°²È«¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄ¾ßÌåÐÅÏ¢
°ä²¼¹¦·ò 2023-05-121¡¢°²È«¹«Ë¾DragosÅû¶Æä½üÆÚÔâµ½µÄÀÕË÷¹¥»÷µÄ¾ßÌåÐÅÏ¢
¾ÝýÌå5ÔÂ10ÈÕ±¨Â·£¬¹¤ÒµÍøÂ簲ȫ¹«Ë¾DragosÅû¶ÁËÆä½üÆÚÔâµ½µÄ°²È«ÊÂÎñµÄ¾ßÌåÐÅÏ¢¡£¸Ã¹«Ë¾°µÊ¾£¬Ä³ÀÕË÷ÍÅ»ïÓÚ5ÔÂ8ÈÕÊÔͼÈëÇÖ¹«Ë¾ÏµÍ³£¬µ«Î´Äܳɹ¦¡£¹¥»÷ÕßÔÚÐÂÏúÊÛÈËÔ±Èëְ֮ǰй¶ÁËÆäÓʼþµØÖ·£¬ËæºóʹÓÃÕâЩÓ×ÎÒÐÅÏ¢¼ÙÒâDragosÔ±¹¤²¢ÊµÏÖÔ±¹¤ÈëÖ°Á÷³ÌµÄ³õʼ²½Öè¡£¹¥»÷ÕßÄܹ»½Ó¼ûSharePointºÍDragosºÏͬÖÎÀíϵͳ¡£Dragos³Æ£¬¸ÃÊÂÎñÊÂÎñÒѵõ½½ÚÔ죬¹¥»÷ÕßÎÞ·¨ºáÏòÒÆ¶¯¡¢È¨ÏÞÌáÉý¡¢³ÉÁ¢ÓƾýӼû»ò¶Ô»ù´¡¼Ü¹¹½øÐиü¸Ä¡£
https://securityaffairs.com/146053/cyber-crime/dragos-failed-extortion-attempt.html
2¡¢Òò¾Ü¸¶Êê½ðÓ¡¶ÈÄ³ÒøÐÐÔ¼600 GBµÄÊý¾Ý±»LockBit¹«¿ª
¾Ý5ÔÂ8ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïLockBit 3.0¹«¿ªÁË´ÓÓ¡¶ÈÒøÐÐFullerton IndiaÇÔÈ¡µÄ600 GBÊý¾Ý¡£Fullerton IndiaÓÚ4ÔÂ24ÈÕ³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬LockBit 3.0Ðû³Æ»ñµÃÁ˳¬¹ý600 GBÓëÓ×ÎҺͺϷ¨¹«Ë¾Ç©¶¨µÄ´û¿îºÍ̸¡£¸ÃÍŻォÊê½ðÖ§¸¶µÄ×îºóÆÚÏÞÔìΪ4ÔÂ29ÈÕ£¬²¢ÔÊÐíÖ§¸¶1000ÃÀÔª½«½ØÖ¹ÈÕÆÚµ¢¸é24Ó×ʱ¡£ÓÉÓÚFullerton India»Ø¾øÓëÀÕË÷ÍÅ»ï½Ó´¥£¬¸ÃÍÅ»ïÔÚ±¾ÖÜÒ»¹«¿ªÁËÇÔÈ¡µÄÐÅÏ¢¡£
https://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010
3¡¢º«¹ú¾¯·½¹«¿ªÊ×¶û¹úÁ¢´óѧҽԺ±»Kimsuky¹¥»÷µÄϸ½Ú
ýÌå5ÔÂ10ÈÕ±¨Â·£¬º«¹ú¹ú¶È¾¯Ô±Ìü(KNPA)й©£¬Ó볯ÏÊÓйصĺڿÍÍÅ»ïÈëÇÖÁ˸ùú×î´óµÄÒ½ÔºÖ®Ò»£¬Ê×¶û¹úÁ¢´óѧҽԺ(SNUH)¡£¸ÃÊÂÎñ²úÉúÔÚ2021Äê5ÔÂÖÁ6Ô£¬¾¯·½ÔÚ´ÓǰÁ½ÄêÖнøÐÐÁË·ÖÎöµ÷²é£¬ÒÔÈ·¶¨¹¥»÷ÕßÉí·Ý¡£¾¯·½²¢Î´½«Õâ´Î¹¥»÷¹éÒòÓÚÌØ¶¨µÄ×éÖ¯£¬µ«±¾µØÃ½Ìå´§¶ÈÕâÊÇÓÉKimsukyе÷µÄ¡£¾Ý»ã±¨£¬ºÚ¿ÍʹÓÃÁËÖÁÉÙÆß̨λÓÚº«¹úµÈ¹ú¶ÈµÄ·þÎñÆ÷À´ÌáÒé¹¥»÷¡£Õâ´Î¹¥»÷µ¼ÖÂÔ¼830000Ãû»¼Õߺ͹¤×÷ÈËÔ±µÄÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-breached-major-hospital-in-seoul-to-steal-data/
4¡¢ÈðÊ¿¿Æ¼¼¹«Ë¾ABBÔâµ½ÀÕË÷ÍÅ»ïBlack BastaµÄ¹¥»÷
