CoralRaider¶ñÒâÈí¼þ»î¶¯Ê¹ÓÃCDN»º´æÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò
Ðû²¼Ê±¼ä 2024-04-254ÔÂ24ÈÕ£¬£¬Ñо¿Ö°Ô±·¢Ã÷Ò»ÖÖеÄÒ»Á¬¶ñÒâÈí¼þ»î¶¯ÕýÔÚ·Ö·¢ÈýÖÖ²î±ðµÄÇÔÈ¡³ÌÐò£¬£¬ÀýÈçÍйÜÔÚÄÚÈݽ»¸¶ÍøÂç (CDN) »º´æÓòÉϵÄCryptBot¡¢LummaC2ºÍRhadamanthys ¡£¡£¡£¡£¡£Ë¼¿Æ Talos ½«´Ë´Î»î¶¯¹éÒòÓÚ±»×·×ÙΪCoralRaiderµÄÍþвÐÐΪÕߣ¬£¬¸Ã×éÖ¯ÒÉËÆÔ´×ÔÔ½ÄÏ£¬£¬ÓÚ½üÆÚÆØ¹â¡£¡£¡£¡£¡£¸Ã»î¶¯µÄÄ¿µÄº¸Ç¸÷¸öµØÇøµÄ¸÷¸öÉÌÒµ±ÊÖ±ÁìÓò£¬£¬°üÀ¨ÃÀ¹ú¡¢ÄáÈÕÀûÑÇ¡¢°Í»ù˹̹¡¢¶ò¹Ï¶à¶û¡¢µÂ¹ú¡¢°£¼°¡¢Ó¢¹ú¡¢²¨À¼¡¢·ÆÂɱö¡¢Å²Íþ¡¢ÈÕ±¾¡¢ÐðÀûÑǺÍÍÁ¶úÆä¡£¡£¡£¡£¡£¹¥»÷Á´Éæ¼°Óû§Í¨¹ýÍøÂçä¯ÀÀÆ÷ÏÂÔØÎ±×°³ÉÓ°Ï·ÎļþµÄÎļþ£¬£¬´Ó¶øÔöÌíÁË´ó¹æÄ£¹¥»÷µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¸Ã»î¶¯ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ËüʹÓÃÁË CryptBot µÄ¸üа汾£¬£¬ÆäÖаüÀ¨Ðµķ´ÆÊÎöÊÖÒÕ£¬£¬²¢ÇÒ»¹²¶»ñÃÜÂëÖÎÀíÆ÷Ó¦ÓóÌÐòÊý¾Ý¿âºÍÉí·ÝÑéÖ¤Æ÷Ó¦ÓóÌÐòÐÅÏ¢¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
2. Change Healthcare×îÖÕÖ§¸¶Êê½ð½«ÃæÁÙÊý¾Ýй¶µÄΣº¦
4ÔÂ24ÈÕ£¬£¬ÔÚÀÕË÷Èí¼þ±ÀÀ£¿£¿£×îÏÈÁ½¸ö¶àÔº󣬣¬ÀÕË÷Èí¼þµÄÓ°Ïì¿°³ÆÍøÂçÇ徲ʷÉÏ×îÑÏÖØµÄÒ»´Î£¬£¬Ò½Áƹ«Ë¾ Change Healthcare ÖÕÓÚ֤ʵÁËÍøÂç·¸·¨·Ö×Ó¡¢Çå¾²Ñо¿Ö°Ô±ºÍ±ÈÌØ±ÒÇø¿éÁ´ÒѾ˵µÃºÜÇåÎúµÄÊÂÇ飺Ëüȷʵ×öµ½ÁËÏòÖÙ´º·ÝÏ®»÷¸Ã¹«Ë¾µÄºÚ¿ÍÖ§¸¶Êê½ð¡£¡£¡£¡£¡£È»¶ø£¬£¬ËüÈÔÈ»ÃæÁÙ×Åɥʧ´ó×Ú¿Í»§Ãô¸ÐÒ½ÁÆÊý¾ÝµÄΣº¦¡£¡£¡£¡£¡£Change Healthcare ËÆºõÒÑÓÚ 3 Ô 1 ÈÕÖ§¸¶ÁËÊê½ð£¬£¬²¢Ö¸³öÒ»±Ê 350 ±ÈÌØ±Ò£¨Ô¼ºÏ 2200 ÍòÃÀÔª£©µÄÉúÒâ±»·¢Ë͵½Óë AlphV ºÚ¿ÍÏà¹ØµÄ¼ÓÃÜÇ®°üÖС£¡£¡£¡£¡£Õâ±ÊÉúÒâÊ×ÏÈÔÚÃûΪ RAMP µÄ¶íÂÞË¹ÍøÂç·¸·¨ÂÛ̳ÉϵÄÒ»ÌõÐÂÎÅÖлñµÃÇ¿µ÷£¬£¬ÆäÖÐһλ¾Ý³Æ±» AlphV ÑïÆúµÄÏàÖúͬ°éËß¿à˵£¬£¬ËûÃÇûÓÐÊÕµ½ Change Healthcare ¸¶¿îÖеķֳɡ£¡£¡£¡£¡£
https://news.hitb.org/content/change-healthcare-finally-admits-it-paid-ransomware-hackers-and-still-faces-patient-data
3. Î÷°àÑÀÖØÐÂÆô¶¯¶Ô Pegasus ÌØ¹¤Èí¼þ°¸¼þµÄÊÓ²ì
4ÔÂ23ÈÕ£¬£¬Î÷°àÑÀ¹ú¼Ò·¨Ôº·¨¹ÙÌåÏÖ£¬£¬ÓÐÀíÓÉÏàÐÅ·¨¹úÌṩµÄÐÂÐÅÏ¢¿ÉÒÔ¡°ÈÃÊÓ²ìÈ¡µÃÏ£Íû¡±¡£¡£¡£¡£¡£ÕâÁ½ÏîÊÓ²ì¾ùÉæ¼°ÉæÏÓʹÓÃÒÔÉ«ÁÐ NSO ¼¯ÍÅ¿ª·¢µÄ Pegasus ÌØ¹¤Èí¼þ¡£¡£¡£¡£¡£Ìع¤Èí¼þ»áÇÄÇĵØÉøÍ¸µ½ÊÖ»ú»òÆäËû×°±¸ÖÐÒÔÍøÂçÊý¾Ý²¢¿ÉÄܼàÊÓÆäËùÓÐÕß¡£¡£¡£¡£¡£NSO Éù³Æ£¬£¬Ëü½öÌṩӦÕþ¸®ÓÃÓÚ¹¥»÷¿Ö²ÀÖ÷ÒåºÍÆäËûÇå¾²Íþв¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²Ñо¿Ö°Ô±ºÍ 2021 ÄêÈ«ÇòýÌåÊӲ죬£¬Pegasus Òѱ»ÓÃÀ´¹¥»÷ 50 ¸ö¹ú¼ÒµÄ 1,000 ¶àÈË£¬£¬ÆäÖаüÀ¨»î¸ÐÈËÊ¿ºÍ¼ÇÕß¡£¡£¡£¡£¡£Î÷°àÑÀÓÚ 2022 Äê 5 ÔÂÐû²¼£¬£¬Ô׺âÅåµÂÂÞ¡¤É£ÇÐ˹¼°ÆäÈýÃû²¿³¤£¬£¬°üÀ¨¹ú·À²¿³¤ºÍÄÚÕþ²¿³¤£¬£¬ÒѳÉΪPegasus ÌØ¹¤Èí¼þµÄÄ¿µÄ¡£¡£¡£¡£¡£Óɴ˱¬·¢µÄ˾·¨ÊÓ²ìÒòδÄÜÈ¡µÃЧ¹û¶øÔÝʱÆú¾è¡£¡£¡£¡£¡£
https://www.securityweek.com/spain-reopens-a-probe-into-a-pegasus-spyware-case-after-a-french-request-to-work-together/
4. ºÚ¿ÍÐ®ÖÆ·À²¡¶¾¸üÐÂÒÔ·Ö·¢ºóÃźÍÍÚ¿óGuptiMiner
