Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄÔ˶¯

Ðû²¼Ê±¼ä 2022-04-06

Fortinet¼ì²âµ½Deep Panda·Ö·¢Fire ChiliµÄÔ˶¯


3ÔÂ30ÈÕ£¬FortinetÐû²¼±¨¸æ³ÆÆä¼ì²âµ½APT×éÖ¯Deep PandaµÄ¹¥»÷Ô˶¯¡£¸ÃÍÅ»ïʹÓÃLog4ShellÎó²î¹¥»÷VMware Horizon·þÎñÆ÷£¬×îÖÕÖ¼ÔÚ×°ÖÃÒ»¸öÃûΪFire ChiliµÄÐÂÐÍrootkit¡£¸ÃrootkitʹÓÃFrostburn Studios£¨ÓÎÏ·¿ª·¢ÉÌ£©ºÍComodo£¨Çå¾²Èí¼þ£©µÄÖ¤Êé¾ÙÐÐÊý×ÖÊðÃû£¬ÈƹýÇå¾²¼ì²â¡£ÊÓ²ìDeep PandaÔ˶¯Ê±£¬Fortinet·¢Ã÷ÆäÓëWinntiÓÐÖØµþ¡£´Ë´ÎÔ˶¯Ö÷ÒªÕë¶Ô½ðÈÚ¡¢Ñ§Êõ¡¢»¯×±Æ·ºÍÂÃÓÎÐÐÒµ¡£


https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits



Kaspersky³ÆLazarusʹÓÃľÂí»¯DeFi Wallet·Ö·¢ºóÃÅ


KasperskyÔÚ3ÔÂ31ÈÕÐû²¼±¨¸æ³Æ£¬³¯ÏʺڿÍÍÅ»ïLazarusÕýÔÚʹÓÃľÂí»¯DeFiÓ¦Ó÷ַ¢ºóÃÅ¡£Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Ò»¸öľÂí»¯DeFi Wallet£¬±àÒëÈÕÆÚΪ2021Äê11Ô£¬¿ÉÒÔÔÚÄ¿µÄϵͳÉÏ×°ÖÃÒ»¸ö¹¦Ð§ÆëÈ«µÄºóÃÅ£¬¸ÃºóÃÅαװ³ÉÁËGoogle Chromeä¯ÀÀÆ÷¡£ÏÖÔÚÉв»ÇåÎú¸ÃÓ¦Óõķַ¢ÒªÁ죬ÍƲâ¿ÉÄÜÊÇ´¹ÂÚÓʼþ»òͨ¹ýÉ罻ýÌå¡£±ðµÄ£¬¹¥»÷ÕßʹÓÃÁËλÓÚº«¹úµÄ·þÎñÆ÷ÓëºóÞÙÐÐͨѶ¡£


https://securelist.com/lazarus-trojanized-defi-app/106195/



INKYÔÚ½üÆÚ·¢Ã÷ÐÂÒ»ÂÖʹÓÃCalendlyµÄ´¹ÂÚ¹¥»÷Ô˶¯


¾ÝýÌå3ÔÂ31ÈÕ±¨µÀ£¬INKYÑо¿ÍŶӷ¢Ã÷ʹÓÃCalendlyµÄ´¹ÂÚÔ˶¯¡£CalendlyÊÇÒ»¿îÊ¢ÐеÄÃâ·ÑÈÕÀúÓ¦Ó㬼¯³ÉÁËZoom£¬¿ÉÓÃÓÚ°²ÅžۻáºÍÔ¼»á¡£´Ë´ÎÔ˶¯Ê¼ÓÚ2ÔÂ⣬¹¥»÷Õßͨ¹ýCalendlyƽ̨ÌìÉú´¹ÂÚÓʼþ¡£Ê×ÏÈʹÓÃCalendlyÌí¼Ó×Ô½ç˵Á´½ÓµÄ¹¦Ð§²åÈë¶ñÒâÁ´½Ó£¬¸ÃÁ´½ÓǶÈëÔÚÉó²éÎĵµ°´¼üÖУ¬Óû§µã»÷ºó»á±»Öض¨Ïòµ½´¹ÂÚÒ³Ãæ£¬×îÖÕÇÔȡĿµÄµÄMicrosoftµÇ¼ƾ֤¡£


https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-microsoft-credentials-phishing/ 



PaloAlto Networks¶Ô¿Í»§ÌṩµÄÊÖÒÕÖ§³ÖÐÅÏ¢ÒâÍâй¶


ýÌå3ÔÂ31ÈÕ±¨µÀ£¬PaloAlto Networks(PAN) Ö§³ÖϵͳÖÐÉèÖùýʧµ¼Ö¿ͻ§µÄÃô¸ÐÐÅϢй¶¡£¸ÃÎÊÌâÓÉPANµÄÒ»¸ö¿Í»§ÔÚ±¾Ô·¢Ã÷£¬Ëû³Æ¿ÉÒÔ¿´µ½Ô¼Äª1989¸ö²»ÊôÓÚËûÃǵÄ×éÖ¯µÄÊÖÒÕÖ§³ÖÊÂÎñ¼Í¼£¬ÆäÖаüÀ¨ÓÃÓÚɨ³ý¹ýʧµÄ·À»ðǽÈÕÖ¾¡¢ÉèÖÃת´¢ºÍÍøÂçÇå¾²×é(NSG)½á¹¹µÈ¡£PANÌåÏÖûÓÐÈκÎÊý¾Ý±»ÏÂÔØ£¬²¢ÌåÏÖ´Ë´Îй¶ÊÂÎñµÄ¹æÄ£½öÏÞÓÚһλ¿Í»§¡£¾ÝϤ£¬¸ÃÎÊÌâµÄÐÞ¸´Ô¼ÄªÐèÒª8Ììʱ¼ä¡£


https://www.bleepingcomputer.com/news/security/palo-alto-networks-error-exposed-customer-support-cases-attachments/