5ÔÂ11ÈÕ±¨Â·³Æ£¬ÈðÊ¿µçÆø»¯ºÍ×Ô¶¯»¯¼¼ÊõÌṩÉÌABBÔâµ½ÁËBlack BastaµÄÀÕË÷¹¥»÷¡£ABB¹«Ë¾ÎªÔì×÷ºÍÄÜÔ´¹©¸øÉÌ¿ª·¢¹¤Òµ½ÚÔìϵͳ(ICS)ºÍSCADAϵͳ£¬2022ÄêµÄÊÕÈëΪ294ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÔÚ5ÔÂ7ÈÕÔâµ½¹¥»÷£¬ÆäÔ±¹¤Ð¹Â©£¬¹¥»÷Ó°ÏìÁ˹«Ë¾µÄWindows Active Directory£¬Éæ¼°Êý°Ų̀É豸¡£ÎªÁËÓ¦¶ÔÕâ´Î¹¥»÷£¬ABBÖÕÖ¹ÁËÓëÆä¿Í»§µÄVPNÏνӣ¬ÒÔÔ¤·ÀÀÕË÷Èí¼þ´«²¼µ½ÆäËüÍøÂç¡£Õâ´Î¹¥»÷ÇÖÈÅÁ˸ù«Ë¾µÄÔËÓª£¬ÑÓÎóÁËÏîÄ¿£¬Ó°ÏìÁ˹¤³§¡£Ä¿Ç°£¬ABB»Ø¾ø¶Ô´ËÊÂÖÃÆÀ¡£
https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/
5¡¢FortiGuard°ä²¼¹ØÓÚRapperBot¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
5ÔÂ9ÈÕ£¬FortiGuard³ÆÆä·¢ÏÖÁË×Ô1ÔÂÒÔÀ´»îÔ¾µÄRapperBot»î¶¯µÄÐÂÑù±¾¡£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷ÕßÒÑÆðÍ·Éæ×ã¼ÓÃܽٳ֣¬³ö¸ñÊÇÕë¶ÔIntel x64É豸¡£¿ó¹¤´úÂëÏÖÒѼ¯³Éµ½RapperBotÖУ¬²¢Ê¹ÓÃË«²ãXOR±àÂë½øÐлìºÏ£¬´Ó¶øÓÐЧµØ°µ²Ø¿ó³ØºÍMoneroÍÚ¿óµØÖ·¡£¹ÌÈ»×êÑÐÈËԱûÓй۲쵽ÈκδÓC2·þÎñÆ÷·¢Ë͵½Ñù±¾µÄDDoSºÅÁµ«·¢ÏÖ×îеÄbot°æ±¾Ö§³ÖºÅÁִÐÐDDoS¹¥»÷¡¢×èÖ¹DDoS¹¥»÷ºÍÖÕÖ¹×ÔÉí¡£RapperBotËÆºõÔÚ¼±¾ç·¢Õ¹²¢À©´óÖ°ÄÜÒÔ×î´ó»¯ÆäÀûÈó¡£
https://www.fortinet.com/blog/threat-research/rapperbot-ddos-botnet-expands-into-cryptojacking
6¡¢McAfee°ä²¼¹ØÓÚGULoader¹¥»÷»î¶¯µÄÉî¿Ì·ÖÎö»ã±¨
5ÔÂ9ÈÕ£¬McAfee°ä²¼¹ØÓÚ½üÆÚGULoader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£ÔÚÕâЩ»î¶¯ÖУ¬¹¥»÷Õßͨ¹ýÀ¬»øÓʼþ·¢ËÍ»ùÓÚNSISµÄ×°Ö÷¨Ê½£¬ÕâЩװÖ÷¨Ê½Ê¹Óòå¼þ¿âÔÚÖ¸±êϵͳÉÏÖ´ÐÐGU shellcode¡£»ã±¨»¹ÃèÊöÁËGUloaderÈôºÎÀûÓÃʸÁ¿Òì³£´¦ÖÃ(VEH)À´»ìºÏÖ´ÐÐÁ÷³Ì²¢¼õÂý·ÖÎö¿ìÂÊ¡£GuLoaderÔÚ´ó¹æÄ£¶ñÒâÈí¼þ»î¶¯Öб»ÀûÓã¬À´·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÈçRaccoon¡¢ VidarºÍRedlineµÈ¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-campaigns-a-deep-dive-analysis-of-a-highly-evasive-shellcode-based-loader/


¾©¹«Íø°²±¸11010802024551ºÅ