APT36ͨ¹ý¶à¸öαÔìµÄYouTube APK·Ö·¢CapraRAT

Ðû²¼Ê±¼ä 2023-09-20

1¡¢APT36ͨ¹ý¶à¸öαÔìµÄYouTube APK·Ö·¢CapraRAT


SentinelLabsÔÚ9ÔÂ18ÈÕ¹ûÕæÁËAPT36£¨ÓÖ³ÆTransparent Tribe£©Ê¹ÓÃÁËÖÁÉÙ3¸öαÔì³ÉYouTubeµÄAndroidÓ¦ÓóÌÐò°ü(APK)·Ö·¢CapraRATµÄ»î¶¯¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÒ»µ©×°ÖÃÔÚÄ¿µÄ×°±¸ÉÏ£¬£¬£¬£¬ £¬ £¬¾Í¿ÉÒÔÍøÂçÊý¾Ý¡¢¼Í¼ÒôƵ»òÊÓÆµÒÔ¼°»á¼ûͨѶÐÅÏ¢£¬£¬£¬£¬ £¬ £¬ÊµÖʾÍÏñÌØ¹¤Èí¼þÒ»Ñù¡£¡£¡£¡£¡£¡£¶ñÒâAPKÔÚGoogle PlayÖ®Íâ·Ö·¢£¬£¬£¬£¬ £¬ £¬Òò´Ë¿ÉÄÜÊÇͨ¹ýÉ繤¹¥»÷¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£ÕâЩAPKÓÚ2023Äê4Ô¡¢7ÔºÍ8ÔÂÉÏ´«µ½VirusTotal£¬£¬£¬£¬ £¬ £¬ÆäÖÐÁ½¸öÃûΪ¡°YouTube¡±£¬£¬£¬£¬ £¬ £¬Ò»¸ö±»³ÆÎª¡°Piya Sharma¡±¡£¡£¡£¡£¡£¡£


https://www.sentinelone.com/labs/capratube-transparent-tribes-caprarat-mimics-youtube-to-hijack-android-phones/


2¡¢TrendMicroÐÞ¸´Òѱ»Ê¹ÓõÄRCEÎó²îCVE-2023-41179


¾ÝýÌå9ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬ £¬ £¬Trend MicroÐÞ¸´ÁËApex One¶Ëµã± £»£»£»£»£»¤½â¾ö¼Æ»®ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-41179£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÇå¾²Èí¼þ¸½´øµÄµÚÈý·½Ð¶ÔسÌÐòÄ£¿£¿£¿£¿£¿éÖУ¬£¬£¬£¬ £¬ £¬ÖµµÃ×¢ÖØµÄÊǹ¥»÷Õß±ØÐèÏÈ»ñµÃÄ¿µÄϵͳÉϵÄÖÎÀí¿ØÖÆÌ¨»á¼ûȨÏ޲ŻªÊ¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£Trend Micro³ÆÒÑÊӲ쵽ÖÁÉÙÓÐÒ»´ÎÕë¶Ô´ËÎó²îµÄ¹¥»÷»î¶¯£¬£¬£¬£¬ £¬ £¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üе½×îа汾¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/trend-micro-fixes-endpoint-protection-zero-day-used-in-attacks/


3¡¢Earth LuscaʹÓÃSprySOCKSÕë¶Ô¶à¸ö¹ú¼ÒµÄ¹Ù·½ÍøÕ¾


9ÔÂ18ÈÕ£¬£¬£¬£¬ £¬ £¬Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁËEarth LuscaʹÓÃеÄLinuxºóÃÅSprySOCKSµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ÆÊÎöÅú×¢£¬£¬£¬£¬ £¬ £¬¸ÃºóÃÅÔ´×Ô¿ªÔ´Windows¶ñÒâÈí¼þTrochilus£¬£¬£¬£¬ £¬ £¬ÆäÐí¶à¹¦Ð§±»ÒÆÖ²µ½LinuxϵͳÉÏ£¬£¬£¬£¬ £¬ £¬C2ͨѶЭÒéÀàËÆÓÚWindowsºóÃÅRedLeaves£¬£¬£¬£¬ £¬ £¬½»»¥Ê½shellµÄʵÏÖÔ´×ÔLinux¶ñÒâÈí¼þDerusbi¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃNdayÎó²î×°ÖÃCobalt Strike beacon£¬£¬£¬£¬ £¬ £¬È»ºó·Ö·¢SprySOCKS¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£Earth LuscaÔÚ½ñÄêÉϰëÄêÖ÷ÒªÕë¶Ô¶«ÄÏÑÇ¡¢ÖÐÑÇ¡¢°Í¶û¸ÉµÈµØµÄÍâ½»ÊÂÎñ¡¢ÊÖÒպ͵çÐÅÏà¹ØµÄÕþ¸®ÊµÌå¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linux-backdoor.html


