Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȹ̵ÄÎó²îCVE-2023-28489

Ðû²¼Ê±¼ä 2023-05-09

1¡¢Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȹ̵ÄÎó²îCVE-2023-28489


¾ÝýÌå5ÔÂ5ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬Î÷ÃÅ×ÓÐÞ¸´ÁËÓ°ÏìSicam A8000 CP-8031ºÍCP-8050²úÆ·µÄCPCI85¹Ì¼þµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2023-28489£©¡£¡£¡£¡£ÕâЩ²úÆ·ÊÇÔ¶³ÌÖն˵¥Î»(RTU)£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÍêÈ«¿ØÖÆ×°±¸£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìµçÍøµÄÎȹ̣¬ £¬£¬£¬£¬£¬£¬ÉõÖÁ¿Éͨ¹ý¸ü¸ÄÒªº¦×Ô¶¯»¯²ÎÊýµ¼ÖÂÍ£µç£¬ £¬£¬£¬£¬£¬£¬»¹¿ÉÒÔʹÓøÃÎó²î×°ÖúóÃÅ¡£¡£¡£¡£²¹¶¡Ôڹ̼þ°æ±¾CPCI85 V05»ò¸ü¸ß°æ±¾ÖпÉÓ㬠£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹Ö¸³ö£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýʹÓ÷À»ðǽÏÞÖÆ¶ÔTCP¶Ë¿Ú80ºÍ443ÉϵÄWebЧÀÍÆ÷µÄ»á¼û£¬ £¬£¬£¬£¬£¬£¬Ò²¿ÉÒÔ»º½â¸ÃÎó²î¡£¡£¡£¡£ 


https://www.securityweek.com/critical-siemens-rtu-vulnerability-could-allow-hackers-to-destabilize-power-grid/


2¡¢ÃÀ¹úNextGen HealthcareÔ¼100ÍòÓû§µÄÐÅϢй¶


¾Ý5ÔÂ8ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úÈí¼þºÍЧÀ͹«Ë¾NextGen Healthcareй¶ÁËÔ¼100ÍòÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ҪΪҽÁƱ£½¡ÐÐÒµ¿ª·¢ºÍÏúÊÛµç×Ó¿µ½¡¼Í¼£¨EHR£©Èí¼þºÍʵ¼ùÖÎÀíϵͳ¡£¡£¡£¡£¾ÝϤ£¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶ÊÂÎñÓÚ4ÔÂ24ÈÕ±»·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÊÓ²ìÈ·¶¨¹¥»÷ÕßÔÚ3ÔÂ29ÈÕÖÁ4ÔÂ14ÈÕ»á¼ûÁ˹«Ë¾µÄϵͳ£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÁË1049375ÈË¡£¡£¡£¡£¹«Ë¾Í¸Â¶¹¥»÷ÕßʹÓÃÁËËÆºõÊÇ´ÓÆäËüȪԴ»òÓëNextGenÎ޹صĹ¥»÷ÊÂÎñÖÐÇÔÈ¡µÄ¿Í»§¶Ëƾ֤»á¼ûÊý¾Ý¿â£¬ £¬£¬£¬£¬£¬£¬ËüÃÇÖØÐÂÉèÖÃÁËÃÜÂëÒÔ¿ØÖƸÃÊÂÎñ¡£¡£¡£¡£ÕâÊÇNextGenÔÚ½ñÄ걬·¢µÄµÚ¶þÆðй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬1ÔÂ19ÈÕ£¬ £¬£¬£¬£¬£¬£¬ËüÔâµ½ÁËBlackCatµÄÀÕË÷¹¥»÷¡£¡£¡£¡£


https://securityaffairs.com/145935/data-breach/nextgen-healthcare-data-breach.html


3¡¢ÎÚ¿ËÀ¼CERT-UA·¢Ã÷Ö¼ÔÚ·Ö·¢SmokeLoaderµÄ´¹Âڻ


ýÌå5ÔÂ8Èճƣ¬ £¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼CERT-UAÅû¶ÁËÒÔ¶àÓïÑÔÎļþµÄÐÎʽ·Ö·¢¶ñÒâÈí¼þSmokeLoaderµÄ´¹Âڻ¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»Ñ¬È¾ÕÊ»§·¢ËÍÒÔ¡°Õ˵¥/¸¶¿î¡±ÎªÖ÷ÌâµÄÓʼþ£¬ £¬£¬£¬£¬£¬£¬¸½¼þΪZIPÎĵµ¡£¡£¡£¡£Õâ¸öZIPÊÇÒ»¸ö¶àÓïÑÔÎļþ£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸öÓÕ¶üÎĵµºÍÒ»¸öJavaScriptÎļþpax_2023_AB1058..js¡£¡£¡£¡£JavaScriptÎļþʹÓÃPowerShell£¬ £¬£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþportable.exe£¬ £¬£¬£¬£¬£¬£¬Ëü½«Æô¶¯¶ñÒâÈí¼þSmokeLoader¡£¡£¡£¡£¶ÔÓòÃû×¢²áÈÕÆÚºÍÎļþ±àÒëÈͮ򵀮ÊÎöÅú×¢£¬ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¼ÓÚ4Ô·ݣ¬ £¬£¬£¬£¬£¬£¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0006¡£¡£¡£¡£ 


