À³Ë÷ÍÐÖÐÑëÒøÐÐ͸¶ÆäϵͳÔâµ½¹¥»÷²¿ÃŸ¶¿î¿ÉÄÜÑÓ³Ù
Ðû²¼Ê±¼ä 2023-12-19¾Ý12ÔÂ15ÈÕ±¨µÀ£¬ÄϷǹú¼ÒÀ³Ë÷ÍеÄÖÐÑëÒøÐÐÔâµ½¹¥»÷¡£¸ÃÒøÐÐͨ±¨³Æ£¬Æäϵͳ11ÈÕÔâµ½¹¥»÷£¬Ä¿Ç°ÕýÔÚÊÓ²ì´ËÊ£¬²¢È«ÌìºòÊÂÇéÒÔ»Ö¸´ÏµÍ³¡£¸Ã»ú¹¹»¹±£Ö¤£¬ËüûÓÐÔâµ½ÈκβÆÕþ»òÆäËüËðʧ¡£²»Í⣬ËüÒÑÔÝÍ£²¿ÃÅϵͳÒÔ·ÀÖ¹½øÒ»²½µÄ¹¥»÷¡£Òò´Ë£¬ÔÚÒøÐÐŬÁ¦»Ö¸´ÏµÍ³µÄµÄͬʱ£¬Ò»Ð©¸¶¿î¿ÉÄÜ»áÑÓ³Ù¡£µ±µØÃ½Ì屨µÀ£¬ÓÉÓڸùú»õ±ÒÂåµÙÓëÄÏ·ÇÀ¼Ìعҹ³£¬ÓÐÈ˵£ÓǸÃʼþ¿ÉÄÜ»áÓ°Ïì»ãÂÊ¡£
https://therecord.media/central-bank-lesotho-cyberattack-causes-outages
2¡¢ÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾ÒòÔâµ½ÍøÂç¹¥»÷·þÎñÔÝʱÖжÏ
¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬À´×ÔºÚ¿ÍÍÅ»ïGonjeshke DarandeµÄ¹¥»÷×ÌÈÅÁËÒÁÀʸ÷µØ¼ÓÓÍÕ¾µÄÔËÓª¡£¹¥»÷·¢ÉúÓÚ±¾ÖÜÒ»£¬Õâ¶ÔÊ×¶¼µÂºÚÀ¼Ôì³ÉÁËÑÏÖØµÄÓ°Ï죬Ðí¶à¼ÓÓÍÕ¾±»ÆÈÊÖ¶¯ÔËÐС£Ê¯ÓͲ¿³¤Javad Owji͸¶£¬´Ë´Î¹¥»÷µ¼ÖÂÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾·þÎñÖжϡ£Gonjeshke DarandeÉù³Æ¶Ô´ËʼþÂôÁ¦£¬²¢ÌåÏÖËüÈëÇÖÁ˼ÓÓÍÕ¾µÄÖÐÑë·þÎñÆ÷£¬»ñÈ¡ÁËÌØ¶¨¼ÓÓÍÕ¾ÐÅÏ¢¡¢Ö§¸¶ÏµÍ³ÏêϸÐÅÏ¢ºÍ¹ÜÀíϵͳ¡£
https://securityaffairs.com/156065/hacktivism/pro-israel-predatory-sparrow-iran-fuel-stations.html
3¡¢¼ÓÃÜ»õ±Ò½»Òׯ½Ì¨GokuMarketÉϰÙÍòÓû§µÄÐÅϢй¶
ýÌå12ÔÂ15Èճƣ¬ByteXÆìϵļ¯ÖÐʽ¼ÓÃÜ»õ±Ò½»Ò×ËùGokuMarketй¶Á˼¸ºõËùÓÐÓû§µÄÏêϸÐÅÏ¢¡£Cybernews·¢ÏÖÁËÒ»¸öδÊܱ£»¤µÄMongoDBʵÀý£¬´æ´¢ÁËGokuMarketÁè¼ÝÒ»°ÙÍò¿Í»§ºÍ¹ÜÀíÓû§µÄÏêϸÐÅÏ¢¡£Õâ¸ö̻¶µÄÊý¾Ý¿â°üÂÞÓû§IP¡¢¹ú¼Ò¡¢ÓʼþµØÖ·¡¢¼ÓÃÜÃÜÂëºÍÓû§¼ÓÃÜÇ®°üµØÖ·µÈÐÅÏ¢£¬ÒÔ¼°35¸ö¾ßÓÐÍêÈ«¹ÜÀí·ÃÎÊȨÏÞµÄÕÊ»§¡£ËüÓÚ10Ô±»·¢ÏÖ£¬²¢ÔÚ³ÂËߺóµÄµÚ¶þÌì¾Í±»±£»¤ÆðÀ´¡£
https://securityaffairs.com/155885/security/crypto-exchange-gokumarket-exposed.html
4¡¢Resecurity³ÆBianLian¡¢White RabbitºÍMario´æÔÚÁªÏµ
