Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó
Ðû²¼Ê±¼ä 2022-10-26
ýÌå10ÔÂ24Èճƣ¬£¬£¬£¬Ó¢¹úÆû³µ¾ÏúÉÌPendragon GroupÔâµ½LockBitµÄÀÕË÷¹¥»÷¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚԼĪһ¸öÔÂǰ£¬£¬£¬£¬Î´Ó°ÏìÆäÕý³£ÔËÓª£¬£¬£¬£¬ËûÃÇÒ»Ö±ÔÚÓëºÚ¿ÍÁªÏµ£¬£¬£¬£¬²¢ÊÕµ½Á˱»µÁÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬£¬µ«Ã»ÓоÙÐÐ̸ÅС£¡£¡£¾ÝÓ¢¹úýÌ峯£¬£¬£¬£¬LockBitÒªÇó6000ÍòÃÀÔªÊê½ð£¬£¬£¬£¬¶øPendragon½²»°ÈËÌåÏÖËûÃǼá³Ö²»ÏòºÚ¿Í¸¶¿îµÄ¾öÒé¡£¡£¡£Pendragon»¹³ÎÇåµÀ£¬£¬£¬£¬ÆäITÍŶÓÔÚÔâµ½¹¥»÷ºóÁ¬Ã¦×ö³öÁË·´Ó¦£¬£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿Í½öÇÔÈ¡ÁË5%µÄÊý¾Ý¿â¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/
2¡¢CiscoÌáÐÑAnyConnectÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓÃ
CiscoÔÚ10ÔÂ25ÈÕÌáÐѿͻ§£¬£¬£¬£¬ÊÊÓÃÓÚWindowsµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓᣡ£¡£ÕâЩÎó²î£¨CVE-2020-3433ºÍCVE-2020-3153£©¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´Ö´ÐÐDLLÐ®ÖÆ¹¥»÷²¢½«Îļþ¸´ÖƵ½¾ßÓÐϵͳ¼¶È¨ÏÞµÄϵͳĿ¼¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¾ßÓÐϵͳȨÏÞµÄÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ÔÚ2022Äê10Ô£¬£¬£¬£¬Æä·¢Ã÷ÓÐÈËÊÔͼʹÓôËÎó²î£¬£¬£¬£¬²¢Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisco-warns-admins-to-patch-anyconnect-flaw-exploited-in-attacks/
3¡¢ÎÚ¿ËÀ¼¾ÍCubaÍÅ»ïÕë¶ÔÆäÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨
¾Ý10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)ÒѾÍÀÕË÷ÍÅ»ïCuba¶ÔÆäÒªº¦¼ü»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨¡£¡£¡£´Ó10ÔÂ21ÈÕ×îÏÈ£¬£¬£¬£¬CERT-UA¾Í¼ì²âµ½ÐÂÒ»²¨´¹ÂÚÓʼþ£¬£¬£¬£¬Ã°³äÁËÎÚ¿ËÀ¼Îä×°²½¶Ó×ÜÕÕÁϲ¿ÐÂÎÅЧÀͲ¿£¬£¬£¬£¬ÓÕʹÊÕ¼þÈ˵ã»÷ÆäÖеÄǶÈëʽÁ´½Ó£¬£¬£¬£¬×îÖÕ»á×°ÖÃROMCOM RAT¡£¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬Ë¼Á¿µ½RomComºóÃŵÄʹÓÃÒÔ¼°Ïà¹ØÎļþµÄÆäËûÌØÕ÷£¬£¬£¬£¬ÍƲâ´Ë´Î»î¶¯ÓëTropical Scorpius(UNC2596)Óйأ¬£¬£¬£¬¸ÃÍÅ»ïÈÏÕæ·Ö·¢CubaÀÕË÷Èí¼þ¡£¡£¡£
https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html
4¡¢ÐÂµÄ¹ã¸æ»î¶¯Dormant Colors·Ö·¢¶ñÒâChromeÀ©Õ¹