4ÔÂ23ÈÕ£¬£¬³¯ÏʺڿÍÒ»Ö±ÔÚʹÓà eScan ·À²¡¶¾Èí¼þµÄ¸üлúÖÆÔÚ´óÐÍÆóÒµÍøÂçÉÏÖ²ÈëºóÃÅ£¬£¬²¢Í¨¹ý GuptiMiner ¶ñÒâÈí¼þÈö²¥¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½« GuptiMiner ÐÎòΪ¸ß¶ÈÖØ´óµÄÍþв£¬£¬Ëü¿ÉÒÔÏò¹¥»÷ÕßµÄ DNS ЧÀÍÆ÷Ö´ÐÐ DNS ÇëÇ󣬣¬´ÓͼÏñÖÐÌáÈ¡ÓÐÓøºÔØ£¬£¬¶ÔÆäÓÐÓøºÔؾÙÐÐÊðÃû£¬£¬²¢Ö´ÐÐ DLL ²àÃæ¼ÓÔØ¡£¡£¡£¡£¡£GuptiMiner ±³ºóµÄÍþвÐÐΪÕß¾ßÓÐÖÐÐĵÐÊÖ (AitM) µÄְ룬£¬¿ÉÒÔÐ®ÖÆÕý³£µÄ²¡¶¾½ç˵¸üаü£¬£¬²¢½«ÆäÌæ»»ÎªÃûΪ¡°updll62.dlz¡±µÄ¶ñÒâ°ü¡£¡£¡£¡£¡£¸Ã¶ñÒâÎļþ°üÀ¨ÐëÒªµÄ·À²¡¶¾¸üÐÂÒÔ¼°ÃûΪ¡°version.dll¡±µÄ DLL ÎļþÐÎʽµÄ GuptiMiner ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£eScan ¸üгÌÐòÕý³£´¦Öóͷ£¸Ã°ü£¬£¬½âѹ²¢Ö´ÐÐËü¡£¡£¡£¡£¡£Ôڴ˽׶Σ¬£¬DLL ÓÉ eScan µÄÕýµ±¶þ½øÖÆÎļþÅÔ¼ÓÔØ£¬£¬´Ó¶ø¸¶Óë¶ñÒâÈí¼þϵͳ¼¶È¨ÏÞ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-hijack-antivirus-updates-to-drop-guptiminer-malware/
5. Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Ãé×¼º«¹ú¹ú·À³Ð°üÉÌ
4ÔÂ23ÈÕ£¬£¬º«¹ú¹ú¼Ò¾¯Ô±ÌüÖÒÑԳƣ¬£¬Ó볯ÏÊÓйصÄÍþвÐÐΪÕßÕýÒÔ¹ú·À¹¤ÒµÊµÌåΪĿµÄ£¬£¬ÇÔÈ¡¹ú·ÀÊÖÒÕÐÅÏ¢¡£¡£¡£¡£¡£¾Ýº«¹ú¹ú¼Ò¾¯Ô±Ìü±¨µÀ£¬£¬Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Lazarus¡¢AndarielºÍKimsuky¹¥»÷Á˺«¹ú¶à¼Ò¹ú·ÀÏà¹ØµÄ¹«Ë¾¡£¡£¡£¡£¡£¾¯Ô±ÌüºÍ¹ú·À²É¹ºÍýÏëÖÎÀí¾Ö£¨DAPA£©¶ÔÄ¿µÄ×éÖ¯µÄÇéÐξÙÐÐÁËһϵÁÐÌØÊâ¼ì²é¡£¡£¡£¡£¡£ÁªºÏ¼ì²éÓÚ1ÔÂ15ÈÕÖÁ2ÔÂ16ÈÕ¾ÙÐУ¬£¬ÊÜÓ°Ïì×é֯ʵÑéÁË·À»¤²½·¥¡£¡£¡£¡£¡£¾¯·½ÌåÏÖ£¬£¬ÕâЩϮ»÷ÊÇÒÔÖÜȫսÕùµÄÐÎʽ¾ÙÐе쬣¬¶à¸ö APT ×éÖ¯¼ÓÈëÆäÖС£¡£¡£¡£¡£Õþ¸®×¨¼ÒÖÒÑÔ˵£¬£¬¹¥»÷Õß½ÓÄÉÁËÖØ´óµÄºÚ¿ÍÊÖÒÕ¡£¡£¡£¡£¡£º«¹ú¹ú¼Ò¾¯Ô±ÌüÌṩÁ˲î±ð APT ×é֯ʵÑéµÄ¶à´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£
