Äþ¾²¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢
Ðû²¼Ê±¼ä 2023-05-121¡¢Äþ¾²¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢
¾ÝýÌå5ÔÂ10ÈÕ±¨µÀ£¬¹¤ÒµÍøÂçÄþ¾²¹«Ë¾DragosÅû¶ÁËÆä½üÆÚÔâµ½µÄÄþ¾²Ê¼þµÄÏêϸÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖ£¬Ä³ÀÕË÷ÍÅ»ïÓÚ5ÔÂ8ÈÕÊÔͼÈëÇÖ¹«Ë¾ÏµÍ³£¬µ«Î´ÄÜÀֳɡ£¹¥»÷ÕßÔÚÐÂÏúÊÛÈËÔ±Èëְ֮ǰй¶ÁËÆäÓʼþµØÖ·£¬ËæºóʹÓÃÕâЩ¸öÈËÐÅϢð³äDragosÔ±¹¤²¢Íê³ÉÔ±¹¤ÈëÖ°Á÷³ÌµÄ³õʼ²½Öè¡£¹¥»÷Õß¿ÉÒÔ·ÃÎÊSharePointºÍDragosºÏͬ¹ÜÀíϵͳ¡£Dragos³Æ£¬¸ÃʼþʼþÒѵõ½¿ØÖÆ£¬¹¥»÷ÕßÎÞ·¨ºáÏòÒÆ¶¯¡¢È¨ÏÞÌáÉý¡¢½¨Á¢³Ö¾Ã·ÃÎÊ»ò¶Ô»ù´¡¼Ü¹¹½øÐиü¸Ä¡£
https://securityaffairs.com/146053/cyber-crime/dragos-failed-extortion-attempt.html
2¡¢Òò¾Ü¸¶Êê½ðÓ¡¶ÈÄ³ÒøÐÐÔ¼600 GBµÄÊý¾Ý±»LockBit¹ûÈ»
¾Ý5ÔÂ8ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïLockBit 3.0¹ûÈ»ÁË´ÓÓ¡¶ÈÒøÐÐFullerton IndiaÇÔÈ¡µÄ600 GBÊý¾Ý¡£Fullerton IndiaÓÚ4ÔÂ24ÈÕ³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬LockBit 3.0Éù³Æ»ñµÃÁËÁè¼Ý600 GBÓë¸öÈ˺ͺϷ¨¹«Ë¾Ç©¶©µÄ´û¿îÐÒé¡£¸ÃÍŻォÊê½ðÖ§¸¶µÄ×îºóÆÚÏÞ¶¨Îª4ÔÂ29ÈÕ£¬²¢ÔÊÐíÖ§¸¶1000ÃÀÔª½«½ØÖ¹ÈÕÆÚÑÓ³¤24Сʱ¡£ÓÉÓÚFullerton India¾Ü¾øÓëÀÕË÷ÍÅ»ï½Ó´¥£¬¸ÃÍÅ»ïÔÚ±¾ÖÜÒ»¹ûÈ»ÁËÇÔÈ¡µÄÐÅÏ¢¡£
https://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010
3¡¢º«¹ú¾¯·½¹ûÈ»Ê×¶û¹úÁ¢´óѧҽԺ±»Kimsuky¹¥»÷µÄϸ½Ú
ýÌå5ÔÂ10ÈÕ±¨µÀ£¬º«¹ú¹ú¼Ò¾¯²ìÌü(KNPA)͸¶£¬Ó볯ÏÊÏà¹ØµÄºÚ¿ÍÍÅ»ïÈëÇÖÁ˸ùú×î´óµÄÒ½ÔºÖ®Ò»£¬Ê×¶û¹úÁ¢´óѧҽԺ(SNUH)¡£¸Ãʼþ·¢ÉúÔÚ2021Äê5ÔÂÖÁ6Ô£¬¾¯·½ÔÚ¹ýÈ¥Á½ÄêÖнøÐÐÁË·ÖÎöÊӲ죬ÒÔÈ·¶¨¹¥»÷ÕßÉí·Ý¡£¾¯·½²¢Î´½«´Ë´Î¹¥»÷¹éÒòÓÚÌØ¶¨µÄ×éÖ¯£¬µ«µ±µØÃ½ÌåÍÆ¶ÏÕâÊÇÓÉKimsukyе÷µÄ¡£¾Ý³ÂËߣ¬ºÚ¿ÍʹÓÃÁËÖÁÉÙÆß̨λÓÚº«¹úµÈ¹ú¼ÒµÄ·þÎñÆ÷À´Ìᳫ¹¥»÷¡£´Ë´Î¹¥»÷µ¼ÖÂÔ¼830000Ãû»¼ÕߺÍÊÂÇéÈËÔ±µÄÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-breached-major-hospital-in-seoul-to-steal-data/
