¾ÅÓÎÀÏ¸ç¿Æ¼¼ÍþвÇ鱨Ô±¨-2020Äê2ÔÂ
2020-03-03
Ò»¡¢ Îó²îÌ¬ÊÆ
2020Äê02Ô¾ÅÓÎÀÏ¸ç¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼236Îó²î, ÆäÖиßΣÎó²î57¸ö£¬Î¢Èí¸ßΣÎó²î26¸ö¡£

×¢£º¾ÅÓÎÀÏ¸ç¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ ÍþвÊÂÎñ
1. DRBControlÍøÂçÌØ¹¤×éÖ¯Õë¶Ô¶Ä²©Ô˶¯
¡¾±êÇ©¡¿DRBControl
¡¾Õë¶ÔÐÐÒµ¡¿¶Ä²©ºÍ²©²Ê
¡¾Ê±¼ä¡¿2020-02-18
¡¾¼ò½é¡¿DRBControlÍøÂçÌØ¹¤×éÖ¯¿ªÕ¹Ò»Æð¹¥»÷Ô˶¯£¬Ê¹ÓÃеĶñÒâÈí¼þ¼Ò×åÃé׼ȫÇò¶Ä²©ºÍ²©²Ê¹«Ë¾£¬ÓÈÆä¶«ÄÏÑÇÓû§£¬Æä´Î»¹°üÀ¨Å·ÖÞºÍÖж«µØÇø¡£¹¥»÷ÕßÖ¼ÔÚ´Ó¶«ÄÏÑǵĶIJ©ºÍ²©²Ê¹«Ë¾ÇÔÈ¡Êý¾Ý¿âºÍÔ´´úÂë¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿DRBControlÊÇÒ»¸öÍøÂçÌØ¹¤×éÖ¯£¬Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĶIJ©ºÍ²©²ÊÐÐÒµ£¬Å·ÖÞºÍÖж«µØÇøÒ²ÓÐÉæ¼°£¬ÒÔÇÔÈ¡Êý¾ÝΪĿµÄ¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿PlugXÊÇʹÓÃÄ£¿é»¯²å¼þµÄÔ¶³Ì»á¼û¹¤¾ß£¨RAT£©£¬Òѱ»¶à¸öÍþв×é֯ʹÓá£
TrochilusÊÇÒ»¸öÔ¶³Ì»á¼û¹¤¾ß£¬¾ßÓÐÔ¶³ÌÐ¶ÔØ¡¢ÎļþÖÎÀí¡¢ÉÏ´«²¢Ö´ÐС¢ÏÂÔØ²¢Ö´ÐС¢shellcodeÀ©Õ¹¡¢ÒÔ¼°»á¼ûϵͳÐÅÏ¢µÈ¹¦Ð§¡£
HyperBroÊÇij¼¸¸ö×é֯ʹÓõÄ×Ô½ç˵ÄÚ´æºóÃÅ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://documents.trendmicro.com/assets/white_papers/wp-uncovering-DRBcontrol.pdf
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡134ÌõIOC£¬ÆäÖаüÀ¨8¸öIP¡¢17¸öÓòÃûºÍ109¸öÑù±¾£»¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
2. Õë¶Ô°ÍÀÕ˹̹È˵ÄÐÂÍøÂçÌØ¹¤Ô˶¯
¡¾±êÇ©¡¿Molerats¡¢SPARK¡¢PIEROGI
¡¾Ê±¼ä¡¿2020-02-13
¡¾¼ò½é¡¿THE SPARK CAMPAIGNÊÇʹÓÃÉç»á¹¤³Ìѧ¡¢Í¨¹ýSparkºóÃÅѬȾ°ÍÀÕ˹̹ʵÌåºÍСÎÒ˽¼ÒµÄ¹¥»÷Ô˶¯£¬¸ÃºóÃÅ×îÔçÓÚ2019Äê1Ô·ºÆð£¬ÒÔºóÒ»Ö±»îÔ¾¡£¹¥»÷Ô˶¯µÄÓÕ¶üÄÚÈÝÎ§ÈÆÒÔÉ«ÁÐ-°ÍÀÕ˹̹ÕþÖÎÊÂÎñ£¬´Ë´Î¹¥»÷Ô˶¯¹éÒòÓÚMolerats×éÖ¯¡£½üÆÚMolerats×é֯ͬʱʹÓÃÉç»á¹¤³Ìѧ¹¥»÷ÊֶΣ¬ÍŽáPierogiºóÃÅѬȾ°ÍÀÕ˹̹ÁìÍÁµÄÊܺ¦Õߣ¬¸ÃºóÃÅ×îÔçÓÚ2019Äê12Ô·ºÆð¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿Molerats£¬Ò²±»³ÆÎªGaza