AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.07.20-2020.07.26£©
2020-07-28
Ò»¡¢ Íþвͨ¸æ
СÐÄ£¡½èETCÖ®ÃûÌᳫµÄ´¹ÂÚ¹¥»÷ÊÂÎñͨ¸æ
¡¾Ðû²¼Ê±¼ä¡¿2020-07-24 09:00:00 GMT
¡¾¸ÅÊö¡¿
½üÆÚAG¹«Ë¾¸ñÎïʵÑéÊÒ¼ì²âµ½ÐµĴ¹ÂÚ¹¥»÷Ô˶¯£¬¹¥»÷ÕßÏòÒÆ¶¯ÖÕ¶ËÓû§·¢ËÍÊÖ»ú¶ÌÐÅ£¬ÌáÐÑÓû§ETC×°±¸Òì³££¬ÓÕµ¼Óû§µã¿ª¶ÌÐÅÖеÄÁ´½Ó£¬²¢ÒªÇóÌîдÌύСÎÒ˽¼ÒÃô¸ÐÐÅÏ¢¡¢ÒøÐп¨ºÅÃÜÂëµÈ¡£AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄ£¨NTI£©¶Ô´Ë´Î´¹ÂÚ¹¥»÷Ò»Á¬¼à¿Ø£¬ÒÑÖ§³Ö¶ÔÏà¹ØIOCsµÄ¼ì²â¡£
¡¾Á´½Ó¡¿
https://nti.nsfocus.com/threatWarning
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. TP-Link Tapo C200 IPÉãÏñÍ·¸ßΣÎó²î
¡¾¸ÅÊö¡¿
¿ËÈÕ£¬TP-LinkÐÞ¸´ÁËÒ»¸ö±£´æÓÚC200 IPÉãÏñÍ·ÖеÄÒ»¸ö¸ßΣÎó²î¡£Ê¹ÓÃÒÑÖªµÄHeartbleedÎó²î£¨Î»ÓÚ¹ûÕæµÄTCP 443¶Ë¿Ú£©£¬¿ÉÒÔÔÚÄÚ´æ×ª´¢Öз¢Ã÷Óû§µÄ¹þÏ£ÃÜÂ롣ȻºóʹÓÃAPIÉϵĵǼÀú³Ì½«¹þÏ£ÓÃÓÚ“¹þϣת´ï”¹¥»÷¡£Õâµ¼ÖÂÃûΪ“stok”µÄµÇ¼ÁîÅÆ±»·¢³ö£¬¸ÃÁîÅÆ¿ÉÓÃÓÚ×°±¸µÄÓû§Éí·ÝÑéÖ¤¡£¹¥»÷ÕßËæºó¿ÉÒÔÖ´ÐжàÖÖÐèÈÏÖ¤ºó²Å±»ÔÊÐíµÄ²Ù×÷£¬ÀýÈç£ºÒÆ¶¯Ïà»úµÄ¾µÍ·£¬ÃûÌû¯SD¿¨£¬½¨ÉèÒ»¸öRTSPÕÊ»§ÒÔÉó²éÏà»úµÄÊÓÆµÔ´£¬²¢½ûÓÃÒþ˽ģʽµÈ¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/tp-link-tapo-c200-0722/
2. AdobeÐû²¼¸üÐÂÐÞ¸´¶à¸ö¸ßΣÎó²î
¡¾¸ÅÊö¡¿
ÍâµØÊ±¼ä2020Äê7ÔÂ21ÈÕ£¬Adobe¹Ù·½Ðû²¼ÁË ÐµÄÇå¾²¸üУ¬ÐÞ¸´ÁËAdobe ¶à¿î²úÆ·ÖеĶà¸ö¸ßΣ´úÂëÖ´ÐÐÎó²î£¬°üÀ¨Adobe Bridge¡¢Adobe Photoshop¡¢Adobe PreludeÒÔ¼°Adobe Reader MobileµÈ¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/adobe-0722/
3. MgBot¶ñÒâÈí¼þбäÖÖÕë¶ÔÓ¡¶ÈºÍÏã¸Û
¡¾¸ÅÊö¡¿
MgBotͨ¹ýʹÓÃWindowsÉϵÄÓ¦ÓóÌÐòÖÎÀí£¨AppMgmt£©·þÎñÀ´Ö´Ðв¢×¢ÈëÆä×îÖÕÓÐÓøºÔØ£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþÈö²¥£¬¾ßÓÐͨ¹ýTCP¾ÙÐÐC2ͨѶ¡¢½ØÍ¼¡¢¼üÅ̼ͼ¡¢ÎļþºÍĿ¼ÖÎÀí¡¢Á÷³ÌÖÎÀí¡¢½¨ÉèMUTEXµÄ¹¦Ð§£¬½üÆÚ¸Ã¶ñÒâÈí¼þбäÖÖÕë¶ÔÓ¡¶ÈºÍÏã¸ÛÌᳫ¹¥»÷Ô˶¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.malwarebytes.com/threat-analysis/2020/07/chinese-apt-group-targets-india-and-hong-kong-using-new-variant-of-mgbot-malware/
