¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý

°ä²¼¹¦·ò 2023-02-09
1¡¢¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý

      

¾ÝýÌå2ÔÂ7ÈÕ±¨Â·£¬Cybernews·¢ÏÖÁËÒ»¸ö¶³öµÄÊý¾Ý¿â£¬Ô̺¬1.1TBÊý¾Ý¡£×êÑÐÈËÔ±ÔÚ1ÔÂ24ÈÕ·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬²¢½«Æä¹éÒòÓÚ¶íÂÞ˹µçÆø¹¤³Ì¹«Ë¾ElevelÆìϵÄÔÚÏßÉ̵êe.way¡£Õâ¸öÊý¾Ý¿âÔ̺¬700ÍòÌõÊý¾Ý£¬Ð¹Â¶ÁËÁ½ÄêµÄ¿Í»§ÐÅÏ¢£¬ÈçÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ºÍËÍ»õµØÖ·µÈ¡£´Ë±í£¬ËüÔ̺¬ÒÔURL±àÂëµÄµÇ¼Êý¾ÝºÍÃÜÂ룬ÕâÊÇÒ»ÖÖ½ÏÈõµÄ± £»¤»úÔ죬ºÜÈÝÒ×±»½âÂ롣Ŀǰ£¬Êý¾Ý¿âÒѾ­ÎÞ·¨½Ó¼û£¬µ«¸Ã¹«Ë¾ÉÐδ×ö³ö»ØÓ¦¡£


https://cybernews.com/privacy/russian-e-commerce-giant-data-leak/


2¡¢NodariaÀûÓöñÒâÐÅÏ¢ÇÔÈ¡·¨Ê½Graphiron¹¥»÷ÎÚ¿ËÀ¼

      

SymantecÔÚ2ÔÂ8ÈÕ³ÆÆä·¢ÏÖ¶íÂÞ˹NodariaÀûÓÃÐÂÐͶñÒâÈí¼þGraphiron¹¥»÷ÎÚ¿ËÀ¼µÄ»î¶¯¡£×îÔçµÄ¹¥»÷¿É×·Òäµ½2022Äê10Ô£¬²¢ÖÁÉÙ³ÖÐøµ½2023Äê1ÔÂÖÐÑ®¡£GraphironÊÇÓÃGo¿ª·¢µÄ£¬ÓÉdownloaderºÍpayload×é³É£¬Ö¼ÔÚ´ÓÇÔȡϵͳÐÅÏ¢¡¢Í´´¦¡¢ÆÁÄ»½ØÍ¼ºÍÎļþµÈ¶àÖÖÐÅÏ¢¡£GraphironÓë¾ÉµÄNodaria¹¤¾ß£¨ÀýÈçGraphSteelºÍGrimPlant£©ÓÐһЩÀàËÆÖ®´¦¡£³ý´ËÖ®±í£¬ÓëÔçÆÚµÄ¶ñÒâÈí¼þÒ»Ñù£¬GraphironʹÓö˿Ú443ÓëC&C·þÎñÆ÷ͨѶ£¬²¢Ê¹ÓÃAESÃÜÂë¶ÔͨѶ½øÐмÓÃÜ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer


3¡¢Sophos½üÆÚ·¢ÏÖͨ¹ý¶ñÒâOneNotÎļþ·Ö·¢QBotµÄ»î¶¯

      

¾Ý2ÔÂ6ÈÕ±¨Â·£¬ÐÂÒ»ÂÖQakNote¹¥»÷»î¶¯ÀûÓÃMicrosoft OneNoteÎļþ·Ö·¢¶ñÒâÈí¼þQBot¡£1ÔÂ31ÈÕÆðÍ·£¬QBotµÄÔËÓªÈËÔ±ÆðÍ·ÊÔÑéÕâÖÖеķַ¢²½Ö裬ʹÓÃOneNoteÎļþ£¬ÆäÖÐÔ̺¬Ò»¸öǶÈëµÄHTMLÀûÓ÷¨Ê½£¨HTAÎļþ£©£¬Äܹ»¼ìË÷µ½QBot¶ñÒâÈí¼þµÄpayload¡£´Ë±í£¬QBot payload½«×ÔÉí×¢ÈëWindows¸¨Öú¼¼ÊõÖÎÀí·¨Ê½£¨¡°AtBroker.exe¡±£©ÒÔÈÆ¹ýAV¹¤¾ßµÄ¼ì²â¡£×÷ΪӦ¶Ô´ëÊ©£¬Sophos½¨ÒéÖÎÀíÔ±×èÖ¹ËùÓÐ.oneÎļþ£¬ÓÉÓÚËüÃÇͨ³£²»×÷Ϊ¸½¼þ·¢ËÍ¡£ 


https://news.sophos.com/en-us/2023/02/06/qakbot-onenote-attacks/


4¡¢Medusa½©Ê¬ÍøÂç»Ø¹éÐÂÔöÀÕË÷Èí¼þºÍ±©Á¦ÆÆ½âÄ£¿é

      

