΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷

Ðû²¼Ê±¼ä 2024-10-15

1. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷


10ÔÂ13ÈÕ £¬£¬£¬£¬ £¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ £¬£¬£¬£¬ £¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷ £¬£¬£¬£¬ £¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐΡ£¡£¡£ ¡£¡£Kerberoasting ʹÓà Kerberos Éí·ÝÑé֤ЭÒéÇÔÈ¡ AD ƾ֤ £¬£¬£¬£¬ £¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´¡£¡£¡£ ¡£¡£Î¢ÈíÖ¸³ö £¬£¬£¬£¬ £¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±ÑÝ±ä £¬£¬£¬£¬ £¬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷ǰÑԺͷÀÓù»úÖÆ¡£¡£¡£ ¡£¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆÆ½âÊÖÒÕµÄÔËÓà £¬£¬£¬£¬ £¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý¡£¡£¡£ ¡£¡£ÔÚ Kerberoasting ¹¥»÷ÖÐ £¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆÆ½âʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵÄЧÀÍÆ±Ö¤ £¬£¬£¬£¬ £¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾­ÊÚȨµÄ»á¼ûȨÏÞ¡£¡£¡£ ¡£¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§ £¬£¬£¬£¬ £¬¸üÒ×Êܵ½¹¥»÷¡£¡£¡£ ¡£¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4¡£¡£¡£ ¡£¡£Îª¼õÇá Kerberoasting Σº¦ £¬£¬£¬£¬ £¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥ £¬£¬£¬£¬ £¬°üÀ¨Ê¹ÓÃ×éÍйÜЧÀÍÕÊ»§ (gMSA) »òίÍÐÍйÜЧÀÍÕÊ»§ (dMSA)¡¢Ç¿ÖÆÊ¹ÓÃÇ¿ÃÜÂë¡¢ÉèÖÃЧÀÍÕÊ»§Ê¹Óà AES ¼ÓÃÜ £¬£¬£¬£¬ £¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄЧÀÍÖ÷ÌåÃû³Æ (SPN)¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬ £¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼¡£¡£¡£ ¡£¡£


https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/


2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ


10ÔÂ14ÈÕ £¬£¬£¬£¬ £¬Trend MicroÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬ £¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâ»î¶¯¼¤Ôö £¬£¬£¬£¬ £¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ¡£¡£¡£ ¡£¡£´Ë´ÎÓã²æÊ½ÍøÂç´¹ÂڻÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖ޵Ĺ«Ë¾ £¬£¬£¬£¬ £¬ÓÈÆäÊǰÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹ £¬£¬£¬£¬ £¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃ˰É걨µÄ½ôÆÈÐÔÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁî £¬£¬£¬£¬ £¬ÓëC&CЧÀÍÆ÷½¨ÉèÅþÁ¬¡£¡£¡£ ¡£¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ £¬£¬£¬£¬ £¬µ±Óû§Ö´ÐÐʱ £¬£¬£¬£¬ £¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî¡£¡£¡£ ¡£¡£³ýÁËLNKÎļþ £¬£¬£¬£¬ £¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ¡£¡£¡£ ¡£¡£Ôڴ˴λÖÐ £¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû £¬£¬£¬£¬ £¬Èç.pdf¡¢.jpgµÈ £¬£¬£¬£¬ £¬ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL £¬£¬£¬£¬ £¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß £¬£¬£¬£¬ £¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷¡£¡£¡£ ¡£¡£Water MakaraµÄÓã²æÊ½ÍøÂç´¹ÂڻÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ £¬£¬£¬£¬ £¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù £¬£¬£¬£¬ £¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üÐÂµÈ £¬£¬£¬£¬ £¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù¡£¡£¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html


3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷ £¬£¬£¬£¬ £¬×¨¼ÒÇ××Ô½ÒÃØÈ¦Ì×


10ÔÂ14ÈÕ £¬£¬£¬£¬ £¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþЧÀÍ £¬£¬£¬£¬ £¬ÓµÓÐÁè¼Ý25ÒÚÓû§ £¬£¬£¬£¬ £¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖØµãÄ¿µÄ¡£¡£¡£ ¡£¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑÔ³Æ £¬£¬£¬£¬ £¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§ £¬£¬£¬£¬ £¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕС£¡£¡£ ¡£¡£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ £¬£¬£¬£¬ £¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²Æ­ÍøÕ¾ £¬£¬£¬£¬ £¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£ ¡£¡£½Ó×Å £¬£¬£¬£¬ £¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»° £¬£¬£¬£¬ £¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£»£»£»£»£»î¶¯¡£¡£¡£ ¡£¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷ £¬£¬£¬£¬ £¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ £¬£¬£¬£¬ £¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó £¬£¬£¬£¬ £¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬ £¬Mitrovic»¹Òâʶµ½ £¬£¬£¬£¬ £¬Æ­×ÓµÄÉùÒô¹ýÓÚÍêÉÆ £¬£¬£¬£¬ £¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ¡£¡£¡£ ¡£¡£ËûÒÔΪ £¬£¬£¬£¬ £¬ÕâÊÇÈ«Çò¹æÄ£Äڵĺڿͻ £¬£¬£¬£¬ £¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò»¡£¡£¡£ ¡£¡£Òò´Ë £¬£¬£¬£¬ £¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾ £¬£¬£¬£¬ £¬ÌáÐѸ÷ÈËÕ©Æ­ÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ £¬£¬£¬£¬ £¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ £¬£¬£¬£¬ £¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÈεÄÈËÇóÖú £¬£¬£¬£¬ £¬ÒÔÌá·À´ËÀ๥»÷¡£¡£¡£ ¡£¡£


