MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв

Ðû²¼Ê±¼ä 2024-02-19

1. MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Check Point Research (CPR) ·¢Ã÷Microsoft OutlookÖб£´æÑÏÖØÇå¾²Îó²î¡£¡£¡£ ¡£¡£¡£±»³ÆÎª#MonikerLink£»£»£»£»£»£»£»¸ÃÎó²îÔÊÐíÍþвÐÐΪÕßÔÚÆäÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£²©¿ÍÎÄÕÂÖÐÏêϸÏÈÈÝÁËÕâÏîÑо¿£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷Á˸ÃÎó²î¿ÉÄÜ»áʹÓà Outlook ´¦Öóͷ£Ä³Ð©³¬Á´½ÓµÄ·½·¨¡£¡£¡£ ¡£¡£¡£¸ÃÎó²î±»¸ú×ÙΪCVE-2024-21413£¬£¬£¬£¬£¬£¬£¬ CVSS ÆÀ·ÖΪ 9.8£¨Âú·Ö 10£©£¬£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²î¾ßÓÐÑÏÖØÑÏÖØÐÔÇҸ߶ȿÉʹÓ㬣¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õßͨ¹ý×îÉÙµÄÓû§½»»¥À´ÆÆËðϵͳ¡£¡£¡£ ¡£¡£¡£Õâ¿ÉÄܻᵼÖÂϵͳÍêÈ«ÊÜË𡢾ܾøÐ§ÀͺÍÊý¾Ýй¶¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÖ´ÐÐí§Òâ´úÂë¡¢ÇÔÈ¡Êý¾ÝºÍ×°ÖöñÒâÈí¼þ¡£¡£¡£ ¡£¡£¡£¸ÃÎÊÌâµÄ±¬·¢ÊÇÓÉÓÚ Outlook ´¦Öóͷ£¡°file://¡±³¬Á´½ÓµÄ·½·¨Ôì³ÉµÄ£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÑÏÖØµÄÇå¾²Òþ»¼¡£¡£¡£ ¡£¡£¡£Íþв¼ÓÈëÕß¿ÉÒÔÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐÐδ¾­ÊÚȨµÄ´úÂë¡£¡£¡£ ¡£¡£¡£CPR µÄÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬#MonikerLink Îó²îÀÄÓÃÁË Windows ÉϵÄ×é¼þ¹¤¾ßÄ£×Ó ( COM )£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÊÐíÖ´ÐÐδ¾­ÊÚȨµÄ´úÂ벢й¶ÍâµØ NTLM ƾ֤ÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îʹÓÃÓû§µÄ NTLM ƾ֤À´Í¨¹ý Windows ÖÐµÄ COM Ö´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£µ±Óû§µ¥»÷¶ñÒⳬÁ´½Óʱ£¬£¬£¬£¬£¬£¬£¬Ëü»áÅþÁ¬µ½Óɹ¥»÷Õß¿ØÖƵÄÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆÆËðÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢²¢¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¡£¡£ ¡£¡£¡£ÕâʹµÃ¹¥»÷ÕßÄܹ»ÈƹýOffice Ó¦ÓóÌÐòÖеÄÊܱ£»£»£»£»£»£»£»¤ÊÓͼģʽ£¬£¬£¬£¬£¬£¬£¬Ô¶³ÌŲÓà COM ¹¤¾ß²¢ÔÚÊܺ¦ÕßµÄÅÌËã»úÉÏÖ´ÐдúÂë¡£¡£¡£ ¡£¡£¡£