ýÌå2ÔÂ7Èճƣ¬»ùÓÚMirai´úÂëµÄаæDDoS½©Ê¬ÍøÂçMedusa³öÏÖ£¬ÓµÓÐÀÕË÷Èí¼þÄ£¿éºÍTelnet±©Á¦ÆÆ½â·¨Ê½¡£MedusaµÄÀÕË÷Èí¼þÄ£¿éʹÓÃ256λAES¼ÓÃÜÎļþ£¬µ«¼ÓÃܲ½ÖèËÆºõÒѰܻµ£¬½«ÀÕË÷Èí¼þÔì³ÉÁËÊý¾Ý²Á³ý·¨Ê½¡£´Ë±í£¬Ö»ÓÐÔÚɾ³ýÎļþºó£¬Ëü²Å»áÏÔʾһ¸öÒªÇó0.5 BTCµÄÊê½ð¼Í¼¡£ÕâËÆºõÊÇÓÐÎÊÌâµÄ£¬Òò¶ø×êÑÐÈËÔ±´§Ä¦Ð±äÌå»ò´ËÖ°ÄÜÈÔÔÚ¿ª·¢ÖС£±©Á¦ÆÆ½âÖ°ÄÜ¿ÉÕë´ºÁªÍøÉ豸³¢ÊÔ³£ÓõÄÓû§ÃûºÍÃÜÂ룬ÔÚ³ÉÁ¢TelnetÏνӺ󣬶ñÒâÈí¼þ»áʹÓÃÖØÒªµÄMedusa payloadϰȾϵͳ¡£


https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/


5¡¢AhnlabÅû¶ÀûÓøöÈËHTS·Ö·¢Quasar RATµÄ»î¶¯

      

AhnlabÓÚ2ÔÂ8ÈÕÅû¶Á˽üÆÚͨ¹ý¸öÈ˼ÒÍ¥ÂòÂôϵͳ£¨HTS£©·¢ÏÖQuasar RATµÄ·Ö·¢»î¶¯¡£HTSÒ»ÖÖʹͶ×ÊÕßʹÓüÒÍ¥»ò°ì¹«ÊÒPC½øÐÐ¹ÉÆ±ÂòÂôµÄϵͳ£¬¶øÎÞÐè½Ó¼û¹ÉƱÂòÂô¹«Ë¾»ò´òµç»°¡£µÚÒ»¸ö×°Öõķ¨Ê½ÊÇNSIS×°Ö÷¨Ê½HPlusSetup.exe£¬Asset.exeÊÇ×°ÖúóÖ´ÐеĵÚÒ»¸ö·¨Ê½£¬ºóÕß¼ÈÊÇÆô¶¯·¨Ê½ÓÖÊǸüз¨Ê½¡£HPlusSocketManager20221208.exe»áÆô¶¯vbc.exe²¢×¢ÈëQuasar RAT¡£


https://asec.ahnlab.com/en/47283/


6¡¢Outpost24°ä²¼2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨

      

2ÔÂ7ÈÕ£¬Outpost24°ä²¼ÁË2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±ÔÚ2022Äê×ܹ²¼ì²âµ½¸÷ÀàÀÕË÷ÍÅ»ïÔÚDLSÉÏ×ܹ²Åû¶ÁË2363¸ö×éÖ¯¡£×î»îÔ¾µÄÀÕË÷ÍÅ»ïΪLockBit¡¢BlackCat¡¢ContiºÍHiveµÈ£¬ÆäÖÐLockBit¶ÔÎôʱ34%µÄ¹¥»÷ÕÆ¹Ü£¬¾ùÔÈÿÔÂÔ¼67´Î¡£Ã³Ò׺ÍóÒ×Óйع«Ë¾ÊÜÀÕË÷¹¥»÷µÄÓ°Ïì×î´ó£¬ÈçóÒ×ÉèÊ©¡¢½ðÈÚ¡¢¹¹Öþ¡¢Ë¾·¨ÒÔ¼°Åú·¢ÁãÊÛÐÐÒµ£¬ÕâÅú×¢¹¥»÷ÕßÖØÒªÕë¶ÔÓµÓиü¸ßÖ§¸¶ÄÜÁ¦µÄ×éÖ¯¡£ÔÚµØÀíÉ¢²¼·½Ã棬½öÃÀ¹ú¾ÍÕ¼42%£¬¶øÅ·ÖÞ¹ú¶ÈÔ¼Õ¼28%¡£


https://outpost24.com/blog/ransomware-report-2023