MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв

Ðû²¼Ê±¼ä 2024-02-19

1. MonikerLink Îó²îʹ Outlook Óû§ÃæÁÙÊý¾Ý͵ÇԺͶñÒâÈí¼þµÄÍþв


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Check Point Research (CPR) ·¢Ã÷Microsoft OutlookÖб£´æÑÏÖØÇå¾²Îó²î¡£¡£¡£¡£±»³ÆÎª#MonikerLink£»£»£»£»£»£»£»£»¸ÃÎó²îÔÊÐíÍþвÐÐΪÕßÔÚÆäÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£²©¿ÍÎÄÕÂÖÐÏêϸÏÈÈÝÁËÕâÏîÑо¿£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷Á˸ÃÎó²î¿ÉÄÜ»áʹÓà Outlook ´¦Öóͷ£Ä³Ð©³¬Á´½ÓµÄ·½·¨¡£¡£¡£¡£¸ÃÎó²î±»¸ú×ÙΪCVE-2024-21413£¬£¬£¬£¬£¬£¬£¬ CVSS ÆÀ·ÖΪ 9.8£¨Âú·Ö 10£©£¬£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²î¾ßÓÐÑÏÖØÑÏÖØÐÔÇҸ߶ȿÉʹÓ㬣¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õßͨ¹ý×îÉÙµÄÓû§½»»¥À´ÆÆËðϵͳ¡£¡£¡£¡£Õâ¿ÉÄܻᵼÖÂϵͳÍêÈ«ÊÜË𡢾ܾøÐ§ÀͺÍÊý¾Ýй¶¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÖ´ÐÐí§Òâ´úÂë¡¢ÇÔÈ¡Êý¾ÝºÍ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¸ÃÎÊÌâµÄ±¬·¢ÊÇÓÉÓÚ Outlook ´¦Öóͷ£¡°file://¡±³¬Á´½ÓµÄ·½·¨Ôì³ÉµÄ£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÑÏÖØµÄÇå¾²Òþ»¼¡£¡£¡£¡£Íþв¼ÓÈëÕß¿ÉÒÔÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐÐδ¾­ÊÚȨµÄ´úÂë¡£¡£¡£¡£CPR µÄÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬#MonikerLink Îó²îÀÄÓÃÁË Windows ÉϵÄ×é¼þ¹¤¾ßÄ£×Ó ( COM )£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÊÐíÖ´ÐÐδ¾­ÊÚȨµÄ´úÂ벢й¶ÍâµØ NTLM ƾ֤ÐÅÏ¢¡£¡£¡£¡£¸ÃÎó²îʹÓÃÓû§µÄ NTLM ƾ֤À´Í¨¹ý Windows ÖÐµÄ COM Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£µ±Óû§µ¥»÷¶ñÒⳬÁ´½Óʱ£¬£¬£¬£¬£¬£¬£¬Ëü»áÅþÁ¬µ½Óɹ¥»÷Õß¿ØÖƵÄÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆÆËðÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢²¢¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¡£¡£¡£ÕâʹµÃ¹¥»÷ÕßÄܹ»ÈƹýOffice Ó¦ÓóÌÐòÖеÄÊܱ£»£»£»£»£»£»£»£»¤ÊÓͼģʽ£¬£¬£¬£¬£¬£¬£¬Ô¶³ÌŲÓà COM ¹¤¾ß²¢ÔÚÊܺ¦ÕßµÄÅÌËã»úÉÏÖ´ÐдúÂë¡£¡£¡£¡£


