еÄRiseProͨ¹ýPrivateLoader PPI·þÎñ½øÐзַ¢
Ðû²¼Ê±¼ä 2022-12-28
¾Ý12ÔÂ24ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢ÏÖÁËÒ»ÖÖÐÂÐÍÇÔÈ¡ÐÅÏ¢µÄ¶ñÒâÈí¼þRisePro¡£ËüÓÚ2022Äê12ÔÂ13ÈÕÊ״α»¼ì²âµ½£¬ÕýÔÚͨ¹ýPrivateLoader°´°²×°¸¶·Ñ(PPI)¶ñÒâÈí¼þÏÂÔØ·þÎñ½øÐзַ¢¡£RiseProÓÉC++¿ª·¢£¬Ëƺõ¾ßÓÐÓëVidarÀàËÆµÄ¹¦Ð§£¬Ö¼ÔÚ×ÊÖú¹¥»÷Õß´Ó±»Ñ¬È¾µÄÉ豸ÖÐÇÔȡĿ±êµÄÐÅÓÿ¨¡¢ÃÜÂëºÍ¼ÓÃÜÇ®°ü¡£Flashpoint³ÂË߳ƣ¬¹¥»÷ÕßÒѾÔÚ¶íÂÞ˹°µÍøÊг¡ÉϳöÊÛÊýÒÔǧ¼ÆµÄRiseProÈÕÖ¾£¨´Ó±»Ñ¬È¾É豸ÖÐÇÔÈ¡µÄÊý¾Ý°ü£©¡£
https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/
2¡¢RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÂôÁ¦
¾ÝýÌå12ÔÂ26ÈÕ±¨µÀ£¬RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÂôÁ¦¡£ÍßŬ°¢Í¼ÔøÔÚ11Ô³õÐû²¼ËûÃÇÔâµ½ÁËÀÕË÷¹¥»÷£¬ÔÚ½«½üÒ»¸öÔºóÈÔδÍêÈ«»Ö¸´¡£12ÔÂ24ÈÕ£¬RansomHouseÍŻォÍßŬ°¢Í¼Õþ¸®ÁÐÈëÁËËûÃǵÄÍøÕ¾£¬³ÆÒÑÓÚ10ÔÂ6ÈÕ¼ÓÃÜËûÃǵÄϵͳ£¬²¢ÇÔÈ¡ÁË3.2 TBµÄÎļþ¡£Ðû²¼µÄÑù±¾ÖÐÎļþ¿´ÆðÀ´È·ÊµÓëÕþ¸®µÄÎļþÒ»Ö£¬ÆäÖв»°üÂÞ¸öÈË»òÃô¸ÐµÄÎļþ¡£Ä¿Ç°Éв»Çå³þÊê½ð½ð¶îÊǼ¸¶à£¬»òÊÇ·ñ½øÐйý̸ÅС£
https://www.databreaches.net/vanuatu-ransomware-attack-claimed-by-ransomhouse/
3¡¢CrowdStrikeÅû¶GuLoaderÈÆ¹ýÄþ¾²¼ì²âµÄ¶à¸öÒªÁì
CrowdStrikeÔÚ12ÔÂ19ÈÕÅû¶ÁËGuLoaderÈÆ¹ýÄþ¾²¼ì²âµÄ¶à¸öÒªÁì¡£GuLoader£¨ÓÖÃûCloudEyE£©£¬ÊÇÒ»ÖÖVisual Basic Script(VBS)ÏÂÔØ·¨Ê½£¬ÓÚ2019ÄêÊ×´ÎÔÚÒ°Íâ±»·¢ÏÖ¡£ËüʹÓöà̬shellcode¼ÓÔØ·¨Ê½À´Èƹý´«Í³Äþ¾²½â¾ö·½°¸£¬Ñо¿ÈËԱΪ¶ñÒâÈí¼þʹÓõÄÿ¸öAPIÓ³ÉäËùÓÐǶÈëʽDJB2¹þÏ£ÖµÀ´·ÖÎöÆä»î¶¯¡£ÐµÄshellcode·´·ÖÎö¼¼Êõͨ¹ýɨÃèÕû¸ö½ø³ÌÄÚ´æÀ´²éÕÒÓëÐéÄâ»ú(VM)Ïà¹ØµÄ×Ö·û´®£¬ÐµÄÈßÓà´úÂë×¢Èë»úÖÆÒâζ×Åͨ¹ýʹÓÃÄÚÁª»ã±àÈÆ¹ýÄþ¾²½â¾ö·½°¸µÄÓû§Ä£Ê½hookÀ´È·±£´úÂëµÄÖ´ÐС£
https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/
4¡¢TrendMicro·¢ÏÖÀûÓùȸèPPC¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯
12ÔÂ23ÈÕ£¬Trend Micro͸¶Æä·¢ÏÖ½©Ê¬ÍøÂçIcedIDµÄ·Ö·¢·½Ê½·¢ÉúÁËÖØ´ó±ä»¯¡£×Ô2022Äê12ÔÂÒÔÀ´£¬Ñо¿ÈËÔ±ÊӲ쵽ÀûÓùȸèÿ´Îµã»÷¸¶·Ñ(PPC)¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯¡£IcedIDÔËÓªÍÅ»ï½Ù³ÖÁËAdobe¡¢FortinetºÍDiscordµÈÆ·ÅÆºÍÓ¦ÓÃËùʹÓõÄÒªº¦´ÊÀ´ÏÔʾ¶ñÒâ¹ã¸æ¡£µ±Óû§ËÑË÷Òªº¦×Öʱ£¬Ö¸Ïò¶ñÒâÍøÕ¾µÄ¹ã¸æÏÔʾÔÚ×ÔÈ»ËÑË÷½á¹ûÉÏ·½¡£Ôڴ˻ÖУ¬¼ÓÔØ·¨Ê½ÊÇͨ¹ýMSIÎļþ·Ö·¢µÄ£¬Õâ¶ÔÓÚIcedIDÀ´ËµÊDz»³£¼ûµÄ¡£´ËÍ⣬¹¥»÷ÕßÀûÓÃÁ˺Ϸ¨µÄKeitaroÁ÷Á¿µ¼Ïòϵͳ(TDS)À´¹ýÂËÀ´×ÔÑо¿ÈËÔ±ºÍɳºÐµÄÁ÷Á¿¡£
https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html
5¡¢Ö¥¼Ó¸çµÄÄÜÔ´¹«Ë¾Sargent & LundyÔâµ½ÀÕË÷¹¥»÷
ýÌå12ÔÂ27Èճƣ¬ÃÀ¹úCNN͸¶ºÚ¿ÍÔÚ½üÆÚµÄÀÕË÷¹¥»÷ÖÐÇÔÈ¡Á˶à¼ÒµçÁ¦¹«Ë¾µÄÊý¾Ý¡£´Ë´ÎÀÕË÷¹¥»÷Õë¶ÔµÄÊÇ×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄSargent & Lundy¹¤³Ì¹«Ë¾£¬¸Ã¹«Ë¾Éè¼ÆÁË900¶à¸ö·¢µçÕ¾ºÍÊýǧӢÀïµÄµçÁ¦ÏµÍ³£¬²¢³ÖÓÐÕâЩÏîÄ¿µÄÃô¸ÐÊý¾Ý¡£¾ÝÆäÍøÕ¾³Æ£¬¸Ã¹«Ë¾»¹´¦ÖúËÄþ¾²ÎÊÌâ¡£¾ÝϤ£¬¸ÃʼþÒѵõ½¿ØÖƺ͵÷Í££¬Ëƺõ²¢Î´¶ÔÆäËüµçÁ¦ÐÐÒµµÄ¹«Ë¾Ôì³ÉÓ°Ï죬ҲûÓÐÊý¾Ý±»Ðû²¼µ½°µÍøÉÏ¡£
https://www.databreaches.net/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/
6¡¢KasperskyÐû²¼Õë¶Ô°¢¶û°ÍÄáÑǵÄÁ½ÂÖ¹¥»÷µÄ·ÖÎö³ÂËß
KasperskyÔÚ12ÔÂ22ÈÕÐû²¼ÁËÕë¶Ô°¢¶û°ÍÄáÑÇ×éÖ¯µÄÁ½ÂÖ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã³ÂËßÖ÷Òª±ÈÁ¦ÁËÕâÁ½ÂÖ¹¥»÷»î¶¯ËùʹÓõÄÀÕË÷Èí¼þºÍ²Á³ý¶ñÒâÈí¼þÖ®¼äµÄÇø±ð¡£¶ÔÓÚÀÕË÷Èí¼þ£¬Á½ÂÖ¹¥»÷»î¶¯µÄÑù±¾¾ßÓÐÏàͬµÄÇ©ÃûÖ¤Êé²ÎÊý£¬Óë¿ÆÍþÌØµçÐŹ«Ë¾Óйء£¹¥»÷Õß¶ÔµÚ¶þÂÖʹÓõIJÁ³ý¶ñÒâÈí¼þ½øÐÐÁ˶à´ÎÐ޸ģ¬¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²â£¬Ö÷Òª±ä»¯ÊÇʹÓÃNvidiaÖ¤Êé¶Ô¶ñÒâÈí¼þÇ©Ãû¡¢ÔÚ¶ñÒâÈí¼þÖÐǶÈëEldoS RawDiskÇý¶¯·¨Ê½£¬ÒÔ¼°ÔÚÇý¶¯·¨Ê½°²×°ºóÁ¢¼´Æô¶¯É¾³ýÀý³Ì¡£
https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/