¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý
Ðû²¼Ê±¼ä 2023-02-09
¾ÝýÌå2ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬Cybernews·¢Ã÷ÁËÒ»¸ö̻¶µÄÊý¾Ý¿â£¬£¬£¬£¬£¬°üÀ¨1.1TBÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ1ÔÂ24ÈÕ·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬²¢½«Æä¹éÒòÓÚ¶íÂÞ˹µçÆø¹¤³Ì¹«Ë¾ElevelÆìϵÄÔÚÏßÊÐËÁe.way¡£¡£¡£¡£¡£¡£¡£¡£Õâ¸öÊý¾Ý¿â°üÀ¨700ÍòÌõÊý¾Ý£¬£¬£¬£¬£¬Ð¹Â¶ÁËÁ½ÄêµÄ¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍËÍ»õµØµãµÈ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ëü°üÀ¨ÒÔURL±àÂëµÄµÇ¼Êý¾ÝºÍÃÜÂ룬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ½ÏÈõµÄ±£»£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬ºÜÈÝÒ×±»½âÂë¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Êý¾Ý¿âÒѾÎÞ·¨»á¼û£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÉÐδ×ö³ö»ØÓ¦¡£¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/privacy/russian-e-commerce-giant-data-leak/
2¡¢NodariaʹÓöñÒâÐÅÏ¢ÇÔÈ¡³ÌÐòGraphiron¹¥»÷ÎÚ¿ËÀ¼
SymantecÔÚ2ÔÂ8ÈÕ³ÆÆä·¢Ã÷¶íÂÞ˹NodariaʹÓÃÐÂÐͶñÒâÈí¼þGraphiron¹¥»÷ÎÚ¿ËÀ¼µÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£×îÔçµÄ¹¥»÷¿É×·Ëݵ½2022Äê10Ô£¬£¬£¬£¬£¬²¢ÖÁÉÙÒ»Á¬µ½2023Äê1ÔÂÖÐÑ®¡£¡£¡£¡£¡£¡£¡£¡£GraphironÊÇÓÃGo¿ª·¢µÄ£¬£¬£¬£¬£¬ÓÉdownloaderºÍpayload×é³É£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÇÔȡϵͳÐÅÏ¢¡¢Æ¾Ö¤¡¢ÆÁÄ»½ØÍ¼ºÍÎļþµÈ¶àÖÖÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£GraphironÓë¾ÉµÄNodaria¹¤¾ß£¨ÀýÈçGraphSteelºÍGrimPlant£©ÓÐһЩÏàËÆÖ®´¦¡£¡£¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬ÓëÔçÆÚµÄ¶ñÒâÈí¼þÒ»Ñù£¬£¬£¬£¬£¬GraphironʹÓö˿Ú443ÓëC&CЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬²¢Ê¹ÓÃAESÃÜÂë¶ÔͨѶ¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer
3¡¢Sophos½üÆÚ·¢Ã÷ͨ¹ý¶ñÒâOneNotÎļþ·Ö·¢QBotµÄ»î¶¯
¾Ý2ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÐÂÒ»ÂÖQakNote¹¥»÷»î¶¯Ê¹ÓÃMicrosoft OneNoteÎļþ·Ö·¢¶ñÒâÈí¼þQBot¡£¡£¡£¡£¡£¡£¡£¡£1ÔÂ31ÈÕ×îÏÈ£¬£¬£¬£¬£¬QBotµÄÔËÓªÖ°Ô±×îÏÈÊÔÑéÕâÖÖеķַ¢ÒªÁ죬£¬£¬£¬£¬Ê¹ÓÃOneNoteÎļþ£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öǶÈëµÄHTMLÓ¦ÓóÌÐò£¨HTAÎļþ£©£¬£¬£¬£¬£¬¿ÉÒÔ¼ìË÷µ½QBot¶ñÒâÈí¼þµÄpayload¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬QBot payload½«×ÔÉí×¢ÈëWindows¸¨ÖúÊÖÒÕÖÎÀí³ÌÐò£¨¡°AtBroker.exe¡±£©ÒÔÈÆ¹ýAV¹¤¾ßµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬£¬£¬Sophos½¨ÒéÖÎÀíÔ±×èÖ¹ËùÓÐ.oneÎļþ£¬£¬£¬£¬£¬ÓÉÓÚËüÃÇͨ³£²»×÷Ϊ¸½¼þ·¢ËÍ¡£¡£¡£¡£¡£¡£¡£¡£
https://news.sophos.com/en-us/2023/02/06/qakbot-onenote-attacks/
4¡¢Medusa½©Ê¬ÍøÂç»Ø¹éÐÂÔöÀÕË÷Èí¼þºÍ±©Á¦ÆÆ½âÄ£¿£¿£¿£¿£¿é
ýÌå2ÔÂ7Èճƣ¬£¬£¬£¬£¬»ùÓÚMirai´úÂëµÄаæDDoS½©Ê¬ÍøÂçMedusa·ºÆð£¬£¬£¬£¬£¬¾ßÓÐÀÕË÷Èí¼þÄ£¿£¿£¿£¿£¿éºÍTelnet±©Á¦ÆÆ½â³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£MedusaµÄÀÕË÷Èí¼þÄ£¿£¿£¿£¿£¿éʹÓÃ256λAES¼ÓÃÜÎļþ£¬£¬£¬£¬£¬µ«¼ÓÃÜÒªÁìËÆºõÒÑË𻵣¬£¬£¬£¬£¬½«ÀÕË÷Èí¼þÄð³ÉÁËÊý¾Ý²Á³ý³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ö»ÓÐÔÚɾ³ýÎļþºó£¬£¬£¬£¬£¬Ëü²Å»áÏÔʾһ¸öÒªÇó0.5 BTCµÄÊê½ð¼Í¼¡£¡£¡£¡£¡£¡£¡£¡£ÕâËÆºõÊÇÓÐÎÊÌâµÄ£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÍƲâбäÌå»ò´Ë¹¦Ð§ÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£¡£¡£¡£¡£±©Á¦ÆÆ½â¹¦Ð§¿ÉÕë´ºÁªÍø×°±¸ÊµÑé³£ÓõÄÓû§ÃûºÍÃÜÂ룬£¬£¬£¬£¬ÔÚ½¨ÉèTelnetÅþÁ¬ºó£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áʹÓÃÖ÷ÒªµÄMedusa payloadѬȾϵͳ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/
5¡¢AhnlabÅû¶ʹÓÃ˽ÈËHTS·Ö·¢Quasar RATµÄ»î¶¯
AhnlabÓÚ2ÔÂ8ÈÕÅû¶Á˽üÆÚͨ¹ý˽È˼ÒÍ¥ÉúÒâϵͳ£¨HTS£©·¢Ã÷Quasar RATµÄ·Ö·¢»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£HTSÒ»ÖÖʹͶ×ÊÕßʹÓüÒÍ¥»ò°ì¹«ÊÒPC¾ÙÐÐ¹ÉÆ±ÉúÒâµÄϵͳ£¬£¬£¬£¬£¬¶øÎÞÐè»á¼û¹ÉƱÉúÒ⹫˾»ò´òµç»°¡£¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸ö×°ÖõijÌÐòÊÇNSIS×°ÖóÌÐòHPlusSetup.exe£¬£¬£¬£¬£¬Asset.exeÊÇ×°ÖúóÖ´ÐеĵÚÒ»¸ö³ÌÐò£¬£¬£¬£¬£¬ºóÕß¼ÈÊÇÆô¶¯³ÌÐòÓÖÊǸüгÌÐò¡£¡£¡£¡£¡£¡£¡£¡£HPlusSocketManager20221208.exe»áÆô¶¯vbc.exe²¢×¢ÈëQuasar RAT¡£¡£¡£¡£¡£¡£¡£¡£
https://asec.ahnlab.com/en/47283/
6¡¢Outpost24Ðû²¼2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ
2ÔÂ7ÈÕ£¬£¬£¬£¬£¬Outpost24Ðû²¼ÁË2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê×ܹ²¼ì²âµ½ÖÖÖÖÀÕË÷ÍÅ»ïÔÚDLSÉÏ×ܹ²Åû¶ÁË2363¸ö×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£×î»îÔ¾µÄÀÕË÷ÍÅ»ïΪLockBit¡¢BlackCat¡¢ContiºÍHiveµÈ£¬£¬£¬£¬£¬ÆäÖÐLockBit¶ÔÎôʱ34%µÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬Æ½¾ùÿÔÂÔ¼67´Î¡£¡£¡£¡£¡£¡£¡£¡£ÉÌÒµºÍÉÌÒµÏà¹Ø¹«Ë¾ÊÜÀÕË÷¹¥»÷µÄÓ°Ïì×î´ó£¬£¬£¬£¬£¬ÈçÉÌÒµÉèÊ©¡¢½ðÈÚ¡¢ÐÞ½¨¡¢Ö´·¨ÒÔ¼°Åú·¢ÁãÊÛÐÐÒµ£¬£¬£¬£¬£¬ÕâÅú×¢¹¥»÷ÕßÖ÷ÒªÕë¶Ô¾ßÓиü¸ßÖ§¸¶ÄÜÁ¦µÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£ÔÚµØÀíÂþÑÜ·½Ã棬£¬£¬£¬£¬½öÃÀ¹ú¾ÍÕ¼42%£¬£¬£¬£¬£¬¶øÅ·ÖÞ¹ú¼ÒÔ¼Õ¼28%¡£¡£¡£¡£¡£¡£¡£¡£
https://outpost24.com/blog/ransomware-report-2023


¾©¹«Íø°²±¸11010802024551ºÅ