·¨¹úÒ½ÔºGHTÔâµ½ÀÕË÷¹¥»÷»¼ÕߺÍÖÎÀíÓйØÐÅϢй¶
°ä²¼¹¦·ò 2022-04-261¡¢·¨¹úÒ½ÔºGHTÔâµ½ÀÕË÷¹¥»÷»¼ÕߺÍÖÎÀíÓйØÐÅϢй¶
ýÌå4ÔÂ25Èճƣ¬·¨¹úÒ½ÁƱ£½¡¼¯ÍÅGHT Coeur Grand EstÔâµ½¹¥»÷£¬»¼ÕߺÍÖÎÀíÓйØÐÅϢй¶¡£¹¥»÷²úÉúÔÚ4ÔÂ19ÈÕ£¬GHTÔÚ·¢ÏÖ¹¥»÷ºóµ±¼´¶Ï¿ªÁËÒ½ÔºµÄÍøÂçÏνӣ¬ÒÔ±£»¤ÐÅϢϵͳºÍÊý¾Ý¡£×êÑÐÈËÔ±ÔÚÍøÕ¾Industrial Spy·¢ÏÖ£¬¹¥»÷ÕßÐû³ÆÒÑÀÕË÷1300000ÃÀÔª£¬¹«Ë¾ÈôÊDz»Ö§¸¶Êê½ð£¬ËûÃǽ«ÔÚÍøÕ¾ÖÐÏúÊÛÆäÇÔÈ¡µÄ28.7 GBÊý¾Ý£¬ÆäÖÐÔ̺¬Éç»á°²È«ºÅÂë¡¢»¤ÕÕɨÃè¼þ¡¢ÒøÐÐÐÅÏ¢¡¢µç×ÓÓʼþºÍµç»°ºÅÂëµÈ¡£
https://www.bleepingcomputer.com/news/security/french-hospital-group-disconnects-internet-after-hackers-steal-data/
2¡¢ResecurityÏêÊö½üÆÚÓëIRSËùµÃ˰É걨ÓйصĴ¹µö»î¶¯
4ÔÂ19ÈÕ£¬ResecurityÅû¶Á˽üÆÚÓëIRSËùµÃ˰É걨ÓйصĴ¹µö»î¶¯µÄ¾ßÌåÐÅÏ¢¡£¹¥»÷Õß¼ÙÒâÁ˵±¾Ö»ú¹¹µÄIT·þÎñ¹©¸øÉÌ£¬ÔÚ´¹µöÓʼþÖÐÔö³¤Î±Ôì³Éµç×Ó·¢Æ±µÄHTML¸½¼þ£¬¸½¼þÖÐÔ̺¬»ùÓÚJSµÄ»ìºÏ´úÂë¡£HTML¸½¼þ±»´ò¿ªºó£¬Ëü»áÀûÓý»»¥Ê½±íµ¥·ÂÕÕOffice 365ÊÚȨ»úÔìÀ´ÓÕʹָ±êÊäÈëÆ¾Ö¤¡£´¹µöÓʼþ»¹ÓÐÒ»¸öReturn-Path×ֶΣ¬ÓÃÓÚ´¦ÖÃÍ˻صĵç×ÓÓʼþ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸ÃÓʼþ²»Ô̺¬ÈκÎURL£¬Ôڳɹ¦·¢Ë͵½Ö¸±êÓÊÏäºóÒ²²¢Î´±»ÏóÕ÷ΪDZÔÚÀ¬»øÓʼþ¡£
https://resecurity.com/blog/article/cybercriminals-deliver-irs-tax-scams-phishing-campaigns-by-mimicking-government-vendors
3¡¢eSentire·¢ÏÖÖ¼ÔÚ·Ö·¢¶ñÒâÈí¼þMore_eggsµÄ¹¥»÷»î¶¯
eSentireÔÚ4ÔÂ21ÈÕ°ä²¼Á˹ØÓÚ·Ö·¢¶ñÒâÈí¼þMore_eggsµÄ¹¥»÷»î¶¯µÄ»ã±¨¡£×êÑÐÈËÔ±·¢ÏÖÐÂÒ»ÂÖ´¹µö»î¶¯£¬¼ÙÒâÇóÖ°ÕßÓÕʹÆóÒµÕÐÆ¸¾ÀíÏÂÔØÎ±ÔìµÄÇóÖ°¼òÀú£¬ÆäÖÐÔ̺¬Á˶ñÒâÈí¼þmore_eggs¡£Õâ¼Ò¼ÓÄôó°²È«¹«Ë¾°µÊ¾ÒÑ·¢ÏÖ4´Î¹¥»÷»î¶¯£¬ÆäÖÐ3Æð²úÉúÔÚ3Ôµף¬Ö¸±êÔ̺¬Ò»¼ÒÃÀ¹úµÄº½¿Õº½Ì칫˾¡¢Ò»¼ÒÓ¢¹úµÄ¹ÜÕʹ«Ë¾¡¢Ò»¼ÒÂÉʦÊÂÎñËùºÍÒ»¼ÒÈËÊ´úÀí»ú¹¹¡£×êÑÐÈËÔ±´§Ä¦£¬¸Ã¶ñÒâÈí¼þÓëGolden ChickensÓйء£
https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware
4¡¢Anonymous³ÆÆäOpRussia»î¶¯Òѹ«¿ª¶íÂÞ˹5.8TBµÄÊý¾Ý
ýÌå4ÔÂ24Èճƣ¬Anonymous³ÆÆäÌáÒéµÄOpRussia»î¶¯ÒÑͨ¹ýDDoSecrets°ä²¼Á˶íÂÞ˹Լ5.8 TBµÄÊý¾Ý¡£½üÆÚÔâµ½Anonymous¹¥»÷µÄ¹«Ë¾Ô̺¬£º¶íÂÞ˹×î´óµÄҺѹ¹¤¾ß³ö²úÉÌ£¬432 GBÊý¾Ýй¶£¬ÆäÖÐÔ̺¬645000·âÓʼþ£»Ã³Ò×·¿µØ²úͶ×ʹ«Ë¾Accent Capital£¬211GBÊý¾Ýй¶£¬ÆäÖÐÔ̺¬365000·âÓʼþ£»ÎïÒµÖÎÀí¹«Ë¾SawatzkyÔ̺¬575000·âÓʼþµÄ432 GBÊý¾Ý£»ÒÔ¼°Í¶×ʹ«Ë¾Worldwide InvestÔ̺¬250000·âÓʼþÔÚÄÚµÄ432 GBÊý¾Ý¡£
https://securityaffairs.co/wordpress/130554/hacktivism/anonymous-leaked-5-8-tb-russian-data.html
5¡¢Trend Micro°ä²¼2022ÄêÍøÂç°²È«Ì¬ÊÆµÄÔ¤²â»ã±¨
4ÔÂ24ÈÕ£¬Trend Micro°ä²¼ÁË2022ÄêÍøÂç°²È«Ì¬ÊÆµÄÔ¤²â»ã±¨¡£»ã±¨Ö¸³ö£¬¹©¸øÁ´¹¥»÷»î¶¯½«¼¤Ôö£»ÀÕË÷Èí¼þ½«³ÖÐø·¢Õ¹²¢Ê¢ÐУ¬Ô¤²â½«³öÏÖÁ½¸öÇ÷Ïò£¬ÏÖ´úÀÕË÷Èí¼þ½«±äµÃÔ½À´Ô½ÓÐÕë¶ÔÐÔ£¬Ð§·Â´«Í³µÄAPT¹¥»÷£¬ÒÔ¼°ÀÕË÷ÍŻォʹÓøü¸´ÔÓµÄÀÕË÷Õ½Êõ£»ÁãÈÕ·ì϶ÀûÓÃÔö³¤£¬²¢³¬¹ý2021Äê´´¼Í¼µÄÊýÁ¿£»Õë¶ÔÆû³µÐÐÒµµÄ¹¥»÷Ò²½«Ôö³¤¡£»ã±¨½¨ÒéÓû§´Ó3¸ö·½ÃæÔì¶©°²È«Õ½Êõ£¬Ô̺¬¹¥»÷ÃæÖÎÀí£¨ASM£©¡¢ÀÕË÷Èí¼þ»º½âÒÔ¼°·ì϶ºÍ²¹¶¡ÖÎÀí¡£
https://www.trendmicro.com/en_us/ciso/21/l/cybersecurity-trends-2022.html
6¡¢Zscaler°ä²¼2021ÄêÍøÂç´¹µö¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨
ZscalerÔÚ4ÔÂ29ÈÕ°ä²¼ÁË2021ÄêÍøÂç´¹µö¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£È¥ÄêZscale¼ì²âµ½µÄ´¹µö¹¥»÷ÔÚÈ«ÇòÁìÓòÄÚÉÏÉýÁË29%£¬´ïµ½ÁË8.739ÒڴεÄмͼ£»ÁãÊÛºÍÅú·¢ÊÇ×îÔâµ½¹¥»÷×î¶àµÄÐÐÒµ£¬ÔÚ´Óǰ12¸öÔÂÖеĹ¥»÷Ôö³¤Á˳¬¹ý400%£»ÃÀ¹ú¡¢ÐÂ¼ÓÆÂ¡¢µÂ¹ú¡¢ºÉÀ¼ºÍÓ¢¹úÊÇ´¹µö»î¶¯×îÖØÒªµÄÖ¸±ê£»Ëæ×ÅÓû§¶Ô¿ÉÒɵç×ÓÓʼþµÄ¾¯ÌèÔö³¤£¬ÐÂÐ˵Ĵ¹µöý½é£¨ÀýÈçSMS´¹µö£©±È´«Í³²½ÖèÔö³¤µÃ¸ü¿ì£»²»ÐÝÔö³¤µÄ´¹µö»î¶¯Óëphishing- as-a-serviceÖ±½ÓÓйء£
https://info.zscaler.com/resources-industry-report-threatlabz-state-of-phishing-report


¾©¹«Íø°²±¸11010802024551ºÅ