Ó¢¹úij¹«Ë¾µÄIT°²È«·ÖÎöʦ¼ÙÒâºÚ¿ÍÍÅ»ïÀÕË÷¹ÍÖ÷±»²¶

°ä²¼¹¦·ò 2023-05-25

1¡¢Ó¢¹úij¹«Ë¾µÄIT°²È«·ÖÎöʦ¼ÙÒâºÚ¿ÍÍÅ»ïÀÕË÷¹ÍÖ÷±»²¶


¾ÝýÌå5ÔÂ23ÈÕ±¨Â·£¬28ËêµÄÓ¢¹úÄÐ×ÓAshley LilesÒòδ¾­ÊÚȨ½Ó¼ûÍÆËã»ú²¢ÀÕË÷Æä¹ÍÖ÷±»¶¨×ï¡£2018Äê2Ô£¬¸ÃÄÐ×ÓÔÚÒ»¼ÒÔâµ½ÁËÀÕË÷¹¥»÷µÄÅ£½ò¹«Ë¾µ£ÈÎIT°²È«·ÖÎöʦ¡£ÓëÆäËü¹¥»÷Ò»Ñù£¬ºÚ¿ÍÁªÏµÁ˹«Ë¾µÄ¸ß¹Ü£¬ÒªÇó½»Êê½ð¡£LilesÔÚ¾¯Ô±¡¢Í¬Êº͹ÍÖ÷²»ÖªÂ·µÄÇé¿öÏ£¬¶Ô¹«Ë¾½øÐÐÁ˵¥¶ÀµÄ¶þ´Î¹¥»÷¡£Ëû½Ó¼ûÁËÒ»Ãû¶­Ê»á³ÉÔ±µÄ¸öÈËÓʼþ³¬¹ý300´Î£¬¸ü¸ÄÁËԭʼÀÕË÷Óʼþ£¬±¾ÒâÊǽ«Êê½ð×ªÒÆµ½×Ô¼ºµÄ¼ÓÃÜÇ®±ÒÇ®°ü¡£È»¶ø£¬¹«Ë¾²¢Î´½»Êê½ð£¬ÆäʱÈÔÔÚ½øÐеÄÄÚ²¿µ÷²é£¬·¢ÏÖLilesδ¾­ÊÚȨ½Ó¼û¸öÈËÓʼþ£¬²¢Ö¸ÏòËû¼ÒµÄIPµØÖ·¡£¸ÃÔ±¹¤½«ÓÚ2023Äê7ÔÂ11ÈÕ·µ»Ø·¨Í¥ÌýÈ¡Åоö¡£


https://www.bleepingcomputer.com/news/security/it-employee-impersonates-ransomware-gang-to-extort-employer/


2¡¢Ó¡¶È±£ÏÕÐÅÏ¢¾Ö½ü30¸öϵͳ±»¼ÓÃܲ¢±»ÀÕË÷25ÍòÃÀÔª


ýÌå5ÔÂ23Èճƣ¬Ó¡¶È±£ÏÕÐÅÏ¢¾Ö(IIB) Ôâµ½ÁËÀÕË÷¹¥»÷£¬½ü30¸ö·þÎñÆ÷ϵͳ±»¼ÓÃÜ£¬µ¼Ö¸ûú¹¹µÄÊý¾ÝÎÞ·¨½Ó¼û¡£¹¥»÷²úÉúÓÚ4ÔÂ2ÈÕ£¬IIBÔÚ×î³õÑ¡Ôñ¶Ô¹¥»÷½øÐб£ÃÜ¡£È»¶ø£¬Ëæ×ÅÇé¿öÔ½À´Ô½ÑϳÁ£¬ËûÃÇ×îÖջ㱨¸øÁËCyberabad¾¯·½¡£¾ÝϤ£¬ºÚ¿ÍÒªÇó½»250000ÃÀÔªµÄ±ÈÌØ±ÒÀ´½âËøÊý¾Ý¡£IIB¾ö¶¨²»Ð§Âʺڿ͵ÄÒªÇó£¬Ïà·´£¬ËûÃÇÒÀ¸½Ãô¸ÐÊý¾ÝµÄ±¸·ÝÀ´Î¬³ÖÈÕ³£ÔËÓª¡£Ä¿Ç°£¬¶ÔÕâ´Î¹¥»÷µÄµ÷²éÈÔÔÚ½øÐÐÖС£


https://www.the420.in/indian-insurance-information-bureau-hit-by-ransomware-attack-russian-hackers-demand-250000-as-ransom/


3¡¢ESETÔÚGoogle Play¼ì²âµ½±»AhRatľÂí»¯µÄiRecorder


5ÔÂ23ÈÕ£¬ESET³ÆÆäÔÚGoogle PlayÉ̵êÖмì²âµ½Ò»ÖÖеÄRAT£¬Ëü°µ²ØÔÚÒ»¿îAndroidÆÁϼÔìÀûÓá°iRecorder - Screen Recorder¡±ÖС£¸ÃÀûÓÃÓÚ2021Äê9Ô³õ´ÎÉÏ´«µ½É̵꣬µ«¿ÉÄÜÔÚ½«½üÒ»ÄêºóµÄ2022Äê8Ô°䲼µÄ¸üÐÂÖб»Ä¾Âí»¯¡£ÔÚ±»É¾³ý֮ǰ£¬Æä×°ÖÃÁ¿Òѳ¬¹ý50000´Î¡£ÕâÊÇÒ»¸öеĻùÓÚAhMythµÄAndroid RAT£¬±»¶¨ÃûΪAhRat£¬¿É¸ú×ÙµØÎ»¡¢ÇÔȡͨ»°¼Í¼¡¢ÇÔÈ¡ÁªÏµÈ˺ͶÌÐÅ¡¢·¢ËͶÌÐÅ¡¢ÅÄÕպͼÔì²¼¾°ÒôƵ¡£


