΢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2023-04-18

1¡¢Î¢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯


4ÔÂ13ÈÕ£¬£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£´¹ÂÚÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£¡£¡£¡£ZIPÎĵµ°üÀ¨Ðí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½·¨¡£¡£¡£¡£¿£¿£¿£¿ì½Ý·½·¨Ö´ÐÐPowerShell£¬£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£¡£¡£¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬£¬½ø¶ø×°ÖÃRemcos RAT¡£¡£¡£¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ»á¼ûȨÏÞ£¬£¬¹¥»÷Õß¿ÉʹÓôËȨÏÞ½øÒ»²½Èö²¥£¬£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/


2¡¢ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª


ýÌå4ÔÂ15Èճƣ¬£¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬£¬ËðʧԼ2300ÍòÃÀÔª¡£¡£¡£¡£ÉùÃ÷ÌåÏÖ£¬£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬£¬°üÀ¨ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£¡£¡£¡£Bitrue³Æ£¬£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø»á¼ûµÄÈÈÇ®°ü£¬£¬Ö»°üÀ¨Bitrue×Ü×ʽðµÄ²»µ½5%£¬£¬ÆäÓàÇ®°üÈÔÈ»Çå¾²¡£¡£¡£¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬£¬Í¬Ê±¾ÙÐÐÇå¾²¼ì²é£¬£¬ÍýÏëÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£¡£¡£¡£


https://therecord.media/bitrue-23million-stolen-cryptocurrency


3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ


²¨À¼¾üÊ·´Ç鱨¾Ö¼°ÅÌËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬£¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷ÓйØ¡£¡£¡£¡£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬£¬½üÆÚ»î¶¯µÄÐí¶àÒªËØ£¬£¬°üÀ¨»ù´¡ÉèÊ©¡¢Ê¹ÓõÄÊÖÒպ͹¤¾ß£¬£¬¶¼ÓëÒÑÍùµÄAPT29»î¶¯Öصþ¡£¡£¡£¡£¹¥»÷Õë¶ÔÍâ½»Ö°Ô±£¬£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½´¹ÂÚÓʼþ£¬£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬°üÀ¨SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£¡£¡£¡£ÏÖÔÚ£¬£¬¸Ã»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£


https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html


4¡¢AhnLab·¢Ã÷ÀÕË÷Èí¼þTrigona¹¥»÷MS-SQLЧÀÍÆ÷µÄ»î¶¯


AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQLЧÀÍÆ÷µÄ»î¶¯¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£¡£¡£¡£CLR ShellÓÐÒ»¸öʹÓÃÌáȨÎó²îµÄÀý³Ì£¬£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£¡£¡£¡£MS-SQLÀú³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£¡£¡£¡£svcservice.exeÊÇÒ»¸ödropper£¬£¬ËüÔÚͳһÆð¾¶ÉϽ¨Éè²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬£¬¼´svchost.exe¡£¡£¡£¡£


https://asec.ahnlab.com/en/51343/


5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄÆÊÎö±¨¸æ


4ÔÂ14ÈÕ£¬£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢Ö°Ô±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£¡£¡£¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬£¬»®·ÖΪDomino BackdoorºÍDomino Loader¡£¡£¡£¡£Í¨³££¬£¬Dave Loader»á·Ö·¢Domino Backdoor¡£¡£¡£¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬£¬È»ºóÏÂÔØDomino Loader¡£¡£¡£¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£DominoµÄ´úÂëÓëLizarÓдó×ÚÖØµþ£¬£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£¡£¡£¡£


https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/


6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄÆÊÎö±¨¸æ


4ÔÂ13ÈÕ£¬£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸ÃÍÅ»ïµÄÕ½ÂÔֻרעÓÚÒ»¼þÊ£¬£¬¼´µÍµ÷ÐÐÊ¡£¡£¡£¡£ËûÃǵÄÄ¿µÄ²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇéÐÎÏÂ׬Ǯ¡£¡£¡£¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿·ÖµÈ£¬£¬ÒÔ¾¡¿ÉÄÜïÔÌ­¹Ø×¢¡£¡£¡£¡£¸ÃÍÅ»ïµÄÓªÒµÉèÖ㬣¬ÒªÇóÁ¥Êô»ú¹¹¼á³Ö»îÔ¾£¬£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£¡£¡£¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£¡£¡£¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html