ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷ £¬µçÊӺ͵çֱ̨²¥ÖжÏ£»Ó¡¶ÈIT¹«Ë¾NucleusѬȾеÄÀÕË÷Èí¼þBlackCocaine

Ðû²¼Ê±¼ä 2021-06-07
01

ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷ £¬µçÊӺ͵çֱ̨²¥ÖжÏ


ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷ £¬²¿ÃŵçÊӺ͵çֱ̨²¥ÖжÏ ¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨ ¡£Inside Radio³Æ¹¥»÷·¢ÉúÔÚ6ÔÂ3ÈÕÉÏÎç £¬Æä¶ÔCMGµÄ¶à¸öµç̨½øÐÐÁËËæ»ú¼ì²é £¬·¢ÏÖµçÌ¨ÍøÕ¾ÈÔ¿É·ÃÎÊ £¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏß £¬²¢Ìáʾ¡°ÒôƵÔÝʱ²»ÐÐÓá± ¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾ £¬2019Äê9Ô £¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷ £¬µ¼Ö²¿ÃŹ㲥µç̨ÖжÏ ¡£

   Ô­ÎÄÁ´½Ó£º

http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html


02

Ó¡¶ÈIT¹«Ë¾NucleusѬȾеÄÀÕË÷Èí¼þBlackCocaine


Ó¡¶ÈNucleus Software ExportsѬȾеÄÀÕË÷Èí¼þBlackCocaine ¡£ÕâÊÇÒ»¼ÒÏòÒøÐкÍÁãÊÛµêÌṩ´û¿îÈí¼þµÄIT¹«Ë¾ £¬´Ë´Î¹¥»÷µ¼ÖÂÆäÍøÂç̱»¾ÒÔ¼°ÄÚ²¿ÉÌÒµÐÅÏ¢±»¼ÓÃÜ ¡£¸Ã¹«Ë¾ÒѾ­ÏòÃÏÂò֤ȯ½»Ò×Ëù (BSE) ºÍÓ¡¶È¹ú¼Ò֤ȯ½»Ò×Ëù (NSEI) ³ÂËßÁË´Ëʼþ £¬²¢ÌåÏÖ¹¥»÷·¢ÉúÔÚ5ÔÂ30ÈÕ ¡£CybleÑо¿ÍŶӳƴ˴ι¥»÷À´×ÔÐÂÀÕË÷ÍÅ»ïBlackCocaine £¬¶øNucleusÊÇËüµÄµÚÒ»¸öÊܺ¦Õß £¬Ä¿Ç°ÉÐδȷ¶¨¸Ã¶ñÒâÈí¼þµÄ³õʼѬȾý½é ¡£

  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118617/malware/blackcocaine-ransomware.html


03

INKYÅû¶ÒÔ·À·¶ÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖµöÓã»î¶¯


ÓʼþÄþ¾²Æ½Ì¨INKYÅû¶ÒÔ·À·¶ÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖµöÓã»î¶¯ ¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷¼¤·¢ÁËеĵöÓã»î¶¯ £¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽô¼±Í¨Öª £¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ°²×°ÏµÍ³¸üР£¬À´¼ì²â²¢·À·¶×îеÄÀÕË÷Èí¼þ ¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com £¬ÕâºÜÈÝÒ×±»ÎóÈÏΪÊǺϷ¨ÓòÃû £¬Æä»¹Ê¹ÓÃÁËCobalt Strike ¡£

  Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/


04

ÎÚ¿ËÀ¼Äþ¾²¾Ö³ÆÆäÒÑ×èÖ¹À´×Ô¶íÂÞ˹µÄ´ó¹æÄ£¹¥»÷»î¶¯


ÎÚ¿ËÀ¼Äþ¾²¾ÖÅû¶ÔÚ½ñÄê6Ô³õ¶íÂÞ˹Áª°îÌØÇÚ¾Ö·Ö·¢¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯ ¡£¸Ã»ú¹¹³Æ¹¥»÷Õß·¢ËÍÁË´óÁ¿¸ü¸ÄÁË·¢¼þÈ˵ØÖ·µÄÓʼþ £¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄ¹«¹²»ú¹¹¡¢µØ·½Õþ¸®ºÍÒªº¦»ù´¡ÉèÊ©µÄÍøÂç ¡£ÕâЩ¶ñÒâÈí¼þ¿ÉÆô¶¯Ä¿±ê¼ÆËã»úÉϵÄÔ¶³Ì¹ÜÀí¹¤¾ß £¬ÒÔÍêÈ«¿ØÖƸüÆËã»ú ¡£Ä¿Ç° £¬ÎÚ¿ËÀ¼Äþ¾²¾ÖÒѹûÈ»Á˴˴ι¥»÷µÄ¼¼Êõϸ½Ú £¬ÈçIoC¡¢C2·þÎñÆ÷ºÍÓòÃûµÈ £¬²¢½¨ÒéÏà¹Ø×éÖ¯¶Ôϵͳ½øÐнô¼±¼ì²é £¬²¢¼°Ê±½ÓÄÉÔ¤·À´ëÊ© ¡£


  Ô­ÎÄÁ´½Ó£º

https://ssu.gov.ua/novyny/sbu-zablokuvala-masovu-kiberataku-spetssluzhb-rf-na-kompiuterni-merezhi-ukrainskykh-orhaniv-vlady


05

ESETÐû²¼2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß


ESETÐû²¼ÁË2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß ¡£³ÂËßÖ¸³ö £¬ÔÚ½ñÄêµÄǰËĸöÔ £¬COVID-19È»ÊÇÈ«ÇòÍ·ºÅÐÂÎÅ»°Ìâ £¬RDPЭÒéÈÔÈ»ÊDZ©Á¦¹¥»÷µÄÖ÷ҪĿ±ê £¬ÓйؼÓÃÜ»õ±ÒµÄÍþвÈÔÔÚÔö¼Ó £¬AndroidÒøÐжñÒâÈí¼þµÄÊýÁ¿ÔÚ¼±¾çÔö¼Ó ¡£Ñо¿ÈËÔ±»¹·ÖÎöÁËÒ»¸ö©¶´ÀûÓÃÁ´ £¬ËüÔÊÐí¹¥»÷Õß½Ó¹ÜËùÓпɷÃÎʵÄExchange·þÎñÆ÷ ¡£´ËÍâ £¬¸Ã³ÂËß»¹°üÂÞÁËһЩ¹ØÓÚ APT×éÖ¯TurlaºÍLazarusµÄз¢ÏÖ £¬ÒÔ¼°ÇÔÈ¡ÒÑÔ½ÓüµÄiOSÉ豸Êý¾ÝµÄ¶ñÒâÈí¼þµÄÏà¹ØÐÅÏ¢ ¡£


  Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2021/06/03/eset-threat-report-t12021/


06

ImpervaÐû²¼ÒÔ100ÆðÊý¾Ýй¶Ê¼þΪÌâµÄ·ÖÎö³ÂËß


ImpervaÐû²¼ÁËÒÔ100ÆðÊý¾Ýй¶Ê¼þΪÌâµÄ·ÖÎö³ÂËß ¡£³ÂËßÊÓ²ìÁ˹ýȥʮÄêÖÐ100ÆðÍ»³öµÄÊý¾Ýй¶Ê¼þ £¬²¢·¢ÏÖÔÚÕâЩй¶Ê¼þÖÐÓÐ75.9%ÊǸöÈËÉí·ÝÐÅÏ¢(PII) ¡£×Ô2017ÄêÒÔÀ´ £¬Êý¾Ýй¶Ê¼þµÄÊýÁ¿Ã¿Äê¶¼ÊÐÔö¼Ó30%ÒÔÉÏ £¬¶øÃ¿´ÎʼþËùй¶ÐÅÏ¢µÄÊýÁ¿Ã¿ÄêÔö¼Ó130%ÒÔÉÏ ¡£Òò´Ë £¬Ð¹Â¶ÐÅÏ¢µÄÊýÁ¿Æ½¾ùÿÄêÔö³¤224% ¡£ £¬½ö2021Äê1Ô £¬¾ÍÓÐÁè¼Ý8.7ÒÚÌõ¼Ç¼±»Ð¹Â¶ £¬±È2017ÄêÈ«ÄêµÄй¶µÄ×ÜÊý»¹¶à ¡£

  Ô­ÎÄÁ´½Ó£º

https://www.imperva.com/resources/resource-library/white-papers/lessons-learned-from-analyzing-100-data-breaches/