΢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
Ðû²¼Ê±¼ä 2023-04-181¡¢Î¢ÈíÅû¶ʹÓÃRemcos RATÕë¶ÔÃÀ¹ú˰ÎñÐÐÒµµÄ¹¥»÷»î¶¯
4ÔÂ13ÈÕ£¬£¬£¬£¬Î¢ÈíÅû¶Á˽üÆÚÕë¶ÔÃÀ¹ú»á¼ÆºÍ±¨Ë°¹«Ë¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£´¹ÂÚÓʼþÖеÄÁ´½Ó¿ÉÈÆ¹ý¼ì²â£¬£¬£¬£¬×îÖÕÖ¸ÏòÎļþÍйÜÍøÕ¾ÏÂÔØZIPÎĵµ¡£¡£¡£ZIPÎĵµ°üÀ¨Ðí¶àαװ³ÉÖÖÖÖ˰±íPDFµÄÎļþ£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇWindows¿ì½Ý·½·¨¡£¡£¡£¿£¿£¿£¿£¿ì½Ý·½·¨Ö´ÐÐPowerShell£¬£¬£¬£¬´ÓÔ¶³ÌÖ÷»úÏÂÔØVBSÎļþ¡£¡£¡£ÕâЩVBSÎļþ½«ÏÂÔØ²¢Ö´ÐÐGuLoader£¬£¬£¬£¬½ø¶ø×°ÖÃRemcos RAT¡£¡£¡£Remcosͨ³£ÓÃÓÚ»ñµÃ¹«Ë¾µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËȨÏÞ½øÒ»²½Èö²¥£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢×°ÖÃÆäËü¶ñÒâÈí¼þ¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/04/13/threat-actors-strive-to-cause-tax-day-headaches/
2¡¢ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨Bitrue±»ºÚËðʧ2300ÍòÃÀÔª
ýÌå4ÔÂ15Èճƣ¬£¬£¬£¬ÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨BitrueÒ»¸öÊý×ÖÇ®°ü±»ºÚ£¬£¬£¬£¬ËðʧԼ2300ÍòÃÀÔª¡£¡£¡£ÉùÃ÷ÌåÏÖ£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˶àÖÖÊý×ÖÇ®±Ò£¬£¬£¬£¬°üÀ¨ÒÔÌ«·»(ETH)¡¢Polygon(MATIC)¡¢Shiba Inu(SHIB)¡¢Quant(QNT)¡¢GALAºÍHolo(HOT)¡£¡£¡£Bitrue³Æ£¬£¬£¬£¬ÊÜÓ°ÏìµÄÊÇ¿ÉÒÔͨ¹ý»¥ÁªÍø»á¼ûµÄÈÈÇ®°ü£¬£¬£¬£¬Ö»°üÀ¨Bitrue×Ü×ʽðµÄ²»µ½5%£¬£¬£¬£¬ÆäÓàÇ®°üÈÔÈ»Çå¾²¡£¡£¡£¸Ãƽ̨ÒÑÔÝÍ£ËùÓÐÌá¿î£¬£¬£¬£¬Í¬Ê±¾ÙÐÐÇå¾²¼ì²é£¬£¬£¬£¬ÍýÏëÓÚ4ÔÂ18ÈÕÖØÐ¿ª·Å¡£¡£¡£
https://therecord.media/bitrue-23million-stolen-cryptocurrency
3¡¢²¨À¼Ç鱨»ú¹¹Í¸Â¶APT29Êǹ¥»÷±±Ô¼ºÍÅ·Ã˵ÄÄ»ºóºÚÊÖ
²¨À¼¾üÊ·´Ç鱨¾Ö¼°ÅÌËã»úÓ¦¼±ÏìӦС×éÔÚ4ÔÂ13Èճƣ¬£¬£¬£¬APT29ÓëÕë¶Ô±±Ô¼ºÍÅ·Ã˵Ĺ¥»÷Óйء£¡£¡£¸ÃÇ鱨»ú¹¹Ö¸³ö£¬£¬£¬£¬½üÆÚ»î¶¯µÄÐí¶àÒªËØ£¬£¬£¬£¬°üÀ¨»ù´¡ÉèÊ©¡¢Ê¹ÓõÄÊÖÒպ͹¤¾ß£¬£¬£¬£¬¶¼ÓëÒÑÍùµÄAPT29»î¶¯Öصþ¡£¡£¡£¹¥»÷Õë¶ÔÍâ½»Ö°Ô±£¬£¬£¬£¬Ê¹ÓÃð³äÅ·ÖÞ¹ú¼Ò´óʹ¹ÝµÄÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬²¢¸½É϶ñÒâÍøÕ¾µÄÁ´½Ó»ò¸½¼þ£¬£¬£¬£¬Ö¼ÔÚͨ¹ýISO¡¢IMGºÍZIPÎļþ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬£¬°üÀ¨SNOWYAMBER¡¢HALFRIGºÍQUARTERRIGµÈ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£
