°²È«¹«Ë¾LogicMonitorй©Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷
°ä²¼¹¦·ò 2023-09-051¡¢°²È«¹«Ë¾LogicMonitorй©Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷
¾ÝýÌå8ÔÂ31ÈÕ±¨Â·£¬ÍøÂ簲ȫ¹«Ë¾LogicMonitorй©£¬ÆäSaaSƽ̨µÄ²¿ÃÅÓû§Ôâµ½¹¥»÷¡£LogicMonitorÔÚ¸üÐÂÖÐ³ÆÆä·¢ÏÖus-west-2¡¢us-east-1ºÍeu-west-1µÄ²¿Ãſͻ§µÄÃÅ»§½Ó¼ûȨÏÞÃÔʧ£¬Ä¿Ç°¸ÃÎÊÌâÒѵõ½½â¾ö¡£¹«Ë¾Ã»ÓÐ×¢Ã÷ÊÇÀÕË÷¹¥»÷£¬µ«¾ÝÐÂÎÅÈËÊ¿³Æ£¬¹¥»÷ÕßÈëÇÖÁ˿ͻ§ÕÊ»§£¬¿ÉÄÜ´´½¨±¾µØÕÊ»§²¢×°ÖÃÀÕË÷Èí¼þ¡£ÀÕË÷Èí¼þÊÇʹÓÃ¸ÃÆ½Ì¨µÄ±¾µØLogicMonitor Collector´«¸ÐÆ÷²¿ÊðµÄ£¬´Ë´«¸ÐÆ÷¼à¿ØÓû§»ù´¡ÉèÊ©£¬µ«Ò²ÓµÓоçÐÔ×ÓÄÜ¡£¾ÝϤ£¬ÊÜÓ°Ïì¿Í»§Ê¹ÓÃÁËLogicMonitor·ÖÅ䏸ÐÂÓû§µÄĬÈÏÈõÃÜÂ룬Òò¶øÔâµ½Á˹¥»÷¡£
https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/
2¡¢±£ÏÕ¹«Ë¾Trygg-Hansaй¶65Íò¿Í»§Êý¾Ý±»·£¿î300ÍòÃÀÔª
9ÔÂ4ÈÕýÌ峯£¬±£ÏÕ¹«Ë¾Trygg-HansaÒòй¶65Íò¿Í»§µÄÊý¾Ý£¬±»ÈðµäÒþÖÔ±£»¤¾Ö(IMY)·£¿î300ÍòÃÀÔª¡£Moderna F?rs?kringar£¨ÏÖΪTrygg-HansaµÄÒ»²¿ÃÅ£©µÄ¿Í»§·¢ÏÖ¿Éͨ¹ý·¢Ë͸ø¿Í»§µÄ±¨¼ÛÒ³ÃæÉϵÄÁ´½Ó½øÈë±£ÏÕ¹«Ë¾µÄºó¶Ü£¬²¢ÏòIMY¾Ù±¨ÁË´ËÊ¡£IMYµ÷²éÈ·ÈÏ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿É½Ó¼ûºó¶ËÊý¾Ý¿â£¬²¢ÇÒÄܹ»Í¨¹ýÅú¸ÄURLÖеÄÂ½Ðø¿Í»§¶ËIDÀ´ä¯ÀÀÆäËûÓ×ÎÒµÄÎĵµ¡£¸ÃÊÂÎñÓ°ÏìÔ¼ÁË650000Ãû¿Í»§£¬Ð¹Â¶¹¦·ò³¤´ïÁ½Äê¶à£¬´Ó2018Äê10ÔÂÖÁ2021Äê2Ô¡£IMY°µÊ¾£¬ÔÚÊÕµ½Óйطì϶µÄ»ã±¨ºó¸Ã¹«Ë¾Ê¼ÖÕδÄܽâ¾öÎÊÌ⣬¾ö¶¨¶Ô´Ë´¦ÒÔ300ÍòÃÀÔªÐÐÕþ´¦·£¡£
https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/
3¡¢Interlab·¢ÏÖÀûÓÃľÂíSuperBearÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯
InterlabÔÚ9ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËÕë¶Ôº«¹úÃñ¼ä¼¯ÌåµÄ´¹µö¹¥»÷£¬ÀûÓÃÁËÐÂÐÍRAT SuperBear¡£¾ÝϤ£¬Ò»ÃûÐÂÎŹ¤×÷ÕßÊÕµ½ÓÐÕë¶ÔÐԵĴ¹µöÓʼþ£¬ÆäÖÐÔ̺¬¶ñÒâLNKÎļþ¡£LNKÎļþ»áÆô¶¯PowerShellºÅÁîÀ´Ö´ÐÐVB¾ç±¾£¬¸Ã¾ç±¾ÓÖ»á´ÓWordPressÍøÕ¾»ñÈ¡ÏÂÒ»½×¶Îpayload£¬Ô̺¬Ò»¸öAutoit3.exe¶þ½øÔìÎļþºÍÒ»¸öAutoIt¾ç±¾¡£AutoIt¾ç±¾Ê¹Óùý³Ì¸¡·º¼¼Êõִǰ¹ý³Ì×¢È룬ÔÚÕâÖÖÇé¿öÏ£¬»áÌìÉúÒ»¸öExplorer.exeÊ·ýÀ´×¢ÈëSuperBear¡£¸ÃRAT¿ÉÇÔÈ¡Êý¾Ý£¬ÏÂÔØ²¢ÔËÐÐÆäËüshellºÅÁîºÍ¶¯Ì¬Á´½Ó¿â(DDL)¡£
