Çå¾²¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢

Ðû²¼Ê±¼ä 2023-05-12

1¡¢Çå¾²¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢


¾ÝýÌå5ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬ £¬¹¤ÒµÍøÂçÇå¾²¹«Ë¾DragosÅû¶ÁËÆä½üÆÚÔâµ½µÄÇå¾²ÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ £¬Ä³ÀÕË÷ÍÅ»ïÓÚ5ÔÂ8ÈÕÊÔͼÈëÇÖ¹«Ë¾ÏµÍ³£¬£¬£¬£¬ £¬µ«Î´ÄÜÀֳɡ£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÐÂÏúÊÛÖ°Ô±Èëְ֮ǰй¶ÁËÆäÓʼþµØµã£¬£¬£¬£¬ £¬ËæºóʹÓÃÕâЩСÎÒ˽¼ÒÐÅϢð³äDragosÔ±¹¤²¢Íê³ÉÔ±¹¤ÈëÖ°Á÷³ÌµÄ³õʼ°ì·¨¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ»á¼ûSharePointºÍDragosÌõÔ¼ÖÎÀíϵͳ¡£¡£¡£¡£¡£¡£Dragos³Æ£¬£¬£¬£¬ £¬¸ÃÊÂÎñÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬ £¬¹¥»÷ÕßÎÞ·¨ºáÏòÒÆ¶¯¡¢È¨ÏÞÌáÉý¡¢½¨É賤ÆÚ»á¼û»ò¶Ô»ù´¡¼Ü¹¹¾ÙÐиü¸Ä¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/146053/cyber-crime/dragos-failed-extortion-attempt.html


2¡¢Òò¾Ü¸¶Êê½ðÓ¡¶ÈÄ³ÒøÐÐÔ¼600 GBµÄÊý¾Ý±»LockBit¹ûÕæ


¾Ý5ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬ £¬ÀÕË÷ÍÅ»ïLockBit 3.0¹ûÕæÁË´ÓÓ¡¶ÈÒøÐÐFullerton IndiaÇÔÈ¡µÄ600 GBÊý¾Ý¡£¡£¡£¡£¡£¡£Fullerton IndiaÓÚ4ÔÂ24ÈÕ³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ £¬LockBit 3.0Éù³Æ»ñµÃÁËÁè¼Ý600 GBÓëСÎÒ˽¼ÒºÍÕýµ±¹«Ë¾Ç©ÊðµÄ´û¿îЭÒé¡£¡£¡£¡£¡£¡£¸ÃÍŻォÊê½ðÖ§¸¶µÄ×îºóÏÞÆÚ¶¨Îª4ÔÂ29ÈÕ£¬£¬£¬£¬ £¬²¢ÔÊÐíÖ§¸¶1000ÃÀÔª½«×èÖ¹ÈÕÆÚÑÓÉì24Сʱ¡£¡£¡£¡£¡£¡£ÓÉÓÚFullerton India¾Ü¾øÓëÀÕË÷ÍÅ»ï½Ó´¥£¬£¬£¬£¬ £¬¸ÃÍÅ»ïÔÚ±¾ÖÜÒ»¹ûÕæÁËÇÔÈ¡µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£


https://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010


3¡¢º«¹ú¾¯·½¹ûÕæÊ×¶û¹úÁ¢´óѧҽԺ±»Kimsuky¹¥»÷µÄϸ½Ú


ýÌå5ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬ £¬º«¹ú¹ú¼Ò¾¯Ô±Ìü(KNPA)͸¶£¬£¬£¬£¬ £¬Ó볯ÏÊÏà¹ØµÄºÚ¿ÍÍÅ»ïÈëÇÖÁ˸ùú×î´óµÄÒ½ÔºÖ®Ò»£¬£¬£¬£¬ £¬Ê×¶û¹úÁ¢´óѧҽԺ(SNUH)¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2021Äê5ÔÂÖÁ6Ô£¬£¬£¬£¬ £¬¾¯·½ÔÚÒÑÍùÁ½ÄêÖоÙÐÐÁËÆÊÎöÊӲ죬£¬£¬£¬ £¬ÒÔÈ·¶¨¹¥»÷ÕßÉí·Ý¡£¡£¡£¡£¡£¡£¾¯·½²¢Î´½«´Ë´Î¹¥»÷¹éÒòÓÚÌØ¶¨µÄ×éÖ¯£¬£¬£¬£¬ £¬µ«ÍâµØÃ½ÌåÍÆ¶ÏÕâÊÇÓÉKimsukyЭµ÷µÄ¡£¡£¡£¡£¡£¡£¾Ý±¨¸æ£¬£¬£¬£¬ £¬ºÚ¿ÍʹÓÃÁËÖÁÉÙÆß̨λÓÚº«¹úµÈ¹ú¼ÒµÄЧÀÍÆ÷À´Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÔ¼830000Ãû»¼ÕߺÍÊÂÇéÖ°Ô±µÄÐÅϢй¶¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-breached-major-hospital-in-seoul-to-steal-data/


