РAPT Lotus BaneÊÇ×î½üÕë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄ¹¥»÷µÄÄ»ºóºÚÊÖ
Ðû²¼Ê±¼ä 2024-03-083ÔÂ6ÈÕ£¬£¬£¬£¬£¬Ô½ÄϵÄÒ»¼Ò½ðÈÚʵÌåÊÇÏÈǰδ¼Í¼µÄÃûΪLotus Bane µÄÍþвÐÐΪÕßµÄÄ¿µÄ£¬£¬£¬£¬£¬¸ÃÐÐΪÕßÓÚ 2023 Äê 3 ÔÂÊ״α»·¢Ã÷¡£¡£¡£Lotus Bane ʹÓõÄÊÖÒÕÓëOceanLotusµÄÊÖÒÕÖØµþ£¬£¬£¬£¬£¬OceanLotus ÊÇÒ»¸öÓëÔ½ÄϽáÃ˵ÄÍþв×éÖ¯£¬£¬£¬£¬£¬Ò²³ÆÎª APT32¡¢Canvas Cyclone£¨ÒÔǰ³ÆÎª Bismuth£©ºÍ Cobalt Kitty¡£¡£¡£ÕâÔ´ÓÚʹÓà PIPEDANCE µÈ¶ñÒâÈí¼þ¾ÙÐÐÃüÃû¹ÜµÀͨѶ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ Elastic Security Labs ÓÚ 2023 Äê 2 ÔÂÊ״μͼÁËPIPEDANCE £¬£¬£¬£¬£¬¸ÃÊÂÎñÓë 2022 Äê 12 ÔÂÏÂÑ®Õë¶ÔÒ»¸öδ͸¶ÐÕÃûµÄÔ½ÄÏ×éÖ¯µÄÍøÂç¹¥»÷Óйء£¡£¡£ÒÑÍùÒ»Ä꣬£¬£¬£¬£¬ÑÇÌ«µØÇø (APAC)¡¢Å·ÖÞ¡¢À¶¡ÃÀÖÞ (LATAM) ºÍ±±ÃÀµÄ½ðÈÚ×éÖ¯ÒѳÉΪBlind EagleºÍLazarus GroupµÈ¶à¸ö¸ß¼¶Ò»Á¬Íþв×éÖ¯µÄÄ¿µÄ¡£¡£¡£ÁíÒ»¸öÖøÃûµÄ³öÓÚ¾¼ÃÄîÍ·µÄÍþв×éÖ¯ÊÇ UNC1945£¬£¬£¬£¬£¬¾ÝÊӲ죬£¬£¬£¬£¬¸Ã×éÖ¯ÒÔ ATM ½»Á÷»úЧÀÍÆ÷ΪĿµÄ£¬£¬£¬£¬£¬Ä¿µÄÊÇÓÃÃûΪ CAKETAP µÄ×Ô½ç˵¶ñÒâÈí¼þѬȾËüÃÇ¡£¡£¡£
https://thehackernews.com/2024/03/new-apt-group-lotus-bane-behind-recent.html
2. RA World ÀÕË÷Èí¼þ¹¥»÷À¶¡ÃÀÖÞµÄÒ½ÁƱ£½¡ÐÐÒµ
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯ RA World£¨Ò²³ÆÎª RA Group£©ÌᳫÁËÐÂÒ»²¨»î¶¯¡£¡£¡£¸Ã×éÖ¯ÓÚ 2023 Äê 4 ÔÂÌᳫ¶ñÒâÐж¯£¬£¬£¬£¬£¬ÔÚÆäÈÎÆÚÄÚ¶ÔÖÚ¶à×éÖ¯ÌᳫÁ˹¥»÷£¬£¬£¬£¬£¬Ö÷ÒªÊÇÃÀ¹ú¡¢µÂ¹ú¡¢Ó¡¶ÈºĮ́ÍåµÄÒ½ÁƱ£½¡ºÍ½ðÈÚÁìÓòµÄ×éÖ¯¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬RA World µÄ×îй¥»÷Õë¶ÔÀ¶¡ÃÀÖ޵Ķà¼ÒÒ½ÁÆ»ú¹¹¡£¡£¡£ÕâЩ¹¥»÷ÊÇ·Ö½×¶ÎÖ´Ðе쬣¬£¬£¬£¬ÒÔ×î´óÏ޶ȵØÌá¸ßÀÖ³ÉÐж¯µÄ×ÜÌåʱ»ú¡£¡£¡£³õʼ»á¼û½×¶Î´ÓºÚ¿Íͨ¹ýÓò¿ØÖÆÆ÷ÉøÍ¸ÅÌËã»úϵͳ×îÏÈ¡£¡£¡£ÔÚÕâÀ£¬£¬£¬£¬×éÕ½ÂÔ¹¤¾ß (GPO) µÄ±à¼Æð×ÅÖÁ¹ØÖ÷ÒªµÄ×÷Ó㬣¬£¬£¬£¬Ê¹·¸·¨ÕßÄܹ»ÔÚÊܺ¦ÕßµÄϵͳÖÐÇ¿¼ÓËûÃǵĹæÔò¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹¿ÉÒÔÒÔÌØÊâµÄÇå¾²Ä£Ê½ÖØÐÂÆô¶¯ÏµÍ³£¬£¬£¬£¬£¬ÒÔÌӱܷÀ²¡¶¾Èí¼þµÄ¼ì²â¡£¡£¡£Ëü»¹Ïû³ýÁ˹¥»÷ºóÆä±£´æµÄºÛ¼££¬£¬£¬£¬£¬Ê¹Ñо¿Ö°Ô±µÄÆÊÎöÊÂÇé±äµÃÔ½·¢Öش󡣡£¡£
https://meterpreter.org/ra-world-ransomware-strikes-latin-american-healthcare/
3. ºÚ¿ÍʹÓÃÎäÆ÷»¯ÈÕÀúÑûÖÂÒâ×° MacOS ¶ñÒâÈí¼þ
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÎäÆ÷»¯µÄÈÕÀúÔ¼ÇëÀ´Ê¹Óõç×ÓÓʼþϵͳÖеÄÎó²î£¬£¬£¬£¬£¬ÓÕÆÓû§µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎ±×°³É»î¶¯¸½¼þµÄ¶ñÒâÈí¼þ¡£¡£¡£Í¨¹ýʹÓöÔÈÕÀúÔ¼ÇëµÄÐÅÈΣ¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔöÌíÁËÀֳɾÙÐÐÍøÂç´¹ÂÚ¹¥»÷ºÍδ¾ÊÚȨ»á¼ûÃô¸ÐÐÅÏ¢µÄ¿ÉÄÜÐÔ¡£¡£¡£Malwarebytes µÄÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃÎäÆ÷»¯ÈÕÀúÔ¼ÇëÀ´×°ÖÃmacOS ¶ñÒâÈí¼þ¡£¡£¡£ÍþвÐÐΪÕßͨ¹ý Telegram DM ÁªÏµÄ¿µÄ£¬£¬£¬£¬£¬Í¨¹ýÌṩͨ»°»ò¾Û»áµÄʱ»úÀ´ÒýÓÕÄ¿µÄ¡£¡£¡£¸ÐÐËȤµÄÄ¿µÄ»áÊÕµ½ÐéαµÄ¾Û»áÔ¼Çë¡£¡£¡£µ±Êܺ¦ÕßʵÑé¼ÓÈëʱ£¬£¬£¬£¬£¬Á´½Ó»áʧ°Ü¡£¡£¡£Õ©ÆÕß½«´Ë¹é×ïÓÚÇøÓò»á¼ûÏÞÖÆ£¬£¬£¬£¬£¬²¢½¨ÒéÔËÐнÅÔÀ´ÐÞ¸´Ëü¡£¡£¡£
https://gbhackers.com/malware-weaponized-calendar-invites/
4. ºÚ¿ÍÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷¾ÙÐÐÒþÃØ C2 ͨѶ
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬QEMU ÊÇÒ»¸ö¿ªÔ´Æ½Ì¨£¬£¬£¬£¬£¬ÌṩÇå¾²ÇÒ˽ÓеÄÐéÄ⻯¿Õ¼ä£¬£¬£¬£¬£¬ÓÃÓÚÔÚ×Ô¼ºµÄÇéÐÎÖÐʵÑé¶ñÒâ´úÂë¡¢Îó²îʹÓú͹¥»÷¡£¡£¡£Õâ¸öÊܿصIJâÊÔ³¡×î´óÏ޶ȵؽµµÍÁ˱»·¢Ã÷ºÍÖ´·¨ÎÊÌâµÄΣº¦¡£¡£¡£??