https://www.hackread.com/monikerlink-bug-microsoft-outlook-data-malware/


2. FBI ͨ¼©·¸ Zeus ºÍ IcedID ¶ñÒâÈí¼þÖ÷ıÈÏ×ï


2ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÎÚ¿ËÀ¼¹«ÃñÔÚÃÀ¹úÈÏ¿É×Ô¼ºÔÚ 2009 Äê 5 ÔÂÖÁ 2021 Äê 2 ÔÂʱ´ú¼ÓÈëÁËÁ½¸ö²î±ðµÄ¶ñÒâÈí¼þÍýÏ루Zeus ºÍ IcedID£©¡£¡£¡£¡£37 ËêµÄάÑÇÇÐ˹À­·ò¡¤ÒÁ¸êÁÐÎ¬Ææ¡¤Åí³þ¿Æ·òÓÚ 2022 Äê 10 Ô±»ÈðÊ¿Õþ¸®¾Ð²¶£¬£¬£¬£¬£¬£¬£¬²¢ÓÚÈ¥Äê±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£¡£2012Ä꣬£¬£¬£¬£¬£¬£¬Ëû±»ÁÐÈëÁª°îÊÓ²ì¾ÖµÄͨ¼©Ãûµ¥¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿ (DoJ)½« PenchukovÐÎòΪ¡°Á½¸ö¶à²ú¶ñÒâÈí¼þ×éÖ¯µÄÏòµ¼Õß¡±£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓöñÒâÈí¼þѬȾÁËÊýǧ̨ÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÀÕË÷Èí¼þºÍÊý°ÙÍòÃÀÔª±»µÁ¡£¡£¡£¡£ÆäÖаüÀ¨ Zeus ÒøÐÐľÂí£¬£¬£¬£¬£¬£¬£¬¸ÃľÂíÓÐÖúÓÚÇÔÈ¡ÒøÐÐÕË»§ÐÅÏ¢¡¢ÃÜÂ롢СÎÒ˽¼Òʶ±ðÂëÒÔ¼°µÇÂ¼ÍøÉÏÒøÐÐÕË»§ËùÐèµÄÆäËûÏêϸÐÅÏ¢¡£¡£¡£¡£±»¸æ»¹±»Ö¸¿ØÖÁÉÙ´Ó 2018 Äê 11 ÔÂÆð×ÊÖúÏòµ¼Éæ¼°IcedID£¨ÓÖÃû BokBot£©¶ñÒâÈí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ó¶øÎª¶ñÒâ»î¶¯Ìṩ±ãµ±¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»³äµ±ÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÆäËûÓÐÓøºÔØ£¨ÀýÈçÀÕË÷Èí¼þ£©µÄ¼ÓÔØ³ÌÐò¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬ÕýÈçÊÓ²ì¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹ (Brian Krebs)ÔÚ 2022 Ä걨µÀµÄÄÇÑù£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÓëÎÚ¿ËÀ¼Ç°×Üͳά¿ËÍС¤ÑÇŬ¿ÆÎ¬Ææ (Victor Yanukovych) µÄÕþÖιØÏµ£¬£¬£¬£¬£¬£¬£¬Ëû¶àÄêÀ´ÀÖ³ÉÌÓ±ÜÎÚ¿ËÀ¼ÍøÂç·¸·¨ÊÓ²ìÖ°Ô±µÄÆðËß¡£¡£¡£¡£


https://thehackernews.com/2024/02/fbis-most-wanted-zeus-and-icedid.html


3. CISA ³Æ Akira ÀÕË÷ÍÅ»ïÕýÔÚʹÓà Cisco ASA/FTD Îó²îCVE-2020-3259 


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ÔÚÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖÐÌí¼ÓÁË Ò»¸ö Cisco ASA ºÍ FTD Îó²î£¬£¬£¬£¬£¬£¬£¬±àºÅΪCVE-2020-3259  £¨CVSS ÆÀ·Ö£º7.5£©¡£¡£¡£¡£Îó²î CVE-2020-3259 ÊÇÒ»¸ö±£´æÓÚ ASA ºÍ FTD Web ЧÀͽӿÚÖеÄÐÅϢй¶ÎÊÌâ¡£¡£¡£¡£Ë¼¿ÆÓÚ 2020 Äê 5 ÔÂÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£CISA ½«¸ÃÎÊÌâÁÐΪÒÑÖªÓÃÓÚÀÕË÷Èí¼þ»î¶¯µÄÎÊÌ⣬£¬£¬£¬£¬£¬£¬µ«¸Ã»ú¹¹Ã»ÓÐ͸¶ÄÄЩÀÕË÷Èí¼þ×éÖ¯ÕýÔÚÆð¾¢Ê¹ÓøÃÎÊÌâ¡£¡£¡£¡£Truesec CSIRT ÍÅ¶Ó ·¢Ã÷ȡ֤Êý¾ÝÅú×¢ Akira ÀÕË÷Èí¼þ×éÖ¯¿ÉÄÜÕýÔÚÆð¾¢Ê¹ÓÃ¾ÉµÄ Cisco ASA£¨×Ô˳ӦÇå¾²×°±¸£©ºÍ FTD£¨Firepower Íþв·ÀÓù£©Îó²î£¬£¬£¬£¬£¬£¬£¬¸ú×Ù±àºÅΪ CVE-2020-3259¡£¡£¡£¡£Akira ÀÕË÷Èí¼þ ×Ô 2023 Äê 3 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁ˶à¸öÐÐÒµµÄ¶à¸ö×éÖ¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨½ÌÓý¡¢½ðÈںͷ¿µØ²ú¡£¡£¡£¡£ÓëÆäËûÀÕË÷Èí¼þÍÅ»ïÒ»Ñù£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÒ»¿îÕë¶Ô VMware ESXi ЧÀÍÆ÷µÄ Linux ¼ÓÃÜÆ÷¡£¡£¡£¡£


https://securityaffairs.com/159244/cyber-crime/cisa-cisco-cve-2020-3259-akira-ransomware.html


