RhysidaÍŻ﹥»÷ÃÀ¹úÒ½ÁÆ»ú¹¹PMH²¢ÀÕË÷130ÍòÃÀÔª

°ä²¼¹¦·ò 2023-08-29
1¡¢RhysidaÍŻ﹥»÷ÃÀ¹úÒ½ÁÆ»ú¹¹PMH²¢ÀÕË÷130ÍòÃÀÔª


¾ÝýÌå8ÔÂ27ÈÕ±¨Â· £¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Prospect Medical Holdings(PMH)Ôâµ½ÁËÀÕË÷ÍÅ»ïRhysidaµÄ¹¥»÷¡£¹¥»÷²úÉúÔÚ8ÔÂ3ÈÕ £¬PMHÔ±¹¤³ÆÔÚµçÄÔÉÏ·¢ÏÖÀÕË÷ÐÅ¡£Ö®ºó¸ÃÒ½Ôº¹Ø¹ØÁËITϵͳÒÔÔ¤·À¹¥»÷ÔÚÄÚÍøºáÏòÒÆ¶¯ £¬²¢±»ÆÈʹÓÃÖ½Öʲ¡Àý¡£Rhysida°µÊ¾¶Ô´ËÊÂÕÆ¹Ü £¬²¢³ÆËûÃÇ»ñµÃÁË1TBµÄÎĵµºÍÒ»¸ö1.3TBµÄSQLÊý¾Ý¿â £¬ÆäÖÐÔ̺¬500000¸öÉç»á°²È«ºÅÂë¡¢»¤ÕÕ¡¢¼ÝÊ»ÅÆÕÕ¡¢¹«Ë¾ÎļþºÍ»¼Õߵļͼ £¬»¹ÍþвҪÒÔ50¸ö±ÈÌØ±Ò£¨¼ÛÖµ130ÍòÃÀÔª£©µÄ¼ÛÖµÏúÊÛ±»µÁÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/rhysida-claims-ransomware-attack-on-prospect-medical-threatens-to-sell-data/


2¡¢Ä³¹©¸øÉÌÔâµ½¹¥»÷µ¼ÖÂÂ׶ؾ¯¾Ö½ü5ÍòÔ±¹¤µÄÐÅϢй¶


¾Ý8ÔÂ27ÈÕ±¨Â· £¬Â×¶Ø´ó³ÇÊо¯Ô±¾ÖÔÚµ÷²é¹ØÓÚÆä47000Ãû¾¯¹ÙºÍ¹¤×÷ÈËÔ±µÄÐÅϢй¶ÊÂÎñ¡£Ð¹Â¶Êý¾ÝÔ̺¬ÐÕÃû¡¢ÕÕÆ¬¡¢¾üÏΡ¢Éó²é¼¶±ðºÍÉí·ÝÖ¤ºÅµÈ¡£Õâ´ÎÊý¾Ýй¶ÊÇÓÉÓÚÕÆ¹Ü´òÓ¡ÊÚȨ¿¨ºÍÔ±¹¤Í¨³©Ö¤µÄ³Ð°üÉ̵ÄITϵͳÔâµ½¹¥»÷µ¼ÖµÄ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÊdzöÓÚ¾­¼Ã¶¯»ú £¬»¹ÊÇרÃÅÇÔÈ¡¾¯Ô±ºÍ¹¤×÷ÈËÔ±µÄÐÅÏ¢¡£ÓÉÓÚ²»°²Ð¹Â¶Êý¾Ý±»ÓÐ×éÖ¯µÄ¹¥»÷ÍÅ»ïÀûÓà £¬¹ú¶È·¸×ï¾Ö(NCA)Òѱ»ÒªÇóµ÷²éÕâ´ÎÊý¾Ýй¶ÊÂÎñ¡£


https://therecord.media/metropolitan-police-data-leak-hackers-uk


3¡¢Î¢ÈíÅû¶Flax TyphoonÕë¶ÔÖйų́ÍåÆóÒµµÄ¹¥»÷»î¶¯


8ÔÂ24ÈÕ £¬Î¢ÈíÅû¶ÁËFlax TyphoonÕë¶ÔÖйų́Í嵨ÓòµÄ¹¥»÷»î¶¯¡£Flax Typhoon×Ô2021ÄêÖÐÆÚÒÔÀ´Ò»Ïò»îÔ¾ £¬ÖØÒªÕë¶ÔÖйų́ÍåÈ·µ±¾Ö»ú¹¹ÒÔ¼°½ÌÓý¡¢¹Ø¼üÔì×÷ºÍÐÅÏ¢¼¼ÊõÓÐ¹ØÆóÒµ¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýÃæÏò¹«¼ÒµÄ·þÎñÆ÷£¨Ô̺¬VPN¡¢Web¡¢JavaºÍSQLÀûÓã©Öеķì϶ºÍChina ChopperµÈWeb shell»ñµÃ³õ²½½Ó¼ûȨÏÞ¡£¶øºóʹÓúÅÁîÐй¤¾ß³ÉÁ¢ÓƾýӼû £¬²¿ÊðVPNÏνӵ½¹¥»÷ÕߵĻù´¡ÉèÊ© £¬×îºó´ÓÖ¸±êÏµÍ³ÍøÂçÍ´´¦¡£Î¢Èí³Æ £¬Flax TyphoonÖØÒªÒÀÀµÓÚÀëµØ¹¥»÷¼¼Êõ£¨living-off-the-land£©ºÍ¼üÅ̹¥»÷¡£


