Stacked VLANÖеÄ4¸ö¿Éµ¼ÖÂDoSºÍMiTM¹¥»÷µÄ·ì϶

°ä²¼¹¦·ò 2022-09-30
1¡¢Stacked VLANÖеÄ4¸ö¿Éµ¼ÖÂDoSºÍMiTM¹¥»÷µÄ·ì϶

      

¾ÝýÌå9ÔÂ28ÈÕ±¨Â· £¬Stacked VLANÒÔÌ«ÍøÖ°ÄÜÖеÄ4¸ö·ì϶¿É±»ÓÃÀ´Í¨¹ý¶¨ÔìµÄÊý¾Ý°ü¶ÔÖ¸±êÖ´Ðлؾø·þÎñ(DoS)»òÖÐÑëÈË(MitM)¹¥»÷¡£Stacked VLANÊÇÏÖ´ú·ÓÉÆ÷ºÍ»¥»»»úÖеÄÒ»ÏîÖ°ÄÜ £¬ÔÊÐí¹«Ë¾½«¶à¸öVLAN ID·â×°µ½ÓëÉÏÓÎÌṩÉ̹²ÏíµÄµ¥¸öVLANÏνÓÖС£ÕâЩ·ì϶´æÔÚÓÚÔÊÐíVLAN±êÍ·¶ÑµþµÄÒÔÌ«Íø·â×°ºÍ̸ÖÐ £¬±ðÀëΪCVE-2021-27853¡¢CVE-2021-27854¡¢CVE-2021-27861ºÍCVE-2021-2786 £¬Î´¾­Éí·ÝÑéÖ¤µÄÏàÁÚ¹¥»÷ÕßÄܹ»Ê¹ÓÃVLANºÍLLC/SNAP±êÍ·µÄ×éºÏÀ´ÈƹýL2ÍøÂç¹ýÂ˱£»¤ £¬ÀýÈçIPv6 RA·À»¤¡¢¶¯Ì¬ARP²é³­ºÍDHCPÕìÌýµÈ¡£


https://www.bleepingcomputer.com/news/security/ethernet-vlan-stacking-flaws-let-hackers-launch-dos-mitm-attacks/


2¡¢¹¥»÷ÕßÀûÓÃQuantum BuilderÀ´·Ö·¢Agent Tesla

      

ZscalerÔÚ9ÔÂ27ÈÕÅû¶Á˹¥»÷ÕßÀûÓÃQuantum Builder·Ö·¢Ô¶³Ì½Ó¼ûľÂíAgent TeslaµÄ»î¶¯¡£Quantum BuilderÊÇÒ»Öֿɶ¨ÔìµÄ¹¤¾ß £¬ÔÚ°µÍøÒÔÿÔÂ189Å·ÔªµÄ¼ÛÖµÏúÊÛ £¬¿ÉÓÃÓÚÌìÉú¶ñÒâ¿ì½Ý·½Ê½ÎļþÒÔ¼°HTA¡¢ISOºÍPowerShell payload¡£¹¥»÷ʹÓõĴ¹µöÓʼþÐû³ÆÊÇÀ´×ÔÖйú¿éÌǺͱùÌǹ©¸øÉ̵Ķ©µ¥È·ÈÏÐÅÏ¢ £¬ÆäÖеÄLNKÎļþ¼Ù×°³ÉPDFÎĵµ¡£Ö´ÐÐLNKºó £¬Ç¶ÈëʽPowerShell´úÂë»áÌìÉúMSHTA £¬¶øºóÖ´ÐÐÍйÜÔÚÔ¶³Ì·þÎñÆ÷ÉϵÄHTAÎļþ £¬×îÖÕÏÂÔØ²¢Ö´ÐÐAgent Tesla¶þ½øÔìÎļþ¡£


https://www.zscaler.com/blogs/security-research/agent-tesla-rat-delivered-quantum-builder-new-ttps


3¡¢Securonix·¢ÏÖÖØÒªÕë¶Ô¾üʳаüÉ̵ÄÐÂÒ»ÂÖ¹¥»÷»î¶¯

      

¾Ý9ÔÂ28ÈÕ±¨Â· £¬SecuronixµÄ×êÑÐÈËÔ±·¢ÏÖÁËÖØÒªÕë¶Ô²Î¼Ó±øÆ÷Ôì×÷µÄ¶à¼Ò¾üʳаüÉ̵Äл £¬ÆäÖпÉÄÜÔ̺¬F-35 Lightning IIÕ½¶·»úÁã¼þ¹©¸øÉÌ¡£¸Ã»î¶¯Ê¼ÓÚ2022ÄêÏÄÄ© £¬ÀûÓÃÁËÓã²æÊ½ÍøÂç´¹µö×÷Ϊ³õʼϰȾý½é¡£ÓʼþÖÐÔ̺¬Ò»¸ö¿ì½ÝÎļþÔÚÖ´ÐÐʱ»áÏνӵ½C2 £¬²¢Æô¶¯Ò»Á¬´®µÄPowerShell¾ç±¾¡£ÓÐȤµÄÊÇ £¬Õâ¸ö¿ì½ÝÎļþûÓÐʹÓó£ÓõÄcmd.exe»òpowershell.exe £¬¶øÊÇÒÀÀµÓÚC:\Windows\System32\ForFiles.exeºÅÁîÀ´Ö´ÐС£´Ë±í £¬¸Ã»î¶¯µÄC2»ù´¡ÉèÊ©µÄÓòÓÚ2022Äê7ÔÂ×¢²á²¢ÍйÜÔÚDigitalOceanÉÏ¡£


https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/


4¡¢WitchettyÀûÓÃÒþдÊõ½«ºóÃ۵²ØÔÚWindowsͼ±êÖÐ

      

