ¹Ú×´²¡¶¾µÄÊ¢ÐУ¬ £¬£¬£¬ £¬£¬¹È¸èÒѾöÒ齫ÕâÒ»Ðж¯ÍƳٵ½Chrome 84¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/google/chrome-81-released-with-32-security-fixes-and-web-nfc-api/


6.±´¼ÓÀ³ÐÞ¸´Automation StudioÈí¼þÖеĶà¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ñо¿Ö°Ô±·¢Ã÷±´¼ÓÀ³¹¤Òµ×Ô¶¯»¯¹«Ë¾µÄAutomation StudioÈí¼þ±£´æ¶à¸öÎó²î£¬ £¬£¬£¬ £¬£¬¹©Ó¦ÉÌÒÑ×îÏÈÐû²¼²¹¶¡¡£¡£ ¡£¡£±´¼ÓÀ³ÊÇÒ»¼ÒλÓڰµØÀûµÄ¹¤Òµ×Ô¶¯»¯¹«Ë¾£¬ £¬£¬£¬ £¬£¬¾ÝÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©³Æ£¬ £¬£¬£¬ £¬£¬¸Ã¹«Ë¾µÄ²úÆ·ÔÚÈ«Çò¹æÄ£ÄÚʹÓ㬠£¬£¬£¬ £¬£¬ÌØÊâÊÇÔÚÄÜÔ´¡¢»¯¹¤ºÍÒªº¦ÖÆÔìÁìÓò¡£¡£ ¡£¡£¸Ã¹«Ë¾µÄAutomation Studio°æ±¾4ÊÜÈý¸öÎó²îµÄÓ°Ï죬 £¬£¬£¬ £¬£¬ÕâЩÎó²îÓëAutomation StudioµÄ¸üÐÂЧÀÍÓйØ£¬ £¬£¬£¬ £¬£¬°üÀ¨ÌØÈ¨Éý¼¶Îó²î¡¢²»ÍêÕûµÄͨѶ¼ÓÃܺÍÑéÖ¤ÎÊÌâÒÔ¼°Óë2018Äê·¢Ã÷µÄZip Slipí§ÒâÎļþÁýÕÖÎó²îÓйصÄ·¾¶±éÀúÎó²î¡£¡£ ¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÎó²îʵÑéMITM¹¥»÷²¢¸ÉÔ¤Èí¼þ¸üÐÂÀú³Ì¡£¡£ ¡£¡£±´¼ÓÀ³ÒѾ­Îª²¿·ÖÊÜÓ°ÏìµÄ°æ±¾Ðû²¼Á˲¹¶¡£¬ £¬£¬£¬ £¬£¬²¢ÕýÔÚΪÆäÓà°æ±¾¾ÙÐÐÐÞ¸´¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerabilities-br-automation-software-facilitate-attacks-ics-networks