https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/


4¡¢LazarusÀûÓÃManageEngineÖзì϶¹¥»÷Ò½ÁƱ£½¡µÈÐÐÒµ


8ÔÂ24ÈÕ £¬Cisco Talos³ÆÆä·¢ÏÖÁËLazarus GroupµÄ¹¥»÷»î¶¯ £¬ÀûÓÃÁËZoho ManageEngine ServiceDesk·ì϶(CVE-2022-47966)¡£×êÑÐÈËÔ±°µÊ¾ £¬LazarusÔÚPoC¹«¿ªÅû¶½ö5Ììºó¾ÍÆðͷʹÓø÷ì϶¡£¹¥»÷»î¶¯Ê¼ÓÚ½ñÄêËêÊ× £¬ÖØÒªÕë¶ÔÅ·ÖÞºÍÃÀ¹úµÄ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ºÍÒ½ÁƱ£½¡»ú¹¹ £¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þQuiteRATºÍCollectionRAT¡£QuiteRATËÆºõÊÇLazarusÔÚ2022ÄêʹÓõÄMagicRATµÄÉý¼¶°æ £¬¶øCollectionRATËÆºõÓëAndarielµÄEarlyRATÓйØ £¬Andariel±»ÒÔΪÊÇLazarusµÄÒ»¸ö×Ó»ú¹¹¡£


https://blog.talosintelligence.com/lazarus-quiterat/


5¡¢Cl0p´ó¹æÄ£¹¥»÷»î¶¯ÒѾ­Ó°ÏìÖÁÉÙ1000¸öÆóÒµºÍ6000ÍòÈË


ýÌå8ÔÂ28ÈÕ³Æ £¬Emsisoft·ÖÏíÁ˹ØÓÚÀÕË÷ÍÅ»ïCl0pÕë¶ÔMOVEit TransferÎļþ´«ÊäÆ½Ì¨¹¥»÷»î¶¯µÄϸ½Ú¡£½ØÖÁ8ÔÂ25ÈÕ £¬Õâ´Î´ó¹æÄ£¹¥»÷»î¶¯ÒÑÓ°ÏìÔ¼1007¸öÆóÒµºÍ60144069Ó×ÎÒ¡£ÆäÖÐ £¬ÃÀ¹úÕ¼±È83.9% £¬Æä´ÎÊǵ¹ú£¨3.6%£©¡¢¼ÓÄôó£¨2.6%£©ºÍÓ¢¹ú£¨2.1%£©¡£ÊÜÓ°Ïì×îÑϳÁµÄÊǽðÈÚÓë·þÎñÐÐÒµºÍ½ÌÓýÐÐÒµ £¬±ðÀëÕ¼ÊÂÎñ×ÜÊýµÄ24.3%ºÍ26.0%¡£Æ¾¾ÝIBMµÄ2023ÄêÊý¾Ýй¶³É±¾»ã±¨ÖеÄÊý¾Ý¹ÀËã £¬¸ÃÊÂÎñÔì³ÉµÄ³É±¾Îª9923771385ÃÀÔª¡£


https://securityaffairs.com/149921/hacking/massive-moveit-campaign-campaign.html


6¡¢×êÑÐÈËÔ±°ä²¼Õë¶ÔJuniper SRX·À»ðǽ·ì϶µÄPoC


8ÔÂ28ÈÕ±¨Â·³Æ £¬×êÑÐÈËÔ±°ä²¼ÁËJuniper SRX·À»ðǽÖзì϶µÄPoC¡£8ÔÂÖÐÑ® £¬Juniper½¨¸´ÁËÓ°ÏìEX»¥»»»úºÍSRX·À»ðǽµÄËĸö·ì϶£¨CVE-2023-36844¡¢CVE-2023-36845¡¢CVE-2023-36846¡¢CVE-2023-36847£©¡£watchTowr°ä²¼µÄPoCÀûÓÃÁËÉí·ÝÑéÖ¤ÉÏ´«·ì϶(CVE-2023-36846)½«ËÁÒâPHPÎļþÉÏ´«µ½ÓµÓÐËæ»úÎļþÃûµÄÊÜÏÞĿ¼ £¬»¹ÉÏ´«ÁËPHPÅäÖÃÎļþ¡£¶øºóÀûÓÃPHP±í²¿±äÁ¿Åú¸Ä·ì϶(CVE- 2023-36845£©¸²¸Ç»·¾³±äÁ¿PHPRC²¢¼ÓÔØPHPÅäÖÃÎļþ £¬ÒÔ´¥·¢Ö´ÐÐ×î³õÉÏ´«µÄPHPÎļþ¡£


https://securityaffairs.com/149990/hacking/poc-exploit-juniper-srx-firewall-flaws.html