¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý

Ðû²¼Ê±¼ä 2023-02-09
1¡¢¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý

      

¾ÝýÌå2ÔÂ7ÈÕ±¨µÀ £¬Cybernews·¢Ã÷ÁËÒ»¸ö̻¶µÄÊý¾Ý¿â £¬°üÀ¨1.1TBÊý¾Ý ¡£Ñо¿Ö°Ô±ÔÚ1ÔÂ24ÈÕ·¢Ã÷Á˸ÃÊý¾Ý¿â £¬²¢½«Æä¹éÒòÓÚ¶íÂÞ˹µçÆø¹¤³Ì¹«Ë¾ElevelÆìϵÄÔÚÏßÊÐËÁe.way ¡£Õâ¸öÊý¾Ý¿â°üÀ¨700ÍòÌõÊý¾Ý £¬Ð¹Â¶ÁËÁ½ÄêµÄ¿Í»§ÐÅÏ¢ £¬ÈçÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ºÍËÍ»õµØÖ·µÈ ¡£±ðµÄ £¬Ëü°üÀ¨ÒÔURL±àÂëµÄµÇ¼Êý¾ÝºÍÃÜÂë £¬ÕâÊÇÒ»ÖÖ½ÏÈõµÄ±£»¤»úÖÆ £¬ºÜÈÝÒ×±»½âÂë ¡£ÏÖÔÚ £¬Êý¾Ý¿âÒѾ­ÎÞ·¨»á¼û £¬µ«¸Ã¹«Ë¾ÉÐδ×ö³ö»ØÓ¦ ¡£


https://cybernews.com/privacy/russian-e-commerce-giant-data-leak/


2¡¢NodariaʹÓöñÒâÐÅÏ¢ÇÔÈ¡³ÌÐòGraphiron¹¥»÷ÎÚ¿ËÀ¼

      

SymantecÔÚ2ÔÂ8ÈÕ³ÆÆä·¢Ã÷¶íÂÞ˹NodariaʹÓÃÐÂÐͶñÒâÈí¼þGraphiron¹¥»÷ÎÚ¿ËÀ¼µÄÔ˶¯ ¡£×îÔçµÄ¹¥»÷¿É×·Ëݵ½2022Äê10Ô £¬²¢ÖÁÉÙÒ»Á¬µ½2023Äê1ÔÂÖÐÑ® ¡£GraphironÊÇÓÃGo¿ª·¢µÄ £¬ÓÉdownloaderºÍpayload×é³É £¬Ö¼ÔÚ´ÓÇÔȡϵͳÐÅÏ¢¡¢Æ¾Ö¤¡¢ÆÁÄ»½ØÍ¼ºÍÎļþµÈ¶àÖÖÐÅÏ¢ ¡£GraphironÓë¾ÉµÄNodaria¹¤¾ß£¨ÀýÈçGraphSteelºÍGrimPlant£©ÓÐһЩÏàËÆÖ®´¦ ¡£³ý´ËÖ®Íâ £¬ÓëÔçÆÚµÄ¶ñÒâÈí¼þÒ»Ñù £¬GraphironʹÓö˿Ú443ÓëC&C·þÎñÆ÷ͨѶ £¬²¢Ê¹ÓÃAESÃÜÂë¶ÔͨѶ¾ÙÐмÓÃÜ ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer


3¡¢Sophos½üÆÚ·¢Ã÷ͨ¹ý¶ñÒâOneNotÎļþ·Ö·¢QBotµÄÔ˶¯

      

¾Ý2ÔÂ6ÈÕ±¨µÀ £¬ÐÂÒ»ÂÖQakNote¹¥»÷Ô˶¯Ê¹ÓÃMicrosoft OneNoteÎļþ·Ö·¢¶ñÒâÈí¼þQBot ¡£1ÔÂ31ÈÕ×îÏÈ £¬QBotµÄÔËÓªÖ°Ô±×îÏÈÊÔÑéÕâÖÖеķַ¢ÒªÁì £¬Ê¹ÓÃOneNoteÎļþ £¬ÆäÖаüÀ¨Ò»¸öǶÈëµÄHTMLÓ¦ÓóÌÐò£¨HTAÎļþ£© £¬¿ÉÒÔ¼ìË÷µ½QBot¶ñÒâÈí¼þµÄpayload ¡£±ðµÄ £¬QBot payload½«×ÔÉí×¢ÈëWindows¸¨ÖúÊÖÒÕ¹ÜÀí³ÌÐò£¨¡°AtBroker.exe¡±£©ÒÔÈÆ¹ýAV¹¤¾ßµÄ¼ì²â ¡£×÷ΪӦ¶Ô²½·¥ £¬Sophos½¨Òé¹ÜÀíÔ±×èÖ¹ËùÓÐ.oneÎļþ £¬ÓÉÓÚËüÃÇͨ³£²»×÷Ϊ¸½¼þ·¢ËÍ ¡£ 


https://news.sophos.com/en-us/2023/02/06/qakbot-onenote-attacks/


4¡¢Medusa½©Ê¬ÍøÂç»Ø¹éÐÂÔöÀÕË÷Èí¼þºÍ±©Á¦ÆÆ½âÄ£¿é

      

ýÌå2ÔÂ7ÈÕ³Æ £¬»ùÓÚMirai´úÂëµÄаæDDoS½©Ê¬ÍøÂçMedusa·ºÆð £¬¾ßÓÐÀÕË÷Èí¼þÄ£¿éºÍTelnet±©Á¦ÆÆ½â³ÌÐò ¡£MedusaµÄÀÕË÷Èí¼þÄ£¿éʹÓÃ256λAES¼ÓÃÜÎļþ £¬µ«¼ÓÃÜÒªÁìËÆºõÒÑË𻵠£¬½«ÀÕË÷Èí¼þÄð³ÉÁËÊý¾Ý²Á³ý³ÌÐò ¡£±ðµÄ £¬Ö»ÓÐÔÚɾ³ýÎļþºó £¬Ëü²Å»áÏÔʾһ¸öÒªÇó0.5 BTCµÄÊê½ð¼Í¼ ¡£ÕâËÆºõÊÇÓÐÎÊÌâµÄ £¬Òò´ËÑо¿Ö°Ô±ÍƲâбäÌå»ò´Ë¹¦Ð§ÈÔÔÚ¿ª·¢ÖÐ ¡£±©Á¦ÆÆ½â¹¦Ð§¿ÉÕë´ºÁªÍø×°±¸ÊµÑé³£ÓõÄÓû§ÃûºÍÃÜÂë £¬ÔÚ½¨ÉèTelnetÅþÁ¬ºó £¬¶ñÒâÈí¼þ»áʹÓÃÖ÷ÒªµÄMedusa payloadѬȾϵͳ ¡£


https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/


5¡¢AhnlabÅû¶ʹÓÃ˽ÈËHTS·Ö·¢Quasar RATµÄÔ˶¯

      

AhnlabÓÚ2ÔÂ8ÈÕÅû¶Á˽üÆÚͨ¹ý˽È˼ÒÍ¥ÉúÒâϵͳ£¨HTS£©·¢Ã÷Quasar RATµÄ·Ö·¢Ô˶¯ ¡£HTSÒ»ÖÖʹͶ×ÊÕßʹÓüÒÍ¥»ò°ì¹«ÊÒPC¾ÙÐÐ¹ÉÆ±ÉúÒâµÄϵͳ £¬¶øÎÞÐè»á¼û¹ÉƱÉúÒ⹫˾»ò´òµç»° ¡£µÚÒ»¸ö×°ÖõijÌÐòÊÇNSIS×°ÖóÌÐòHPlusSetup.exe £¬Asset.exeÊÇ×°ÖúóÖ´ÐеĵÚÒ»¸ö³ÌÐò £¬ºóÕß¼ÈÊÇÆô¶¯³ÌÐòÓÖÊǸüгÌÐò ¡£HPlusSocketManager20221208.exe»áÆô¶¯vbc.exe²¢×¢ÈëQuasar RAT ¡£


https://asec.ahnlab.com/en/47283/


6¡¢Outpost24Ðû²¼2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ

      

2ÔÂ7ÈÕ £¬Outpost24Ðû²¼ÁË2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ ¡£Ñо¿Ö°Ô±ÔÚ2022Äê×ܹ²¼ì²âµ½ÖÖÖÖÀÕË÷ÍÅ»ïÔÚDLSÉÏ×ܹ²Åû¶ÁË2363¸ö×éÖ¯ ¡£×î»îÔ¾µÄÀÕË÷ÍÅ»ïΪLockBit¡¢BlackCat¡¢ContiºÍHiveµÈ £¬ÆäÖÐLockBit¶ÔÎôʱ34%µÄ¹¥»÷ÈÏÕæ £¬Æ½¾ùÿÔÂÔ¼67´Î ¡£ÉÌÒµºÍÉÌÒµÏà¹Ø¹«Ë¾ÊÜÀÕË÷¹¥»÷µÄÓ°Ïì×î´ó £¬ÈçÉÌÒµÉèÊ©¡¢½ðÈÚ¡¢ÐÞ½¨¡¢Ö´·¨ÒÔ¼°Åú·¢ÁãÊÛÐÐÒµ £¬ÕâÅú×¢¹¥»÷ÕßÖ÷ÒªÕë¶Ô¾ßÓиü¸ßÖ§¸¶ÄÜÁ¦µÄ×éÖ¯ ¡£ÔÚµØÀíÂþÑÜ·½Ãæ £¬½öÃÀ¹ú¾ÍÕ¼42% £¬¶øÅ·ÖÞ¹ú¼ÒÔ¼Õ¼28% ¡£


https://outpost24.com/blog/ransomware-report-2023