ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢»Ø¾ø¸¶Êê½ð
°ä²¼¹¦·ò 2022-05-201¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢»Ø¾ø¸¶Êê½ð
¾ÝýÌå5ÔÂ18ÈÕ±¨Â·£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬5ÔÂ9ÈÕÆä²¿ÃÅITϵͳ²úÉúÁËÖжϣ¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬¿ÉÄÜÔ´ÓÚÍøÂ簲ȫÊÂÎñ¡£¹ÌÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐй©¹¥»÷µÄϸ½Ú£¬µ«×êÑÐÈËÔ±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬¸ÃÍÅ»ïÐû³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)É豸¡£ÒøÐеļ¼Êõ×ܼవʾ£¬ËûÃdzɹ¦±£»¤ÁËÖ÷Ìâϵͳ£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬²¢»Ø¾øÖ§¸¶Êê½ð¡£
https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/
2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݱ£ÏÕ²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢
5ÔÂ18ÈÕ£¬ÃÀ¹úµÂ¿ËÈøË¹Öݱ£ÏÕ²¿(TDI)¹«¿ªÁËÓйØ1Ô·ݷ¢ÏÖµÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£Õâ´ÎÊÂÎñÔ´ÓÚWebÀûÓÃÖдæ±à³Ì´úÂëÃýÎ󣬵¼ÖÂÊܱ£»¤ÇøÓòÄܹ»±»½Ó¼û£¬Éæ¼°³¬¹ý180Íò¹«ÃñµÄÐÅÏ¢¡£¾¹ýµ÷²éÈ·¶¨£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂÆÚ¼ä£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»±í²¿ÈËÔ±½Ó¼û£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»á°²È«ºÅÂëÒÔ¼°ÓйØÖÐÉ˺͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¸Ã»ú¹¹´Ëǰ°µÊ¾£¬ÒѾÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£
https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/
3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ
Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÓÚ2017ÄêÆðÍ·»îÔ¾£¬ÔÚÈ¥ÄêÏÄÌì³õ´Î±»·¢ÏÖ¡£Õâ´Î»î¶¯Í¨¹ý´¹µöÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£±øÆ÷¿âÔ̺¬°µ²ØÔÚµö¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ·¨Ê½¡¢ÒÑ´æÔÚ¶àÄêÇÒÂÔ΢Åú¸ÄµÄºóÃÅ¡¢PlugXºÍ¶¨ÔìºóÃÅPcShare¡£´Ë±í£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬ÒÔ¼°3¸öеÄÄ£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£
https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/
4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%
5ÔÂ19ÈÕ£¬Î¢Èí°ä²¼»ã±¨³ÆÔÚ´ÓǰµÄ6¸öÔÂÖУ¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£XorDdosÓÚ2014Äê³õ´Î±»·¢ÏÖ£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ»Ø¾ø·þÎñ¹¥»÷£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÔìºÍά³ÖÓÆ¾ÃÐÔµÄÕ½Êõ£¬Ê¹ÆäÄÑÒÔ±»¶Ï¸ù¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯Öй۲쵽£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½Ú¸²¸ÇÃô¸ÐÎļþÀ´°µ²Ø¶ñÒâ»î¶¯ÒÔÔ¤·À±»·ÖÎö¡£´Ë±í£¬³ýÁËÌáÒéDDoS¹¥»÷±í£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬ÈçºóÃÅTsunami¡£
https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
5¡¢CISAºÍMS-ISAC°ä²¼ÀûÓÃF5 BIG-IP·ì϶¹¥»÷µÄ¹«¸æ
5ÔÂ18ÈÕ£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍ·ÖÎöÖÐÐÄ(MS-ISAC)½áºÏ°ä²¼Á˹ØÓÚÀûÓÃF5 BIG-IP·ì϶¹¥»÷µÄ¹«¸æ¡£F5ÓÚ5ÔÂ4ÈÕ°ä²¼ÁËÕë¶Ô·ì϶CVE-2022-1388µÄ²¹¶¡£¬¶ûºó¹«¿ªÁËPOC·ì϶ÀûÓã¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÀûÓô˷ì϶ͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØÖ·»ñµÃÖ¸±êϵͳµÄ½ÚÔìȨ¡£Æ¾¾Ý¹«¿ª»ã±¨£¬¸Ã·ì϶ÔÚ±»»ý¼«ÀûÓᣰ²È«¹«¸æÌṩÁË·ì϶µÄ¼¼Êõϸ½Ú¡¢¼ì²â²½Öè¡¢ÊÂÎñÏìÓ¦»ººÍ½â´ëÊ©£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§ÀûÓøÃÖ¸ÄÏÔ®ÊÖ×éÖ¯ÕмܴËÀ๥»÷¡£
https://www.cisa.gov/uscert/ncas/alerts/aa22-138a
6¡¢PRODAFT°ä²¼¹ØÓÚWizard SpiderµÄÉî¶È·ÖÎö»ã±¨
PRODAFTÔÚ5ÔÂ16ÈÕ°ä²¼Á˹ØÓÚWizard SpiderµÄÉî¶È·ÖÎö»ã±¨£¬½ÒʾÁËÆä×éÖ¯½á¹¹ºÍ¶¯»ú¡£Wizard SpiderµÄ´ó²¿ÃÅÖ¸±êλÓÚÅ·ÖÞºÍÃÀ¹ú£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛÖµÖ¸±ê£¬²¢½«»ñµÃµÄ²¿ÃÅ×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹µö»î¶¯£¬ÓÐʱҲÀûÓÃBEC¹¥»÷¡£Ò»µ©³É¹¦£¬¾Í»á×°ÖÃCobalt Strike£¬²¢³¢ÊÔ»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£´Ë±í£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍ´úÀíÀ´°µ²ØÆä×ÙÓ°£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºó¿ÖÏÅÖ¸±ê£¬ÆÈʹÆä¸¶¿î¡£
https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/


¾©¹«Íø°²±¸11010802024551ºÅ