À³Ë÷ÍÐÖÐÑëÒøÐÐй©ÆäϵͳÔâµ½¹¥»÷²¿ÃŸ¶¿î¿ÉÄÜÑÓ³¤

°ä²¼¹¦·ò 2023-12-19
1¡¢À³Ë÷ÍÐÖÐÑëÒøÐÐй©ÆäϵͳÔâµ½¹¥»÷²¿ÃŸ¶¿î¿ÉÄÜÑÓ³¤


¾Ý12ÔÂ15ÈÕ±¨Â· £¬ÄϷǹú¶ÈÀ³Ë÷ÍеÄÖÐÑëÒøÐÐÔâµ½¹¥»÷¡£¸ÃÒøÐд«µÝ³Æ £¬Æäϵͳ11ÈÕÔâµ½¹¥»÷ £¬Ä¿Ç°ÔÚµ÷²é´ËÊ £¬²¢È«Ììºò¹¤×÷ÒÔ¸´Ô­ÏµÍ³¡£¸Ã»ú¹¹»¹±£ÕÏ £¬ËüûÓÐÔâµ½ÈκβÆÕþ»òÆäËüËðʧ¡£²»Íâ £¬ËüÒÑÔÝÍ£²¿ÃÅϵͳÒÔÔ¤·À½øÒ»²½µÄ¹¥»÷¡£Òò¶ø £¬ÔÚÒøÐÐÖÂÁ¦¸´Ô­ÏµÍ³µÄµÄͬʱ £¬Ò»Ð©¸¶¿î¿ÉÄÜ»áÑÓ³¤¡£±¾µØÃ½Ì屨· £¬ÓÉÓڸùúÇ®±ÒÂåµÙÓëÄÏ·ÇÀ¼Ìعҹ³ £¬ÓÐÈ˲»°²¸ÃÊÂÎñ¿ÉÄÜ»áÓ°Ïì»ãÂÊ¡£


https://therecord.media/central-bank-lesotho-cyberattack-causes-outages


2¡¢ÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾ÒòÔâµ½ÍøÂç¹¥»÷·þÎñÁÙʱÖжÏ


¾ÝýÌå12ÔÂ18ÈÕ±¨Â· £¬À´×ÔºÚ¿ÍÍÅ»ïGonjeshke DarandeµÄ¹¥»÷×ÌÈÅÁËÒÁÀʸ÷µØ¼ÓÓÍÕ¾µÄÔËÓª¡£¹¥»÷²úÉúÓÚ±¾ÖÜÒ» £¬Õâ¶ÔÊ×¶¼µÂºÚÀ¼Ôì³ÉÁËÑϳÁµÄÓ°Ïì £¬ºÜ¶à¼ÓÓÍÕ¾±»ÆÈÊÖ¶¯ÔËÐС£Ê¯ÓͲ¿³¤Javad Owjiй© £¬Õâ´Î¹¥»÷µ¼ÖÂÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾·þÎñÖжÏ¡£Gonjeshke DarandeÐû³Æ¶Ô´ËÊÂÎñÕÆ¹Ü £¬²¢°µÊ¾ËüÈëÇÖÁ˼ÓÓÍÕ¾µÄÖÐÑë·þÎñÆ÷ £¬»ñÈ¡ÁËÌØ¶¨¼ÓÓÍÕ¾ÐÅÏ¢¡¢Ö§¸¶ÏµÍ³¾ßÌåÐÅÏ¢ºÍÖÎÀíϵͳ¡£


https://securityaffairs.com/156065/hacktivism/pro-israel-predatory-sparrow-iran-fuel-stations.html


3¡¢¼ÓÃÜÇ®±ÒÂòÂôƽ̨GokuMarketÉϰÙÍòÓû§µÄÐÅϢй¶


ýÌå12ÔÂ15ÈÕ³Æ £¬ByteXÆìϵļ¯ÖÐʽ¼ÓÃÜÇ®±ÒÂòÂôËùGokuMarketй¶ÁËÏÕЩËùÓÐЧ»§µÄ¾ßÌåÐÅÏ¢¡£Cybernews·¢ÏÖÁËÒ»¸öδÊܱ£»¤µÄMongoDBÊ·ý £¬´æ´¢ÁËGokuMarket³¬¹ýÒ»°ÙÍò¿Í»§ºÍÖÎÀíÓû§µÄ¾ßÌåÐÅÏ¢¡£Õâ¸ö¶³öµÄÊý¾Ý¿âÔ̺¬Óû§IP¡¢¹ú¶È¡¢ÓʼþµØÖ·¡¢¼ÓÃÜÃÜÂëºÍÓû§¼ÓÃÜÇ®°üµØÖ·µÈÐÅÏ¢ £¬ÒÔ¼°35¸öÓµÓÐÆëÈ«ÖÎÀí½Ó¼ûȨÏÞµÄÕÊ»§¡£ËüÓÚ10Ô±»·¢ÏÖ £¬²¢Ôڻ㱨ºóµÄµÚ¶þÌì¾Í±»±£»¤ÆðÀ´¡£


https://securityaffairs.com/155885/security/crypto-exchange-gokumarket-exposed.html