https://securityaffairs.com/162193/apt/north-korea-south-korean-defense-contractors.html
6. ÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°¶à¼Ò»ú¹¹µÄϵͳÔâµ½ºÚ¿Í¹¥»÷
4ÔÂ23ÈÕ£¬£¬ËÄÃûÒÁÀʺڿÍÔÚÂü¹þ¶ÙÁª°î·¨Ôº±»ÆðËߣ¬£¬±»Ö¸¿ØÕë¶ÔÃÀ¹úÕþ¸®²¿·Ö¡¢¹ú·À³Ð°üÉ̺Í˽Ӫ¹«Ë¾¿ªÕ¹ÖØ´óµÄÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£ÏÖÔÚÈÔÔÚÌӵı»¸æ±»Ö¸¿ØÕë¶ÔÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°Ê®¼¸¼ÒÄܹ»»ñÈ¡¹ú·ÀÏà¹ØÐÅÏ¢µÄÃÀ¹ú˽Ӫ¹«Ë¾µÄÒªº¦ÏµÍ³¾ÙÐй¥»÷¡£¡£¡£¡£¡£Ë¾·¨²¿Ö¸ÔðºÚ¿ÍʹÓÃÌØÁíÍâÉç»á¹¤³ÌÊÖÒÕ£¬£¬°üÀ¨Ã°³äÅ®ÐÔÀ´»ñÈ¡Êܺ¦ÕßµÄÐÅÈΡ£¡£¡£¡£¡£Æ¾Ö¤Î´ÃÜ·âµÄÆðËßÊ飬£¬¸ÃºÚ¿Í×éÖ¯µÄ¹¥»÷µÄÊܺ¦ÕßÖ÷ÒªÊǾÓÉÔÊÐíµÄ¹ú·À³Ð°üÉÌ£¬£¬ÕâЩ¹«Ë¾ÒÑ»ñµÃÃÀ¹ú¹ú·À²¿µÄÇå¾²ÔÊÐí£¬£¬¿ÉÒÔ»á¼û¡¢ÎüÊպʹ洢ÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¸Ã×éÖ¯»¹±»Ö¸¿ØÕë¶ÔÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄ»á¼ÆÊ¦ÊÂÎñËùºÍÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄÂùݹ«Ë¾¡£¡£¡£¡£¡£ÔÚÆðËßÊéÆô·âµÄͬʱ£¬£¬ÃÀ¹ú¹úÎñÔº»¹Ðû²¼ÐüÉÍ 1000 ÍòÃÀÔª£¬£¬½±ÀøÌṩÏßË÷×¥»ñËûÃÇ£¬£¬²ÆÎñ²¿»¹¶ÔÉæ°¸Ð¡ÎÒ˽¼ÒʵÑéÁËÖÆ²Ã¡£¡£¡£¡£¡£
https://www.securityweek.com/10-million-bounty-on-iranian-hackers-for-cyber-attacks-on-us-gov-defense-contractors/


¾©¹«Íø°²±¸11010802024551ºÅ