Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ£»£»£»£»£»£»£»·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2020-03-161.Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ
Turla APTÊÇÒ»¸ö³ÉÊì¡¢ÖØ´óÇÒ¾ßÓÐÕ½ÂÔÖØµãµÄÍøÂçÌØ¹¤×éÖ¯£¬£¬£¬£¬£¬¸Ã×éÖ¯Õë¶ÔÈ«Çò¿ÆÑС¢Íâ½»ºÍ¾üÊ»ú¹¹µÄ¹¥»÷ÒÑÓÐÊ®¶àÄêµÄÀúÊ·£¬£¬£¬£¬£¬²¢ÇÒÒ»Ö±ÔÚÕë¶Ô±±´óÎ÷ÑóÌõÔ¼×éÖ¯£¨NATO£©ºÍ¶ÀÁªÌ壨CIS£©¹ú¼Ò¡£¡£¡£TurlaÒ»Ö±¿ª·¢×Ô¼º¶ÀÍ̵ġ¢ÏȽøµÄ¶ñÒâÈí¼þºÍ¹¤¾ß£¬£¬£¬£¬£¬²¢½ÓÄÉÐµĹ¥»÷ºÍ»ìÏýÒªÁ죬£¬£¬£¬£¬Insikt GroupÆÀ¹ÀÒÔΪTurlaÔÚδÀ´¼¸ÄêÄÚÈÔ½«ÊÇÒ»¸ö»îÔ¾µÄ¡¢ÏȽøµÄÍþв¡£¡£¡£Recorded FutureµÄÐÂÑо¿ÌṩÁË×Ô¶¯¸ú×ÙºÍʶ±ðTurla»ù´¡¼Ü¹¹µÄÒªÁ죬£¬£¬£¬£¬ÖØµã¹Ø×¢¼¸ÖÖÓëTurlaÓйصĶñÒâÈí¼þÀàÐÍ£¬£¬£¬£¬£¬°üÀ¨MosquitoºóÃźÍÐ®ÖÆµÄÒÁÀÊTwoFace ASPX Web Shell¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/turla-apt-infrastructure/
2.ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄDDR4ÄÚ´æÈÔÊÜRowhammer¹¥»÷Ó°Ïì
VUSecÑо¿Ö°Ô±·¢Ã÷ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄÏÖ´úÄÚ´æÄ£¿£¿£¿£¿éÈÔ½«ÃæÁÙRowhammer£¨ÄÚ´æÎ»·×ª£©¹¥»÷Σº¦¡£¡£¡£ÏÖÔÚÕë¶ÔRowhammer¹¥»÷µÄ·À»¤²½·¥¹ØÓÚÒÑÖªµÄRowhammer±äÖÖÊÇÓÐÓõ쬣¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÑÝʾÁË¿ÉÈÆ¹ýÄ¿½ñ»º½â²½·¥µÄÐÂÐÍRowhammer¹¥»÷£¨CVE2020-10255£©¡£¡£¡£ÐµÄÄÚ´æÎ»·×ª¹¥»÷¿ÉÔÚÐí¶à×°±¸ÉÏÔËÐУ¬£¬£¬£¬£¬°üÀ¨¹È¸è¡¢ÈýÐǺÍÒ»¼ÓµÄÖÇÄÜÊÖ»ú¡£¡£¡£VUSecÓÚ2019Äê11ÔÂÏòËùÓÐÊÜÓ°ÏìµÄ¸÷·½Åû¶ÁËеÄRowhammer¹¥»÷£¬£¬£¬£¬£¬µ«ÐµĻº½â²½·¥ÊµÑéÆðÀ´²¢½ûÖ¹Ò×£¬£¬£¬£¬£¬²¢ÇÒÐè񻮮·ÑһЩʱ¼äÀ´°²ÅÅ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/
3.BlackWaterºóÃÅÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ
MalwareHunterTeam·¢Ã÷Ò»¸öÃûΪBlackWaterµÄÐÂÐͺóÃÅ£¬£¬£¬£¬£¬¸ÃºóÃÅÔÚαװ³ÉÐéαCOVID-19ÐÅÏ¢µÄͬʱ»¹ÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ¡£¡£¡£BlackWaterͨ¹ýÒ»¸öÃûΪImportant-COVID-19.rarµÄRARÎļþÈö²¥£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú¸ÃÎļþͨ¹ýºÎÖÖ·½·¨·Ö·¢£¬£¬£¬£¬£¬µ«ºÜ¿ÉÄÜÊÇͨ¹ý´¹ÂÚÓʼþ·Ö·¢¡£¡£¡£ÎļþÖаüÀ¨ÃûΪImportant-COVID-19.docx.exeµÄÎļþ£¬£¬£¬£¬£¬ÓÉÓÚWindowsĬÈÏÒþ²ØÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬Òò´ËÐí¶àÈË¿ÉÄÜ»áÎóÒÔΪ¸ÃÎļþÊÇdocxÎļþ¶ø½«Æä·¿ª¡£¡£¡£BlackWaterʹÓÃCloud Workers¾ÙÐÐC2ͨѶ£¬£¬£¬£¬£¬ÕâʹµÃ¼ì²âºÍ×èÖ¹¶ñÒâÁ÷Á¿±äµÃÔ½·¢ÄÑÌâ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/
4.Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2ÏàÖúͬ°éµÄ¿Í»§Êý¾Ý±»µÁ
Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2×î´óµÄÏàÖúͬ°éÖ®Ò»Aerial DirectÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¿Í»§Êý¾Ý±»µÁ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2ÔÂ26ÈÕδ¾ÊÚȨµÄµÚÈý·½Í¨¹ýÍⲿ±¸·ÝµÄÊý¾Ý¿â»á¼ûÁËÆä¿Í»§Êý¾Ý£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÖаüÀ¨ÁùÄêÄÚµÄÄ¿½ñºÍÒÑÓâÆÚ¶©»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¹«Ë¾µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍ²úÆ·ÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÈκÎÃÜÂë»ò²ÆÎñÐÅÏ¢±»µÁ¡£¡£¡£¸Ã¹«Ë¾ÒÑΪÊÜÓ°ÏìµÄ¿Í»§½¨ÉèÁËÒ»¸öÖ§³ÖÍøÕ¾£¬£¬£¬£¬£¬²¢½¨ÒéËûÃǸü¸ÄÃÜÂë¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.co.uk/2020/03/13/o2_customer_data_slurped_through_partner_databse/
5.·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ñ¡¾ÙδÊÜÓ°Ïì
·¨¹úÂíÈüÊÐÔÚ¼´½«ÓÚ3ÔÂ15ÈÕÖÁ3ÔÂ22ÈÕ¾ÙÐÐÊÐÕþÑ¡¾Ù֮ǰÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¡£¸Ã´ÎÑ¡¾ÙµÄÄ¿µÄÊÇÑ¡¾Ù¸ÃÊа˸ö²¿·ÖµÄÒé»á¡¢ÊÐÒé»áºÍ°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒé»á¡£¡£¡£Æ¾Ö¤¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨Anssi£©µÄÐÂÎÅ£¬£¬£¬£¬£¬¸Ã´Î¹¥»÷Ôì³É°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒÔ¼°ÂíÌá¸ñȺµºµÄ300̨»úе̱»¾£¬£¬£¬£¬£¬ÕâЩ»úеÓÃÓÚ½¨ÉèÊðÀíÊðÃûÁÐ±í£¬£¬£¬£¬£¬Òò´ËÕâЩÊÂÇ鱨ÐèÊÖ¶¯Íê³É¡£¡£¡£ÊÐÕþÌüÒѾȷÈÏÊÐÕþÑ¡¾Ù½«Õý³£¾ÙÐС£¡£¡£¾ÝÖªÇéÈËʿ͸¶£¬£¬£¬£¬£¬¸ÃÍøÂç¹¥»÷µÄ¹æÄ£ÊÇØ¨¹ÅδÓе쬣¬£¬£¬£¬ÂíÈüÊкʹ󶼻áÊÐÕþÌüÊܵ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÓë¹¥»÷»òÀÕË÷Èí¼þ¼Ò×åÓйصÄÏêϸÐÅÏ¢¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/99658/malware/marseille-city-massive-attack.html
6.½Ý¿Ëйڲ¡¶¾¼ì²âʵÑéÊÒÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬ITϵͳÔÝʱ¹Ø±Õ
½Ý¿Ë×î´óµÄCOVID-19¼ì²âʵÑéÊÒÖ®Ò»£¨²¼¶ûŵ´óѧҽԺ£©Ôâµ½ÍøÂç¹¥»÷¡£¡£¡£Ò½Ôº¹ÙÔ±ÉÐδ͸¶Çå¾²ÊÂÎñµÄÐÔ×Ó£¬£¬£¬£¬£¬µ«¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬£¬¸ÃÊÂÎñÒѾÑÏÖØµ½±ØÐèÍÆ³Ù½ôÆÈÍâ¿ÆÊÖÊõºÍ½«Ðµļ±Ö¢»¼Õß×ªÒÆµ½ÖÜΧµÄÊ¥°²ÄÝ´óѧҽԺ¡£¡£¡£ÔÚÊÂÎñ±¬·¢Ê±´ú£¬£¬£¬£¬£¬²¼¶ûŵ´óѧҽԺ±»ÆÈ¹Ø±ÕÁËÕû¸öITÍøÂ磬£¬£¬£¬£¬ÆäÁíÍâÁ½¸ö·ÖÖ§»ú¹¹-¶ùͯҽԺºÍ¸¾²úÒ½ÔºÒ²Êܵ½ÁËÓ°Ïì¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬½Ý¿Ë¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©¡¢½Ý¿Ë¾¯Ô±£¨NCOZ£©ºÍÒ½ÔºµÄITÖ°Ô±ÕýÔÚÏàÖúÒÔ»Ö¸´Ò½ÔºµÄITÍøÂç¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/