4¡¢ÈðÊ¿¿Æ¼¼¹«Ë¾ABBÔâµ½ÀÕË÷ÍÅ»ïBlack BastaµÄ¹¥»÷


5ÔÂ11ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ £¬ÈðÊ¿µçÆø»¯ºÍ×Ô¶¯»¯ÊÖÒÕÌṩÉÌABBÔâµ½ÁËBlack BastaµÄÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£ABB¹«Ë¾ÎªÖÆÔìºÍÄÜÔ´¹©Ó¦ÉÌ¿ª·¢¹¤Òµ¿ØÖÆÏµÍ³(ICS)ºÍSCADAϵͳ£¬£¬£¬£¬ £¬2022ÄêµÄÊÕÈëΪ294ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ5ÔÂ7ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬ £¬ÆäÔ±¹¤Í¸Â¶£¬£¬£¬£¬ £¬¹¥»÷Ó°ÏìÁ˹«Ë¾µÄWindows Active Directory£¬£¬£¬£¬ £¬Éæ¼°Êý°Ų̀װ±¸¡£¡£¡£¡£¡£¡£ÎªÁËÓ¦¶Ô´Ë´Î¹¥»÷£¬£¬£¬£¬ £¬ABBÖÕÖ¹ÁËÓëÆä¿Í»§µÄVPNÅþÁ¬£¬£¬£¬£¬ £¬ÒÔ±ÜÃâÀÕË÷Èí¼þÈö²¥µ½ÆäËüÍøÂç¡£¡£¡£¡£¡£¡£Õâ´Î¹¥»÷ÈÅÂÒÁ˸ù«Ë¾µÄÔËÓª£¬£¬£¬£¬ £¬ÑÓÎóÁËÏîÄ¿£¬£¬£¬£¬ £¬Ó°ÏìÁ˹¤³§¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬ABB¾Ü¾ø¶Ô´ËÊÂÖÃÆÀ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/


5¡¢FortiGuardÐû²¼¹ØÓÚRapperBot¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


5ÔÂ9ÈÕ£¬£¬£¬£¬ £¬FortiGuard³ÆÆä·¢Ã÷ÁË×Ô1ÔÂÒÔÀ´»îÔ¾µÄRapperBot»î¶¯µÄÐÂÑù±¾¡£¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬ £¬¹¥»÷ÕßÒÑ×îÏÈÉæ×ã¼ÓÃÜÐ®ÖÆ£¬£¬£¬£¬ £¬ÌØÊâÊÇÕë¶ÔIntel x64×°±¸¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ó¹¤´úÂëÏÖÒѼ¯³Éµ½RapperBotÖУ¬£¬£¬£¬ £¬²¢Ê¹ÓÃË«²ãXOR±àÂë¾ÙÐлìÏý£¬£¬£¬£¬ £¬´Ó¶øÓÐÓõØÒþ²Ø¿ó³ØºÍMoneroÍÚ¿óµØµã¡£¡£¡£¡£¡£¡£ËäÈ»Ñо¿Ö°Ô±Ã»ÓÐÊӲ쵽ÈκδÓC2ЧÀÍÆ÷·¢Ë͵½Ñù±¾µÄDDoSÏÂÁ£¬£¬£¬ £¬µ«·¢Ã÷×îеÄbot°æ±¾Ö§³ÖÏÂÁִÐÐDDoS¹¥»÷¡¢×èÖ¹DDoS¹¥»÷ºÍÖÕÖ¹×ÔÉí¡£¡£¡£¡£¡£¡£RapperBotËÆºõÕýÔÚ¿ìËÙÉú³¤²¢À©Õ¹¹¦Ð§ÒÔ×î´ó»¯ÆäÀûÈ󡣡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/rapperbot-ddos-botnet-expands-into-cryptojacking


6¡¢McAfeeÐû²¼¹ØÓÚGULoader¹¥»÷»î¶¯µÄÉîÈëÆÊÎö±¨¸æ


5ÔÂ9ÈÕ£¬£¬£¬£¬ £¬McAfeeÐû²¼¹ØÓÚ½üÆÚGULoader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£ÔÚÕâЩ»î¶¯ÖУ¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÀ¬»øÓʼþ·¢ËÍ»ùÓÚNSISµÄ×°ÖóÌÐò£¬£¬£¬£¬ £¬ÕâЩװÖóÌÐòʹÓòå¼þ¿âÔÚÄ¿µÄϵͳÉÏÖ´ÐÐGU shellcode¡£¡£¡£¡£¡£¡£±¨¸æ»¹ÐÎòÁËGUloaderÔõÑùʹÓÃʸÁ¿Òì³£´¦Öóͷ£(VEH)À´»ìÏýÖ´ÐÐÁ÷³Ì²¢¼õÂýÆÊÎöËÙÂÊ¡£¡£¡£¡£¡£¡£GuLoaderÔÚ´ó¹æÄ£¶ñÒâÈí¼þ»î¶¯Öб»Ê¹Ó㬣¬£¬£¬ £¬À´·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬ÈçRaccoon¡¢ VidarºÍRedlineµÈ¡£¡£¡£¡£¡£¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-campaigns-a-deep-dive-analysis-of-a-highly-evasive-shellcode-based-loader/