SymantecÓÚ9ÔÂ29ÈÕ³ÆÆä·¢ÏÖÁËWitchettyÀûÓÃÒþдÊõ½«ºóÃŶñÒâÈí¼þ°µ²ØÔÚWindowsͼ±êÖС£×êÑÐÈËԱй©ËûÃÇÔÚµ÷²éһ·Ðµļäµý»î¶¯ £¬¸Ã»î¶¯ÆðÍ·ÓÚ2022Äê2Ô £¬Õë¶ÔÖж«µÄÁ½¸öµ±¾Ö»ú¹¹ºÍ·ÇÖÞµÄÒ»¼Ò֤ȯÂòÂôËù £¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷ÕßÊ×ÏÈÀûÓÃProxyShellºÍProxyLogon·ì϶ £¬ÔÚÖ¸±ê·þÎñÆ÷¸ßµÍÔØwebshell £¬¶øºó»ñÈ¡°µ²ØÔÚͼÏñÎļþÖеĺóÃÅ¡£¹ÌÈ»¸ÃÍÅ»ïÈÔÔÚʹÓÃLookBackºóÃÅ £¬µ«ËƺõÒÑÔö³¤Á˼¸¸öеĶñÒâÈí¼þ £¬ÈçBackdoor.Stegmap £¬ËüÀûÓÃÒþдÊõ´ÓλͼͼÏñÖÐÌáÈ¡Æäpayload¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage


5¡¢Kaspersky°ä²¼¹ØÓÚPrilexµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

9ÔÂ28ÈÕ £¬Kaspersky°ä²¼Á˹ØÓÚ°ÍÎ÷ºÚ¿ÍÍÅ»ïPrilexµÄ¹¥»÷µÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ï×Ô2014ÄêÆðÍ·»îÔ¾ £¬ÔÚ2016Äê¾ö¶¨ÉÕ»ÙATM¶ñÒâÈí¼þ £¬½«ËùÓй¥»÷¼¯ÖÐÔÚPoSϵͳÉÏ¡£PrilexµÄ×îа汾ÔÚ¹¥»÷·½Ê½ÉÏÓë֮ǰ°æ±¾´æÔÚijЩ²î¾à £¬¼´¸ÃÍÅ»ïÒÑ´Ó³Á·Å¹¥»÷ת±äΪʹÓÃGHOSTÂòÂô £¬¸Ã¼¼ÊõÔÚµêÄÚÖ§¸¶¹ý³ÌÖÐʹÓÃÖ¸±ê¿¨ÌìÉúµÄÃÜÂë·¸·¨¶ÒÏÖ×ʽð¡£Prilex¶ÔÐÅÓþ¿¨ºÍ½è¼Ç¿¨ÂòÂôÒÔ¼°ÓÃÓÚÖ§¸¶´¦ÖõÄÈí¼þµÄ¹¤×÷µÀÀí¼«¶È´¿Êì £¬Òò¶øÄܹ»²»Ðݸüй¤¾ß £¬²¢ÕÒµ½ÈƹýÊÚȨսÊõµÄ²½Öè £¬´Ó¶øÖ´Ðй¥»÷¡£


https://securelist.com/prilex-atm-pos-malware-evolution/107551/


6¡¢Lumen°ä²¼»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö»ã±¨

      

9ÔÂ28ÈÕ £¬Lumen°ä²¼ÁË»ùÓÚGoµÄ¶ñÒâÈí¼þChaosµÄ¼¼Êõ·ÖÎö»ã±¨¡£½ü¼¸¸öÔÂÀ´ £¬ChaosµÄÊýÁ¿Ñ¸ËÙÔö³¤ £¬Ö¼ÔÚ½«¸÷ÀàWindowsºÍLinuxÉ豸¡¢SOHO·ÓÉÆ÷ºÍÆóÒµ·þÎñÆ÷µÅ×ÕÈë½©Ê¬ÍøÂç¡£ChaosµÄÖ°ÄÜÔ̺¬Ã¶¾ÙÖ÷»ú»·¾³¡¢ÔËÐÐÔ¶³ÌshellºÅÁî¡¢¼ÓÔØ¸½¼ÓÄ £¿é¡¢Í¨¹ýÇÔÈ¡ºÍ±©Á¦ÆÆ½âSSH˽Կ×Ô¶¯´«²¼ÒÔ¼°Ö´ÐÐDDoS¹¥»÷¡£ChaosËÆºõÔÚʹÓÃÁíÒ»¸ö½©Ê¬ÍøÂçKaijiµÄ¹¹½¨¿éºÍÖ°ÄÜ £¬×êÑÐÈËԱƾ¾Ý¶Ô100¶à¸öÑù±¾ÖеÄÖ°ÄÜ·ÖÎö £¬´§Ä¦ChaosÊÇKaijiµÄÏÂÒ»´Îµü´ú¡£


https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/