΢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2023-04-18

1¡¢Î¢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯


4ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬£¬£¬£¬£¬£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£¡£¡£¡£¡£¡£ZIPÎĵµ°üÀ¨Ðí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½·¨¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ì½Ý·½·¨Ö´ÐÐPowerShell£¬£¬£¬£¬£¬£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£¡£¡£¡£¡£¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬£¬£¬£¬£¬£¬½ø¶ø×°ÖÃRemcos RAT¡£¡£¡£¡£¡£¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËȨÏÞ½øÒ»²½Èö²¥£¬£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/


2¡¢ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª


ýÌå4ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬£¬£¬£¬£¬£¬ËðʧԼ2300ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ÉùÃ÷ÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬£¬£¬£¬£¬£¬°üÀ¨ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£¡£¡£¡£¡£¡£Bitrue³Æ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø»á¼ûµÄÈÈÇ®°ü£¬£¬£¬£¬£¬£¬Ö»°üÀ¨Bitrue×Ü×ʽðµÄ²»µ½5%£¬£¬£¬£¬£¬£¬ÆäÓàÇ®°üÈÔÈ»Çå¾²¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬£¬£¬£¬£¬£¬Í¬Ê±¾ÙÐÐÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬ÍýÏëÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£¡£¡£¡£¡£¡£


https://therecord.media/bitrue-23million-stolen-cryptocurrency


3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ


²¨À¼¾üÊ·´Ç鱨¾Ö¼°ÅÌËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬£¬£¬£¬£¬£¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷Óйء£¡£¡£¡£¡£¡£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬£¬£¬£¬£¬£¬½üÆÚ»î¶¯µÄÐí¶àÒªËØ£¬£¬£¬£¬£¬£¬°üÀ¨»ù´¡ÉèÊ©¡¢Ê¹ÓõÄÊÖÒպ͹¤¾ß£¬£¬£¬£¬£¬£¬¶¼ÓëÒÑÍùµÄAPT29»î¶¯Öصþ¡£¡£¡£¡£¡£¡£¹¥»÷Õë¶ÔÍâ½»Ö°Ô±£¬£¬£¬£¬£¬£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬£¬£¬£¬£¬£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£


https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html


4¡¢AhnLab·¢Ã÷ÀÕË÷Èí¼þTrigona¹¥»÷MS-SQLЧÀÍÆ÷µÄ»î¶¯


AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQLЧÀÍÆ÷µÄ»î¶¯¡£¡£¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£¡£¡£¡£¡£¡£CLR ShellÓÐÒ»¸öʹÓÃÌáȨÎó²îµÄÀý³Ì£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£¡£¡£¡£¡£¡£MS-SQLÀú³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£¡£¡£¡£¡£¡£svcservice.exeÊÇÒ»¸ödropper£¬£¬£¬£¬£¬£¬ËüÔÚͳһÆð¾¶ÉϽ¨Éè²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬¼´svchost.exe¡£¡£¡£¡£¡£¡£


https://asec.ahnlab.com/en/51343/


5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄÆÊÎö±¨¸æ


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢Ö°Ô±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£¡£¡£¡£¡£¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬£¬£¬£¬£¬£¬»®·ÖΪDomino BackdoorºÍDomino Loader¡£¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬£¬Dave Loader»á·Ö·¢Domino Backdoor¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬È»ºóÏÂÔØDomino Loader¡£¡£¡£¡£¡£¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£DominoµÄ´úÂëÓëLizarÓдó×ÚÖØµþ£¬£¬£¬£¬£¬£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬£¬£¬£¬£¬£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£¡£¡£¡£¡£¡£


https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/


6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄÆÊÎö±¨¸æ


4ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄÕ½ÂÔֻרעÓÚÒ»¼þÊ£¬£¬£¬£¬£¬£¬¼´µÍµ÷ÐÐÊ¡£¡£¡£¡£¡£¡£ËûÃǵÄÄ¿µÄ²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬£¬£¬£¬£¬£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇéÐÎÏÂ׬Ǯ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿·ÖµÈ£¬£¬£¬£¬£¬£¬ÒÔ¾¡¿ÉÄÜïÔÌ­¹Ø×¢¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄÓªÒµÉèÖ㬣¬£¬£¬£¬£¬ÒªÇóÁ¥Êô»ú¹¹¼á³Ö»îÔ¾£¬£¬£¬£¬£¬£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£¡£¡£¡£¡£¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬£¬£¬£¬£¬£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£¡£¡£¡£¡£¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html