4. Lokibot¶ñÒâÈí¼þͨ¹ýµç×ÓÓʼþÈö²¥
¡¾¸ÅÊö¡¿
¹¥»÷ÕßÏòÓû§·¢ËÍ´øÓÐPowerPointÎĵµµÄ¶ñÒâµç×ÓÓʼþ£¬Í¨¹ýÖØ¶¨Ïò´Ópastebin.comƽ̨ÏÂÔØÁ½¸ö¾ç±¾£¬µÚÒ»¸ö¾ç±¾µÄÓÐÓøºÔØÊÇLokibot¶ñÒâÈí¼þ£¬µÚ¶þ¸ö¾ç±¾µÄÓÐÓøºÔØÊÇ.NET³ÌÐò¼¯£¬ÓÃÀ´Ö´ÐÐLokibot¡£
¡¾²Î¿¼Á´½Ó¡¿
https://cert-agid.gov.it/news/false-e-mail-della-sapienza-con-documento-powerpoint-diffonde-il-malware-lokibot/
5. OilRigÃé×¼Öж«µçÐÅ×éÖ¯
¡¾¸ÅÊö¡¿
OilRig×éÖ¯ÔÚ½üÆÚÕë¶ÔÖж«µÄÒ»¼ÒµçÐÅ×éÖ¯µÄ¹¥»÷Ô˶¯ÖÐʹÓÃ×Ô½ç˵Mimikatz¹¤¾ß¡¢Bitvise¡¢PowerShellÏÂÔØ³ÌÐòÒÔ¼°RDAT¹¤¾ß±äÌ壬һÖÖÐÂÓ±µÄ»ùÓÚµç×ÓÓʼþµÄÏÂÁîºÍ¿ØÖÆ(C2)ͨµÀ£¬¿ÉÒÔ½«ÏÂÁîºÍÊý¾ÝÒþ²ØÔÚµç×ÓÓʼþ¸½¼ÓµÄλͼͼÏñÖУ¬´ó´ó¶¼±äÌåÒÀÀµÓÚHTTPºÍDNSËíµÀ¾ÙÐÐC2ͨѶ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/
6. Lazarus×éÖ¯Õë¶Ô¶àƽ̨µÄ¶ñÒâÈí¼þ¿ò¼ÜMATA
¡¾¸ÅÊö¡¿
MATA¶ñÒâÈí¼þ¿ò¼Ü¾ßÓжà¸ö×é¼þ£¬ÀýÈç¼ÓÔØ³ÌÐò£¬Ðµ÷Æ÷ºÍ²å¼þ£¬Õâ¸öÖÜÈ«µÄ¿ò¼ÜÄܹ»Õë¶ÔWindows£¬LinuxºÍmacOS²Ù×÷ϵͳ£¬¹éÊôÓÚLazarus¹¥»÷×éÖ¯£¬ÔÚ²¨À¼¡¢µÂ¹ú¡¢ÍÁ¶úÆä¡¢º«¹ú¡¢ÈÕ±¾ºÍÓ¡¶ÈÒÑÓÐÊÜÓ°ÏìµÄÓû§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/
7. Prometei½©Ê¬ÍøÂçÔ˶¯Æð¾¢ÍÚ¾òÃÅÂÞ±Ò
¡¾¸ÅÊö¡¿
½üÆÚ·¢Ã÷Ò»¸öÖØ´óµÄ¹¥»÷Ô˶¯£¬Ô˶¯ÖнÓÄɶàÖÖÈö²¥·½·¨µÄ¶àÄ£¿é½©Ê¬ÍøÂçºÍÓÐÓøºÔØ£¬ÀýÈçʹÓÃEternal Blue¡¢×îеÄSMBÎó²îµÈ¶àÖÖÈö²¥·½·¨·Ö·¢½©Ê¬ÍøÂçPrometei¡£Prometei½©Ê¬ÍøÂçÓÐ15¸öÒÔÉϵĿÉÖ´ÐÐÄ£¿é£¬ÖÂÁ¦ÓÚͨ¹ýÍÚ¾òMoneroÔÚÏßÇ®±ÒΪ¹¥»÷ÕßÌṩ¾¼ÃÀûÒæ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/07/prometei-botnet-and-its-quest-for-monero.html
8. WatchBogMinerÍÚ¿óľÂíбäÖÖÕë¶ÔLinux·þÎñÆ÷µÄ¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