±ðµÄ£¬£¬£¬£¬£¬QEMU ÔÊÐíºÚ¿Í¿ª·¢¿ÉÒÔÔÚ²î±ðÓ²¼þ¼Ü¹¹ºÍ²Ù×÷ϵͳÉÏÔËÐеĶñÒâÈí¼þ¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùʵÑéÊÒµÄÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÀÄÓà QEMU Ó²¼þÄ£ÄâÆ÷À´ÉñÃØÇÔÈ¡±»µÁÊý¾Ý¡£¡£¡£¹¥»÷Õßϲ»¶Ê¹ÓÃÕý°æ¹¤¾ßÒÔ×èÖ¹¼ì²â£¬£¬£¬£¬£¬Í¬Ê±Ò²ïÔ̶ñÒâÈí¼þÖ§³ö¡£¡£¡£Êý¾Ýй¶¡¢Çý¶¯Æ÷¼ÓÃÜ¡¢Ô¶³ÌÖ´ÐкÍÄÚ´æ×ª´¢ÊÇ¿ÉÐÅÈí¼þÖ§³ÖµÄÒ»Ð©ÍøÂçɨÃè»î¶¯¡£¡£¡£Ô¤×°ÖõĶñÒâÈí¼þ»òÄ£ÄâÔ±¹¤µÄ RDP/ VPN»á¼û³äµ±ÊÜѬȾϵͳµÄפ×ãµã¡£¡£¡£ÍøÂçËíµÀºÍ¶Ë¿Úת·¢ÊÊÓóÌÐòʹÓû§Äܹ»Èƹý NAT ºÍ·À»ðǽ£¬£¬£¬£¬£¬´Ó¶ø½øÈëÄÚ²¿ÏµÍ³¡£¡£¡£ÓÐÐí¶à¹¤¾ß¿ÉÓÃÓÚÔÚϵͳ֮¼ä½¨ÉèÍøÂçËíµÀ£¬£¬£¬£¬£¬ÆäÖÐһЩÊÇÖ±½ÓµÄ£¬£¬£¬£¬£¬ÁíһЩÔòʹÓÃÊðÀíÀ´ÑÚÊι¥»÷Õß IP¡£¡£¡£
https://gbhackers.com/hackers-qemu-data-exfiltration/
5. ¼ÓÄôóµÄ·´Ï´Ç®»ú¹¹ÒòÍøÂç¹¥»÷¶ø¹Ø±Õ
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ (FINTRAC) Ðû²¼£¬£¬£¬£¬£¬×÷ΪԤ·À²½·¥£¬£¬£¬£¬£¬Ò»´Î¡°ÍøÂçÊÂÎñ¡±ÆÈʹÆä¹«Ë¾ÏµÍ³ÏÂÏß¡£¡£¡£FINTRAC ÊǼÓÄôóµÄÒ»¸öÕþ¸®»ú¹¹£¬£¬£¬£¬£¬×÷Ϊ¸Ã¹úµÄ½ðÈÚÇ鱨»ú¹¹ÔË×÷¡£¡£¡£Ëü´ÓÊÂÏ´Ç®ÊӲ죬£¬£¬£¬£¬Ã¿Äê×·×ÙÊý°ÙÍò±Ê¿ÉÒÉÉúÒ⣬£¬£¬£¬£¬²¢Ïò¾¯·½Åû¶ÊýǧÆð²»·¨×ʽðÁ÷Ïò¡£¡£¡£¸Ã»ú¹¹ÔÚÆäÍøÕ¾ÉϽÒÏþÁËÒ»·Ý¼ò¶ÌµÄÐÂÎÅÉùÃ÷£¬£¬£¬£¬£¬Ö¸³ö¸ÃÖÐÐĵÄÇ鱨»òÉñÃØÏµÍ³Î´±»»á¼û£¬£¬£¬£¬£¬Òò´ËÓëÆä½¹µãʹÃüÏà¹ØµÄÃô¸ÐÐÅÏ¢ºÍ²Ù×÷ÄÜÁ¦ÈÔÈ»Çå¾²¡£¡£¡£FINTRAC Óë°üÀ¨¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÔÚÄÚµÄÁª°îÏàÖúͬ°éÏàÖú£¬£¬£¬£¬£¬»Ö¸´ÔËÓª²¢ÔöÇ¿·ÀÓù£¬£¬£¬£¬£¬ÒÔ±ÜÃâδÀ´±¬·¢ÊÂÎñ¡£¡£¡£¸ÃÍøÂçÊÂÎñ±¬·¢ÔÚÖÜÄ©£¬£¬£¬£¬£¬ÒÔºóûÓзÖÏí½øÒ»²½µÄ¸üС£¡£¡£BleepingComputer ÉÐδ·¢Ã÷ÈκÎÀÕË÷Èí¼þ»òÊý¾ÝÀÕË÷Íþв×éÖ¯¶Ô FINTRAC µÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬Òò´ËÍþвÐÐΪÕßÈÔȻδ֪¡£¡£¡£×Ô½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬¼ÓÄôóÔÚÍøÂçÇå¾²·½ÃæÂÄÀúÁ˳äÂúÌôÕ½µÄʱÆÚ£¬£¬£¬£¬£¬·ºÆðÁ˶àÆðÒýÈËעĿµÄÊܺ¦ÕߺÍÊÂÎñ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/canadas-anti-money-laundering-agency-offline-after-cyberattack/
6. »ùÓÚÍøÂçµÄ PLC ¶ñÒâÈí¼þ½«ÖØÐ½ç˵¹¤ÒµÍøÂçÇå¾²Íþв
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬×ôÖÎÑÇÀí¹¤Ñ§ÔºµÄÑо¿Ö°Ô±Ìá³öÁËÒ»ÖÖ¿ª·¢¿É±à³ÌÂß¼¿ØÖÆÆ÷ (PLC) ¶ñÒâÈí¼þµÄÐÂÒªÁ죬£¬£¬£¬£¬¸ÃÒªÁ챻֤ʵ±ÈÄ¿½ñÕ½ÂÔ¸üÎÞа¡¢¸üÓе¯ÐԺ͸üÓÐÓ°ÏìÁ¦¡£¡£¡£¸Ã¼Æ»®ÔÊÐí¶ñÒâÈí¼þʹÓÃÖÎÀíÃÅ»§ÍøÕ¾¹ûÕæµÄÕýµ± Web Ó¦ÓóÌÐò½Ó¿Ú (API) ÉñÃØ¹¥»÷µ×²ãµÄÏÖʵÌìÏ»úе¡£¡£¡£´ËÀ๥»÷°üÀ¨Î±Ôì´«¸ÐÆ÷¶ÁÊý¡¢½ûÓÃÇå¾²¾¯±¨ÒÔ¼°Ê¹ÓÃÎïÀíÖ´ÐÐÆ÷¡£¡£¡£Ñо¿Ð¡×éµÄÊÓ²ìÅú×¢£¬£¬£¬£¬£¬ËûÃÇÌá³öµÄ¹¥»÷½«¶Ôÿ¸öÖ÷ÒªÖÆÔìÉÌÉú²úµÄ PLC Æð×÷Óᣡ£¡£±ðµÄ£¬£¬£¬£¬£¬¸ÃÒªÁì±ÈÏÖÓÐµÄ PLC ¶ñÒâÈí¼þÊÖÒÕ£¨¿ØÖÆÂß¼ºÍ¹Ì¼þ£©¾ßÓÐÏÔ×ÅÓÅÊÆ£¬£¬£¬£¬£¬ÀýÈçÆ½Ì¨×ÔÁ¦ÐÔ¡¢Ò×ÓÚ°²Åź͸ü¸ß¼¶±ðµÄ³¤ÆÚÐÔ¡£¡£¡£Ñо¿Ö°Ô±»¹Åú×¢£¬£¬£¬£¬£¬¹¤Òµ¿ØÖÆÇéÐÎÖÐÍøÂçÊÖÒյķºÆð´øÀ´ÁË IT ÁìÓò»òÏûºÄÎïÁªÍø×°±¸Öв»±£´æµÄÐÂÇå¾²ÎÊÌâ¡£¡£¡£ÓëÆÕ±é¿´·¨Ïà·´£¬£¬£¬£¬£¬¹Ì¼þºÍ¿ØÖÆÂß¼²¢²»ÊÇ PLC ÅÌËãµÄΨһ¼¶±ð¡£¡£¡£ÏÖ´ú PLC ÏÖÔÚ°üÀ¨Ò»¸ö¿É±à³ÌǶÈëÊ½ÍøÂçЧÀÍÆ÷£¬£¬£¬£¬£¬ÆäÖÐ×Ô½ç˵¿Í»§¶Ë JavaScript ´úÂëʹÓÃÈÕÒæÇ¿Ê¢µÄ API À´¼àÊӺͿØÖÆÎïÀíÀú³Ì¡£¡£¡£ÕâÖÖÇéÐÎÌṩÁËÒ»¸öеġ¢ÁîÈ˾ªÑȵÄÀíÏëÆ½Ì¨À´ÔËÐÐ PLC ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Õâ¶Ô¹¤Òµ¿ØÖÆÏµÍ³×é³ÉÁËеÄÍþв¡£¡£¡£
https://industrialcyber.co/industrial-cyber-attacks/georgia-tech-researchers-warn-of-stuxnet-style-web-based-plc-malware-redefining-industrial-cybersecurity-threats/?web_view=true


¾©¹«Íø°²±¸11010802024551ºÅ