EmCareÔâºÚ¿ÍÈëÇÖ£»ÀÕË÷Èí¼þCryptoMixºÍInpivx£»¹¥»÷»î¶¯Aggah

°ä²¼¹¦·ò 2019-04-22
1.EmCareÔâºÚ¿ÍÈëÇÖ£¬Ô¼6ÍòÃû»¼Õß¼°Ô±¹¤µÄÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝEmCare¹«Ë¾°ä²¼µÄ²¼¸æ£¬¸Ã¹«Ë¾ÓÚ2ÔÂ19ÈÕÔâµ½ºÚ¿Í¹¥»÷£¬²¿ÃÅÔ±¹¤µÄÓÊÏäÕË»§Ôâµ½µÚÈý·½Î´ÊÚȨ½Ó¼û£¬Ô¼6ÍòÃûÔ±¹¤¡¢»¼Õß¼°³Ð°üÉ̵ÄÓ×ÎÒÐÅϢй¶£¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢´ºÇïÒÔ¼°Ò»Ð©»¼ÕßµÄÁÙ´²ÐÅÏ¢µÈ  ¡£Ä³Ð©Çé¿öÏ£¬Ò²Ô̺¬Éç»á°²È«ºÅÂëºÍ¼ÝÊ»ÅÆÕÕºÅÂë  ¡£ÊÜÓ°ÏìµÄ»¼ÕßÊýÁ¿Ô¼Îª3.1ÍòÈË  ¡£¸Ã¹«Ë¾°µÊ¾ÒÑΪÉç»á°²È«ºÅÂëºÍ¼ÝÊ»ÅÆÕÕºÅÂëй¶µÄ»¼ÕߺÍÔ±¹¤ÌṩÁËÉí·Ý±£»¤ºÍÐÅÓþ¼à¿Ø·þÎñ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bloomberg.com/news/articles/2019-04-20/kkr-s-emcare-says-patient-employee-personal-data-was-accessed-jupwipt7

2.ÀÕË÷Èí¼þCryptoMixбäÌå£¬ÖØÒªÍ¨¹ýÔ¶³Ì×ÀÃæ·þÎñ·Ö·¢

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÀÕË÷Èí¼þCryptoMixµÄбäÌåDLLÔÚÒ°±í»ý¼«´«²¼£¬¸Ã±äÌåͨ¹ýÈëÇÖÔ¶³Ì×ÀÃæ·þÎñ½øÐзַ¢£¬»¹»áÆôÓÃĬÈÏÖÎÀíÔ¹ØË»§²¢Åú¸ÄÃÜÂë  ¡£¸Ã±äÌåζÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.DLLÀ©´óÃû£¬ÆäÌØµãÔ̺¬Êê½ðµ¥¾ÝÎļþÃûΪ_HELP_INSTRUCTIONS_.TXT£¬²¢ÇÒʹÓÃdllteam@protonmail.com¡¢dllteam1@protonmail.comµÅ×ʼþµØÖ·  ¡£¸ÃÀÕË÷Èí¼þÉÐÎÞ¹«¿ªµÄ½âÃܹ¤¾ß°ä²¼  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dll-cryptomix-ransomware-variant-installed-via-remote-desktop/

3.ÐÂÀÕË÷Èí¼þInpivx£¬ÊÛ¼Û500ÃÀÔªºÍÌṩÓйؽ̳Ì

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÐÂÀÕË÷Èí¼þInpivxÔÚTorÍøÂçÉÏÏúÊÛ£¬ÊÛ¼ÛΪ500ÃÀÔª£¬ÌײÍÄÚ»¹Ô̺¬½âÃܹ¤¾ßºÍ¾ßÌåµÄ½Ì³Ì  ¡£¸ÃÀÕË÷Èí¼þÊÇÓÃC++±àдµÄ£¬Ö§³Ö´ÓWindows XPµ½Windows 10µÈWindows°æ±¾£¬ÆäÒDZí°åÔòʹÓÃPHP±àÂë  ¡£Inpivx²»ÌṩÍйܷþÎñ£¬µ«ËüÌṩÀÕË÷Èí¼þºÍÖÎÀíÃæ°åµÄÔ´´úÂ룬ÕâʹµÃ¹¥»÷ÕßÄܹ»ºÜÈÝÒ׵ض¨Ôì×Ô¼ºµÄÀÕË÷Èí¼þ  ¡£Inpivx½øÒ»²½Íƶ¯ÁËÀÕË÷Èí¼þ¼´·þÎñµÄ¸ÅÏ룬ʹµÃûÓм¼ÊõµÄ·¸×ï·Ö×ÓÄܹ»µÈÏлú¹Ø×Ô¼ºµÄ¶ñÒâÈí¼þºÍÒDZí°å  ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84273/breaking-news/inpivx-ransomware-service.html

