AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Ô±¨£¨2020.06.1-2020.06.30£©
2020-07-06
Ò»¡¢ Îó²îÌ¬ÊÆ
2020Äê06ÔÂAG¹«Ë¾¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼177Îó²î, ÆäÖиßΣÎó²î58¸ö£¬Î¢Èí¸ßΣÎó²î19¸ö¡£

* Êý¾ÝȪԴ£ºAG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¬±¾±íÊý¾Ý×èÖ¹µ½2020.06.30
×¢£ºAG¹«Ë¾¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ ÍþвÊÂÎñ
1. Mustang Panda×é֯ʹÓÃDll-SideloadÊÖÒÕ¼ÓÔØPlugXľÂí
¡¾±êÇ©¡¿Mustang Panda
¡¾Ê±¼ä¡¿2020-06-02
¡¾¼ò½é¡¿
Mustang Panda×é֯ʹÓÃDll-SideloadÊÖÒÕÓëÕýµ±µÄ¶þ½øÖÆÎļþ¾ÙÐÐÈö²¥£¬Í¨¹ýÒ»¸öºÜÊÇСµÄDLL£¬¼ÓÔØÒ»¸ö¼ÓÃܵÄÎļþ£¬ÔÚ±»½âÃܺó°üÀ¨Ò»¸ö²å¼þľÂíPlugX£¬¸Ã¶ñÒâÈí¼þ¿ÉÒÔÔ¶³ÌÖ´ÐжàÖÖÏÂÁÒÔ¼ìË÷ÅÌËã»úÐÅÏ¢¡¢²¶»ñÆÁÄ»¡¢ÖÎÀí·þÎñºÍÖÎÀíÀú³Ì¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
Mustang PandaÊÇÒ»¸öºã¾ÃÕë¶Ô·ÇÕþ¸®×éÖ¯£¨NGO£©µÄÍþв×éÖ¯£¬³£Ê¹ÓÃPoison Ivy¡¢PlugXºÍCobalt StrikeÓÐÓÃÔØºÉµÈ¹²Ïí¶ñÒâÈí¼þÀ´ÍøÂçÇ鱨¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿
PlugXÊÇʹÓÃÄ£¿é»¯²å¼þµÄÔ¶³Ì»á¼û¹¤¾ß£¨RAT£©£¬¾ßÓÐÎļþÉÏ´«¡¢ÏÂÔØºÍÐ޸ģ¬ÈÕÖ¾¼Í¼¡¢ÍøÂçÉãÏñÍ·¿ØÖƺÍÔ¶³ÌÔËÐÐShell»á¼ûµÈ¹¦Ð§¡£
Cobalt StrikeÊÇÒ»¸öÉÌÒµ»¯ÉøÍ¸²âÊÔ¹¤¾ß£¬¿ÉÓÃshell»á¼ûÊÜѬȾµÄϵͳ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://lab52.io/blog/mustang-panda-recent-activity-dll-sideloading-trojans-with-temporal-c2-servers/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡7ÌõIOC£¬ÆäÖаüÀ¨3¸öÓòÃû¡¢2¸öÑù±¾ºÍ2¸öIP£»Mustang Panda×éÖ¯Ïà¹ØÊÂÎñ2¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ9¸ö¹ØÁªÓòÃû¡¢8¸ö¹ØÁªÑù±¾ºÍ5¹ØÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
2. TA410×é֯ʹÓöñÒâÈí¼þFlowCloudÕë¶ÔÃÀ¹ú¹«ÓÃÊÂÒµÌṩÉÌ
¡¾±êÇ©¡¿TA410
¡¾Ê±¼ä¡¿2020-06-08
¡¾¼ò½é¡¿
TA410×éÖ¯½üÆÚÕë¶ÔÃÀ¹ú¹«ÓÃÊÂÒµÌṩÉÌÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬´Ë´Î¹¥»÷ÒÔÅàѵºÍÈÏ֤ΪÖ÷ÌâÓʼþ×÷ΪÓÕ¶ü£¬Í¨¹ý±ãЯʽ¿ÉÖ´Ðи½¼þºÍÔØÓдó×ÚºêµÄMicrosoft WordÎĵµ×ª´ïÄ£¿é»¯µÄ¶ñÒâÈí¼þFlowCloud¡£FlowCloud¶ñÒâÈí¼þÄܹ»Æ¾Ö¤»á¼û¼ôÌù°å¡¢ÒÑ×°ÖõÄÓ¦ÓóÌÐò¡¢¼üÅÌ¡¢Êó±ê¡¢ÆÁÄ»¡¢Îļþ¡¢·þÎñºÍÀú³ÌµÈÏÂÁîÌṩԶ³Ì»á¼û¹¦Ð§£¬²¢C&C´«ÊäÐÅÏ¢¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
TA410ÊÇÒ»¸öÓëÖйúÓйصÄÍþв×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.proofpoint.com/us/blog/threat-insight/ta410-group-behind-lookback-attacks-against-us-utilities-sector-returns-new
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡29ÌõIOC£¬ÆäÖаüÀ¨5¸öIP¡¢9¸öÓòÃû¡¢15¸öÑù±¾£»TA410×éÖ¯Ïà¹ØÊÂÎñ1¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ5¸ö¹ØÁªIP¡¢9¸ö¹ØÁªÓòÃûºÍ15¸ö¹ØÁªÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
3. Dark Basin×éÖ¯ÔÚÈ«Çò·¢¶¯´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷
¡¾±êÇ©¡¿Dark Basin
¡¾Ê±¼ä¡¿2020-06-04
¡¾¼ò½é¡¿
Dark Basin×é֯ͨ¹ýGmailÕÊ»§ºÍ×ÔÍÐ»á¼Æ»§µÈÏòÄ¿µÄ·¢ËÍ´øÓжñÒâÁ´½ÓµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬²¢ÇÒʹÓÃURLËõ¶ÌÆ÷À´ÑÚÊδ¹ÂÚÍøÕ¾£¬ÆäÄ¿µÄÊǾÙÐÐÇé±¨ÍøÂç¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
Dark BasinÊÇÒ»¸öÒÔÈëÇÖΪĿµÄµÄºÚ¿Í×éÖ¯£¬Ä¿µÄȺÌåÊÇÁù´óÖÞµÄÊýǧСÎÒ˽¼ÒºÍÊý°Ù¼Ò»ú¹¹£¬°üÀ¨Ðû´«ÕûÌåºÍ¼ÇÕß¡¢ÃñÑ¡ºÍ¸ß¼¶Õþ¸®¹ÙÔ±£¬¶Ô³å»ù½ðÒÔ¼°¶à¸öÐÐÒµ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡479ÌõIOC£¬ÆäÖаüÀ¨462¸öÓòÃû¡¢17¸öÓÊÏ䣻Dark Basin×éÖ¯Ïà¹ØÊÂÎñ1¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ462¸ö¹ØÁªÓòÃûºÍ17¸ö¹ØÁªÓÊÏ䣻AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
4. BITTER×é֯ʹÓÃGoogle Play·Ö·¢¶ñÒâ³ÌÐòÕë¶Ô×Ú½ÌÕûÌå
¡¾±êÇ©¡¿BITTER
¡¾Õë¶ÔÐÐÒµ¡¿×Ú½Ì
¡¾Ê±¼ä¡¿2020-06-18
¡¾¼ò½é¡¿
½üÆÚBITTER×éÖ¯ÒÔ×Ú½ÌȺÌåΪĿµÄ£¬Í¨¹ýαװ³ÉÕæÕýµÄÒÁ˹À¼½Ì»òÓëÕ«Âí½ÚÏà¹ØµÄÓ¦ÓóÌÐò£¬ÒÔ¼°³£¼ûÓ¦ÓóÌÐòµÄͨÓñäÌå·Ö·¢¶ñÒâÈí¼þ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
BITTERÊÇÒ»¸öºã¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¼Ò¾ÙÐй¥»÷Ô˶¯µÄAPT×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡31ÌõIOC£¬ÆäÖаüÀ¨4¸öÓòÃûºÍ27¸öÑù±¾£»BITTER×éÖ¯Ïà¹ØÊÂÎñ8¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ2¸ö¹ØÁªÓòÃû¡¢85¸ö¹ØÁªÑù±¾ºÍ2¸ö¹ØÁªÎó²î£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
5. Tor2Mine×éÖ¯°²ÅÅAZORultµÈ¶ñÒâÈí¼þ
¡¾±êÇ©¡¿Tor2Mine
¡¾Ê±¼ä¡¿2020-06-11
¡¾¼ò½é¡¿
