ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-14
1. ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ­¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬ÒÁÀ­¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄÈ«ÐIJ߻®¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Check PointÆÊÎö£¬£¬£¬£¬ £¬£¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ­¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿·Ö£¬£¬£¬£¬ £¬£¬Ê¹ÓÃжñÒâÈí¼þVeatyºÍSpearal£¬£¬£¬£¬ £¬£¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉøÍ¸ÍøÂç¡£¡£¡£¡£¡£¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÇø»îÔ¾£¬£¬£¬£¬ £¬£¬ÉÆÓÚÍøÂç´¹ÂںͶ¨ÖƺóÃŹ¥»÷£¬£¬£¬£¬ £¬£¬´Ë´ÎÒ²²»ÆÆÀý£¬£¬£¬£¬ £¬£¬Õ¹Ê¾ÁËÆäÆæÒìµÄÏÂÁîÓë¿ØÖÆ»úÖÆ£¬£¬£¬£¬ £¬£¬°üÀ¨×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¡£¡£¡£¡£¡£¹¥»÷Á´Í¨¹ýÓÕÆ­ÐÔÎļþÆô¶¯£¬£¬£¬£¬ £¬£¬Ö´ÐÐPowerShell»òPyinstaller¾ç±¾£¬£¬£¬£¬ £¬£¬É¾³ýºÛ¼£²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£SpearalʹÓÃDNSËíµÀͨѶ£¬£¬£¬£¬ £¬£¬VeatyÔòͨ¹ýÌØ¶¨ÓÊÏäÏÂÔØ²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬»¹·¢Ã÷ÓëSSHËíµÀºóÃźÍIISЧÀÍÆ÷ºóÃÅÏà¹ØµÄ»î¶¯£¬£¬£¬£¬ £¬£¬Åú×¢¹¥»÷ÕßÊֶζàÑùÇÒÊÖÒÕÏȽø¡£¡£¡£¡£¡£¡£Check PointÇ¿µ÷£¬£¬£¬£¬ £¬£¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÇøÄÚµÄÒ»Á¬ºÍ¼¯ÖÐÆð¾¢£¬£¬£¬£¬ £¬£¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html


2. TrickMoÒøÐÐľÂíбäÖÖÆØ¹â£ºÔöÇ¿Íþв£¬£¬£¬£¬ £¬£¬ÇÔÈ¡Òþ˽


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½ÒÆÆÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ£¬£¬£¬£¬ £¬£¬ÕâÒ»±äÖÖ²»µ«¼ÌÐø²¢Ç¿»¯ÁËÆäǰÉíÕë¶ÔAndroid×°±¸ÒøÐÐÆ¾Ö¤µÄ¹Å°åÍþвÄÜÁ¦£¬£¬£¬£¬ £¬£¬»¹ÒýÈëÁËÆÁÄ»Â¼ÖÆ¡¢¼üÅ̼ͼ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§£¬£¬£¬£¬ £¬£¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷¹æÄ£ºÍÆÆËðÁ¦¡£¡£¡£¡£¡£¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô±£¬£¬£¬£¬ £¬£¬×Ô2019ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬ £¬£¬Ò»Á¬½ø»¯£¬£¬£¬£¬ £¬£¬ÏÖÒѳÉΪ½ðÈÚڲƭºÍСÎÒ˽¼ÒÒþ˽Çå¾²µÄÖØ´óÒþ»¼¡£¡£¡£¡£¡£¡£Ð±äÖÖ²»µ«ÄÜ×èµ²Ò»´ÎÐÔÃÜÂë(OTP)ÈÆ¹ýË«ÒòËØÈÏÖ¤(2FA)£¬£¬£¬£¬ £¬£¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦Õß×°±¸Ö´ÐÐ×°±¸Ú²Æ­(ODF)£¬£¬£¬£¬ £¬£¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÇå¾²·À»¤¡£¡£¡£¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬£¬ £¬£¬Cleafy·¢Ã÷¸Ã±äÖÖ»¹´ÓÊÜѬȾװ±¸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬ £¬£¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ±£» £»£»¤µÄÏÂÁîÓë¿ØÖÆ(C2)ЧÀÍÆ÷ÉÏ£¬£¬£¬£¬ £¬£¬µ¼ÖÂÊý¾Ýй¶Σº¦¼¤Ôö£¬£¬£¬£¬ £¬£¬ÈκεÚÈý·½¶¼ÄÜÈÝÒ×»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£±»µÁÊý¾ÝÁè¼Ý 12 GB£¬£¬£¬£¬ £¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤¼þ¡¢²ÆÎñÐÅÏ¢£¬£¬£¬£¬ £¬£¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕÆ¬¡£¡£¡£¡£¡£¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬£¬£¬ £¬£¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐУ¬£¬£¬£¬ £¬£¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ²ØÐÔºÍΣº¦ÐÔ¡£¡£¡£¡£¡£¡£


https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/


3. ÍøÂçÍþвж¯Ïò£ºÕýµ±Python¿â³É¹¥»÷ÀûÆ÷


9ÔÂ12ÈÕ£¬£¬£¬£¬ £¬£¬Çå¾²Ñо¿Ö°Ô±Mertens½üÆÚÐû²¼ÁËÒ»·Ý±¨¸æ£¬£¬£¬£¬ £¬£¬Õ¹ÏÖÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑÏËàÇ÷ÊÆ£ºÍøÂç·¸·¨·Ö×ÓÕýÈÕÒæÇÉÃîµØÊ¹ÓÃÕýµ±µÄPython¿âÖ´ÐжñÒâ»î¶¯¡£¡£¡£¡£¡£¡£ÕâЩ¿â£¬£¬£¬£¬ £¬£¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip£¬£¬£¬£¬ £¬£¬Ô­±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯£¬£¬£¬£¬ £¬£¬È´±»·¸·¨·Ö×ÓÀÄÓÃÒÔʵÑé¼üÅ̼ͼ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°åÐ®ÖÆµÈ¶ñÒâÐÐΪ¡£¡£¡£¡£¡£¡£MertensÖ¸³ö£¬£¬£¬£¬ £¬£¬PyPi.orgµÈÖØ´ó¿âÉú̬ϵͳµÄ±£´æ£¬£¬£¬£¬ £¬£¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¿â×Ô¼ºÎÞº¦£¬£¬£¬£¬ £¬£¬µ«ËüÃǵÄǿʢ¹¦Ð§±»²»·¨·Ö×ÓʹÓ㬣¬£¬£¬ £¬£¬ÒÔÌӱܼì²â£¬£¬£¬£¬ £¬£¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ýй¶µÈÄ¿µÄ¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬ £¬£¬discord¿â±»ÖØÐ°üװΪC2ƽ̨£¬£¬£¬£¬ £¬£¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ýй¶µÄצÑÀ¡£¡£¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏýÊÖÒÕ£¬£¬£¬£¬ £¬£¬ÈçmarshalºÍpy_compile£¬£¬£¬£¬ £¬£¬½øÒ»²½Ä£ºý¶ñÒâ´úÂ룬£¬£¬£¬ £¬£¬ÔöÌíÄæÏò¹¤³ÌµÄÄѶÈ¡£¡£¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Çå¾²ÆÊÎöʦ²ì¾õ£¬£¬£¬£¬ £¬£¬´Ó¶ø¼Ó¾çÁËÍøÂçÇå¾²·ÀÓùµÄÖØ´óÐÔ¡£¡£¡£¡£¡£¡£


https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/


4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ13ÈÕ£¬£¬£¬£¬ £¬£¬Î÷ÑÅͼ¸Û×÷Ϊî¿ÏµÎ÷ÑÅͼµØÇøº£¸ÛÓë»ú³¡µÄÖ÷ÒªÕþ¸®»ú¹¹£¬£¬£¬£¬ £¬£¬½üÆÚÈ·ÈÏÆäϵͳÔÚÒÑÍùÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ8Ô£¬£¬£¬£¬ £¬£¬ÆÈʹ¿Ú°¶½ôÆÈ¸ôÀ벿·ÖÒªº¦ÏµÍ³ÒÔ×èÖ¹Ó°Ï죬£¬£¬£¬ £¬£¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì£¬£¬£¬£¬ £¬£¬µ¼Öº½°àÑÓÎ󡣡£¡£¡£¡£¡£ÈýÖܺ󣬣¬£¬£¬ £¬£¬¿Ú°¶¹ÙÆÓֱʽָÈÏRhysidaΪĻºóÔªÐ×£¬£¬£¬£¬ £¬£¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨ»î¶¯ÈÅÂÒ£¬£¬£¬£¬ £¬£¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÇå¾²¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬ £¬£¬RhysidaÍÅ»ïÀÖ³ÉÉøÍ¸¿Ú°¶ÅÌËã»úϵͳ£¬£¬£¬£¬ £¬£¬¼ÓÃÜÒªº¦Êý¾Ý£¬£¬£¬£¬ £¬£¬µ¼Ö°üÀ¨ÐÐÀî´¦Öóͷ£¡¢×ÔÖúЧÀÍ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸öЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£Ö»¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦£¬£¬£¬£¬ £¬£¬»Ö¸´Á˴󲿷Öϵͳ£¬£¬£¬£¬ £¬£¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐ֤ЧÀ͵ÈÒªº¦¹¦Ð§¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬£¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬ £¬£¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÇå¾²¡¢²»Ïò·¸·¨Í×ЭµÄ̬¶È¡£¡£¡£¡£¡£¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬£¬ £¬£¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬ £¬£¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡££¬£¬£¬£¬ £¬£¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³öÖÒÑÔ£¬£¬£¬£¬ £¬£¬ÌáÐѸ÷ÐÐÒµÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬ £¬£¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄË𺦡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/


