BLACKBASTA ÍÅ»ïÐû³Æ¶Ô SYNLAB ITALIA ¹¥»÷ÊÂÎñÕÆ¹Ü
°ä²¼¹¦·ò 2024-05-061. BLACKBASTA ÍÅ»ïÐû³Æ¶Ô SYNLAB ITALIA ¹¥»÷ÊÂÎñÕÆ¹Ü
5ÔÂ4ÈÕ£¬½üÆÚÒ½ÁÆÕï¶Ï·þÎñÌṩÉÌ Synlab Italia Ò»ÏòÒòÍøÂç¹¥»÷¶øÔâ·êÖжϡ£¸Ã¹«Ë¾×î³õ½«¼¼ÊõÎÊÌâÁÐΪµ¼ÖÂÍÆËã»úºÍµç»°ÏµÍ³¼°ÓйطþÎñÁÙʱÖжϵÄÔÒò¡£Ransomfeed.itƽ̨µÄ×êÑÐÈËԱй©£¬·¸×ï×éÖ¯BlackbastaÐû³Æ¶Ô Synlab µÄÀÕË÷Èí¼þ¹¥»÷ÕÆ¹Ü¡£¸Ã×éÖ¯Ðû³ÆÍµÇÔÁË 1.5 TB Êý¾Ý£¬Ô̺¬¹«Ë¾Êý¾Ý¡¢Ô±¹¤Ó×ÎÒÎĵµ¡¢¿Í»§Ó×ÎÒÊý¾Ý¡¢Ò½Ñ§·ÖÎö£¨¾«×Óͼ¡¢¶¾Àíѧ¡¢½âÆÊѧ¡¡£©µÈµÈ¡£×÷ΪÊý¾Ýй¶µÄÖ¤¾Ý£¬¸Ã×éÖ¯°ä²¼ÁË»¤ÕÕ¡¢Éí·ÝÖ¤ºÍҽѧ·ÖÎöµÄͼÏñ¡£¸Ã×éÖ¯°ä²¼µÄÆäÖÐÒ»ÕÅͼÏñÁгöÁ˱»ÇÔÈ¡µÄÎļþ¼Ð£¬ÆäÖÐһЩÔ̺¬Ò½ÁƲ鳵ÄÃû³Æ£¬¶øÁíһЩÔòÔ̺¬Î»ÓÚ¿²ÅÁÄáÑǵØÓòµÄÖÐÐÄÃû³Æ£¬Ö»¹ÜÕâ´ÎÏ®»÷Ó°ÏìÁËÕû¸öÒâ´óÀûµÄ²ÉÑùµã¡£BlackBasta ÀÕË÷Èí¼þ×éÖ¯½«ÓÚ 2024 Äê 5 Ô 11 ÈÕ°ä²¼±»µÁÊý¾Ý¡£Black Basta ×Ô 2022 Äê 4 ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬ÓëÆäËûÀÕË÷Èí¼þ²Ù×÷Ò»Ñù£¬ËüÖ´ÐÐÁËË«³ÁÀÕË÷¹¥»÷Ä£ÐÍ¡£ 2022 Äê 11 Ô£¬Sentinel Labs ×êÑÐÈËÔ±»ã±¨³Æ £¬ËûÃÇ·¢ÏÖÁË Black Basta ÀÕË÷Èí¼þÍÅ»ïÓë³öÓÚ¾¼Ã¶¯»úµÄºÚ¿Í×éÖ¯ FIN7 Ö®¼äµÄÁªÏµµÄÖ¤¾Ý¡£
https://securityaffairs.com/162741/security/blackbasta-gang-claimed-responsibility-for-synlab-italia-attack.html
2. APT42ʹÓÃÉç½»¹¤³Ì¹¥»÷ÇÖÈëÎ÷·½ºÍÖж«Ö¸±ê
5ÔÂ4ÈÕ£¬APT42³õ´Î±»MandiantÓÚ2022Äê9Լͼ£¬»ã±¨³ÆÕâЩÍþвÐÐΪÕß×Ô2015ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬ÒÑÔÚ14¸ö¹ú¶È½øÐÐÁËÖÁÉÙ30´Î²Ù×÷¡£Òѱ»¹Û²ìµ½Õë¶Ô·Çµ±¾Ö×éÖ¯¡¢Ã½Ìå»ú¹¹¡¢½ÌÓý»ú¹¹¡¢»î¶¯ÈËÊ¿ºÍ˾·¨·þÎñ¡£APT42µÄ¹¥»÷ÒÀÀµÓÚÉç½»¹¤³ÌºÍ´¹µö£¬Æä×îÖÕÖ¸±êÊÇͨ¹ý¶¨ÔìµÄºóÃÅϰȾָ±êÉ豸£¬´Ó¶øÊ¹ÍþвÐÐΪÕß»ñµÃ¶Ô×éÖ¯ÍøÂçµÄ³õʼ½Ó¼ûȨÏÞ¡£¹¥»÷´Ó¼ÙÒâ¼ÇÕß¡¢·Çµ±¾Ö×éÖ¯´ú±í»ò»î¶¯×éÖ¯ÕßµÄÔÚÏßÉí·Ý·¢Ë͵ĵç×ÓÓʼþÆðÍ·£¬ÕâЩµç×ÓÓʼþµÄÓòÃû¡°typosquat¡±£¨Ê¹ÓÃÀàËÆµÄURL£©ÓëºÏ·¨×éÖ¯µÄÓòÃûÀàËÆ¡£¹¥»÷ÕßÓëÊܺ¦Õß½øÐÐ×ã¹»µÄ¹µÍ¨ÒÔ³ÉÁ¢ÐÅÀµºó£¬»áÏòÊܺ¦Õß·¢ËÍÓë»áÒé»òÐÂÎÅÎÄÕÂÓйصÄÎĵµÁ´½Ó£¬¾ßÌåÈ¡¾öÓÚËùÑ¡µÄµö¶üÖ÷Ìâ¡£µã»÷ÕâЩÁ´½Ó»á½«Ö¸±ê³Á¶¨Ïòµ½·ÂÕÕ³ÛÃû·þÎñ£¨ÈçGoogleºÍMicrosoft£©»òÓëÊܺ¦Õß¹¤×÷ÁìÓòÓйصÄרҵƽ̨µÄÐéαµÇÂ¼Ò³Ãæ¡£APT42ʹÓÃÁ½¸ö¶¨ÔìµÄºóÃŶñÒâÈí¼þ£¬±ðÀ붨ÃûΪNicecurlºÍTamecat£¬Ã¿¸öºóÃŶ¼Õë¶ÔÍøÂç¼äµý»î¶¯ÖеÄÌØ¶¨Ö°ÄÜ¡£NicecurlÊÇ»ùÓÚVBScriptµÄºóÃÅ£¬¿ÉÄÜÖ´ÐкÅÁî¡¢ÏÂÔØºÍÖ´ÐÐÆäËûÔØºÉ£¬»òÔÚ±»Ï°È¾µÄÖ÷»úÉϽøÐÐÊý¾ÝÍÚ¾ò¡£TamecatÊÇÒ»¸ö¸ü¸´ÔÓµÄPowerShellºóÃÅ£¬Äܹ»Ö´ÐÐËÁÒâPS´úÂë»òC#¾ç±¾£¬Ê¹APT42ÔÚÖ´ÐÐÊý¾Ý͵ÇÔºÍ¿í·ºµÄϵͳ²Ù×÷ʱӵÓиü´óµÄ²Ù×÷½Ã½ÝÐÔ¡£ÓëNicecurlÏà±È£¬TamecatʹÓÃbase64»ìºÏÆäC2ͨѶ£¬Äܹ»¶¯Ì¬¸üÐÂÆäÅäÖ㬲¢ÔÚ±í²¿Ö´ÐÐ֮ǰÆÀ¹À±»Ï°È¾µÄ»·¾³¡£
https://www.bleepingcomputer.com/news/security/iranian-hackers-pose-as-journalists-to-push-backdoor-malware/
3. ¶íÂÞ˹ APT28 ÀûÓà Outlook ·ì϶¹¥»÷½Ý¿ËºÍµÂ¹ú
5ÔÂ4ÈÕ£¬½Ý¿ËºÍµÂ¹úй©£¬ËüÃÇÊÇÓë¶íÂÞ˹ÓÐÁªÏµµÄÃñ×å¹ú¶È×éÖ¯APT28½øÐеij־ÃÍøÂç¼äµý»î¶¯µÄÖ¸±ê£¬´Ë¾ÙÒýÆðÁËÅ·ÃË (EU)¡¢±±´óÎ÷ÑóÐÒé×éÖ¯ (NATO) µÄß³Ô𡣽ݿ˹²ºÍ¹ú±í½»²¿ (MFA) ÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬¸Ã¹úһЩδй©ÐÕÃûµÄʵÌåÒòÈ¥ËêÊ×ÆØ¹âµÄ Microsoft Outlook °²È«·ì϶¶øÔâµ½¹¥»÷¡£±í½»²¿°µÊ¾Õë¶ÔÕþÖÎʵÌå¡¢¹ú¶È»ú¹¹ºÍ¹Ø¼ü»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷²»½ö¶Ô¹ú¶È°²È«×é³ÉÍþв£¬²¢ÇÒ·ÛËéÁËÎÒÃÇ×ÔÓÉÉç»áËùÒÀÀµµÄÃñÖ÷¹ý³Ì¡£ËùÉæ¼°µÄ°²È«·ì϶ÊÇCVE-2023-23397£¬ÕâÊÇ Outlook ÖÐÏÖÒѽ¨²¹µÄÒ»¸ö¹Ø¼üȨÏÞÉý¼¶·ì϶£¬¿ÉÄÜÔÊÐí¹¥»÷Õß½Ó¼û Net-NTLMv2 ¹þÏ£Öµ£¬¶øºóʹÓÃËüÃÇͨ¹ýÖм̹¥»÷À´ÑéÖ¤×Ô¼ºµÄÉí·Ý¡£µÂ¹úÁª¹úµ±¾Ö£¨±ðÃû Bundesregierung£©½«ÍþвÐÐΪÕß¹é×ïÓÚÕë¶ÔÉç»áÃñÖ÷µ³Ö´ÐÐίԱ»áµÄÍøÂç¹¥»÷£¬¸Ã¹¥»÷ÔÚ¡°Ïà¶Ô½Ï³¤µÄ¹¦·òÄÚ¡±Ê¹ÓÃÒ»ÑùµÄ Outlook ·ì϶£¬Ê¹Æä¿ÉÄÜ¡°·çÏÕ´óÁ¿µç×ÓÓʼþÕÊ»§¡±¡£¸Ã»î¶¯Õë¶ÔµÄһЩ´¹Ö±ÐÐÒµÔ̺¬Î»Óڵ¹ú¡¢ÎÚ¿ËÀ¼ºÍÅ·ÖÞµÄÎïÁ÷¡¢¾ü±¸¡¢º½¿Õº½Ì칤ҵ¡¢IT ·þÎñ¡¢»ù½ð»áºÍлᣬÁª¹ú¼à¹Ü»ú¹¹»¹°µÊ¾¸Ã×éÖ¯²Î¼ÓÁË 2015 Äê¶ÔµÂ¹úÁª¹úÒé»á£¨Bundestag£©¡£APT28 ¾ÆÀ¹ÀÓë¶íÂÞ˹Áª¹ú¾üʵý±¨»ú¹¹ GRU µÄ¾üʵ¥Ôª 26165 ÓÐÁªÏµ£¬Ò²±»¸ü¿í·ºµÄÍøÂ簲ȫÉçÇøÒÔ BlueDelta¡¢Fancy Bear¡¢Forest Blizzard£¨ÒÔǰ³ÆÎª Strontium£©¡¢FROZENLAKE¡¢Iron Twilight¡¢Pawn Storm¡¢ Sednit¡¢Sofacy ºÍ TA422¡£
https://thehackernews.com/2024/05/microsoft-outlook-flaw-exploited-by.html
4. ÎÚ¿ËÀ¼¼Í¼¶íÂÞ˹ºÚ¿Í³öÓÚ¾¼Ã¶¯»úµÄ¹¥»÷ÓÐËùÔö³¤
5ÔÂ3ÈÕ£¬ÎÚ¿ËÀ¼µ±¾Ö»ã±¨³Æ£¬Óë¶íÂÞ˹ÓйصÄÏÈǰÉí·Ý²»Ã÷µÄºÚ¿Í³öÓÚ¾¼Ã¶¯»úÌáÒéµÄÍøÂç¹¥»÷ÓÐËùÔö³¤¡£Æ¾¾Ý×î½üµÄÒ»·Ý»ã±¨£¬ÕâЩ×éÖ¯ÔÚ 2023 ÄêϰëÄêÔÚÎÚ¿ËÀ¼ÍøÂçÖбäµÃÔ½·¢»îÔ¾£¬µ¼ÖÂ֮ǰÓÉ¿ËÀïÄ·ÁÖ¹¬Ö§³ÖµÄ³ÛÃûºÚ¿Í×éÖ¯£¨Èç¡°Sandworm¡±ºÍ¡°Armageddon¡±£©Ö÷µ¼µÄ³ÖÐøÍøÂçÕ½Õù²úÉúÁËת±ä¡£ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××é (CERT-UA) ÕÆ¹ÜÈË Yevheniia Volivnyk °µÊ¾Ð²μÓÕߵijöÏÖÅú×¢¶íÂÞ˹ÓÐÒâʹÆäÍøÂçÕ½±øÆ÷¿â¶àÑù»¯¡£ÕâЩ¼¯Ìå¿ÉÄÜÕ¼ÓйÖÒìµÄ¼¼Êõ»òרһÓÚÌØ¶¨µÄÔËÓªÖ¸±ê¡£ÎÚ¿ËÀ¼ÍøÂç×êÑÐÈËÔ±°µÊ¾£¬ÕâЩÐÂ×é֯ͨ¹ýʹÓþ¹ý³Á˼ÊìÂǵÄÍøÂç´¹µö¹¥»÷¶øÍÑÓ±¶ø³ö¡£ÖØÒªÖ¸±êÊÇ·Ö·¢¶ñÒâÔ¶³Ì½Ó¼ûÈí¼þ£¨ÀýÈçRemcosRATºÍ RemoteUtilities£©»òÊý¾Ý͵ÇÔ·¨Ê½£¨Ô̺¬ LummaStealer ºÍ MeduzaStealer£©¡£ÔÚ CERT-UA ·ÖÎöÆÚ¼ä£¬½ü 40% µÄ»ã±¨ÊÂÎñÓë½ðÈÚ͵ÇÔÓйء£CERT-UA °µÊ¾£¬Ô̺¬µçÐÅÐÐÒµÔÚÄÚµÄÎÚ¿ËÀ¼¹Ø¼ü»ù´¡ÉèÊ©ÒÀÈ»ÊǶíÂÞ˹ºÚ¿ÍµÄ×îÓÅÏÈÖ¸±ê£¬²¢ÇÒÕâÖÖÇ÷Ïò¿ÉÄÜ»á³ÖÐøÏÂÈ¥¡£¶íÂÞ˹Õë¶ÔÎÚ¿ËÀ¼¹Ø¼ü»ù´¡ÉèÊ©µÄºÜ¶àÐж¯±»ÃèÊöΪ¡°»ìºÏ¡±Ðж¯¡£ÀýÈ磬ÎÚ¿ËÀ¼×î´óµÄÒÆ¶¯ÔËÓªÉÌ Kyivstar£¨Îª 2500 ÍòÓû§Ìṩ·þÎñ£©Ôâµ½¹¥»÷£¬Ç¡·ê¶ÔÎÚ¿ËÀ¼½øÐдó¹æÄ£µ¼µ¯Ï®»÷¡£
https://therecord.media/ukraine-russia-increase-financially-motivated-cyberattacks?&web_view=true
5. Goldoon ½©Ê¬ÍøÂçÀûÓà 9 ÄêǰµÄ·ì϶¶Ô×¼ D-Link É豸
5ÔÂ4ÈÕ£¬Fortinet µÄ FortiGuard ³¢ÊÔÊÒµÄÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°Goldoon¡±µÄн©Ê¬ÍøÂçÍþв£¬×¨ÃÅÕë¶ÔD-Link ·ÓÉÆ÷ºÍÍøÂ總¼Ó´æ´¢ (NAS) É豸¡£¸Ã¶ñÒâÈí¼þÀûÓÃCVE-2015-2051£¨CVSSÆÀ·Ö£º10.0£©·ì϶ϰȾÉ豸£¬¿ÉÄÜʹÓû§Êý¾ÝºÍÍøÂç°²È«Ãæ¶Ô·çÏÕ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ 2015 Äê 2 Ô·¢Ïֵݲȫ·ì϶CVE-2015-2051ÒÑÓнüÊ®ÄêµÄº¹Çà¡£´Ë·ìÏ¶ÖØÒªÓ°Ï챨·ÏÉ豸¡£2022 Äê 9 Ô£¬Palo Alto Networks