ResecurityÔÚ12ÔÂ15ÈÕÅû¶Á˺ڿÍÍÅ»ïBianLian¡¢White RabbitºÍMarioÖ®¼äµÄÁªÏµ¡£Ñо¿ÈËÔ±·¢ÏÖÁËÕâ3¸ö¹¥»÷ÍÅ»ïºÏ×÷ÁªºÏ¿ªÕ¹Õë¶ÔÉÏÊнðÈÚ·þÎñ¹«Ë¾µÄÀÕË÷¹¥»÷¡£ÕâÖÖÁªºÏµÄÀÕË÷¹¥»÷²¢²»¶à¼û£¬µ«ÓÉÓÚIABÓë°µÍøÉ϶à¸ö¹¥»÷ÍÅ»ïµÄºÏ×÷£¬ÕâÖֻ¿ÉÄÜ»á±äµÃÔ½À´Ô½³£¼û¡£Resecurity¹ûÈ»ÁËÓë3¸öÍÅ»ïͬʱִÐÐ"ÃÜÂëÅçÉä"¹¥»÷Ïà¹ØµÄIPµØÖ·ÁÐ±í£¬ÀûÓÃÁËÑÇÌ«µØÓòµÄ¶à¸öסլIPÊðÀí¡£¹¥»÷Õß»¹ÀûÓÃBEC×÷ÎªÔØÌ壬ʹÓÃÆäËü×éÖ¯µÄ±»¹¥»÷ÓʼþÕÊ»§ÄäÃû·¢ËÍÊê½ðÒªÇ󣬽øÒ»²½Ôö¼ÓÁËÊÓ²ìµÄÄѶȡ£
https://www.resecurity.com/blog/article/Exposing-Cyber-Extortion-Trinity-BianLian-White-Rabbit-Mario-Ransomware-Gangs-Spotted-Joint-Campaign
5¡¢ESETÅû¶OilRig¶à¸öÒÀÀµÓÚÔÆ·þÎñ½øÐÐC&CµÄÏÂÔØ·¨Ê½
12ÔÂ14ÈÕ£¬ESET·ÖÎöÁËһϵÁÐеÄOilRigÏÂÔØ·¨Ê½£¬ËüÃǶ¼ÒÀÀµºÏ·¨µÄÔÆ·þÎñÌṩÉÌ¡£OilRig£¬Ò²³ÆAPT34£¬×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¸ÃÍÅ»ïÔÚ2022ÄêµÄ¼¸´Î»î¶¯Öж¼Ê¹ÓÃÁ˶à¸öÏÂÔØ·¨Ê½£¬°üÂÞSampleCheck5000(SC5k v1-v3)¡¢OilCheck¡¢ODAgentºÍOilBooster¡£ÕâЩÏÂÔØ·¨Ê½µÄÏÔÖøÌØµãÊÇʹÓÃÁ˶à¸öºÏ·¨ÔÆ·þÎñAPI½øÐÐC&CͨÐźÍÊý¾Ýй¶£¬ÀýÈçMicrosoft Graph OneDrive API¡¢Microsoft Graph Outlook APIºÍMicrosoft Office EWS API¡£
https://www.welivesecurity.com/en/eset-research/oilrig-persistent-attacks-cloud-service-powered-downloaders/
6¡¢Check PointÐû²¼Rhadamanthysа汾µÄ·ÖÎö³ÂËß
12ÔÂ14ÈÕ£¬Check PointÐû²¼Á˹ØÓÚRhadamanthys 0.5.0°æ±¾µÄ·ÖÎö³ÂËß¡£ÕâÊÇÒ»ÖÖC++ÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÓÚ2022Äê8ÔÂÊ״α»·¢ÏÖ£¬Ä¿±êÊǵç×ÓÓʼþ¡¢FTPºÍÔÚÏßÒøÐзþÎñÕÊ»§Æ¾¾Ý¡£³ÂËßÖ¸³ö£¬¸Ã°æ±¾ÒýÈëÁËÒ»¸öеIJå¼þϵͳ£¬¿É¶ÔÌØ¶¨·Ö·¢ÐèÇó½øÐиü¸ß¼¶´ËÍâ¶¨ÖÆ¡£0.5.0°æ»¹¸ïÐÂÁË´æ¸ù¹¹½¨ºÍ¿Í»§¶ËÖ´Ðйý³Ì£¬ÐÞ¸´ÁËÕë¶Ô¼ÓÃÜ»õ±ÒÇ®°üµÄϵͳ£¬²¢ÐÞ¸´ÁËDiscordÁîÅÆ»ñÈ¡ÎÊÌâ¡£
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/