΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
Ðû²¼Ê±¼ä 2024-10-151. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷
10ÔÂ13ÈÕ£¬£¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ£¬£¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷£¬£¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐΡ£¡£¡£¡£¡£Kerberoasting ʹÓà Kerberos Éí·ÝÑéÖ¤ÐÒéÇÔÈ¡ AD ƾ֤£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±Ñݱ䣬£¬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷ǰÑԺͷÀÓù»úÖÆ¡£¡£¡£¡£¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆÆ½âÊÖÒÕµÄÔËÓ㬣¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý¡£¡£¡£¡£¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬£¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆÆ½âʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵÄЧÀÍÆ±Ö¤£¬£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾ÊÚȨµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬£¬¸üÒ×Êܵ½¹¥»÷¡£¡£¡£¡£¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£¡£¡£¡£¡£Îª¼õÇá Kerberoasting Σº¦£¬£¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥£¬£¬°üÀ¨Ê¹ÓÃ×éÍйÜЧÀÍÕÊ»§ (gMSA) »òίÍÐÍйÜЧÀÍÕÊ»§ (dMSA)¡¢Ç¿ÖÆÊ¹ÓÃÇ¿ÃÜÂë¡¢ÉèÖÃЧÀÍÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄЧÀÍÖ÷ÌåÃû³Æ (SPN)¡£¡£¡£¡£¡£±ðµÄ£¬£¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£¡£¡£¡£¡£
https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/
2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ
10ÔÂ14ÈÕ£¬£¬Trend MicroÑо¿Ö°Ô±·¢Ã÷£¬£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâ»î¶¯¼¤Ôö£¬£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£¡£¡£¡£¡£´Ë´ÎÓã²æÊ½ÍøÂç´¹ÂڻÖ÷ÒªÕë¶ÔÀ¶¡ÃÀÖ޵Ĺ«Ë¾£¬£¬ÓÈÆäÊǰÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹£¬£¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃ˰É걨µÄ½ôÆÈÐÔÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁ£¬ÓëC&CЧÀÍÆ÷½¨ÉèÅþÁ¬¡£¡£¡£¡£¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ£¬£¬µ±Óû§Ö´ÐÐʱ£¬£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî¡£¡£¡£¡£¡£³ýÁËLNKÎļþ£¬£¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû£¬£¬Èç.pdf¡¢.jpgµÈ£¬£¬ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL£¬£¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß£¬£¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£¡£¡£¡£¡£Water MakaraµÄÓã²æÊ½ÍøÂç´¹ÂڻÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬£¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù£¬£¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üеȣ¬£¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html
3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷£¬£¬×¨¼ÒÇ××Ô½ÒÃØÈ¦Ì×
10ÔÂ14ÈÕ£¬£¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþЧÀÍ£¬£¬ÓµÓÐÁè¼Ý25ÒÚÓû§£¬£¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖØµãÄ¿µÄ¡£¡£¡£¡£¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑԳƣ¬£¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§£¬£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£¡£¡£¡£¡£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ£¬£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²ÆÍøÕ¾£¬£¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£¡£¡£½Ó×Å£¬£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬£¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£»£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷£¬£¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ£¬£¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó£¬£¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£¡£¡£¡£¡£±ðµÄ£¬£¬Mitrovic»¹Òâʶµ½£¬£¬Æ×ÓµÄÉùÒô¹ýÓÚÍêÉÆ£¬£¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ¡£¡£¡£¡£¡£ËûÒÔΪ£¬£¬ÕâÊÇÈ«Çò¹æÄ£Äڵĺڿͻ£¬£¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£¡£¡£¡£¡£Òò´Ë£¬£¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾£¬£¬ÌáÐѸ÷ÈËÕ©ÆÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ£¬£¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ£¬£¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÈεÄÈËÇóÖú£¬£¬ÒÔÌá·À´ËÀ๥»÷¡£¡£¡£¡£¡£
https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/
4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ
10ÔÂ14ÈÕ£¬£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø£¬£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬£¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£¡£¡£¡£¡£Ë¼¿Æ½²»°ÈËÌåÏÖ£¬£¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ£¬£¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæÊµÐÔ£¬£¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£´Ëǰ£¬£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ£¬£¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿ÆÏµÍ³£¬£¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîĿԴ´úÂë¡¢Ó²±àÂëÆ¾Ö¤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ¡£¡£¡£¡£¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËʿ͸¶£¬£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйÜЧÀÍÌṩÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£¡£¡£È»¶ø£¬£¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´Ëǰ6Ô·ݵÄйÃÜÊÂÎñÓйء£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/
5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð
10ÔÂ14ÈÕ£¬£¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾ÊÚȨµÄÏÖ½ðÌáÈ¡¡£¡£¡£¡£¡£FASTCashÏÈǰÖ÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬£¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷£¬£¬ÇÔÈ¡ÊýÍòÍòÃÀÔª£¬£¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв£¬£¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£¡£¡£¡£¡£2020Ä꣬£¬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬£¬Ò»Äêºó£¬£¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËߣ¬£¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£¡£¡£¡£¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal£¬£¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷ЧÀÍÆ÷Àú³ÌÖУ¬£¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢£¬£¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ìæ»»ÎªÅú×¼£¬£¬²¢°üÀ¨Ëæ»ú½ð¶î£¬£¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣡£¡£¡£¡£¸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬£¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß¡£¡£¡£¡£¡£±ðµÄ£¬£¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð£¬£¬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆä¹¤¾ß¼¯¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/
6. Gryphon HealthcareÔâÓöÊý¾Ýй¶£¬£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡
10ÔÂ14ÈÕ£¬£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡Ð§ÀÍÌṩÉÌ£¬£¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢй¶µÄÊÂÎñ¡£¡£¡£¡£¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬£¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬£¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾²£¬£¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬣¬µ«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥Ð§À͵Ä×éÖ¯´æ´¢£¬£¬¿ÉÄܰüÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£¡£¡£¡£¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬£¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó¡£¡£¡£¡£¡£Î´À´¼¸¸öÔ£¬£¬Ëæ×Å״ʦÃÇÖÆ¶©ÕûÌåËßËÏÍýÏ룬£¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£
https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/


¾©¹«Íø°²±¸11010802024551ºÅ