×êÑÐÈËÔ±°ä²¼¹¥»÷Ó¡¶ÈºËµçÕ¾µÄ¶ñÒâÑù±¾·ÖÎö»ã±¨£»¼ÓÄôóÒþÖÔ±£»¤·¨°ä²¼Ò»ÄêºóÊÂÎñ»ã±¨Ôö³¤ÖÁÁù±¶
°ä²¼¹¦·ò 2019-11-05
°²È«×¨¼ÒMarco Ramilli¼°ÆäÍŶӷÖÎöÁËϰȾӡ¶ÈKudankulamºËµçÕ¾µÄ¶ñÒâÑù±¾¡£¸ÃÑù±¾ÓÚ10ÔÂ28ÈÕ±»ÉÏ´«ÖÁVirus Total£¬ÊÇÒ»¸ö±àÒëÓÚ2019-07-29 13:36:26µÄ32λPEÎļþ£¬ËüÔÚÔËÐкóÖ´ÐÐÈý¸öÖØÒª²Ù×÷£¬Ô̺¬µ¼ÈëÖ°ÄÜÄ£¿é¡¢ÍøÂç±¾µØÐÅÏ¢¼°·¢ËÍÖÁÖÐÑë½Úµã¡£¸ÃÑù±¾ÍøÂçµÄÐÅÏ¢Ô̺¬±¾µØIPµØÖ·¡¢¹¤×÷ÁÐ±í¡¢Â·ÓɺͽӿÚÐÅÏ¢ÒÔ¼°Ô¤Éè´æ´¢ÔÚϵͳijЩ¾íÖеÄÈí¼þ¡£ÕâЩÐÅÏ¢×îºó±»·¢Ë͵½10.38.1.35£¬ÔÚ´úÂëÖгÆÎªcontroller5kk¡£RamilliÈ·ÈϸÃÑù±¾ÊǶ¨Ô컯µÄDTrack¶ñÒâÈí¼þ¡£
¡¢ÔÎÄÁ´½Ó£º
https://marcoramilli.com/2019/11/04/is-lazarus-apt38-targeting-critical-infrastructures/
2¡¢Î÷°àÑÀÁ½¼Ò¹«Ë¾ÔâÕë¶ÔÐÔÀÕË÷Èí¼þ¹¥»÷
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/everis-spain-ransomware-attack.html3¡¢·ðÂÞÀï´ïÖݰ¿¨ÀÊÐÊÜBECÚ¿ÆËðʧ74.2ÍòÃÀÔª

·ðÂÞÀï´ïÖݵİ¿¨ÀÊгÉΪBECڿƵÄ×îÐÂÊܺ¦Õߣ¬Ú²ÆÕß´Ó¸ÃÊÐÆ×ßÁ˳¬¹ý74.2ÍòÃÀÔª¡£¸ÃÊÂÎñ²úÉúÔÚ9Ô·ݣ¬Ú²ÆÕß¼Ù×°³ÉÔڰ¿¨À¹ú¼Ê»ú³¡½¨Ôìк½Õ¾Â¥µÄ¹¹Öþ¹«Ë¾Ausley ConstructionµÄÒ»ÃûÔ±¹¤£¬Ïò¸ÃÊеĸ߼¶¹ÜÕÊÈËÔ±·¢ËÍÁËÔ̺¬Â·ÓɺÅÂë¡¢ÒøÐÐÕË»§ÒÔ¼°Ò»ÕÅÎÞЧ֧Ʊ¸±±¾µÄµç×ÓÓʼþ¡£¸ÃÓʼþÀ´×ÔÓÚausleyconstructions.com£¬¶øÕæÊµµÄµØÖ·Ä©Î²Ã»ÓÐs¡£µ±Ausley ConstructionÔÚ10ÔÂ22ÈÕ֪ͨ¸ÃÊиÿî×ÓÉÐδ֧¸¶Ê±£¬°Â¿¨ÀÊвŷ¢ÏÖÇ®±»»ãÈëÁËÚ²ÆÕßµÄÒøÐÐÕË»§¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bec-fraudsters-divert-742-000-from-ocala-city-in-florida/4¡¢NunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬ËùÓе±¾Öµ¥Ôª¾ùÊÜÓ°Ïì
¼ÓÄôóNunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬ËùÓе±¾Öµ¥Ôª¾ùÊÜÓ°Ï죬µ±¾Ö¹ÙÔ±°µÊ¾ÉÐÎÞ·¨Ô¤¼Æ·þÎñºÎʱ¸´ÔÉÏÏß¡£¸ÃÊÂÎñ²úÉúÔÚÖÜÁùÔ糿£¬±¾µØµ±¾ÖµÄËùÓеç×ÓÐÅϢϵͳ¾ùÊÜÓ°Ï죬Ա¹¤ÎÞ·¨µÇ¼Æäµ±¾ÖÕË»§£¬µç»°ÏµÍ³Ò²ÎÞ·¨Ê¹Ó㬵«¸ÃµØÓòµÄѧÌÃδÊÜÓ°Ïì¡£µ±¾Ö¹ÙÔ±°µÊ¾µ±Ç°ÉÐûÓжÔÓ×ÎÒÐÅÏ¢»òÒþÖÔÊý¾Ýй¶µÄÓÇÓô¡£
ÔÎÄÁ´½Ó£º
https://www.cbc.ca/news/canada/north/nunavut-government-ransomware-1.5346144
5¡¢¼ÓÄôóÒþÖÔ±£»¤·¨°ä²¼Ò»ÄêºóÊÂÎñ»ã±¨Ôö³¤ÖÁÁù±¶
¼ÓÄôó¡¶Ó×ÎÒÐÅÏ¢±£»¤ºÍµç×ÓÎļþ·¨¡·£¨PIPEDA£©ÓÚ2018Äê11ÔÂ1ÈÕÆðÖ´ÐУ¬Æ¾¾Ý¸Ã˾·¨£¬ÊÜÔ¼ÊøµÄÆóÒµ±ØÐëÏòÒþÖÔרԱ°ì¹«ÊÒ£¨OPC£©»ã±¨Êý¾Ýй¶ÊÂÎñ²¢Í¨ÖªÊÜÓ°ÏìµÄÓ×ÎÒ¡£ÔÚ´ÓǰµÄ12¸öÔÂÖУ¬¼ÓÄôóÊý¾Ýй¶»ã±¨µÄÊýÁ¿ÃÍÔö£¬OPC¹²ÊÕµ½ÁË680·Ý»ã±¨£¬ÊǸÃ˾·¨ÉúЧǰ12¸öÔÂÄÚÌá½»»ã±¨ÊýÁ¿µÄÁù±¶¡£Æ¾¾ÝÕâЩ»ã±¨£¬ÊÜÊý¾Ýй¶ӰÏìµÄ¼ÓÄôó¹«ÃñÊýÁ¿Ô¶Ô¶³¬¹ý2800Íò£¬»ã±¨µÄ´óÎÞÊýÎ¥¹æÊÂÎñ£¨58£¥£©É漰δ¾ÊÚȨµÄ½Ó¼û¡£
ÔÎÄÁ´½Ó£º
https://www.priv.gc.ca/en/blog/20191031/
6¡¢2019ÄêÖÁÉÙ13¼ÒÍйܷþÎñÉ̱»ÓÃÓÚÍÆËÍÀÕË÷Èí¼þ
ƾ¾ÝÍþвµý±¨³§ÉÌArmor°ä²¼µÄÒ»·Ýл㱨£¬2019ÄêÖÁÉÙÓÐ13¼ÒÍйܷþÎñÉÌ£¨MSP£©±»ºÚ¿ÍÓÃÓÚÍÆËÍÀÕË÷Èí¼þ¡£Ò»µ©ºÚ¿ÍÈëÇÖMSPµÄÍøÂ磬ËûÃǾÍÄܹ»Ê¹ÓÃÔ¶³Ì½Ó¼û¹¤¾ß½«ÀÕË÷Èí¼þ²¿Êðµ½Êý°Ù¼Ò¹«Ë¾/ÊýÇ§Ì¨ÍÆËã»úÉÏ¡£¸ÃÁбíÔ̺¬ApexÈËÁ¦×ÊÔ´ÖÎÀí¡¢CloudJumper¡¢IT By Design¡¢MetroList¡¢CorVel¡¢PM Consultants¡¢iNSYNQ¡¢TSM Consulting¡¢PerCSoft¡¢SCHOOLinSITES¡¢TrialWorks¡¢BillTrustÒÔ¼°Ò»¼Òδ֪µÄMSP¡£Armor°µÊ¾¿ÉÄÜ»¹Óиü¶àµÄMSPÈëÇÖÊÂÎñδ±»»ã±¨¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/at-least-13-managed-service-providers-were-used-to-push-ransomware-this-year/


¾©¹«Íø°²±¸11010802024551ºÅ