Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-08-03

1¡¢Kaspersky·¢Ã÷APT31Õë¶Ô¹¤Òµ×éÖ¯µÄÆøÏ¶ÏµÍ³µÄ¹¥»÷


KasperskyÔÚ7ÔÂ31Èճƣ¬£¬APT31£¨ÓÖÃûZircium£©Ò»Ö±ÔÚʹÓÃеĶñÒâÈí¼þ¹¥»÷¹¤Òµ×éÖ¯£¬£¬Ö¼ÔÚ´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý¡£¡£ ¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬¹¥»÷ÕßÔÚÖ÷ÒªÕë¶Ô¶«Å·µÄ¹¥»÷ÖÐʹÓÃÁËÖÁÉÙ15¸ö²î±ðµÄÖ²Èë³ÌÐò£¬£¬Ã¿¸öÖ²Èë³ÌÐò¶¼ÓÃÓÚ²î±ðµÄ¹¥»÷½×¶Î¡£¡£ ¡£¡£¡£¡£¹¥»÷ʼÓÚÈ¥Äê4Ô·Ý£¬£¬Éæ¼°Èý¸ö²î±ðµÄ½×¶Î£º³õʼ½×¶ÎµÄÖ²Èë³ÌÐò½¨Éè¶ÔÄ¿µÄϵͳµÄ³¤ÆÚÐÔºÍÔ¶³Ì»á¼û£¬£¬²¢ÍøÂçÕì̽Êý¾Ý£»£»£»µÚ¶þ½×¶Î£¬£¬APT31»á×°ÖøüרҵµÄ¶ñÒâÈí¼þ£¬£¬À´Ê¹ÓÃUSBÈö²¥´ÓÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Êý¾Ý£»£»£»×îºóµÄµÚÈý½×¶Î£¬£¬ºÚ¿ÍʹÓÃÖ²Èë³ÌÐò½«ÍøÂçµ½µÄÊý¾ÝÉÏ´«µ½C2ЧÀÍÆ÷¡£¡£ ¡£¡£¡£¡£


https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/


2¡¢ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕòÔâµ½ÀÕË÷¹¥»÷Ô޳ɽ»45ÍòÃÀÔªÊê½ð


¾Ý8ÔÂ1ÈÕ±¨µÀ£¬£¬ÃÀ¹úÃÉÌØ¿ËÀ³¶ûÕò£¨Montclair£©Ôâµ½ÍøÂç¹¥»÷£¬£¬¸ÃÕòµÄ°ü¹Ü¹«Ë¾Óë¹¥»÷ÕßЭÉ̸濢ÁË45ÍòÃÀÔªµÄÏ¢ÕùЭÒé¡£¡£ ¡£¡£¡£¡£ÔÝʱÕò³¤Hartnett³Æ£¬£¬ÏÖÔÚ¹¥»÷ÒѾ­»ñµÃÏàʶ¾ö£¬£¬¶Ô¸ÃÕòÓªÒµºÍÔËÓªÖÁ¹ØÖ÷ÒªµÄÊý¾ÝÒ²Òѻָ´¡£¡£ ¡£¡£¡£¡£¿ÉÊÇһЩÊôÓÚСÎÒ˽¼ÒÓû§µÄÊý¾Ý£¬£¬ºÍÉæ¼°Îª¸ÃÕòЧÀͲ¢´æ´¢ÒÑÍù¼Í¼µÄÍⲿ¹©Ó¦É̵ÄÊý¾ÝÈÔÓдý»Ö¸´¡£¡£ ¡£¡£¡£¡£ÕâЩɥʧµÄÊý¾ÝÓ°ÏìÁ˸ÃÕòÕþ¸®ÏìÓ¦¡¶¹ûÕæ¹«¹²¼Í¼·¨°¸¡·Ä³Ð©ÒªÇóµÄÄÜÁ¦¡£¡£ ¡£¡£¡£¡£


https://www.databreaches.net/cyber-attack-on-montclair-township-led-to-450k-ransom-payment/


3¡¢Cofense³Æ½üÆÚʹÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿Ôö¶à


 CofenseÓÚ8ÔÂ1ÈÕ͸¶£¬£¬Ê¹ÓÃGoogle AMPµÄ´¹ÂڻÊýÄ¿ÔÚ7ÔÂÖÐÑ®´ó·ùÔöÌí¡£¡£ ¡£¡£¡£¡£Google AMPÊÇÓÉGoogleÓë30¸öÏàÖúͬ°éÅäºÏ¿ª·¢µÄ¿ªÔ´HTML¿ò¼Ü£¬£¬Ö¼ÔÚÌá¸ßÒÆ¶¯×°±¸ÉÏÍøÒ³ÄÚÈݵļÓÔØËÙÂÊ¡£¡£ ¡£¡£¡£¡£ÕâÖÖеĴ¹ÂÚÕ½ÂÔ½«AMP URLǶÈë´¹ÂÚÓʼþÖУ¬£¬ÕâЩ¶ñÒâURLÓÚ5Ô·Ý×îÏÈ·ºÆð£¬£¬ÏÖÔÚÈÔÔÚÈö²¥£¬£¬Ö¼ÔÚÇÔȡԱ¹¤µÇ¼ƾ֤¡£¡£ ¡£¡£¡£¡£´ËÀà»î¶¯ÖÐʹÓÃÍøÕ¾ÍйÜÔÚGoogle.com£¨77%£©ºÍGoogle.co.uk£¨23%£©ÉÏ¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬¹¥»÷»î¶¯ºÜÊÇÒþ²Ø£¬£¬²»µ«Ê¹ÓÃÁËGoogle AMP URL£¬£¬»¹Á¬ÏµÁ˶àÖÖÒÑÖªTTPÀ´Èƹýµç×ÓÓʼþÇå¾²»ù´¡ÉèÊ©¡£¡£ ¡£¡£¡£¡£


