每周高级威胁情报解读(2023.08.17~08.24)
Common Information
Type Value
UUID 82913c0f-4c27-488c-830c-8223bfd45a7f
Fingerprint 2112fd17c503dce3
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 17, 2023, midnight
Added to db Oct. 23, 2023, 1:10 a.m.
Last updated Nov. 17, 2024, 6:53 p.m.
Headline 每周高级威胁情报解读(2023.08.17~08.24)
Title 每周高级威胁情报解读(2023.08.17~08.24)
Detected Hints/Tags/Attributes 49/3/43
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 133
cve-2023-38831
Details CVE 217
cve-2020-1472
Details CVE 85
cve-2023-27532
Details Domain 7
it.rising.com.cn
Details Domain 128
www.fbi.gov
Details Domain 189
asec.ahnlab.com
Details Domain 137
securityaffairs.com
Details Domain 208
mp.weixin.qq.com
Details Domain 16
rebrand.ly
Details Domain 24
sysdig.com
Details Domain 262
www.welivesecurity.com
Details Domain 84
www.zscaler.com
Details Domain 13
blog.lumen.com
Details Domain 101
www.group-ib.com
Details File 2
20037.html
Details File 1
opfukushima-anonymous.html
Details File 2
kimsuky-war-simulation-centre.html
Details File 18
chrome.dll
Details File 1
profile-stealers-spread-via-llm-themed-facebook-ads.html
Details File 1
命令将启动mshta.exe
Details File 1
shell脚本还会利用cmstp.exe
Details IPv4 2
185.224.128.141
Details Threat Actor Identifier - APT 144
APT38
Details Url 2
https://it.rising.com.cn/anquan/20037.html
Details Url 3
https://www.fbi.gov/news/press-releases/fbi-identifies-cryptocurrency-funds-stolen-by-dprk
Details Url 2
https://asec.ahnlab.com/ko/56256
Details Url 1
https://securityaffairs.com/149660/hacking/opfukushima-anonymous.html
Details Url 2
https://securityaffairs.com/149698/apt/kimsuky-war-simulation-centre.html
Details Url 1
https://mp.weixin.qq.com/s/sclrp1dmhqyhiiammed-ow
Details Url 1
https://www.trendmicro.com/en_us/research/23/h/profile-stealers-spread-via-llm-themed-facebook-ads.html
Details Url 1
https://mp.weixin.qq.com/s/acyncthoadk_saixteifsg
Details Url 1
https://sysdig.com/blog/labrat-cryptojacking-proxyjacking-campaign
Details Url 2
https://www.welivesecurity.com/en/eset-research/mass-spreading-campaign-targeting-zimbra-users
Details Url 1
https://asec.ahnlab.com/en/56010
Details Url 1
https://www.sentinelone.com/blog/from-conti-to-akira-decoding-the-latest-linux-esxi-ransomware-families
Details Url 1
https://www.malwarebytes.com/blog/threat-intelligence/2023/08/darkgate-reloaded-via-malvertising-campaigns
Details Url 1
https://www.welivesecurity.com/en/eset-research/scarabs-colon-izing-vulnerable-servers
Details Url 1
https://www.zscaler.com/blogs/security-research/agniane-stealer-dark-webs-crypto-threat
Details Url 1
https://mp.weixin.qq.com/s/drxlahjpvdrrnberl20joq
Details Url 1
https://blog.lumen.com/hiatusrat-takes-little-time-off-in-a-return-to-action
Details Url 1
https://cyble.com/blog/unveiling-the-stealthy-exploitation-of-microsoft-cmstp-using-malicious-lnk-files
Details Url 2
https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america
Details Url 4
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day