ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-04-25

1¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷£¬Ó°ÏìÁËÆäµç×ÓÓʼþ·þÎñÆ÷ºÍ²¿·Öϵͳ¡£¹¥»÷±¬·¢ÔÚ4ÔÂ12ÈÕÇåÔ磬¸ÃÔì´¬³§Í¸Â¶£¬¹¥»÷Õë¶ÔµÄ·þÎñÆ÷Ö÷ÒªÓÃÓÚÉúÑÄÏòÆäÅÌËã»úÊý¿ØÖÆÔì×°±¸ÌṩָÁîµÄÊý¾Ý£¬µ¼ÖÂËüÃÇå´»úÊýÌì¡£ÏÖÔÚûÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬FMGÒѽÓÄɲ½·¥¾ÙÐÐÏìÓ¦£¬Ë®Ê¦ÕýÔÚÆð¾¢¼àÊÓÕâЩÊÂÇé¡£


https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/


2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ


¾Ý4ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢±¤ÀÝÖ®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ£¬Éù³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍ×÷±×Æ÷µÈ¡£ËüÃÇ»á¼ÓÔØÎ±×°³ÉFortniteÒ³ÃæµÄ´¹ÂÚÍøÒ³£¬»òÔÊÐíÌṩÀñÎ│µÄÐéαµÄÊӲ졣±ðµÄ£¬¸ÃÔ˶¯»¹Õë¶Ô°ÍÎ÷ijÖÝÕþ¸®µÄÒ»¸öСÐÍÍøÕ¾£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£


https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/


3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢Ã÷еÄDecoy Dog


InfobloxÓÚ4ÔÂ20Èճƣ¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó£¬·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¸Ã¹¤¾ßÖ¼ÔÚ×ÊÖú¹¥»÷Õßͨ¹ýÕ½ÂÔÐÔµÄÓòÃûÀÏ»¯ºÍDNSÅÌÎÊÔËÔØÀ´Èƹý¼ì²â£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«ÎªÓÐÊý¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄÊӲ췢Ã÷Á˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò£¬ËüÃǵĴ󲿷ÖͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£ÕâЩÓòÃûµÄDNSËíµÀ¾ßÓÐÖ¸ÏòPupy RATµÄÌØÕ÷£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü°²ÅŵÄÔ¶³Ì»á¼ûľÂí¡£


https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/


4¡¢AquaÅû¶ʹÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿óÔ˶¯


AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿óÔ˶¯£¬Ê¹ÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ(RBAC)½¨ÉèºóÃŲ¢ÔËÐп󹤡£Í¨¹ýʹÓÃRBACʵÑé¶ñÒâ»á¼û¿ØÖÆÕ½ÂÔ£¬×ÝÈ»Ìṩ³õʼ»á¼ûµÄ¹ýʧÉèÖÃÔÚδÀ´»ñµÃÐÞ¸´£¬¹¥»÷ÕßÒ²¿ÉÒÔÔÚ±»Ñ¬È¾µÄ¼¯ÈºÉÏÒ»Á¬±£´æ¡£¹¥»÷Á´Ê¹ÓÃÉèÖùýʧµÄAPI·þÎñÆ÷¾ÙÐгõʼ»á¼û£¬È»ºó·¢ËÍHTTPÇëÇóÒÔÁгöÉñÃØ£¬²¢·¢³öAPIÇëÇóÒÔͨ¹ýÁгöÃüÃû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£±ðµÄ£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´½ÓÊܺÍÐ®ÖÆ±»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£


https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters


5¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle Ads·Ö·¢BumbleBeeµÄÔ˶¯


4ÔÂ20ÈÕ£¬SecureWorksÅû¶ÁËʹÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄÔ˶¯¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÏÂÔØÒ³Ãæ£¬Ëü½¨ÉèÓÚ2ÔÂ16ÈÕ£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°ÖóÌÐòcisco-anyconnect-4_9_0195.msi£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£±ðµÄ£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËü¾ßÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1£¬ChatGPT.msiºÍchch.ps1£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£


https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads


6¡¢HuntressÐû²¼PaperCutÎó²îʹÓÃÔ˶¯µÄÆÊÎö±¨¸æ


4ÔÂ21ÈÕ£¬HuntressÐû²¼±¨¸æ£¬³ÆÆä·¢Ã÷ÁËʹÓÃPaperCut MF/NGÎó²îµÄÔ˶¯¡£ÕâÁ½¸öÎó²î£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ñ¬È¾µÄPaperCut·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£Ñо¿Ö°Ô±·¢Ã÷´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellÏÂÁÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ£¬ÒÔ±ãÔÚÄ¿µÄÖ÷»úÒ»Á¬»á¼ûºÍÖ´ÐдúÂë¡£»ù´¡ÉèÊ©ÆÊÎö·¢Ã÷£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйØ¡£


https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software