cybergang¡¢Moonlight¡¢Extreme Jackal¡¢Gaza Hackers Team¡¢Moonlight¡¢Extreme Jackal¡¢Operation Molerats£¬ÊÇÒ»¸ö³öÓÚÕþÖÎÄîÍ·µÄÍþв×éÖ¯£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬¸Ã×éÖ¯µÄÊܺ¦ÕßÖ÷ÒªÔÚÖж«¡¢Å·ÖÞºÍÃÀ¹ú¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one
https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-2-the-discovery-of-the-new-mysterious-pierogi-backdoor
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡52ÌõIOC£¬ÆäÖаüÀ¨2¸öÓòÃû¡¢1¸öIPºÍ49¸öÑù±¾£»Molerats×éÖ¯Ïà¹ØÊÂÎñ12¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ1¸ö¹ØÁªIP¡¢65¸ö¹ØÁªÑù±¾¡¢ºÍ16¹ØÁªÓòÃû£»¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
3. Mustang Panda×é֯ʹÓÃа汾PlugXÃé×¼Ïã¸Û
¡¾±êÇ©¡¿Mustang Panda¡¢PlugX
¡¾Õë¶ÔÐÐÒµ¡¿·ÇÕþ¸®×éÖ¯
¡¾Ê±¼ä¡¿2020-02-06
¡¾¼ò½é¡¿½üÆÚMustang Panda×é֯ʹÓÃPlugXбäÌåÖ÷ÒªÕë¶ÔÏã¸Û£¬Ò²Éæ¼°µ½Ô½ÄÏ¡£¹¥»÷ÕßʹÓÃPlugX×÷ΪºóÃÅ£¬Ò»µ©×°±¸±»Ñ¬È¾£¬¹¥»÷Õß¿ÉÒÔÔÚÊÜÓ°ÏìµÄϵͳÉÏÔ¶³ÌÖ´ÐжàÖÖÏÂÁÒÔ¼ìË÷ÅÌËã»úÐÅÏ¢¡¢²¶»ñÆÁÄ»¡¢ÖÎÀí·þÎñºÍÖÎÀíÀú³Ì¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿Mustang PandaÍþв×éÖ¯Ö÷ÒªÕë¶ÔÑÇÌ«¹ú¼ÒµÄ·ÇÕþ¸®×éÖ¯£¬³£Ê¹ÓÃPoison Ivy¡¢PlugXºÍCobalt StrikeÓÐÓÃÔØºÉµÈ¹²Ïí¶ñÒâÈí¼þÀ´ÍøÂçÇ鱨¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿PlugXÊÇʹÓÃÄ£¿é»¯²å¼þµÄÔ¶³Ì»á¼û¹¤¾ß£¨RAT£©£¬Òѱ»¶à¸öÍþв×é֯ʹÓá£
Cobalt StrikeÊÇÒ»¸öÉÌÒµ»¯ÉøÍ¸²âÊÔ¹¤¾ß£¬¿ÉÓÃshell»á¼ûÊÜѬȾµÄϵͳ¡£
Poison Ivy£¬Ò²±»³ÆÎªPoisonIvy¡¢Darkmoon£¬ÊÇÒ»ÖÖÊ¢ÐеÄÔ¶³Ì»á¼û¹¤¾ß£¬Òѱ»¶à¸ö×é֯ʹÓá£
¡¾²Î¿¼Á´½Ó¡¿
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÓÐ22ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨8¸öÑù±¾¡¢5¸öIPºÍ9¸öÓòÃû¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
4. ¶à¸ö¶ñÒâÈí¼þͨ¹ý¹Ú×´²¡¶¾Ö÷ÌâµÄ´¹ÂÚÓʼþÈö²¥
