ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬µçÊӺ͵çֱ̨²¥Öжϣ»Ó¡¶ÈIT¹«Ë¾NucleusϰȾеÄÀÕË÷Èí¼þBlackCocaine
°ä²¼¹¦·ò 2021-06-071.ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬µçÊӺ͵çֱ̨²¥ÖжÏ

ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬²¿ÃŵçÊӺ͵çֱ̨²¥Öжϡ£¸Ã¹«Ë¾Õ¼ÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×Ôì½Ì¨¡£Inside Radio³Æ¹¥»÷²úÉúÔÚ6ÔÂ3ÈÕÉÏÎ磬Æä¶ÔCMGµÄ¶à¸öµç̨½øÐÐÁËËæ»ú²é³£¬·¢ÏÖµçÌ¨ÍøÕ¾ÈԿɽӼû£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬²¢ÌáÐÑ¡°ÒôƵÁÙʱ²»³ÉÓᱡ£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖØÒªµÄýÌ幫˾£¬2019Äê9Ô£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬µ¼Ö²¿ÃŹ㲥µç̨Öжϡ£
ÔÎÄÁ´½Ó£º
http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html
2.Ó¡¶ÈIT¹«Ë¾NucleusϰȾеÄÀÕË÷Èí¼þBlackCocaine

Ó¡¶ÈNucleus Software ExportsϰȾеÄÀÕË÷Èí¼þBlackCocaine¡£ÕâÊÇÒ»¼ÒÏòÒøÐкÍÁãÊÛµêÌṩ´û¿îÈí¼þµÄIT¹«Ë¾£¬Õâ´Î¹¥»÷µ¼ÖÂÆäÍøÂç̱»¾ÒÔ¼°ÄÚ²¿Ã³Ò×ÐÅÏ¢±»¼ÓÃÜ¡£¸Ã¹«Ë¾ÒѾÏòÃÏÂò֤ȯÂòÂôËù (BSE) ºÍÓ¡¶È¹ú¶È֤ȯÂòÂôËù (NSEI) »ã±¨ÁË´ËÊÂÎñ£¬²¢°µÊ¾¹¥»÷²úÉúÔÚ5ÔÂ30ÈÕ¡£Cyble×êÑÐÍŶӳÆÕâ´Î¹¥»÷À´×ÔÐÂÀÕË÷ÍÅ»ïBlackCocaine£¬¶øNucleusÊÇËüµÄµÚÒ»¸öÊܺ¦Õߣ¬Ä¿Ç°ÉÐδȷ¶¨¸Ã¶ñÒâÈí¼þµÄ³õʼϰȾý½é¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118617/malware/blackcocaine-ransomware.html
3.INKYÅû¶ÒÔ·À±¸ÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹µö»î¶¯

Óʼþ°²È«Æ½Ì¨INKYÅû¶ÒÔ·À±¸ÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹µö»î¶¯¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹µö»î¶¯£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĴ¹Î£Í¨Öª£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬À´¼ì²â²¢·À±¸×îеÄÀÕË÷Èí¼þ¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊǺϷ¨ÓòÃû£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/
4.ÎÚ¿ËÀ¼°²È«¾Ö³ÆÆäÒÑ×èÖ¹À´×Ô¶íÂÞ˹µÄ´ó¹æÄ£¹¥»÷»î¶¯