https://interlab.or.kr/archives/19416
4¡¢Labyrinth ChollimaÊǽüÆÚVMConnect¹¥»÷µÄÄ»ºóºÚÊÖ
¾Ý8ÔÂ31ÈÕ±¨Â·£¬ReversingLabs½«VMConnect»î¶¯ÓëLazarusµÄ×ÓÍÅ»ïLabyrinth ChollimaÁªÏµÆðÀ´¡£8Ô³õ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸ö¶ñÒ⹩¸øÁ´»î¶¯¡°VMConnect¡±£¬ÏòPyPI´æ´¢¿âÉÏ´«ÁËÁ½´ò¶ñÒâPython°ü¡£´Ë¿ÌÓÖ·¢ÏÖÁËÁí±íÈý¸ö¶ñÒâ°ü£¬tablediter¡¢request-plusºÍrequestspro£¬ËüÃDZ»ÒÔΪÊÇVMConnect»î¶¯µÄ³ÖÐø¡£×êÑÐÈËÔ±½«Æä¹éÒòÓÚLabyrinth ChollimaÊÇ»ùÓÚÕâЩ»î¶¯ÖÐʹÓõĶñÒâ´úÂëµÄÀàËÆÐÔ¡£
https://securityaffairs.com/150197/apt/labyrinth-chollima-pypi-supply-chain-attacks.html
5¡¢Group-IB°ä²¼¹ØÓÚClassiscam¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
8ÔÂ31ÈÕ£¬Group-IB°ä²¼Á˹ØÓÚClassiscamÔÚÈ«ÇòÁìÓòÄÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨³Æ£¬Classiscamͨ¹ýºýŪ·ÖÀà¸æ°×ÍøÕ¾Óû§²¢ÇÔÈ¡ËûÃǵÄ×ʽðºÍÖ§¸¶¿¨¾ßÌåÐÅÏ¢£¬ÒÑ׬ȡÁË6450ÍòÃÀÔª¡£Ö¸±êÆ·ÅÆµÄÊýÁ¿Ò²´ÓÈ¥ÄêµÄ169¸öÔö³¤µ½251¸ö£¬Ä¿Ç°ÓÐ393¸ö¹¥»÷ÍÅ»ïÕë¶Ô79¸ö¹ú¶ÈµÄÓû§£¬ÓÐ1366¸öTelegramƵ·½øÐÐе÷¡£Å·ÖÞÔâµ½µÄ¹¥»÷×î¶à£¬ÆäÖе¹ú±»¹¥»÷Óû§×î¶à£¬Æä´ÎÊDz¨À¼¡¢Î÷°àÑÀ¡¢Òâ´óÀûºÍÂÞÂíÄáÑÇ¡£Ó¢¹úÓû§µÄ¾ùÔÈËðʧ½ð¶î×î¸ß£¬Îª865ÃÀÔª£¬¶øÈ«Çò¾ùÔÈˮƽΪ353ÃÀÔª¡£
https://www.group-ib.com/blog/classiscam-2023/
6¡¢FortiGuard°ä²¼¹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö»ã±¨
8ÔÂ31ÈÕ£¬FortiGuard°ä²¼Á˹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö»ã±¨¡£RhysidaÊÇÒ»¸öеÄÀÕË÷ÍŻËüʹÓÃRaaSÄ£ÐÍ£¬µÚÒ»¸öÑù±¾ÓÚ5ÔÂÌá½»µ½¹«¹²ÎļþɨÃè·þÎñ¡£RhysidaÒÀÀµ´¹µö¹¥»÷×÷ÎªÏ°È¾ÔØÌ壬¹¥»÷Õß»¹Ê¹ÓÃCobalt StrikeÔÚÖ¸±êÍøÂçÄÚºáÏòÒÆ¶¯²¢´«µÝpayload¡£¸ÃÍÅ»ïÒÑÁгö41¸ö±»¹¥»÷Ö¸±ê£¬ÆäÖг¬¹ýÒ»°ëλÓÚÅ·ÖÞ£¬Æä´ÎÊDZ±ÃÀ¡£¹¥»÷ÖØÒªÕë¶Ô½ÌÓýÐÐÒµ£¨Õ¼±È30%ÒÔÉÏ£©£¬Æä´ÎÊÇÔì×÷Òµ¡¢µ±¾Ö»ú¹¹ºÍITÐÐÒµ¡£
https://www.fortinet.com/blog/threat-research/ransomware-roundup-rhysida


¾©¹«Íø°²±¸11010802024551ºÅ