Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ£»£»£»£»·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2020-03-161.Çå¾²³§ÉÌÐû²¼Turla APT»ù´¡ÉèÊ©µÄ¸ú×Ù±¨¸æ

Turla APTÊÇÒ»¸ö³ÉÊì¡¢ÖØ´óÇÒ¾ßÓÐÕ½ÂÔÖØµãµÄÍøÂçÌØ¹¤×éÖ¯£¬£¬£¬£¬¸Ã×éÖ¯Õë¶ÔÈ«Çò¿ÆÑС¢Íâ½»ºÍ¾üÊ»ú¹¹µÄ¹¥»÷ÒÑÓÐÊ®¶àÄêµÄÀúÊ·£¬£¬£¬£¬²¢ÇÒÒ»Ö±ÔÚÕë¶Ô±±´óÎ÷ÑóÌõÔ¼×éÖ¯£¨NATO£©ºÍ¶ÀÁªÌ壨CIS£©¹ú¼Ò¡£¡£TurlaÒ»Ö±¿ª·¢×Ô¼º¶ÀÍ̵ġ¢ÏȽøµÄ¶ñÒâÈí¼þºÍ¹¤¾ß£¬£¬£¬£¬²¢½ÓÄÉÐµĹ¥»÷ºÍ»ìÏýÒªÁ죬£¬£¬£¬Insikt GroupÆÀ¹ÀÒÔΪTurlaÔÚδÀ´¼¸ÄêÄÚÈÔ½«ÊÇÒ»¸ö»îÔ¾µÄ¡¢ÏȽøµÄÍþв¡£¡£Recorded FutureµÄÐÂÑо¿ÌṩÁË×Ô¶¯¸ú×ÙºÍʶ±ðTurla»ù´¡¼Ü¹¹µÄÒªÁ죬£¬£¬£¬ÖØµã¹Ø×¢¼¸ÖÖÓëTurlaÓйصĶñÒâÈí¼þÀàÐÍ£¬£¬£¬£¬°üÀ¨MosquitoºóÃźÍÐ®ÖÆµÄÒÁÀÊTwoFace ASPX Web Shell¡£¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/turla-apt-infrastructure/
2.ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄDDR4ÄÚ´æÈÔÊÜRowhammer¹¥»÷Ó°Ïì
VUSecÑо¿Ö°Ô±·¢Ã÷ÈýÐÇ¡¢ÃÀ¹âºÍº£Á¦Ê¿µÄÏÖ´úÄÚ´æÄ£¿£¿éÈÔ½«ÃæÁÙRowhammer£¨ÄÚ´æÎ»·×ª£©¹¥»÷Σº¦¡£¡£ÏÖÔÚÕë¶ÔRowhammer¹¥»÷µÄ·À»¤²½·¥¹ØÓÚÒÑÖªµÄRowhammer±äÖÖÊÇÓÐÓõ쬣¬£¬£¬µ«Ñо¿Ö°Ô±ÑÝʾÁË¿ÉÈÆ¹ýÄ¿½ñ»º½â²½·¥µÄÐÂÐÍRowhammer¹¥»÷£¨CVE2020-10255£©¡£¡£ÐµÄÄÚ´æÎ»·×ª¹¥»÷¿ÉÔÚÐí¶à×°±¸ÉÏÔËÐУ¬£¬£¬£¬°üÀ¨¹È¸è¡¢ÈýÐǺÍÒ»¼ÓµÄÖÇÄÜÊÖ»ú¡£¡£VUSecÓÚ2019Äê11ÔÂÏòËùÓÐÊÜÓ°ÏìµÄ¸÷·½Åû¶ÁËеÄRowhammer¹¥»÷£¬£¬£¬£¬µ«ÐµĻº½â²½·¥ÊµÑéÆðÀ´²¢½ûÖ¹Ò×£¬£¬£¬£¬²¢ÇÒÐè񻮮·ÑһЩʱ¼äÀ´°²ÅÅ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/
3.BlackWaterºóÃÅÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ
MalwareHunterTeam·¢Ã÷Ò»¸öÃûΪBlackWaterµÄÐÂÐͺóÃÅ£¬£¬£¬£¬¸ÃºóÃÅÔÚαװ³ÉÐéαCOVID-19ÐÅÏ¢µÄͬʱ»¹ÀÄÓÃCloudflare Workers¾ÙÐÐC2ͨѶ¡£¡£BlackWaterͨ¹ýÒ»¸öÃûΪImportant-COVID-19.rarµÄRARÎļþÈö²¥£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú¸ÃÎļþͨ¹ýºÎÖÖ·½·¨·Ö·¢£¬£¬£¬£¬µ«ºÜ¿ÉÄÜÊÇͨ¹ý´¹ÂÚÓʼþ·Ö·¢¡£¡£ÎļþÖаüÀ¨ÃûΪImportant-COVID-19.docx.exeµÄÎļþ£¬£¬£¬£¬ÓÉÓÚWindowsĬÈÏÒþ²ØÎļþÀ©Õ¹Ãû£¬£¬£¬£¬Òò´ËÐí¶àÈË¿ÉÄÜ»áÎóÒÔΪ¸ÃÎļþÊÇdocxÎļþ¶ø½«Æä·¿ª¡£¡£BlackWaterʹÓÃCloud Workers¾ÙÐÐC2ͨѶ£¬£¬£¬£¬ÕâʹµÃ¼ì²âºÍ×èÖ¹¶ñÒâÁ÷Á¿±äµÃÔ½·¢ÄÑÌâ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/blackwater-malware-abuses-cloudflare-workers-for-c2-communication/
4.Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2ÏàÖúͬ°éµÄ¿Í»§Êý¾Ý±»µÁ