https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/


4¡¢ºÚ¿ÍUsNsAÔÚ°µÍø¹ûÕæÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â


¾Ý7ÔÂ31ÈÕ±¨µÀ£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪUsNsAµÄºÚ¿Í¹ûÕæÁËÓ¡¶ÈPHI-IIIT DelhiµÄÊý¾Ý¿â£¬£¬ÒÔ»»È¡ÂÛ̳»ý·Ö¡£¡£ ¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¿âÓÉ82¸öÎļþ×é³É£¬£¬×ܾÞϸԼΪ1.8 GB£¬£¬Éæ¼°µç×ÓÓʼþ¡¢ÐÕÃû¡¢Äê·ÝÒÔ¼°ÄÚ²¿Ò½ÁƱ£½¡ºÍÒßÃ翪·¢Ïà¹ØÎĵµ£¬£¬°üÀ¨Ñо¿ÂÛÎĵÈ¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬¹¥»÷ÕßʹÓÃÁËPHI PortalÍøÕ¾ÉϵÄSQL×¢ÈëÎó²îÀ´»ñµÃδ¾­ÊÚȨµÄ»á¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¿â£¬£¬ËûºÜ¿ÉÄÜʹÓÃÁËSQLMap¹¤¾ß¡£¡£ ¡£¡£¡£¡£ 


https://www.cloudsek.com/threatintelligence/phi-database-portal-for-health-informatics-iiit-delhi-shared-on-cyber-crime-forum


5¡¢ÐÂÐͲàÐŵÀ¹¥»÷·½·¨Collide+PowerÓ°ÏìÏÕЩËùÓÐCPU


¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÃûΪCollide+PowerµÄÐÂÐÍ»ùÓÚÈí¼þµÄµçÔ´²àÐŵÀ¹¥»÷·½·¨£¬£¬Ó°ÏìÁËÏÕЩËùÓÐCPU£¬£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡£¡£ ¡£¡£¡£¡£ÆäÖ÷Òª¿´·¨ÊÇ£¬£¬µ±¹¥»÷ÕßµÄÊý¾ÝÓëÆäËüÓ¦ÓóÌÐò·¢Ë͵ÄÊý¾ÝÔÚCPU»º´æÄÚ´æÖб¬·¢Êý¾Ý¡°³åÍ»¡±²¢ÁýÕÖǰÕßʱ£¬£¬¿É´ÓCPU¹¦ºÄÕÉÁ¿ÖµÖÐй¶Êý¾Ý¡£¡£ ¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2023-20583£¬£¬Ó°ÏìÁËIntel¡¢AMDºÍʹÓÃARM¼Ü¹¹µÄ´¦Öóͷ£Æ÷¡£¡£ ¡£¡£¡£¡£¸ÃÎó²î¾ßÓÐÑо¿ÒâÒ壬£¬µ«Ê¹ÓÃÆðÀ´½ÏÁ¿ÄÑÌ⣬£¬Òò´ËÑÏÖØË®Æ½½ÏµÍ¡£¡£ ¡£¡£¡£¡£ÖÁÓÚ»º½â²½·¥£¬£¬ÐèÒªÖØÐÂÉè¼ÆCPU£¬£¬ÒÔÊǸüÏÖʵµÄ»º½â²½·¥ÊDZÜÃâ¹¥»÷ÕßÊӲ쵽ÓëµçÔ´Ïà¹ØµÄÐźÅ¡£¡£ ¡£¡£¡£¡£


https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/


6¡¢Unit 42Ðû²¼NodeStealer 2.0¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


8ÔÂ1ÈÕ£¬£¬Unit 42³ÆÆä·¢Ã÷ÁËÒ»¸öеĴ¹Âڻ£¬£¬·Ö·¢ÁËNodeStealerµÄPython±äÌå¡£¡£ ¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2022Äê12ÔÂ×óÓÒ×îÏÈ£¬£¬Õë¶ÔFacebookÆóÒµÕË»§ÇÔÊØÐÅÏ¢¡£¡£ ¡£¡£¡£¡£MetaÔøÔÚ5Ô·ÝÅû¶ÁËÓÉJavaScript¿ª·¢µÄNodeStealer£¬£¬ËüÓëPython±äÌåÓÐÐí¶àÏàËÆÖ®´¦¡£¡£ ¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄ»î¶¯Éæ¼°Á½¸ö±äÌ壬£¬µÚÒ»¸öÖ§³Ö¶àÖÖ¹¦Ð§£¬£¬ÀýÈçÇÔÈ¡FacebookÆóÒµÕË»§ÐÅÏ¢¡¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡¢Í¨¹ýGUI½ûÓÃDefenderÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±Ò×ʽðµÈ£»£»£»µÚ¶þ¸öÖ§³ÖÌØÊ⹦Ч£¬£¬ÀýÈçÆÊÎöOutlookÓʼþ¡¢Í¨¹ýTelegram¾ÙÐÐÊý¾Ýй¶¡¢Ð®ÖÆFacebookÕË»§ºÍ·´ÆÊÎöµÈ¡£¡£ ¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/