APT36ͨ¹ý¶à¸öαÔìµÄYouTube APK·Ö·¢CapraRAT
Ðû²¼Ê±¼ä 2023-09-201¡¢APT36ͨ¹ý¶à¸öαÔìµÄYouTube APK·Ö·¢CapraRAT
SentinelLabsÔÚ9ÔÂ18ÈÕ¹ûÕæÁËAPT36£¨ÓÖ³ÆTransparent Tribe£©Ê¹ÓÃÁËÖÁÉÙ3¸öαÔì³ÉYouTubeµÄAndroidÓ¦ÓóÌÐò°ü(APK)·Ö·¢CapraRATµÄ»î¶¯¡£¡£¡£¡£¶ñÒâÈí¼þÒ»µ©×°ÖÃÔÚÄ¿µÄ×°±¸ÉÏ£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔÍøÂçÊý¾Ý¡¢¼Í¼ÒôƵ»òÊÓÆµÒÔ¼°»á¼ûͨѶÐÅÏ¢£¬£¬£¬£¬£¬£¬ÊµÖʾÍÏñÌØ¹¤Èí¼þÒ»Ñù¡£¡£¡£¡£¶ñÒâAPKÔÚGoogle PlayÖ®Íâ·Ö·¢£¬£¬£¬£¬£¬£¬Òò´Ë¿ÉÄÜÊÇͨ¹ýÉ繤¹¥»÷¾ÙÐзַ¢¡£¡£¡£¡£ÕâЩAPKÓÚ2023Äê4Ô¡¢7ÔºÍ8ÔÂÉÏ´«µ½VirusTotal£¬£¬£¬£¬£¬£¬ÆäÖÐÁ½¸öÃûΪ¡°YouTube¡±£¬£¬£¬£¬£¬£¬Ò»¸ö±»³ÆÎª¡°Piya Sharma¡±¡£¡£¡£¡£
https://www.sentinelone.com/labs/capratube-transparent-tribes-caprarat-mimics-youtube-to-hijack-android-phones/
2¡¢TrendMicroÐÞ¸´Òѱ»Ê¹ÓõÄRCEÎó²îCVE-2023-41179
¾ÝýÌå9ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Trend MicroÐÞ¸´ÁËApex One¶Ëµã±£»£»£»£»£»£»¤½â¾ö¼Æ»®ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-41179£©¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÇå¾²Èí¼þ¸½´øµÄµÚÈý·½Ð¶ÔسÌÐòÄ£¿£¿£¿£¿£¿£¿éÖУ¬£¬£¬£¬£¬£¬ÖµµÃ×¢ÖØµÄÊǹ¥»÷Õß±ØÐèÏÈ»ñµÃÄ¿µÄϵͳÉϵÄÖÎÀí¿ØÖÆÌ¨»á¼ûȨÏ޲ŻªÊ¹ÓôËÎó²î¡£¡£¡£¡£Trend Micro³ÆÒÑÊӲ쵽ÖÁÉÙÓÐÒ»´ÎÕë¶Ô´ËÎó²îµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üе½×îа汾¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trend-micro-fixes-endpoint-protection-zero-day-used-in-attacks/
3¡¢Earth LuscaʹÓÃSprySOCKSÕë¶Ô¶à¸ö¹ú¼ÒµÄ¹Ù·½ÍøÕ¾
9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁËEarth LuscaʹÓÃеÄLinuxºóÃÅSprySOCKSµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ÆÊÎöÅú×¢£¬£¬£¬£¬£¬£¬¸ÃºóÃÅÔ´×Ô¿ªÔ´Windows¶ñÒâÈí¼þTrochilus£¬£¬£¬£¬£¬£¬ÆäÐí¶à¹¦Ð§±»ÒÆÖ²µ½LinuxϵͳÉÏ£¬£¬£¬£¬£¬£¬C2ͨѶÐÒéÀàËÆÓÚWindowsºóÃÅRedLeaves£¬£¬£¬£¬£¬£¬½»»¥Ê½shellµÄʵÏÖÔ´×ÔLinux¶ñÒâÈí¼þDerusbi¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃNdayÎó²î×°ÖÃCobalt Strike beacon£¬£¬£¬£¬£¬£¬È»ºó·Ö·¢SprySOCKS¼ÓÔØ³ÌÐò¡£¡£¡£¡£Earth LuscaÔÚ½ñÄêÉϰëÄêÖ÷ÒªÕë¶Ô¶«ÄÏÑÇ¡¢ÖÐÑÇ¡¢°Í¶û¸ÉµÈµØµÄÍâ½»ÊÂÎñ¡¢ÊÖÒպ͵çÐÅÏà¹ØµÄÕþ¸®ÊµÌå¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linux-backdoor.html
