AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.15-2020.06.21£©
2020-06-22
Ò»¡¢ ÈÈÃÅ×ÊѶ
1. Operation In(ter)ceptionÕë¶Ô×ÅÃûº½¿Õº½ÌìºÍ¾üʹ«Ë¾µÄ¹¥»÷
¡¾¸ÅÊö¡¿
Operation In(ter)ceptionÐж¯Öй¥»÷Õß½¨ÉèαÔìµÄLinkedInÕÊ»§£¬Ã°³äº½¿Õº½ÌìºÍ¹ú·À¹¤ÒµÖÐ×ÅÃû¹«Ë¾µÄHR´ú±í£¬ÒÔ×ÅÃûְλµÄн×ÊÐÅϢΪÓÕ¶üÏòÄ¿µÄ¹«Ë¾Ô±¹¤·Ö·¢¶ñÒâÈí¼þ£¬²¢ÇÒÊÔͼͨ¹ýÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¹¥»÷À´Í¨¹ýÊܺ¦Õߵĵç×ÓÓʼþÕÊ»§×¬Ç®¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/
2. ¹¥»÷ÕßÕë¶ÔÃÀ¹ú¿¹ÒéÔ˶¯·Ö·¢À¬»øÓʼþ
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃÒ»Á¬µÄCOVID-19´óÊ¢ÐÐÒÔ¼°ÃÀ¹úºÍÆäËûµØ·½µÄÖڶ࿹ÒéÔ˶¯µÄÈ«ÇòÐÂÎÅÏòÄ¿µÄÓû§·¢ËÍÀ¬»øÓʼþ£¬²¢Ê¹ÓÃÖ÷ÌâºÍ·¢¼þÈËÃû³ÆµÄ±äÌåÀ´ÈƹýÀ¬»øÓʼþ¹ýÂËÆ÷£¬ÓÕʹÏÂÔØ²¢·¿ª¶ñÒ⸽¼þÒÔÈö²¥Trickbot¶ñÒâÈí¼þ£¬´Ë´Î¹¥»÷Ô˶¯µÄÄ¿µÄȺÌå¶Ô“ÃÀ¹úºÚÈËÖ®ËÀ”ÊÂÎñÌåÏÖͬÇéµÄÈË¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.fortinet.com/blog/threat-research/global-malicious-spam-campaign-using-black-lives-matter-as-a-lure
3. InvisiMole×éÖ¯Õë¶Ô¶«Å·¾üʲ¿·ÖºÍÍ⽻ʹÍÅ
¡¾¸ÅÊö¡¿
InvisiMole×é֯ͨ¹ýÓã²æÊ½µç×ÓÓʼþ¾ÙÐзַ¢¶ñÒâÈí¼þ£¬Ê¹ÓÃRDPÐÒéÖÐBlueKeepÎó²î£¬SMBÐÒéÖÐEternalBlueÎó²îºÍʹÓÃľÂíÎļþºÍÈí¼þ×°ÖóÌÐòÈýÖÖ·½·¨¾ÙÐÐÈö²¥£¬²¢Ê¹ÓÃDNSËíµÀÊÖÒÕÌӱܼì²â£¬´Ë´Î¹¥»÷Õë¶Ô¶«Å·µÄ¾üʲ¿·ÖºÍÍ⽻ʹÍÅ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/
4. ʹÓÃÖÐÓ¡ÁìÍÁÕù¶ËÒýÓÕÊܺ¦Õߵ͍Ïò¹¥»÷
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃÄ¿½ñµÄÓ¡ÖÐÁìÍÁÕù¶Ë£¬Í¨¹ýµç×ÓÓʼþ¸½¼þÏò¶«ÄÏÑǵÄÇå¾²ÆÊÎöʦ·¢ËÍÁËÎļþÃûΪ“ Ó¡ÖÐÁìÍÁÕÅÁ¦.doc”µÄ¶ñÒâÓÕ¶üÎļþ¡£´Ë´Î¹¥»÷ÊÇÎÞÎļþµÄ£¬Ã»ÓÐÔÚ´ÅÅÌÉÏдÈëÈκÎÓÐÓÃÔØºÉ£¬Ò²Ã»Óн¨É賤ÆÚÐÔ£¬²¢ÇÒʹÓÃDKMC¿ò¼ÜÒþ²ØÍ¨Ñ¶¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/targeted-attack-leverages-india-china-border-dispute-lure-victims
5. BITTER×é֯ʹÓÃGoogle Play·Ö·¢¶ñÒâ³ÌÐòÕë¶Ô×Ú½ÌÕûÌå
¡¾¸ÅÊö¡¿
BITTERÊÇÒ»¸öºã¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¼Ò¾ÙÐй¥»÷Ô˶¯µÄAPT×éÖ¯£¬½üÆÚ¸Ã×éÖ¯ÒÔ×Ú½ÌȺÌåΪĿµÄ£¬Í¨¹ýαװ³ÉÕæÕýµÄÒÁ˹À¼½Ì»òÓëÕ«Âí½ÚÏà¹ØµÄÓ¦ÓóÌÐò£¬ÒÔ¼°³£¼ûÓ¦ÓóÌÐòµÄͨÓñäÌå·Ö·¢¶ñÒâÈí¼þ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf
6. Office 365ÍøÂç´¹ÂÚÔ˶¯ÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃÅ£½òµÄµç×ÓÓʼþ·þÎñÆ÷·¢ËÍÀ¬»øÓʼþ£¬Óû§µ¥»÷µç×ÓÓʼþÌáÐѵÄÒ»¸ö°´Å¥ºó£¬Í¨¹ýÈýÐÇÓò±»Öض¨Ïòµ½Î±×°³ÉOffice 365µÇÂ¼Ò³ÃæµÄÍøÂç´¹ÂÚÒ³Ãæ¡£¹¥»÷ÕßÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ£¬Ê¹ÆäÌÓ±ÜÇå¾²Èí¼þµÄ¼ì²â£¬´Ë´Î¹¥»÷Õë¶ÔÅ·ÖÞ¡¢ÑÇÖÞºÍÖж«¡£
¡¾²Î¿¼Á´½Ó¡¿
https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/
7. ¶à½×¶ÎAPT¹¥»÷ʹÓÃCobalt StrikµÄMalleable C2¹¦Ð§
¡¾¸ÅÊö¡¿
¹¥»÷Õßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ·Ö·¢Î±×°³É¼òÀúµÄ¶ñÒâWordÎĵµ£¬¸ÃÎĵµÊ¹ÓÃÄ£°å×¢Èëɾ³ýÁË.Net Loader£¬²¢ÇÒʹÓÃÁËCobalt StrikeµÄMalleable C2¹¦Ð§À´ÏÂÔØ×îÖÕµÄÓÐÓÃÔØºÉ²¢Ö´ÐÐC2ͨѶ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.malwarebytes.com/threat-analysis/2020/06/multi-stage-apt-attack-drops-cobalt-strike-using-malleable-c2-feature/
8. AcidBox¶ñÒâÈí¼þʹÓÃVirtualBoxÇý¶¯³ÌÐòÎó²îÕë¶Ô¶íÂÞ˹
¡¾¸ÅÊö¡¿
AcidBoxÊÇÒ»¸öÖØ´óµÄÄ£¿é»¯¹¤¾ß°ü£¬±»ÓÃÓÚ¶¨Ïò¹¥»÷Ô˶¯¡£ÔÚ½üÆÚµÄ¹¥»÷Ô˶¯ÖÐAcidBox¶ñÒâÈí¼þʹÓÃÒÑÖªVirtualBoxÇý¶¯³ÌÐòÎó²îCVE-2008-3431À´½ûÓÃWindowsÖеÄÇý¶¯³ÌÐòÊðÃûÖ´ÐУ¬Ä¿µÄÊÇλÓÚ¶íÂÞ˹µÄ×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/acidbox-rare-malware/
9. Õë¶Ô°Ä´óÀûÑÇÕþ¸®ºÍÆóÒµµÄÍøÂç¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
¹¥»÷ÕßʹÓÃÐí¶à³õʼ»á¼ûǰÑÔ£¬Í¨¹ýÔÚδÐÞ²¹°æ±¾µÄTelerik UIÖÐʹÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬ÌᳫÕë¶Ô°Ä´óÀûÑÇÕþ¸®ºÍÆóÒµµÄÍøÂç¹¥»÷Ô˶¯¡£¹¥»÷Õß´ó×ÚʹÓÿ´·¨ÑéÖ¤Îó²îʹÓôúÂ룬Web ShellºÍÆäËûÔ´´úÂëÏÕЩ¿ª·ÅµÄ¹¤¾ß¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.cyber.gov.au/threats/advisory-2020-008-copy-paste-compromises-tactics-techniques-and-procedures-used-target-multiple-australian-networks
