ÖÇÀûµÄµçÐŹ«Ë¾GTDÔâµ½ÀÕË÷ÍÅ»ïRorschachµÄ¹¥»÷
Ðû²¼Ê±¼ä 2023-10-271¡¢ÖÇÀûµÄµçÐŹ«Ë¾GTDÔâµ½ÀÕË÷ÍÅ»ïRorschachµÄ¹¥»÷
¾ÝýÌå10ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÖÇÀûµçÐŹ«Ë¾Grupo GTDÔâµ½¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìÁËÆä»ù´¡ÉèÊ©¼´Ð§ÀÍ(IaaS)ƽ̨£¬£¬£¬£¬£¬µ¼ÖÂÔÚÏßЧÀÍÔÝʱÖÐÖ¹¡£¡£¡£¹¥»÷±¬·¢ÓÚ10ÔÂ23ÈÕÉÏÎ磬£¬£¬£¬£¬GTDµÄÊý¾ÝÖÐÐÄ¡¢»¥ÁªÍø½ÓÈëºÍIPÓïÒô(VoIP)µÈЧÀÍÊܵ½Ó°Ïì¡£¡£¡£ÖÇÀûCSIRT³ÆÕâÊÇÒ»ÆðÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ËäȻûÓÐ͸¶¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±»ñÏ¤Éæ¼°µ½ÀÕË÷Èí¼þRorschach£¨ÓÖÃûBabLock£©µÄ±äÖÖ¡£¡£¡£¹ØÓÚGTD¹¥»÷ÊÂÎñµÄ±¨¸æÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄTrend Micro¡¢BitDefenderºÍCortex XDR¿ÉÖ´ÐÐÎļþÖеÄDLL²à¼ÓÔØÎó²îÀ´¼ÓÔØ¶ñÒâDLL¡£¡£¡£
https://www.bleepingcomputer.com/news/security/chilean-telecom-giant-gtd-hit-by-the-rorschach-ransomware-gang/
2¡¢Winter VivernʹÓÃRoundcubeÎó²î¹¥»÷Å·Ö޵Ļú¹¹
ESETÔÚ10ÔÂ25ÈÕÅû¶ÁËWinter VivernÍÅ»ïÕë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¡£¡£¡£ÖÁÉÙ×Ô10ÔÂ11ÈÕÆð£¬£¬£¬£¬£¬¸ÃÍÅ»ï¾ÍһֱʹÓÃRoundcube WebmailЧÀÍÆ÷ÖеÄXSSÎó²î(CVE-2023-5631)¹¥»÷Å·ÖÞÕþ¸®»ú¹¹ºÍÖǿ⡣¡£¡£¹¥»÷Õßð³äOutlookÍŶӣ¬£¬£¬£¬£¬Í¨¹ý°üÀ¨ÌØÖƵÄSVGÎĵµµÄHTMLÓʼþÀ´Ô¶³Ì×¢Èëí§ÒâJavaScript´úÂ룬£¬£¬£¬£¬×îÖÕpayload¿É´Ó±»Ñ¬È¾µÄÍøÂçÓʼþЧÀÍÆ÷ÇÔÈ¡µç×ÓÓʼþ¡£¡£¡£¸ÃXSSÎó²îÒÑÓÚ10ÔÂ14ÈÕ±»ÐÞ¸´¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
3¡¢MandiantÌáÐÑVolt TyphoonÕë¶ÔÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©
¾Ý10ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬MandiantÌáÐÑÖÎÀíÖ°Ô±×¢ÖØVolt TyphoonÕë¶ÔÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡£¡£×Ô2021ÄêÖÐÆÚÒÔÀ´£¬£¬£¬£¬£¬¸ÃÍÅ»ïÒѹ¥»÷ÁËͨѶ¡¢ÖÆÔì¡¢¹«¹²ÊÂÒµ¡¢ÔËÊä¡¢ÐÞ½¨¡¢º£Ê¡¢Õþ¸®¡¢ÐÅÏ¢ÊÖÒպͽÌÓýµÈÁìÓòµÄÖÖÖÖʵÌå¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ËûÃÇ¿ÉÄÜÏëÔÚÕ½Ê±ÖÆÔìÆÆËðÐÔÊÂÎñ£¬£¬£¬£¬£¬ËäȻûÓÐÇ鱨֤ʵÕâÒ»µã£¬£¬£¬£¬£¬µ«Ö÷ÒªÕë¶ÔÒªº¦»ù´¡ÉèÊ©µÄ»î¶¯Ê¹Æä²»µÃ²»ÓÅÏÈ˼Á¿¡£¡£¡£Ñо¿Ö°Ô±±Þ²ßÖÎÀíÕßÓÅÏÈÎªÃæÏò»¥ÁªÍøµÄ±ßÑØ×°±¸ºÍÍøÂç·ÓÉÆ÷´ò²¹¶¡ºÍ½ÓÄÉ»º½â²½·¥¡£¡£¡£
https://www.securityweek.com/mandiant-intelligence-chief-raises-alarm-over-chinas-volt-typhoon-hackers-in-us-critical-infrastructure/