4¡¢¼ÓÄôóÕþ¸®ºÍ½ðÈÚµÈÁìÓòÔâNoName057(16)µÄDDoS¹¥»÷


¾Ý9ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬ £¬ £¬¼ÓÄôóµÄ¶à¸öʵÌåÔâµ½ÁËNoName057(16)µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¼ÓÄôóÍøÂçÖÐÐÄÌåÏÖ£¬£¬£¬£¬ £¬ £¬×Ô9ÔÂ13ÈÕÒÔÀ´£¬£¬£¬£¬ £¬ £¬ÆäÏàʶ²¢ÏìÓ¦ÁËÕë¶Ô¼ÓÄôóÕþ¸®ÄÚ²¿ÒÔ¼°½ðÈÚºÍÔËÊ䲿·ÖµÄ¶àÆðDDoS¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£½ñÄê2Ô·Ý£¬£¬£¬£¬ £¬ £¬¸ÃÖÐÐÄÊӲ쵽Õë¶ÔÆäËü¹ú¼ÒµÄÀàËÆDDoS¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£NoName057(16)ͨ³£Ê¹Óý©Ê¬ÍøÂçÀ´¹¥»÷Ä¿µÄµÄWebЧÀÍÆ÷£¬£¬£¬£¬ £¬ £¬È»ºóìÅÒ«Æä¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£


https://www.cyber.gc.ca/en/alerts-advisories/distributed-denial-service-campaign-targeting-multiple-canadian-sectors


5¡¢SysdigÅû¶Õë¶Ô²»³£¼ûAWSЧÀ͵Ĺ¥»÷»î¶¯AMBERSQUID


SysdigÓÚ9ÔÂ18ÈÕÅû¶ÁËÒ»ÖÖеÄÔÆÔ­Éú¼ÓÃÜÐ®ÖÆ¹¥»÷»î¶¯AMBERSQUID¡£¡£¡£¡£¡£¡£´Ë»î¶¯Ö÷ÒªÕë¶Ô²»³£ÓõÄAWSЧÀÍ£¬£¬£¬£¬ £¬ £¬ÀýÈçAWS Amplify¡¢AWS FargateºÍAmazon SageMaker¡£¡£¡£¡£¡£¡£²»³£ÓÃÒâζ×Å´ÓÇå¾²½Ç¶ÈÀ´¿´ÕâЩЧÀ;­³£±»ºöÊÓ£¬£¬£¬£¬ £¬ £¬¶øAMBERSQUID»î¶¯¿ÉÄÜ»áÈÃÄ¿µÄÌìÌìËðʧÁè¼Ý10000ÃÀÔª¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Äܹ»Ê¹ÓÃÔÆÐ§ÀÍ£¬£¬£¬£¬ £¬ £¬¶ø²»»á´¥·¢AWSÅú×¼¸ü¶à×ÊÔ´µÄÇëÇ󡣡£¡£¡£¡£¡£SysdigÌåÏÖËüÔÚÆÊÎöÁËDocker HubÉϵÄ170Íò¸ö¾µÏñºó·¢Ã÷Á˸û£¬£¬£¬£¬ £¬ £¬²¢½«Æä¹éÒòÓÚÓ¡ÄáÏà¹ØµÄ¹¥»÷Õß¡£¡£¡£¡£¡£¡£


https://sysdig.com/blog/ambersquid/


6¡¢Intel 471Ðû²¼BumblebeeʹÓÃ4shared WebDAVµÄÆÊÎö


9ÔÂ15ÈÕ£¬£¬£¬£¬ £¬ £¬Intel 471Ðû²¼Á˹ØÓÚBumblebeeʹÓÃ4shared WebDAVµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£BumblebeeÔÚÔÝÍ£Á½¸öԺ󣬣¬£¬£¬ £¬ £¬ÓÚ8ÔÂβ»Ö¸´ÔËÓª¡£¡£¡£¡£¡£¡£ÕâÒ»Âֻ×îÏÈÓÚ9ÔÂ7ÈÕ£¬£¬£¬£¬ £¬ £¬ÒÀÀµÎ±×°³ÉɨÃè¼þ¡¢·¢Æ±ºÍ֪ͨµÄÀ¬»øÓʼþÀ´ÓÕʹÊÕ¼þÈËÏÂÔØ¶ñÒ⸽¼þ¡£¡£¡£¡£¡£¡£´ó´ó¶¼¸½¼þÊÇLNKÎļþ£¬£¬£¬£¬ £¬ £¬·­¿ªºó»áÔÚÄ¿µÄÅÌËã»úÆô¶¯Ò»ÏµÁÐÏÂÁ£¬£¬£¬ £¬ £¬Ê×ÏÈÊÇʹÓÃ4shared¹²Ïí´æ´¢ÕÊ»§µÄÓ²±àÂëÆ¾Ö¤ÔÚÍøÂçÇý¶¯Æ÷ÉÏ×°ÖÃWebDAVÎļþ¼Ð£¬£¬£¬£¬ £¬ £¬×îÖÕ»áÏÂÔØÍйÜÔÚWebDAVЧÀÍÆ÷ÉϵÄBumblebee¡£¡£¡£¡£¡£¡£  


https://intel471.com/blog/bumblebee-loader-resurfaces-in-new-campaign