À³Ë÷ÍÐÖÐÑëÒøÐÐй©ÆäϵͳÔâµ½¹¥»÷²¿ÃŸ¶¿î¿ÉÄÜÑÓ³¤
°ä²¼¹¦·ò 2023-12-19¾Ý12ÔÂ15ÈÕ±¨Â·£¬ÄϷǹú¶ÈÀ³Ë÷ÍеÄÖÐÑëÒøÐÐÔâµ½¹¥»÷¡£¸ÃÒøÐд«µÝ³Æ£¬Æäϵͳ11ÈÕÔâµ½¹¥»÷£¬Ä¿Ç°ÔÚµ÷²é´ËÊ£¬²¢È«Ììºò¹¤×÷ÒÔ¸´Ôϵͳ¡£¸Ã»ú¹¹»¹±£ÕÏ£¬ËüûÓÐÔâµ½ÈκβÆÕþ»òÆäËüËðʧ¡£²»Í⣬ËüÒÑÔÝÍ£²¿ÃÅϵͳÒÔÔ¤·À½øÒ»²½µÄ¹¥»÷¡£Òò¶ø£¬ÔÚÒøÐÐÖÂÁ¦¸´ÔϵͳµÄµÄͬʱ£¬Ò»Ð©¸¶¿î¿ÉÄÜ»áÑÓ³¤¡£±¾µØÃ½Ì屨·£¬ÓÉÓڸùúÇ®±ÒÂåµÙÓëÄÏ·ÇÀ¼Ìعҹ³£¬ÓÐÈ˲»°²¸ÃÊÂÎñ¿ÉÄÜ»áÓ°Ïì»ãÂÊ¡£
https://therecord.media/central-bank-lesotho-cyberattack-causes-outages
2¡¢ÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾ÒòÔâµ½ÍøÂç¹¥»÷·þÎñÁÙʱÖжÏ
¾ÝýÌå12ÔÂ18ÈÕ±¨Â·£¬À´×ÔºÚ¿ÍÍÅ»ïGonjeshke DarandeµÄ¹¥»÷×ÌÈÅÁËÒÁÀʸ÷µØ¼ÓÓÍÕ¾µÄÔËÓª¡£¹¥»÷²úÉúÓÚ±¾ÖÜÒ»£¬Õâ¶ÔÊ×¶¼µÂºÚÀ¼Ôì³ÉÁËÑϳÁµÄÓ°Ï죬ºÜ¶à¼ÓÓÍÕ¾±»ÆÈÊÖ¶¯ÔËÐС£Ê¯ÓͲ¿³¤Javad Owjiй©£¬Õâ´Î¹¥»÷µ¼ÖÂÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾·þÎñÖжϡ£Gonjeshke DarandeÐû³Æ¶Ô´ËÊÂÎñÕÆ¹Ü£¬²¢°µÊ¾ËüÈëÇÖÁ˼ÓÓÍÕ¾µÄÖÐÑë·þÎñÆ÷£¬»ñÈ¡ÁËÌØ¶¨¼ÓÓÍÕ¾ÐÅÏ¢¡¢Ö§¸¶ÏµÍ³¾ßÌåÐÅÏ¢ºÍÖÎÀíϵͳ¡£
https://securityaffairs.com/156065/hacktivism/pro-israel-predatory-sparrow-iran-fuel-stations.html
3¡¢¼ÓÃÜÇ®±ÒÂòÂôƽ̨GokuMarketÉϰÙÍòÓû§µÄÐÅϢй¶
ýÌå12ÔÂ15Èճƣ¬ByteXÆìϵļ¯ÖÐʽ¼ÓÃÜÇ®±ÒÂòÂôËùGokuMarketй¶ÁËÏÕЩËùÓÐЧ»§µÄ¾ßÌåÐÅÏ¢¡£Cybernews·¢ÏÖÁËÒ»¸öδÊܱ£»¤µÄMongoDBÊ·ý£¬´æ´¢ÁËGokuMarket³¬¹ýÒ»°ÙÍò¿Í»§ºÍÖÎÀíÓû§µÄ¾ßÌåÐÅÏ¢¡£Õâ¸ö¶³öµÄÊý¾Ý¿âÔ̺¬Óû§IP¡¢¹ú¶È¡¢ÓʼþµØÖ·¡¢¼ÓÃÜÃÜÂëºÍÓû§¼ÓÃÜÇ®°üµØÖ·µÈÐÅÏ¢£¬ÒÔ¼°35¸öÓµÓÐÆëÈ«ÖÎÀí½Ó¼ûȨÏÞµÄÕÊ»§¡£ËüÓÚ10Ô±»·¢ÏÖ£¬²¢Ôڻ㱨ºóµÄµÚ¶þÌì¾Í±»±£»¤ÆðÀ´¡£
https://securityaffairs.com/155885/security/crypto-exchange-gokumarket-exposed.html
4¡¢Resecurity³ÆBianLian¡¢White RabbitºÍMario´æÔÚÁªÏµ
ResecurityÔÚ12ÔÂ15ÈÕÅû¶Á˺ڿÍÍÅ»ïBianLian¡¢White RabbitºÍMarioÖ®¼äµÄÁªÏµ¡£×êÑÐÈËÔ±·¢ÏÖÁËÕâ3¸ö¹¥»÷ÍÅ»ïºÏ×÷½áºÏ·¢Õ¹Õë¶ÔÉÏÊнðÈÚ·þÎñ¹«Ë¾µÄÀÕË÷¹¥»÷¡£ÕâÖÖ½áºÏµÄÀÕË÷¹¥»÷²¢²»¶à¼û£¬µ«ÓÉÓÚIABÓë°µÍøÉ϶à¸ö¹¥»÷ÍÅ»ïµÄºÏ×÷£¬ÕâÖֻ¿ÉÄÜ»á±äµÃÔ½À´Ô½³£¼û¡£Resecurity¹«¿ªÁËÓë3¸öÍÅ»ïͬʱִÐÐ"ÃÜÂëÅçÉä"¹¥»÷ÓйصÄIPµØÖ·ÁÐ±í£¬ÀûÓÃÁËÑÇÌ«µØÓòµÄ¶à¸öסլIP´úÀí¡£¹¥»÷Õß»¹ÀûÓÃBEC×÷ÎªÔØÌ壬ʹÓÃÆäËü×éÖ¯µÄ±»¹¥»÷ÓʼþÕÊ»§ÄäÃû·¢ËÍÊê½ðÒªÇ󣬽øÒ»²½Ôö³¤Á˵÷²éµÄÄѶȡ£
https://www.resecurity.com/blog/article/Exposing-Cyber-Extortion-Trinity-BianLian-White-Rabbit-Mario-Ransomware-Gangs-Spotted-Joint-Campaign
5¡¢ESETÅû¶OilRig¶à¸öÒÀÀµÓÚÔÆ·þÎñ½øÐÐC&CµÄÏÂÔØ·¨Ê½
12ÔÂ14ÈÕ£¬ESET·ÖÎöÁËһϵÁÐеÄOilRigÏÂÔØ·¨Ê½£¬ËüÃǶ¼ÒÀÀµºÏ·¨µÄÔÆ·þÎñÌṩÉÌ¡£OilRig£¬Ò²³ÆAPT34£¬×Ô2014ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£¸ÃÍÅ»ïÔÚ2022ÄêµÄ¼¸´Î»î¶¯Öж¼Ê¹ÓÃÁ˶à¸öÏÂÔØ·¨Ê½£¬Ô̺¬SampleCheck5000(SC5k v1-v3)¡¢OilCheck¡¢ODAgentºÍOilBooster¡£ÕâЩÏÂÔØ·¨Ê½µÄÏÔÖøÌØµãÊÇʹÓÃÁ˶à¸öºÏ·¨ÔÆ·þÎñAPI½øÐÐC&CͨѶºÍÊý¾Ýй¶£¬ÀýÈçMicrosoft Graph OneDrive API¡¢Microsoft Graph Outlook APIºÍMicrosoft Office EWS API¡£
https://www.welivesecurity.com/en/eset-research/oilrig-persistent-attacks-cloud-service-powered-downloaders/
6¡¢Check Point°ä²¼Rhadamanthysа汾µÄ·ÖÎö»ã±¨
12ÔÂ14ÈÕ£¬Check Point°ä²¼Á˹ØÓÚRhadamanthys 0.5.0°æ±¾µÄ·ÖÎö»ã±¨¡£ÕâÊÇÒ»ÖÖC++ÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÓÚ2022Äê8Ô³õ´Î±»·¢ÏÖ£¬Ö¸±êÊǵç×ÓÓʼþ¡¢FTPºÍÔÚÏßÒøÐзþÎñÕÊ»§Í´´¦¡£»ã±¨Ö¸³ö£¬¸Ã°æ±¾ÒýÈëÁËÒ»¸öеIJå¼þϵͳ£¬¿É¶ÔÌØ¶¨·Ö·¢ÐèÒª½øÐиü¸ß¼¶´ËÍⶨÔì¡£0.5.0°æ»¹¸Ä½øÁË´æ¸ù¹¹½¨ºÍ¿Í»§¶ËÖ´Ðйý³Ì£¬½¨¸´ÁËÕë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄϵͳ£¬²¢½¨¸´ÁËDiscordÁîÅÆ»ñÈ¡ÎÊÌâ¡£
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/


¾©¹«Íø°²±¸11010802024551ºÅ