每周高级威胁情报解读(2023.04.20~04.27)
Common Information
Type Value
UUID 6eed8735-3be2-4fe1-805b-1890f24fa647
Fingerprint 8da61107dfb6dc0b
Analysis status DONE
Considered CTI value 2
Text language
Published April 20, 2023, midnight
Added to db June 5, 2023, 2:22 p.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline 每周高级威胁情报解读(2023.04.20~04.27)
Title 每周高级威胁情报解读(2023.04.20~04.27)
Detected Hints/Tags/Attributes 74/2/59
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 32
cve-2023-29552
Details CVE 34
cve-2017-6742
Details Domain 13
threatmon.io
Details Domain 11
blog.virustotal.com
Details Domain 208
mp.weixin.qq.com
Details Domain 403
securelist.com
Details Domain 26
www.jamf.com
Details Domain 18
blog.sucuri.net
Details Domain 182
www.mandiant.com
Details Domain 65
blog.cyble.com
Details Domain 11
interlab.or.kr
Details Domain 144
www.fortinet.com
Details Domain 4
evilextractor.com
Details Domain 5
appcisco.com
Details Domain 71
blogs.jpcert.or.jp
Details Domain 604
www.trendmicro.com
Details File 4
apt43-investigation-into-north-korean.html
Details File 1
massive-abuse-of-abandoned-evalphp-wordpress-plugin.html
Details File 1
attackers-use-containers-for-profit-via-trafficstealer.html
Details File 10
blogs.inf
Details File 3
s.apk
Details File 5
cisco-anyconnect-4_9_0195.msi
Details File 1018
rundll32.exe
Details File 1
parallax-rat.html
Details File 2
vipersoftx-updates-encryption-steals-data.html
Details Interlab Threat Numbers 6
UCID902
Details Mandiant Uncategorized Groups 59
UNC4736
Details Threat Actor Identifier - APT-C 16
APT-C-09
Details Threat Actor Identifier - APT-LY 2
APT-LY-1007
Details Threat Actor Identifier - APT-Q 11
APT-Q-36
Details Threat Actor Identifier - APT 115
APT43
Details Threat Actor Identifier - APT 783
APT28
Details Threat Actor Identifier - APT 665
APT29
Details Url 1
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack
Details Url 2
https://threatmon.io/apt-blind-eagles-malware-arsenal-technical-analysis
Details Url 4
https://blog.virustotal.com/2023/04/apt43-investigation-into-north-korean.html
Details Url 3
https://mp.weixin.qq.com/s/nk2zml2d0htk0hszykw2dw
Details Url 3
https://mp.weixin.qq.com/s/lb_nyxhi9ijgmvi2wjy9qg
Details Url 1
https://research.checkpoint.com/2023/educated-manticore-iran-aligned-threat-actor-targeting-israel-via-improved-arsenal-of-tools
Details Url 1
https://www.ncsc.gov.uk/news/apt28-exploits-known-vulnerability-to-carry-out-reconnaissance-and-deploy-malware-on-cisco-routers
Details Url 5
https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552
Details Url 6
https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware
Details Url 1
https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks
Details Url 1
https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html
Details Url 5
https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
Details Url 1
https://blog.cyble.com/2023/04/19/al-aqsa-mosque-incident-ignites-opisrael
Details Url 2
https://interlab.or.kr/archives/18979
Details Url 4
https://mp.weixin.qq.com/s/boj88zzk27zahshlyucyga
Details Url 1
https://www.trendmicro.com/en_us/research/23/d/attackers-use-containers-for-profit-via-trafficstealer.html
Details Url 1
https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic
Details Url 2
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer
Details Url 1
https://blog.cyble.com/2023/04/20/daam-android-botnet-being-distributed-through-trojanized-applications
Details Url 2
https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads
Details Url 1
http://appcisco.com/vpncleint/cisco-anyconnect-4_9_0195.msi下载的
Details Url 1
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fakecalls-android-malware-abusing-legitimate-signing-key
Details Url 1
https://blog.cyble.com/2023/04/21/qakbot-malware-continues-to-morph
Details Url 1
https://blogs.jpcert.or.jp/en/2023/04/parallax-rat.html
Details Url 2
https://www.trendmicro.com/en_us/research/23/d/vipersoftx-updates-encryption-steals-data.html
Details Url 2
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp