Ñо¿Ö°Ô±·¢Ã÷WindowsȱÏݿɵ¼ÖÂÀàËÆRootkitµÄ¹¦Ð§
Ðû²¼Ê±¼ä 2024-04-241. Ñо¿Ö°Ô±·¢Ã÷WindowsȱÏݿɵ¼ÖÂÀàËÆRootkitµÄ¹¦Ð§
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓà DOS µ½ NT ·¾¶×ª»»Àú³ÌÀ´ÊµÏÖÀàËÆ rootkit µÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÒÔÒþ²ØºÍÄ£ÄâÎļþ¡¢Ä¿Â¼ºÍÀú³Ì¡£¡£¡£¡£Çå¾²Ñо¿Ô± Or YairÔÚºÚñ´ó»áÉϽÒÏþµÄÒ»·ÝÆÊÎö±¨¸æÖÐÌåÏÖ£º¡°µ±Óû§ÔÚ Windows ÖÐÖ´ÐдøÓз¾¶²ÎÊýµÄº¯Êýʱ£¬£¬£¬£¬£¬£¬£¬Îļþ»òÎļþ¼ÐËùÔÚµÄ DOS ·¾¶½«×ª»»Îª NT ·¾¶¡£¡£¡£¡£¡±ÔÚ´Ëת»»Àú³ÌÖУ¬£¬£¬£¬£¬£¬£¬±£´æÒ»¸öÒÑÖªÎÊÌ⣬£¬£¬£¬£¬£¬£¬¼´¸Ãº¯Êý»áɾ³ýÈκη¾¶ÔªËØÖеÄÎ²ËæµãÒÔ¼°×îºóÒ»¸ö·¾¶ÔªËØÖеÄÈκÎÎ²Ëæ¿Õ¸ñ¡£¡£¡£¡£´Ë²Ù×÷ÓÉ Windows ÖеĴó´ó¶¼Óû§¿Õ¼ä API Íê³É¡£¡£¡£¡£ÕâЩËùνµÄ MagicDot ·¾¶ÔÊÐíÈκηÇÌØÈ¨Óû§»á¼ûÀàËÆ rootkit µÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬È»ºóÕâЩÓû§¿ÉÒÔ½«ÆäÎäÆ÷»¯£¬£¬£¬£¬£¬£¬£¬ÔÚûÓÐÖÎÀíԱȨÏÞµÄÇéÐÎÏÂÖ´ÐÐһϵÁжñÒâ²Ù×÷£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ²»»á±»·¢Ã÷¡£¡£¡£¡£
https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html?&web_view=true
2. ¶íÂÞ˹SandwormºÚ¿ÍÍÅ»ïÃé×¼ÁËÎÚ¿ËÀ¼20¸öÖ÷Òª×éÖ¯
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÎÚ¿ËÀ¼ÅÌËã»ú½ôÆÈÏìӦС×é (CERT-UA) µÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯ Sandworm Ö¼ÔÚÆÆËðÎÚ¿ËÀ¼Ô¼ 20 ¸öÒªº¦»ù´¡ÉèÊ©µÄÔËÐС£¡£¡£¡£ÕâЩºÚ¿ÍÒ²±»³ÆÎª BlackEnergy¡¢Seashell Blizzard¡¢Voodoo Bear ºÍ APT44£¬£¬£¬£¬£¬£¬£¬¾ÝÐÅÓë¶íÂÞ˹Îä×°²½¶Ó×ÜÕÕÁϲ¿ (GRU) Óйأ¬£¬£¬£¬£¬£¬£¬¶ÔÖÖÖÖÄ¿µÄ¾ÙÐÐÍøÂçÌØ¹¤»î¶¯ºÍÆÆËðÐÔ¹¥»÷¡£¡£¡£¡£CERT-UA ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬2024 Äê 3 Ô£¬£¬£¬£¬£¬£¬£¬APT44 ¾ÙÐÐÁËÆÆËðÎÚ¿ËÀ¼ 10 ¸öµØÇøÄÜÔ´¡¢Ë®ºÍ¹©Å¯¹©Ó¦ÉÌÐÅÏ¢ºÍͨѶϵͳµÄÐж¯¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÈýÔ·ݣ¬£¬£¬£¬£¬£¬£¬ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÄܹ»Í¨¹ýÆÈº¦¹©Ó¦Á´À´ÌṩÊÜËð»òÒ×Êܹ¥»÷µÄÈí¼þ£¬£¬£¬£¬£¬£¬£¬»òÕßͨ¹ýÈí¼þÌṩÉÌ»á¼û×é֯ϵͳ¾ÙÐÐά»¤ºÍÊÖÒÕÖ§³ÖµÄÄÜÁ¦À´ÉøÍ¸Ä¿µÄÍøÂç¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-targeted-20-critical-orgs-in-ukraine/
