LockBit³ÆÒÑÇÔÈ¡×Éѯ¹«Ë¾Kearney & CompanyÊý¾Ý

Ðû²¼Ê±¼ä 2022-11-08
1¡¢LockBit³ÆÒÑÇÔÈ¡×Éѯ¹«Ë¾Kearney & CompanyµÄÊý¾Ý

¾Ý11ÔÂ6ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ £¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÒÑÇÔÈ¡×ÉѯºÍITЧÀÍÌṩÉÌKearney & CompanyµÄÊý¾Ý¡£¡£¡£¡£¡£LockBitÓÚ11ÔÂ5ÈÕ½«¸Ã¹«Ë¾Ìí¼Óµ½±»¹¥»÷Ãûµ¥ÖУ¬£¬£¬ £¬£¬ £¬£¬²¢ÍþвÈôÊDz»¸¶Êê½ð£¬£¬£¬ £¬£¬ £¬£¬ËûÃǽ«ÔÚ2022Äê11ÔÂ26ÈÕ֮ǰÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ £¬£¬ÀÕË÷ÍÅ»ïÒѾ­¹ûÕæÁËÒ»·Ý±»µÁÊý¾ÝµÄÑù±¾£¬£¬£¬ £¬£¬ £¬£¬ÆäÖаüÀ¨²ÆÎñÎļþ¡¢ÌõÔ¼¡¢É󼯱¨¸æºÍÕ˵¥ÎļþµÈ¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïÒªÇóÖ§¸¶200ÍòÃÀÔªÒÔÏú»ÙÊý¾Ý£¬£¬£¬ £¬£¬ £¬£¬²¢ÒªÇó1ÍòÃÀÔª½«¼ÆÊ±ÑÓÉì24Сʱ¡£¡£¡£¡£¡£

https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html

2¡¢Çå¾²¹¤¾ßurlscan.io»áÎÞÒâÖÐй¶Ãô¸ÐµÄURLºÍÊý¾Ý

¾ÝýÌå11ÔÂ7ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ £¬£¬Positive Security·¢Ã÷ÍøÕ¾É¨ÃèºÍÆÊÎöÒýÇæurlscan.io¿Éй¶Ãô¸ÐµÄURLºÍÊý¾Ý¡£¡£¡£¡£¡£Urlscan.io±»ÐÎòΪWebɳÏ䣬£¬£¬ £¬£¬ £¬£¬Í¨¹ýÆäAPI¼¯³Éµ½¶à¸öÇå¾²½â¾ö¼Æ»®ÖС£¡£¡£¡£¡£¼øÓÚ´ËAPIµÄ¼¯³ÉÀàÐÍÒÔ¼°Êý¾Ý¿âÖеÄÊý¾ÝÁ¿£¬£¬£¬ £¬£¬ £¬£¬Óдó×ÚµÄÊý¾Ý¿É±»ÄäÃûÓû§ËÑË÷ºÍ¼ìË÷¡£¡£¡£¡£¡£2Ô·ݵijõ³ÌÐò²é·¢Ã÷ÁËÊôÓÚÆ»¹ûÓòÃûµÄurl£¬£¬£¬ £¬£¬ £¬£¬ÆäÖÐһЩ»¹°üÀ¨¹²ÏíµÄiCloudÎļþºÍÈÕÀúÔ¼Çë»Ø¸´Á´½Ó¡£¡£¡£¡£¡£×îÖ÷ÒªµÄÊÇ£¬£¬£¬ £¬£¬ £¬£¬ÆÊÎö»¹·¢Ã÷ÉèÖùýʧµÄÇå¾²¹¤¾ß»á½«Í¨¹ýÓʼþÊÕµ½µÄËùÓÐÁ´½Ó×÷Ϊ¹«¹²É¨ÃèÌá½»¸øurlscan.io¡£¡£¡£¡£¡£

https://thehackernews.com/2022/11/experts-find-urlscan-security-scanner.html

3¡¢Avanan·¢Ã÷ʹÓÃMicrosoft Dynamics 365µÄ´¹Âڻ

AvananÔÚ11ÔÂ3ÈÕÅû¶ÁËÀÄÓÃMicrosoft Dynamics 365 Customer VoiceµÄ´¹Âڻ¡£¡£¡£¡£¡£¸Ã²úÆ·ÔÊÐí×éÖ¯»ñµÃ¿Í»§µÄ·´Ï죬£¬£¬ £¬£¬ £¬£¬ËüÖ÷ÒªÓÃÓÚ¾ÙÐпͻ§Öª×ã¶ÈÊӲ졣¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×ÔDynamics 365ÖеÄÊӲ칦Ч£¬£¬£¬ £¬£¬ £¬£¬·¢¼þÈ˵ĵصã°üÀ¨¡°Forms Pro¡±£¬£¬£¬ £¬£¬ £¬£¬ÕâÊÇÊӲ칦ЧµÄ¾É³Æ¡£¡£¡£¡£¡£¸ÃÐÂÎÅ֪ͨÊÕ¼þÈËÊÕµ½ÁËеÄÓïÒôÓʼþ£¬£¬£¬ £¬£¬ £¬£¬µã»÷²¥·ÅÓïÒôÓʼþºó£¬£¬£¬ £¬£¬ £¬£¬»á±»Öض¨Ïòµ½¿Ë¡MicrosoftµÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£Í¨¹ýʹÓÃCustomer VoiceÁ´½Ó£¬£¬£¬ £¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÇå¾²²½·¥¡£¡£¡£¡£¡£