https://www.hackread.com/monikerlink-bug-microsoft-outlook-data-malware/


2. FBI ͨ¼©·¸ Zeus ºÍ IcedID ¶ñÒâÈí¼þÖ÷ıÈÏ×ï


2ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÎÚ¿ËÀ¼¹«ÃñÔÚÃÀ¹úÈÏ¿É×Ô¼ºÔÚ 2009 Äê 5 ÔÂÖÁ 2021 Äê 2 ÔÂʱ´ú¼ÓÈëÁËÁ½¸ö²î±ðµÄ¶ñÒâÈí¼þÍýÏ루Zeus ºÍ IcedID£©¡£¡£¡£ ¡£¡£¡£37 ËêµÄάÑÇÇÐ˹À­·ò¡¤ÒÁ¸êÁÐÎ¬Ææ¡¤Åí³þ¿Æ·òÓÚ 2022 Äê 10 Ô±»ÈðÊ¿Õþ¸®¾Ð²¶£¬£¬£¬£¬£¬£¬£¬²¢ÓÚÈ¥Äê±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£ ¡£¡£¡£2012Ä꣬£¬£¬£¬£¬£¬£¬Ëû±»ÁÐÈëÁª°îÊÓ²ì¾ÖµÄͨ¼©Ãûµ¥¡£¡£¡£ ¡£¡£¡£ÃÀ¹ú˾·¨²¿ (DoJ)½« PenchukovÐÎòΪ¡°Á½¸ö¶à²ú¶ñÒâÈí¼þ×éÖ¯µÄÏòµ¼Õß¡±£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓöñÒâÈí¼þѬȾÁËÊýǧ̨ÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÀÕË÷Èí¼þºÍÊý°ÙÍòÃÀÔª±»µÁ¡£¡£¡£ ¡£¡£¡£ÆäÖаüÀ¨ Zeus ÒøÐÐľÂí£¬£¬£¬£¬£¬£¬£¬¸ÃľÂíÓÐÖúÓÚÇÔÈ¡ÒøÐÐÕË»§ÐÅÏ¢¡¢ÃÜÂ롢СÎÒ˽¼Òʶ±ðÂëÒÔ¼°µÇÂ¼ÍøÉÏÒøÐÐÕË»§ËùÐèµÄÆäËûÏêϸÐÅÏ¢¡£¡£¡£ ¡£¡£¡£±»¸æ»¹±»Ö¸¿ØÖÁÉÙ´Ó 2018 Äê 11 ÔÂÆð×ÊÖúÏòµ¼Éæ¼°IcedID£¨ÓÖÃû BokBot£©¶ñÒâÈí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ó¶øÎª¶ñÒâ»î¶¯Ìṩ±ãµ±¡£¡£¡£ ¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»³äµ±ÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÆäËûÓÐÓøºÔØ£¨ÀýÈçÀÕË÷Èí¼þ£©µÄ¼ÓÔØ³ÌÐò¡£¡£¡£ ¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬ÕýÈçÊÓ²ì¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹ (Brian Krebs)ÔÚ 2022 Ä걨µÀµÄÄÇÑù£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÓëÎÚ¿ËÀ¼Ç°×Üͳά¿ËÍС¤ÑÇŬ¿ÆÎ¬Ææ (Victor Yanukovych) µÄÕþÖιØÏµ£¬£¬£¬£¬£¬£¬£¬Ëû¶àÄêÀ´ÀÖ³ÉÌÓ±ÜÎÚ¿ËÀ¼ÍøÂç·¸·¨ÊÓ²ìÖ°Ô±µÄÆðËß¡£¡£¡£ ¡£¡£¡£


https://thehackernews.com/2024/02/fbis-most-wanted-zeus-and-icedid.html


3. CISA ³Æ Akira ÀÕË÷ÍÅ»ïÕýÔÚʹÓà Cisco ASA/FTD Îó²îCVE-2020-3259 


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ÔÚÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖÐÌí¼ÓÁË Ò»¸ö Cisco ASA ºÍ FTD Îó²î£¬£¬£¬£¬£¬£¬£¬±àºÅΪCVE-2020-3259  £¨CVSS ÆÀ·Ö£º7.5£©¡£¡£¡£ ¡£¡£¡£Îó²î CVE-2020-3259 ÊÇÒ»¸ö±£´æÓÚ ASA ºÍ FTD Web ЧÀͽӿÚÖеÄÐÅϢй¶ÎÊÌâ¡£¡£¡£ ¡£¡£¡£Ë¼¿ÆÓÚ 2020 Äê 5 ÔÂÐÞ¸´Á˸ÃÎó²î¡£¡£¡£ ¡£¡£¡£CISA ½«¸ÃÎÊÌâÁÐΪÒÑÖªÓÃÓÚÀÕË÷Èí¼þ»î¶¯µÄÎÊÌ⣬£¬£¬£¬£¬£¬£¬µ«¸Ã»ú¹¹Ã»ÓÐ͸¶ÄÄЩÀÕË÷Èí¼þ×éÖ¯ÕýÔÚÆð¾¢Ê¹ÓøÃÎÊÌâ¡£¡£¡£ ¡£¡£¡£Truesec CSIRT ÍÅ¶Ó ·¢Ã÷ȡ֤Êý¾ÝÅú×¢ Akira ÀÕË÷Èí¼þ×éÖ¯¿ÉÄÜÕýÔÚÆð¾¢Ê¹ÓÃ¾ÉµÄ Cisco ASA£¨×Ô˳ӦÇå¾²×°±¸£©ºÍ FTD£¨Firepower Íþв·ÀÓù£©Îó²î£¬£¬£¬£¬£¬£¬£¬¸ú×Ù±àºÅΪ CVE-2020-3259¡£¡£¡£ ¡£¡£¡£Akira ÀÕË÷Èí¼þ ×Ô 2023 Äê 3 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁ˶à¸öÐÐÒµµÄ¶à¸ö×éÖ¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨½ÌÓý¡¢½ðÈںͷ¿µØ²ú¡£¡£¡£ ¡£¡£¡£ÓëÆäËûÀÕË÷Èí¼þÍÅ»ïÒ»Ñù£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÒ»¿îÕë¶Ô VMware ESXi ЧÀÍÆ÷µÄ Linux ¼ÓÃÜÆ÷¡£¡£¡£ ¡£¡£¡£


https://securityaffairs.com/159244/cyber-crime/cisa-cisco-cve-2020-3259-akira-ransomware.html