µÄ Unit 42·¢ÏÖ³ôÃûÔ¶ÑïµÄ Mirai ½©Ê¬ÍøÂçµÄ±äÌ壨³ÆÎª MooBot£©ÔÚÀûÓÃÒ»ÑùµÄ·ì϶£¬Õë¶Ô D-Link É豸¡£D-Link ÓÚ 2015 Äê½â¾öÁ˸ÃÎÊÌ⡣ƾ¾Ý Fortinet »ã±¨£¬Goldoon ÀûÓñ©Á¦¹¥»÷À´»ñÈ¡¶Ô D-Link É豸µÄ½Ó¼ûȨÏÞ¡£±©Á¦¹¥»÷Éæ¼°ÏµÍ³µØ³¢ÊÔ·ÖÆçµÄÓû§ÃûºÍÃÜÂë×éºÏ£¬Ö±µ½»ñµÃδ¾ÊÚȨµÄ½Ó¼û¡£¸Ã»ã±¨Åú×¢£¬ÕâЩ¹¥»÷ÀûÓÃÁËÖ¸±êÉ豸ÉϽÏÈõµÄĬÈÏÍ´´¦»ò¹ýÆÚµÄ¹Ì¼þ¡£
https://www.hackread.com/goldoon-botnet-targeting-d-link-devices/
6. LOCKBIT °ä²¼ÁË´Óê©ÄÉ SIMONE VEIL Ò½ÔºÇÔÈ¡µÄÊý¾Ý
5ÔÂ3ÈÕ£¬LockBit ÀÕË÷Èí¼þÔËÓªḚ́䲼Á˾ݳƴÓê©ÄÉ Simone Veil Ò½ÔºÇÔÈ¡µÄÃô¸ÐÊý¾Ý¡£4 Ô£¬ê©ÄÉ Simone Veil Ò½Ôº(CHC-SV) Ôâ·êÍøÂç¹¥»÷£¬ÆÈʹ¹¤×÷ÈËÔ±³ÁÐÂʹÓñʺÍÖ½¡£Ò½Ôº±»ÆÈ¹Ø¹ØËùÓÐÍÆËã»ú£¬µ«µç»°ÏßδÊÜÓ°Ïì¡£Ò½ÔºÔÚ ANSSI¡¢Cert Sant¨¦¡¢Orange Cyber D¨¦fense ºÍ GHT06 µÄÔ®ÊÖϵ÷²éÕâÒ»ÊÂÎñ¡£ê©ÄÉÎ÷ÃÉÄÈ¡¤Î¬¶ûÒ½ÔºÊÇÒ»¼ÒλÓÚ·¨¹úê©ÄɵĹ«Á¢Ò½Ôº¡£Ò½ÔºÎª±¾µØÉçÇø¼°ÖܱߵØÓòÌṩһϵÁÐÒ½ÁÆ·þÎñºÍ±£½¡ÉèÊ©¡£CHC-SVÕ¼ÓÐ2000¶àÃûÔ±¹¤£¬¿É°üÈÝ800¶àÕÅ´²Î»¡£LockBitÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÔÚÒ½Ôº»Ø¾øÖ§¸¶Êê½ðºóÓÚ 5 Ô 1 ÈÕ°ä²¼Á˱»µÁµÄ»úÃÜÊý¾Ý¡£ê©ÄÉÎ÷ÃÉÄÈ¡¤Î¤ÒÁÒ½ÔºÖÐÐÄÔÚÆäÍøÕ¾Éϰ䷢ÉêÃ÷£¬È·ÈÏÀÕË÷Èí¼þ×éÖ¯°ä²¼µÄÊý¾ÝÊôÓÚÆäËùÓС£´Óǰ£¬·¨¹úÆäËûÒ½ÔºÒ²ÊÇÍøÂç¹¥»÷µÄÊܺ¦Õß¡£2022 Äê 12 Ô£¬ ·²¶ûÈüÒ½ÔºÖÐÐÄ Ôâ·êÍøÂç¹¥»÷ £¬±»ÆÈÈ¡µÞÔËÓª²¢½«²¿ÃÅ»¼Õß×ªÒÆµ½ÆäËûÒ½Ôº¡£
https://securityaffairs.com/162721/cyber-crime/lockbit-published-simone-veil-hospital-data.html


¾©¹«Íø°²±¸11010802024551ºÅ