MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ

°ä²¼¹¦·ò 2023-06-05

1¡¢MOVEit TransfeÖзì϶CVE-2023-34362±»´ó¹æÄ£ÀûÓÃ


¾ÝýÌå6ÔÂ1ÈÕ±¨Â· £¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃMOVEit TransferÎļþ´«ÊäÈí¼þÖеķì϶£¨CVE-2023-34362£©À´ÇÔÈ¡Êý¾Ý¡£ÕâÊÇÒ»¸öSQL×¢Èë·ì϶ £¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Rapid7×êÑÐÈËÔ±ÔÚ±»ÀûÓÃÉ豸ÉÏ·¢ÏÖÁËÒ»ÑùµÄÃûΪhuman2.aspµÄwebshell £¬Î»ÓÚc:\MOVEit Transfer\wwwroot\¹«¹²HTMLÎļþ¼ÐÖС£Mandiant°µÊ¾ £¬ËûÃǵÄÊý¾ÝÏÔʾÕâ´Î¹¥»÷ʼÓÚ5ÔÂ27ÈÕ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÉí·Ý £¬µ«¾ÝϤÒѾ­Óкܶà×éÖ¯Ôâµ½ÈëÇÖ £¬Êý¾Ý±»µÁ¡£Progress SoftwareÒѰ䲼Õë¶Ô±¾µØºÍÔÆµÄ»º½â²½Öè¡£


https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/


2¡¢Î÷°àÑÀ´óÐÍÒøÐÐGlobalcajaÔâµ½À´×ÔPlayµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ5ÈÕ±¨Â· £¬Î÷°àÑÀµÄÒ»¼Ò´óÐÍÒøÐÐGlobalcajaй© £¬ËüÔÚ´¦ÖÃÓ°ÏìÁ˶à¸ö´¦Ê´¦µÄÀÕË÷¹¥»÷¡£Globalcaja×ܲ¿Î»ÓÚÎ÷°àÑÀ°¢¶û°ÍÈûÌØÊÐ £¬ÖÎÀí×ų¬¹ý46ÒÚÃÀÔªµÄÏû·Ñ´û¿î¡£PlayÐû³ÆËü¹¥»÷Á˸ÃÒøÐв¢ÇÔÈ¡Á˲¿ÃÅÐÅÏ¢ £¬Ô̺¬Ó×ÎÒ»úÃÜÊý¾Ý¡¢¿Í»§ºÍÔ±¹¤Îļþ¡¢»¤ÕպͺÏÒ»Ö¡£¸Ã»ú¹¹°µÊ¾ £¬ÕⲢûÓÐÓ°Ïì¸÷ʵÌåµÄÂòÂô £¬µç×ÓÒøÐÓ×¢×Ô¶¯È¡¿î»úºÍ¸÷´¦Ê´¦Ò²¶¼ÔÚÕý³£ÔË×÷¡£¸Ã¹«Ë¾Ã»ÓлØÓ¦¹ØÒò¶ø·ñ½»Êê½ðµÄѯÎÊ¡£


https://therecord.media/spain-globalcaja-bank-confirms-ransomware-attack


3¡¢ÃÀ¹úHPHCÔâµ½ÀÕË÷¹¥»÷µ¼Ö³¬¹ý250ÍòÈ˵ÄÐÅϢй¶


ýÌå6ÔÂ1ÈÕ³Æ £¬ÃÀ¹úÒ½ÁÆ»ú¹¹Harvard Pilgrim Health Care(HPHC)ÔÚ4Ô·ÝÔâµ½ÀÕË÷¹¥»÷ £¬µ¼ÖÂ2550922È˵ÄÐÅϢй¶¡£µ÷²é·¢ÏÖ £¬¹¥»÷ÕßÓÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕ £¬´ÓHPHCµÄϵͳÖÐÇÔÈ¡ÁËÃô¸ÐÊý¾Ý £¬Éæ¼°ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢ÕË»§ÐÅÏ¢¡¢Éç»á°²È«ºÅÂë¡¢ÄÉ˰È˼ø±ðºÅºÍÁÙ´²ÐÅÏ¢µÈ¡£Õâ´ÎÊÂÎñÓ°ÏìÁ˸ûú¹¹´Ó2012Äê3ÔÂ28ÈÕÆðÍ·×¢²áµÄ³ÉÔ±¡£HPHC½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£Ä¿Ç°ÉÐÎÞÀÕË÷ÍÅ»ïÐû³ÆÎª´ËÊÂÕÆ¹Ü¡£


