BlackCat¹¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

Ðû²¼Ê±¼ä 2022-08-02
1¡¢BlackCat³ÆÒѹ¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

      

¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCatÉù³Æ¶ÔÉÏÖÜÖÐÅ·¹ú¼Ò×ÔÈ»Æø¹ÜµÀºÍµçÁ¦ÍøÂçÔËÓªÉÌCreos Luxembourg SAµÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£CreosÊÇ5¸öÅ·ÓѰî¼ÒµÄÄÜÔ´¹©Ó¦ÉÌ£¬ £¬£¬£¬£¬Æäĸ¹«Ë¾EncevoÓÚ7ÔÂ25ÈÕ͸¶£¬ £¬£¬£¬£¬ËûÃÇÔÚ7ÔÂ22ÈÕÖÁ23ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£¹¥»÷µ¼ÖÂEncevoºÍCreosµÄ¿Í»§ÃÅ»§ÎÞ·¨»á¼û£¬ £¬£¬£¬£¬µ«Ð§ÀͲ¢Î´ÖÐÖ¹¡£¡£¡£¡£BlackCatÓÚÉÏÖÜÁù½«CreosÌí¼Óµ½ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾£¬ £¬£¬£¬£¬²¢ÍþвҪ¹ûÕæ180000¸ö͵ȡµÄÎļþ£¬ £¬£¬£¬£¬×ܾÞϸΪ150GB£¬ £¬£¬£¬£¬Éæ¼°ÌõÔ¼¡¢Ð­Òé¡¢»¤ÕÕ¡¢Õ˵¥ºÍµç×ÓÓʼþµÈÄÚÈÝ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/


2¡¢Group-IB·¢Ã÷ÓÉÉÏÍò¸öÓò×é³ÉÕë¶ÔÅ·ÖÞµÄÐéαͶ×ÊȦÌ×

      

Group-IBÔÚ7ÔÂ29ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÓÉ11000¶à¸öÓò×é³ÉµÄÖØ´óÍøÂ磬 £¬£¬£¬£¬ÓÃÓÚÏòÅ·ÖÞµÄÓû§¾ÙÐÐÐéαͶ×ÊÕ©Æ­»î¶¯¡£¡£¡£¡£ÕâЩƽ̨ʹÓÃαÔìµÄÖ¸»Ö¤¾ÝºÍÃûÈË´úÑÔ£¬ £¬£¬£¬£¬ÓªÔì³öÕýµ±µÄÐÎÏó²¢ÒýÓÕ¸ü¶àÄ¿µÄ¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÒÔ»ñµÃ¸ß»Ø±¨Í¶×ʵÄʱ»úΪÓÕ¶ü£¬ £¬£¬£¬£¬Ëµ·þÄ¿µÄ´æÈëÖÁÉÙ250Å·ÔªÀ´×¢²áЧÀÍ¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬Áè¼Ý5000¸ö¶ñÒâÓòÈÔÈ»´¦Óڻ״̬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢±ÈÀûʱ¡¢µÂ¹ú¡¢ºÉÀ¼¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Å²Íþ¡¢ÈðµäºÍ½Ý¿Ë¹²ºÍ¹ú¡£¡£¡£¡£


https://blog.group-ib.com/investment-scams-europe


3¡¢LockBit¿ÉʹÓÃWindows DefenderÀ´¼ÓÔØCobalt Strike

      

Sentinel LabsÔÚ7ÔÂ28ÈÕ͸¶£¬ £¬£¬£¬£¬LockBitʹÓÃMicrosoft DefenderµÄMpCmdRun.exeÀ´½âÃܲ¢×°ÖÃCobalt Strike¡£¡£¡£¡£MpCmdRun.exeÊÇWindows DefenderµÄÏÂÁîÐй¤¾ß£¬ £¬£¬£¬£¬Ö´ÐÐʱ£¬ £¬£¬£¬£¬Ëü½«¼ÓÔØÃûΪmpclient.dllµÄÕýµ±DLL¡£¡£¡£¡£¹¥»÷Õß¿ª·¢ÁËÎäÆ÷»¯µÄmpclient.dll£¬ £¬£¬£¬£¬²¢½«Æä·ÅÔÚÓÅÏȼÓÔØ¶ñÒâDLLÎļþµÄλÖ㬠£¬£¬£¬£¬Ö´ÐеĴúÂë´Óc0000015.logÎļþ½âÃܲ¢¼ÓÔØCobalt Strike payload¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬Éв»ÇåÎúLockBitΪºÎ´ÓʹÓÃVMwareÇл»µ½Ê¹ÓÃWindows DefenderÏÂÁîÐй¤¾ßÀ´¼ÓÔØCobalt Strike¡£¡£¡£¡£


https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/


4¡¢Ñо¿ÍŶӷ¢Ã÷ͳ³ÆÎªDawDropperµÄ¶à¸ö¶ñÒâÈí¼þ·Ö·¢Ä¾Âí

      