¿ËÈÕTor2Mine×é֯ͨ¹ý°²ÅŶñÒâÈí¼þÀ´ÍøÂçÆ¾Ö¤ºÍÇÔÈ¡¸ü¶à×ʽ𣬰²ÅŹýµÃ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡Æ÷AZORult¡¢Ô¶³Ì»á¼û¹¤¾ßRemcos¡¢DarkVNCºóÃÅľÂíºÍ¼ôÌù°åÉϵļÓÃÜÇ®±Ò͵ÇÔÕß¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
Tor2MineÊÇÒ»¸öÒÔÌṩ¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¶øÖøÃûµÄÍþв×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/06/tor2mine-is-up-to-their-old-tricks-and_11.html
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡13ÌõIOC£¬ÆäÖаüÀ¨3¸öIP¡¢6¸öÓòÃûºÍ4¸öÑù±¾£»Tor2Mine×éÖ¯Ïà¹ØÊÂÎñ1¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ3¸ö¹ØÁªIP¡¢4¸ö¹ØÁªÑù±¾ºÍ6¹ØÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
6. Higaisa×é֯ʹÓöñÒâLNKÎļþÕë¶ÔÖйúÓû§
¡¾±êÇ©¡¿Higaisa
¡¾Ê±¼ä¡¿2020-06-11
¡¾¼ò½é¡¿
Higaisa×éÖ¯½üÆÚÕë¶ÔÖйúÓû§Ê¹ÓðüÀ¨ÓÕÆÎļþµÄLNKÎļþÈö²¥¶ñÒâºóÃÅ£¬ÓÕ¶üÄÚÈÝ×÷ΪInternet¿ì½Ý·½·¨Îļþ»òPDFÎļþÏÔʾ£¬²¢ÔÚºǫִ́ÐжñÒâÔ˶¯Ê±ÏÔʾ¸øÓû§¡£¸ÃºóÃÅʹÓÃÖØ´óµÄÓÕÆÐÔÊÖÒÕ£¬Ö¼ÔÚ¹æ±ÜÇå¾²¼ì²â¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
HigaisaÊÇÒ»¸öÓ볯Ïʰ뵺ÓйصÄÍþв×éÖ¯£¬ÖÁÉÙ´Ó2016Äê×îÏÈ»îÔ¾£¬ÆäÄ¿µÄ°üÀ¨Õþ¸®¹ÙÔ±ºÍÈËȨ×éÖ¯£¬ÒÔ¼°Ó볯ÏÊÓÐ¹ØµÄÆäËû×éÖ¯»ú¹¹¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/return-higaisa-apt
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡6ÌõIOC£¬ÆäÖаüÀ¨6¸öÑù±¾£»Higaisa×éÖ¯Ïà¹ØÊÂÎñ3¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ3¸ö¹ØÁªIP¡¢7¸ö¹ØÁªÑù±¾ºÍ5¸öÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
7. InvisiMole×éÖ¯Õë¶Ô¶«Å·¾üʲ¿·ÖºÍÍ⽻ʹÍÅ
¡¾±êÇ©¡¿InvisiMole
¡¾Õë¶ÔÐÐÒµ¡¿¾üÊ¡¢Íâ½»
¡¾Ê±¼ä¡¿2020-06-18
¡¾¼ò½é¡¿
InvisiMole×é֯ͨ¹ýÓã²æÊ½µç×ÓÓʼþ¾ÙÐзַ¢¶ñÒâÈí¼þ£¬Ê¹ÓÃRDPÐÒéÖÐBlueKeepÎó²î£¬SMBÐÒéÖÐEternalBlueÎó²îºÍʹÓÃľÂíÎļþºÍÈí¼þ×°ÖóÌÐòÈýÖÖ·½·¨¾ÙÐÐÈö²¥£¬²¢Ê¹ÓÃDNSËíµÀÊÖÒÕÌӱܼì²â£¬´Ë´Î¹¥»÷Õë¶Ô¶«Å·µÄ¾üʲ¿·ÖºÍÍ⽻ʹÍÅ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
InvisiMoleÊÇÒ»¸öÖÁÉÙ´Ó2013Äê»îÔ¾ÖÁ½ñµÄÍþв×éÖ¯£¬¸Ã×éÖ¯µÄRC2CLºÍRC2FMºóÞßÓÐÆÕ±éµÄÌØ¹¤¹¦Ð§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡111ÌõIOC£¬ÆäÖаüÀ¨6¸öIP¡¢14¸öÓòÃû¡¢59¸öÑù±¾ºÍ2¸öÎó²î£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