WatchBogMiner±äÖÖÍÚ¿óľÂíʹÓÃNexus Repository Manager¡¢Supervisord¡¢ThinkPHPµÈ·þÎñÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¾ÙÐй¥»÷£¬ÔÚʧÏÝ»úеװÖöàÖÖÀàÐ͵ij¤ÆÚ»¯¹¥»÷´úÂ룬ȻºóÖ²ÈëÃÅÂÞ±ÒÍÚ¿óľÂí¾ÙÐÐÍڿ󣬲¢ÇÒͨ¹ýÖÖÖÖÒªÁì¾ÙÐг¤ÆÚ»¯£¬°´ÆÚÀÈ¡ÍÚ¿óľÂí¼ÓÔØµ½ÄÚ´æÖ´ÐУ¬Í¬Ê±»áÔÚÆô¶¯ºóɾ³ýľÂíÎļþÒÔµÖ´ïÒþ²Ø×ÔÉíµÄÄ¿µÄ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com/research/report/1056.html
9. UrsnifÒøÐÐľÂíͨ¹ý´¹ÂÚÓʼþÈö²¥
¡¾¸ÅÊö¡¿
UrsnifÒøÐÐľÂíͨ¹ýÍøÂç´¹ÂÚµç×ÓÓʼþת´ï£¬Ê¹ÓÃÓʼþÖÐÒ»¸ö°üÀ¨ºêµÄαװ¸½¼þÏÂÔØÎ±×°³É.cabÀ©Õ¹ÃûµÄ¿ÉÖ´ÐÐÎļþ£¬»¹Ê¹ÓÃÁËÄ£ÄâZoomºÍWebexµÄÐÂÓû§ÊðÀí¡£UrsnifľÂíÔÚ¹¥»÷Ô˶¯ÖÐÖ¼ÔÚÇÔÈ¡Ö÷ÒªµÄ²ÆÎñÐÅÏ¢¡¢µç×ÓÓʼþƾ֤ºÍÆäËûÃô¸ÐÊý¾Ý¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.darktrace.com/en/blog/the-resurgence-of-the-ursnif-banking-trojan/
10. ShathakÔ˶¯-ͨ¹ýÀ¬»øÓʼþÈö²¥Valak
¡¾¸ÅÊö¡¿
¶ñÒâÀ¬»øÓʼþƾ֤´ÓÒÔǰѬȾµÄWindowsÖ÷»ú¼ìË÷µ½µÄÓÊÏäÊý¾ÝÀ´ÓÕÆÕýµ±µÄµç×ÓÓʼþÁ´£¬ÏòÓû§·¢ËͰüÀ¨ÊÜÃÜÂë±£»¤´øÓÐMicrosoft WordÎĵµµÄZIP¸½¼þ£¬ÆäÖÐÓÐÓÃÓÚ×°ÖöñÒâÈí¼þValakµÄºê£¬¸Ã¶ñÒâÈí¼þ³£±»ÓÃÓÚÐÅÏ¢ÇÔÈ¡ºÍ¶ñÒâÈí¼þ¼ÓÔØ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/valak-evolution/
11. WastedLockerÀÕË÷Èí¼þÀÄÓÃADSºÍNTFSÎļþÊôÐÔ
¡¾¸ÅÊö¡¿
WastedLockerÀÕË÷Èí¼þʹÓÃÁËSocGholish¿ò¼Ü£¬ÔÊÐí¹¥»÷ÕßÈö²¥Î±×°³Éϵͳ»òÈí¼þ¸üеĶñÒâÈí¼þÓÐÓÃÔØºÉ£¬²¢ÇÒͨ¹ýNTFSµÄ±¸ÓÃÊý¾ÝÁ÷Òþ²ØÒÔÌӱܼì²â¡£WastedLockerÀÕË÷Èí¼þÒÔÃÀ¹ú¶à¼Ò²Æ²ú500Ç¿ÆóҵΪĿµÄ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://labs.sentinelone.com/wastedlocker-ransomware-abusing-ads-and-ntfs-file-attributes/
12. TellyouthepassÀÕË÷Èí¼þ±äÖÖÕë¶ÔÆóÒµ
¡¾¸ÅÊö¡¿
½üÆÚ·¢Ã÷TellyouthepassÀÕË÷Èí¼þ±äÖÖÕë¶ÔÆóÒµÓû§µÄ¹¥»÷Ô˶¯£¬¹¥»÷ÕßʹÓÃѹËõ¹¤¾ß´ò°üexeµÄ·½·¨£¬½«ms16-032ÄÚºËÌáȨÎó²îʹÓÃÄ£¿é¡¢ÓÀºãÖ®À¶ÄÚÍøÀ©É¢Ä£¿é¼¯³Éµ½ÀÕË÷¹¥»÷°üÖУ¬ÒÔʵÏÖÄÚÍøÈä³æÊ½²¡¶¾Èö²¥¡£TellyouthepassÀÕË÷²¡¶¾Ê¹ÓÃÁËRSA+AESµÄ·½·¨¶ÔÎļþ¾ÙÐмÓÃÜ£¬±»²¡¶¾¼ÓÃܺóÎļþÔÝÎÞ·¨½âÃÜ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com//research/report/1054.html

AG¹«Ë¾ÔÆ