Trend MicroÔÚ7ÔÂ29ÈÕÐû²¼±¨¸æ£¬ £¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËÒ»Æð¶ñÒâ»î¶¯£¬ £¬£¬£¬£¬Ê¹ÓÃGoogle PlayÊÐËÁÖеÄ17¸ö¿´ËÆÎÞº¦µÄAndroid dropper£¨Í³³ÆÎªDawDropper£©À´·Ö·¢ÒøÐÐľÂí¡£¡£¡£¡£ÕâЩӦÓÃαװ³ÉÀýÈçÎĵµÉ¨Ã蹤¾ß¡¢VPNЧÀÍ¡¢¶þάÂëɨÃ蹤¾ßºÍͨ»°¼Í¼¹¤¾ßµÈ¡£¡£¡£¡£DawDropperʹÓõÚÈý·½ÔÆÐ§ÀÍFirebaseʵʱÊý¾Ý¿âÀ´Èƹý¼ì²â²¢¶¯Ì¬»ñµÃpayloadµÄÏÂÔØµØµã£¬ £¬£¬£¬£¬Ëü»¹ÔÚGitHubÉÏÍйܶñÒâpayload¡£¡£¡£¡£Æ¾Ö¤ÊӲ죬 £¬£¬£¬£¬DawDropperµÄ±äÌå¿ÉÒÔ·Ö·¢4ÖÖÀàÐ͵ÄÒøÐÐľÂí£¬ £¬£¬£¬£¬°üÀ¨Octo¡¢Hydra¡¢ErmacºÍTeaBot¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/g/examining-new-dawdropper-banking-dropper-and-daas-on-the-dark-we.html


5¡¢ÃÀ¹úFCCÌáÐÑÖ¼ÔÚÇÔÊØÐÅÏ¢»ò½ðÈÚÕ©Æ­µÄÍøÂç¹¥»÷ÔöÌí

      

¾Ý8ÔÂ1ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ÃÀ¹úÁª°îͨѶίԱ»á(FCC)ÌáÐÑ£¬ £¬£¬£¬£¬Ô½À´Ô½¶àµÄSMS´¹ÂڻÊÔͼÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿î×Ó¡£¡£¡£¡£´ËÀ๥»÷Ò²³ÆÎªsmishing»òrobotsexts£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÖÖÖÖ·½·¨ÓÕʹĿµÄ½»³öÉñÃØÐÅÏ¢¡£¡£¡£¡£FCC³Æ½üÄêÀ´¶ÔÀ¬»ø¶ÌÐŵÄͶËßÊýÄ¿ÎȲ½ÉÏÉý£¬ £¬£¬£¬£¬´Ó2019ÄêµÄÔ¼5700Æð¡¢2020ÄêµÄ14000Æð¡¢2021ÄêµÄ15300Æðµ½2022Äê6ÔÂ30ÈÕµÄ8500Æð¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬¾ÝһЩ×ÔÁ¦±¨¸æÔ¤¼Æ£¬ £¬£¬£¬£¬Ã¿ÔÂÓÐÊýÊ®ÒÚÌõrobotext£¬ £¬£¬£¬£¬ÈçRoboKillerÔ¤¼ÆÓû§ÔÚ6Ô·ÝÊÕµ½ÁËÁè¼Ý120ÒÚÌõrobotext¡£¡£¡£¡£


https://securityaffairs.co/wordpress/133865/cyber-crime/fcc-warns-smishing-attacks.html


6¡¢KasperskyÐû²¼2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ 

      

7ÔÂ28ÈÕ£¬ £¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÇý¶¯Á¦Ö®Ò»£¬ £¬£¬£¬£¬¶ø¾­¼ÃÀûÒæÊÇAPT¹¥»÷±³ºóµÄÒ»Á¬ÄîÍ·Ö®Ò»¡£¡£¡£¡£2021Äê·¢Ã÷ÁËÁ½¸öUEFIÖ²Èë³ÌÐò£¬ £¬£¬£¬£¬±¾¼¾¶È·¢Ã÷ÁËÁíÒ»¸ö¶ñÒâUEFI×é¼þCosmicStrand¡£¡£¡£¡£±¨¸æ»¹ÏÈÈÝÁËÕâÒ»¼¾¶ÈµÄAPT¹¥»÷»î¶¯£¬ £¬£¬£¬£¬°üÀ¨¶íÂÞ˹UNC1151Õë¶ÔÅ·ÖÞÕþ¸®»ú¹¹·Ö·¢Ä¾ÂíSunseed£»£» £»£»£»Storm CloudÍÅ»ïʹÓÃGimmick¹¥»÷macOSÓû§£»£» £»£»£»TransparentTribe¶ÔÓ¡¶ÈÕþ¸®ÊÂÇéÖ°Ô±¾ÙÐÐÐÂÒ»ÂÖµÄÌØ¹¤¹¥»÷µÈ¡£¡£¡£¡£


https://securelist.com/apt-trends-report-q2-2022/106995/