Hetzner²úÉúÓ²¼þ¹ÊÕϵ¼Ö²¿Ãſͻ§µÄÊý¾ÝÓÀÔ¶ÐÔÃÔʧ
°ä²¼¹¦·ò 2022-04-19¾ÝýÌå4ÔÂ14ÈÕ±¨Â·£¬µÂ¹úÔÆ·þÎñÌṩÉÌHetzner Online GmbH²¿Ãſͻ§µÄÊý¾ÝÃÔʧ¡£Æ¾¾ÝÆä֪ͨ£¬HetznerµÄÔÆ·þÎñͨ¹ý½«¿ìÕÕ¸´Ôìµ½Èý¸öÓ²ÅÌÀ´ÊµÏÖÊý¾Ý°²È«£¬Òò¶ø¼´±ãÁ½¸öÓ²Å̲úÉú¹ÊÕÏ£¬Êý¾ÝÒÀÈ»¿ÉÓᣵ«½üÆÚ²úÉúÁËһϵÁÐÊÂÎñ£¬µ¼Ö¶à¸ö´ÅÅÌÂ½Ðø³öÏÖ¹ÊÕÏ£¬²¿ÃÅÊý¾ÝÃÔʧ²¢ÇÒÎÞ·¨¸´Ô¡£¾ÝϤ£¬Õâ´ÎÊÂÎñ×ܹ²ÃÔʧÁË1500¸ö¿ìÕÕ£¬HetznerΪÊÜÓ°ÏìÕÊ»§ÌṩÁ˼ÛÖµ20Å·ÔªµÄÔÆ»ý·Ö×÷ΪÅâ³¥£¬Ä¿Ç°¹ÊÕÏÔÒòÒÀȻδ֪¡£
https://www.bleepingcomputer.com/news/security/hetzner-lost-customer-data-and-gave-20-as-compensation/
2¡¢Âóµ±À͸ç˹´ïÀè¼Ó·Ö¹«Ë¾³ÆÆä¿Í»§Êý¾ÝÔâµ½·¸·¨½Ó¼û
¾Ý4ÔÂ16Èյı¨Â·³Æ£¬Âóµ±À͸ç˹´ïÀè¼Ó·Ö¹«Ë¾¿Í»§µÄÊý¾Ý¿ÉÄÜÒѾй¶¡£¸Ã¹«Ë¾³Æ£¬Ò»¸ö¹¥»÷Õßͨ¹ýÆäµÚÈý·½·þÎñÌṩÉÌÖÎÀíµÄÊý¾Ý¿â£¬½Ó¼ûÁËÂóµ±ÀͿͻ§µÄÊý¾Ý¡£Ä¿Ç°£¬¹¥»÷ÕßÈôºÎ½Ó¼û¸ÃÊý¾Ý¿âÈÔ²»µÃ¶øÖª£¬µ«Âóµ±ÀͰµÊ¾£¬¿Í»§ÐÕÃû¡¢»éÒöÇé¿ö¡¢µØÖ·¡¢µç×ÓÓʼþ¡¢Îļþ¼ø±ðºÅºÍµç»°ºÅÂëµÈÐÅÏ¢ÒÑй¶¡£Âóµ±ÀÍÏÖÒÑÉϱ¨±¾µØ·¨Âɲ¿ÃÅ£¬²¢Æðͷ֪ͨÊÜÓ°Ïì¿Í»§£¬ÌáÐÑËûÃǰÑÎÈDZÔڵĴ¹µö¹¥»÷»î¶¯¡£
https://techdator.net/mcdonalds-costa-rica-data-breach/
3¡¢×êÑÐÈËÔ±·¢ÏÖContiºÍKarakurtÍÅ»ïÖ®¼ä´æÔÚÁªÏµ
4ÔÂ15ÈÕ£¬°²È«¹«Ë¾Arctic Wolf°ä²¼»ã±¨½ÒʾÁËContiºÍKarakurtÍÅ»ïÖ®¼ä´æÔÚµÄÁªÏµ¡£×Ô2021Äê8Ô³õ´Î»î¶¯ÒÔÀ´£¬KarakurtÒѹ¥»÷Á˶à¸öÐÐÒµ£¬Éæ¼°°Ë¸ö¹ú¶ÈºÍµØÓòµÄ×éÖ¯¡£¸Ã»ã±¨³Æ£¬ÔÚµ÷²éÔøÏòContiÖ§¸¶Êê½ðÀ´½âËøÊý¾ÝµÄ¿Í»§Ê±£¬·¢Ïָÿͻ§ºóÀ´±»Karakurtͨ¹ýConti×°ÖõÄCobalt StrikeºóÃÅÈëÇÖ¡£×êÑÐÈËÔ±»¹·¢ÏÖÁËÂŴδÓKarakurtÇ®°üÏòContiÇ®°ü·¢ËͼÓÃÜÇ®±ÒµÄÇé¿ö¡£´Ë±í£¬Infinitum ITµ÷²éÁËContiµÄ¶à¸öProtonmailºÍMega UploadÕÊ»§£¬·¢ÏÖConti³ÉÔ±ÓÃÀ´ÉÏ´«ºÍÏÂÔØ±»µÁÊý¾ÝµÄIPµØÖ·»¹ÍйÜÁËKarakurtÓÃÀ´Ð¹Â¶Êý¾ÝµÄÍøÕ¾¡£
https://arcticwolf.com/resources/blog/karakurt-web
4¡¢×êÑÐÍŶӳÆÔÚWin 11×°ÖÃGoogle Play¿ÉÄÜ»áϰȾľÂí
