°²´ÖÂÔÒ½ÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶

°ä²¼¹¦·ò 2023-09-27

1¡¢°²´ÖÂÔÒ½ÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶


¾Ý9ÔÂ25ÈÕ±¨Â·£¬°²´ÖÂÔµÄÒ½ÁƱ£½¡»ú¹¹Better Outcomes Registration & Network(BORN)Ô¼340ÍòÈ˵ÄÊý¾Ýй¶¡£¸ÃÊÂÎñÔ´ÓÚClopÀûÓÃProgress MOVEit TransferÈí¼þÖзì϶(CVE-2023-34362)µÄ¹¥»÷»î¶¯¡£BORNÓÚ5ÔÂ31ÈÕ³õ´ÎÒâʶµ½¸ÃÎÊÌ⣬֮ºóµÄµ÷²éÏÔʾ£¬¹¥»÷ÕßÒÑÇÔÈ¡Ô̺¬Ô¼340ÍòÈËÐÅÏ¢µÄÎļþ£¬ÆäÖÐÖØÒªÊÇÐÂÉú¶ùºÍ»³Ôл¤Àí»¼Õߣ¬ÕâЩÈËÔÚ2010Äê1ÔÂÖÁ2023Äê5ÔÂÆÚ¼äʹÓÃÁËBORN·þÎñ¡£


https://www.bleepingcomputer.com/news/security/born-ontario-child-registry-data-breach-affects-34-million-people/


2¡¢RansomedVCÐû³ÆÒÑÈëÇÖË÷ÄáµÄϵͳ²¢½«ÏúÊÛÆäÊý¾Ý


¾ÝýÌå9ÔÂ26Èճƣ¬RansomedVCÐû³ÆÒÑÈëÇÖË÷ÄἯÍŵÄϵͳ£¬²¢°µÊ¾½«ÏúÊÛÆäÊý¾ÝºÍ½Ó¼ûȨÏÞ£¬ÓÉÓÚË÷Äá²»Ïë½»Êê½ð¡£RansomedVC°ä²¼µÄÑù±¾ºÜÓ×£¬Ô¼2MB£¬Ô̺¬PPTÑÝʾÎĸ塢һЩJavaÔ´´úÂëÎļþºÍEclipse IDE½ØÍ¼µÈ¡£¸ÃÍÅ»ï³ÆÇÔÈ¡ÁË260 GBÊý¾Ý£¬²¢ÊÔͼÒÔ250ÍòÃÀÔªÏúÊÛÕâЩÊý¾Ý¡£ÁíÒ»¸öºÚ¿ÍÍÅ»ïMajorNelson³ÆRansomedVCÊÇÆ­×Ó£¬²¢°µÊ¾ËûÃǶÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¸ÃÍÅ»ï°ä²¼ÁË2.4 GBµÄѹËõÎļþ×÷ΪÑù±¾£¬ÆäÖÐÔ̺¬RansomedVCµÄÑù±¾ÖеÄËùÓÐÎļþ¡£Ë÷ÄáĿǰÔÚµ÷²éÕâ´Î¹¥»÷ÊÂÎñ¡£


https://www.bleepingcomputer.com/news/security/sony-investigates-cyberattack-as-hackers-fight-over-whos-responsible/


3¡¢Progressive LeasingÔâµ½¹¥»÷´óÁ¿¿Í»§µÄÐÅϢй¶


ýÌå9ÔÂ26Èճƣ¬Progressive LeasingÔâµ½¹¥»÷µ¼Ö´óÁ¿¿Í»§µÄÐÅϢй¶¡£ÕâÊÇÒ»¼Ò¼ÛÖµÊýÊ®ÒÚÃÀÔªµÄ¹«Ë¾£¬ÔÊÐíÈËÃÇ×âÁÞÏû·ÑÆ·¡£½²»°È˳Æ£¬Õâ´Î°²È«ÊÂÎñÓ°ÏìÁËProgressive LeasingµÄ²¿ÃÅϵͳ£¬µ«Î´¶ÔÆäÔËÓªÔì³É³Á´óÓ°Ï죬Ŀǰ¹¦·òÈÔÔÚµ÷²éÖС£¾ÝϤ£¬AlphVÐû³Æ¶ÔÖÜÎåµÄ¹¥»÷ÕÆ¹Ü£¬Òѽ«¸Ã¹«Ë¾Ôö³¤µ½ÆäÍøÕ¾£¬²¢°µÊ¾ÒÑÇÔÈ¡³¬¹ý4000Íò¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£


https://therecord.media/product-leasing-giant-progressive-ransomware


4¡¢RhysidaÍÅ»ïÐû³Æ¶Ô¿ÆÍþÌØ²ÆÕþ²¿Ôâµ½µÄ¹¥»÷ÕÆ¹Ü


9ÔÂ26ÈÕ±¨Â·³Æ£¬ÀÕË÷ÍÅ»ïRhysida¶Ô¿ÆÍþÌØ²ÆÕþ²¿Ôâµ½µÄ¹¥»÷ÕÆ¹Ü¡£¹¥»÷²úÉúÔÚ9ÔÂ18ÈÕ£¬¿ÆÍþÌØ²ÆÕþ²¿ÔÚµ±Ìì·¢Ìû³ÆÒѹعØÊÜÓ°ÏìµÄϵͳ£¬ÒÔÔ¤·À½øÒ»²½µÄ¹¥»÷¡£¸Ã²¿»¹È·ÈÏ£¬Ð½×Êϵͳ²»»áÊܵ½Õâ´Î¹¥»÷µÄÓ°Ï죬ÓÉÓÚµ±¾ÖµÄ²ÆÕþϵͳÊǶÀÁ¢µÄ¡£Ä¿Ç°£¬¸Ã²¿ÉÐδ´ÓÀÕË÷¹¥»÷ÖÐÆëÈ«¸´Ô­£¬ËûÃÇÈÔÔÚµ÷²éÕâ´ÎÊÂÎñ¡£RhysidaÔÚ±¾Öܽ«¸Ã»ú¹¹Ôö³¤µ½ÆäÍøÕ¾ÖУ¬»¹°ä²¼ÁËÒ»×éÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£


https://securityaffairs.com/151501/cyber-crime/rhysida-ransomware-kuwait-ministry-of-finance.html


5¡¢ThreatFabricÅûÂ¶ÖØÒªÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄXenomorph»î¶¯


ThreatFabricÔÚ9ÔÂ25ÈÕÅû¶ÁËÕë¶Ô³¬¹ý30¼ÒÃÀ¹ú½ðÈÚ»ú¹¹·Ö·¢XenomorphµÄ»î¶¯¡£XenomorphÓÚ2022ËêÊ׳õ´Î³öÏÖ£¬Õë¶Ô56¼ÒÅ·ÖÞµÄÒøÐС£ÔÚ×îеĻÖУ¬Í¨¹ýChromeä¯ÀÀÆ÷ÓÕʹָ±êÏÂÔØ¶ñÒâAPK¡£Ã¿¸öXenomorphÑù±¾¶¼¼ÓÔØÁËԼĪһ°Ù¸ö¸²¸Ç²ã£¬Õë¶Ô·ÖÆçµÄÒøÐкͼÓÃÜÀûÓ÷¨Ê½¡£ThreatFabric»¹½Ó¼ûÁËÍйÜpayloadµÄ»ù´¡ÉèÊ©£¬·¢ÏÖÁËÆäËü¶ñÒâÈí¼þ£¬Ô̺¬Medusa¡¢Cabassous¡¢RisePro¡¢LummaC2ÒÔ¼°Private Loader¡£


https://www.threatfabric.com/blogs/xenomorph


6¡¢×êÑÐÈËÔ±ÏêÊöÕë¶ÔÎÚ¿ËÀ¼·Ö·¢MerlinAgentµÄ´¹µö¹¥»÷


9ÔÂ25ÈÕ£¬Securonix°ä²¼»ã±¨ÏêÊöÁËÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ´¹µö¹¥»÷»î¶¯¡£¸Ã»î¶¯µÄ´úºÅΪSTARK#VORTEX£¬ÒÔPICÎÞÈË»úÊÖ²áÎĵµ×÷Ϊµö¶ü·Ö·¢MerlinAgent£¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0154¡£MerlinAgentÊÇÒ»¸öGo¿ª·¢µÄ¿ªÔ´C2¹¤¾ß°ü£¬ÀàËÆÓÚCobalt Strike»òSliver¡£µö¶üÊÇMicrosoftÔ®ÊÖÎļþ(.chm)£¬´ò¿ªºó»áÔËÐÐǶÈëµÄ¶ñÒâJavaScript£¬ÒÔÖ´ÐÐPowerShell´úÂ룬¸Ã´úÂë´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡»ìºÏµÄ¶þ½øÔìÎļþ¡£payload»áÏÂÔØMerlin Agent£¬¶øMerlin AgentÓÖ±»ÅäÖÃΪÓëC2·þÎñÆ÷ͨѶ£¬ÒÔÖ´Ðй¥»÷ºóµÄ»î¶¯£¬´Ó¶øÓÐЧµØ´Û¶áÖ÷»úµÄ½ÚÔìȨ¡£


https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/