3. APT28 ʹÓà Windows ´òÓ¡ºǫ́´¦Öóͷ£³ÌÐòȱÏݰ²ÅÅGooseEgg
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬APT28½« Microsoft Windows Print Spooler ×é¼þÖеÄÇå¾²Îó²îÎäÆ÷»¯£¬£¬£¬£¬£¬£¬£¬ÒÔÈö²¥Ò»ÖÖÃûΪ GooseEgg µÄÏÈǰδ֪µÄ×Ô½ç˵¶ñÒâÈí¼þ¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬¸Ãй¶ºó¹¤¾ßÖÁÉÙ´Ó 2020 Äê 6 ÔÂ×îÏÈʹÓ㬣¬£¬£¬£¬£¬£¬¿ÉÄÜ×îÔç´Ó 2019 Äê 4 ÔÂ×îÏÈʹÓ㬣¬£¬£¬£¬£¬£¬ËüʹÓÃÁËÒ»¸öÏÖÒÑÐÞ²¹µÄȱÏÝ£¬£¬£¬£¬£¬£¬£¬ÔÊÐíȨÏÞÉý¼¶£¨CVE-2022-38028£¬£¬£¬£¬£¬£¬£¬CVSS ÆÀ·Ö£º7.8£©¡£¡£¡£¡£Microsoft ÔÚ 2022 Äê 10 ÔÂÐû²¼µÄ¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö (NSA) Æäʱ±¨¸æÁ˸ÃȱÏÝ¡£¡£¡£¡£Æ¾Ö¤Õâ¼Ò¿Æ¼¼¾ÞÍ·ÍþвÇ鱨ÍŶӵÄ×îз¢Ã÷£¬£¬£¬£¬£¬£¬£¬APT28£¨Ò²³ÆÎª Fancy Bear ºÍ Forest Blizzard£¨ÒÔǰ³ÆÎª Strontium£©£©½«¸ÃÎó²îÎäÆ÷»¯£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼¡¢Î÷Å·ºÍ±±ÃÀÕþ¸®¡¢·ÇÕþ¸®¡¢½ÌÓýºÍ½»Í¨µÄ¹¥»÷²¿·Ö×éÖ¯¡£¡£¡£¡£½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬£¬£¬£¬APT28 ºÚ¿Í»¹ÀÄÓÃÁËMicrosoft Outlook ÖеÄȨÏÞÉý¼¶Îó²î£¨CVE-2023-23397£¬£¬£¬£¬£¬£¬£¬CVSS µÃ·Ö£º9.8£©ºÍ WinRAR ÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2023-38831£¬£¬£¬£¬£¬£¬£¬CVSS µÃ·Ö£º7.8£©¡£¡£¡£¡£
https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html
4. ToddyCat APT ÕýÔÚÍøÂçÑÇÌ«µØÇø¹¤¿ØÐÐÒµµÄÊý¾Ý
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ ToddyCat µÄ¸ß¼¶Ò»Á¬Íþв (APT) ×éÖ¯ÕýÔÚ´ÓÑÇÌ«µØÇøµÄÕþ¸®ºÍ¹ú·ÀÄ¿µÄÍøÂ繤ҵ¹æÄ£»£»£»¯µÄÊý¾Ý¡£¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùʵÑéÊÒ¸ú×ٸûµÄÑо¿Ö°Ô±±¾Öܽ«ÍþвÐÐΪÕßÐÎòΪʹÓöà¸öͬʱÅþÁ¬µ½Êܺ¦ÕßÇéÐÎÀ´Î¬³Ö³¤ÆÚÐÔ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ËûÃÇ»¹·¢Ã÷ÁË ToddyCatʹÓõÄÒ»×éй¤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ´ÓÊܺ¦ÕßϵͳºÍä¯ÀÀÆ÷ÍøÂçÊý¾Ý¡£¡£¡£¡£ToddyCat ºÜ¿ÉÄÜÊÇÒ»¸ö½²ÖÐÎĵÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ùÒѽ«ÆäÓëÖÁÉÙ¿É×·Ëݵ½ 2020 Äê 12 ÔµĹ¥»÷ÁªÏµÆðÀ´¡£¡£¡£¡£ÔÚ×î³õ½×¶Î£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ËÆºõÖ»¹Ø×¢Ì¨ÍåºÍÔ½ÄϵÄÉÙÊý×éÖ¯¡£¡£¡£¡£µ«ÔÚ 2021 Äê 2 Ô¹ûÕæÅû¶ Microsoft Exchange Server ÖеÄËùνProxyLogon Îó²îºó£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßѸËÙ¼Ó´óÁ˹¥»÷Á¦¶È¡£¡£¡£¡£