8. Vendetta×éÖ¯Õë¶Ǫ̂Í幫ÃñµÄ¹¥»÷Ô˶¯
¡¾±êÇ©¡¿Vendetta
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®¡¢ÆóÒµ
¡¾Ê±¼ä¡¿2020-06-15
¡¾¼ò½é¡¿
VendettaÊÇÒ»¸öÖ÷Òª»ùÓÚCovid-19¿ªÕ¹µç×ÓÓʼþÔ˶¯µÄ¶ñÒâ×éÖ¯£¬Ö÷ÒªÒÔÇÔÊØÐÅϢΪĿµÄ£¬Õë¶ÔÆóÒµºÍÕþ¸®²¿·Ö¡£½üÆÚVendetta×é֯ð³ą̈Íå¼²²¡¿ØÖÆÖÐÐĺÍÔ¤·ÀµÄ×Ü˾Àí£¬Õë¶Ǫ̂Í幫Ãñ·¢ËͰüÀ¨¶ñÒâÈí¼þ¸½¼þµÄµç×ÓÓʼþ£¬¶ñÒâÈí¼þNanocoreÔÊÐíÍêÈ«¿ØÖƺÍ͵ÇÔÊܺ¦ÕßϵͳÖеÄÐÅÏ¢¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
VendettaÊÇÒ»¸öÀ´×ÔÅ·Ö޵ĺڿÍ×éÖ¯£¬ÉÆÓÚʹÓÃÉç½»¹¤³ÌÌá³«ÍøÂç¹¥»÷£¬ÒÔÇÔÈ¡ÉÌÒµÊý¾ÝΪĿµÄ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://business.blogthinkbig.com/vendetta-group-covid-19-phishing-emails/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡133ÌõIOC£¬ÆäÖаüÀ¨133¸öÑù±¾£»Vendetta×éÖ¯Ïà¹ØÊÂÎñ2¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ1¸ö¹ØÁªIP¡¢11¸ö¹ØÁªÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
9. FIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ
¡¾±êÇ©¡¿Pillowmint¡¢FIN7
¡¾Õë¶ÔÐÐÒµ¡¿ÁãÊÛÒµ
¡¾Ê±¼ä¡¿2020-06-22
¡¾¼ò½é¡¿
½üÆÚFIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ£¬Í¨¹ý¶ñÒâµÄshimÊý¾Ý¿â·Ö·¢£¬Äܹ»²¶»ñTrack1ºÍTrack2ÐÅÓÿ¨Êý¾Ý¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
FIN7ÊÇÒ»¸ö²ÆÎñÄîÍ·µÄÍþв×éÖ¯£¬×Ô2015ÄêÖÐÆÚÒÔÀ´Ö÷ÒªÕë¶ÔÃÀ¹úÁãÊÛ£¬²ÍÒûºÍÂùÝÒµ¡£ËûÃǾ³£Ê¹ÓÃÏúÊÛµã¶ñÒâÈí¼þ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pillowmint-fin7s-monkey-thief/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡2ÌõIOC£¬ÆäÖаüÀ¨2¸öÑù±¾£»FIN7×éÖ¯Ïà¹ØÊÂÎñ9¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ87¸ö¹ØÁªIP¡¢169¸ö¹ØÁªÑù±¾ºÍ337¹ØÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
10. BRONZE VINEWOOD×éÖ¯Ãé×¼¹©Ó¦Á´»ú¹¹
¡¾±êÇ©¡¿BRONZE VINEWOOD
¡¾Ê±¼ä¡¿2020-06-23
¡¾¼ò½é¡¿
BRONZE VINEWOOD£¬Ò²±»³ÆÎªAPT31¡¢ZIRCONIUM£¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄÍþв×éÖ¯£¬¸Ã×éÖ¯ÓëÖйúÓйء£½üÆÚBRONZE VINEWOOD×é֯ʵÑéÇÔȡƾ֤²¢Ê¹ÓÃÕýµ±µÄÔ¶³Ì»á¿´·¨¾ö¼Æ»®ºÍÐÒéµÈ¶àÖÖ¹¤¾ßºÍÊÖÒÕÀ´»á¼ûÇéÐΣ¬¶ÔÈí¼þÌṩÉÌºÍÆäËû¹©Ó¦Á´×éÖ¯µÄ¹¥»÷Ö¼ÔÚ»á¼û¿Í»§µÄÊý¾Ý»òÍøÂç¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.secureworks.com/research/bronze-vinewood-targets-supply-chains
