ContiÍÅ»ïÐû³Æ¶Ô¸ç˹´ïÀè¼Óµ±¾Ö»ù´¡ÉèÊ©µÄ¹¥»÷ÕÆ¹Ü
°ä²¼¹¦·ò 2022-04-251¡¢ContiÍÅ»ïÐû³Æ¶Ô¸ç˹´ïÀè¼Óµ±¾Ö»ù´¡ÉèÊ©µÄ¹¥»÷ÕÆ¹Ü
¾ÝýÌå4ÔÂ22ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïContiÐû³Æ¶Ô¸ç˹´ïÀè¼Óµ±¾Ö»ù´¡ÉèÊ©µÄ¹¥»÷ÕÆ¹Ü¡£¹¥»÷²úÉúÔÚÉÏÖÜ£¬Ó°ÏìÁËÔ̺¬²ÆÕþ²¿ºÍÀ͹¤²¿ÔÚÄڵĶà¸ö²¿ÃÅ¡£¾ÝϤ£¬×î³õµÄ¹¥»÷ÆÈʹ²ÆÕþ²¿¹Ø¹ØÆäϵͳ³¤´ïÊýÓ×ʱ£¬¸ÃÏµÍ³ÕÆ¹ÜÖ§¸¶¸Ã¹ú´ó²¿ÃŹ«ÎñÔ±µÄн³ê£¬Í¬Ê±Ò²´¦Öõ±¾ÖÑøÀϽðÖ§¸¶¡£Ä¿Ç°£¬ContiÒѹ«¿ªÁË50%µÄ±»µÁÊý¾Ý¡£¸ç˹´ïÀè¼Ó×Üͳ°µÊ¾£¬ËûÃDz»»áÏòÍøÂç¹¥»÷ÍÅ»ïÖ§¸¶Êê½ð¡£
https://securityaffairs.co/wordpress/130505/cyber-crime/costa-rica-conti-ransomware.html
2¡¢Altahrea Team DDoS¹¥»÷ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAAµÄÍøÕ¾
¾Ý4ÔÂ21ÈÕ±¨Â·£¬ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAA³ÆÆäÍøÕ¾Ôâµ½ÁËDDoS¹¥»÷¡£¾ÝϤ£¬Õâ´Î¹¥»÷À´×ÔÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Altahrea Team£¬Ö¼ÔÚ±¨³ðÃÀ¹úÓÚ1ÔÂ3ÈÕ½øÐеľüÊ»¡£IAA°µÊ¾£¬Æä²Ù×÷ϵͳºÍÍøÂçûÓÐÊܵ½ÈκÎÓ°Ïì¡£ÔÚ´Ë֮ǰ£¬¾ÝYnet±¨Â·£¬3ÔÂ15ÈÕÔøÓжà¸öÒÔÉ«Áйٷ½ÍøÕ¾·þÎñÖжϣ¬¿ÉÄÜÊÇÓëÒÁÓйصĹ¥»÷Õß½øÐеĴó¹æÄ£ÍøÂç¹¥»÷¡£
https://www.jns.org/report-pro-iran-hackers-target-israel-airports-authority-website/
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢ÏÖÒÔ¡°Azovstal¡±ÎªÖ÷ÌâµÄ´¹µö»î¶¯
ýÌå4ÔÂ23Èճƣ¬ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××é(CERT-UA)°ä²¼ÁËÐÂÒ»ÂÖ´¹µö»î¶¯µÄ°²È«¹«¸æ¡£Õâ´Î»î¶¯ÒÔ¡°Azovstal¡±ÎªÖ÷Ì⣬ʹÓÃÁ˶ñÒâofficeÎļþ¡£´ò¿ªÎļþ²¢ÆôÓúêºó£¬Ëü½«ÔÚ´ÅÅÌÉÏ´´½¨²¢ÔËÐжñÒâDLL¡°pe.dll¡±£¬×îºóÖ¼ÔÚ×°ÖÃCobalt Strike Beacon£¬ÓÃÓÚ½ÚÔìÖ¸±êϵͳ¡£×êÑÐÈËԱͨ¹ý¶ÈÎö¹¥»÷ÖÐʹÓõļÓÃܼ¼Êõ£¬´§¶ÈÕâ´Î»î¶¯ÓëºÚ¿ÍÍÅ»ïTrickbotÓйء£¸Ã¹«¸æ»¹ÌṩÁ˹ØÓÚÕâ´Î»î¶¯µÄIoCÒÔ¼°·ÀÓù½¨Òé¡£
https://securityaffairs.co/wordpress/130515/cyber-warfare-2/ukraine-cert-warns-azovstal-themed-phishing.html
4¡¢ÃÀ¹úʳƷ¹«Ë¾Bob's Red Mill֪ͨ¿Í»§ÆäÐÅÏ¢ÒѾй¶
ýÌå4ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹úÈ«ÂóʳƷ¹«Ë¾Bob's Red Mill֪ͨÔÚÏ߿ͻ§£¬ÆäÐÅÏ¢ÒѾй¶¡£Í¨ÖªÖÐд·£¬¸Ã¹«Ë¾×î½ü·¢´Ë¿Ì2ÔÂ23ÈÕÖÁ3ÔÂ1ÈÕÆÚ¼ä£¬¹¥»÷ÕßʹÓöñÒâÈí¼þÇÔÈ¡ÆäÍøÕ¾ÖеÄÖ§¸¶ÐÅÏ¢¡£Õâ´ÎÊÂÎñ¿ÉÄÜй¶ÁËÔÚÏ߿ͻ§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢Õ˵¥¡¢ËÍ»õµØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍ²É°ì½ð¶îµÈ¡£¸Ã¹«Ë¾°µÊ¾£¬ÒÑÓкöà¹Ë¿Í»ã±¨ËûÃÇÔâµ½ÁËÚ²ÆÐÔÏû·Ñ£¬¹ÌÈ»²»ÖªÂ·ÕâЩÊÂÎñÊÇ·ñÓëÊý¾ÝÇÔÈ¡Óйأ¬µ«´Ë¿Ì¿´À´£¬Ö§¸¶¿¨ÐÅÏ¢¿ÉÄÜÒѾй¶¡£
https://www.infosecurity-magazine.com/news/bobs-red-mill-reports-data-breach/
5¡¢CrowdStrike°ä²¼¹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄ·ÖÎö»ã±¨
4ÔÂ21ÈÕ£¬CrowdStrike°ä²¼Á˹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬½©Ê¬ÍøÂçÔËÓªÍÅ»ïLemonDuckÀûÓÃLinux·þÎñÆ÷ÉϵÄDocker API½øÐдó¹æÄ£MoneroÍÚ¿ó»î¶¯¡£LemonDuckͨ¹ý½Ó¼û¶³öµÄDocker API²¢ÔËÐжñÒâÈÝÆ÷À´ÏÂÔØ¼Ù×°³ÉPNGͼÏñµÄBash¾ç±¾£¬Ëü»¹»áͨ¹ý½ûÓð¢ÀïÔÆµÄ¼à¿Ø·þÎñÀ´Èƹý¼ì²â¡£Óë´Ëͬʱ£¬Cisco TalosÒ²Åû¶ÁËÒ»¸öÓëTeamTNTÓйصĹ¥»÷»î¶¯£¬Õë¶ÔAmazon Web ServicesÉ϶³öµÄDocker API¡£
https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
6¡¢Unit 42°ä²¼¹ØÓÚÀÕË÷Èí¼þBlackByteµÄ·ÖÎö»ã±¨
Unit 42ÔÚ4ÔÂ21ÈÕ°ä²¼Á˹ØÓÚÀÕË÷Èí¼þBlackByteµÄ·ÖÎö»ã±¨¡£BlackByteÊÇÒ»ÖÖRaaS£¬ÓÚ2021Äê7Ô³õ´Î³öÏÖ£¬¹¥»÷ÕßÖØÒªÀûÓÃProxyShell·ì϶¡£¸ÃÀÕË÷Èí¼þµÄ»î¶¯Ò»Ïò·Ç³£»îÔ¾£¬×Ô2021Äê11ÔÂÒÔÀ´£¬Õë¶ÔÈ«ÇòµÄ¶à¸ö×éÖ¯£¬Éæ¼°ÄÜÔ´¡¢Å©ÒµºÍ½ðÈÚ·þÎñµÈÐÐÒµ¡£Unit 42ÔÚÒ°±í¼ì²âµ½ÁËËüµÄ¶à¸ö±äÌ壬Ô̺¬ÓÃGoºÍÓÃ.NET±àдµÄ£¬ÒÔ¼°ÓÃGoºÍC»ìºÏ±àдµÄ±äÌå¡£BlackByteÓëLockbit 2.0µÈÀÕË÷Èí¼þÓÐÀàËÆÖ®´¦£¬ËüÃǶ¼ÈƹýÁËʹÓöíÓïµÈ¶àÖÖ¶«Å·Ëµ»°µÄϵͳ¡£
https://unit42.paloaltonetworks.com/blackbyte-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