Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç
Ðû²¼Ê±¼ä 2022-03-22Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç
3ÔÂ16ÈÕ£¬£¬MandiantÐû²¼Á˹ØÓÚUNC2891ÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£Ôڴ˴λÖУ¬£¬¹¥»÷ÕßʹÓÃÁËÃûΪCAKETAPµÄÐÂUnix rootkit£¬£¬Ö÷ÒªÕë¶ÔÔËÐÐOracle Solaris²Ù×÷ϵͳµÄЧÀÍÆ÷¡£¡£Caketap¿ÉÒÔÒþ²ØÍøÂçÅþÁ¬¡¢Àú³ÌºÍÎļþ£¬£¬Æä×îÖÕÄ¿µÄÊÇ´ÓÄ¿µÄATMÖнػñÒøÐп¨ºÍPINÑéÖ¤Êý¾Ý£¬£¬È»ºóʹÓÃÕâЩµÁÊý¾Ý¾ÙÐÐÚ²ÆÉúÒâ¡£¡£±ðµÄ£¬£¬¹¥»÷»î¶¯»¹Ê¹ÓÃÁË2¸öÃûΪSLAPSTICKºÍTINYSHELLµÄºóÃÅ£¬£¬ËüÃǶ¼ÓëUNC1945Óйء£¡£
https://www.mandiant.com/resources/unc2891-overview
ʯÓ͹ܵÀ¹«Ë¾TransneftÑз¢²¿·ÖOmega 79GBÊý¾Ýй¶
¾ÝýÌå3ÔÂ19ÈÕ±¨µÀ£¬£¬AnonymousÉù³ÆÒÑÈëÇÖÁËTransneftµÄÄÚ²¿Ñз¢²¿·ÖOmega¡£¡£TransneftÊÇÌìÏÂÉÏ×î´óµÄʯÓ͹ܵÀ¹«Ë¾£¬£¬×ܲ¿Î»ÓÚĪ˹¿Æ¡£¡£3ÔÂ17ÈÕ£¬£¬DDoSecrets³ÆÆäÊÕµ½ÁËOmega¸ß´ï79GBµÄµç×ÓÓʼþ¡£¡£´Ë´Îй¶µÄÊý¾Ý²»µ«°üÀ¨µç×ÓÓʼþÐÅÏ¢£¬£¬»¹°üÀ¨·¢Æ±ºÍ²úÆ·ÔËÊäÏêϸÐÅÏ¢£¬£¬ÒÔ¼°ÏÔʾЧÀÍÆ÷»ú¼ÜºÍÆäËü×°±¸ÉèÖõÄͼÏñÎļþ¡£¡£²»¾Ãǰ£¬£¬Anonymous»¹ÈëÇÖÁ˶íÂÞ˹µÄýÌåÉó²é»ú¹¹Roskomnadzor¡£¡£
https://www.hackread.com/anonymous-leak-79gb-russia-oil-pipeline-email-data/
N4ughtysecTUÉù³ÆÒÑÇÔÈ¡TransUnion·ÇÖÞ·Ö²¿4TBµÄÊý¾Ý
ýÌå3ÔÂ18ÈÕ±¨µÀ£¬£¬TransUnionÐû²¼ÉùÃ÷³ÆÎ»ÓÚÄϷǵÄЧÀÍÆ÷Ôâµ½ÁËδ¾ÊÚȨµÄ»á¼û¡£¡£°ÍÎ÷ºÚ¿ÍÍÅ»ïN4ughtysecTUÉù³Æ¶ÔÕâ´Î¹¥»÷ÈÏÕæ£¬£¬²¢ÒÑÔÚ¹¥»÷ʱ´úÏÂÔØÁË4TBµÄÊý¾Ý¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇͨ¹ý±©Á¦¹¥»÷ÈëÇÖÁËÒ»¸öÇå¾²ÐԽϲîµÄTransUnion SFTPЧÀÍÆ÷£¬£¬²¢ÇÔÈ¡ÁËԼĪ5400Íò¿Í»§µÄÊý¾Ý¡£¡£¾ÝϤ£¬£¬¹¥»÷Õß×îÖÕÆÆ½âµÄÃÜÂëÊÇ¡°Password¡±£¬£¬ÕâÒѱ»ÁÐΪ2021ÄêµÚÎå´ó×î³£ÓõÄÃÜÂë¡£¡£´Ë´Î¹¥»÷µÄÀÕË÷½ð¶îΪ15000000ÃÀÔª£¬£¬µ«TransUnionÒÑÖ¸³öËü²»»áÏòºÚ¿Í¸¶¿î¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-claim-to-breach-transunion-south-africa-with-password-password/
