MOVEit TransfeÖÐÎó²îCVE-2023-34362±»´ó¹æÄ£Ê¹ÓÃ

Ðû²¼Ê±¼ä 2023-06-05

1¡¢MOVEit TransfeÖÐÎó²îCVE-2023-34362±»´ó¹æÄ£Ê¹ÓÃ


¾ÝýÌå6ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеÄÎó²î£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý¡£¡£ ¡£¡£ÕâÊÇÒ»¸öSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£ ¡£¡£Rapid7Ñо¿Ö°Ô±ÔÚ±»Ê¹ÓÃ×°±¸ÉÏ·¢Ã÷ÁËÏàͬµÄÃûΪhuman2.aspµÄwebshell£¬£¬£¬£¬£¬£¬£¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖС£¡£ ¡£¡£MandiantÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃǵÄÊý¾ÝÏÔʾ´Ë´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬£¬£¬£¬µ«¾ÝϤÒѾ­ÓÐÐí¶à×éÖ¯Ôâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Êý¾Ý±»µÁ¡£¡£ ¡£¡£Progress SoftwareÒÑÐû²¼Õë¶ÔÍâµØºÍÔÆµÄ»º½â°ì·¨¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/


2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ5ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcaja͸¶£¬£¬£¬£¬£¬£¬£¬ËüÕýÔÚ´¦Öóͷ£Ó°ÏìÁ˶à¸öЧÀÍ´¦µÄÀÕË÷¹¥»÷¡£¡£ ¡£¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊУ¬£¬£¬£¬£¬£¬£¬ÖÎÀí×ÅÁè¼Ý46ÒÚÃÀÔªµÄÏûºÄ´û¿î¡£¡£ ¡£¡£PlayÉù³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿·ÖÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉñÃØÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕÕºÍÌõÔ¼µÈ¡£¡£ ¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄÉúÒ⣬£¬£¬£¬£¬£¬£¬µç×ÓÒøÐС¢×Ô¶¯È¡¿î»úºÍ¸÷ЧÀÍ´¦Ò²¶¼ÔÚÕý³£ÔË×÷¡£¡£ ¡£¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÓÚÊÇ·ñ½»Êê½ðµÄѯÎÊ¡£¡£ ¡£¡£


https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack


3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÁè¼Ý250ÍòÈ˵ÄÐÅϢй¶


ýÌå6ÔÂ1Èճƣ¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶¡£¡£ ¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉ˰ÈËʶÓÖÃûºÍÁÙ´²ÐÅÏ¢µÈ¡£¡£ ¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕ×îÏÈ×¢²áµÄ³ÉÔ±¡£¡£ ¡£¡£HPHC½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£ ¡£¡£ÏÖÔÚÉÐÎÞÀÕË÷ÍÅ»ïÉù³ÆÎª´ËÊÂÈÏÕæ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/


4¡¢Ñо¿ÍŶӷ¢Ã÷Camaro DragonʹÓÃкóÃÅTinyNoteµÄ¹¥»÷


Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢Ã÷ÁËCamaro Dragon½üÆÚ¹¥»÷»î¶¯µÄÏêÇé¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢Ð§ÀÍÆ÷ÉÏ·¢Ã÷ÁËеĻùÓÚGoµÄºóÃÅ£¬£¬£¬£¬£¬£¬£¬ÃûΪTinyNote¡£¡£ ¡£¡£¸ÃºóÃÅͨ¹ýÓëÍâ½»ÊÂÎñÏà¹ØµÄÃû³Æ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý¡£¡£ ¡£¡£Ëü»¹¿ÉÈÆ¹ýÓ¡¶ÈÄáÎ÷ÑÇÊ¢ÐеÄɱ¶¾Èí¼þSmadAV¡£¡£ ¡£¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines¾ÙÐлù±¾µÄ»úеö¾ÙºÍÏÂÁîÖ´ÐС£¡£ ¡£¡£


https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/


5¡¢KasperskyÅû¶ʹÓÃÁãµã»÷Îó²î¹¥»÷iOSµÄTriangulation»î¶¯


6ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÅû¶ÁËʹÓÃÁãµã»÷Îó²î¹¥»÷iOS×°±¸µÄTriangulation»î¶¯¡£¡£ ¡£¡£¸Ã»î¶¯ÖÁÉÙ´Ó2019Äê×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£ ¡£¡£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessageЧÀÍÏòiOS×°±¸·¢Ë͵ÄÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬¸½¼þÖаüÀ¨Îó²îʹÓᣡ£ ¡£¡£¸ÃÐÂÎÅÔÚûÓÐÈκÎÓû§½»»¥µÄÇéÐÎÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£ ¡£¡£Ê¹ÓÃÎó²î´ÓC2ЧÀÍÆ÷ÏÂÔØ¶à¸öºóÐø½×¶Î£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚÌáȨµÄÆäËüÎó²îÒÔ¼°×îÖÕpayload¡£¡£ ¡£¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬£¬ËüÖ§³ÖÒ»×éÓÃÓÚÍøÂçϵͳºÍÓû§ÐÅÏ¢µÄÏÂÁ£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÒÔÔËÐдÓC2×÷Ϊ²å¼þÄ£¿£¿£¿£¿£¿£¿éÏÂÔØµÄí§Òâ´úÂë¡£¡£ ¡£¡£´Ë´Î¹¥»÷ÀֳɵØÑ¬È¾ÁËÔËÐÐiOS 15.7µÄ×°±¸¡£¡£ ¡£¡£


https://securelist.com/operation-triangulation/109842/


6¡¢Trend MicroÐû²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄÆÊÎö±¨¸æ


5ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£Ñо¿Ö°Ô±¼ì²éÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾£¬£¬£¬£¬£¬£¬£¬·¢Ã÷RoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÏàËÆ¶È¡£¡£ ¡£¡£»£»£»ùÓÚBinDiffµÄ½ÏÁ¿·¢Ã÷£¬£¬£¬£¬£¬£¬£¬º¯ÊýµÄÏàËÆ¶ÈΪ93.2%£¬£¬£¬£¬£¬£¬£¬»ù±¾¿éµÄÏàËÆ¶ÈΪ99.3%£¬£¬£¬£¬£¬£¬£¬¶øÌø×ªµÄÏàËÆ¶ÈΪ98.4%¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¶þÕß¶¼Ê¹ÓÃOpenSSLµÄAES¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÀàËÆµÄ¼äЪ¼ÓÃÜÊÖÒÕÀ´¼ÓËÙ¼ÓÃÜÀú³Ì¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬BlackSuitҪôÊÇͳһ¿ª·¢Õß¿ª·¢µÄбäÌ壬£¬£¬£¬£¬£¬£¬ÒªÃ´ÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ£¬£¬£¬£¬£¬£¬£¬»òÕßÊÇRoyalµÄÁ¥Êô»ú¹¹¶Ôԭʼ´úÂë¾ÙÐÐÁËÐ޸ġ£¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html