Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç

Ðû²¼Ê±¼ä 2022-03-22

Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç


3ÔÂ16ÈÕ£¬£¬MandiantÐû²¼Á˹ØÓÚUNC2891ÍŻ﹥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£Ôڴ˴λÖУ¬£¬¹¥»÷ÕßʹÓÃÁËÃûΪCAKETAPµÄÐÂUnix rootkit£¬£¬Ö÷ÒªÕë¶ÔÔËÐÐOracle Solaris²Ù×÷ϵͳµÄЧÀÍÆ÷¡£¡£Caketap¿ÉÒÔÒþ²ØÍøÂçÅþÁ¬¡¢Àú³ÌºÍÎļþ£¬£¬Æä×îÖÕÄ¿µÄÊÇ´ÓÄ¿µÄATMÖнػñÒøÐп¨ºÍPINÑéÖ¤Êý¾Ý£¬£¬È»ºóʹÓÃÕâЩµÁÊý¾Ý¾ÙÐÐڲƭÉúÒâ¡£¡£±ðµÄ£¬£¬¹¥»÷»î¶¯»¹Ê¹ÓÃÁË2¸öÃûΪSLAPSTICKºÍTINYSHELLµÄºóÃÅ£¬£¬ËüÃǶ¼ÓëUNC1945Óйء£¡£


https://www.mandiant.com/resources/unc2891-overview


ʯÓ͹ܵÀ¹«Ë¾TransneftÑз¢²¿·ÖOmega 79GBÊý¾Ýй¶


¾ÝýÌå3ÔÂ19ÈÕ±¨µÀ£¬£¬AnonymousÉù³ÆÒÑÈëÇÖÁËTransneftµÄÄÚ²¿Ñз¢²¿·ÖOmega¡£¡£TransneftÊÇÌìÏÂÉÏ×î´óµÄʯÓ͹ܵÀ¹«Ë¾£¬£¬×ܲ¿Î»ÓÚĪ˹¿Æ¡£¡£3ÔÂ17ÈÕ£¬£¬DDoSecrets³ÆÆäÊÕµ½ÁËOmega¸ß´ï79GBµÄµç×ÓÓʼþ¡£¡£´Ë´Îй¶µÄÊý¾Ý²»µ«°üÀ¨µç×ÓÓʼþÐÅÏ¢£¬£¬»¹°üÀ¨·¢Æ±ºÍ²úÆ·ÔËÊäÏêϸÐÅÏ¢£¬£¬ÒÔ¼°ÏÔʾЧÀÍÆ÷»ú¼ÜºÍÆäËü×°±¸ÉèÖõÄͼÏñÎļþ¡£¡£²»¾Ãǰ£¬£¬Anonymous»¹ÈëÇÖÁ˶íÂÞ˹µÄýÌåÉó²é»ú¹¹Roskomnadzor¡£¡£


https://www.hackread.com/anonymous-leak-79gb-russia-oil-pipeline-email-data/


N4ughtysecTUÉù³ÆÒÑÇÔÈ¡TransUnion·ÇÖÞ·Ö²¿4TBµÄÊý¾Ý


 Ã½Ìå3ÔÂ18ÈÕ±¨µÀ£¬£¬TransUnionÐû²¼ÉùÃ÷³ÆÎ»ÓÚÄϷǵÄЧÀÍÆ÷Ôâµ½ÁËδ¾­ÊÚȨµÄ»á¼û¡£¡£°ÍÎ÷ºÚ¿ÍÍÅ»ïN4ughtysecTUÉù³Æ¶ÔÕâ´Î¹¥»÷ÈÏÕæ£¬£¬²¢ÒÑÔÚ¹¥»÷ʱ´úÏÂÔØÁË4TBµÄÊý¾Ý¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇͨ¹ý±©Á¦¹¥»÷ÈëÇÖÁËÒ»¸öÇå¾²ÐԽϲîµÄTransUnion SFTPЧÀÍÆ÷£¬£¬²¢ÇÔÈ¡ÁËԼĪ5400Íò¿Í»§µÄÊý¾Ý¡£¡£¾ÝϤ£¬£¬¹¥»÷Õß×îÖÕÆÆ½âµÄÃÜÂëÊÇ¡°Password¡±£¬£¬ÕâÒѱ»ÁÐΪ2021ÄêµÚÎå´ó×î³£ÓõÄÃÜÂë¡£¡£´Ë´Î¹¥»÷µÄÀÕË÷½ð¶îΪ15000000ÃÀÔª£¬£¬µ«TransUnionÒÑÖ¸³öËü²»»áÏòºÚ¿Í¸¶¿î¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-claim-to-breach-transunion-south-africa-with-password-password/