ÎÚ¿ËÀ¼°²È«¾ÖÅû¶ÔÚ½ñÄê6Ô³õ¶íÂÞ˹Áª¹úÌØÇÚ¾Ö·Ö·¢¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯¡£¸Ã»ú¹¹³Æ¹¥»÷Õß·¢ËÍÁË´óÁ¿¸ü¸ÄÁË·¢¼þÈ˵ØÖ·µÄÓʼþ£¬ÖØÒªÕë¶ÔÎÚ¿ËÀ¼µÄ¹«¹²»ú¹¹¡¢´¦Ëùµ±¾ÖºÍ¹Ø¼ü»ù´¡ÉèÊ©µÄÍøÂç¡£ÕâЩ¶ñÒâÈí¼þ¿ÉÆô¶¯Ö¸±êÍÆËã»úÉϵÄÔ¶³ÌÖÎÀí¹¤¾ß£¬ÒÔÆëÈ«½ÚÔì¸ÃÍÆËã»ú¡£Ä¿Ç°£¬ÎÚ¿ËÀ¼°²È«¾ÖÒѹ«¿ªÁËÕâ´Î¹¥»÷µÄ¼¼Êõϸ½Ú£¬ÈçIoC¡¢C2·þÎñÆ÷ºÍÓòÃûµÈ£¬²¢½¨ÒéÓйØ×éÖ¯¶Ôϵͳ½øÐд¹Î£²é³£¬²¢ÊµÊ±²ÉȡԤ·À´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://ssu.gov.ua/novyny/sbu-zablokuvala-masovu-kiberataku-spetssluzhb-rf-na-kompiuterni-merezhi-ukrainskykh-orhaniv-vlady
5.ESET°ä²¼2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨

ESET°ä²¼ÁË2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬ÔÚ½ñÄêµÄǰËĸöÔ£¬COVID-19È»ÊÇÈ«ÇòÍ·µÈÐÂÎÅ»°Ì⣬RDPºÍ̸ÒÀÈ»ÊDZ©Á¦¹¥»÷µÄÖØÒªÖ¸±ê£¬ÓйؼÓÃÜÇ®±ÒµÄÍþвÈÔÔÚÔö³¤£¬AndroidÒøÐжñÒâÈí¼þµÄÊýÁ¿ÔÚ¼±¾çÔö³¤¡£×êÑÐÈËÔ±»¹·ÖÎöÁËÒ»¸ö·ì϶ÀûÓÃÁ´£¬ËüÔÊÐí¹¥»÷ÕßÊÕÊÜËùÓпɽӼûµÄExchange·þÎñÆ÷¡£´Ë±í£¬¸Ã»ã±¨»¹Ô̺¬ÁËһЩ¹ØÓÚ APT×éÖ¯TurlaºÍLazarusµÄз¢ÏÖ£¬ÒÔ¼°ÇÔÈ¡ÒÑÔ½ÓüµÄiOSÉ豸Êý¾ÝµÄ¶ñÒâÈí¼þµÄÓйØÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2021/06/03/eset-threat-report-t12021/
6.Imperva°ä²¼ÒÔ100ÆðÊý¾Ýй¶ÊÂÎñΪÌâµÄ·ÖÎö»ã±¨

Imperva°ä²¼ÁËÒÔ100ÆðÊý¾Ýй¶ÊÂÎñΪÌâµÄ·ÖÎö»ã±¨¡£»ã±¨µ÷²éÁË´ÓǰʮÄêÖÐ100Æð͹ÆðµÄÊý¾Ýй¶ÊÂÎñ£¬²¢·¢´Ë¿ÌÕâЩй¶ÊÂÎñÖÐÓÐ75.9%ÊÇÓ×ÎÒÉí·ÝÐÅÏ¢(PII)¡£×Ô2017ÄêÒÔÀ´£¬Êý¾Ýй¶ÊÂÎñµÄÊýÁ¿Ã¿Äê³ÇÊÐÔö³¤30%ÒÔÉÏ£¬¶øÃ¿´ÎÊÂÎñËùй¶ÐÅÏ¢µÄÊýÁ¿Ã¿ÄêÔö³¤130%ÒÔÉÏ¡£Òò¶ø£¬Ð¹Â¶ÐÅÏ¢µÄÊýÁ¿¾ùÔÈÿÄêÔö³¤224%¡££¬½ö2021Äê1Ô£¬¾ÍÓг¬¹ý8.7Òڱʼͼ±»Ð¹Â¶£¬±È2017ÄêÕûÄêµÄй¶µÄ×ÜÊý»¹¶à¡£
ÔÎÄÁ´½Ó£º
https://www.imperva.com/resources/resource-library/white-papers/lessons-learned-from-analyzing-100-data-breaches/


¾©¹«Íø°²±¸11010802024551ºÅ