Äþ¾²¹«Ë¾LogicMonitor͸¶Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2023-09-051¡¢Äþ¾²¹«Ë¾LogicMonitor͸¶Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷
¾ÝýÌå8ÔÂ31ÈÕ±¨µÀ£¬ÍøÂçÄþ¾²¹«Ë¾LogicMonitor͸¶£¬ÆäSaaSƽ̨µÄ²¿ÃÅÓû§Ôâµ½¹¥»÷¡£LogicMonitorÔÚ¸üÐÂÖÐ³ÆÆä·¢ÏÖus-west-2¡¢us-east-1ºÍeu-west-1µÄ²¿Ãſͻ§µÄÃÅ»§·ÃÎÊȨÏÞ¶ªÊ§£¬Ä¿Ç°¸ÃÎÊÌâÒѵõ½½â¾ö¡£¹«Ë¾Ã»ÓÐ˵Ã÷ÊÇÀÕË÷¹¥»÷£¬µ«¾ÝÏûÏ¢ÈËÊ¿³Æ£¬¹¥»÷ÕßÈëÇÖÁ˿ͻ§ÕÊ»§£¬Äܹ»´´½¨µ±µØÕÊ»§²¢°²×°ÀÕË÷Èí¼þ¡£ÀÕË÷Èí¼þÊÇʹÓÃ¸ÃÆ½Ì¨µÄµ±µØLogicMonitor Collector´«¸ÐÆ÷²¿ÊðµÄ£¬´Ë´«¸ÐÆ÷¼à¿ØÓû§»ù´¡ÉèÊ©£¬µ«Ò²¾ßÓнű¾¹¦Ð§¡£¾ÝϤ£¬ÊÜÓ°Ïì¿Í»§Ê¹ÓÃÁËLogicMonitor·ÖÅ䏸ÐÂÓû§µÄĬÈÏÈõÃÜÂ룬Òò¶øÔâµ½Á˹¥»÷¡£
https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/
2¡¢±£ÏÕ¹«Ë¾Trygg-Hansaй¶65Íò¿Í»§Êý¾Ý±»·£¿î300ÍòÃÀÔª
9ÔÂ4ÈÕýÌ峯£¬±£ÏÕ¹«Ë¾Trygg-HansaÒòй¶65Íò¿Í»§µÄÊý¾Ý£¬±»ÈðµäÒþ˽±£»¤¾Ö(IMY)·£¿î300ÍòÃÀÔª¡£Moderna F?rs?kringar£¨ÏÖΪTrygg-HansaµÄÒ»²¿ÃÅ£©µÄ¿Í»§·¢ÏÖ¿Éͨ¹ý·¢Ë͸ø¿Í»§µÄ±¨¼ÛÒ³ÃæÉϵÄÁ´½Ó½øÈë±£ÏÕ¹«Ë¾µÄºǫ́£¬²¢ÏòIMY¾Ù±¨ÁË´ËÊ¡£IMYÊÓ²ìÈ·ÈÏ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿É·ÃÎʺó¶ËÊý¾Ý¿â£¬¶øÇÒ¿ÉÒÔͨ¹ýÐÞ¸ÄURLÖеÄÁ¬Ðø¿Í»§¶ËIDÀ´ä¯ÀÀÆäËû¸öÈ˵ÄÎĵµ¡£¸ÃʼþÓ°ÏìÔ¼ÁË650000Ãû¿Í»§£¬Ð¹Â¶Ê±¼ä³¤´ïÁ½Äê¶à£¬´Ó2018Äê10ÔÂÖÁ2021Äê2Ô¡£IMYÌåÏÖ£¬ÔÚÊÕµ½ÓйØÂ©¶´µÄ³ÂËߺó¸Ã¹«Ë¾Ê¼ÖÕδÄܽâ¾öÎÊÌ⣬¾ö¶¨¶Ô´Ë´¦ÒÔ300ÍòÃÀÔªÐÐÕþ´¦·£¡£
https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/
3¡¢Interlab·¢ÏÖÀûÓÃľÂíSuperBearÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯
InterlabÔÚ9ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËÕë¶Ôº«¹úÃñ¼äÍÅÌåµÄµöÓã¹¥»÷£¬ÀûÓÃÁËÐÂÐÍRAT SuperBear¡£¾ÝϤ£¬Ò»ÃûÐÂÎÅÊÂÇéÕßÊÕµ½ÓÐÕë¶ÔÐԵĵöÓãÓʼþ£¬ÆäÖаüÂÞ¶ñÒâLNKÎļþ¡£LNKÎļþ»áÆô¶¯PowerShellÃüÁîÀ´Ö´ÐÐVB½Å±¾£¬¸Ã½Å±¾ÓÖ»á´ÓWordPressÍøÕ¾»ñÈ¡ÏÂÒ»½×¶Îpayload£¬°üÂÞÒ»¸öAutoit3.exe¶þ½øÖÆÎļþºÍÒ»¸öAutoIt½Å±¾¡£AutoIt½Å±¾Ê¹Óýø³Ì¿Õ¶´¼¼ÊõÖ´Ðнø³Ì×¢È룬ÔÚÕâÖÖÇé¿öÏ£¬»áÉú³ÉÒ»¸öExplorer.exeʵÀýÀ´×¢ÈëSuperBear¡£¸ÃRAT¿ÉÇÔÈ¡Êý¾Ý£¬ÏÂÔØ²¢ÔËÐÐÆäËüshellÃüÁîºÍ¶¯Ì¬Á´½Ó¿â(DDL)¡£
https://interlab.or.kr/archives/19416
4¡¢Labyrinth ChollimaÊǽüÆÚVMConnect¹¥»÷µÄÄ»ºóºÚÊÖ
¾Ý8ÔÂ31ÈÕ±¨µÀ£¬ReversingLabs½«VMConnect»î¶¯ÓëLazarusµÄ×ÓÍÅ»ïLabyrinth ChollimaÁªÏµÆðÀ´¡£8Ô³õ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸ö¶ñÒ⹩ӦÁ´»î¶¯¡°VMConnect¡±£¬ÏòPyPI´æ´¢¿âÉÏ´«ÁËÁ½´ò¶ñÒâPython°ü¡£ÏÖÔÚÓÖ·¢ÏÖÁËÁíÍâÈý¸ö¶ñÒâ°ü£¬tablediter¡¢request-plusºÍrequestspro£¬ËüÃDZ»ÈÏΪÊÇVMConnect»î¶¯µÄ¼ÌÐø¡£Ñо¿ÈËÔ±½«Æä¹éÒòÓÚLabyrinth ChollimaÊÇ»ùÓÚÕâЩ»î¶¯ÖÐʹÓõĶñÒâ´úÂëµÄÏàËÆÐÔ¡£
https://securityaffairs.com/150197/apt/labyrinth-chollima-pypi-supply-chain-attacks.html
5¡¢Group-IBÐû²¼¹ØÓÚClassiscam¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
8ÔÂ31ÈÕ£¬Group-IBÐû²¼Á˹ØÓÚClassiscamÔÚÈ«Çò·¶Î§ÄÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£³ÂË߳ƣ¬Classiscamͨ¹ýÆÛÆ·ÖÀà¹ã¸æÍøÕ¾Óû§²¢ÇÔÈ¡ËûÃǵÄ×ʽðºÍÖ§¸¶¿¨ÏêϸÐÅÏ¢£¬ÒÑ׬ȡÁË6450ÍòÃÀÔª¡£Ä¿±êÆ·ÅÆµÄÊýÁ¿Ò²´ÓÈ¥ÄêµÄ169¸öÔö¼Óµ½251¸ö£¬Ä¿Ç°ÓÐ393¸ö¹¥»÷ÍÅ»ïÕë¶Ô79¸ö¹ú¼ÒµÄÓû§£¬ÓÐ1366¸öTelegramƵµÀ½øÐÐе÷¡£Å·ÖÞÔâµ½µÄ¹¥»÷×î¶à£¬ÆäÖе¹ú±»¹¥»÷Óû§×î¶à£¬Æä´ÎÊDz¨À¼¡¢Î÷°àÑÀ¡¢Òâ´óÀûºÍÂÞÂíÄáÑÇ¡£Ó¢¹úÓû§µÄƽ¾ùËðʧ½ð¶î×î¸ß£¬Îª865ÃÀÔª£¬¶øÈ«Çòƽ¾ùˮƽΪ353ÃÀÔª¡£
https://www.group-ib.com/blog/classiscam-2023/
6¡¢FortiGuardÐû²¼¹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö³ÂËß
8ÔÂ31ÈÕ£¬FortiGuardÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö³ÂËß¡£RhysidaÊÇÒ»¸öеÄÀÕË÷ÍŻËüʹÓÃRaaSÄ£ÐÍ£¬µÚÒ»¸öÑù±¾ÓÚ5ÔÂÌá½»µ½¹«¹²ÎļþɨÃè·þÎñ¡£RhysidaÒÀÀµµöÓã¹¥»÷×÷ÎªÑ¬È¾ÔØÌ壬¹¥»÷Õß»¹Ê¹ÓÃCobalt StrikeÔÚÄ¿±êÍøÂçÄÚºáÏòÒÆ¶¯²¢Í¨±¨payload¡£¸ÃÍÅ»ïÒÑÁгö41¸ö±»¹¥»÷Ä¿±ê£¬ÆäÖÐÁè¼ÝÒ»°ëλÓÚÅ·ÖÞ£¬Æä´ÎÊDZ±ÃÀ¡£¹¥»÷Ö÷ÒªÕë¶Ô½ÌÓýÐÐÒµ£¨Õ¼±È30%ÒÔÉÏ£©£¬Æä´ÎÊÇÖÆÔìÒµ¡¢Õþ¸®»ú¹¹ºÍITÐÐÒµ¡£
https://www.fortinet.com/blog/threat-research/ransomware-roundup-rhysida