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡9ÌõIOC£¬ÆäÖаüÀ¨9¸öÑù±¾£»BRONZE VINEWOOD×éÖ¯Ïà¹ØÊÂÎñ1¼þAG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
11. XORDDoSºÍKaiji½©Ê¬ÍøÂç±äÖÖÕë¶ÔDocker·þÎñÆ÷
¡¾±êÇ©¡¿XORDDoS¡¢Kaiji
¡¾Ê±¼ä¡¿2020-06-22
¡¾¼ò½é¡¿
XORDDoSºÍKaijiÊÇLinux½©Ê¬ÍøÂç¶ñÒâÈí¼þÀàÐ͵ıäÌ壬´Ë´Î¹¥»÷ÊÇ XORDDoSÊ״ν«Docker·þÎñÆ÷×÷ΪĿµÄ¡£¹¥»÷ÕßɨÃè̻¶µÄDocker·þÎñÆ÷ͨѶ¶Ë¿Ú2375ºóʹÓý©Ê¬ÍøÂçÖ´Ðб©Á¦¹¥»÷£»Kaiji½©Ê¬ÍøÂçͬÑùɨÃè¶Ë¿Ú2375 ̻¶µÄÖ÷»ú£¬¶ÔDocker·þÎñÆ÷Ö´ÐÐping²Ù×÷£¬È»ºó°²ÅÅÖ´ÐÐKaiji¶þ½øÖÆÎļþµÄ¶ñÒâARMÈÝÆ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡5ÌõIOC£¬ÆäÖаüÀ¨5¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
12. Lucifer¶ñÒâÈí¼þʹÓÃÎó²îѬȾWindows×°±¸
¡¾±êÇ©¡¿Lucifer
¡¾Ê±¼ä¡¿2020-06-24
¡¾¼ò½é¡¿
LuciferÊǼÓÃÜÐ®ÖÆºÍDDoS¶ñÒâÈí¼þ±äÌåµÄÍŽᣬËüʹÓþÉÎó²îÔÚWindowsƽ̨ÉÏÈö²¥ºÍÖ´ÐжñÒâÔ˶¯¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¾ÙÐÐMoneroµÄÃÜÂëÐ®ÖÆ£¬Äܹ»Ê¹Óöà¸öÎó²îºÍƾ֤¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷ÒÔ¼°×ÔÎÒÈö²¥£¬²¢ÇÒÕë¶ÔÄÚ²¿Ò×Êܹ¥»÷µÄÄ¿µÄѬȾ²¢ÔËÐÐEternalBlue£¬EternalRomanceºÍDoublePulsarºóÃÅ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡233ÌõIOC£¬ÆäÖаüÀ¨107¸öip¡¢1¸öÓòÃû¡¢19¸öÎó²îºÍ115¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
13. Hidden Cobra×éÖ¯µÄжñÒ⹤¾ß
¡¾±êÇ©¡¿Hidden Cobra
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®,½ðÈÚ,¹ú·À
¡¾Ê±¼ä¡¿2020-06-22
¡¾¼ò½é¡¿
Hidden Cobra×éÖ¯ÔÚÒÑÍùµÄÊ®ÄêÖÐÒ»Ö±ºÜ»îÔ¾£¬½ñÄê5ÔÂÃÀ¹úÕþ¸®»ú¹¹Ðû²¼µÄ±¨¸æÖÐÐÎòHidden Cobra×éÖ¯µÄÈý¸öжñÒ⹤¾ßCOPPERHEDGE¡¢TAINTEDSCRIBEºÍPEBBLEDASH¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
Hidden Cobra£¨ÓÖÃûLazarus Group¡¢Guardians of Peace¡¢ZINCºÍNICKEL ACADEMY£©ÊÇÒ»¸öÍþв×éÖ¯£¬¹éÊôÓÚ³¯ÏÊÕþ¸®£¬¸Ã×éÖ¯ÖÁÉÙ´Ó2009ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿
COPPERHEDGEÊÇÒ»ÖÖÔ¶³Ì»á¼û¹¤¾ß£¬ÒÔ×ÊÖúÍþвÐÐΪÕßÖ´ÐÐϵͳÕì̽£¬ÔÚÊÜѬȾϵͳÉÏÔËÐÐí§ÒâÏÂÁîÒÔ¼°ÇÔÈ¡±»µÁÊý¾ÝµÄÄÜÁ¦¶øÖøÃû£»
