´òÓ¡ÖÎÀíÈí¼þ¿ª·¢ÉÌPaperCutÐÞ¸´Æä²úÆ·ÖÐÒѱ»Ê¹ÓÃÎó²î

Ðû²¼Ê±¼ä 2023-04-21

1¡¢´òÓ¡ÖÎÀíÈí¼þ¿ª·¢ÉÌPaperCutÐÞ¸´Æä²úÆ·ÖÐÒѱ»Ê¹ÓÃÎó²î


¾ÝýÌå4ÔÂ19ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬PaperCut±Þ²ß¿Í»§×°ÖøüУ¬ £¬£¬£¬£¬ £¬ÐÞ¸´ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓõÄÎó²î¡£¡£ ¡£¡£¡£PaperCutÓÃÓÚʹ´òÓ¡ÖÎÀíÈí¼þÓëËùÓÐÖ÷ÒªÆ·ÅÆÇ徲̨¼æÈÝ£¬ £¬£¬£¬£¬ £¬ËüÉù³ÆÎªÀ´×Ô100¶à¸ö¹ú¼ÒµÄÊýÒÚÈËÌṩЧÀÍ¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÓÚ1ÔÂ10ÈÕÊÕµ½±¨¸æ£¬ £¬£¬£¬£¬ £¬µÃÖªÆäPaperCut MF/NGµÄ±£´æÁ½¸öÎó²î£¬ £¬£¬£¬£¬ £¬»®·ÖÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²îºÍÒ»¸öÐÅϢй¶Îó²î¡£¡£ ¡£¡£¡£Ö®ºó£¬ £¬£¬£¬£¬ £¬Õâ¼ÒÈí¼þ¿ª·¢É̸üÐÂÁËÆä3ÔµÄÇ徲ͨ¸æ£¬ £¬£¬£¬£¬ £¬³Æ×èÖ¹2023Äê4ÔÂ18ÈÕ£¬ £¬£¬£¬£¬ £¬ÓÐÖ¤¾ÝÅúעδ´ò²¹¶¡µÄЧÀÍÆ÷ÕýÔÚ±»Ê¹Ó㬠£¬£¬£¬£¬ £¬µ«Ã»ÓÐ͸¶̫¶àÓйØÕâЩÎó²îµÄÐÅÏ¢¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-bug-in-papercut-servers/


2¡¢Ó¡¶ÈICICIÒøÐÐÒòϵͳÉèÖùýʧй¶Êý°ÙÍòÌõ¿Í»§ÐÅÏ¢


¾Ý4ÔÂ20ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬Ó¡¶ÈICICIÒøÐÐй¶ÁËÊý°ÙÍòÌõ¿Í»§ÐÅÏ¢¡£¡£ ¡£¡£¡£2ÔÂ1ÈÕ£¬ £¬£¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄDigital Ocean´æ´¢Í°£¬ £¬£¬£¬£¬ £¬ÆäÖаüÀ¨Áè¼Ý360Íò¸öICICIÒøÐеÄÎļþ£¬ £¬£¬£¬£¬ £¬Éæ¼°ÒøÐм°Æä¿Í»§µÄÃô¸ÐÊý¾Ý¡£¡£ ¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨¿Í»§µÄÒøÐÐÕË»§ÐÅÏ¢¡¢ÐÅÓÿ¨ºÅ¡¢»¤ÕÕ¡¢Éí·ÝÖ¤ºÍÓ¡¶ÈÄÉ˰ÈËʶÓÖÃûµÈ£¬ £¬£¬£¬£¬ £¬ÒøÐеĶÔÕ˵¥ºÍKYC±í¸ñ£¬ £¬£¬£¬£¬ £¬ÒÔ¼°ÒøÐÐÔ±¹¤ºÍÇóÖ°ÕߵļòÀú¡£¡£ ¡£¡£¡£×èÖ¹3ÔÂ30ÈÕ£¬ £¬£¬£¬£¬ £¬¸Ã´æ´¢Í°Òѱ»±£»£»£»£»£»£»¤ÆðÀ´¡£¡£ ¡£¡£¡£