10ÔÂ23ÈÕ£¬£¬£¬£¬Guardio LabsÅû¶ÁËÐÂÒ»ÂֵĶñÒâ¹ã¸æ»î¶¯Dormant Colors¡£¡£¡£µ½2022Äê10ÔÂÖÐÑ®£¬£¬£¬£¬ÔÚChromeºÍEdgeÍøÂçÊÐËÁÖж¼ÓÐ30¸öä¯ÀÀÆ÷À©Õ¹µÄ±äÖÖ£¬£¬£¬£¬ÀÛ¼ÆÁè¼Ý100ÍòµÄ×°ÖÃÁ¿¡£¡£¡£¸Ã»î¶¯µÄÖ÷ÌâÓëÑÕÉ«Óйأ¬£¬£¬£¬Ê¼ÓÚ¶ñÒâ¹ã¸æ»î¶¯£¬£¬£¬£¬ÒÔÐÂÓ±µÄÒªÁìÔÚûÈË×¢ÖØµÄÇéÐÎϲà¼ÓÔØÕæÕýµÄ¶ñÒâ´úÂë¡£¡£¡£×îºó£¬£¬£¬£¬²»µ«ÇÔȡĿµÄËÑË÷ºÍä¯ÀÀÊý¾Ý£¬£¬£¬£¬²¢Îª10000¸öÍøÕ¾ÒýÁ÷£¬£¬£¬£¬Óû§ÔÚÕâÐ©ÍøÕ¾ÉϾÙÐеÄÈκιºÖÃÐÐΪ¶¼»áΪ¹¥»÷Õß´øÀ´Ó¶½ð¡£¡£¡£
https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849
5¡¢SideWinderʹÓÃкóÃÅWarHawk¹¥»÷°Í»ù˹̹µÄ×éÖ¯
¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ZscalerÅû¶Á˺ڿÍÍÅ»ïSideWinderµÄкóÃÅWarHawk¡£¡£¡£SideWinderÒÉËÆÓëÓ¡¶ÈÓйأ¬£¬£¬£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞµÝÈ¥£¬£¬£¬£¬ÓÈÆäÊǰͻù˹̹µÄÕþ¸®¡¢¾ü¶ÓºÍÆóÒµ×éÖ¯¡£¡£¡£½ñÄê9Ô£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°Í»ù˹̹¹ú¼ÒµçÁ¦î¿Ïµ¾ÖµÄÕýµ±ÍøÕ¾nepra[.]org[.]pk·¢Ã÷Ò»¸öÎäÆ÷»¯ISOÎļþ£¬£¬£¬£¬À´¼¤»îÓÃÀ´×°ÖÃWarHawkµÄkillchain¡£¡£¡£WarHawkÔòαװ³ÉASUS Update SetupºÍRealtek HD Audio ManagerµÈÕýµ±Ó¦Ó㬣¬£¬£¬Ëü·Ö·¢Cobalt Strike×÷Ϊ×îÖÕpayload¡£¡£¡£
https://thehackernews.com/2022/10/sidewinder-apt-using-new-warhawk.html
6¡¢ÐÞ½¨¹«Ë¾InterserveÒòÔâµ½ÀÕË÷¹¥»÷±»·£¿£¿£¿£¿£¿£¿î440ÍòÓ¢°÷
10ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ó¢¹úÐÞ½¨¹«Ë¾InterserveÒòÀÕË÷¹¥»÷й¶113000ÃûÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬±»Ó¢¹úÊý¾Ý±£»£»£»£»¤î¿Ïµ»ú¹¹·£¿£¿£¿£¿£¿£¿î440ÍòÓ¢°÷¡£¡£¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬£¬£¬£¬Interserve GroupδÄܽÓÄÉÊʵ±µÄÇå¾²²½·¥À´Ìá·ÀÍøÂç¹¥»÷¡£¡£¡£ICOÚ¹Ê͵À£¬£¬£¬£¬¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬£¬Ä³Ô±¹¤·¿ªºóÎÞÒâÖÐÏÂÔØÁ˶ñÒâÈí¼þ£¬£¬£¬£¬¸Ã¹«Ë¾µÄAVÈí¼þÒÑ·¢Ë;¯±¨¡£¡£¡£µ«ºóÐøÊӲ첻·ó³¹µ×£¬£¬£¬£¬µ¼Ö¹¥»÷Õß»á¼ûÁË283¸öϵͳºÍ16¸öÕË»§£¬£¬£¬£¬²¢Ð¶ÔØÁ˹«Ë¾µÄAVÈí¼þ¡£¡£¡£Interserve ÒѾͷ£¿£¿£¿£¿£¿£¿îÏòICOÌá³öÉÏËߣ¬£¬£¬£¬µ«×îÖÕ·£¿£¿£¿£¿£¿£¿î²¢Î´ïÔÌ¡£¡£¡£
https://therecord.media/british-company-fined-4-4-million-over-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