TAINTEDSCRIBEÊÇÒ»ÖÖľÂí³ÌÐò£¬¾ßÓÐÏÂÁîÄ£¿éµÄ¹¦Ð§ÆëÈ«µÄÐűêÖ²Èë³ÌÐò£¬¸ÃľÂí´ÓÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷ÏÂÔØÆäÏÂÁîÖ´ÐÐÄ£¿é£¬È»ºó¾ßÓÐÏÂÔØ¡¢ÉÏÔØ¡¢É¾³ýºÍÖ´ÐÐÎļþ£¬ÆôÓÃWindows CLI»á¼ûȨÏÞ£¬½¨ÉèºÍÖÕÖ¹Àú³Ì£¬ÒÔ¼°Ö´ÐÐÄ¿µÄϵͳö¾ÙµÄ¹¦Ð§£»
PEBBLEDASHÊÇÓÖÒ»¸ö¹¦Ð§ÆëÈ«µÄÐűêÖ²Èë³ÌÐòµÄľÂí£¬²¢Óɳ¯ÏÊÖ§³ÖµÄºÚ¿Í×éÖ¯ÓÃÓÚÏÂÔØ¡¢ÉÏ´«¡¢É¾³ýºÍÖ´ÐÐÎļþ£¬ÆôÓÃWindows CLI»á¼û£¬½¨ÉèºÍÖÕÖ¹Àú³Ì£¬²¢Ö´ÐÐÄ¿µÄϵͳö¾Ù¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.reversinglabs.com/blog/hidden-cobra
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡135ÌõIOC£¬ÆäÖаüÀ¨9¸öIP¡¢38¸öÓòÃûºÍ88¸öÑù±¾£»Hidden Cobra×éÖ¯Ïà¹ØÊÂÎñ17¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ22¸ö¹ØÁªIP¡¢5¸ö¹ØÁªÎó²î¡¢117¸ö¹ØÁªÑù±¾ºÍ31¹ØÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
14. Office 365ÍøÂç´¹ÂÚÔ˶¯ÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ
¡¾±êÇ©¡¿Office 365
¡¾Ê±¼ä¡¿2020-06-18
¡¾¼ò½é¡¿
¹¥»÷ÕßʹÓÃÅ£½òµÄµç×ÓÓʼþ·þÎñÆ÷·¢ËÍÀ¬»øÓʼþ£¬Óû§µ¥»÷µç×ÓÓʼþÌáÐѵÄÒ»¸ö°´Å¥ºó£¬Í¨¹ýÈýÐÇÓò±»Öض¨Ïòµ½Î±×°³ÉOffice 365µÇÂ¼Ò³ÃæµÄÍøÂç´¹ÂÚÒ³Ãæ£¬¹¥»÷Ô˶¯ÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ£¬Ê¹ÆäÌÓ±ÜÇå¾²Èí¼þµÄ¼ì²â£¬´Ë´Î¹¥»÷Õë¶ÔÅ·ÖÞ¡¢ÑÇÖÞºÍÖж«¡£
¡¾²Î¿¼Á´½Ó¡¿
https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡28ÌõIOC£¬ÆäÖаüÀ¨28¸öÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
15. ʹÓÃStackBlitz¹¤¾ßÍйÜÍøÂç´¹ÂÚÍøÒ³µÄ¹¥»÷Ô˶¯
¡¾±êÇ©¡¿StackBlitz
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®¡¢½ðÈÚ¡¢¹ú·À
¡¾Ê±¼ä¡¿2020-06-05
¡¾¼ò½é¡¿
¹¥»÷ÕßʹÓÃStackBlitz¹¤¾ßÀ´ÍйÜÍøÂç´¹ÂÚÒ³Ãæ¡£À¬»øÓʼþÁ´½Óͨ¹ýMicrosoftµÄOneDrive¹²ÏíÈí¼þ·þÎñ»òÕß´øÓйØÁªÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµÌṩ£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó»áÖØ¶¨Ïòµ½OutlookÍøÂç´¹ÂÚÒ³Ãæ¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿
StackBlitzÊÇÒ»¸öÔÚÏß¼¯³É¿ª·¢ÇéÐΣ¬ÈκÎÈ˶¼¿ÉÒÔͨ¹ýËü½¨ÉèAngular JavaScriptºÍReact TypeScriptÏîÄ¿²¢Ðû²¼µ½ÍøÉÏ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡102ÌõIOC£¬ÆäÖаüÀ¨102¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

AG¹«Ë¾ÔÆ