https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links 

4¡¢Ñо¿ÍŶÓÅû¶Crimson KingsnakeÍÅ»ïµÄBEC¹¥»÷»î¶¯

¾ÝAbnormal Security 11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ £¬£¬ÐµÄCrimson KingsnakeÍÅ»ïÔÚBEC¹¥»÷ÖÐð³ä״ʦÊÂÎñËù¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê3ÔÂÊ״η¢Ã÷ÁËCrimson KingsnakeµÄ»î¶¯£¬£¬£¬ £¬£¬ £¬£¬²¢ÌåÏÖÒÑÈ·¶¨ÁË92¸öÏà¹ØÓò£¬£¬£¬ £¬£¬ £¬£¬ÕâЩÓò¶¼Ä£ÄâÁËÕæÕýµÄ״ʦÊÂÎñËùÍøÕ¾¡£¡£¡£¡£¡£¹¥»÷Õßð³ä״ʦ·¢ËÍÓâÆÚ¸¶¿îµÄ·¢Æ±£¬£¬£¬ £¬£¬ £¬£¬ÓÕÆ­Ä¿µÄÔ±¹¤¿ìËÙÖ§¸¶ÐéαµÄ·¢Æ±¡£¡£¡£¡£¡£µ±¹¥»÷ÕߵĻÓöµ½×èÁ¦Ê±£¬£¬£¬ £¬£¬ £¬£¬ËûÃÇ»¹»áµ÷½âÕ½ÂÔÀ´Ã°³äµÚ¶þ¸ö½ÇÉ«£ºÄ¿µÄ¹«Ë¾µÄ¸ß¹Ü£¬£¬£¬ £¬£¬ £¬£¬À´ÓÕʹԱ¹¤¼ÌÐø¸¶¿î¡£¡£¡£¡£¡£

https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks

5¡¢Å·ÖÞÍøÂçÇå¾²»ú¹¹ENISAÐû²¼2022ÄêÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ

Å·ÖÞÍøÂçÇå¾²»ú¹¹ENISAÔÚ11ÔÂ3ÈÕÐû²¼ÁËÆä2022ÄêENISAÍþÐ²Ì¬ÊÆ(ETL)±¨¸æ¡£¡£¡£¡£¡£ÕâÊÇÄê¶È±¨¸æµÄµÚ10°æ£¬£¬£¬ £¬£¬ £¬£¬ÆÊÎöÁË2021Äê7ÔÂÖÁ2022Äê7ÔÂʱ´ú±¬·¢µÄÊÂÎñ¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÈ«Çò×éÖ¯ÃæÁÙµÄ×îΣÏÕµÄÍþв֮һ£¬£¬£¬ £¬£¬ £¬£¬Ã¿ÔÂÓÐÁè¼Ý10 TBµÄÊý¾Ý±»µÁ£¬£¬£¬ £¬£¬ £¬£¬60%µÄÊÜÓ°Ïì×éÖ¯¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£¡£¡£¡£¡£2021ÄêÊӲ쵽66¸öÁãÈÕÎó²îÅû¶¡£¡£¡£¡£¡£ÍøÂç´¹ÂÚÈÔÈ»ÊÇÒ»ÖÖÊ¢ÐеÄÊÖÒÕ£¬£¬£¬ £¬£¬ £¬£¬ÏÖÔÚ·ºÆðÁËеĴ¹ÂÚ¹¥»÷ÐÎʽ£¬£¬£¬ £¬£¬ £¬£¬Èçspear-phishing¡¢whaling¡¢smishingºÍvishing¡£¡£¡£¡£¡£µÚÈý·½Çå¾²ÊÂÎñÕ¼2021ÄêÈëÇÖÊÂÎñµÄ17%£¬£¬£¬ £¬£¬ £¬£¬¶ø2020ÄêÊDz»µ½1%¡£¡£¡£¡£¡£

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022

6¡¢BlackBerryÐû²¼¹ØÓÚRomCom RAT·Ö·¢»î¶¯µÄÆÊÎö±¨¸æ

11ÔÂ2ÈÕ£¬£¬£¬ £¬£¬ £¬£¬BlackBerryÏêÊöÁËRomCom RATÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬ £¬£¬ £¬£¬¹¥»÷Õ߿ˡÁËSolarWinds Network Performance Monitor (NPM)¡¢KeePassÃÜÂëÖÎÀíÆ÷ºÍPDF Reader ProµÄ¹Ù·½ÏÂÔØÃÅ»§ÍøÕ¾£¬£¬£¬ £¬£¬ £¬£¬½«¶ñÒâÈí¼þαװ³ÉÕýµ±³ÌÐò¾ÙÐзַ¢¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇÔÚÆÊÎöÓëÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ¹¥»÷µ¼ÖµÄRomComRATѬȾÏà¹ØµÄ¹¤¼þʱ·¢Ã÷µÄ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬ £¬£¬Unit 42»¹·¢Ã÷ÁËÒ»¸öð³äVeeam Backup and RecoveryÈí¼þµÄÍøÕ¾¡£¡£¡£¡£¡£

https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass