LockBit³ÆÒÑÇÔÈ¡Õ÷ѯ¹«Ë¾Kearney & CompanyÊý¾Ý

°ä²¼¹¦·ò 2022-11-08
1¡¢LockBit³ÆÒÑÇÔÈ¡Õ÷ѯ¹«Ë¾Kearney & CompanyµÄÊý¾Ý

¾Ý11ÔÂ6ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïLockBitÐû³ÆÒÑÇÔÈ¡Õ÷ѯºÍIT·þÎñÌṩÉÌKearney & CompanyµÄÊý¾Ý¡£LockBitÓÚ11ÔÂ5ÈÕ½«¸Ã¹«Ë¾Ôö³¤µ½±»¹¥»÷Ãûµ¥ÖУ¬²¢ÍþвÈôÊDz»¸¶Êê½ð£¬ËûÃǽ«ÔÚ2022Äê11ÔÂ26ÈÕ֮ǰ°ä²¼ÇÔÈ¡µÄÊý¾Ý¡£Ä¿Ç°£¬ÀÕË÷ÍÅ»ïÒѾ­¹«¿ªÁËÒ»·Ý±»µÁÊý¾ÝµÄÑù±¾£¬ÆäÖÐÔ̺¬²ÆÕþÎļþ¡¢ºÏͬ¡¢Éó¼Æ»ã±¨ºÍÕ˵¥ÎļþµÈ¡£ÀÕË÷ÍÅ»ïÒªÇóÖ§¸¶200ÍòÃÀÔªÒÔÏú»ÙÊý¾Ý£¬²¢ÒªÇó1ÍòÃÀÔª½«¼ÆÊ±µ¢¸é24Ó×ʱ¡£

https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html

2¡¢°²È«¹¤¾ßurlscan.io»áÎÞÒâÖÐй¼ûô¸ÐµÄURLºÍÊý¾Ý

¾ÝýÌå11ÔÂ7ÈÕ±¨Â·£¬Positive Security·¢ÏÖÍøÕ¾É¨ÃèºÍ·ÖÎöÒýÇæurlscan.io¿Éй¼ûô¸ÐµÄURLºÍÊý¾Ý¡£Urlscan.io±»ÃèÊöΪWebɳÏ䣬ͨ¹ýÆäAPI¼¯³Éµ½¶à¸ö°²È«½â¾ö¹æ»®ÖС£¼øÓÚ´ËAPIµÄ¼¯³ÉÀàÐÍÒÔ¼°Êý¾Ý¿âÖеÄÊý¾ÝÁ¿£¬ÓдóÁ¿µÄÊý¾Ý¿É±»ÄäÃûÓû§ËÑË÷ºÍ¼ìË÷¡£2Ô·ݵijõ´ëÊ©²é·¢ÏÖÁËÊôÓÚÆ»¹ûÓòÃûµÄurl£¬ÆäÖÐһЩ»¹Ô̺¬¹²ÏíµÄiCloudÎļþºÍÈÕÀúÔ¼Çë»Ø¸´Á´½Ó¡£×î³ÁÒªµÄÊÇ£¬·ÖÎö»¹·¢ÏÖÅäÖÃÃýÎóµÄ°²È«¹¤¾ß»á½«Í¨¹ýÓʼþÊÕµ½µÄËùÓÐÁ´½Ó×÷Ϊ¹«¹²É¨ÃèÌá½»¸øurlscan.io¡£

https://thehackernews.com/2022/11/experts-find-urlscan-security-scanner.html

3¡¢Avanan·¢ÏÖÀûÓÃMicrosoft Dynamics 365µÄ´¹µö»î¶¯

AvananÔÚ11ÔÂ3ÈÕÅû¶ÁËÀÄÓÃMicrosoft Dynamics 365 Customer VoiceµÄ´¹µö»î¶¯¡£¸Ã²úÆ·ÔÊÐí×éÖ¯»ñµÃ¿Í»§µÄ·´À¡£¬ËüÖØÒªÓÃÓÚ½øÐпͻ§ÖÐÒâ¶Èµ÷²é¡£´¹µöÓʼþÀ´×ÔDynamics 365Öеĵ÷²éÖ°ÄÜ£¬·¢¼þÈ˵ĵØÖ·Ô̺¬¡°Forms Pro¡±£¬ÕâÊǵ÷²éÖ°ÄܵľɳÆ¡£¸ÃÐÂÎÅ֪ͨÊÕ¼þÈËÊÕµ½ÁËеÄÓïÒôÓʼþ£¬µã»÷²¥·ÅÓïÒôÓʼþºó£¬»á±»³Á¶¨Ïòµ½¿Ë¡MicrosoftµÇÂ¼Ò³ÃæµÄ´¹µöÍøÕ¾¡£Í¨¹ýʹÓÃCustomer VoiceÁ´½Ó£¬¹¥»÷ÕßÄܹ»Èƹý°²È«´ëÊ©¡£

https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links 

4¡¢×êÑÐÍŶÓÅû¶Crimson KingsnakeÍÅ»ïµÄBEC¹¥»÷»î¶¯

¾ÝAbnormal Security 11ÔÂ3ÈÕ±¨Â·£¬ÐµÄCrimson KingsnakeÍÅ»ïÔÚBEC¹¥»÷ÖмÙÒâÂÉʦÊÂÎñËù¡£×êÑÐÈËÔ±ÓÚ2022Äê3Ô³õ´Î·¢ÏÖÁËCrimson KingsnakeµÄ»î¶¯£¬²¢°µÊ¾ÒÑÈ·¶¨ÁË92¸öÓйØÓò£¬ÕâЩÓò¶¼·ÂÕÕÁËÕæÕýµÄÂÉʦÊÂÎñËùÍøÕ¾¡£¹¥»÷Õß¼ÙÒâÂÉʦ·¢ËÍÓâÆÚ¸¶¿îµÄ·¢Æ±£¬ºýŪָ±êÔ±¹¤¼±¾çÖ§¸¶ÐéαµÄ·¢Æ±¡£µ±¹¥»÷ÕߵĻÓöµ½×èÁ¦Ê±£¬ËûÃÇ»¹»áµ÷ÕûÕ½ÊõÀ´¼ÙÒâµÚ¶þ¸ö½ÇÉ«£ºÖ¸±ê¹«Ë¾µÄ¸ß¹Ü£¬À´ÓÕʹԱ¹¤³ÖÐø¸¶¿î¡£

https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks

5¡¢Å·ÖÞÍøÂ簲ȫ»ú¹¹ENISA°ä²¼2022ÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨

Å·ÖÞÍøÂ簲ȫ»ú¹¹ENISAÔÚ11ÔÂ3ÈÕ°ä²¼ÁËÆä2022ÄêENISAÍþÐ²Ì¬ÊÆ(ETL)»ã±¨¡£ÕâÊÇÄê¶È»ã±¨µÄµÚ10°æ£¬·ÖÎöÁË2021Äê7ÔÂÖÁ2022Äê7ÔÂÆÚ¼ä²úÉúµÄÊÂÎñ¡£ÀÕË÷Èí¼þÒÀÈ»ÊÇÈ«Çò×éÖ¯Ãæ¶ÔµÄ×îΣÏÕµÄÍþв֮һ£¬Ã¿ÔÂÓг¬¹ý10 TBµÄÊý¾Ý±»µÁ£¬60%µÄÊÜÓ°Ïì×éÖ¯¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£2021Äê¹Û²ìµ½66¸öÁãÈÕ·ì϶Åû¶¡£ÍøÂç´¹µöÒÀÈ»ÊÇÒ»ÖÖÊ¢Ðеļ¼Êõ£¬Ä¿Ç°³öÏÖÁËеĴ¹µö¹¥»÷´ó¾Ö£¬Èçspear-phishing¡¢whaling¡¢smishingºÍvishing¡£µÚÈý·½°²È«ÊÂÎñÕ¼2021ÄêÈëÇÖÊÂÎñµÄ17%£¬¶ø2020ÄêÊDz»µ½1%¡£

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022

6¡¢BlackBerry°ä²¼¹ØÓÚRomCom RAT·Ö·¢»î¶¯µÄ·ÖÎö»ã±¨

11ÔÂ2ÈÕ£¬BlackBerryÏêÊöÁËRomCom RATÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷Õ߿ˡÁËSolarWinds Network Performance Monitor (NPM)¡¢KeePassÃÜÂëÖÎÀíÆ÷ºÍPDF Reader ProµÄ¹Ù·½ÏÂÔØÃÅ»§ÍøÕ¾£¬½«¶ñÒâÈí¼þ¼Ù×°³ÉºÏ·¨·¨Ê½½øÐзַ¢¡£ÕâЩ¹¥»÷ÊÇÔÚ·ÖÎöÓëÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ¹¥»÷µ¼ÖµÄRomComRATϰȾÓйصŤ¼þʱ·¢Ïֵġ£´Ë±í£¬Unit 42»¹·¢ÏÖÁËÒ»¸ö¼ÙÒâVeeam Backup and RecoveryÈí¼þµÄÍøÕ¾¡£

https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass