¼ÓÄôóBCÊ¡µÄ¶à¸öµ±¾ÖϵͳÔâµ½ºÚ¿Í¹¥»÷
°ä²¼¹¦·ò 2024-05-145ÔÂ12ÈÕ£¬²»Áе߸çÂ×±ÈÑÇÊ¡¹«¹²·þÎñÕÆ¹ÜÈ˰䷢£¬¸ß¶ÈÈ·ÐÅÓйú¶È»ò¹ú¶ÈÔÞÖúµÄ¹¥»÷ÕßÊÔͼÔÚÍøÂç¹¥»÷ÖзÛËéµ±¾Öϵͳ¡£Ã»ÓÐÖ¤¾ÝÅú×¢ÍøÂç¹¥»÷³É¹¦»ñÈ¡ÁËÃô¸ÐÐÅÏ¢£¬Ò²Ã»ÓÐÌá³öÊê½ðÒªÇó¡£Salter °µÊ¾£¬¶ÔÍøÂç¹¥»÷µÄµ÷²é½«³ÖÐø½øÐУ¬²¢Ç¿µ÷ÔÚ·ÖÎö³¬¹ý 40 TB µÄÊý¾Ý£¬±ÈÃÀ¹ú¹ú»áͼÊé¹Ý±£ÁôµÄÊý¾Ý»¹Òª¶à¡£Ä¿Ç°ÍøÂç¹¥»÷±³ºóµÄ¶¯»úÈÔ²»Ã÷ÏÔ¡£¸ÃÊ¡Ê×ϯÐÅÏ¢¹ÙÒÑÅúʾ¹«¹²·þÎñÔ±¹¤¸ü¸ÄÃÜÂ룬ÒÔ¡°È·±£µ±¾Öµç×ÓÓʼþϵͳµÄ°²È«¡±¡£BC ͼÊé¹Ý°µÊ¾£¬¸Ã»ú¹¹Ò²³ÉΪһÃûºÚ¿ÍµÄ¹¥»÷Ö¸±ê£¬¸ÃºÚ¿ÍÍþв³Æ£¬ÈôÊDz»Ö§¸¶Êê½ð£¬¾Í»áй¶Óû§Êý¾Ý¡£
https://www.cbc.ca/news/canada/british-columbia/bc-government-cyberattack-state-actor-1.7200735
2. ³¯ÏʺڿͲ¿Êð¶ñÒâÈí¼þDurian¶Ô×¼¼ÓÃÜÇ®±Ò¹«Ë¾
5ÔÂ13ÈÕ£¬¾Ý±¨Â·£¬³¯ÏʺڿÍÔÚÀûÓÃÒ»ÖÖÃûΪDurianµÄÒýÈËÖõÖ÷ÕÅжñÒâÈí¼þ±äÌå¶Ôº«¹ú¼ÓÃÜÇ®±Ò¹«Ë¾ÌáÒé¹¥»÷¡£Æ¾¾ÝÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù 5 Ô 9 ÈÕµÄÍþв»ã±¨£¬³¯ÏʺڿÍ×éÖ¯ Kimsuky ʹÓÃжñÒâÈí¼þ¶ÔÖÁÉÙÁ½¼Ò¼ÓÃÜÇ®±Ò¹«Ë¾½øÐÐÁËһϵÁÐÓÐÕë¶ÔÐԵĹ¥»÷¡£ÕâÊÇͨ¹ýÀûÓú«¹ú¼ÓÃܹ«Ë¾×¨ÓõĺϷ¨°²È«Èí¼þ½øÐгÖÐø¹¥»÷À´ÊµÏֵġ£ÒÔǰδ֪µÄ Durian ¶ñÒâÈí¼þ³äÈÎ×°Ö÷¨Ê½£¬²¿Êð³ÖÐøµÄ¶ñÒâÈí¼þÁ÷£¬Ô̺¬ÃûΪAppleSeedµÄºóÃÅ¡¢ÃûΪ LazyLoad µÄ×Ô½ç˵´úÀí¹¤¾ßÒÔ¼° Chrome Ô¶³Ì×ÀÃæµÈÆäËûºÏ·¨¹¤¾ß¡£
https://news.hitb.org/content/north-korean-hackers-deploy-durian-malware-targeting-crypto-firms
3. ¶íÂÞ˹ºÚ¿Í½Ù³ÖÎÚ¿ËÀ¼µçÊǪ́µÄÐźÅת²¥³É¹¦ÈÕÔıø
5ÔÂ11ÈÕ£¬ºÚ¿Í½Ù³ÖÁ˼¸¼ÒÎÚ¿ËÀ¼µçÊÓÆµÂ·£¬×ª²¥ÄªË¹¿Æ³É¹¦ÈÕÓÎÐУ¬ÁôÏë¶þÕ½ÖÐÄÉ´âµÂ¹úµÄÕ½°Ü¡£¾ÝÎÚ¿ËÀ¼ÕƹܵçÊӺ͹㲥µÄ»ú¹¹ Nacrada ³Æ£¬ºÚ¿Í½Ù³ÖÁËÐǹâýÌåÆìÏÂÖÁÉÙ 15 ¸öµçÊÓÆµÂ·µÄ¹ã²¥¡£¸Ã»ú¹¹°µÊ¾£¬ºÚ¿Í×ÌÈÅÁˬɱ¤ SES ¹«Ë¾Õ¼ÓкÍÔËÓªµÄ Astra ͨѶÎÀÐǵÄÔËÐС£ÄÉ¿ËÀ´ï°µÊ¾£¬Æ¾¾Ý SES µÄ˵·¨£¬´ËÀà¹ýÎÊ¡°Ò»ÏòÔÚ²úÉú¡±£¬²¢ÇÒͨ³£À´×Ô¶íÂÞ˹¡£ÎÚ¿ËÀ¼½¨Òé¹ã²¥¹«Ë¾Ê¹Óá°´úÌæ²½Ö衱½Ó¹ÜÐźŲ¢ÊµÊ±ÏìÓ¦¹ýÎÊ´ëÊ©¡£ÀÍÑάÑǹú¶Èµç×ÓýÌåίԱ»á (NEPLP) Ö÷ϯÒÁÍß¶û˹¡¤°¢²©ÁÖ˹ (Ivars Abolins) °µÊ¾£¬ÖÜËÄ£¬ºÚ¿Í»¹½Ù³ÖÁËÀÍÑάÑǵçÊÓÍøÂç Balticom À´×ª²¥ÄªË¹¿ÆµÄÔıøÊ½¡£¾Ý NEPLP ³Æ£¬Balticom ×Ô¼ºµÄ»ù´¡ÉèÊ©²¢Î´Êܵ½ÇÖº¦£¬µ«ÍøÂç¹¥»÷Õë¶ÔµÄÊÇ Balticom λÓÚ±£¼ÓÀûÑǵĻ¥¶¯µçÊÓ·þÎñÆ÷¡£
https://therecord.media/russian-hackers-hijack-ukraine-tv
4. ×êÑÐÍŶӷ¢ÏÖCaretoʱ¸ô 10 Äêºó¾íÍÁ³ÁÀ´
5ÔÂ11ÈÕ£¬Ê®¶àÄêÀ´Ê§×ٵĸ߼¶³ÖÐøÍþв (APT) ×éÖ¯ºöÈ»ÔÚÕë¶ÔÀ¶¡ÃÀÖÞºÍÖзÇ×éÖ¯µÄÍøÂç¼äµý»î¶¯ÖгÁгöÏÖ¡£¸Ã×éÖ¯ÃûΪ¡°Careto¡±»ò¡° The Mask ¡±£¬ÓÚ 2007 ÄêÆðÍ·ÔË×÷£¬¶øºóÔÚ 2013 ÄêËÆºõÒþûµÃÎÞÓ°ÎÞ×Ù¡£ÔÚ´ËÆÚ¼ä£¬Õâ¸ö½²Î÷°àÑÀÓïµÄÍþвÐÐΪÕßÔÚÃÀ¹ú¡¢Ó¢¹úµÈ 31 ¸ö¹ú¶È/µØÓòÔì³ÉÁËÔ¼ 380 Ãû·ÖÆçµÄÊܺ¦Õß¡£¿¨°Í˹»ù×êÑÐÈËÔ±ÔÚ 10 Äêǰ׷×Ù¹ý Careto£¬×î½üÒ²·¢ÏÖÁËËüµÄй¥»÷£¬ËûÃÇ·¢ÏÖCareto ֮ǰµÄÊܺ¦ÕßÔ̺¬µ±¾Ö»ú¹¹¡¢±í½»»ú¹¹ºÍ´óʹ¹Ý¡¢ÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¹«Ë¾¡¢×êÑлú¹¹ºÍ˽ļ¹ÉȨ¹«Ë¾¡£
https://www.darkreading.com/cyberattacks-data-breaches/-the-mask-espionage-group-resurfaces-after-10-year-hiatus?&web_view=true
5. FIN7ÀûÓöñÒâ Google ¸æ°×´«²¼ NetSupport RAT
5ÔÂ12ÈÕ£¬¾Ý¹Û²ì£¬³öÓÚ¾¼Ã¶¯»úµÄÍþвÐÐΪÕßFIN7ÀûÓúýŪºÏ·¨Æ·ÅƵĶñÒâ Google ¸æ°××÷ΪÌṩ MSIX ×°Ö÷¨Ê½µÄ¼¿Á©£¬×îÖÕ²¿ÊðNetSupport RAT¡£ÍøÂ簲ȫ¹«Ë¾ eSentireÔÚ±¾ÖÜÔçЩʱ³½°ä²¼µÄÒ»·Ý»ã±¨ÖаµÊ¾£º¡°ÍþвÐÐΪÕßÀûÓöñÒâÍøÕ¾¼ÙÒâ³ÛÃûÆ·ÅÆ£¬Ô̺¬ AnyDesk¡¢WinSCP¡¢BlackRock¡¢Asana¡¢Concur¡¢»ª¶û½ÖÈÕ±¨¡¢Workable ºÍ Google Meet¡£¡±FIN7£¨±ðÃû Carbon Spider ºÍ Sangria Tempest£©ÊÇÒ»¸ö³ÖÐø´æÔڵĵç×Ó·¸×ï×éÖ¯£¬×Ô 2013 ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬×î³õÉæ×ãÕë¶ÔÏúÊÛµã (PoS) É豸µÄ¹¥»÷ÒÔÇÔȡ֧¸¶Êý¾Ý£¬ºóÀ´×ªÏòͨ¹ýÀÕË÷Èí¼þ»î¶¯·ÛËé´óÐ͹«Ë¾¡£¶àÄêÀ´£¬ÍþвÐÐΪÕ߸ĽøÁËÆäÕ½ÊõºÍ¶ñÒâÈí¼þ¿â£¬Ñ¡È¡Á˸÷Àà ×Ô½ç˵¶ñÒâÈí¼þϵÁУ¬ÀýÈç BIRDWATCH¡¢Carbanak¡¢DICELOADER£¨±ðÃû Lizar ºÍ Tirion£©¡¢POWERPLANT¡¢POWERTRASH ºÍ TERMITE µÈ¡£FIN7 ¶ñÒâÈí¼þͨ³£Í¨¹ýÓã²æÊ½ÍøÂç´¹µö»î¶¯²¿Êð£¬×÷Ϊָ±êÍøÂç»òÖ÷»úµÄÈë¿Ú£¬Ö»¹Ü×î½ü¼¸¸öÔ¸Ã×éÖ¯ÒÑÀûÓöñÒâ¸æ°×¼¼ÊõÀ´Æô¶¯¹¥»÷Á´¡£
https://thehackernews.com/2024/05/fin7-hacker-group-leverages-malicious.html
6. ¼ÓÃÜÓʼþ·þÎñ Proton Ôٴν«ÏÓÒÉÈ˵ÄÐÅÏ¢½»¸ø¾¯·½
5ÔÂ13ÈÕ£¬¼ÓÃܵç×ÓÓʼþ·þÎñ Proton Mail ÔÚijЩ·½ÃæÔÙ´ÎÏÝÈëÀ§¾³£¬²¢ÇÒÖ®Ç°Ò²ÔøÔâ·ê¹ýÆ·ÆÀ£º½«Óû§Êý¾ÝÒÆ½»¸ø·¨Âɲ¿ÃÅ¡£Proton Ìṩ¶àÏî×Գư²È«¿¿µÃסµÄ·þÎñ£¬ÆäÖÐÔ̺¬¶Ëµ½¶Ë¼ÓÃܵç×ÓÓʼþ²úÆ·¡£±í±íÉÏÊÇΪÁËÒþÖÔÒâʶ¶øÉè¼ÆµÄ£¬Proton Ðû³ÆÎÞ·¨ÔĶÁµç×ÓÓʼþºÍ¸½¼þµÄÄÚÈÝ£¬Ã»Óиú×ÙÆ÷ºÍ¸æ°×£¬²¢ÇÒÕ¼ÓÓ×°×î¸ßµÄÒþÖԳ߶ȡ±¡£Ö»¹ÜÈç´Ë£¬Proton ÒÀÈ»Äܹ»½Ó¼û²¢±»ÆÈй¶Óû§ÐÅÏ¢¡£2021 Ä꣬Õâ¼ÒÈðÊ¿¹©¸øÉÌÏòÈðÊ¿¾¯·½ÌṩÁ˾¯·½ÊÔͼʶ´ËÍâÒ»ÃûÍøÃñµÄ IP µØÖ·ºÍÉ豸¾ßÌåÐÅÏ¢¡£¸ÃÈËÊÇÒ»Ãû·¨¹úÆøÏó»î¶¯¼Ò£¬ºóÀ´ÔÚ Proton Óë·¨¹ú¾¯·½·ÖÏíÒ»ÑùÊý¾Ýºó±»²¶¡£Õⳡ»ìÂÒ²úÉúºó²»¾Ã£¬Proton¾Íɾ³ýÁËÆäÍøÕ¾ÉÏδ¸ú×ÙÓû§ IP µØÖ·µÄÉêÃ÷¡£´Ëǰ»¹±»Ö¸¿ØÏòµ±¾ÖÌṩÓû§ÊµÊ±¼à¿Ø¡£
https://www.theregister.com/2024/05/13/infosec_in_brief/


¾©¹«Íø°²±¸11010802024551ºÅ