4.жñÒâ¹¥»÷»î¶¯Aggah£¬ÖØÒª·Ö·¢RevengeRAT

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto NetworksµÄUnit 42×êÑÐÍŶӷ¢ÏÖжñÒâ¹¥»÷»î¶¯Aggah£¬AggahÀûÓÃBit.ly¡¢BlogSpotºÍPastebinµÈºÏ·¨·þÎñÀ´¹¹½¨C2»ù´¡ÉèÊ©£¬ÒÔÌӱܰ²È«½â¾ö¹æ»®µÄ¼ì²â  ¡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶Ô±±ÃÀ¡¢Å·ÖÞ¡¢ÑÇÖÞºÍÖж«µÄ×éÖ¯£¬Ö¸±êÐÐÒµÔ̺¬¼¼Êõ¡¢ÁãÊÛ¡¢Ôì×÷¡¢µ±¾Ö»ú¹¹¡¢Ò½Ôº¡¢ÔìÒ©µÈ  ¡£¹¥»÷ÕßÖØÒª¿ªÊÍRevengeRAT£¬¸ÃľÂí¿É´ò¿ªÔ¶³Ìshell£¬ÖÎÀíϵͳÎļþ¡¢¹ý³ÌºÍ·þÎñ£¬±à×ë×¢²á±í£¬¼üÅ̼ͼ¼°½Ó¼ûÉãÏñÓÅµÈ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/revengerat-distributed-via-bitly-blogspot-and-pastebin-c2-infrastructure/

5.×êÑÐÍŶӰ䲼Ocean Lotus¶ñÒâÈí¼þÌåʽµÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Malwarebytes Labs°ä²¼Ocean LotusʹÓõķǵäÐͶñÒâÈí¼þÌåʽµÄ·ÖÎö»ã±¨  ¡£Ocean LotusÓÖ³ÆAPT32£¬ÊÇÒ»¸öÓëÔ½ÄÏÓйصķ¸×ïÍŻÆäʹÓÃ×Ô½ç˵µÄ¶ñÒâÈí¼þÌåʽÒÔÌӱܾ²Ì¬¼ì²âºÍ·ÖÎö  ¡£¸ÃÑù±¾Ô̺¬Á½¸öδ֪ÌåʽµÄ¿ÉÖ´ÐÐÎļþ£¨.BLOBºÍ.CAB£©£¬ÎļþÌåʽÊÇ´ÓPEÌåʽת»»¶øÀ´£¬µ«±êÌâÊÇÆëÈ«×Ô½ç˵µÄ£¬¼ÓÔØ·½Ê½ÓëPEҲûÓÐÀàËÆÖ®´¦  ¡£BLOBºÍCABÎļþʹÓÃXOR½øÐÐÍÌÍ´¦Ö㬲¢Í¨¹ýhp6000.dll¼ÓÔØ£¬¼ÓÔØº¯ÊýÔÚÖ´ÐÐDllMainʱ£¬»á½¨²¹DLLÖеÄmainÄ£¿é  ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2019/04/funky-malware-format-found-in-ocean-lotus-sample/

6.л㱨³ÆWipro¹¥»÷ÕßÕë¶ÔÁí±íÆß¼Ò½â¾ö¹æ»®¹©¸øÉÌ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝKrebsOnSecurityµÄ»ã±¨£¬ÔÚ3Ô·ÝÕë¶ÔWiproÌáÒé¹¥»÷µÄ´¹µö¹¥»÷ÕßËÆºõÒ²Õë¶ÔÁí±íÆß¼Ò½â¾ö¹æ»®¹©¸øÉÌÌáÒé¹¥»÷£¬Ô̺¬Avanade¡¢Capgemini¡¢Cognizant¡¢Infosys¡¢PCM¡¢RackspaceºÍSlalom  ¡£Avanade֤ʵ¸Ã¹«Ë¾µÄ34ÃûÔ±¹¤ÔÚ2Ô·ÝÔâµ½¹¥»÷£¬RackspaceºÍInfosys°ä²¼µÄÉêÃ÷Ôòδ֤ʵҲδ·ñ¶¨¸Ã¹«Ë¾ÊÇ·ñ³ÉΪָ±ê£¬ÆäÓ๫˾²¢Î´½øÐлØÓ¦  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.crn.com/news/security/wipro-hackers-also-went-after-seven-other-solution-provider-giants-report