Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç

Ðû²¼Ê±¼ä 2022-03-22

Mandiant·¢Ã÷UNC2891ʹÓÃеÄCAKETAP¹¥»÷ATMÍøÂç


3ÔÂ16ÈÕ £¬MandiantÐû²¼Á˹ØÓÚUNC2891ÍŻ﹥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£ÔÚ´Ë´ÎÔ˶¯ÖÐ £¬¹¥»÷ÕßʹÓÃÁËÃûΪCAKETAPµÄÐÂUnix rootkit £¬Ö÷ÒªÕë¶ÔÔËÐÐOracle Solaris²Ù×÷ϵͳµÄ·þÎñÆ÷¡£Caketap¿ÉÒÔÒþ²ØÍøÂçÅþÁ¬¡¢Àú³ÌºÍÎļþ £¬Æä×îÖÕÄ¿µÄÊÇ´ÓÄ¿µÄATMÖнػñÒøÐп¨ºÍPINÑéÖ¤Êý¾Ý £¬È»ºóʹÓÃÕâЩµÁÊý¾Ý¾ÙÐÐڲƭÉúÒâ¡£±ðµÄ £¬¹¥»÷Ô˶¯»¹Ê¹ÓÃÁË2¸öÃûΪSLAPSTICKºÍTINYSHELLµÄºóÃÅ £¬ËüÃǶ¼ÓëUNC1945ÓйØ¡£


https://www.mandiant.com/resources/unc2891-overview


ʯÓ͹ܵÀ¹«Ë¾TransneftÑз¢²¿·ÖOmega 79GBÊý¾Ýй¶


¾ÝýÌå3ÔÂ19ÈÕ±¨µÀ £¬AnonymousÉù³ÆÒÑÈëÇÖÁËTransneftµÄÄÚ²¿Ñз¢²¿·ÖOmega¡£TransneftÊÇÌìÏÂÉÏ×î´óµÄʯÓ͹ܵÀ¹«Ë¾ £¬×ܲ¿Î»ÓÚĪ˹¿Æ¡£3ÔÂ17ÈÕ £¬DDoSecrets³ÆÆäÊÕµ½ÁËOmega¸ß´ï79GBµÄµç×ÓÓʼþ¡£´Ë´Îй¶µÄÊý¾Ý²»µ«°üÀ¨µç×ÓÓʼþÐÅÏ¢ £¬»¹°üÀ¨·¢Æ±ºÍ²úÆ·ÔËÊäÏêϸÐÅÏ¢ £¬ÒÔ¼°ÏÔʾ·þÎñÆ÷»ú¼ÜºÍÆäËü×°±¸ÉèÖõÄͼÏñÎļþ¡£²»¾Ãǰ £¬Anonymous»¹ÈëÇÖÁ˶íÂÞ˹µÄýÌåÉó²é»ú¹¹Roskomnadzor¡£


https://www.hackread.com/anonymous-leak-79gb-russia-oil-pipeline-email-data/


N4ughtysecTUÉù³ÆÒÑÇÔÈ¡TransUnion·ÇÖÞ·Ö²¿4TBµÄÊý¾Ý


 Ã½Ìå3ÔÂ18ÈÕ±¨µÀ £¬TransUnionÐû²¼ÉùÃ÷³ÆÎ»ÓÚÄϷǵķþÎñÆ÷Ôâµ½ÁËδ¾­ÊÚȨµÄ»á¼û¡£°ÍÎ÷ºÚ¿ÍÍÅ»ïN4ughtysecTUÉù³Æ¶ÔÕâ´Î¹¥»÷ÈÏÕæ £¬²¢ÒÑÔÚ¹¥»÷ʱ´úÏÂÔØÁË4TBµÄÊý¾Ý¡£¹¥»÷ÕßÌåÏÖËûÃÇͨ¹ý±©Á¦¹¥»÷ÈëÇÖÁËÒ»¸öÇå¾²ÐԽϲîµÄTransUnion SFTP·þÎñÆ÷ £¬²¢ÇÔÈ¡ÁËԼĪ5400Íò¿Í»§µÄÊý¾Ý¡£¾ÝϤ £¬¹¥»÷Õß×îÖÕÆÆ½âµÄÃÜÂëÊÇ¡°Password¡± £¬ÕâÒѱ»ÁÐΪ2021ÄêµÚÎå´ó×î³£ÓõÄÃÜÂë¡£´Ë´Î¹¥»÷µÄÀÕË÷½ð¶îΪ15000000ÃÀÔª £¬µ«TransUnionÒÑÖ¸³öËü²»»áÏòºÚ¿Í¸¶¿î¡£


