¶íÂÞ˹ÂÉËùRKPLawÔ¼1TBµÄÊý¾Ý±»¹«¿ªÔÚDDoSecrets
°ä²¼¹¦·ò 2022-06-071¡¢¶íÂÞ˹ÂÉËùRKPLawÔ¼1TBµÄÊý¾Ý±»¹«¿ªÔÚDDoSecrets
¾Ý6ÔÂ4ÈÕ±¨Â·£¬¶íÂÞ˹ÂÉʦÊÂÎñËùRustam Kurmaev and Partners(RKP Law) Ô¼1TBµÄÊý¾ÝÒѾй¶¡£¾ÝϤ£¬RKP LawÔâµ½ÁËAnonymousµÄ´ÓÊô×éÖ¯B00daºÍPorteurÈëÇÖ¡£PorteurÔÚTwitterÉϰµÊ¾ÇÔÈ¡Á˵ç×ÓÓʼþ¡¢·¨Í¥Îļþ¡¢¿Í»§ÎļþºÍ±¸·ÝµÈÎļþ£¬ÒÔ¼°Ò»¸ö¼«¶È´óµÄ£¨220¸ö¿Í»§£©¿Í»§ÁÐ±í¡£´Ë±í£¬±»µÁÊý¾ÝÒ²±»·ÅÔÚÁËDDoSecretsÉÏ¡£¸Ã¹«Ë¾´ú±íÔ¼500¼Ò¿Í»§£¬Ô̺¬¶íÂÞ˹¹«¹²Æû³µ¼¯ÍÅ¡¢Ò˼ҡ¢·áÌïºÍÖÙÁ¿ÁªÐеȣ¬Õâ´Îй¶ÊÂÎñ¿ÉÄܶԸù«Ë¾Ôì³É¸²ÃðÐԵĽø¹¥¡£
https://www.hackread.com/anonymous-hacktivists-leak-1tb-russia-law-firm-data/
2¡¢ÐºڿÍÍÅ»ïCyber SpetsnazÖØÒªÕë¶Ô±±Ô¼µÄ»ù´¡ÉèÊ©
¾ÝýÌå6ÔÂ6ÈÕ±¨Â·£¬Resecurity·¢ÏÖ½üÆÚÓÉкڿÍÍÅ»ïCyber SpetsnazÌáÒéµÄ¹¥»÷»î¶¯ÓÐËùÔö³¤¡£¸ÃÍÅ»ïÖØÒªÕë¶Ô±±Ô¼»ù´¡ÉèÊ©½øÐмäµý»î¶¯£¬ÒÔÇÔÈ¡Ãô¸ÐÊý¾Ý¡£Ô¼ÄªÔÚ4Ô£¬¸ÃÍÅ»ï³ÉÁ¢Á˵ÚÒ»¸ö²¿ÃÅZarya£¬²¢¶Ô±±Ô¼µÄ×éÖ¯½øÐÐÁ˳õ´ÎÐͬ¹¥»÷¡£6ÔÂ2ÈÕ£¬Ð²¿ÃÅSparta³ÉÁ¢£¬ÖØÒªÕƹÜÖжÏÍøÂç×ÊÔ´ÖжϺÍÇÔÈ¡µý±¨µÈ£¬ÊÇKillnet CollectiveÍÅ»ïµÄÕýʽ×é³É²¿ÃÅ¡£´Ë±í£¬¸Ã×éÖ¯»¹¹¥»÷ÁËÒâ´óÀûµÄ5¸öÎïÁ÷ÖÕ¶Ë£¨Sech¡¢Trieste¡¢TDT¡¢Yilprort¡¢VTP£©ºÍ¼¸¼ÒÖØÒªµÄ½ðÈÚ»ú¹¹¡£
https://securityaffairs.co/wordpress/131967/hacking/exclusive-pro-russia-cyber-spetsnaz-is-attacking-government-agencies.html
3¡¢ÃÀ¹úFTC°µÊ¾È¥Äê¼ÓÃÜÇ®±Ò¹¥»÷Ôì³É³¬¹ý10ÒÚÃÀÔªËðʧ
ÃÀ¹úÁª¹úÒµÎñίԱ»á(FTC)ÔÚ6ÔÂ3ÈÕ°µÊ¾£¬2021Äê1ÔÂÖÁ2022Äê3Ô£¬Óг¬¹ý46000¸öÃÀ¹ú¹«Ãñ»ã±¨³ÆÔâµ½Á˼ÓÃÜÇ®±Òڿƹ¥»÷£¬×ܼÛÖµ³¬¹ý10ÒÚÃÀÔª¡£ÕâÓëFTCÈ¥ÄêµÄ»ã±¨Ïà±ÈÔö³¤ÏÔÖø£¬Æäʱ¸Ã»ú¹¹³ÆÔ¼7000ÈË³ÆÆäÔâµ½¹¥»÷£¬ËðʧԼΪ8000ÍòÃÀÔª¡£FBI°µÊ¾£¬2021ÄêIC3ÊÕµ½ÁË34202ÆðÉæ¼°Ê¹ÓüÓÃÜÇ®±ÒµÄͶËߣ¬±»¹¥»÷ÈËÊý±È2020Ä꣨35229ÈË£©ÓÐËùÏ÷¼õ£¬µ«Ëðʧ½ð¶îÔö³¤Á˽üÆß±¶£¬´ÓÔ¼2.4ÒÚÃÀÔªÔö³¤µ½16ÒÚÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/americans-report-losing-over-1-billion-to-cryptocurrency-scams/