https://www.darkreading.com/cyber-risk/-toddycat-apt-is-stealing-data-on-an-industrial-scale-
5. Synlab Italia ÒòÀÕË÷Èí¼þ¹¥»÷¶øÔÝÍ£ÔËÓª
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÚÀÕË÷Èí¼þ¹¥»÷ÆÈʹ IT ϵͳÀëÏߺ󣬣¬£¬£¬£¬£¬£¬Synlab Italia ÔÝÍ£ÁËËùÓÐÒ½ÁÆÕï¶ÏºÍ²âÊÔЧÀÍ¡£¡£¡£¡£Synlab Italia ÍøÂçÁ¥ÊôÓڱ鲼ȫÇò 30 ¸ö¹ú¼Ò/µØÇøµÄ Synlab ¼¯ÍÅ£¬£¬£¬£¬£¬£¬£¬ÔÚÒâ´óÀû¸÷µØÔËÓª×Å 380 ¸öʵÑéÊÒºÍÒ½ÁÆÖÐÐÄ¡£¡£¡£¡£ËüµÄÄêÓªÒµ¶îΪ 4.26 ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Ã¿Äê¾ÙÐÐ 3500 Íò´ÎÆÊÎö¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼ÔÚ 4 Ô 18 ÈÕÆÆÏþÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÆÈʹÆä¹Ø±ÕËùÓÐÅÌËã»úÒÔÏÞÖÆÆÆËð»î¶¯¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾ÉÐδ֤ʵ£¬£¬£¬£¬£¬£¬£¬µ«Ò»Ð©Ãô¸ÐµÄÒ½ÁÆÊý¾Ý¿ÉÄÜÒÑ̻¶¸ø¹¥»÷Õß¡£¡£¡£¡£ÉÐÎÞÖ÷ÒªÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô Synlab Italia µÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/synlab-italia-suspends-operations-following-ransomware-attack/
6. ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö (NSA) Ðû²¼Çå¾²È˹¤ÖÇÄܰ²ÅÅÖ¸ÄÏ
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÓëÃÀ¹úºÍÆäËûÎåÑÛ¹ú¼ÒµÄÁù¸öÕþ¸®»ú¹¹ÏàÖúÐû²¼ÁËÓйØÔõÑùÇå¾²°²ÅÅÈ˹¤ÖÇÄÜϵͳµÄÐÂÖ¸ÄÏ¡£¡£¡£¡£ËüÌṩÁË·ÖΪÈýÀàµÄ×î¼Ñʵ¼ùÁÐ±í£¬£¬£¬£¬£¬£¬£¬Éæ¼°È˹¤ÖÇÄܰ²ÅŵÄÈý¸öÖ÷Òª°ì·¨£º±£»£»£»¤°²ÅÅÇéÐΡ¢Ò»Á¬±£»£»£»¤AIϵͳºÍÇå¾²AIÔËά¡£¡£¡£¡£±£»£»£»¤È˹¤ÖÇÄÜÏµÍ³Éæ¼°Ê¶±ðΣº¦¡¢ÊµÑéÊʵ±µÄ»º½â²½·¥ºÍ¼à¿ØÎÊÌâµÄÒ»Á¬Àú³Ì¡£¡£¡£¡£Í¨¹ý½ÓÄɱ¾±¨¸æÖиÅÊöµÄ°ì·¨À´È·±£È˹¤ÖÇÄÜϵͳµÄ°²ÅźÍÔËÐÐÇå¾²£¬£¬£¬£¬£¬£¬£¬×éÖ¯¿ÉÒÔÏÔ׎µµÍËùÉæ¼°µÄΣº¦¡£¡£¡£¡£ÕâЩ°ì·¨ÓÐÖúÓÚ±£»£»£»¤×éÖ¯µÄ֪ʶ²úȨ¡¢Ä£×ÓºÍÊý¾ÝÃâÔâ͵ÇÔ»òÀÄÓᣡ£¡£¡£
https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/


¾©¹«Íø°²±¸11010802024551ºÅ