¡¾±êÇ©¡¿Nanocore RAT¡¢Parallax RAT¡¢Emotet
¡¾Ê±¼ä¡¿2020-02-13
¡¾¼ò½é¡¿ÐÂÐ͹Ú×´²¡¶¾½üÆÚÔÚÐÂÎÅÖÐÕ¼Ö÷µ¼Ö°Î»£¬¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓôËÈÈÃÅ¡£½üÆÚ·¢Ã÷¶à¸ö¶ñÒâÈí¼þ¼Ò×åÒÔÐÂÐ͹Ú×´²¡¶¾ÎªÖ÷ÌâµÄ´¹ÂÚÓʼþÈö²¥¡¢»òʹÓÃÓë¹Ú×´²¡¶¾ÓйصÄÎļþÃûÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐУ¬ÆäÖаüÀ¨Nanocore RAT¡¢Parallax RATºÍEmotetµÈ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/02/coronavirus-themed-malware.html
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½92ÌõÏà¹ØIOC¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
5. Charming Kitten×éÖ¯Õë¶ÔÌìϸ÷µØ¹«ÖÚÈËÎïµÄ¹¥»÷Ô˶¯
¡¾±êÇ©¡¿Charming Kitten
¡¾Ê±¼ä¡¿2020-02-05
¡¾¼ò½é¡¿½üÆÚ·¢Ã÷Charming Kitten×éÖ¯µÄһϵÁÐÍøÂç´¹ÂÚÔ˶¯£¬Ð¹¥»÷Ô˶¯µÄÖØµãÊÇÇÔÈ¡Êܺ¦Õߵĵç×ÓÓʼþÕÊ»§ÐÅÏ¢²¢²éÕÒÓйØËûÃǵÄÁªÏµÈË/ÍøÂçµÄÐÅÏ¢£¬Êܺ¦Õß°üÀ¨¼ÇÕß¡¢ÕþÖκÍÈËȨÔ˶¯¼Ò¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿Charming Kitten£¨ÓÖÃûGroup 83¡¢Newsbeef¡¢iKittens¡¢Parastoo¡¢Newscaster£©ÊÇÒÁÀÊÍøÂçÌØ¹¤×éÖ¯£¬×Ô2014Äê×óÓÒ×îÏÈ»îÔ¾¡£¸Ã×é֯רעÓÚ´ÓÊÂѧÊõÑо¿¡¢ÈËȨºÍýÌåÊÂÇéµÄСÎÒ˽¼ÒÒÔ¼°Õþ¸®¡¢¹ú·ÀÊÖÒÕ¡¢¾üʺÍÍâ½»ÁìÓòµÄ»ú¹¹£¬´ó²¿·ÖÊܺ¦Õß¶¼Î»ÓÚÒÁÀÊ¡¢ÃÀ¹ú¡¢ÒÔÉ«ÁкÍÓ¢¹ú¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿ModlishkaÊÇÒ»¸öͨ¹ýÍøÂç´¹ÂÚ¿ÉÈÆ¹ýË«ÒòËØÈÏÖ¤µÄ¹¤¾ß¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.certfa.com/posts/fake-interview-the-new-activity-of-charming-kitten/
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½42ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨2¸öÑù±¾ºÍ26¸öÓòÃûºÍ14¸öIP£»¹ØÓÚCharming Kitten×éÖ¯Ïà¹ØÊÂÎñ±£´æ4¼þ£¬Ïà¹ØÁªÑù±¾41¸ö¡¢Ïà¹ØÁªÓòÃû662¸ö¡¢Ïà¹ØÁªIP86¸ö¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
6. Outlaw×éÖ¯Õë¶Ô¸ü¶àϵͳ¾ÙÐÐÍÚ¿ó
¡¾±êÇ©¡¿Outlaw