4¡¢¼ÓÄôóÕþ¸®ºÍ½ðÈÚµÈÁìÓòÔâNoName057(16)µÄDDoS¹¥»÷
¾Ý9ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¼ÓÄôóµÄ¶à¸öʵÌåÔâµ½ÁËNoName057(16)µÄDDoS¹¥»÷¡£¡£¡£¡£¼ÓÄôóÍøÂçÖÐÐÄÌåÏÖ£¬£¬£¬£¬£¬£¬×Ô9ÔÂ13ÈÕÒÔÀ´£¬£¬£¬£¬£¬£¬ÆäÏàʶ²¢ÏìÓ¦ÁËÕë¶Ô¼ÓÄôóÕþ¸®ÄÚ²¿ÒÔ¼°½ðÈÚºÍÔËÊ䲿·ÖµÄ¶àÆðDDoS¹¥»÷»î¶¯¡£¡£¡£¡£½ñÄê2Ô·ݣ¬£¬£¬£¬£¬£¬¸ÃÖÐÐÄÊӲ쵽Õë¶ÔÆäËü¹ú¼ÒµÄÀàËÆDDoS¹¥»÷»î¶¯¡£¡£¡£¡£NoName057(16)ͨ³£Ê¹Óý©Ê¬ÍøÂçÀ´¹¥»÷Ä¿µÄµÄWebЧÀÍÆ÷£¬£¬£¬£¬£¬£¬È»ºóìÅÒ«Æä¶ñÒâ»î¶¯¡£¡£¡£¡£
https://www.cyber.gc.ca/en/alerts-advisories/distributed-denial-service-campaign-targeting-multiple-canadian-sectors
5¡¢SysdigÅû¶Õë¶Ô²»³£¼ûAWSЧÀ͵Ĺ¥»÷»î¶¯AMBERSQUID
SysdigÓÚ9ÔÂ18ÈÕÅû¶ÁËÒ»ÖÖеÄÔÆÔÉú¼ÓÃÜÐ®ÖÆ¹¥»÷»î¶¯AMBERSQUID¡£¡£¡£¡£´Ë»î¶¯Ö÷ÒªÕë¶Ô²»³£ÓõÄAWSЧÀÍ£¬£¬£¬£¬£¬£¬ÀýÈçAWS Amplify¡¢AWS FargateºÍAmazon SageMaker¡£¡£¡£¡£²»³£ÓÃÒâζ×Å´ÓÇå¾²½Ç¶ÈÀ´¿´ÕâЩЧÀ;³£±»ºöÊÓ£¬£¬£¬£¬£¬£¬¶øAMBERSQUID»î¶¯¿ÉÄÜ»áÈÃÄ¿µÄÌìÌìËðʧÁè¼Ý10000ÃÀÔª¡£¡£¡£¡£¸Ã»î¶¯Äܹ»Ê¹ÓÃÔÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬¶ø²»»á´¥·¢AWSÅú×¼¸ü¶à×ÊÔ´µÄÇëÇ󡣡£¡£¡£SysdigÌåÏÖËüÔÚÆÊÎöÁËDocker HubÉϵÄ170Íò¸ö¾µÏñºó·¢Ã÷Á˸û£¬£¬£¬£¬£¬£¬²¢½«Æä¹éÒòÓÚÓ¡ÄáÏà¹ØµÄ¹¥»÷Õß¡£¡£¡£¡£
https://sysdig.com/blog/ambersquid/
6¡¢Intel 471Ðû²¼BumblebeeʹÓÃ4shared WebDAVµÄÆÊÎö
9ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Intel 471Ðû²¼Á˹ØÓÚBumblebeeʹÓÃ4shared WebDAVµÄÆÊÎö±¨¸æ¡£¡£¡£¡£BumblebeeÔÚÔÝÍ£Á½¸öÔº󣬣¬£¬£¬£¬£¬ÓÚ8ÔÂβ»Ö¸´ÔËÓª¡£¡£¡£¡£ÕâÒ»Âֻ×îÏÈÓÚ9ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ÒÀÀµÎ±×°³ÉɨÃè¼þ¡¢·¢Æ±ºÍ֪ͨµÄÀ¬»øÓʼþÀ´ÓÕʹÊÕ¼þÈËÏÂÔØ¶ñÒ⸽¼þ¡£¡£¡£¡£´ó´ó¶¼¸½¼þÊÇLNKÎļþ£¬£¬£¬£¬£¬£¬·¿ªºó»áÔÚÄ¿µÄÅÌËã»úÆô¶¯Ò»ÏµÁÐÏÂÁ£¬£¬£¬£¬£¬Ê×ÏÈÊÇʹÓÃ4shared¹²Ïí´æ´¢ÕÊ»§µÄÓ²±àÂëÆ¾Ö¤ÔÚÍøÂçÇý¶¯Æ÷ÉÏ×°ÖÃWebDAVÎļþ¼Ð£¬£¬£¬£¬£¬£¬×îÖÕ»áÏÂÔØÍйÜÔÚWebDAVЧÀÍÆ÷ÉϵÄBumblebee¡£¡£¡£¡£
https://intel471.com/blog/bumblebee-loader-resurfaces-in-new-campaign