4¡¢Resecurity³ÆBianLian¡¢White RabbitºÍMario´æÔÚÁªÏµ


ResecurityÔÚ12ÔÂ15ÈÕÅû¶Á˺ڿÍÍÅ»ïBianLian¡¢White RabbitºÍMarioÖ®¼äµÄÁªÏµ¡£×êÑÐÈËÔ±·¢ÏÖÁËÕâ3¸ö¹¥»÷ÍÅ»ïºÏ×÷½áºÏ·¢Õ¹Õë¶ÔÉÏÊнðÈÚ·þÎñ¹«Ë¾µÄÀÕË÷¹¥»÷¡£ÕâÖÖ½áºÏµÄÀÕË÷¹¥»÷²¢²»¶à¼û £¬µ«ÓÉÓÚIABÓë°µÍøÉ϶à¸ö¹¥»÷ÍÅ»ïµÄºÏ×÷ £¬ÕâÖֻ¿ÉÄÜ»á±äµÃÔ½À´Ô½³£¼û¡£Resecurity¹«¿ªÁËÓë3¸öÍÅ»ïͬʱִÐÐ"ÃÜÂëÅçÉä"¹¥»÷ÓйصÄIPµØÖ·Áбí £¬ÀûÓÃÁËÑÇÌ«µØÓòµÄ¶à¸öסլIP´úÀí¡£¹¥»÷Õß»¹ÀûÓÃBEC×÷ÎªÔØÌå £¬Ê¹ÓÃÆäËü×éÖ¯µÄ±»¹¥»÷ÓʼþÕÊ»§ÄäÃû·¢ËÍÊê½ðÒªÇó £¬½øÒ»²½Ôö³¤Á˵÷²éµÄÄѶÈ¡£


https://www.resecurity.com/blog/article/Exposing-Cyber-Extortion-Trinity-BianLian-White-Rabbit-Mario-Ransomware-Gangs-Spotted-Joint-Campaign 


5¡¢ESETÅû¶OilRig¶à¸öÒÀÀµÓÚÔÆ·þÎñ½øÐÐC&CµÄÏÂÔØ·¨Ê½


12ÔÂ14ÈÕ £¬ESET·ÖÎöÁËһϵÁÐеÄOilRigÏÂÔØ·¨Ê½ £¬ËüÃǶ¼ÒÀÀµºÏ·¨µÄÔÆ·þÎñÌṩÉÌ¡£OilRig £¬Ò²³ÆAPT34 £¬×Ô2014ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£¸ÃÍÅ»ïÔÚ2022ÄêµÄ¼¸´Î»î¶¯Öж¼Ê¹ÓÃÁ˶à¸öÏÂÔØ·¨Ê½ £¬Ô̺¬SampleCheck5000(SC5k v1-v3)¡¢OilCheck¡¢ODAgentºÍOilBooster¡£ÕâЩÏÂÔØ·¨Ê½µÄÏÔÖøÌØµãÊÇʹÓÃÁ˶à¸öºÏ·¨ÔÆ·þÎñAPI½øÐÐC&CͨѶºÍÊý¾Ýй¶ £¬ÀýÈçMicrosoft Graph OneDrive API¡¢Microsoft Graph Outlook APIºÍMicrosoft Office EWS API¡£


https://www.welivesecurity.com/en/eset-research/oilrig-persistent-attacks-cloud-service-powered-downloaders/  


6¡¢Check Point°ä²¼Rhadamanthysа汾µÄ·ÖÎö»ã±¨


12ÔÂ14ÈÕ £¬Check Point°ä²¼Á˹ØÓÚRhadamanthys 0.5.0°æ±¾µÄ·ÖÎö»ã±¨¡£ÕâÊÇÒ»ÖÖC++ÐÅÏ¢ÇÔÈ¡·¨Ê½ £¬ÓÚ2022Äê8Ô³õ´Î±»·¢ÏÖ £¬Ö¸±êÊǵç×ÓÓʼþ¡¢FTPºÍÔÚÏßÒøÐзþÎñÕÊ»§Í´´¦¡£»ã±¨Ö¸³ö £¬¸Ã°æ±¾ÒýÈëÁËÒ»¸öеIJå¼þϵͳ £¬¿É¶ÔÌØ¶¨·Ö·¢ÐèÒª½øÐиü¸ß¼¶´ËÍⶨÔì¡£0.5.0°æ»¹¸Ä½øÁË´æ¸ù¹¹½¨ºÍ¿Í»§¶ËÖ´Ðйý³Ì £¬½¨¸´ÁËÕë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄϵͳ £¬²¢½¨¸´ÁËDiscordÁîÅÆ»ñÈ¡ÎÊÌâ¡£


https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/