https://securityaffairs.com/144763/apt/apt29-behind-nato-eu-attacks.html
4¡¢AhnLab·¢Ã÷ÀÕË÷Èí¼þTrigona¹¥»÷MS-SQLЧÀÍÆ÷µÄ»î¶¯
AhnLab 4ÔÂ17ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÀÕË÷Èí¼þTrigona¹¥»÷ÖÎÀí²»ÉÆµÄMS-SQLЧÀÍÆ÷µÄ»î¶¯¡£¡£¡£¾ÝÍÆ²â£¬£¬£¬£¬¹¥»÷ÕßÔÚ×°ÖÃTrigona֮ǰÊ×ÏÈ×°ÖÃÁ˶ñÒâÈí¼þCLR Shell¡£¡£¡£CLR ShellÓÐÒ»¸öʹÓÃÌáȨÎó²îµÄÀý³Ì£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTrigonaÐèÒª¸ßȨÏÞ¡£¡£¡£MS-SQLÀú³Ìsqlservr.exeÒÔsvcservice.exeµÄÃûÒå×°ÖÃTrigona¡£¡£¡£svcservice.exeÊÇÒ»¸ödropper£¬£¬£¬£¬ËüÔÚͳһÆð¾¶ÉϽ¨Éè²¢Ö´ÐÐÏÖʵµÄTrigonaÀÕË÷Èí¼þ£¬£¬£¬£¬¼´svchost.exe¡£¡£¡£
https://asec.ahnlab.com/en/51343/
5¡¢IBMÐû²¼¹ØÓÚÓëFIN7Ïà¹ØµÄ¶ñÒâÈí¼þDominoµÄÆÊÎö±¨¸æ
4ÔÂ14ÈÕ£¬£¬£¬£¬IBMÏêÊöÁËǰConti³ÉÔ±ºÍFIN7¿ª·¢Ö°Ô±ÁªÊÖÍÆ³öеĶñÒâÈí¼þDomino¡£¡£¡£DominoÓÉÁ½¸ö×é¼þ×é³É£¬£¬£¬£¬»®·ÖΪDomino BackdoorºÍDomino Loader¡£¡£¡£Í¨³££¬£¬£¬£¬Dave Loader»á·Ö·¢Domino Backdoor¡£¡£¡£¸ÃºóÃÅ¿Éö¾ÙϵͳÐÅÏ¢£¬£¬£¬£¬È»ºóÏÂÔØDomino Loader¡£¡£¡£Loader»á×°ÖÃÃûΪNemesis ProjectµÄǶÈëʽ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£DominoµÄ´úÂëÓëLizarÓдó×ÚÖØµþ£¬£¬£¬£¬LizarÊÇÓëFIN7Ïà¹ØµÄ¹¤¾ß°ü£¬£¬£¬£¬Òò´ËIBM½«Æä¹éÒòÓÚFIN7¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃDave Loader¼ÓÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬Òò´Ë¿É½«ÆäÓëTrickbot/Conti¼°Æäǰ³ÉÔ±ÁªÏµÆðÀ´¡£¡£¡£
https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/
6¡¢TrellixÐû²¼ÐÂRaaSÌṩÉÌRTM LockerµÄÆÊÎö±¨¸æ
4ÔÂ13ÈÕ£¬£¬£¬£¬TrellixÐû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÌṩÉÌRead The Manual(RTM)LockerµÄÆÊÎö±¨¸æ¡£¡£¡£¸ÃÍÅ»ïµÄÕ½ÂÔֻרעÓÚÒ»¼þÊ£¬£¬£¬£¬¼´µÍµ÷ÐÐÊ¡£¡£¡£ËûÃǵÄÄ¿µÄ²»ÊdzÉΪÐÂÎÅÍ·Ìõ£¬£¬£¬£¬¶øÊÇÔÚ²»ÎªÈËÖªµÄÇéÐÎÏÂ׬Ǯ¡£¡£¡£¸Ã×éÖ¯»¹Èƹý¡¢Ò½Ôº¡¢COVID-19ÒßÃçÏà¹Ø×éÖ¯¡¢Òªº¦»ù´¡ÉèÊ©ºÍÖ´·¨²¿·ÖµÈ£¬£¬£¬£¬ÒÔ¾¡¿ÉÄÜïÔ̹Ø×¢¡£¡£¡£¸ÃÍÅ»ïµÄÓªÒµÉèÖ㬣¬£¬£¬ÒªÇóÁ¥Êô»ú¹¹¼á³Ö»îÔ¾£¬£¬£¬£¬²»È»ËûÃǵÄÕÊ»§½«±»É¾³ý¡£¡£¡£ÕâÏÔʾÁ˸Ã×éÖ¯µÄ³ÉÊì¶È£¬£¬£¬£¬ÕâÒ»µãÔÚÆäËü×éÖ¯£¨ÈçConti£©ÖÐÒ²±»ÊӲ쵽¡£¡£¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html


¾©¹«Íø°²±¸11010802024551ºÅ