https://www.bleepingcomputer.com/news/security/hackers-claim-to-breach-transunion-south-africa-with-password-password/


FBIÐû²¼AvosLocker¹¥ÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄͨ¸æ


3ÔÂ17ÈÕ £¬ÃÀ¹úFBIÐû²¼¹ØÓÚÀÕË÷ÍÅ»ïAvosLockerµÄÍøÂçÇå¾²×Éѯ¡£FBI³Æ £¬AvosLockerÊÇÒ»¸ö»ùÓÚRaaSµÄÍÅ»ï £¬Õë¶ÔÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©µÄ×éÖ¯ £¬°üÀ¨µ«²»ÏÞÓÚ½ðÈÚ·þÎñÐÐÒµ¡¢ÖÆÔìÐÐÒµºÍÕþ¸®²¿·ÖµÈ¡£¸Ãͨ¸æ¹ûÕæÁËÓйشËRaaSÍÅ»ïµÄÊÖÒÕϸ½Ú £¬»¹Îª×éÖ¯ÌṩÁË¿ÉÓÃÓÚ¼ì²âºÍ×èÖ¹´ËÀ๥»÷µÄÈëÇÖÖ¸±ê(IOC)¡£ID-RansomwareÊý¾ÝÏÔʾ £¬AvosLockerÔÚ2021Äê11ÔÂÖÁ2021Äê12ÔÂʱ´úµÄÔ˶¯¼¤Ôö £¬ÇÒÏÖÔÚÈÔÔÚ¼ÌÐø¡£


https://www.bleepingcomputer.com/news/security/fbi-avoslocker-ransomware-targets-us-critical-infrastructure/


GoogleÐû²¼¹ØÓÚConti³õʼ»á¼û´úÀíÕ½ÂÔµÄÆÊÎö±¨¸æ


3ÔÂ17ÈÕ £¬GoogleÍþвÆÊÎöС×é(TAG)Ðû²¼Á˹ØÓÚConti³õʼ»á¼û´úÀíÕ½ÂÔµÄÆÊÎö±¨¸æ¡£TAG·¢Ã÷еÄEXOTIC LILYÓëContiºÍDiavolµÈÀÕË÷ÍÅ»ïÓйØ £¬ÆäʹÓÃMicrosoft Windows MSHTMLƽ̨ÖÐÎó²îCVE-2021-40444¾ÙÐд¹ÂÚ¹¥»÷ £¬ÔÚá¯ÁëÆÚÌìÌìÏòÈ«Çò¶à´ï650¸öÄ¿µÄ×éÖ¯·¢ËÍÁè¼Ý5000·âÓʼþ¡£ËäÈ»EXOTIC LILYµÄÔ˶¯ÓëContiµÄÓªÒµÖØµþ £¬µ«GoogleÒÔΪ £¬ËüÊÇÒ»¸öÍêȫרעÓÚ½¨Éè³õÊ¼ÍøÂç»á¼ûµÄ×ÔÁ¦¹¥»÷ÍŻ