https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/


4¡¢KasperskyÅû¶GoldenJackalÕë¶Ôµ±¾ÖºÍ±í½»»ú¹¹µÄ¹¥»÷


KasperskyÔÚ5ÔÂ23ÈÕÅû¶ÁËGoldenJackal×Ô2019ÄêÒÔÀ´Ò»Ö¹Øë¶ÔÖж«ºÍÄÏÑÇÈ·µ±¾ÖºÍ±í½»»ú¹¹µÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÀûÓÃÁËÒ»×é×Ô½ç˵µÄ.NET¶ñÒâÈí¼þ¹¤¾ß£¬ÕâЩ¹¤¾ßÌṩÁ˸÷ÀàÖ°ÄÜ¡£Ê×ÏÈϰȾϵͳµÄÖØÒªpayloadÊÇJackalControl£¬¿ÉÔ¶³Ì½ÚÔìÖ¸±êÍÆËã»ú¡£µÚ¶þ¸ö¹¤¾ßÊÇJackalSteal£¬¿É´ÓÖ¸±êµÄËùÓÐÂß¼­Çý¶¯Æ÷ÖÐÇÔÈ¡Êý¾Ý¡£µÚÈý¸öJackalWorm£¬Ëü»áϰȾUSBÇý¶¯Æ÷²¢ÔÚÆäËüÍÆËã»úÉÏ´«²¼¡£µÚËĸöÊÇJacklPerInfo£¬Ò»¸ö¸ù»ùµÄϵͳÐÅÏ¢ÍøÂ編ʽ¡£×îºóÒ»¸öÊÇJackalScreenWatcher£¬ÓÃÓÚÔÚÖ¸±êÉ豸ÉϽØÈ¡ÆÁÄ»½ØÍ¼¡£


https://securelist.com/goldenjackal-apt-group/109677/


5¡¢Apria Healthcare¹«¿ªÓ°ÏìÔ¼20Íò»¼ÕßµÄÊý¾Ýй¶ÊÂÎñ


¾Ý5ÔÂ24ÈÕ±¨Â·£¬Apria Healthcare¹«¿ªÁË2019ÄêºÍ2021ÄêµÄÊý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁËÔ¼180ÍòÓû§¡£Î¥¹æÐÐΪÓâÔ½Á½¸öʱÆÚ£¬2019Äê4ÔÂ5ÈÕÖÁ5ÔÂ7ÈÕ£¬ÒÔ¼°2021Äê8ÔÂ27ÈÕÖÁ10ÔÂ10ÈÕ£¬Éæ¼°Õʺš¢ÒøÐп¨ºÅ¡¢ÕÊ»§°²È«´úÂë¡¢½Ó¼û´úÂë¡¢ÃÜÂëºÍPINµÈÐÅÏ¢¡£Apria°µÊ¾£¬¹¥»÷µÄÖ÷ÕÅÊÇÒÔڲƭ¼¿Á©´ÓApria»ñÈ¡×ʽ𣬶ø²»ÊǽӼûÆä»¼Õß»òÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¡£¸Ã¹«Ë¾³Æ£¬Ã»ÓÐÖ¤¾ÝÅú×¢×ʽðÒѱ»×ªÒÆ£¬Ò²Ã»ÓÐÓë´ËÊÂÎñÓйصÄÓ×ÎÒÐÅÏ¢±»ÀÄÓá£


https://www.hackread.com/apria-healthcare-major-data-breach/


6¡¢SentinelLabs°ä²¼¹ØÓÚKimsuky¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


5ÔÂ23ÈÕ£¬SentinelLabs°ä²¼Á˹ØÓÚ³¯ÏÊAPT×éÖ¯KimsukyÔÚ½øÐеÄÒ»Ïî»î¶¯µÄ·ÖÎö»ã±¨¡£¸Ã»î¶¯µÄ³ÁµãÊÇʹÓöñÒâÈí¼þRandomQueryµÄ±äÌå½øÐÐÎļþ¿úËźÍÐÅϢй¶£¬´Ó¶øÊµÏÖºóÐøµÄ¾«×¼¹¥»÷¡£KimsukyÀûÓÃÁËMicrosoft±àÒëµÄHTMLÔ®ÊÖ(CHM)Îļþ·Ö·¢RandomQuery£¬ÕâÊÇËûÃÇ·Ö·¢¶ñÒâÈí¼þ¼¯µÄ³Ö¾ÃÕ½Êõ¡£´Ë±í£¬Kimsuky»¹Ñ¡È¡ÁËÐµĶ¥¼¶ÓòÃûºÍÓòÃû×÷Ϊ¶ñÒâ»ù´¡ÉèÊ©£¬·ÂÕճ߶ȵÄ.com¶¥¼¶ÓòÃûÀ´ºýŪָ±ê¡£


https://www.sentinelone.com/labs/kimsuky-ongoing-campaign-using-tailored-reconnaissance-toolkit/