FBIÐû²¼AvosLocker¹¥ÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄͨ¸æ


3ÔÂ17ÈÕ£¬£¬ÃÀ¹úFBIÐû²¼¹ØÓÚÀÕË÷ÍÅ»ïAvosLockerµÄÍøÂçÇå¾²×Éѯ¡£¡£FBI³Æ£¬£¬AvosLockerÊÇÒ»¸ö»ùÓÚRaaSµÄÍŻ£¬Õë¶ÔÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄ×éÖ¯£¬£¬°üÀ¨µ«²»ÏÞÓÚ½ðÈÚЧÀÍÐÐÒµ¡¢ÖÆÔìÐÐÒµºÍÕþ¸®²¿·ÖµÈ¡£¡£¸Ãͨ¸æ¹ûÕæÁËÓйشËRaaSÍÅ»ïµÄÊÖÒÕϸ½Ú£¬£¬»¹Îª×éÖ¯ÌṩÁË¿ÉÓÃÓÚ¼ì²âºÍ×èÖ¹´ËÀ๥»÷µÄÈëÇÖÖ¸±ê(IOC)¡£¡£ID-RansomwareÊý¾ÝÏÔʾ£¬£¬AvosLockerÔÚ2021Äê11ÔÂÖÁ2021Äê12ÔÂʱ´úµÄ»î¶¯¼¤Ôö£¬£¬ÇÒÏÖÔÚÈÔÔÚ¼ÌÐø¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-avoslocker-ransomware-targets-us-critical-infrastructure/


GoogleÐû²¼¹ØÓÚConti³õʼ»á¼ûÊðÀíÕ½ÂÔµÄÆÊÎö±¨¸æ


3ÔÂ17ÈÕ£¬£¬GoogleÍþвÆÊÎöС×é(TAG)Ðû²¼Á˹ØÓÚConti³õʼ»á¼ûÊðÀíÕ½ÂÔµÄÆÊÎö±¨¸æ¡£¡£TAG·¢Ã÷еÄEXOTIC LILYÓëContiºÍDiavolµÈÀÕË÷ÍÅ»ïÓйأ¬£¬ÆäʹÓÃMicrosoft Windows MSHTMLƽ̨ÖÐÎó²îCVE-2021-40444¾ÙÐд¹ÂÚ¹¥»÷£¬£¬ÔÚá¯ÁëÆÚÌìÌìÏòÈ«Çò¶à´ï650¸öÄ¿µÄ×éÖ¯·¢ËÍÁè¼Ý5000·âÓʼþ¡£¡£ËäÈ»EXOTIC LILYµÄ»î¶¯ÓëContiµÄÓªÒµÖØµþ£¬£¬µ«GoogleÒÔΪ£¬£¬ËüÊÇÒ»¸öÍêȫרעÓÚ½¨Éè³õÊ¼ÍøÂç»á¼ûµÄ×ÔÁ¦¹¥»÷ÍŻ¡£


https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/


Western DigitalÐÞ¸´ÆäEdgeRoverÖеÄĿ¼±éÀúÎó²î


3ÔÂ18ÈÕ£¬£¬Western DigitalÐû²¼Çå¾²¸üУ¬£¬ÐÞ¸´Æä×ÀÃæÓ¦ÓóÌÐòEdgeRoverÖеÄĿ¼±éÀúÎó²î£¨CVE-2022-22998£©¡£¡£EdgeRoverÊǼ¯ÖÐʽÄÚÈÝÖÎÃ÷È·¾ö¼Æ»®£¬£¬½«¶à¸öÊý×Ö´æ´¢×°±¸Í³Ò»ÔÚÒ»¸öÖÎÀí½çÃæÏ¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.1£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´¾ÙÐÐÍâµØÈ¨ÏÞÌáÉýºÍɳºÐÌÓÒÝ£¬£¬¿ÉÄܻᵼÖÂÐÅϢй¶»ò¾Ü¾øÐ§ÀÍ(DoS)¹¥»÷¡£¡£Western DigitalµÄͨ¸æ²¢Î´ÌṩÓйظÃÎó²îµÄÏêϸÐÅÏ¢£¬£¬Òò´Ë»¹²»ÇåÎúÕâÊÇÒ»¸öÔÊÐíÍâµØÈ¨ÏÞÌáÉýµÄDLLÐ®ÖÆÎó²î£¬£¬ÕÕ¾ÉÒ»¸öÔÊÐí»á¼û·ÇÌØÈ¨Êý¾ÝλÖõÄÎó²î¡£¡£


https://www.bleepingcomputer.com/news/security/western-digital-app-bug-gives-elevated-privileges-in-windows-macos/



Çå¾²¹¤¾ß


EvilSelenium


ÊÇÒ»¸ö½« SeleniumÎäÆ÷»¯ÒÔÀÄÓà Chrome µÄÐÂÏîÄ¿¡£¡£


https://github.com/mrd0x/EvilSelenium/


wholeaked


ÊÇÒ»¸öÎļþ¹²Ïí¹¤¾ß£¬£¬¿ÉÈÃÄúÔÚ±¬·¢×ß©ʱÕÒµ½ÈÏÕæÈË¡£¡£


https://github.com/utkusen/wholeaked


WSVuls


ÏÂÁîÐй¤¾ß£¬£¬×¨Îª¿ª·¢/²âÊÔְԱͨ¹ýµ¥¸öÏÂÁî²âÊÔÎó²îºÍÆÊÎöÍøÕ¾¶øÉè¼Æ¡£¡£


https://github.com/anouarbensaad/wsvuls


AWS CloudSaga


ÓÃÓÚÔÚ Amazon Web Services (AWS) ÇéÐÎÖвâÊÔÇå¾²¿ØÖƺ;¯±¨¡£¡£


https://github.com/awslabs/aws-cloudsaga#running-the-code



Çå¾²ÆÊÎö


Windows 11 Ϊ USB Çý¶¯Æ÷Ìí¼ÓÁË BitLocker ɨ³ýÕ½ÂÔ


https://www.bleepingcomputer.com/news/microsoft/windows-11-adds-a-bitlocker-exclusion-policy-for-usb-drives/


΢ÈíÌáÐÑ Internet Explorer ÔÚ 6 Ô¼´½«ïÔÌ­


https://www.bleepingcomputer.com/news/microsoft/microsoft-reminds-of-internet-explorers-looming-demise-in-june/


NIST ÎªÖÆÔìÉÌÐû²¼ ICS ÍøÂçÇå¾²Ö¸ÄÏ


https://www.securityweek.com/nist-releases-ics-cybersecurity-guidance-manufacturers


д¹ÂÚ¹¤¾ß°ü¿ÉÓÃÀ´½¨ÉèÐéαµÄ Chrome ä¯ÀÀÆ÷´°¿Ú


https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-lets-anyone-create-fake-chrome-browser-windows/


CISA¡¢FBI ÖÒÑÔ¶Ô SATCOM ÍøÂ繩ӦÉ̵Ĺ¥»÷


https://www.hackread.com/targeting-satellite-cisa-fbi-warns-satcom-providers/


¶à¼ÒÆû³µÖÆÔìÉÌѬȾ Emotet


https://www.darkreading.com/attacks-breaches/multiple-automakers-infected-with-emotet