ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð

Ðû²¼Ê±¼ä 2022-05-20

1¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð


¾ÝýÌå5ÔÂ18ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¡£¡£¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬£¬ £¬£¬ £¬£¬5ÔÂ9ÈÕÆä²¿·ÖITϵͳ±¬·¢ÁËÖÐÖ¹£¬£¬ £¬£¬ £¬£¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬£¬ £¬£¬ £¬£¬¿ÉÄÜÔ´ÓÚÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£ËäÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐ͸¶¹¥»÷µÄϸ½Ú£¬£¬ £¬£¬ £¬£¬µ«Ñо¿Ö°Ô±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬£¬ £¬£¬ £¬£¬¸ÃÍÅ»ïÉù³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£ÒøÐеÄÊÖÒÕ×ܼàÌåÏÖ£¬£¬ £¬£¬ £¬£¬ËûÃÇÀֳɱ£»£»£» £»£»£»£»¤Á˽¹µãϵͳ£¬£¬ £¬£¬ £¬£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬£¬ £¬£¬ £¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/


2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢


5ÔÂ18ÈÕ£¬£¬ £¬£¬ £¬£¬ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)¹ûÕæÁËÓйØ1Ô·ݷ¢Ã÷µÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚWebÓ¦ÓÃÖдæ±à³Ì´úÂë¹ýʧ£¬£¬ £¬£¬ £¬£¬µ¼ÖÂÊܱ£»£»£» £»£»£»£»¤ÇøÓò¿ÉÒÔ±»»á¼û£¬£¬ £¬£¬ £¬£¬Éæ¼°Áè¼Ý180Íò¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¾­ÓÉÊÓ²ìÈ·¶¨£¬£¬ £¬£¬ £¬£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂʱ´ú£¬£¬ £¬£¬ £¬£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»ÍⲿְԱ»á¼û£¬£¬ £¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÓйØÎ£Ïպ͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¡£¡£¡£¸Ã»ú¹¹´ËǰÌåÏÖ£¬£¬ £¬£¬ £¬£¬ÒѾ­ÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£¡£¡£¡£


https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/


3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ


Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2017Äê×îÏÈ»îÔ¾£¬£¬ £¬£¬ £¬£¬ÔÚÈ¥ÄêÑ×ÌìÊ״α»·¢Ã÷¡£¡£¡£¡£´Ë´Î»î¶¯Í¨¹ý´¹ÂÚÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£¡£¡£¡£ÎäÆ÷¿â°üÀ¨Òþ²ØÔÚÓÕ¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ³ÌÐò¡¢Òѱ£´æ¶àÄêÇÒÂÔ΢Ð޸ĵĺóÃÅ¡¢PlugXºÍ¶¨ÖƺóÃÅPcShare¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬£¬ £¬£¬ £¬£¬ÒÔ¼°3¸öеÄÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£¡£¡£¡£


https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/


4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%


5ÔÂ19ÈÕ£¬£¬ £¬£¬ £¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÔÚÒÑÍùµÄ6¸öÔÂÖУ¬£¬ £¬£¬ £¬£¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£¡£¡£¡£XorDdosÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬ £¬£¬ £¬£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ¾Ü¾øÐ§À͹¥»÷£¬£¬ £¬£¬ £¬£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÖÆºÍ¼á³Ö³¤ÆÚÐÔµÄÕ½ÂÔ£¬£¬ £¬£¬ £¬£¬Ê¹ÆäÄÑÒÔ±»É¨³ý¡£¡£¡£¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯ÖÐÊӲ쵽£¬£¬ £¬£¬ £¬£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½ÚÁýÕÖÃô¸ÐÎļþÀ´Òþ²Ø¶ñÒâ»î¶¯ÒÔ±ÜÃâ±»ÆÊÎö¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬³ýÁËÌᳫDDoS¹¥»÷Í⣬£¬ £¬£¬ £¬£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬ £¬£¬ £¬£¬ÈçºóÃÅTsunami¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/


5¡¢CISAºÍMS-ISACÐû²¼Ê¹ÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ


5ÔÂ18ÈÕ£¬£¬ £¬£¬ £¬£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Á˹ØÓÚʹÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ¡£¡£¡£¡£F5ÓÚ5ÔÂ4ÈÕÐû²¼ÁËÕë¶ÔÎó²îCVE-2022-1388µÄ²¹¶¡£¬£¬ £¬£¬ £¬£¬½ñЧ¹ûÕæÁËPOCÎó²îʹÓ㬣¬ £¬£¬ £¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØµã»ñµÃÄ¿µÄϵͳµÄ¿ØÖÆÈ¨¡£¡£¡£¡£Æ¾Ö¤¹ûÕæ±¨¸æ£¬£¬ £¬£¬ £¬£¬¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£Ç徲ͨ¸æÌṩÁËÎó²îµÄÊÖÒÕϸ½Ú¡¢¼ì²âÒªÁì¡¢ÊÂÎñÏìÓ¦»ººÍ½â²½·¥£¬£¬ £¬£¬ £¬£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§Ê¹ÓøÃÖ¸ÄÏ×ÊÖú×éÖ¯µÖÓù´ËÀ๥»÷¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/alerts/aa22-138a


6¡¢PRODAFTÐû²¼¹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ


PRODAFTÔÚ5ÔÂ16ÈÕÐû²¼Á˹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ£¬£¬ £¬£¬ £¬£¬Õ¹ÏÖÁËÆä×éÖ¯½á¹¹ºÍÄîÍ·¡£¡£¡£¡£Wizard SpiderµÄ´ó²¿·ÖÄ¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú£¬£¬ £¬£¬ £¬£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛֵĿµÄ£¬£¬ £¬£¬ £¬£¬²¢½«»ñµÃµÄ²¿·Ö×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¡£¡£¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹Âڻ£¬£¬ £¬£¬ £¬£¬ÓÐʱҲʹÓÃBEC¹¥»÷¡£¡£¡£¡£Ò»µ©Àֳɣ¬£¬ £¬£¬ £¬£¬¾Í»á×°ÖÃCobalt Strike£¬£¬ £¬£¬ £¬£¬²¢ÊµÑé»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬£¬ £¬£¬ £¬£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍÊðÀíÀ´Òþ²ØÆä×Ù¼££¬£¬ £¬£¬ £¬£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºóÏÅ»£Ä¿µÄ£¬£¬ £¬£¬ £¬£¬ÆÈʹÆä¸¶¿î¡£¡£¡£¡£


https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/