Ó¢¹úÒÆ¶¯ÔËÓªÉÌO2×î´óµÄÏàÖúͬ°éÖ®Ò»Aerial DirectÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¿Í»§Êý¾Ý±»µÁ¡£¡£¸Ã¹«Ë¾ÌåÏÖ2ÔÂ26ÈÕδ¾ÊÚȨµÄµÚÈý·½Í¨¹ýÍⲿ±¸·ÝµÄÊý¾Ý¿â»á¼ûÁËÆä¿Í»§Êý¾Ý£¬£¬£¬£¬¸ÃÊý¾Ý¿âÖаüÀ¨ÁùÄêÄÚµÄÄ¿½ñºÍÒÑÓâÆÚ¶©»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¹«Ë¾µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍ²úÆ·ÐÅÏ¢¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÈκÎÃÜÂë»ò²ÆÎñÐÅÏ¢±»µÁ¡£¡£¸Ã¹«Ë¾ÒÑΪÊÜÓ°ÏìµÄ¿Í»§½¨ÉèÁËÒ»¸öÖ§³ÖÍøÕ¾£¬£¬£¬£¬²¢½¨ÒéËûÃǸü¸ÄÃÜÂë¡£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.co.uk/2020/03/13/o2_customer_data_slurped_through_partner_databse/
5.·¨¹úÂíÈüÊÐÕþÌüÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬Ñ¡¾ÙδÊÜÓ°Ïì
·¨¹úÂíÈüÊÐÔÚ¼´½«ÓÚ3ÔÂ15ÈÕÖÁ3ÔÂ22ÈÕ¾ÙÐÐÊÐÕþÑ¡¾Ù֮ǰÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¸Ã´ÎÑ¡¾ÙµÄÄ¿µÄÊÇÑ¡¾Ù¸ÃÊа˸ö²¿·ÖµÄÒé»á¡¢ÊÐÒé»áºÍ°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒé»á¡£¡£Æ¾Ö¤¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨Anssi£©µÄÐÂÎÅ£¬£¬£¬£¬¸Ã´Î¹¥»÷Ôì³É°¬¿Ë˹-ÂíÈü-ÆÕÂÞÍú˹´ó¶¼ÊÐÒÔ¼°ÂíÌá¸ñȺµºµÄ300̨»úе̱»¾£¬£¬£¬£¬ÕâЩ»úеÓÃÓÚ½¨ÉèÊðÀíÊðÃûÁÐ±í£¬£¬£¬£¬Òò´ËÕâЩÊÂÇ鱨ÐèÊÖ¶¯Íê³É¡£¡£ÊÐÕþÌüÒѾȷÈÏÊÐÕþÑ¡¾Ù½«Õý³£¾ÙÐС£¡£¾ÝÖªÇéÈËʿ͸¶£¬£¬£¬£¬¸ÃÍøÂç¹¥»÷µÄ¹æÄ£ÊÇØ¨¹ÅδÓе쬣¬£¬£¬ÂíÈüÊкʹ󶼻áÊÐÕþÌüÊܵ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÓë¹¥»÷»òÀÕË÷Èí¼þ¼Ò×åÓйصÄÏêϸÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/99658/malware/marseille-city-massive-attack.html
6.½Ý¿Ëйڲ¡¶¾¼ì²âʵÑéÊÒÔâÍøÂç¹¥»÷£¬£¬£¬£¬ITϵͳÔÝʱ¹Ø±Õ
½Ý¿Ë×î´óµÄCOVID-19¼ì²âʵÑéÊÒÖ®Ò»£¨²¼¶ûŵ´óѧҽԺ£©Ôâµ½ÍøÂç¹¥»÷¡£¡£Ò½Ôº¹ÙÔ±ÉÐδ͸¶Çå¾²ÊÂÎñµÄÐÔ×Ó£¬£¬£¬£¬µ«¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬¸ÃÊÂÎñÒѾÑÏÖØµ½±ØÐèÍÆ³Ù½ôÆÈÍâ¿ÆÊÖÊõºÍ½«Ðµļ±Ö¢»¼Õß×ªÒÆµ½ÖÜΧµÄÊ¥°²ÄÝ´óѧҽԺ¡£¡£ÔÚÊÂÎñ±¬·¢Ê±´ú£¬£¬£¬£¬²¼¶ûŵ´óѧҽԺ±»ÆÈ¹Ø±ÕÁËÕû¸öITÍøÂ磬£¬£¬£¬ÆäÁíÍâÁ½¸ö·ÖÖ§»ú¹¹-¶ùͯҽԺºÍ¸¾²úÒ½ÔºÒ²Êܵ½ÁËÓ°Ïì¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬½Ý¿Ë¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©¡¢½Ý¿Ë¾¯Ô±£¨NCOZ£©ºÍÒ½ÔºµÄITÖ°Ô±ÕýÔÚÏàÖúÒÔ»Ö¸´Ò½ÔºµÄITÍøÂç¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/


¾©¹«Íø°²±¸11010802024551ºÅ