¾ÅÓÎÀÏ¸ç¿Æ¼¼ÍþвÇ鱨Ô±¨-2020Äê1ÔÂ
2020-02-03
Ò»¡¢Îó²îÌ¬ÊÆ
2020Äê01Ô¾ÅÓÎÀÏ¸ç¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼132Îó²î, ÆäÖиßΣÎó²î57¸ö£¬Î¢Èí¸ßΣÎó²î26¸ö¡£

×¢£º¾ÅÓÎÀÏ¸ç¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ÍþвÊÂÎñ
- EmotetľÂíʹÓÃÐÂÐ͹Ú×´²¡¶¾Ö÷ÌâÓʼþÈö²¥
¡¾±êÇ©¡¿Emotet
¡¾Ê±¼ä¡¿2020-01-31
¡¾¼ò½é¡¿
ʹÓÃÓßÂÛÈÈÃÅÈö²¥ÅÌËã»ú²¡¶¾µÄÊÂÎñÒÑ˾¿Õ¼û¹ß¡£×î½ü·¢Ã÷EmotetľÂíµÄÔ˶¯ÓÐËùÔöÌí£¬¸ÃľÂíͨ¹ýÓÕµ¼Óû§·¿ª¶ñÒâµç×ÓÓʼþ¸½¼þWordÎĵµÀ´ÊµÏÖÈö²¥£¬¸½¼þÖ÷ÌâÐÎòΪÓйØÐÂÐ͹Ú×´²¡¶¾Ô¤·À²½·¥µÄ֪ͨ£¬Ò»µ©Êܺ¦Õßµã»÷·¿ª£¬Ôò¾ÓÉ»ìÏýµÄVBAºê¾ç±¾½«·¿ªpowershell²¢ÔÚºǫ́װÖÃEmotetÏÂÔØÆ÷£¬ÏÖÔÚ¹¥»÷Ô˶¯Ö÷ÒªÕë¶ÔÈÕ±¾Óû§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://exchange.xforce.ibmcloud.com/collection/18f373debc38779065a26f1958dc260b
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡4ÌõIOC£»¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- TA428Íþв×é֯ʹÓÃPoisonIvyµÄ¹¥»÷Ô˶¯
¡¾±êÇ©¡¿TA428¡¢PoisonIvy
¡¾Ê±¼ä¡¿2020-01-09
¡¾¼ò½é¡¿
½üÆÚTA428Íþв×éÖ¯ÀÄÓÃÃÀ¹úºÍÒÁÀÊÖ®¼äµÄÕþÖγåͻʹÓÃÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ·Ö·¢¿ÉÒÉÎļþ£¬¸ÃÎļþΪRTFÃûÌ㬲¢¾ßÓÐÓ빫ʽ±à¼Æ÷Ïà¹ØµÄOLE¹¤¾ß£¬´Ë¹¤¾ßÖ¼ÔÚʹÓÃCVE-2018-0798Îó²îÀ´Ñ¬È¾Ä³ÖÖ¶ñÒâÈí¼þ£¬¶ñÒâ¸ºÔØÖаüÀ¨PoisonIvyÑù±¾ÓëC2·þÎñÆ÷ͨѶ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
TA428ÊÇÒ»¸öÓëÖйúÓйصÄÍþв×éÖ¯¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿
PoisonIvy£¬Ò²±»³ÆÎªPoison Ivy¡¢Darkmoon£¬ÊÇÒ»¸öÔ¶³Ì»á¼û¹¤¾ß£¬Òѱ»Ðí¶à¹¥»÷×é֯ʹÓá£
¡¾²Î¿¼Á´½Ó¡¿
https://lab52.io/blog/icefog-apt-group-abusing-recent-conflict-between-iran-and-eeuu/
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡4ÌõIOC£»TA428×éÖ¯Ïà¹ØÊÂÎñ2¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ2¸ö¹ØÁªIP¡¢18¸ö¹ØÁªÑù±¾£»¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- Operation AppleJeus-Lazarus×éÖ¯¹¥»÷¼ÓÃÜÇ®±ÒÓªÒµ
¡¾±êÇ©¡¿Lazarus¡¢Operation AppleJeus
¡¾Õë¶ÔÐÐÒµ¡¿¼ÓÃÜÇ®±Ò
¡¾Ê±¼ä¡¿2020-01-08