AquaÐû²¼Õë¶ÔJupyter NotebookµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ


Aqua SecurityÓÚ3ÔÂ29ÈÕÐû²¼ÁËÕë¶ÔJupyterµÄ»ùÓÚPythonµÄÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£Jupyter NotebookÊÇÊý¾ÝרҵְԱÓÃÀ´´¦Öóͷ£Êý¾Ý¡¢±àдºÍÖ´ÐдúÂëÒÔ¼°¿ÉÊÓ»¯Ð§¹ûµÄ¿ªÔ´WebÓ¦Ó᣹¥»÷ÕßÊ×ÏÈͨ¹ýÉèÖùýʧµÄÓ¦Óûá¼û·þÎñÆ÷£¬ÏÂÔØÓÃÓÚ¹¥»÷µÄ¿âºÍ¹¤¾ß£¨ÀýÈç¼ÓÃܳÌÐò£©£¬È»ºóͨ¹ýÕ³ÌùPython´úÂë²¢Ö´Ðо籾ÊÖ¶¯½¨ÉèÀÕË÷Èí¼þ¡£¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬Ñо¿Ö°Ô±ÒÔΪ¿ÉÄÜÓë¶íÂÞ˹µÄºÚ¿ÍÍÅ»ïÓйØ¡£


https://blog.aquasec.com/python-ransomware-jupyter-notebook



Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ


4ÔÂ1ÈÕ£¬Lab52Ðû²¼ÓëTurlaÏà¹ØµÄAndroidÌØ¹¤Èí¼þµÄÊÖÒÕ±¨¸æ¡£½üÆÚ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪProcess ManagerµÄ¶ñÒâAPK¡£Ò»µ©×°Öã¬Ëü»áʹÓóÝÂÖÐÎͼ±êÒþ²ØÔÚAndroid×°±¸ÉÏ£¬Î±×°³Éϵͳ×é¼þ£¬²¢ÒªÇó»ñȡװ±¸µÄλÖᢷ¢ËͺÍÔĶÁÎı¾¡¢»á¼û´æ´¢¡¢Ê¹ÓÃÏà»úÕÕÏàÒÔ¼°Â¼ÖÆÒôƵµÈ18ÏîȨÏÞ¡£Ëü»¹»áÏÂÔØÆäËüµÄpayload£¬ÀýÈçRoz Dhan£¬¸ÃÌØ¹¤Èí¼þ¿ÉÄÜ»áͨ¹ý´ËÖÖ·½·¨£¬×¬È¡ÍƼöÓ¦ÓõÄÓ¶½ð¡£


https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/




Çå¾²¹¤¾ß


Socid-Extractor


´ÓСÎÒ˽¼Ò×ÊÁÏÍøÒ³/API ÏìÓ¦ÖÐÌáÈ¡ÓйØÓû§µÄÐÅÏ¢£¬²¢½«ÆäÉúÑÄΪ»úе¿É¶ÁÃûÌá£


https://github.com/soxoj/socid-extractor


GitBleed Tools


ÓÃÓÚ´Ó¾µÏñ git ´æ´¢¿âÖÐÌáÈ¡Êý¾Ý¡£


https://github.com/nightwatchcybersecurity/gitbleed_tools


ggshield


ÊÇÒ»¸ö CLI Ó¦ÓóÌÐò£¬¼ì²âÔ´´úÂëÖеÄÃÜÂë¡£


https://github.com/GitGuardian/ggshield


PackMyPayload


ÓÃÓÚ½«payload´ò°üµ½×÷Ϊ´æµµ/ÈÝÆ÷µÄÊä³öÎļþÖС£


https://securityonline.info/packmypayload-packages-payloads-into-output-containers/




Çå¾²ÆÊÎö


ºÚ¿ÍÂÛ̳ÉϳöÊÛµÄРBlackGuard ÃÜÂëÇÔÈ¡¶ñÒâÈí¼þ


https://www.bleepingcomputer.com/news/security/new-blackguard-password-stealing-malware-sold-on-hacker-forums/


FORCEDENTRY£ºÉ³ºÐÌÓÒÝ


https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html


Microsoft Build ½«ÓÚ 5 Ô 24 ÈÕÆô¶¯


https://news.softpedia.com/news/microsoft-build-will-kick-off-on-may-24-535139.shtml


Atento³ÆÈ¥ÄêµÄLockBitÀÕË÷¹¥»÷Ôì³É4200ÍòÃÀÔªËðʧ


https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/


Anonymous¹¥»÷¶íÂÞ˹Ͷ×ʹ«Ë¾Thozis Corp


https://securityaffairs.co/wordpress/129651/hacktivism/anonymous-hacked-thozis-corp.html


ÍøÂç´¹ÂÚʹÓà Azure ¾²Ì¬ÍøÒ³Ã°³ä΢Èí


https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-web-pages-to-impersonate-microsoft/