Win 11×îв¹¶¡µ¼ÖÂMalwarebytesÓëChrome²»¼æÈÝ

Ðû²¼Ê±¼ä 2023-06-16
1¡¢Win 11×îв¹¶¡µ¼ÖÂMalwarebytesÓëChrome²»¼æÈÝ


¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬ £¬£¬±¾ÖܶþÐû²¼µÄWindows 11 22H2 KB5027231ÀÛ»ý¸üÐÂÓ°ÏìÁËMalwarebytes¿Í»§ÏµÍ³ÉϵÄGoogle Chrome¡£¡£¡£¡£¡£¡£¡£Ò»Î»ÖÎÀíԱ˵£¬£¬ £¬£¬×°ÖøüкóChromeä¯ÀÀÆ÷·ºÆðÎÊÌ⣬£¬ £¬£¬ÊÔͼͨ¹ýWSUS»Ø¹ö£¬£¬ £¬£¬ÊÂÎñÉó²éÆ÷ÖÐÏÔʾ¡°catastrophic error¡±£¬£¬ £¬£¬²¢ÇÒWSUSÏÔʾ²»¿É»Ø¹ö¡£¡£¡£¡£¡£¡£¡£ChromeÀú³ÌÏÖʵÉÏÕýÔÚÔËÐУ¬£¬ £¬£¬µ«ÓÉÓÚ³åÍ»¶øÎÞ·¨ÍêÈ«Æô¶¯Ó¦ÓóÌÐòºÍ¼ÓÔØÓû§½çÃæ¡£¡£¡£¡£¡£¡£¡£MalwarebytesÌåÏÖ£¬£¬ £¬£¬Win 11¸üе¼ÖÂChromeÓëÎó²îʹÓñ£»£»£»£»£»£»£»¤±¬·¢³åÍ»£¬£¬ £¬£¬½ø¶øµ¼ÖÂä¯ÀÀÆ÷Í߽⡣¡£¡£¡£¡£¡£¡£Óöµ½´ËÎÊÌâµÄÓû§¿ÉÒÔ´ÓÆäMalwarebytesÊܱ£»£»£»£»£»£»£»¤Ó¦ÓóÌÐòÁбíÖйرÕÍøÂçä¯ÀÀÆ÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5027231-update-breaks-google-chrome-for-malwarebytes-users/


2¡¢ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÀÕË÷ÍÅ»ïClopµÄ¹¥»÷


¾Ý6ÔÂ16ÈÕ±¨µÀ£¬£¬ £¬£¬ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÁËÀÕË÷ÍÅ»ïClopµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËMOVEitÎļþ´«Ê乤¾ßÖеÄÎó²î£¬£¬ £¬£¬CISA³ÆÆäÕýÔÚºÍFBIÆð¾¢ÎªÊ¹ÓÃMOVEitµÄÁª°î»ú¹¹Ìṩ×ÊÖú£¬£¬ £¬£¬È·ÈϹ¥»÷µÄÓ°Ï첢ʵʱµ÷½â¡£¡£¡£¡£¡£¡£¡£¹Ù·½¾Ü¾øÍ¸Â¶ÊÜÓ°ÏìµÄ»ú¹¹µÄÃû³ÆºÍÊýÄ¿£¬£¬ £¬£¬µ«Ò»Î»ÄÜÔ´²¿½²»°ÈË͸¶£¬£¬ £¬£¬¸Ã²¿·ÖÊÇÔâµ½ÈëÇֵĶà¸öÁª°î»ú¹¹Ö®Ò»¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬Ó¢¹úʯÓͺÍ×ÔÈ»Æø¹«Ë¾¿ÇÅÆÔÚ±¾ÖÜËÄ͸¶ÆäÒ²Ôâµ½ÁËClopÀÕË÷¹¥»÷£¬£¬ £¬£¬¸Ã¹«Ë¾È¥ÄêµÄÊÕÈëÁè¼Ý3810ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/several-us-federal-agencies-affected-by-moveit-breach


3¡¢HP¹ûÕæÍ¨¹ý¶ñÒâÍøÕ¾·Ö·¢ChromeÀ©Õ¹ShampooµÄ»î¶¯


6ÔÂ14ÈÕ±¨µÀ£¬£¬ £¬£¬HP¹ûÕæÁËÒ»¸öÕýÔÚ¾ÙÐÐÖеÄÐÂChromeLoader»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ3Ô£¬£¬ £¬£¬Í¨¹ýÉù³Æ¿ÉÃâ·ÑÏÂÔØµÁ°æÒôÀÖ¡¢Ó°Ï·»òÓÎÏ·µÄ¶ñÒâÍøÕ¾·Ö·¢ChromeLoader¡£¡£¡£¡£¡£¡£¡£ÓÕʹĿµÄÏÂÔØÖ´ÐÐPowerShell¾ç±¾µÄVBScript£¬£¬ £¬£¬¸Ã¾ç±¾ÉèÖÃÒÔ¡°chrome_¡±ÎªÇ°×ºµÄÍýÏëʹÃü¡£¡£¡£¡£¡£¡£¡£´ËʹÃü»á´¥·¢Ò»ÏµÁо籾£¬£¬ £¬£¬½«ÐµÄPowerShell¾ç±¾ÏÂÔØ²¢ÉúÑĵ½×¢²á±íÖУ¬£¬ £¬£¬Í¬Ê±»á»ñÈ¡¶ñÒâChromeÀ©Õ¹Shampoo¡£¡£¡£¡£¡£¡£¡£ShampooÊÇChromeLoaderµÄ±äÌ壬£¬ £¬£¬Äܹ»ÔÚÄ¿µÄ»á¼ûµÄÍøÕ¾ÉÏ×¢Èë¹ã¸æ²¢Ö´ÐÐËÑË÷ÅÌÎÊÖØ¶¨Ïò¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites/


4¡¢Trellix³ÆÐÂÇÔÈ¡³ÌÐòSkuldÕë¶ÔÎ÷Å·ºÍ¶«ÄÏÑǵȵØ


TrellixÔÚ6ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËÐÂÐÍGolangÇÔÈ¡³ÌÐòSkuld£¬£¬ £¬£¬ÒÑÈëÇÖÅ·ÖÞ¡¢¶«ÄÏÑǺÍÃÀ¹úµÄWindowsϵͳ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô4ÔÂÏÂÑ®×îÏȱ¬·¢£¬£¬ £¬£¬»áËÑË÷´æ´¢ÔÚDiscordºÍä¯ÀÀÆ÷µÈÓ¦ÓÃÖеÄÊý¾Ý£¬£¬ £¬£¬ÒÔ¼°ÏµÍ³µÄÐÅÏ¢ºÍÎļþ¼ÐÖеÄÎļþ¡£¡£¡£¡£¡£¡£¡£²¿·ÖÑù±¾ÉõÖÁ°üÀ¨ÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÄ£¿£¿ £¿£¿£¿ £¿£¿é£¬£¬ £¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ¸ÃÄ£¿£¿ £¿£¿£¿ £¿£¿éÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬¿ª·¢Ö°Ô±Deathined´Ó¶à¸ö¿ªÔ´ÏîÄ¿ºÍ¶ñÒâÈí¼þÑù±¾ÖÐÂÞÖÂÁé¸Ð£¬£¬ £¬£¬½«¹¦Ð§ÒÆÖ²µ½GolangÀ´¹¹½¨Skuld¡£¡£¡£¡£¡£¡£¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/skuld-the-infostealer-that-speaks-golang.html


5¡¢Î¢ÈíÐû²¼¹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ


6ÔÂ14ÈÕ£¬£¬ £¬£¬Î¢ÈíÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¾ÝÐÅ£¬£¬ £¬£¬¸Ã×éÖ¯ÓÚ2020Äê×îÏÈÔËÓª£¬£¬ £¬£¬Óë¶íÂÞ˹GRUÓйØ£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄÕþ¸®Ð§ÀÍ¡¢Ö´·¨»ú¹¹¡¢·ÇÓªÀû/·ÇÕþ¸®×éÖ¯¡¢ITЧÀÍÌṩÉÌ/×Éѯ¹«Ë¾ºÍ½ôÆÈЧÀÍ¡£¡£¡£¡£¡£¡£¡£²¢½«ÆäÓë2022Äê1ÔÂ13ÈÕÕë¶ÔÎÚ¿ËÀ¼µÄWhisperGate¹¥»÷ÁªÆðÀ´¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÔÚ2022Äê6ÔÂÖ®ºóÖð½¥µ­³öÈËÃǵÄÊÓÏߣ¬£¬ £¬£¬µ«ÔÚ2023ÄêÍ·ÖØÐ¸¡³öË®Ãæ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬ £¬£¬ÓëAPT28ºÍSandwormµÈÆäËüGRUÏà¹ØºÚ¿ÍÍÅ»ïÏà±È£¬£¬ £¬£¬Cadet Blizzard¹¥»÷µÄÀÖ³ÉÂÊÏà¶Ô½ÏµÍ¡£¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/


6¡¢StairwellÅû¶ChamelGangÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú


6ÔÂ13ÈÕ£¬£¬ £¬£¬StairwellÅû¶ºÚ¿ÍÍÅ»ïChamelGangµÄÐÂÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÓÃC++¿ª·¢µÄLinuxÖ²Èë³ÌÐò£¬£¬ £¬£¬ÓÃÓÚÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬£¬ £¬£¬²¢Í¨¹ýDNS-over-HTTPS (DoH)ËíµÀÓëÉèÖõÄC2»ù´¡ÉèʩͨѶ¡£¡£¡£¡£¡£¡£¡£ËùÓжñÒâÈí¼þµÄͨѶ¶¼Ê¹ÓÃAES128ºÍÐ޸ĺóµÄbase64±àÂë¼ÓÃÜ£¬£¬ £¬£¬ÆäÖаüÀ¨·Ç×ÖĸÊý×Ö×Ö·ûµÄÌæ»»¡£¡£¡£¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐòÍøÂçϵͳµÄÐÅÏ¢À´ÆÊÎö±»Ñ¬È¾µÄÄ¿µÄ£¬£¬ £¬£¬²¢Äܹ»¾ÙÐлù±¾µÄÔ¶³Ì»á¼û¿ØÖÆ£¬£¬ £¬£¬ÀýÈçÎļþÉÏ´«¡¢ÏÂÔØ¡¢É¾³ýºÍÖ´ÐС£¡£¡£¡£¡£¡£¡£


https://stairwell.com/news/chamelgang-and-chameldoh-a-dns-over-https-implant/