4. ÒÔÉ«ÁÐ NSO ×é֝ɿÏÓ¶Ô WhatsApp ¾ÙÐС°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷


2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐÌØ¹¤Èí¼þ¹«Ë¾ NSO Group ÉæÏÓʹÓÃÒ»ÖÖÐÂÓ±µÄ¡°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷À´Õë¶Ô WhatsApp ÉÏδ¾­ÏÓÒɵÄÓû§£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¼´¿É̻¶ËûÃǵÄ×°±¸ÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÓÚ 2023 Äê 15 ÈÕÐÇÆÚËÄÏò Hackread.com ·ÖÏíµÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬WhatsApp ÔÚ 2019 Äê 5 Ô·¢Ã÷Æäϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§×°±¸ÉÏ×°Öà Pegasus ÌØ¹¤Èí¼þ¡£¡£¡£ ¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»Ê¹ÓÃÀ´Õë¶ÔÈ«ÇòµÄÕþ¸®¹ÙÔ±ºÍ»î¸ÐÈËÊ¿¡£¡£¡£ ¡£¡£¡£WhatsApp ¾ÍÕâÖÖʹÓÃÐÐΪÆðËßNSO ¼¯ÍÅ£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÃÀ¹úÉÏËß·¨ÔººÍ×î¸ß·¨ÔºÉÏËß¾ùʧ°Ü¡£¡£¡£ ¡£¡£¡£Enea ÌᳫÁËÒ»ÏîÊӲ죬£¬£¬£¬£¬£¬£¬ÒÔ²éÃ÷²ÊÐÅÖ¸ÎÆ¹¥»÷ÊÇÔõÑù±¬·¢µÄ¡£¡£¡£ ¡£¡£¡£ËûÃÇ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔͨ¹ý·¢ËͲÊÐÅÀ´ÏÔʾĿµÄ×°±¸ºÍ²Ù×÷ϵͳ°æ±¾£¬£¬£¬£¬£¬£¬£¬¶øÎÞÐèÓû§½»»¥¡£¡£¡£ ¡£¡£¡£MMS UserAgent ÊÇÒ»¸ö±êʶ²Ù×÷ϵͳºÍ×°±¸£¨ÀýÈçÔËÐÐ Android µÄÈýÐÇÊÖ»ú£©µÄ×Ö·û´®£¬£¬£¬£¬£¬£¬£¬¶ñÒâÐÐΪÕß¿ÉÒÔʹÓà MMS UserAgent À´Ê¹ÓÃÎó²î¡¢¶¨ÖƶñÒâ¸ºÔØ»ò²ß»®ÍøÂç´¹Âڻ¡£¡£¡£ ¡£¡£¡£


https://www.hackread.com/israeli-nso-group-mms-fingerprint-attack-whatsapp/


5. Ñо¿ÍŶӷ¢Ã÷Turla APT °²ÅÅÐ嵀 TinyTurla-NG ºóÃÅ


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ Talos µÄר¼Ò·¢Ã÷ÓÉ Turla APT ×éÖ¯²ß»®µÄÕë¶Ô²¨À¼·ÇÕþ¸®×éÖ¯µÄ»î¶¯¡£¡£¡£ ¡£¡£¡£Õâ´Î¹¥»÷ʹÓÃÁËÒ»ÖÖÐÂÓ±µÄºóÃÅ£¬£¬£¬£¬£¬£¬£¬TinyTurla-NG¡£¡£¡£ ¡£¡£¡£TinyTurla-NG µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÄܹ»³äµ±ºóÃÅ£¬£¬£¬£¬£¬£¬£¬µ±¼ì²âµ½»ò×èÖ¹ÆäËûºÚ¿ÍÒªÁìʱ£¬£¬£¬£¬£¬£¬£¬ºóÞͻᱻ¼¤»î¡£¡£¡£ ¡£¡£¡£¼Í¼ÔÚ°¸µÄ¹¥»÷»î¶¯´Ó 2023 Äê 12 Ô 18 ÈÕÒ»Á¬µ½ 2024 Äê 1 Ô 27 ÈÕ£¬£¬£¬£¬£¬£¬£¬²»¹ýÓÐÈËÍÆ²â¹¥»÷¿ÉÄÜÔçÔÚ 2023 Äê 11 Ô¾Í×îÏÈÁË¡£¡£¡£ ¡£¡£¡£²¡¶¾Í¨¹ýÊÜѬȾµÄ WordPress ÍøÕ¾Èö²¥£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾³äµ±ÏÂÁîºÍ¿ØÖÆ (C2) ЧÀÍÆ÷¡£¡£¡£ ¡£¡£¡£TinyTurla-NG Äܹ»´Ó C2 ЧÀÍÆ÷Ö´ÐÐÏÂÁî¡¢ÉÏ´«ºÍÏÂÔØÎļþÒÔ¼°°²Åž籾ÒÔ´ÓÃÜÂëÖÎÀíÊý¾Ý¿âÇÔÈ¡ÃÜÂë¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬TinyTurla-NG ³äµ±½»¸¶ PowerShell ¾ç±¾µÄÇþµÀ£¬£¬£¬£¬£¬£¬£¬³ÆÎª TurlaPower-NG£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÌáÈ¡ÓÃÓÚ±£»£»£»£»£»£»£»¤Ê¢ÐÐÃÜÂëÖÎÀíÆ÷Êý¾Ý¿âµÄÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