https://securityaffairs.com/145094/uncategorized/icici-bank-data-leak.html


3¡¢APT 36ʹÓÃжñÒâÈí¼þPoseidon¹¥»÷Ó¡¶ÈµÄÕþ¸®»ú¹¹


UptycsÔÚ4ÔÂ17ÈÕ³ÆÆä·¢Ã÷ÁËAPT 36£¨Ò²³ÆTransparent Tribe£©Ê¹ÓÃÐÂLinux¶ñÒâÈí¼þPoseidonµÄ¹¥»÷»î¶¯¡£¡£ ¡£¡£¡£¹¥»÷Õßͨ¹ýľÂí»¯µÄ2FAÈí¼þKavach·Ö·¢¶ñÒâÈí¼þpayload£¬ £¬£¬£¬£¬ £¬Ö÷ÒªÕë¶ÔΪӡ¶ÈÕþ¸®»ú¹¹ÊÂÇéµÄLinuxÓû§¡£¡£ ¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö¶ñÒâELFÎļþ£¬ £¬£¬£¬£¬ £¬Ö¼ÔÚ´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷µÚ¶þ½×¶ÎPoseidon payload¡£¡£ ¡£¡£¡£PoseidonÊÇÒ»¸öͨÓúóÃÅ¿ÉÓÃÓÚÐ®ÖÆ±»Ñ¬È¾µÄÖ÷»ú£¬ £¬£¬£¬£¬ £¬Æä¹¦Ð§°üÀ¨¼Í¼¼üÅÌ¡¢½ØÆÁ¡¢ÉÏ´«ºÍÏÂÔØÎļþ£¬ £¬£¬£¬£¬ £¬ÒÔ¼°Í¨¹ýÖÖÖÖ·½·¨Ô¶³ÌÖÎÀíϵͳ¡£¡£ ¡£¡£¡£


https://www.uptycs.com/blog/cyber_espionage_in_india_decoding_apt_36_new_linux_malware


4¡¢SymantecÅû¶PlayµÄÁ½¸öй¤¾ßGrixbaºÍVSS¸´Öƹ¤¾ß


SymantecÓÚ4ÔÂ19ÈÕÅû¶ÁËÀÕË÷ÍÅ»ïPlayµÄÁ½¸öеÄ×Ô½ç˵Êý¾ÝÍøÂ繤¾ß£¬ £¬£¬£¬£¬ £¬¼´GrixbaºÍVSS¸´Öƹ¤¾ß¡£¡£ ¡£¡£¡£GrixbaÊÇÍøÂçɨÃèºÍÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬ £¬£¬£¬£¬ £¬ÓÃÓÚö¾ÙÓòÖеÄÓû§ºÍÅÌËã»ú¡£¡£ ¡£¡£¡£¸Ã¹¤¾ß½«ÍøÂçµ½µÄÊý¾ÝÉúÑÄÔÚCSVÎļþÖв¢Ñ¹Ëõ³ÉZIP£¬ £¬£¬£¬£¬ £¬È»ºóй¶µ½¹¥»÷ÕßµÄC2ЧÀÍÆ÷£¬ £¬£¬£¬£¬ £¬ÎªÏÂÒ»²½¹¥»÷ÌṩÖ÷ÒªÐÅÏ¢¡£¡£ ¡£¡£¡£VSS¸´Öƹ¤¾ßÒ²ÊÇʹÓÃCostura¹¤¾ß¿ª·¢µÄ£¬ £¬£¬£¬£¬ £¬½«AlphaVSS¿âǶÈëµ½¿ÉÖ´ÐÐÎļþÖУ¬ £¬£¬£¬£¬ £¬¸Ã¹¤¾ßÓÃÓÚÔÚ¼ÓÃÜ֮ǰ£¬ £¬£¬£¬£¬ £¬´Ó±»Ñ¬È¾×°±¸µÄVSS¾í¸´ÖÆÎļþ¡£¡£ ¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy


5¡¢ThreatMonÐû²¼Blind Eagle¹¥»÷»î¶¯µÄÊÖÒÕÆÊÎö±¨¸æ


4ÔÂ19ÈÕ£¬ £¬£¬£¬£¬ £¬ThreatMonÐû²¼±¨¸æ£¬ £¬£¬£¬£¬ £¬½«Blind EagleÁ´½Óµ½Ò»¸öеĶà½×¶Î¹¥»÷Á´¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ʹÓÃÒ»¸öJavaScriptÏÂÔØ³ÌÐòÀ´Ö´ÐÐÍйÜÔÚDiscord CDNÖеÄPowerShell¾ç±¾¡£¡£ ¡£¡£¡£¸Ã¾ç±¾»á·Ö·¢ÁíÒ»¸öPowerShell¾ç±¾ºÍÒ»¸öWindowsÅú´¦Öóͷ£Îļþ£¬ £¬£¬£¬£¬ £¬²¢ÔÚWindowsÆô¶¯Îļþ¼ÐÖÐÉúÑÄÒ»¸öVBScriptÎļþÒÔʵÏÖ³¤ÆÚÐÔ¡£¡£ ¡£¡£¡£È»ºóÔËÐÐVBScript´úÂëÒÔÆô¶¯Åú´¦Öóͷ£Îļþ£¬ £¬£¬£¬£¬ £¬Åú´¦Öóͷ£ÎļþËæºó±»½âÃÜ£¬ £¬£¬£¬£¬ £¬ÒÔÔËÐÐ֮ǰÓëÖ®Ò»Æð·Ö·¢µÄPowerShell¾ç±¾¡£¡£ ¡£¡£¡£ÔÚ×îºó½×¶Î£¬ £¬£¬£¬£¬ £¬PowerShell¾ç±¾»áÖ´ÐÐnjRAT¡£¡£ ¡£¡£¡£


https://threatmon.io/apt-blind-eagles-malware-arsenal-technical-analysis/


6¡¢FortraÐû²¼¹ØÓÚGoAnywhere MFTÎó²î¹¥»÷µÄÊÓ²ìЧ¹û


 4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬FortraÐû²¼Á˹ØÓÚGoAnywhere MFTÎó²î£¨CVE-2023-0669£©Ê¹ÓûµÄÊÓ²ìЧ¹û¡£¡£ ¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬ £¬£¬£¬£¬ £¬¸Ã¹«Ë¾ÓÚ1ÔÂ30ÈÕÒâʶµ½²¿·ÖGoAnywhere MFTaaSʵÀýÖеĿÉÒɻ£¬ £¬£¬£¬£¬ £¬²¢Ñ¸ËٹرÕÔÆÐ§ÀÍÒÔ¾ÙÐнøÒ»³ÌÐò²é¡£¡£ ¡£¡£¡£ÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬ £¬¹¥»÷ÕßÔÚ1ÔÂ28ÈÕÖÁ1ÔÂ30ÈÕʹÓÃÎó²îÔÚ²¿·Ö¿Í»§ÇéÐÎÖн¨ÉèÁËÕÊ»§£¬ £¬£¬£¬£¬ £¬È»ºóʹÓÃÕâЩÕÊ»§´ÓMFTÇéÐÎÏÂÔØÎļþ¡£¡£ ¡£¡£¡£¹¥»÷Õß»¹ÔÚijЩMFTaaS¿Í»§ÇéÐÎÖÐ×°ÖÃÁËÁ½¸öÌØÁíÍ⹤¾ß£¬ £¬£¬£¬£¬ £¬NetcatºÍErrors.jsp¡£¡£ ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬ £¬Fortra·¢Ã÷ÔçÔÚ1ÔÂ18ÈÕ¸ÃÎó²î¾Í±»ÓÃÓÚÕë¶ÔÔËÐÐGoAnywhere MFTÌØ¶¨ÉèÖõÄÍâµØ¿Í»§¡£¡£ ¡£¡£¡£


https://www.fortra.com/blog/summary-investigation-related-cve-2023-0669