¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-12-19
¾ÝýÌå12ÔÂ16ÈÕ±¨µÀ£¬¸çÂ×±ÈÑÇÄÜÔ´¹«Ë¾Empresas P¨²blicas de Medell¨ªn(EPM)Ôâµ½ÁËBlackCat/ALPHVµÄÀÕË÷¹¥»÷£¬¹«Ë¾ÔËÓªÔÝʱÖжϡ£EPMÊǸçÂ×±ÈÑÇ×î´óµÄ¹«¹²ÄÜÔ´¡¢Ë®ºÍÌìÈ»Æø¹©Ó¦ÉÌÖ®Ò»£¬ÔÚ2022ÄêµÞÔìÁËÁè¼Ý250ÒÚÃÀÔªµÄÊÕÈë¡£ÉÏÖܶþ£¬¸Ã¹«Ë¾ÒªÇóÔ¼4000ÃûÔ±¹¤¾Ó¼ÒÊÂÇ飬ÇÒIT»ù´¡Éèʩ̱»¾£¬¹«Ë¾µÄÍøÕ¾Ò²²»ÔÙ¿ÉÓ᣽øÒ»²½µÄÊÓ²ì±íÃ÷£¬ºÚ¿Í¿ÉÄÜÒÑ´ÓEPMÇÔÈ¡ÁË´óÁ¿Êý¾Ý¡£
https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/
2¡¢²¿ÃÅÓû§°²×°Windows 10¸üкó»á·ºÆðÀ¶ÆÁËÀ»úÎÊÌâ
¾Ý12ÔÂ18ÈÕ±¨µÀ£¬Î¢ÈíÕë¶ÔWindows 10É豸µÄ¸üпÉÄܻᵼÖÂÀ¶ÆÁËÀ»ú´íÎ󣬸ù«Ë¾½âÊͳÆËüÒѾÔÚ½øÐÐÐÞ¸´¡£Î¢ÈíÌåÏÖ£¬°²×°KB5021233ºó£¬²¿ÃÅWindowsÉ豸Æô¶¯Ê±¿ÉÄÜ·ºÆð´íÎó£¨0xc000021a£©ÒÔ¼°À¶ÆÁ¡£ÊÇÓÉÓÚ°²×°¸üкó£¬c:/windows/system32ºÍc:/windows/system32/driversÖеÄhidparse.sysÎļþ°æ±¾¿ÉÄܲ»Æ¥Å䣬µ¼ÖÂÇåÀíʱǩÃûÑé֤ʧ°Ü¡£¸Ã¹«Ë¾ÒÑÌṩ»º½â·½Ê½£¬²¢½¨ÒéÓû§²»ÒªÊµÑéÆäËüÐÞ¸´ÒªÁ죬ÀýÈçɾ³ýhidparse.sys£¬Õâ¿ÉÄÜ»áÍêÈ«ÆÆ»µ¼ÆËã»ú¡£Î¢ÈíĿǰÕý×ÅÊÖ½â¾öÕâ¸öÎÊÌ⣬ûÓÐÔ¤¼ÆÍê³Éʱ¼ä¡£
https://news.softpedia.com/news/microsoft-warns-of-windows-10-bsods-after-the-latest-updates-536675.shtml
3¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý
ýÌå12ÔÂ17Èճƣ¬ºÚ¿ÍÔÚ°µÍøÉϳöÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý¡£Æ¾¾ÝÑù±¾Îļþ£¬´Ë´Îʼþй¶ÁËÓû§ID¡¢Ñù±¾ID¡¢ÐÕÃû¡¢ÊÖ»úºÅÂëºÍ½á¹ûÈÕÆÚµÈÐÅÏ¢¡£ºÚ¿ÍÔÚÒ»¸öÌû×ÓÖÐÉù³ÆÇÔÈ¡ÁË5000¸öÓû§µÄÊý¾Ý£¬µ«ÔÚÁíÒ»¸öÌû×ÓÖÐ˵Ëû¿ÉÒÔ·ÃÎÊÁè¼Ý50Íò¸öÕË»§¡£Êý¾ÝµÄÕæÊµÐÔĿǰ»¹Ã»Óб»Ö¤Êµ£¬È»¶øºÚ¿ÍËÆºõÖ»ÄÜ·ÃÎÊAndra Pradesh CoWINÃÅ»§µÄÆäÖÐÒ»¸ö¹ÜÀíÔ±ÕÊ»§£¬¶ø·Çϵͳ×Ô¼º¡£
https://www.timesnownews.com/technology-science/hackers-selling-user-data-from-cowin-platform-on-darkweb-article-96301909/amp
4¡¢É罻ýÌå·ÖÎöÍøÕ¾Social BladeÓû§µÄ¸öÈËÐÅϢй¶
