INC RANSOM ´ÓËÕ¸ñÀ¼ NHS ÖÐÇÔÈ¡ 3TB µÄÊý¾Ý
°ä²¼¹¦·ò 2024-03-293ÔÂ27ÈÕ£¬INC ÀÕË÷ÀÕË÷ÍŻォËÕ¸ñÀ¼¹ú¶ÈÒ½ÁÆ·þÎñϵͳ (NHS) Ôö³¤µ½Æä Tor Ð¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¸ÃÍøÂç·¸×ï×éÖ¯Ðû³ÆÇÔÈ¡ÁË 3 TB µÄÊý¾Ý£¬²¢ÍþвҪй¶ÕâЩÊý¾Ý¡£ËÕ¸ñÀ¼µÄ NHS£¨¼´¹úÃñÒ½ÁÆ·þÎñϵͳ£©ÊÇΪËÕ¸ñÀ¼·þÎñµÄ¹«¹²ÔÞÖúµÄÒ½ÁƱ£½¡ÏµÍ³¡£ËüÌṩ¿í·ºµÄÒ½ÁƱ£½¡·þÎñ£¬Ô̺¬Ò½Ôº¡¢È«¿ÆÒ½Éú (GP)¡¢ÉúÀí½¡È«·þÎñºÍÉçÇøÒ½ÁƱ£½¡¡£ËÕ¸ñÀ¼µ±¾ÖÕÆ¹Ü¼à¶½ËÕ¸ñÀ¼µÄ NHS£¬ÆäÔË×÷ÓëÓ¢¸ñÀ¼¡¢Íþ¶ûÊ¿ºÍ±±°®¶ûÀ¼µÄ NHS ϵͳ·Ö¸ô¡£NHSScotland ĿǰռÓÐÔ¼ 140000 ÃûÔ±¹¤£¬É¢²¼ÔÚ 14 ¸öµØÓò NHS ίԱ»á¡¢7 ¸ö NHS ³ö¸ñίԱ»áºÍ 1 ¸ö¹«¹²ÎÀ³¯Æø¹¹¡£Ã¿¸ö NHS ίԱ»á¶¼¶ÔËÕ¸ñÀ¼²¿³¤Õƹܣ¬²¢µÃµ½ËÕ¸ñÀ¼µ±¾ÖÎÀÉúºÍÉç»á±£½¡ÀíÊ»áµÄÖ§³Ö¡£µØÓò NHS ίԱ»áÕÆ¹Ü±£»¤ºÍ¸ÄÉÆÆäÈËÃñµÄ½¡È«²¢ÌṩһÏßÒ½ÁƱ£½¡·þÎñ¡£³ö¸ñ NHS ίԱ»áͨ¹ýÌṩһϵÁгÁÒªµÄר¼ÒºÍ¹ú¶È·þÎñÀ´Ö§³ÖµØÓò NHS ίԱ»á¡£
https://securityaffairs.com/161143/data-breach/inc-ransom-hacked-national-health-service-of-scotland.html
2. Stork ¼à¿Ø¹¤¾ßÖеķì϶¿ÉÄܵ¼Ö·þÎñÆ÷±»½Ù³Ö
2ÔÂ27ÈÕ£¬°²È«×êÑÐÈËÔ±ÔÚ Stork Öз¢ÏÖÁËÒ»¸öÑϳÁ·ì϶(CVE-2024-28872)£¬Stork ÊÇ Kea DHCP ·þÎñÆ÷µÄÊ¢ÐпªÔ´ÍøÂç¼à¿Ø¹¤¾ß¡£Õâ¸öȱµã¿ÉÄܵ¼Ö¹¥»÷Õß¿ÉÄÜ»á½Ù³Ö Stork ·þÎñÆ÷¡¢·ÛËéÃô¸ÐÊý¾Ý²¢·ÛËé¸ù»ùÍøÂç·þÎñ¡£¸Ã·ì϶´æÔÚÓÚ Stork ÑéÖ¤ TLS Ö¤ÊéµÄ·½Ê½ÖС£¹¥»÷ÕßÄܹ»Í¨¹ý´Ó Stork ·þÎñÆ÷»ñÈ¡ÓÐЧµÄ TLS Ö¤Ê鲢ʹÓÃËüÏνӵ½ Stork ´úÀí£¨ÓëÊÜ¼à¿Ø·þÎñһ·ÔËÐеÄÈí¼þ£©À´ÀûÓôËȱµã¡£Ò»µ©³ÉÁ¢Ïνӣ¬¹¥»÷Õß¾ÍÄܹ»ÏòÊÜ¼à¿ØµÄ·þÎñ£¨ÀýÈç Kea »ò BIND 9£©·¢ËÍÓµÓÐÌáÉýȨÏ޵ĶñÒâºÅÁî¡£¾¡¿ì½« Stork ¸üе½×îеĽ¨²¹°æ±¾£¨1.15.1 »ò¸ü¸ß°æ±¾£©¡£
https://securityonline.info/cve-2024-28872-vulnerability-in-stork-monitoring-tool-could-enable-server-takeover/
3. WarzoneRAT ¾íÍÁ³ÁÀ´£¬²¿Êð¸´ÔӵĶà½×¶Î¹¥»÷
3ÔÂ27ÈÕ£¬ WarzoneRAT£¨Ò²³ÆÎª Avemaria£©ÔÚ 2 ÔÂ·Ý FBI ¿ÛѺÆä»ù´¡ÉèÊ©µ¼Ö¶ÌÔÝÖжϺó¾íÍÁ³ÁÀ´¡£Æ¾¾ÝCyble ×êÑÐÓëµý±¨³¢ÊÔÊÒµÄÒ»·Ýл㱨(CRIL)£¬ÍþвÐÐΪÕß´Ë¿ÌÔÚ°ÂÃØ¡¢¶à½×¶Î¹¥»÷Öлý¼«²¿ÊðÕâÖÖ¼ÓÇ¿ÐÍ RAT¡£×îÐ嵀 WarzoneRAT»î¶¯ÖØÒªÍ¨¹ýÒÔ˰ÊÕΪÖ÷ÌâµÄÀ¬»øÓʼþÀ´Õë¶ÔÊܺ¦Õߣ¬ÆæÃîµØÀûÓÃʵʱÇÒʱʱÒýÆð½¹ÂǵÄÖ÷ÌâÀ´Ôö³¤Óû§´ò¿ª¶ñÒ⸽¼þµÄ¿ÉÄÜÐÔ¡£WarzoneRAT µÄ¾íÍÁ³ÁÀ´ÌáÐÑÈËÃÇ£¬¼´±ãÊÇÖжϵĶñÒâÈí¼þ²Ù×÷Ò²¿ÉÄÜ»áѸ¿ì¸´Ô£¬²¢ÇÒͨ³£»áÒÔ¸ü¸´ÔӵĴó¾Ö¸´Ô¡£×Ô¶¯¾¯ÌèºÍ·Ö²ã·ÀÓùÕ½Êõ¶ÔÓÚÓ×ÎÒºÍ×éÖ¯±£»¤×Ô¼ºÃâÊÜÕâÖÖ²»Ðݱ䶯µÄÍþвÖÁ¹Ø³ÁÒª¡£
https://securityonline.info/infamous-warzonerat-malware-returns-deploys-sophisticated-multi-stage-attacks/
4. ÒþÃØµÄРGolang ľÂíÀûÓÃÐéα֤Êé½øÐÐÌÓ±ÜͨѶ
3ÔÂ27ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÓà Golang ±à³Ì˵»°±àдµÄµó»¬µÄÐÂľÂí¡£ÕâÖÖÒõÏյĶñÒâÈí¼þѡȡһϵÁкýŪսÊõ£¬Ô̺¬µØÀí²é³ºÍ×°ÖÃÚ²ÆÐÔ¸ùÖ¤Ê飬ÒÔά³ÖÓëÆäºÅÁîºÍ½ÚÔì (C2) ·þÎñÆ÷µÄ°µ²ØÍ¨Ñ¶Í¨Â·¡£ÕâÖÖ¸´ÔÓµÄÌØÂåÒÁľÂíÊ×ÏÈÅÄÉãÊÜϰȾϵͳµÄ¿ìÕÕ£¬¿ÉÄÜ»áÍøÂçÓÐÕë¶ÔÐԵĹ¥»÷µÄ³ÁÒªÐÅÏ¢¡£¶øºó£¬Ëü»á¶·µ¨µØÔÚ Windows ×¢²á±íÖÐ×°ÖÃαÔìµÄ¸ùÖ¤Êé¡£Õâһа¶ñ²½ÖèʹÆä¿ÉÄÜÀ¹½Ø²¢¿ÉÄܰѳּÓÃÜµÄ HTTPS Á÷Á¿£¬´Ó¶øÊ¹Óû§ÈÝÒ×Ôâ·êÊý¾Ý͵ÇÔ¡£¹ÌȻûÓÐÌØ¶¨µÄ¶ñÒâÈí¼þ¼Ò×åÓë¸ÃľÂíÓйأ¬µ«×êÑÐÈËÔ±ÖÒ¸æËµ£¬ÔÚ֮ǰÓë PureLog Stealer¡¢AgentTesla ºÍ GuLoader µÈ³ôÃûÔ¶ÑïµÄÍþвÓйصĻÖÐÒѾ·¢ÏÖÁËËùÉæ¼°µÄ IP ºÍ URL µØÖ·¡£
https://securityonline.info/stealthy-new-golang-trojan-exploits-fake-certificates-for-evasive-communication/
5. CISA °ä²¼ÍøÂçÊÂÎñ»ã±¨¹æ¶¨²Ý°¸
3ÔÂ28ÈÕ£¬ÃÀ¹ú×î¸ßÍøÂ簲ȫ»ú¹¹°ä²¼ÁËÒ»Ïîй涨µÄ³õ¸å£¬¾ßÌå˵ÁËÈ»¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯±ØÒªÈôºÎÏòÁª¹úµ±¾Ö»ã±¨ÍøÂç¹¥»÷¡£ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö (CISA)ƾ¾Ý¡¶¹Ø¼ü»ù´¡ÉèÊ©ÍøÂçÊÂÎñ»ã±¨·¨¡·Ïò¡¶Áª¹ú¹«±¨¡·°ä²¼ÁË447 Ò³µÄÂÉÀý£¬ÔÊÐí¹«¼Ò¶ÔÆä°ä·¢ÆÀÂÛ¡£ºÓɽ°²È«Êý²¿³¤ÑÇÀúº¼µÂÂÞ¡¤ÂíÔ¼¿¨Ë¹°µÊ¾£¬ÕâЩÐÅÏ¢½«Ê¹ CISA ºÍÆäËû»ú¹¹¿ÉÄܸüºÃµØÓ¦¶ÔÊÂÎñ²¢ÕÒ³öÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©ÖеÄÓÄ΢»·½Ú¡£CIRCIA ÒªÇóijЩ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ÔÚ 72 Ó×ʱÄÚ»ã±¨ÍøÂçÊÂÎñ£¬²¢ÔÚ 24 Ó×ʱÄڻ㱨ÀÕË÷Èí¼þ¸¶¿î¡£¸Ã˾·¨º¸ÇµÄÊÂÎñÔ̺¬¡°¶Ô×éÖ¯µÄÔË×÷ÄÜÁ¦»ò¹ú¶È°²È«¡¢¹«¹²½¡È«»ò°²È«Ôì³É³Á´óÇÖº¦»ò×é³É³Á´óÍþв¡±µÄÊÂÎñ¡£
https://therecord.media/cisa-publishes-circia-rule-cyber-incident-reporting
6. µÂ¿ËÈøË¹ÖݺÍ×ôÖÎÑÇÖݵÄÊÐÕþ·þÎñÔâµ½ÀÕË÷¹¥»÷
3ÔÂ28ÈÕ£¬ÃÀ¹ú¸÷µØµÄ¹ú¶È»ú¹¹³ÖÐøÃæ¶ÔÀÕË÷Èí¼þ¹¥»÷µÄ×ÌÈÅ¡£×ôÖÎÑÇÖݼª¶ûÄ¬ÏØµ±¾ÖÔÚÆäÍøÕ¾Éϰ䲼֪ͨ£¬ÖÒ¸æÀÕË÷Èí¼þ¹¥»÷ÔÚÓ°ÏìÆäÏò 30000 ¶àÃû¾ÓÃñÌṩ·þÎñµÄÄÜÁ¦¡£¡°¼ª¶ûÄ¬ÏØ×î½ü·¢ÏÖ²¢ÏìÓ¦ÁËÀÕË÷Èí¼þÊÂÎñ£¬²¢ÒÑʹÊÜÓ°ÏìµÄϵͳÀëÏߣ¬Í¬Ê±ÎÒÃÇÖÂÁ¦ÓÚ°²È«µØ±£»¤ºÍ¸´Ô·þÎñ¡£Óë´Ëͬʱ£¬¹«¼ÒÓ¦¸ÃÒâÁϵ½Ïص±¾Ö»áÒò¶øÔì³ÉÑÓÎ󡣡±Í¨Öª³Æ¡£¼ª¶ûÄ¬ÏØÏòÁª¹ú·¨Âɲ¿ÃÅ·¢³öÁ˾¯±¨£¬²¢ÀñƸÁËÒ»¼ÒÍøÂ簲ȫ¹«Ë¾À´½â¾öÕâ´Î¹¥»÷Ôì³ÉµÄÖжÏÎÊÌâ¡£¸»¶û¶ÙÏØÊÇÑÇÌØÀ¼´óµÄµØµãµØ£¬ÔÚ 1 Ô·ÝÔâ·ê LockBit ÀÕË÷Èí¼þÍŻ﹥»÷ºó£¬¸ÃÏØÈÔÔÚ¸´Ô¹Ø¼ü·þÎñ¡£
https://therecord.media/texas-georgia-municipalities-face-disruptions-from-ransomware


¾©¹«Íø°²±¸11010802024551ºÅ