4¡¢²àÐŵÀ¹¥»÷iLeakage¿ÉʹÓÃSafariÇÔÈ¡Apple×°±¸Êý¾Ý
ýÌå10ÔÂ26Èճƣ¬£¬£¬£¬£¬Ñо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖеÄÍÆ²â²àÐŵÀ¹¥»÷·½·¨iLeakage£¬£¬£¬£¬£¬¿ÉʹÓÃSafariÇÔÈ¡Mac¡¢iPhoneºÍiPadµÄÊý¾Ý¡£¡£¡£iLeakageÊÇÕë¶ÔApple Silicon CPUºÍSafariä¯ÀÀÆ÷µÄÍÆ²âÖ´Ðй¥»÷£¬£¬£¬£¬£¬Ëü¿ÉÓÃÓÚÒÔ¡°½üºõÍêÉÆµÄ׼ȷÐÔ¡±´ÓSafariÒÔ¼°iOSÉϵÄFirefox¡¢TorºÍEdge¼ìË÷Êý¾Ý¡£¡£¡£´ÓʵÖÊÉϽ²£¬£¬£¬£¬£¬ËüÊÇÒ»ÖÖÎÞ¼ÆÊ±Æ÷µÄSpectre¹¥»÷£¬£¬£¬£¬£¬¿ÉÒÔÈÆ¹ýËùÓÐä¯ÀÀÆ÷¹©Ó¦ÉÌʵÑéµÄ±ê×¼²àͨµÀ¹¥»÷µÄ±£»£»£»£»¤¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ileakage-attack-steals-emails-passwords-from-apple-safari/
5¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒµÄ¹¥»÷»î¶¯
10ÔÂ25ÈÕ£¬£¬£¬£¬£¬Cisco³ÆYoroTrooperÔÚ½üÆÚÖ÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÁªºÏÌå(CIS)¹ú¼Ò¡£¡£¡£¸ÃÍÅ»ïÓÚ2022Äê6ÔÂÊ״λîÔ¾£¬£¬£¬£¬£¬¿ÉÄÜÓëÈø¿Ë˹̹Óйأ¬£¬£¬£¬£¬»¹Í¨¹ýVPNµÈ·½·¨Î±×°À´×Ô°¢Èû°Ý½®¡£¡£¡£½ñÄê5ÔÂÖÁ8Ô£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÁ˶à¸ö¹úÓÐÍøÕ¾ºÍÕþ¸®ÊÂÇéÖ°Ô±µÄÕË»§¡£¡£¡£´ó´ó¶¼¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬²¢·Ö·¢¶¨ÖƵĶñÒâÈí¼þ£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Êý¾ÝºÍƾ֤¡£¡£¡£×ÔÉϴα»¹ûÕæÅû¶ºó£¬£¬£¬£¬£¬YoroTrooper¾Íˢв¢À©Õ¹ÁËËûÃǵÄTTP£¬£¬£¬£¬£¬½«ËûÃÇ»ùÓÚPythonµÄÖ²Èë³ÌÐòÒÆÖ²µ½PowerShell£¬£¬£¬£¬£¬²¢Ô½À´Ô½¶àµØ½ÓÄÉ×Ô½ç˵ֲÈë³ÌÐò£¬£¬£¬£¬£¬·ÅÆúÁËÒÔǰʹÓõÄÉÌÆ·»¯¶ñÒâÈí¼þ¡£¡£¡£
https://blog.talosintelligence.com/attributing-yorotrooper/
6¡¢KasperskyÐû²¼ÖØ´óµÄ¶ñÒâÈí¼þStripedFlyµÄÆÊÎö
10ÔÂ26ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚÖØ´óµÄ¶ñÒâÈí¼þ¿ò¼ÜStripedFlyµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÑÒþ²ØÔËÐÐÁË5Ä꣬£¬£¬£¬£¬¾ÝÔ¤¼ÆÒÑѬȾÁËÁè¼Ý100Íò¸öWindowsºÍLinuxϵͳ¡£¡£¡£StripedFly֮ǰ±»¹ýʧµØ¹éÀàΪMonero¼ÓÃܿ󹤣¬£¬£¬£¬£¬KasperskyÔÚÈ¥Äê·¢Ã÷ÁËËüµÄÕæÊÕþ¸®Ê£¬£¬£¬£¬£¬²¢·¢Ã÷¸Ã¿ò¼Ü×Ô2017Äê¾Í×îÏȻ¡£¡£¡£¸Ã¶ñÒâÈí¼þpayload°üÀ¨¶à¸öÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Äܹ»ÒÔAPT¡¢¼ÓÃÜ¿ó¹¤ÉõÖÁÀÕË÷ÍÅ»ïµÄÉí·ÝÐÐÊ¡£¡£¡£ÍÚ¿óÄ£¿£¿£¿£¿é¿ÉÄÜÊÇÉù¶«»÷Î÷µÄÕ½ÂÔ£¬£¬£¬£¬£¬Ò²ÊǸöñÒâÈí¼þÄܹ»ºã¾ÃÈÆ¹ý¼ì²âµÄÖ÷ÒªÒòËØ£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷Ҫͨ¹ýÆäËüÄ£¿£¿£¿£¿éÇÔÈ¡Êý¾ÝºÍÈëÇÖϵͳ¡£¡£¡£
https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/


¾©¹«Íø°²±¸11010802024551ºÅ