https://securityaffairs.com/145911/malware/cert-ua-smokeloader-campaign.html


4¡¢Ñо¿Ö°Ô±Åû¶AkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢


5ÔÂ7ÈÕ±¨µÀ³Æ£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËAkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷¡£¡£¡£¡£AkiraÓÚ3Ô·ÝÍÆ³ö£¬ £¬£¬£¬£¬£¬£¬Éù³ÆÒѹ¥»÷ÁË16¼Ò¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬Éæ¼°½ÌÓý¡¢½ðÈÚ¡¢·¿µØ²ú¡¢ÖÆÔìºÍ×ÉѯµÈ¸÷¸öÐÐÒµ¡£¡£¡£¡£ËäÈ»ÁíÒ»¸öÃûΪAkiraµÄÀÕË÷Èí¼þÒÑÓÚ2017ÄêÐû²¼£¬ £¬£¬£¬£¬£¬£¬µ«¾ÝÐÅÓëÕâЩ»î¶¯²¢²»Ïà¹Ø¡£¡£¡£¡£Akira»áÔËÐÐPowerShellÏÂÁîɾ³ý¾íÓ°¸±±¾£¬ £¬£¬£¬£¬£¬£¬¼ÓÃÜÎļþ²¢¸½¼ÓÀ©Õ¹Ãû.akira£¬ £¬£¬£¬£¬£¬£¬È»ºóÔÚÿ¸öÎļþ¼ÐÁôÏÂÊê½ð¼Í¼akira_readme.txt¡£¡£¡£¡£ÆäÊê½ðÒªÇó´Ó20ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/


5¡¢FortiGuard·¢Ã÷SideCopyÍÅ»ïÕë¶ÔÓ¡¶ÈµÄ¹¥»÷»î¶¯


5ÔÂ4ÈÕ£¬ £¬£¬£¬£¬£¬£¬FortiGuard³ÆÆä·¢Ã÷ÁËSideCopyÍÅ»ïʹÓÃÓ¡¶È¾üÊÂÑо¿×éÖ¯Ïà¹ØÖ÷ÌâµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÓëÓ¡¶È¹ú·ÀÑо¿ÓëÉú³¤×éÖ¯(DRDO)ÓйصÄZIPÎļþÀ´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£ZipÎļþ°üÀ¨Ò»¸ö¿ì½Ý·½·¨Îļþ£¬ £¬£¬£¬£¬£¬£¬Ëü»áʹÓÃHTAs³ÌÐò»òmshta.exe¶¨Ïòµ½¹¥»÷ÕßµÄÓò¡£¡£¡£¡£ÔÚÕâÀ £¬£¬£¬£¬£¬£¬ÏÂÁîÐвÎÊýÖ¸ÏòÒ»¸öURL£¬ £¬£¬£¬£¬£¬£¬»áÏÂÔØ²¢Ö´ÐÐÒ»¸ö¶ñÒâÎļþPantomime.hta¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ÓëÒÔÍùµÄ»î¶¯ÓÐËù²î±ð£¬ £¬£¬£¬£¬£¬£¬´Ë´ÎµÄpayloadËÆºõÊÇʹÓù¤¾ßSILENTTRINITY½¨ÉèµÄ¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/clean-rooms-nuclear-missiles-and-sidecopy


6¡¢CleafyÐû²¼drIBANÕë¶ÔÒâ´óÀûµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


5ÔÂ4ÈÕ£¬ £¬£¬£¬£¬£¬£¬CleafyÐû²¼Á˹ØÓÚʹÓÃеÄWeb×¢È빤¾ß°üDrIBANµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£ÕâЩ»î¶¯µÄÒªº¦×é¼þdrIBAN£¬ £¬£¬£¬£¬£¬£¬ÊÇÒ»¸ö¾ßÓÐǿʢATSÒýÇæµÄWeb×¢È빤¾ß°ü£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃËüÀÖ³ÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬ £¬£¬£¬£¬£¬£¬ÀýÈçÒøÐкͽðÈÚ»ú¹¹ÔڵǼºÍÖ§¸¶Àú³ÌÖнÓÄɵÄMFAºÍSCAÊÚȨ½×¶Î¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¾­ÓÉÈÏÖ¤µÄÓʼþ£¨»òPECÓʼþ£©£¬ £¬£¬£¬£¬£¬£¬¸½´øÒ»¸ö¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬£¬£¬£¬×÷ΪsLoad¶ñÒâÈí¼þµÄÏÂÔØ³ÌÐò¡£¡£¡£¡£sLoadÊÇÒ»ÖÖÕì̽¹¤¾ß£¬ £¬£¬£¬£¬£¬£¬»¹Í¨¹ýÀÄÓÃÕýµ±µÄWindows¹¤¾ß£¨ÈçPowerShellºÍBITSAdmin£©À´Ê¹ÓÃLotLÊÖÒÕ¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÒâ´óÀû½ðÈÚÐÐÒµ¡£¡£¡£¡£


https://www.cleafy.com/cleafy-labs/uncovering-driban-fraud-operations-chapter1