https://meterpreter.org/turla-apt-deploys-new-tinyturla-ng-backdoor/


6. Alpha ÀÕË÷Èí¼þ´Ó NetWalker »Ò½ýÖÐáÈÆð


2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Alpha ÊÇÒ»ÖÖÐÂÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬ÓÚ 2023 Äê 2 ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ×î½ü¼¸ÖÜÔöÇ¿ÁËÔË×÷£¬£¬£¬£¬£¬£¬£¬ÓëÔçÒѲ»±£´æµÄ NetWalker ÀÕË÷Èí¼þºÜÊÇÏàËÆ£¬£¬£¬£¬£¬£¬£¬NetWalker ÀÕË÷Èí¼þÓÚ 2021 Äê 1 ÔÂÔÚÒ»´Î ¹ú¼ÊÖ´·¨Ðж¯ºóÏûÊÅ¡£¡£¡£ ¡£¡£¡£¶Ô Alpha µÄÆÊÎöÕ¹ÏÖÁËÓë¾É°æ NetWalker ÀÕË÷Èí¼þµÄÏÔÖøÏàËÆÖ®´¦¡£¡£¡£ ¡£¡£¡£ÕâÁ½ÖÖÍþв¶¼Ê¹ÓÃÀàËÆµÄ»ùÓÚ PowerShell µÄ¼ÓÔØ³ÌÐòÀ´×ª´ïÓÐÓøºÔØ¡£¡£¡£ ¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬Alpha ºÍ NetWalker ÓÐÓøºÔØÖ®¼ä±£´æ´ó×Ú´úÂëÖØµþ¡£¡£¡£ ¡£¡£¡£Õâ°üÀ¨£ºÁ½¸öÓÐÓøºÔØÖ÷Òª¹¦Ð§µÄÒ»Ñùƽ³£Ö´ÐÐÁ÷³Ì£»£»£»£»£»£»£»ÔÚµ¥¸öÏß³ÌÖд¦Öóͷ£Á½¸ö¹¦Ð§£ºÀú³ÌÖÕÖ¹ºÍЧÀÍÖÕÖ¹£»£»£»£»£»£»£»ÒÑÆÊÎö API µÄÀàËÆÁбí¡£¡£¡£ ¡£¡£¡£ËäÈ» API ÊÇʹÓùþÏ£ÖµÆÊÎöµÄ£¬£¬£¬£¬£¬£¬£¬µ«ËùʹÓõĹþÏ£Öµ²¢²»Ïàͬ£»£»£»£»£»£»£»Á½¸öÓÐÓøºÔؾßÓÐÏàËÆµÄÉèÖ㬣¬£¬£¬£¬£¬£¬°üÀ¨Ìø¹ýµÄÎļþ¼Ð¡¢ÎļþºÍÀ©Õ¹ÃûµÄÁбí£»£»£»£»£»£»£»ÒÔ¼°ÒªkillµÄÀú³ÌºÍЧÀ͵ÄÁбí£»£»£»£»£»£»£»¼ÓÃÜÍê³Éºó£¬£¬£¬£¬£¬£¬£¬Á½¸öÓÐÓøºÔض¼»áʹÓÃÔÝʱÅú´¦Öóͷ£Îļþɾ³ý×ÔÉí£»£»£»£»£»£»£»Á½Õß¶¼ÓÐÀàËÆµÄÖ§¸¶ÃÅ»§£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÏàͬµÄÐÂÎÅ£º¡°ÈçÐèÊäÈ룬£¬£¬£¬£¬£¬£¬ÇëʹÓÃÓû§´úÂ롱¡£¡£¡£ ¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/alpha-netwalker-ransomware?web_view=true