¡¾¼ò½é¡¿
Operation AppleJeus¹¥»÷Ô˶¯´Ó2018ÄêÒ»Á¬ÖÁ½ñ£¬½üÆÚÔöÇ¿¹¦Ð§¼ÌÐøÕë¶Ô¼ÓÃÜÇ®±ÒÓªÒµ£¬ÎªÁ˹¥»÷macOSÓû§£¬Lazarus×éÖ¯¿ª·¢ÁË×ÔÖÆµÄmacOS¶ñÒâÈí¼þ£¬ÔÚmacOSÏÂÔØÆ÷ÖÐÌí¼ÓÁËÉí·ÝÑéÖ¤»úÖÆ²¢¸ü¸ÄÁËmacOS¿ª·¢¿ò¼Ü£¬¿ÉÒÔÔÚ²»½Ó´¥´ÅÅ̵ÄÇéÐÎϼÓÔØÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ£»±ðµÄ£¬ÎªÁ˹¥»÷WindowsÓû§£¬LazarusÖÆ¶©Á˶à½×¶ÎѬȾ³ÌÐò£¬²¢¸ü¸ÄÁË×îÖÕÓÐÓøºÔØ¡£Operation AppleJeusÏÖÔÚÊÜÓ°ÏìµÄ¹ú¼Ò°üÀ¨Ó¢¹ú¡¢²¨À¼¡¢¶íÂÞ˹ºÍÖйú£¬Êܺ¦Õß¾ùÓë¼ÓÃÜÇ®±ÒӪҵʵÌåÓйء£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
Lazarus Group£¨ÓÖÃûHIDDEN COBRA¡¢Guardians of Peace¡¢ZINCºÍNICKEL ACADEMY£©ÊÇÒ»¸ö¹éÊôÓÚ³¯ÏÊÕþ¸®Íþв×éÖ¯£¬ÖÁÉÙ´Ó2009ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securelist.com/operation-applejeus-sequel/95596/
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÓÐ44ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨22¸öÑù±¾¡¢14¸öIPºÍ8¸öÓòÃû£»¹ØÓÚLazarus Group×éÖ¯Ïà¹ØÊÂÎñ±£´æ30¼þ£¬Ïà¹ØÁªÑù±¾112¸ö¡¢Ïà¹ØÁªÓòÃû31¸ö¡¢Ïà¹ØÁªIP22¸ö¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- The Fractured StatueÕ½Õù-Óã²æÊ½´¹ÂÚ¹¥»÷Õë¶ÔÃÀ¹úÕþ¸®»ú¹¹
¡¾±êÇ©¡¿Konni¡¢CARROTBALL
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®
¡¾Ê±¼ä¡¿2020-01-23
¡¾¼ò½é¡¿
½üÆÚ·¢Ã÷Ò»ÖÖеĶñÒâÈí¼þCARROTBALL±»ÓÃÓÚ¶¨Ïò¹¥»÷Ô˶¯ÖУ¬¶ñÒâÈí¼þͨ¹ýÓã²æÊ½´¹ÂÚÓʼþ¸½¼þ·Ö·¢¸øÃÀ¹úÕþ¸®»ú¹¹ºÍÓ볯ÏÊÎÊÌâÏà¹ØµÄרҵÈËÊ¿£¬Ö÷ÌâÎ§ÈÆ³¯ÏÊÕý¾ÙÐеĵØÔµÕþÖÎÎÊÌâÓÕµ¼Êܺ¦Õß·¿ª¡£´Ë´Î¹¥»÷Ô˶¯ÒÉËÆÓÉKonni×éÖ¯Ìᳫ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
KonniÊÇÒ»¸öÓ뺫¹úÓйصÄÍþв×éÖ¯¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿
CARROTBALLÊÇÒ»¸ö¼òÆÓµÄFTPÏÂÔØÆ÷³ÌÐò£¬×î³õÔÚ2019Äê10ÔµÄÒ»´Î¹¥»÷Öб»·¢Ã÷£¬¸Ã³ÌÐò¿É¼ò»¯SYSCONµÄ×°ÖÃÀú³Ì£¬SYSCONÊÇÒ»ÖÖ¹¦Ð§ÆëÈ«µÄÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬ËüʹÓÃFTP¾ÙÐÐC2ͨѶ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/the-fractured-statue-campaign-u-s-government-targeted-in-spear-phishing-attacks/
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½23ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨20¸öÑù±¾ºÍ3¸öÓòÃû£»¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- AggahÔ˶¯-Õë¶ÔÒâ´óÀûÁãÊÛÐÐÒµ
¡¾±êÇ©¡¿Aggah¡¢AZOrult¡¢Lokibot
¡¾Ê±¼ä¡¿2020-01-27
¡¾¼ò½é¡¿
½üÆÚ·¢Ã÷Õë¶ÔÒâ´óÀûÁãÊÛÐÐÒµµÄ¹¥»÷Ô˶¯£¬¹¥»÷»ùÓÚÕýµ±µÄµÚÈý·½·þÎñ(ÀýÈçPastebinºÍBlogSpot)¹¹½¨×Ô½ç˵µÄstagerÖ²Èë³ÌÐò£¬Ô˶¯Öзַ¢µÄ¶ñÒâÈí¼þ°üÀ¨AZOrultºÍLokibotľÂí±äÖÖ£¬ÆäÖÐAZOrult¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢°¢À²®ÍŽáÇõ³¤¹úÒÔ¼°°Í»ù˹̹¡¢µÂ¹úºÍÒÔÉ«ÁеÄÉÙÁ¿Êܺ¦Õߣ¬¶øLokibotÊÇÖÚËùÖÜÖªµÄÐÅÏ¢ÇÔÈ¡Æ÷¡£¸ÃÔ˶¯ÒÉËÆÓëGorgonÍþв×éÖ¯Óйء£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
GorgonÊÇÒ»¸öÓë°Í»ù˹̹ÓйصÄÍþв×éÖ¯£¬Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢Î÷°àÑÀ¡¢¶íÂÞ˹ºÍÃÀ¹úÕþ¸®×éÖ¯µÄÔ˶¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.yoroi.company/research/aggah-how-to-run-a-botnet-without-renting-a-server-for-more-than-a-year/
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡9ÌõÏà¹ØIOC£¬¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- Google PlayÖжñÒâ³ÌÐòʹÓÃCVE-2019-2215Îó²î
¡¾±êÇ©¡¿Google Play¡¢CVE-2019-2215¡¢SideWinder
¡¾Ê±¼ä¡¿2020-01-06
¡¾¼ò½é¡¿
½üÆÚÔÚGoogle PlayÊÐËÁÖз¢Ã÷ÁËÈý¸ö¶ñÒâÓ¦ÓóÌÐò£¬ËüÃÇ¿ÉÒÔÐͬÊÂÇéÒÔÆÆËðÊܺ¦ÕßµÄ×°±¸²¢ÍøÂçÓû§ÐÅÏ¢£¬ÆäÖÐÒ»¸öÃûΪCameroµÄÓ¦ÓÃʹÓÃÁËCVE-2019-2215Îó²î£¬¸ÃÎó²î±£´æÓÚBinder£¨AndroidÖÐÖ÷ÒªµÄÀú³Ì¼äͨѶϵͳ£©ÖУ¬ÕâÈý¸ö¶ñÒâ³ÌÐòÓëSideWinderÍþв×éÖ¯Óйء£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿
SideWinderÊÇÒ»¸öÖÁÉÙ´Ó2012Äê×îÏÈ»îÔ¾µÄÍþв×éÖ¯£¬ÒÉËÆÀ´×ÔÓ¡¶È£¬Ö÷ÒªÕë¶Ô°Í»ù˹̹¼°Öܱ߹ú¼Ò¾ÙÐж¨Ïò¹¥»÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/
¡¾·À»¤²½·¥¡¿
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½15ÌõÏà¹ØIOC£»¹ØÓÚSideWinder×éÖ¯Ïà¹ØÊÂÎñ±£´æ6¼þ£¬Ïà¹ØÁªÑù±¾45¸ö¡¢Ïà¹ØÁªÓòÃû18¸ö¡¢Ïà¹ØÁªIP8¸ö¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

¾ÅÓÎÀϸçÔÆ