¡¾Ê±¼ä¡¿2020-02-10
¡¾¼ò½é¡¿½üÆÚ·¢Ã÷Outlaw¹¥»÷×é֯ˢÐÂÁËɨÃèÔ˶¯µÄ¹æ±ÜÊÖÒÕ£¬²¢Í¨¹ýɱËÀ¾ºÕùµÐÊÖºÍ×Ô¼ºÒÔǰµÄ¿ó¹¤À´Ìá¸ßÁ˲ɿóÀûÈ󣬲¢¶Ô¹¤¾ß°üµÄ¹¦Ð§¾ÙÐÐÁ˸üУ¬ÕâЩ¹¤¾ß°üÖ¼ÔÚÇÔÈ¡Æû³µºÍ½ðÈÚÐÐÒµµÄÐÅÏ¢£¬Ëæºó¶ÔÊܺ¦ÏµÍ³¾ÙÐкóÐø¹¥»÷²¢³öÊÛ±»µÁÐÅÏ¢¡£¹¥»÷Ô˶¯ÖеÄÐÂÑù±¾Í¨¹ýÒÑÖªÎó²î£¨CVE-2016-8655¡¢CVE-2016-5195£©Õë¶Ô»ùÓÚLinuxºÍUnixµÄ²Ù×÷ϵͳ¡¢Ò×Êܹ¥»÷µÄ·þÎñÆ÷ÒÔ¼°ÎïÁªÍø£¨IoT£©×°±¸¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿OutlawÊÇÒ»¸öºÚ¿ÍÍŻÖ÷Ҫͨ¹ýÍÚ¿ó»ñÈ¡ÀûÒæ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.trendmicro.com/trendlabs-security-intelligence/outlaw-updates-kit-to-kill-older-miner-versions-targets-more-systems/
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡11ÌõÏà¹ØIOC£»¹ØÓÚOutlaw×éÖ¯Ïà¹ØÊÂÎñ±£´æ3¼þ£¬Ïà¹ØÁªÑù±¾22¸ö¡¢Ïà¹ØÁªIP5¸ö¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
7. Gamaredon×éÖ¯ÔöÇ¿Õë¶ÔÎÚ¿ËÀ¼µÄ¹¥»÷
¡¾±êÇ©¡¿Gamaredon
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®¡¢¾üÊÂ
¡¾Ê±¼ä¡¿2020-02-04
¡¾¼ò½é¡¿ÔÚÒÑÍùµÄ¼¸ÔÂÖУ¬Íþв×éÖ¯GamaredonÒ»Ö±¸üÐÂÆä¹¤¾ß¼¯²¢ÔöÇ¿¶ÔÎÚ¿ËÀ¼Õþ¸®ºÍÖ´·¨²¿·ÖµÄ¹¥»÷Ô˶¯£¬×Ô2019Äê12Ô¹¥»÷ÏÔ×ÅÔö¶à£¬Ö÷ÒªÕë¶ÔÒªº¦»ù´¡ÉèÊ©£¬Í¬Ê±Åãͬ×ÅÆµÈÔµÄÍøÂçÌØ¹¤Ô˶¯£¬ÎÚ¿ËÀ¼¾³ÄÚÖÁÉÙÓиöÎåǧ¸ö×ÔÁ¦ÊµÌåÊܵ½Ó°Ïì¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿GamaredonÊÇÒ»¸öÍøÂçÍþв×éÖ¯£¬×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®¾ÙÐжñÒâÔ˶¯£¬ÆäÖ÷ҪĿµÄÊÇÇÔÈ¡Õþ¸®¡¢¾üÊÂÖ°Ô±×ÊÁÏÐÅÏ¢¡£
¡¾²Î¿¼Á´½Ó¡¿
https://labs.sentinelone.com/pro-russian-cyberspy-gamaredon-intensifies-ukrainian-security-targeting/
¡¾·À»¤²½·¥¡¿¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½7ÌõÏà¹ØIOC£»¹ØÓÚGamaredon×éÖ¯Ïà¹ØÊÂÎñ±£´æ6¼þ£¬Ïà¹ØÁªÑù±¾7¸ö¡¢Ïà¹ØÁªÓòÃû63¡¢Ïà¹ØÁªIP12¸ö¡£¾ÅÓÎÀϸçÇ徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

¾ÅÓÎÀϸçÔÆ