5. Ivanti CSA¸ßΣÎó²îÔâʹÓ㬣¬£¬£¬ £¬£¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹


9ÔÂ13ÈÕ£¬£¬£¬£¬ £¬£¬IvantiÈ·ÈÏÆäÔÆÐ§ÀÍ×°±¸£¨CSA£©½â¾ö¼Æ»®Öб£´æ¸ßΣÎó²îCVE-2024-8190£¬£¬£¬£¬ £¬£¬¸ÃÎó²îÒÑÔâ¹¥»÷ÕßʹÓᣡ£¡£¡£¡£¡£ÔçÏÈ£¬£¬£¬£¬ £¬£¬Ivanti±¨¸æ³ÆÎ´·¢Ã÷¿Í»§ÊÜÓ°Ï죬£¬£¬£¬ £¬£¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³ÌÈÏÖ¤µÄÖÎÀíԱͨ¹ýÏÂÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£Ivanti½¨Òé½ÓÄÉÌØ¶¨ÉèÖýµµÍΣº¦£¬£¬£¬£¬ £¬£¬²¢¼ì²éÖÎÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑé¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ £¬£¬¹«Ë¾±Þ²ß¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾£¬£¬£¬£¬ £¬£¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬ £¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕǰÐÞ¸´¡£¡£¡£¡£¡£¡£CISAÇ¿µ÷´ËÀàÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¡£IvantiÔÚÈ«ÇòÓµÓÐÆÕ±éµÄÏàÖúͬ°éÍøÂ磬£¬£¬£¬ £¬£¬Æä²úÆ·ºÍЧÀͱ»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳÖÎÀí£¬£¬£¬£¬ £¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁËʵʱÐÞ¸´Çå¾²Îó²îµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/


6. Trojan Ajina.BankerËÁŰÖÐÑÇ£ºÎ±×°Õýµ±Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢


9ÔÂ13ÈÕ£¬£¬£¬£¬ £¬£¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁŰÖÐÑǵØÇø£¬£¬£¬£¬ £¬£¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°Öеĺݶ¾¾«ÁéÃüÃû£¬£¬£¬£¬ £¬£¬Í¨¹ýαװ³ÉÕýµ±Ó¦ÓóÌÐòÈçÒøÐÐЧÀͺÍÕþ¸®ÃÅ»§£¬£¬£¬£¬ £¬£¬Ê¹ÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³ÌÕ½ÂÔÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐжñÒâÎļþ¡£¡£¡£¡£¡£¡£×Ô2023Äê11ÔÂÒÔÀ´£¬£¬£¬£¬ £¬£¬ÒÑ·¢Ã÷Ô¼1,400ÖÖ±äÖÖ£¬£¬£¬£¬ £¬£¬Ö÷ҪĿµÄΪÎÚ×ȱð¿Ë˹̹Óû§£¬£¬£¬£¬ £¬£¬µ«¹¥»÷¹æÄ£ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£¡£¡£¡£¡£¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó£¬£¬£¬£¬ £¬£¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÓû§µÄºÃÆæÐľÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£ÆäÍâµØ»¯ÍƹãÕ½ÂÔÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆÈ¸Ð£¬£¬£¬£¬ £¬£¬´ÙʹÓû§²»¾­Ë¼Ë÷¼´µã»÷Á´½Ó¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÍøÂç½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇ飬£¬£¬£¬ £¬£¬»¹ÄÜ×èµ²¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Â룬£¬£¬£¬ £¬£¬Õ¹ÏÖ³ö¸ß¶È˳ӦÐԺͽø»¯ÄÜÁ¦¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬£¬Ajina.Banker½ÓÄÉͬÃËÍýÏëģʽÔËÓª£¬£¬£¬£¬ £¬£¬½¹µãÍŶÓÓëͬÃËÍøÂçÏàÖú£¬£¬£¬£¬ £¬£¬Í¨Ì«¹ýÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£¡£¡£¡£¡£¡£ÃæÁÙÕâÒ»Íþв£¬£¬£¬£¬ £¬£¬×¨¼Ò½¨Òé¼á³ÖСÐÄ£¬£¬£¬£¬ £¬£¬×èÖ¹µã»÷δ¾­ÇëÇóµÄÐÂÎźÍÏÂÔØÁ´½Ó£¬£¬£¬£¬ £¬£¬¼á³ÖʹÓùٷ½Ó¦ÓÃÊÐËÁÏÂÔØÓ¦Ó㬣¬£¬£¬ £¬£¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£¡£¡£¡£¡£¡£


https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/