https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/


Western DigitalÐÞ¸´ÆäEdgeRoverÖеÄĿ¼±éÀúÎó²î


3ÔÂ18ÈÕ £¬Western DigitalÐû²¼Çå¾²¸üР£¬ÐÞ¸´Æä×ÀÃæÓ¦ÓóÌÐòEdgeRoverÖеÄĿ¼±éÀúÎó²î£¨CVE-2022-22998£©¡£EdgeRoverÊǼ¯ÖÐʽÄÚÈݹÜÃ÷È·¾ö¼Æ»® £¬½«¶à¸öÊý×Ö´æ´¢×°±¸Í³Ò»ÔÚÒ»¸ö¹ÜÀí½çÃæÏ¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.1 £¬¿É±»¹¥»÷ÕßÓÃÀ´¾ÙÐÐÍâµØÈ¨ÏÞÌáÉýºÍɳºÐÌÓÒÝ £¬¿ÉÄܻᵼÖÂÐÅϢй¶»ò¾Ü¾ø·þÎñ(DoS)¹¥»÷¡£Western DigitalµÄͨ¸æ²¢Î´ÌṩÓйظÃÎó²îµÄÏêϸÐÅÏ¢ £¬Òò´Ë»¹²»ÇåÎúÕâÊÇÒ»¸öÔÊÐíÍâµØÈ¨ÏÞÌáÉýµÄDLLÐ®ÖÆÎó²î £¬ÕÕ¾ÉÒ»¸öÔÊÐí»á¼û·ÇÌØÈ¨Êý¾ÝλÖõÄÎó²î¡£


https://www.bleepingcomputer.com/news/security/western-digital-app-bug-gives-elevated-privileges-in-windows-macos/



Çå¾²¹¤¾ß


EvilSelenium


ÊÇÒ»¸ö½« SeleniumÎäÆ÷»¯ÒÔÀÄÓà Chrome µÄÐÂÏîÄ¿¡£


https://github.com/mrd0x/EvilSelenium/


wholeaked


ÊÇÒ»¸öÎļþ¹²Ïí¹¤¾ß £¬¿ÉÈÃÄúÔÚ±¬·¢×ß©ʱÕÒµ½ÈÏÕæÈË¡£


https://github.com/utkusen/wholeaked


WSVuls


ÏÂÁîÐй¤¾ß £¬×¨Îª¿ª·¢/²âÊÔְԱͨ¹ýµ¥¸öÏÂÁî²âÊÔÎó²îºÍÆÊÎöÍøÕ¾¶øÉè¼Æ¡£


https://github.com/anouarbensaad/wsvuls


AWS CloudSaga


ÓÃÓÚÔÚ Amazon Web Services (AWS) ÇéÐÎÖвâÊÔÇå¾²¿ØÖƺ;¯±¨¡£


https://github.com/awslabs/aws-cloudsaga#running-the-code



Çå¾²ÆÊÎö


Windows 11 Ϊ USB Çý¶¯Æ÷Ìí¼ÓÁË BitLocker ɨ³ýÕ½ÂÔ


https://www.bleepingcomputer.com/news/microsoft/windows-11-adds-a-bitlocker-exclusion-policy-for-usb-drives/


΢ÈíÌáÐÑ Internet Explorer ÔÚ 6 Ô¼´½«ïÔÌ­


https://www.bleepingcomputer.com/news/microsoft/microsoft-reminds-of-internet-explorers-looming-demise-in-june/


NIST ÎªÖÆÔìÉÌÐû²¼ ICS ÍøÂçÇå¾²Ö¸ÄÏ


https://www.securityweek.com/nist-releases-ics-cybersecurity-guidance-manufacturers


д¹ÂÚ¹¤¾ß°ü¿ÉÓÃÀ´½¨ÉèÐéαµÄ Chrome ä¯ÀÀÆ÷´°¿Ú


https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-lets-anyone-create-fake-chrome-browser-windows/


CISA¡¢FBI ÖÒÑÔ¶Ô SATCOM ÍøÂ繩ӦÉ̵Ĺ¥»÷


https://www.hackread.com/targeting-satellite-cisa-fbi-warns-satcom-providers/


¶à¼ÒÆû³µÖÆÔìÉÌѬȾ Emotet


https://www.darkreading.com/attacks-breaches/multiple-automakers-infected-with-emotet