4. ÒÔÉ«ÁÐ NSO ×é֝ɿÏÓ¶Ô WhatsApp ¾ÙÐС°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷


2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐÌØ¹¤Èí¼þ¹«Ë¾ NSO Group ÉæÏÓʹÓÃÒ»ÖÖÐÂÓ±µÄ¡°²ÊÐÅÖ¸ÎÆ¡±¹¥»÷À´Õë¶Ô WhatsApp ÉÏδ¾­ÏÓÒɵÄÓû§£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¼´¿É̻¶ËûÃǵÄ×°±¸ÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ 2023 Äê 15 ÈÕÐÇÆÚËÄÏò Hackread.com ·ÖÏíµÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬WhatsApp ÔÚ 2019 Äê 5 Ô·¢Ã÷Æäϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§×°±¸ÉÏ×°Öà Pegasus ÌØ¹¤Èí¼þ¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»Ê¹ÓÃÀ´Õë¶ÔÈ«ÇòµÄÕþ¸®¹ÙÔ±ºÍ»î¸ÐÈËÊ¿¡£¡£¡£¡£WhatsApp ¾ÍÕâÖÖʹÓÃÐÐΪÆðËßNSO ¼¯ÍÅ£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÃÀ¹úÉÏËß·¨ÔººÍ×î¸ß·¨ÔºÉÏËß¾ùʧ°Ü¡£¡£¡£¡£Enea ÌᳫÁËÒ»ÏîÊӲ죬£¬£¬£¬£¬£¬£¬ÒÔ²éÃ÷²ÊÐÅÖ¸ÎÆ¹¥»÷ÊÇÔõÑù±¬·¢µÄ¡£¡£¡£¡£ËûÃÇ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔͨ¹ý·¢ËͲÊÐÅÀ´ÏÔʾĿµÄ×°±¸ºÍ²Ù×÷ϵͳ°æ±¾£¬£¬£¬£¬£¬£¬£¬¶øÎÞÐèÓû§½»»¥¡£¡£¡£¡£MMS UserAgent ÊÇÒ»¸ö±êʶ²Ù×÷ϵͳºÍ×°±¸£¨ÀýÈçÔËÐÐ Android µÄÈýÐÇÊÖ»ú£©µÄ×Ö·û´®£¬£¬£¬£¬£¬£¬£¬¶ñÒâÐÐΪÕß¿ÉÒÔʹÓà MMS UserAgent À´Ê¹ÓÃÎó²î¡¢¶¨ÖƶñÒâ¸ºÔØ»ò²ß»®ÍøÂç´¹Âڻ¡£¡£¡£¡£


https://www.hackread.com/israeli-nso-group-mms-fingerprint-attack-whatsapp/


5. Ñо¿ÍŶӷ¢Ã÷Turla APT °²ÅÅÐ嵀 TinyTurla-NG ºóÃÅ


2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ Talos µÄר¼Ò·¢Ã÷ÓÉ Turla APT ×éÖ¯²ß»®µÄÕë¶Ô²¨À¼·ÇÕþ¸®×éÖ¯µÄ»î¶¯¡£¡£¡£¡£Õâ´Î¹¥»÷ʹÓÃÁËÒ»ÖÖÐÂÓ±µÄºóÃÅ£¬£¬£¬£¬£¬£¬£¬TinyTurla-NG¡£¡£¡£¡£TinyTurla-NG µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÄܹ»³äµ±ºóÃÅ£¬£¬£¬£¬£¬£¬£¬µ±¼ì²âµ½»ò×èÖ¹ÆäËûºÚ¿ÍÒªÁìʱ£¬£¬£¬£¬£¬£¬£¬ºóÞͻᱻ¼¤»î¡£¡£¡£¡£¼Í¼ÔÚ°¸µÄ¹¥»÷»î¶¯´Ó 2023 Äê 12 Ô 18 ÈÕÒ»Á¬µ½ 2024 Äê 1 Ô 27 ÈÕ£¬£¬£¬£¬£¬£¬£¬²»¹ýÓÐÈËÍÆ²â¹¥»÷¿ÉÄÜÔçÔÚ 2023 Äê 11 Ô¾Í×îÏÈÁË¡£¡£¡£¡£²¡¶¾Í¨¹ýÊÜѬȾµÄ WordPress ÍøÕ¾Èö²¥£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾³äµ±ÏÂÁîºÍ¿ØÖÆ (C2) ЧÀÍÆ÷¡£¡£¡£¡£TinyTurla-NG Äܹ»´Ó C2 ЧÀÍÆ÷Ö´ÐÐÏÂÁî¡¢ÉÏ´«ºÍÏÂÔØÎļþÒÔ¼°°²Åž籾ÒÔ´ÓÃÜÂëÖÎÀíÊý¾Ý¿âÇÔÈ¡ÃÜÂë¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬TinyTurla-NG ³äµ±½»¸¶ PowerShell ¾ç±¾µÄÇþµÀ£¬£¬£¬£¬£¬£¬£¬³ÆÎª TurlaPower-NG£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÌáÈ¡ÓÃÓÚ±£»£»£»£»£»£»£»£»¤Ê¢ÐÐÃÜÂëÖÎÀíÆ÷Êý¾Ý¿âµÄÐÅÏ¢¡£¡£¡£¡£