https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/


4¡¢×êÑÐÍŶӷ¢ÏÖCamaro DragonÀûÓÃкóÃÅTinyNoteµÄ¹¥»÷


Check Point ResearchÓÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËCamaro Dragon½üÆÚ¹¥»÷»î¶¯µÄÏêÇé¡£×êÑÐÈËÔ±ÔÚ¸ÃÍÅ»ïµÄÒ»¸ö·Ö·¢·þÎñÆ÷ÉÏ·¢ÏÖÁËеĻùÓÚGoµÄºóÃÅ £¬ÃûΪTinyNote¡£¸ÃºóÃÅͨ¹ýÓë±í½»ÊÂÎñÓйصÄÃû³Æ½øÐзַ¢ £¬¿ÉÄÜÕë¶Ô¶«ÄÏÑǺͶ«ÑǵĴóʹ¹Ý¡£Ëü»¹¿ÉÈÆ¹ýÓ¡¶ÈÄáÎ÷ÑÇÊ¢ÐеÄɱ¶¾Èí¼þSmadAV¡£TinyNoteÊǵÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þ £¬Ö»ÄÜͨ¹ýPowerShell»òGoroutines½øÐиù»ùµÄ»úеö¾ÙºÍºÅÁîÖ´ÐС£


https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/


5¡¢KasperskyÅû¶ÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSµÄTriangulation»î¶¯


6ÔÂ1ÈÕ £¬KasperskyÅû¶ÁËÀûÓÃÁãµã»÷·ì϶¹¥»÷iOSÉ豸µÄTriangulation»î¶¯¡£¸Ã»î¶¯ÖÁÉÙ´Ó2019ÄêÆðÍ· £¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£¹¥»÷Á´Ê¼ÓÚͨ¹ýiMessage·þÎñÏòiOSÉ豸·¢Ë͵ÄÐÂÎÅ £¬¸½¼þÖÐÔ̺¬·ì϶ÀûÓ᣸ÃÐÂÎÅÔÚûÓÐÈκÎÓû§½»»¥µÄÇé¿öÏ´¥·¢ÁËÔ¶³Ì´úÂëÖ´Ðзì϶¡£ÀûÓ÷ì϶´ÓC2·þÎñÆ÷ÏÂÔØ¶à¸öºóÐø½×¶Î £¬Ô̺¬ÓÃÓÚÌáȨµÄÆäËü·ì϶ÒÔ¼°×îÖÕpayload¡£¶ñÒâ´úÂëÒÔrootȨÏÞÔËÐÐ £¬ËüÖ§³ÖÒ»×éÓÃÓÚÍøÂçϵͳºÍÓû§ÐÅÏ¢µÄºÅÁî £¬²¢ÇÒÄܹ»ÔËÐдÓC2×÷Ϊ²å¼þÄ£¿éÏÂÔØµÄËÁÒâ´úÂë¡£Õâ´Î¹¥»÷³É¹¦µØÏ°È¾ÁËÔËÐÐiOS 15.7µÄÉ豸¡£


https://securelist.com/operation-triangulation/109842/


6¡¢Trend Micro°ä²¼ÐÂÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨


5ÔÂ31ÈÕ £¬Trend Micro°ä²¼Á˹ØÓÚÐÂLinuxÀÕË÷Èí¼þBlackSuitµÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±²é³­ÁËÕë¶ÔLinuxµÄx64 VMware ESXi°æ±¾ £¬·¢ÏÖRoyalºÍBlackSuitÖ®¼äÓм«¸ßµÄÀàËÆ¶È¡£»ùÓÚBinDiffµÄ±ÈÁ¦·¢ÏÖ £¬º¯ÊýµÄÀàËÆ¶ÈΪ93.2% £¬¸ù»ù¿éµÄÀàËÆ¶ÈΪ99.3% £¬¶øÌø×ªµÄÀàËÆ¶ÈΪ98.4%¡£´Ë±í £¬¶þÕß¶¼Ê¹ÓÃOpenSSLµÄAES½øÐмÓÃÜ £¬²¢ÀûÓÃÀàËÆµÄ¼äЪ¼ÓÃܼ¼ÊõÀ´¼Ó¿ì¼ÓÃܹý³Ì¡£×êÑÐÈËÔ±°µÊ¾ £¬BlackSuitҪôÊÇͳһ¿ª·¢Õß¿ª·¢µÄбäÌå £¬ÒªÃ´ÊÇʹÓÃÁËÀàËÆ´úÂëµÄɽկ°æ £¬»òÕßÊÇRoyalµÄ´ÓÊô»ú¹¹¶Ôԭʼ´úÂë½øÐÐÁËÅú¸Ä¡£


https://www.trendmicro.com/en_us/research/23/e/investigating-blacksuit-ransomwares-similarities-to-royal.html