FBIÐû²¼AvosLocker¹¥ÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄͨ¸æ
3ÔÂ17ÈÕ£¬£¬ÃÀ¹úFBIÐû²¼¹ØÓÚÀÕË÷ÍÅ»ïAvosLockerµÄÍøÂçÇå¾²×Éѯ¡£¡£FBI³Æ£¬£¬AvosLockerÊÇÒ»¸ö»ùÓÚRaaSµÄÍŻ£¬Õë¶ÔÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄ×éÖ¯£¬£¬°üÀ¨µ«²»ÏÞÓÚ½ðÈÚЧÀÍÐÐÒµ¡¢ÖÆÔìÐÐÒµºÍÕþ¸®²¿·ÖµÈ¡£¡£¸Ãͨ¸æ¹ûÕæÁËÓйشËRaaSÍÅ»ïµÄÊÖÒÕϸ½Ú£¬£¬»¹Îª×éÖ¯ÌṩÁË¿ÉÓÃÓÚ¼ì²âºÍ×èÖ¹´ËÀ๥»÷µÄÈëÇÖÖ¸±ê(IOC)¡£¡£ID-RansomwareÊý¾ÝÏÔʾ£¬£¬AvosLockerÔÚ2021Äê11ÔÂÖÁ2021Äê12ÔÂʱ´úµÄ»î¶¯¼¤Ôö£¬£¬ÇÒÏÖÔÚÈÔÔÚ¼ÌÐø¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-avoslocker-ransomware-targets-us-critical-infrastructure/
GoogleÐû²¼¹ØÓÚConti³õʼ»á¼ûÊðÀíÕ½ÂÔµÄÆÊÎö±¨¸æ
3ÔÂ17ÈÕ£¬£¬GoogleÍþвÆÊÎöС×é(TAG)Ðû²¼Á˹ØÓÚConti³õʼ»á¼ûÊðÀíÕ½ÂÔµÄÆÊÎö±¨¸æ¡£¡£TAG·¢Ã÷еÄEXOTIC LILYÓëContiºÍDiavolµÈÀÕË÷ÍÅ»ïÓйأ¬£¬ÆäʹÓÃMicrosoft Windows MSHTMLƽ̨ÖÐÎó²îCVE-2021-40444¾ÙÐд¹ÂÚ¹¥»÷£¬£¬ÔÚá¯ÁëÆÚÌìÌìÏòÈ«Çò¶à´ï650¸öÄ¿µÄ×éÖ¯·¢ËÍÁè¼Ý5000·âÓʼþ¡£¡£ËäÈ»EXOTIC LILYµÄ»î¶¯ÓëContiµÄÓªÒµÖØµþ£¬£¬µ«GoogleÒÔΪ£¬£¬ËüÊÇÒ»¸öÍêȫרעÓÚ½¨Éè³õÊ¼ÍøÂç»á¼ûµÄ×ÔÁ¦¹¥»÷ÍŻ¡£
https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
Western DigitalÐÞ¸´ÆäEdgeRoverÖеÄĿ¼±éÀúÎó²î
3ÔÂ18ÈÕ£¬£¬Western DigitalÐû²¼Çå¾²¸üУ¬£¬ÐÞ¸´Æä×ÀÃæÓ¦ÓóÌÐòEdgeRoverÖеÄĿ¼±éÀúÎó²î£¨CVE-2022-22998£©¡£¡£EdgeRoverÊǼ¯ÖÐʽÄÚÈÝÖÎÃ÷È·¾ö¼Æ»®£¬£¬½«¶à¸öÊý×Ö´æ´¢×°±¸Í³Ò»ÔÚÒ»¸öÖÎÀí½çÃæÏ¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.1£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´¾ÙÐÐÍâµØÈ¨ÏÞÌáÉýºÍɳºÐÌÓÒÝ£¬£¬¿ÉÄܻᵼÖÂÐÅϢй¶»ò¾Ü¾øÐ§ÀÍ(DoS)¹¥»÷¡£¡£Western DigitalµÄͨ¸æ²¢Î´ÌṩÓйظÃÎó²îµÄÏêϸÐÅÏ¢£¬£¬Òò´Ë»¹²»ÇåÎúÕâÊÇÒ»¸öÔÊÐíÍâµØÈ¨ÏÞÌáÉýµÄDLLÐ®ÖÆÎó²î£¬£¬ÕÕ¾ÉÒ»¸öÔÊÐí»á¼û·ÇÌØÈ¨Êý¾ÝλÖõÄÎó²î¡£¡£
https://www.bleepingcomputer.com/news/security/western-digital-app-bug-gives-elevated-privileges-in-windows-macos/
Çå¾²¹¤¾ß
EvilSelenium
ÊÇÒ»¸ö½« SeleniumÎäÆ÷»¯ÒÔÀÄÓà Chrome µÄÐÂÏîÄ¿¡£¡£
https://github.com/mrd0x/EvilSelenium/
wholeaked
ÊÇÒ»¸öÎļþ¹²Ïí¹¤¾ß£¬£¬¿ÉÈÃÄúÔÚ±¬·¢×ß©ʱÕÒµ½ÈÏÕæÈË¡£¡£
https://github.com/utkusen/wholeaked
WSVuls
ÏÂÁîÐй¤¾ß£¬£¬×¨Îª¿ª·¢/²âÊÔְԱͨ¹ýµ¥¸öÏÂÁî²âÊÔÎó²îºÍÆÊÎöÍøÕ¾¶øÉè¼Æ¡£¡£
https://github.com/anouarbensaad/wsvuls
AWS CloudSaga
ÓÃÓÚÔÚ Amazon Web Services (AWS) ÇéÐÎÖвâÊÔÇå¾²¿ØÖƺ;¯±¨¡£¡£
https://github.com/awslabs/aws-cloudsaga#running-the-code
Çå¾²ÆÊÎö
Windows 11 Ϊ USB Çý¶¯Æ÷Ìí¼ÓÁË BitLocker ɨ³ýÕ½ÂÔ
https://www.bleepingcomputer.com/news/microsoft/windows-11-adds-a-bitlocker-exclusion-policy-for-usb-drives/
΢ÈíÌáÐÑ Internet Explorer ÔÚ 6 Ô¼´½«ïÔÌ
https://www.bleepingcomputer.com/news/microsoft/microsoft-reminds-of-internet-explorers-looming-demise-in-june/
NIST ÎªÖÆÔìÉÌÐû²¼ ICS ÍøÂçÇå¾²Ö¸ÄÏ
https://www.securityweek.com/nist-releases-ics-cybersecurity-guidance-manufacturers
д¹ÂÚ¹¤¾ß°ü¿ÉÓÃÀ´½¨ÉèÐéαµÄ Chrome ä¯ÀÀÆ÷´°¿Ú
https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-lets-anyone-create-fake-chrome-browser-windows/
CISA¡¢FBI ÖÒÑÔ¶Ô SATCOM ÍøÂ繩ӦÉ̵Ĺ¥»÷
https://www.hackread.com/targeting-satellite-cisa-fbi-warns-satcom-providers/
¶à¼ÒÆû³µÖÆÔìÉÌѬȾ Emotet
https://www.darkreading.com/attacks-breaches/multiple-automakers-infected-with-emotet


¾©¹«Íø°²±¸11010802024551ºÅ