¾Ý4ÔÂ14ÈÕ±¨Â·³Æ£¬ÔÚWindows 11×°ÖÃGoogle Play¿ÉÄÜ»áϰȾľÂí¡£È¥Äê10Ô°䲼Windows 11ʱ£¬Î¢Èí°ä·¢½«ÔÊÐíÓû§Ö±½ÓÔÚWindowsÖÐÔËÐÐÔÉúAndroidÀûÓᣵ«µ±½ñÄê2Ô°䲼Android×Óϵͳʱ£¬Óû§·¢ÏÖËûÃDz»ÄÜʹÓÃGoogle Play¡£ÔÚÄǸöʱ³½£¬ÓÐÈËÔÚGitHubÉϰ䲼ÁËÒ»¸öй¤¾ßWindows Toolbox£¬¿ÉΪAndroid×ÓϵͳװÖÃGoogle Play¡£Ö±µ½ÉÏÖÜ£¬×êÑÐÍŶӷ¢ÏÖWindows ToolboxÏÖʵÉÏÊÇÒ»¸öľÂí£¬ËüÄܹ»Ö´ÐÐһϵÁжñÒâPowerShell¾ç±¾£¬ÒÔÔÚÖ¸±êÉ豸ÉÏ×°ÖÃtrojan clickerºÍÆäËü¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/windows-11-tool-to-add-google-play-secretly-installed-malware/
5¡¢Kaspersky°ä²¼ÀÕË÷Èí¼þYanluowangµÄÃâ·Ñ½âÃÜÆ÷
KasperskyÔÚ4ÔÂ18ÈյĻ㱨ÖÐ³ÆÆä°ä²¼ÁËÀÕË÷Èí¼þYanluowangµÄÃâ·Ñ½âÃÜÆ÷¡£¸ÃÀÕË÷Èí¼þÏà¶Ô½ÏУ¬Òѹ¥»÷ÁËÃÀ¹ú¡¢°ÍÎ÷ºÍÍÁ¶úÆäµÈ¶à¸ö¹ú¶ÈµÄÖ¸±ê¡£Kaspersky·ÖÎöÀÕË÷Èí¼þºó·¢ÏÖÁËÆäÖеÄÒ»¸ö·ì϶£¬¿ÉÓÃÀ´Í¨¹ýÒÑÖªÃ÷ÎĹ¥»÷½âÃܱ»¹¥»÷Óû§µÄÎļþ¡£¸Ã¹«Ë¾ÒÑÔÚÆäRannohDecryptorÀûÓÃÖÐÔö³¤Á˶Ա»Yanluowang¼ÓÃܵÄÎļþµÄÖ§³Ö¡£ÓÉÓÚ¸ÃÀÕË÷Èí¼þ¶Ô´óÓÚ3GBºÍÓ×ÓÚ3GBµÄÎļþµÄ¼ÓÃÜ·½Ê½·ÖÆç£¬Òò¶øµ±Óû§ÌṩµÄÔʼÎļþ´óÓÚ3 GB£¬Äܹ»½âÃÜËùÓÐÎļþ£¬µ±ÔʼÎļþÓ×ÓÚ3 GB£¬Ö»ÄܽâÃÜÓ×Îļþ¡£
https://securelist.com/how-to-recover-files-encrypted-by-yanlouwang/106332/
6¡¢Cisco°ä²¼¹ØÓÚжñÒâÈí¼þZingoStealerµÄ·ÖÎö»ã±¨
4ÔÂ14ÈÕ£¬Cisco Talos°ä²¼Á˹ØÓÚжñÒâÈí¼þZingoStealerµÄ·ÖÎö»ã±¨¡£2022Äê3ÔÂÉÏÑ®£¬×êÑÐÈËÔ±ÔÚ¼à¿ØHaskers Gang³ÉÔ±Ö®¼äµÄͨѶʱ£¬·¢ÏÔìä°ä²¼ÁËÒ»¸öÃûΪZingoStealerµÄÐÂÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¿É¹©¸ÃÍÅ»ïTelegramÉçÇøµÄ³ÉÔ±Ãâ·ÑʹÓ᣸öñÒâÈí¼þĿǰÈÔÔÚ»ý¼«¿ª·¢ÖУ¬×î½üÒѼì²âµ½Æä¶à¸öа汾¡£Haskers GangʹÓÃTelegramºÍDiscordµÈºÏ×÷ƽ̨À´°ä²¼¸üС¢¹²Ïí¹¤¾ßºÍе÷»î¶¯¡£ÔںܶàÇé¿öÏ£¬ZingoStealer»¹»á·Ö·¢¶î±íµÄ¶ñÒâÈí¼þ£¬ÈçRedLine StealerºÍXMRigµÈ¡£Ö»¹ÜÄܹ»±»¶à¸ö¹¥»÷ÕßÀûÓ㬵«¸Ã¶ñÒâÈí¼þÖØÒªÒÔÓÎÏ·Îè±×Æ÷¡¢ÃÜÔ¿ÌìÉúÆ÷ºÍµÁ°æÈí¼þΪµö¶ü£¬Õë¶Ô½²¶íÓïµÄÖ¸±ê¡£
https://blog.talosintelligence.com/2022/04/haskers-gang-zingostealer.html


¾©¹«Íø°²±¸11010802024551ºÅ