°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

°ä²¼¹¦·ò 2022-10-09
1¡¢°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

      

¾ÝýÌå10ÔÂ7ÈÕ±¨Â·£¬ÓɰÍÎ÷µ±¾Ö½ÚÔìµÄ°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½Á˹¥»÷£¬²¢±»ÀÕË÷50 BTC¡£±¾µØÐÂÎÅýÌåTecmundoÐû³Æ£¬ÃûΪCrydatµÄºÚ¿ÍÁªÏµÁËËûÃÇ£¬²¢ÒªÇóËûÃÇÔÚ10ÔÂ6ÈÕ15:00֮ǰ֧¸¶520Íò°ÍÎ÷À×ÑǶû¡£Õë¶ÔºÚ¿ÍÕâÒ»ÒªÇ󣬰ÍÎ÷ÀûÑÇÒøÐÐÒ»Ïòά³Ö¹ÑÑÔ¡£¾ÝϤ£¬¹¥»÷ÕßÀûÓÃÁËÀÕË÷Èí¼þLockBit£¬ÓÚ10ÔÂ3ÈÕϰȾ¸ÃÒøÐУ¬±¾µØÕƹܽø¹¥ÍøÂç·¸×ï»î¶¯µÄ·¨Âɲ¿ÃÅÔÚµ÷²é´ËÊÂÎñ¡£


https://www.databreaches.net/bank-of-brasilia-attacked-by-ransomware-demanding-50-btc/


2¡¢Ð¾Æ¬Ôì×÷ÉÌADATA·ñ¶¨ÆäÔâµ½RansomHouse¹¥»÷µÄ˵·¨

      

¾Ý10ÔÂ8ÈÕ±¨Â·£¬¹¥»÷ÕßÔÚÆäÍøÕ¾ÉϹ«¿ª±»µÁÊý¾Ýºó£¬Öйų́ÍåоƬÔì×÷ÉÌADATA·ñ¶¨ÆäÔâµ½¹¥»÷µÄ˵·¨¡£RansomHouseÔÚ±¾Öܶþ½«ADATAÔö³¤µ½ËûÃǵÄÍøÕ¾£¬²¢Ðû³ÆÔÚ2022ÄêµÄ¹¥»÷ÖÐÒѳɹ¦ÇÔÈ¡1TBµÄÎļþ£¬»¹¹«¿ªÁ˱»µÁÎļþµÄÑù±¾¡£ADATA°ä²¼ÉêÃ÷³ÆËü×î½üûÓÐÔâµ½¹¥»÷£¬RansomHouseÒ²²¢Î´ÔÚ·þÎñÆ÷ÖÐÁôÏÂÊê½ð¼Í¼À´Ö¤Ã÷¹¥»÷»î¶¯¡£Ð¹Â¶µÄÎļþÀ´×Ô2021Äê5ÔµÄRagnarLockerÀÕË÷¹¥»÷ £¬ÆäʱÓÐ1.5 TBµÄÊý¾Ý±»µÁ¡£È»¶ø£¬RansomHouse¼á³ÆËûÃǹ¥»÷ÁËADATA£¬²¢°µÊ¾ÒѾͱ»µÁÊý¾Ý½øÐÐÁ˽»Éæ¡£


https://www.bleepingcomputer.com/news/security/adata-denies-ransomhouse-cyberattack-says-leaked-data-from-2021-breach/


3¡¢LofyGangÒÑ·Ö·¢Ô¼200¸öÇÔÊØÐÅÓþ¿¨ÐÅÏ¢µÄ¶ñÒâNPM°ü

      

CheckmarxÔÚ10ÔÂ7ÈÕ³ÆÆä·¢ÏÖÁËÔ¼200¸ö¶ñÒâNPM°ü£¬ÓëÃûΪLofyGangµÄ¹¥»÷ÍÅ»ïÓйØ¡£¸ÃÍÅ»ïÒÑÔËÓªÁËÒ»Äê¶à£¬Ö¸±êÊÇÇÔÊØÐÅÓþ¿¨Êý¾Ý£¬ÒÔ¼°ÓëDiscord Nitro¡¢ÓÎÏ·ºÍÁ÷ýÌå·þÎñÓйصÄÕÊ»§¡£¸ÃÍÅ»ï¿ÉÄÜÓë°ÍÎ÷ÓйØ£¬Ëü´´½¨ÁËÒ»¸öDiscord»úеÈË¡°Lofy Boost¡±£¬ÓÃÓÚ²¿Êð±»µÁÐÅÓþ¿¨¡£¸ÃÍŻﻹÒÔ±ðºÅDyPolarLofyÔÚºÚ¿ÍÉçÇøÐ¹Â¶ÁËÊýǧ¸öDisney+ºÍMinecraftÕÊ»§£¬²¢ÔÚËûÃǵÄGitHubÒ³ÃæÏÂÍÆ¹ãºÚ¿Í¹¤¾ßºÍ»úеÈ˵È¡£Ä¿Ç°£¬ºÜ¶à¶ñÒâÈí¼þ°üÒѱ»É¾³ý£¬µ«»¹Óв¿ÃÅÈԿɹ©ÏÂÔØ¡£


https://checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/


4¡¢ÐÂAndroid¶ñÒâÈí¼þRatMiladÖØÒªÕë¶ÔÖж«µÄ×éÖ¯

      

10ÔÂ5ÈÕ£¬ZimperiumÅû¶ÁËÃûΪRatMiladµÄAndroid¶ñÒâÈí¼þ¡£RatMiladµÄԭʼ±äÌå°µ²ØÔÚVPNºÍÃûΪText MeµÄµç»°ºÅÂëºýŪÀûÓÃÖ®ºó£¬ÕâÊÇÉ罻ýÌåÓû§ÔÚ½Ó¼ûÊÜÏ޵Ĺú¶ÈºÍµØÓòʹÓõij£Óù¤¾ß¡£¸Ã¶ñÒâÀûÓÃͨ¹ýÉ罻ýÌåºÍTelegramµÈͨѶ¹¤¾ßÉϵÄÁ´½Ó·Ö·¢£¬ÓÕʹÓû§²à¼ÓÔØÀûÓò¢ÊÚÓè¿í·ºµÄȨÏÞ¡£Zimperium´§Ä¦£¬ÕƹÜRatMiladµÄÔËÓªÍŶӴÓÒÁÀʺڿÍÍÅ»ïAppMiladÄÇÀï»ñµÃÁËÔ´´úÂ룬²¢½«Æä¼¯³Éµ½ÁËÒ»¸öڲƭÐÔÀûÓ÷¨Ê½ÖС£


https://blog.zimperium.com/we-smell-a-ratmilad-mobile-spyware/


5¡¢Rapid7Åû¶ÀûÓÃZCSÖÐRCE·ì϶µÄ¹¥»÷»î¶¯µÄ¼¼Êõϸ½Ú

      

Rapid7ÔÚ10ÔÂ6ÈÕй©¹¥»÷ÕßÔÚ»ý¼«ÀûÓÃZimbra Collaboration Suite (ZCS)ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶¡£¸Ã·ì϶׷×ÙΪCVE-2022-41352£¬CVSSÆÀ·Ö9.8£¬¿É±»ÓÃÀ´Í¨¹ýAmavis£¨µç×ÓÓʼþ°²Õûϵͳ£©ÉÏ´«ËÁÒâÎļþ£¬³É¹¦ÀûÓø÷ì϶¿É¸²¸ÇZimbra webroot¡¢Ö²Èëshellcode²¢½Ó¼ûÆäËûÓû§µÄÕÊ»§¡£¸Ã·ì϶×Ô9ÔÂÒÔÀ´Ò»Ïò±»ÀûÓã¬Rapid7¹«¿ªÁ˹ØÓڸ÷ì϶µÄ¼¼ÊõÎĵµ£¬Ô̺¬PoCºÍIoC¡£×êÑоÍÈËÔ±½¨ÒéÓû§×°ÖÃpaxÀûÓ㬶øºó³ÁÐÂÆô¶¯ Zimbra£¬Í¬Ê±¼à¿ØÀ´×ÔZimbraµÄÈí¼þ¸üС£


https://www.rapid7.com/blog/post/2022/10/06/exploitation-of-unpatched-zero-day-remote-code-execution-vulnerability-in-zimbra-collaboration-suite-cve-2022-41352/


6¡¢Kaspersky°ä²¼2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ

      

10ÔÂ6ÈÕ£¬Kaspersky°ä²¼ÁË2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ¡£»ã±¨Ö¸³ö£¬2022Äêǰ8¸öÔ£¬±»ATM/PoS¶ñÒâÈí¼þÓ°ÏìµÄÉ豸ÊýÁ¿Óë2020ÄêͬÆÚÏà±ÈÔö³¤ÁË19%£¬Óë2021ÄêÏà±ÈÔö³¤Á˽ü4%¡£ÊÜ´ËÀà¶ñÒâÈí¼þÓ°Ïì×î¶àµÄ¹ú¶ÈÔ̺¬¶íÂÞ˹¡¢ÒÁÀÊ¡¢°ÍÎ÷¡¢Ô½ÄϺÍÓ¡¶ÈµÈ¡£2022Äê×î»îÔ¾µÄ¶ñÒâÈí¼þ¼Ò×åΪHydraPoSºÍAbaddonPoS£¬Õ¼±È±ðÀëΪ36%ºÍ35%£¬Æä´ÎÊÇPloutus£¨3%£©¡¢Prilex£¨2%£©ºÍRawPoS£¨2%£©¡£Kaspersky´§Ä¦£¬Ô¤¼ÆÍøÂç·¸×ï»î¶¯½«½øÒ»²½Ôö³¤¡£


https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/