10. ¹¥»÷ÕßʹÓÃNetWireÌØ¹¤Èí¼þÕë¶ÔÓ¡¶ÈÈËȨº´ÎÀÕß
¡¾¸ÅÊö¡¿
½üÆÚÓй¥»÷ÕßÕë¶ÔÓ¡¶ÈάȨÈËÊ¿¡¢×´Ê¦¡¢Ñ§ÕߺÍÐÂÎÅÊÂÇéÕß·¢¶¯Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬Í¨¹ý·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄµç×ÓÓʼþ·Ö·¢¿ÉÉÌҵʹÓõÄÌØ¹¤Èí¼þNetWire£¬Ò»µ©Óû§µ¥»÷ÕâЩÁ´½Ó£¬½«±»°²ÅÅÌØ¹¤Èí¼þNetWire£¬ÒÔÆÆËðÄ¿µÄÅÌËã»úÀ´¼àÊÓÆäÐÐΪºÍͨѶ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.amnesty.org/en/latest/research/2020/06/india-human-rights-defenders-targeted-by-a-coordinated-spyware-operation/
11. ÀÄÓÃÕýµ±Èí¼þ¾ÙÐÐdllÐ®ÖÆµÄ¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
ÔÚ½üÆÚµÄ¹¥»÷Ô˶¯Öй¥»÷ÕßÀÄÓÃÁ½¸öÕýµ±µÄÓ¦ÓóÌÐòCrystalBitºÍApple×÷ΪdllË«ÖØÐ®ÖÆ¹¥»÷Á´µÄÒ»²¿·Ö£¬Óë¹ã¸æÈí¼þºÍÚ²ÆÐÔÈí¼þ¾ÙÐÐÀ¦°ó£¬²¢ÇÒ°²ÅÅÁËÓ¦ÓóÌÐòµÄÕýµ±ÇÒ¾ÓÉÊðÃûµÄ¸±±¾£¬×îÖÕÏòÊܺ¦Õß·Ö·¢ÍÚ¿ó³ÌÐò¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.morphisec.com/crystalbit-apple-double-dll-hijack
12. ¹¥»÷ÕßʹÓÃFabulaTechÎó²îαÔìUSB×°±¸
¡¾¸ÅÊö¡¿
FabulaTechÔÊÐíÆóҵʹÓÃÓ¦ÓóÌÐòUSB×°±¸Öض¨Ïòµ½Ô¶³Ì»á»°µÄ¶Ëµã£¬µ«ÆäÖеÄ×ÜÏßÇý¶¯³ÌÐòÔÊÐíµÍÌØÈ¨Óû§Ìí¼ÓÍêÈ«¿ØÖƵÄÈí¼þUSB×°±¸¡£¹¥»÷Õß»áʹÓøÃÎó²îÔÚijЩ³£¼ûÇéÐÎÏÂÌáÉýÌØÈ¨£¬Èç¿ÉÒÔÌí¼ÓαÔìµÄÊó±êÖ¸Õë»ò¼üÅ̾ÙÐвÙ×÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/
13. FTCode¶ñÒâÈí¼þͨ¹ýÀ¬»øÓʼþÈö²¥
¡¾¸ÅÊö¡¿
FTCode¶ñÒâÈí¼þͨ¹ýÀ¬»øÓʼþ¾ÙÐÐÈö²¥£¬À¬»øÓʼþ´øÓжñÒâÁ´½Ó£¬Óû§µã»÷Á´½ÓºóÖØ¶¨Ïòµ½¶ñÒâ×ÊÔ´¡£FTCode¿ÉÒÔ»ñÈ¡ThunderbirdºÍOutlookµç×ÓÓʼþ¿Í»§¶ËºÍChrome¡¢Internet ExplorerºÍFireFoxä¯ÀÀÆ÷µÄƾ֤¡£
¡¾²Î¿¼Á´½Ó¡¿
https://cert-agid.gov.it/news/campagna-massiva-jasperloader-veicola-ftcode-via-pec/

AG¹«Ë¾ÔÆ







