΢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷Ô˶¯

Ðû²¼Ê±¼ä 2023-04-18

1¡¢Î¢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷Ô˶¯


4ÔÂ13ÈÕ£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄ´¹ÂÚ¹¥»÷Ô˶¯¡£´¹ÂÚÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£ZIPÎĵµ°üÀ¨Ðí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½·¨¡£¿ì½Ý·½·¨Ö´ÐÐPowerShell£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬½ø¶ø×°ÖÃRemcos RAT¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ»á¼ûȨÏÞ£¬¹¥»÷Õß¿ÉʹÓôËȨÏÞ½øÒ»²½Èö²¥£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£


https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/


2¡¢ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª


ýÌå4ÔÂ15Èճƣ¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬ËðʧԼ2300ÍòÃÀÔª¡£ÉùÃ÷ÌåÏÖ£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬°üÀ¨ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£Bitrue³Æ£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø»á¼ûµÄÈÈÇ®°ü£¬Ö»°üÀ¨Bitrue×Ü×ʽðµÄ²»µ½5%£¬ÆäÓàÇ®°üÈÔÈ»Çå¾²¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬Í¬Ê±¾ÙÐÐÇå¾²¼ì²é£¬ÍýÏëÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£


https://therecord.media/bitrue-23million-stolen-cryptocurrency


3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ


²¨À¼¾üÊ·´Ç鱨¾Ö¼°ÅÌËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷ÓйØ¡£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬½üÆÚÔ˶¯µÄÐí¶àÒªËØ£¬°üÀ¨»ù´¡ÉèÊ©¡¢Ê¹ÓõÄÊÖÒպ͹¤¾ß£¬¶¼ÓëÒÑÍùµÄAPT29Ô˶¯Öصþ¡£¹¥»÷Õë¶ÔÍâ½»Ö°Ô±£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½´¹ÂÚÓʼþ£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬°üÀ¨SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£ÏÖÔÚ£¬¸ÃÔ˶¯ÈÔÔÚ¾ÙÐÐÖС£


https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html


4¡¢AhnLab·¢Ã÷ÀÕË÷Èí¼þTrigona¹¥»÷MS-SQL·þÎñÆ÷µÄÔ˶¯


AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQL·þÎñÆ÷µÄÔ˶¯¡£¾ÝÍÆ²â£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£CLR ShellÓÐÒ»¸öʹÓÃÌáȨÎó²îµÄÀý³Ì£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£MS-SQLÀú³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£svcservice.exeÊÇÒ»¸ödropper£¬ËüÔÚͳһÆð¾¶ÉϽ¨Éè²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬¼´svchost.exe¡£


https://asec.ahnlab.com/en/51343/


5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄÆÊÎö±¨¸æ


4ÔÂ14ÈÕ£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢Ö°Ô±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬»®·ÖΪDomino BackdoorºÍDomino Loader¡£Í¨³££¬Dave Loader»á·Ö·¢Domino Backdoor¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬È»ºóÏÂÔØDomino Loader¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£DominoµÄ´úÂëÓëLizarÓдó×ÚÖØµþ£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¸ÃÔ˶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£


https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/


6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄÆÊÎö±¨¸æ


4ÔÂ13ÈÕ£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´·þÎñ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄÆÊÎö±¨¸æ¡£¸ÃÍÅ»ïµÄÕ½ÂÔֻרעÓÚÒ»¼þÊ£¬¼´µÍµ÷ÐÐÊ¡£ËûÃǵÄÄ¿µÄ²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇéÐÎÏÂ׬Ǯ¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿·ÖµÈ£¬ÒÔ¾¡¿ÉÄÜïÔÌ­¹Ø×¢¡£¸ÃÍÅ»ïµÄÓªÒµÉèÖã¬ÒªÇóÁ¥Êô»ú¹¹¼á³Ö»îÔ¾£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html