ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð

Ðû²¼Ê±¼ä 2022-05-20

1¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð


¾ÝýÌå5ÔÂ18ÈÕ±¨µÀ£¬£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¡£¡£¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬£¬5ÔÂ9ÈÕÆä²¿·ÖITϵͳ±¬·¢ÁËÖÐÖ¹£¬£¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬£¬¿ÉÄÜÔ´ÓÚÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£ËäÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐ͸¶¹¥»÷µÄϸ½Ú£¬£¬µ«Ñо¿Ö°Ô±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬£¬¸ÃÍÅ»ïÉù³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£ÒøÐеÄÊÖÒÕ×ܼàÌåÏÖ£¬£¬ËûÃÇÀֳɱ£»£»£»¤Á˽¹µãϵͳ£¬£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/


2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢


5ÔÂ18ÈÕ£¬£¬ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)¹ûÕæÁËÓйØ1Ô·ݷ¢Ã÷µÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚWebÓ¦ÓÃÖдæ±à³Ì´úÂë¹ýʧ£¬£¬µ¼ÖÂÊܱ£»£»£»¤ÇøÓò¿ÉÒÔ±»»á¼û£¬£¬Éæ¼°Áè¼Ý180Íò¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¾­ÓÉÊÓ²ìÈ·¶¨£¬£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂʱ´ú£¬£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»ÍⲿְԱ»á¼û£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÓйØÎ£Ïպ͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¡£¡£¡£¸Ã»ú¹¹´ËǰÌåÏÖ£¬£¬ÒѾ­ÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£¡£¡£¡£


https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/


3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ


Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2017Äê×îÏÈ»îÔ¾£¬£¬ÔÚÈ¥ÄêÑ×ÌìÊ״α»·¢Ã÷¡£¡£¡£¡£´Ë´Î»î¶¯Í¨¹ý´¹ÂÚÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£¡£¡£¡£ÎäÆ÷¿â°üÀ¨Òþ²ØÔÚÓÕ¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ³ÌÐò¡¢Òѱ£´æ¶àÄêÇÒÂÔ΢Ð޸ĵĺóÃÅ¡¢PlugXºÍ¶¨ÖƺóÃÅPcShare¡£¡£¡£¡£±ðµÄ£¬£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬£¬ÒÔ¼°3¸öеÄÄ£¿£¿£¿£¿ £¿£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£¡£¡£¡£


https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/


4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%


5ÔÂ19ÈÕ£¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÔÚÒÑÍùµÄ6¸öÔÂÖУ¬£¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£¡£¡£¡£XorDdosÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ¾Ü¾øÐ§À͹¥»÷£¬£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÖÆºÍ¼á³Ö³¤ÆÚÐÔµÄÕ½ÂÔ£¬£¬Ê¹ÆäÄÑÒÔ±»É¨³ý¡£¡£¡£¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯ÖÐÊӲ쵽£¬£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½ÚÁýÕÖÃô¸ÐÎļþÀ´Òþ²Ø¶ñÒâ»î¶¯ÒÔ±ÜÃâ±»ÆÊÎö¡£¡£¡£¡£±ðµÄ£¬£¬³ýÁËÌᳫDDoS¹¥»÷Í⣬£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬ÈçºóÃÅTsunami¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/


5¡¢CISAºÍMS-ISACÐû²¼Ê¹ÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ


5ÔÂ18ÈÕ£¬£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Á˹ØÓÚʹÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ¡£¡£¡£¡£F5ÓÚ5ÔÂ4ÈÕÐû²¼ÁËÕë¶ÔÎó²îCVE-2022-1388µÄ²¹¶¡£¬£¬½ñЧ¹ûÕæÁËPOCÎó²îʹÓ㬣¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØµã»ñµÃÄ¿µÄϵͳµÄ¿ØÖÆÈ¨¡£¡£¡£¡£Æ¾Ö¤¹ûÕæ±¨¸æ£¬£¬¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£Ç徲ͨ¸æÌṩÁËÎó²îµÄÊÖÒÕϸ½Ú¡¢¼ì²âÒªÁì¡¢ÊÂÎñÏìÓ¦»ººÍ½â²½·¥£¬£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§Ê¹ÓøÃÖ¸ÄÏ×ÊÖú×éÖ¯µÖÓù´ËÀ๥»÷¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/alerts/aa22-138a


6¡¢PRODAFTÐû²¼¹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ


PRODAFTÔÚ5ÔÂ16ÈÕÐû²¼Á˹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ£¬£¬Õ¹ÏÖÁËÆä×éÖ¯½á¹¹ºÍÄîÍ·¡£¡£¡£¡£Wizard SpiderµÄ´ó²¿·ÖÄ¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú£¬£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛֵĿµÄ£¬£¬²¢½«»ñµÃµÄ²¿·Ö×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¡£¡£¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹Âڻ£¬£¬ÓÐʱҲʹÓÃBEC¹¥»÷¡£¡£¡£¡£Ò»µ©Àֳɣ¬£¬¾Í»á×°ÖÃCobalt Strike£¬£¬²¢ÊµÑé»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£¡£¡£¡£±ðµÄ£¬£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍÊðÀíÀ´Òþ²ØÆä×Ù¼££¬£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºóÏÅ»£Ä¿µÄ£¬£¬ÆÈʹÆä¸¶¿î¡£¡£¡£¡£


https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/