4¡¢Cado LabsÅû¶ºÚ¿ÍÍÅ»ïWatchDog½üÆÚ¹¥»÷»î¶¯µÄϸ½Ú
6ÔÂ2ÈÕ£¬Cado LabsÅû¶ÁËÔÚ½üÆÚ·¢Õ¹µÄÐÂÒ»ÂÖ¼ÓÃܽٳֻµÄϸ½ÚÐÅÏ¢¡£Õâ´Î»î¶¯ÀûÓÃÁËÏȽøµÄ¼¼ÊõÀ´ÈëÇÖ¡¢worm-like´«²¼²¢Èƹý°²È«Èí¼þ£¬ÖØÒªÕë¶Ô¶³öµÄDocker Engine APIÖն˺ÍRedis·þÎñÆ÷£¬Äܹ»¼±¾çµØ´Óһ̨±»Ï°È¾µÄÉè±¸ÒÆ¶¯µ½Õû¸öÍøÂç¡£¹¥»÷ÕßµÄÖ¸±êÊÇͨ¹ýÀÄÓð²È«ÐԽϲîµÄ·þÎñÆ÷µÄ¿ÉÓÃÍÆËã×ÊÔ´ÍÚ¾ò¼ÓÃÜÇ®±ÒÀ´»ñÀû¡£Í¨¹ý¶Ô¹¥»÷»î¶¯µÄÕ½Êõ½øÐзÖÎö£¬×êÑÐÈËÔ±½«Õâ´Î»î¶¯¹éÒòÓÚWatchDog¡£
https://www.cadosecurity.com/tales-from-the-honeypot-watchdog-evolves-with-a-new-multi-stage-cryptojacking-attack/
5¡¢Mandiant³ÆÆä²¢Î´Ôâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷
¾Ý±¨Â·£¬6ÔÂ6ÈÕÀÕË÷ÍÅ»ïLockBitÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾Éϰ䲼ÁËÒ»¸öÐÂÒ³Ãæ£¬³Æ½«¹«¿ª´ÓMandiantÇÔÈ¡µÄ356841¸öÎļþ¡£Æäʱ£¬¸ÃÍÅ»ïµÄ¼ÆÊ±Æ÷ÏÔʾ¾àÀë¼ÆÊ±ÊµÏÖ½öÊ£²»µ½Èý¸öÓ×ʱµÄ¹¦·ò¡£ÓÉÓÚ¸ÃÐ¹Â¶Ò³ÃæÉϵÄÎļþÁбíΪ¿Õ£¬LockBitÒ²ÉÐδй©Ëü´ÓMandiantµÄϵͳÖÐÇÔÈ¡ÁËÄÄЩÎļþ¡£½öÓÐÒ»¸öÃûΪ¡°mandiantyellowpress.com.7z¡±µÄ0×Ö½ÚÎļþ£¬ËƺõÓëmandiantyellowpress[.]comÓò£¨¸Õ¸Õ×¢²á£©Óйء£MandiantÔò°µÊ¾ÆäÔÚµ÷²éÕâ´ÎÊÂÎñ£¬ÉÐδÕÒµ½Î¥¹æµÄÖ¤¾Ý¡£
https://www.bleepingcomputer.com/news/security/mandiant-no-evidence-we-were-hacked-by-lockbit-ransomware/
6¡¢Avast°ä²¼Android¶ñÒâÈí¼þSMSFactoryµÄ·ÖÎö»ã±¨
AvastÔÚ6ÔÂ1ÈÕ°ä²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þSMSFactoryµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬Ò»¿îÃûΪSMSFactoryµÄ¶ñÒâÈí¼þ»áͨ¹ýΪָ±ê¶©Ôĸ߼¶·þÎñÀ´Ôö³¤»°·Ñ³É±¾£¬ÆäÓµÓжàÖÖ·Ö·¢Çþ·£¬Ô̺¬¶ñÒâ¸æ°×¡¢ÍÆËÍ֪ͨ¡¢ÍøÕ¾ÉϵĴÙÏúµ¯´°ºÍÆÆ½âÓÎÏ·µÄÊÓÆµµÈ¡£¾ÝAvast³Æ£¬¸Ã¶ñÒâÈí¼þÔÚ2021Äê5ÔÂÖÁ2022Äê5ÔÂϰȾÁ˳¬¹ý165000¸öAndroidÉ豸£¬ÆäÖдó²¿ÃÅλÓÚ¶íÂÞ˹¡¢°ÍÎ÷¡¢°¢¸ùÍ¢¡¢ÍÁ¶úÆäºÍÎÚ¿ËÀ¼¡£
http://blog.avast.com/smsfactory-android-trojan


¾©¹«Íø°²±¸11010802024551ºÅ