https://meterpreter.org/turla-apt-deploys-new-tinyturla-ng-backdoor/


6. Alpha ÀÕË÷Èí¼þ´Ó NetWalker »Ò½ýÖÐáÈÆð


2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Alpha ÊÇÒ»ÖÖÐÂÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬ÓÚ 2023 Äê 2 ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ×î½ü¼¸ÖÜÔöÇ¿ÁËÔË×÷£¬£¬£¬£¬£¬£¬£¬ÓëÔçÒѲ»±£´æµÄ NetWalker ÀÕË÷Èí¼þºÜÊÇÏàËÆ£¬£¬£¬£¬£¬£¬£¬NetWalker ÀÕË÷Èí¼þÓÚ 2021 Äê 1 ÔÂÔÚÒ»´Î ¹ú¼ÊÖ´·¨Ðж¯ºóÏûÊÅ¡£¡£¡£¡£¶Ô Alpha µÄÆÊÎöÕ¹ÏÖÁËÓë¾É°æ NetWalker ÀÕË÷Èí¼þµÄÏÔÖøÏàËÆÖ®´¦¡£¡£¡£¡£ÕâÁ½ÖÖÍþв¶¼Ê¹ÓÃÀàËÆµÄ»ùÓÚ PowerShell µÄ¼ÓÔØ³ÌÐòÀ´×ª´ïÓÐÓøºÔØ¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬Alpha ºÍ NetWalker ÓÐÓøºÔØÖ®¼ä±£´æ´ó×Ú´úÂëÖØµþ¡£¡£¡£¡£Õâ°üÀ¨£ºÁ½¸öÓÐÓøºÔØÖ÷Òª¹¦Ð§µÄÒ»Ñùƽ³£Ö´ÐÐÁ÷³Ì£»£»£»£»£»£»£»£»ÔÚµ¥¸öÏß³ÌÖд¦Öóͷ£Á½¸ö¹¦Ð§£ºÀú³ÌÖÕÖ¹ºÍЧÀÍÖÕÖ¹£»£»£»£»£»£»£»£»ÒÑÆÊÎö API µÄÀàËÆÁбí¡£¡£¡£¡£ËäÈ» API ÊÇʹÓùþÏ£ÖµÆÊÎöµÄ£¬£¬£¬£¬£¬£¬£¬µ«ËùʹÓõĹþÏ£Öµ²¢²»Ïàͬ£»£»£»£»£»£»£»£»Á½¸öÓÐÓøºÔؾßÓÐÏàËÆµÄÉèÖ㬣¬£¬£¬£¬£¬£¬°üÀ¨Ìø¹ýµÄÎļþ¼Ð¡¢ÎļþºÍÀ©Õ¹ÃûµÄÁÐ±í£»£»£»£»£»£»£»£»ÒÔ¼°ÒªkillµÄÀú³ÌºÍЧÀ͵ÄÁÐ±í£»£»£»£»£»£»£»£»¼ÓÃÜÍê³Éºó£¬£¬£¬£¬£¬£¬£¬Á½¸öÓÐÓøºÔض¼»áʹÓÃÔÝʱÅú´¦Öóͷ£Îļþɾ³ý×ÔÉí£»£»£»£»£»£»£»£»Á½Õß¶¼ÓÐÀàËÆµÄÖ§¸¶ÃÅ»§£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÏàͬµÄÐÂÎÅ£º¡°ÈçÐèÊäÈ룬£¬£¬£¬£¬£¬£¬ÇëʹÓÃÓû§´úÂ롱¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/alpha-netwalker-ransomware?web_view=true