ÖÇÀûµÄµçÐŹ«Ë¾GTDÔâµ½ÀÕË÷ÍÅ»ïRorschachµÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-10-27

1¡¢ÖÇÀûµÄµçÐŹ«Ë¾GTDÔâµ½ÀÕË÷ÍÅ»ïRorschachµÄ¹¥»÷


¾ÝýÌå10ÔÂ25ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ÖÇÀûµçÐŹ«Ë¾Grupo GTDÔâµ½¹¥»÷£¬£¬£¬ £¬£¬Ó°ÏìÁËÆä»ù´¡ÉèÊ©¼´Ð§ÀÍ(IaaS)ƽ̨£¬£¬£¬ £¬£¬µ¼ÖÂÔÚÏßЧÀÍÔÝʱÖÐÖ¹¡£¡£¡£¹¥»÷±¬·¢ÓÚ10ÔÂ23ÈÕÉÏÎ磬£¬£¬ £¬£¬GTDµÄÊý¾ÝÖÐÐÄ¡¢»¥ÁªÍø½ÓÈëºÍIPÓïÒô(VoIP)µÈЧÀÍÊܵ½Ó°Ïì¡£¡£¡£ÖÇÀûCSIRT³ÆÕâÊÇÒ»ÆðÀÕË÷¹¥»÷£¬£¬£¬ £¬£¬ËäȻûÓÐ͸¶¹¥»÷ÕßÉí·Ý£¬£¬£¬ £¬£¬µ«Ñо¿Ö°Ô±»ñÏ¤Éæ¼°µ½ÀÕË÷Èí¼þRorschach£¨ÓÖÃûBabLock£©µÄ±äÖÖ¡£¡£¡£¹ØÓÚGTD¹¥»÷ÊÂÎñµÄ±¨¸æÌåÏÖ£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄTrend Micro¡¢BitDefenderºÍCortex XDR¿ÉÖ´ÐÐÎļþÖеÄDLL²à¼ÓÔØÎó²îÀ´¼ÓÔØ¶ñÒâDLL¡£¡£¡£


https://www.bleepingcomputer.com/news/security/chilean-telecom-giant-gtd-hit-by-the-rorschach-ransomware-gang/


2¡¢Winter VivernʹÓÃRoundcubeÎó²î¹¥»÷Å·Ö޵Ļú¹¹


ESETÔÚ10ÔÂ25ÈÕÅû¶ÁËWinter VivernÍÅ»ïÕë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¡£¡£¡£ÖÁÉÙ×Ô10ÔÂ11ÈÕÆð£¬£¬£¬ £¬£¬¸ÃÍÅ»ï¾ÍһֱʹÓÃRoundcube WebmailЧÀÍÆ÷ÖеÄXSSÎó²î(CVE-2023-5631)¹¥»÷Å·ÖÞÕþ¸®»ú¹¹ºÍÖǿ⡣¡£¡£¹¥»÷Õßð³äOutlookÍŶÓ£¬£¬£¬ £¬£¬Í¨¹ý°üÀ¨ÌØÖƵÄSVGÎĵµµÄHTMLÓʼþÀ´Ô¶³Ì×¢Èëí§ÒâJavaScript´úÂ룬£¬£¬ £¬£¬×îÖÕpayload¿É´Ó±»Ñ¬È¾µÄÍøÂçÓʼþЧÀÍÆ÷ÇÔÈ¡µç×ÓÓʼþ¡£¡£¡£¸ÃXSSÎó²îÒÑÓÚ10ÔÂ14ÈÕ±»ÐÞ¸´¡£¡£¡£


https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/


3¡¢MandiantÌáÐÑVolt TyphoonÕë¶ÔÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©


¾Ý10ÔÂ25ÈÕ±¨µÀ£¬£¬£¬ £¬£¬MandiantÌáÐÑÖÎÀíÖ°Ô±×¢ÖØVolt TyphoonÕë¶ÔÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡£¡£×Ô2021ÄêÖÐÆÚÒÔÀ´£¬£¬£¬ £¬£¬¸ÃÍÅ»ïÒѹ¥»÷ÁËͨѶ¡¢ÖÆÔì¡¢¹«¹²ÊÂÒµ¡¢ÔËÊä¡¢ÐÞ½¨¡¢º£Ê¡¢Õþ¸®¡¢ÐÅÏ¢ÊÖÒպͽÌÓýµÈÁìÓòµÄÖÖÖÖʵÌå¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬ËûÃÇ¿ÉÄÜÏëÔÚÕ½Ê±ÖÆÔìÆÆËðÐÔÊÂÎñ£¬£¬£¬ £¬£¬ËäȻûÓÐÇ鱨֤ʵÕâÒ»µã£¬£¬£¬ £¬£¬µ«Ö÷ÒªÕë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ»î¶¯Ê¹Æä²»µÃ²»ÓÅÏÈ˼Á¿¡£¡£¡£Ñо¿Ö°Ô±±Þ²ßÖÎÀíÕßÓÅÏÈÎªÃæÏò»¥ÁªÍøµÄ±ßÑØ×°±¸ºÍÍøÂç·ÓÉÆ÷´ò²¹¶¡ºÍ½ÓÄÉ»º½â²½·¥¡£¡£¡£ 


https://www.securityweek.com/mandiant-intelligence-chief-raises-alarm-over-chinas-volt-typhoon-hackers-in-us-critical-infrastructure/


4¡¢²àÐŵÀ¹¥»÷iLeakage¿ÉʹÓÃSafariÇÔÈ¡Apple×°±¸Êý¾Ý


ýÌå10ÔÂ26Èճƣ¬£¬£¬ £¬£¬Ñо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖеÄÍÆ²â²àÐŵÀ¹¥»÷·½·¨iLeakage£¬£¬£¬ £¬£¬¿ÉʹÓÃSafariÇÔÈ¡Mac¡¢iPhoneºÍiPadµÄÊý¾Ý¡£¡£¡£iLeakageÊÇÕë¶ÔApple Silicon CPUºÍSafariä¯ÀÀÆ÷µÄÍÆ²âÖ´Ðй¥»÷£¬£¬£¬ £¬£¬Ëü¿ÉÓÃÓÚÒÔ¡°½üºõÍêÉÆµÄ׼ȷÐÔ¡±´ÓSafariÒÔ¼°iOSÉϵÄFirefox¡¢TorºÍEdge¼ìË÷Êý¾Ý¡£¡£¡£´ÓʵÖÊÉϽ²£¬£¬£¬ £¬£¬ËüÊÇÒ»ÖÖÎÞ¼ÆÊ±Æ÷µÄSpectre¹¥»÷£¬£¬£¬ £¬£¬¿ÉÒÔÈÆ¹ýËùÓÐä¯ÀÀÆ÷¹©Ó¦ÉÌʵÑéµÄ±ê×¼²àͨµÀ¹¥»÷µÄ±£»£»£»£»¤¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-ileakage-attack-steals-emails-passwords-from-apple-safari/


5¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒµÄ¹¥»÷»î¶¯


10ÔÂ25ÈÕ£¬£¬£¬ £¬£¬Cisco³ÆYoroTrooperÔÚ½üÆÚÖ÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÁªºÏÌå(CIS)¹ú¼Ò¡£¡£¡£¸ÃÍÅ»ïÓÚ2022Äê6ÔÂÊ״λîÔ¾£¬£¬£¬ £¬£¬¿ÉÄÜÓëÈø¿Ë˹̹ÓйØ£¬£¬£¬ £¬£¬»¹Í¨¹ýVPNµÈ·½·¨Î±×°À´×Ô°¢Èû°Ý½®¡£¡£¡£½ñÄê5ÔÂÖÁ8Ô£¬£¬£¬ £¬£¬¹¥»÷ÕßÈëÇÖÁ˶à¸ö¹úÓÐÍøÕ¾ºÍÕþ¸®ÊÂÇéÖ°Ô±µÄÕË»§¡£¡£¡£´ó´ó¶¼¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬ £¬£¬²¢·Ö·¢¶¨ÖƵĶñÒâÈí¼þ£¬£¬£¬ £¬£¬Ö¼ÔÚÇÔÈ¡Êý¾ÝºÍƾ֤¡£¡£¡£×ÔÉϴα»¹ûÕæÅû¶ºó£¬£¬£¬ £¬£¬YoroTrooper¾Íˢв¢À©Õ¹ÁËËûÃǵÄTTP£¬£¬£¬ £¬£¬½«ËûÃÇ»ùÓÚPythonµÄÖ²Èë³ÌÐòÒÆÖ²µ½PowerShell£¬£¬£¬ £¬£¬²¢Ô½À´Ô½¶àµØ½ÓÄÉ×Ô½ç˵ֲÈë³ÌÐò£¬£¬£¬ £¬£¬·ÅÆúÁËÒÔǰʹÓõÄÉÌÆ·»¯¶ñÒâÈí¼þ¡£¡£¡£


https://blog.talosintelligence.com/attributing-yorotrooper/


6¡¢KasperskyÐû²¼ÖØ´óµÄ¶ñÒâÈí¼þStripedFlyµÄÆÊÎö


10ÔÂ26ÈÕ£¬£¬£¬ £¬£¬KasperskyÐû²¼Á˹ØÓÚÖØ´óµÄ¶ñÒâÈí¼þ¿ò¼ÜStripedFlyµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÑÒþ²ØÔËÐÐÁË5Ä꣬£¬£¬ £¬£¬¾ÝÔ¤¼ÆÒÑѬȾÁËÁè¼Ý100Íò¸öWindowsºÍLinuxϵͳ¡£¡£¡£StripedFly֮ǰ±»¹ýʧµØ¹éÀàΪMonero¼ÓÃܿ󹤣¬£¬£¬ £¬£¬KasperskyÔÚÈ¥Äê·¢Ã÷ÁËËüµÄÕæÊÕþ¸®Ê£¬£¬£¬ £¬£¬²¢·¢Ã÷¸Ã¿ò¼Ü×Ô2017Äê¾Í×îÏȻ¡£¡£¡£¸Ã¶ñÒâÈí¼þpayload°üÀ¨¶à¸öÄ£¿ £¿£¿ £¿é£¬£¬£¬ £¬£¬Ê¹¹¥»÷ÕßÄܹ»Äܹ»ÒÔAPT¡¢¼ÓÃÜ¿ó¹¤ÉõÖÁÀÕË÷ÍÅ»ïµÄÉí·ÝÐÐÊ¡£¡£¡£ÍÚ¿óÄ£¿ £¿£¿ £¿é¿ÉÄÜÊÇÉù¶«»÷Î÷µÄÕ½ÂÔ£¬£¬£¬ £¬£¬Ò²ÊǸöñÒâÈí¼þÄܹ»ºã¾ÃÈÆ¹ý¼ì²âµÄÖ÷ÒªÒòËØ£¬£¬£¬ £¬£¬¹¥»÷ÕßÖ÷Ҫͨ¹ýÆäËüÄ£¿ £¿£¿ £¿éÇÔÈ¡Êý¾ÝºÍÈëÇÖϵͳ¡£¡£¡£


https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/