4¡¢ÈðÊ¿¿Æ¼¼¹«Ë¾ABBÔâµ½ÀÕË÷ÍÅ»ïBlack BastaµÄ¹¥»÷
5ÔÂ11ÈÕ±¨µÀ³Æ£¬ÈðÊ¿µçÆø»¯ºÍ×Ô¶¯»¯¼¼ÊõÌṩÉÌABBÔâµ½ÁËBlack BastaµÄÀÕË÷¹¥»÷¡£ABB¹«Ë¾ÎªÖÆÔìºÍÄÜÔ´¹©Ó¦ÉÌ¿ª·¢¹¤Òµ¿ØÖÆÏµÍ³(ICS)ºÍSCADAϵͳ£¬2022ÄêµÄÊÕÈëΪ294ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÔÚ5ÔÂ7ÈÕÔâµ½¹¥»÷£¬ÆäÔ±¹¤Í¸Â¶£¬¹¥»÷Ó°ÏìÁ˹«Ë¾µÄWindows Active Directory£¬Éæ¼°Êý°Ų̀É豸¡£ÎªÁËÓ¦¶Ô´Ë´Î¹¥»÷£¬ABBÖÕÖ¹ÁËÓëÆä¿Í»§µÄVPNÁ¬½Ó£¬ÒÔ·ÀÖ¹ÀÕË÷Èí¼þÁ÷´«µ½ÆäËüÍøÂç¡£Õâ´Î¹¥»÷ÈÅÂÒÁ˸ù«Ë¾µÄÔËÓª£¬ÑÓÎóÁËÏîÄ¿£¬Ó°ÏìÁ˹¤³§¡£Ä¿Ç°£¬ABB¾Ü¾ø¶Ô´ËÊÂÖÃÆÀ¡£
https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/
5¡¢FortiGuardÐû²¼¹ØÓÚRapperBot¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
5ÔÂ9ÈÕ£¬FortiGuard³ÆÆä·¢ÏÖÁË×Ô1ÔÂÒÔÀ´»îÔ¾µÄRapperBot»î¶¯µÄÐÂÑù±¾¡£Ôڴ˴λÖУ¬¹¥»÷ÕßÒÑ¿ªÊ¼Éæ×ã¼ÓÃܽٳ֣¬ÌرðÊÇÕë¶ÔIntel x64É豸¡£¿ó¹¤´úÂëÏÖÒѼ¯³Éµ½RapperBotÖУ¬²¢Ê¹ÓÃË«²ãXOR±àÂë½øÐлìÏý£¬´Ó¶øÓÐЧµØÒþ²Ø¿ó³ØºÍMoneroÍÚ¿óµØÖ·¡£ËäÈ»Ñо¿ÈËԱûÓÐÊӲ쵽ÈκδÓC2·þÎñÆ÷·¢Ë͵½Ñù±¾µÄDDoSÃüÁµ«·¢ÏÖ×îеÄbot°æ±¾Ö§³ÖÃüÁִÐÐDDoS¹¥»÷¡¢×èÖ¹DDoS¹¥»÷ºÍÖÕÖ¹×ÔÉí¡£RapperBotËÆºõÕýÔÚ¿ìËÙÉú³¤²¢À©Õ¹¹¦Ð§ÒÔ×î´ó»¯ÆäÀûÈó¡£
https://www.fortinet.com/blog/threat-research/rapperbot-ddos-botnet-expands-into-cryptojacking
6¡¢McAfeeÐû²¼¹ØÓÚGULoader¹¥»÷»î¶¯µÄÉîÈë·ÖÎö³ÂËß
5ÔÂ9ÈÕ£¬McAfeeÐû²¼¹ØÓÚ½üÆÚGULoader¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£ÔÚÕâЩ»î¶¯ÖУ¬¹¥»÷Õßͨ¹ýÀ¬»øÓʼþ·¢ËÍ»ùÓÚNSISµÄ°²×°·¨Ê½£¬ÕâЩ°²×°·¨Ê½Ê¹Óòå¼þ¿âÔÚÄ¿±êϵͳÉÏÖ´ÐÐGU shellcode¡£³ÂËß»¹ÃèÊöÁËGUloaderÈçºÎÀûÓÃʸÁ¿Òì³£´¦ÖÃ(VEH)À´»ìÏýÖ´ÐÐÁ÷³Ì²¢¼õÂý·ÖÎöËÙ¶È¡£GuLoaderÔÚ´ó¹æÄ£¶ñÒâÈí¼þ»î¶¯Öб»ÀûÓã¬À´·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÈçRaccoon¡¢ VidarºÍRedlineµÈ¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-campaigns-a-deep-dive-analysis-of-a-highly-evasive-shellcode-based-loader/