ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð

Ðû²¼Ê±¼ä 2022-05-20

1¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð


¾ÝýÌå5ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¡£¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬£¬£¬£¬£¬5ÔÂ9ÈÕÆä²¿·ÖITϵͳ±¬·¢ÁËÖÐÖ¹£¬£¬£¬£¬£¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬£¬£¬£¬£¬¿ÉÄÜÔ´ÓÚÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£ËäÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐ͸¶¹¥»÷µÄϸ½Ú£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£ÒøÐеÄÊÖÒÕ×ܼàÌåÏÖ£¬£¬£¬£¬£¬ËûÃÇÀֳɱ£»£»£»£»£»¤Á˽¹µãϵͳ£¬£¬£¬£¬£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£


https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/


2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)¹ûÕæÁËÓйØ1Ô·ݷ¢Ã÷µÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚWebÓ¦ÓÃÖдæ±à³Ì´úÂë¹ýʧ£¬£¬£¬£¬£¬µ¼ÖÂÊܱ£»£»£»£»£»¤ÇøÓò¿ÉÒÔ±»»á¼û£¬£¬£¬£¬£¬Éæ¼°Áè¼Ý180Íò¹«ÃñµÄÐÅÏ¢¡£¡£¡£¾­ÓÉÊÓ²ìÈ·¶¨£¬£¬£¬£¬£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂʱ´ú£¬£¬£¬£¬£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»ÍⲿְԱ»á¼û£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÓйØÎ£Ïպ͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¡£¡£¸Ã»ú¹¹´ËǰÌåÏÖ£¬£¬£¬£¬£¬ÒѾ­ÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£¡£¡£


https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/


3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ


Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¸ÃÍÅ»ïÓÚ2017Äê×îÏÈ»îÔ¾£¬£¬£¬£¬£¬ÔÚÈ¥ÄêÑ×ÌìÊ״α»·¢Ã÷¡£¡£¡£´Ë´Î»î¶¯Í¨¹ý´¹ÂÚÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£¡£¡£ÎäÆ÷¿â°üÀ¨Òþ²ØÔÚÓÕ¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ³ÌÐò¡¢Òѱ£´æ¶àÄêÇÒÂÔ΢Ð޸ĵĺóÃÅ¡¢PlugXºÍ¶¨ÖƺóÃÅPcShare¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬£¬£¬£¬£¬ÒÔ¼°3¸öеÄÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£¡£¡£


https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/


4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%


5ÔÂ19ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÔÚÒÑÍùµÄ6¸öÔÂÖУ¬£¬£¬£¬£¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£¡£¡£XorDdosÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÖÆºÍ¼á³Ö³¤ÆÚÐÔµÄÕ½ÂÔ£¬£¬£¬£¬£¬Ê¹ÆäÄÑÒÔ±»É¨³ý¡£¡£¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯ÖÐÊӲ쵽£¬£¬£¬£¬£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½ÚÁýÕÖÃô¸ÐÎļþÀ´Òþ²Ø¶ñÒâ»î¶¯ÒÔ±ÜÃâ±»ÆÊÎö¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬³ýÁËÌᳫDDoS¹¥»÷Í⣬£¬£¬£¬£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÈçºóÃÅTsunami¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/


5¡¢CISAºÍMS-ISACÐû²¼Ê¹ÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Á˹ØÓÚʹÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ¡£¡£¡£F5ÓÚ5ÔÂ4ÈÕÐû²¼ÁËÕë¶ÔÎó²îCVE-2022-1388µÄ²¹¶¡£¡£¡£¬£¬£¬£¬£¬½ñЧ¹ûÕæÁËPOCÎó²îʹÓ㬣¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØµã»ñµÃÄ¿µÄϵͳµÄ¿ØÖÆÈ¨¡£¡£¡£Æ¾Ö¤¹ûÕæ±¨¸æ£¬£¬£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£Ç徲ͨ¸æÌṩÁËÎó²îµÄÊÖÒÕϸ½Ú¡¢¼ì²âÒªÁì¡¢ÊÂÎñÏìÓ¦»ººÍ½â²½·¥£¬£¬£¬£¬£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§Ê¹ÓøÃÖ¸ÄÏ×ÊÖú×éÖ¯µÖÓù´ËÀ๥»÷¡£¡£¡£


https://www.cisa.gov/uscert/ncas/alerts/aa22-138a


6¡¢PRODAFTÐû²¼¹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ


PRODAFTÔÚ5ÔÂ16ÈÕÐû²¼Á˹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ£¬£¬£¬£¬£¬Õ¹ÏÖÁËÆä×éÖ¯½á¹¹ºÍÄîÍ·¡£¡£¡£Wizard SpiderµÄ´ó²¿·ÖÄ¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú£¬£¬£¬£¬£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛֵĿµÄ£¬£¬£¬£¬£¬²¢½«»ñµÃµÄ²¿·Ö×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¡£¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹Âڻ£¬£¬£¬£¬£¬ÓÐʱҲʹÓÃBEC¹¥»÷¡£¡£¡£Ò»µ©Àֳɣ¬£¬£¬£¬£¬¾Í»á×°ÖÃCobalt Strike£¬£¬£¬£¬£¬²¢ÊµÑé»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍÊðÀíÀ´Òþ²ØÆä×Ù¼££¬£¬£¬£¬£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºóÏÅ»£Ä¿µÄ£¬£¬£¬£¬£¬ÆÈʹÆä¸¶¿î¡£¡£¡£


https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/