https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/


4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ


10ÔÂ14ÈÕ £¬£¬£¬£¬ £¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø £¬£¬£¬£¬ £¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý £¬£¬£¬£¬ £¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ¡£¡£¡£ ¡£¡£Ë¼¿Æ½²»°ÈËÌåÏÖ £¬£¬£¬£¬ £¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ £¬£¬£¬£¬ £¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæÊµÐÔ £¬£¬£¬£¬ £¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£ ¡£¡£´Ëǰ £¬£¬£¬£¬ £¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ £¬£¬£¬£¬ £¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿ÆÏµÍ³ £¬£¬£¬£¬ £¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý¡£¡£¡£ ¡£¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ £¬£¬£¬£¬ £¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîĿԴ´úÂë¡¢Ó²±àÂëÆ¾Ö¤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ¡£¡£¡£ ¡£¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬ £¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý¡£¡£¡£ ¡£¡£¾ÝÐÂÎÅÈËʿ͸¶ £¬£¬£¬£¬ £¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйÜЧÀÍÌṩÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£ ¡£¡£È»¶ø £¬£¬£¬£¬ £¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´Ëǰ6Ô·ݵÄйÃÜÊÂÎñÓйء£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/


5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð


10ÔÂ14ÈÕ £¬£¬£¬£¬ £¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ £¬£¬£¬£¬ £¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾­ÊÚȨµÄÏÖ½ðÌáÈ¡¡£¡£¡£ ¡£¡£FASTCashÏÈǰÖ÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ £¬£¬£¬£¬ £¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£¡£¡£¡£ ¡£¡£×Ô2016ÄêÒÔÀ´ £¬£¬£¬£¬ £¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷ £¬£¬£¬£¬ £¬ÇÔÈ¡ÊýÍòÍòÃÀÔª £¬£¬£¬£¬ £¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв £¬£¬£¬£¬ £¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡±¡£¡£¡£ ¡£¡£2020Äê £¬£¬£¬£¬ £¬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´ £¬£¬£¬£¬ £¬Ò»Äêºó £¬£¬£¬£¬ £¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËß £¬£¬£¬£¬ £¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª¡£¡£¡£ ¡£¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal £¬£¬£¬£¬ £¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷ЧÀÍÆ÷Àú³ÌÖÐ £¬£¬£¬£¬ £¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢ £¬£¬£¬£¬ £¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ìæ»»ÎªÅú×¼ £¬£¬£¬£¬ £¬²¢°üÀ¨Ëæ»ú½ð¶î £¬£¬£¬£¬ £¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𡣡£¡£ ¡£¡£¸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½ £¬£¬£¬£¬ £¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬ £¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð £¬£¬£¬£¬ £¬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆä¹¤¾ß¼¯¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/


6. Gryphon HealthcareÔâÓöÊý¾Ýй¶ £¬£¬£¬£¬ £¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡


10ÔÂ14ÈÕ £¬£¬£¬£¬ £¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡Ð§ÀÍÌṩÉÌ £¬£¬£¬£¬ £¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢй¶µÄÊÂÎñ¡£¡£¡£ ¡£¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ £¬£¬£¬£¬ £¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý £¬£¬£¬£¬ £¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£ ¡£¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾² £¬£¬£¬£¬ £¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓà £¬£¬£¬£¬ £¬µ«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£ ¡£¡£¾Ý³Æ £¬£¬£¬£¬ £¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥Ð§À͵Ä×éÖ¯´æ´¢ £¬£¬£¬£¬ £¬¿ÉÄܰüÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹¡£¡£¡£ ¡£¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ £¬£¬£¬£¬ £¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó¡£¡£¡£ ¡£¡£Î´À´¼¸¸öÔ £¬£¬£¬£¬ £¬Ëæ×Å״ʦÃÇÖÆ¶©ÕûÌåËßËÏÍýÏë £¬£¬£¬£¬ £¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢¡£¡£¡£ ¡£¡£


https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/