¾Ý12ÔÂ16ÈÕ±¨µÀ£¬É罻ýÌå·ÖÎöÍøÕ¾Social Blade³ÆÆäÓû§µÄÐÅÏ¢Òѱ»Ð¹Â¶¡£¸Ã¹«Ë¾Ã»ÓоʹËʼþ·¢³ö¹ûȻͨ¸æ£¬¶øÊÇÖ±½Óͨ¹ýÓʼþ֪ͨÓû§¡£ÓʼþÖÐдµ½£¬12ÔÂ14Èոù«Ë¾ÊÕµ½ÁËDZÔÚÊý¾Ýй¶µÄ֪ͨ£¬¾ÝϤºÚ¿ÍÇÔÈ¡ÁËÆäÓû§Êý¾Ý¿â²¢ÊÔͼÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£Ñù±¾ÒÑÐû²¼£¬¾Ö¤ÊµÊý¾ÝȷʵÊÇÕæÊµµÄ£¬ºÚ¿Í¿ÉÄÜÀûÓÃÁËÍøÕ¾ÉϵÄ©¶´À´·ÃÊý¾Ý¿â¡£Social Blade³Æ£¬Ð¹Â¶Êý¾Ý²»°üÂÞÐÅÓÿ¨ÐÅÏ¢£¬µ«°üÂÞµç×ÓÓʼþ¡¢IPºÍ¼ÒÍ¥µØÖ·£¬ÒÔ¼°ÃÜÂëµÄ¹þÏ£Öµ¡£
https://www.infosecurity-magazine.com/news/social-blade-confirms-data-breach/
5¡¢Nozomi·¢ÏÖ¶ñÒâÈí¼þGluptebaÔÚÈ«Çò·¶Î§ÄڵĹ¥»÷»î¶¯
NozomiÔÚ12ÔÂ15ÈÕ³ÆÆä·¢ÏÖÁËGluptebaÔÚ½«½üÒ»ÄêµÄÖжϺóÖØÐ»îÔ¾ÆðÀ´£¬Ñ¬È¾ÁËÈ«ÇòµÄÉ豸¡£2021Äê12Ô£¬¹È¸èÀÖ³ÉµØÆÆ»µÁËÕâ¸öÖ§³ÖÇø¿éÁ´µÄ½©Ê¬ÍøÂ磬»ñµÃÁË¿ØÖƽ©Ê¬ÍøÂç»ù´¡ÉèÊ©µÄ·¨ÔºÃüÁ²¢¶ÔÁ½¸ö¶íÂÞ˹ÔËÓªÍÅ»ïÌáÆðËßËÏ¡£Nozomi½üÆÚµÄÊÓ²ìÈ·¶¨ÁË4ÆðGlupteba¹¥»÷»î¶¯ÖÐʹÓõÄ15¸ö±ÈÌØ±ÒµØÖ·£¬×î½üÒ»´Î»î¶¯¿ªÊ¼ÓÚ2022Äê6Ô£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£Óë¹ýÈ¥Ïà±È£¬´Ë´Î»î¶¯Ê¹ÓÃÁ˸ü¶àµÄ±ÈÌØ±ÒµØÖ·£¬Ê¹½©Ê¬ÍøÂç¸ü¾ßµ¯ÐÔ¡£
https://www.nozominetworks.com/blog/tracking-malicious-glupteba-activity-through-the-blockchain/
6¡¢Î¢ÈíÐû²¼¹ØÓÚеÄDDoS½©Ê¬ÍøÂçMCCrashµÄ·ÖÎö³ÂËß
12ÔÂ15ÈÕ£¬Î¢ÈíÐû²¼³ÂË߳ƣ¬Ò»ÖÖÃûΪMCCrashµÄÐÂÐÍ¿çÆ½Ì¨¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚѬȾWindows¡¢LinuxºÍÎïÁªÍøÉ豸£¬Ö¼ÔÚ¶ÔMinecraft·þÎñÆ÷½øÐÐDDoS¹¥»÷¡£½©Ê¬ÍøÂçµÄ³õʼѬȾý½éÊÇαÔìµÄWindowsÐí¿ÉÖ¤µÄÆÆ½â¹¤¾ß£¬Ò»µ©ËüѬȾÁËÉ豸£¬¾Í¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âSSHƾ¾ÝÁ÷´«µ½ÍøÂçÉÏµÄÆäËüϵͳ¡£Ä¿Ç°£¬´ó¶àÊý±»MCCrashѬȾµÄÉ豸λÓÚ¶íÂÞ˹£¬Æä´ÎÄ«Î÷¸ç¡¢Òâ´óÀûºÍÓ¡¶ÈµÈµØ¡£
https://www.microsoft.com/en-us/security/blog/2022/12/15/mccrash-cross-platform-ddos-botnet-targets-private-minecraft-servers/