³¯ÏÊLazarus GroupÀûÓÃÐéαÕÐÆ¸Óë¶ñÒâÈí¼þËÁÅ°Çø¿éÁ´ÁìÓò
°ä²¼¹¦·ò 2024-09-119ÔÂ9ÈÕ£¬Group-IB µÄ×îл㱨½ÒʾÁ˳¯Ïʵ±¾ÖÖ§³ÖµÄ Lazarus Group ÔÚ½øÐеġ°Eager Crypto Beavers¡±»î¶¯£¬¸Ã»î¶¯ÏÔÖøÉý¼¶ÁËÆäÍøÂç¹¥»÷Õ½Êõ£¬×¨Ò»ÓÚÇø¿éÁ´¼°¼ÓÃÜÇ®±ÒÁìÓò¡£Lazarus ¼¯ÍÅÀûÓø´ÔÓ¼¿Á©£¬ÈçÐéα¹¤×÷»úÓö¡¢¶ñÒâÊÓÆµ»áÒéÀûÓ÷¨Ê½£¨ÈçFCCCall£©ÒÔ¼°GitHubÉϵÄÓÎÏ·ºÍ¼ÓÃÜÇ®±ÒÏîÄ¿£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ²¢Ö´ÐÐÃûΪBeaverTailµÄ¶ñÒâÈí¼þ¡£¸ÃÈí¼þ²»½öÇÔÈ¡ä¯ÀÀÆ÷Í´´¦ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬»¹²¿ÊðÃûΪInvisibleFerretµÄPythonºóÃÅÒÔÀ©´ó¹¥»÷ÁìÓò¡£´Ë±í£¬¹¥»÷»¹À©´óÖÁmacOSÉ豸£¬²¢Í¨¹ý»ìºÏ´úÂëºÍÔ¶³Ì½Ó¼û¹¤¾ß£¨ÈçAnyDesk£©ÔÚ¶à¸ö²Ù×÷ϵͳÉÏʵÏÖÓÆ¾ÃÐÔ¡£¸üÁîÈËÓÇÓôµÄÊÇ£¬LazarusÒѽ«Ö¸±êÀ©´óÖÁä¯ÀÀÆ÷À©´ó¡¢ÃÜÂëÖÎÀíÆ÷¼°Microsoft Sticky Notes£¬²¢Í¨¹ýFTPºÍTelegramµÈÇþ·ÇÔÈ¡Êý¾Ý¡£´Ë»î¶¯ÏÔʾÁËLazarusÔÚÊý¾ÝÇÔÈ¡¼¼ÊõÉϵĸ߶Èרҵ»¯Óë½Ã½ÝÐÔ£¬Ôö³¤Á˰²È«¼ì²âºÍ·À±¸µÄÄѶȡ£
https://hackread.com/lazarus-group-blockchain-fake-video-conferencing-job-scam/?web_view=true
2. RansomHubÍÅ»ïÀÄÓÃTDSSKiller½ûÓÃEDRÈí¼þ
9ÔÂ10ÈÕ£¬RansomHub ÀÕË÷Èí¼þÍÅ»ïÆæÃîÀûÓÿ¨°Í˹»ùµÄºÏ·¨¹¤¾ß TDSSKiller£¬¶ã±ÜÁËÖ¸±êϵͳµÄ¶Ëµã¼ì²âºÍÏìÓ¦£¨EDR£©·À»¤¡£TDSSKiller Õý±¾Éè¼ÆÓÃÓÚ¼ì²âÄÑÒÔ¾õ²ìµÄ rootkit ºÍ bootkit ¶ñÒâÈí¼þ£¬µ«ÆäÖ°Äܱ» RansomHub ¶ñÒâÀûÓã¬Í¨¹ý½ûÓà Malwarebytes Anti-Malware µÈ°²È«·þÎñ£¬¼õÈõÁËϵͳ·ÀÓù¡£ÕâÒ»ÀÄÓÃÊÖ·¨ÀûÓÃÁË TDSSKiller µÄºÏ·¨ÐÔºÍÓÐЧ֤ÊéÊðÃû£¬Ê¹ÆäÄÜÌӱܰ²È«Èí¼þµÄÀ¹½Ø¡£Ëæºó£¬RansomHub ²¿Êð LaZagne Æ¾Ö¤ÍøÂ繤¾ß£¬´Ó¶àÖÖÀûÓÃÊý¾Ý¿âÖÐÇÔÈ¡µÇ¼ÐÅÏ¢£¬ÖúÁ¦ÆäÔÚÍøÂçÖкáÏòÀ©É¢¡£LaZagne µÄ»î¶¯ËäÒ×±»·¢ÏÖ£¬µ« TDSSKiller µÄȾ֧ʹÆäÔ½·¢Òñ±Î¡£Malwarebytes »ã±¨Ö¸³ö£¬TDSSKiller Ö´ÐÐʱѡȡ¶¯Ì¬ÎļþÃû£¬°µ²ØÓÚһʱĿ¼ÖУ¬Ôö³¤Á˼ì²âÄѶȡ£Ãæ¶Ô´ËÍþв£¬°²È«¹«Ë¾½¨Òé¼ÓÇ¿ EDR ½â¾ö¹æ»®µÄ·À´Û¸ÄÖ°ÄÜ£¬Ô¤·ÀÀàËÆ TDSSKiller µÄ¹¤¾ß½ûÓ÷À»¤¡£Í¬Ê±£¬¼à¿ØÌض¨ÊýÁîÐвÎÊýºÍÖ´ÐÐÐÐΪҲÊÇÓÐЧ·ÀÓù´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/
3. KonniºÚ¿Í×éÖ¯£ºÕë¶Ô¶íº«µÄÍøÂç¼äµý¹¥»÷Õ½Êõ
9ÔÂ10ÈÕ£¬×êÑÐÈËÔ±½üÆÚ·¢ÏÖ£¬Ó볯Ïʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯KimsukyÓйØÁªµÄÍþвÐÐΪÕßKonni£¬Õý¼Ó´ó¶Ôº«¹úºÍ¶íÂÞ˹µÄÍøÂç¹¥»÷Á¦¶È¡£KonniÔÚ¶ÔÕâÁ½¸ö¹ú¶ÈµÄ¹¥»÷ÖУ¬Õ¹Ê¾Á˸߶ȵÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½ÀàËÆÐÔ£¬ÖØÒªÖ÷ÕÅÊǽøÐÐÍøÂç¼äµý»î¶¯¡£×Ô2021ÄêÆð£¬KonniÒÑÕë¶Ô¶íÂÞ˹±í½»²¿¡¢¶íÂÞ˹פӡÄá´óʹ¹Ý¼°¶à¼Òº«¹úÆóÒµÌáÒé¹¥»÷£¬Ô̺¬ÔÚ2022Äê1ÔÂÀûÓÃÐÂÄê×£¸£ÓʼþÏò¶íÂÞ˹´óʹ¹Ý±í½»¹Ù´«²¼¶ñÒâÈí¼þ¡£Æä»î¶¯¿É×·ÒäÖÁ2014Ä꣬³Ö¾ÃÇÒ³ÖÐø¡£Konniѡȡ´¹µöÓʼþ×÷ΪÈëÇÖ¼¿Á©£¬ÀûÓÃ˰ÊÕ¡¢½±Ñ§½ðµÅ×Õ¶ü»ñȡϵͳ½Ó¼ûȨÏÞ£¬²¢Í¨¹ý×Ô½ç˵µÄÔ¶³Ì½Ó¼ûľÂíÆëÈ«½ÚÔìÊܺ¦ÏµÍ³¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬¸Ã×éÖ¯ÀûÓÃÀàËÆ¼¼Êõ½«ÊÜϰȾÉ豸½ÓÈëºÚ¿Í½ÚÔìµÄºÅÁî·þÎñÆ÷£¬Í¨¹ýÄÚ²¿ºÅÁîʵÏÖÏνӡ£Ö»¹Ü¹¥»÷ģʽ¶àÄêδ±ä£¬µ«KonniÒ²½áºÏÐÂÏÊÕ½ÊõÒÔÌáÉý³É¹¦ÂÊ¡£×êÑÐÈËԱǿµ÷£¬¹Ø×¢KonniÔÚ·ÖÆç¹ú¶È¼ä¹¥»÷µÄÀàËÆÐÔ£¬¶ÔÓÚ°²È«×¨¼ÒÔì¶©¸üÓÐЧµÄ·ÀÓùÕ½ÊõºÍ¾«×¼¹éÒòÓµÓгÁÒªÒâ˼£¬ÓÐÖúÓÚ¸üºÃµØ±£»¤Ö¸±êʵÌåÃâÊÜ´ËÀàÍøÂçÍþвµÄÇÖº¦¡£
https://therecord.media/kimsuky-north-korea-hackers-targeting-russia-south-korea?&web_view=true
4. WPSÆØ95ÍòÓû§ÐÅÏ¢ÔâMOVEitºÚ¿Í¹¥»÷й¶
9ÔÂ10ÈÕ£¬Íþ˹¿µÐÇÖÝҽʦ·þÎñ±£ÏÕ¹«Ë¾£¨WPS£©½üÆÚÈ·ÈÏ£¬Ô¼950,000ÃûÓ×ÎÒµÄÓ×ÎÒÐÅÏ¢ÔÚ2023ÄêµÄһ·MOVEitºÚ¿Í¹¥»÷ÊÂÎñÖÐÔâй¶¡£¸ÃÊÂÎñÔ´ÓÚProgress SoftwareÆìϵÄMOVEit TransferÈí¼þ±»¶íÓïCl0pÀÕË÷Èí¼þ×éÖ¯ÀûÓÃÁãÈÕ·ì϶ÇÖÈ룬µ¼ÖÂÈ«Çò½ü2,800¸ö×éÖ¯ÊÜ´´£¬ÀÛ¼ÆÓ×ÎÒÐÅϢй¶Á¿¸ß´ï9600ÍòÌõ¡£WPS×÷ΪÊܺ¦ÕßÖ®Ò»£¬ÓÚ9ÔÂ6ÈÕ°ä²¼£¬Æä946,801ÃûÒ½ÁƱ£ÏÕÊÜÒæÈË¿ÉÄÜÊܵ½²¨¼°£¬Ô̺¬²¿ÃÅCMS£¨Ò½ÁƱ£ÏÕºÍÒ½ÁƲ¹Öú·þÎñÖÐÐÄ£©ÊÜÒæÈË¡£Ö»¹Ü³õ´ëÊ©²éÏÔʾÎÞÖ±½ÓÖ¤¾ÝÅú×¢Êý¾Ý±»¸´Ô죬µ«ËæºóµÄÉî¿Ìµ÷²éÈ·ÈÏ£¬²¿ÃÅÔ̺¬ÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç±£ºÅµÈÃô¸ÐÐÅÏ¢µÄÎļþÒÑ´ÓWPSµÄMOVEitϵͳÖб»µÁ¡£Ö»¹ÜĿǰδÊÕµ½ÒòÐÅϢй¶µ¼ÖµÄڲƻ㱨£¬WPSÈÔ²ÉÈ¡»ý¼«´ëÊ©£¬ÎªÊÜÓ°ÏìµÄÒ½ÁƱ£ÏÕÊÜÒæÈ˸ü»»ÐºÅÂëµÄÒ½ÁƱ£ÏÕ¿¨£¬²¢ÌṩΪÆÚÒ»ÄêµÄÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ£¬Í¬Ê±ÌáÐѹ«¼Òά³Ö¾¯Ì裬·À±¸Ç±ÔÚ·çÏÕ¡£
https://www.securityweek.com/wisconsin-insurer-discloses-data-breach-impacting-950000-individuals/
5. Confidant Health 5.3TBÉúÀí½¡È«¼Í¼Ôâй¶
9ÔÂ6ÈÕ£¬ÃÀ¹úÈËΪÖÇÄÜÒ½Áƹ«Ë¾Confidant HealthÒò·þÎñÆ÷ÅäÖÃÃýÎó£¬Òâ±íй¶Á˸ߴï5.3TBµÄÃô¸ÐÉúÀí½¡È«¼Í¼£¬ÄÚÈÝÉæ¼°Ó×ÎÒÐÅÏ¢¡¢ÉúÀíÆÀ¹À¼°Ï꾡ҽÁÆÊý¾Ý£¬Ö±½ÓÍþвµ½³¬¹ý12.6ÍòÃû»¼ÕßµÄÒþÖÔ°²È«¡£¸ÃÊÂÎñÓÉÍøÂ簲ȫר¼ÒJeremiah Fowler¸æ·¢£¬Ëû·¢ÏÖÁËδÉèÃÜÂë±£»¤µÄ·þÎñÆ÷£¬ÄÚº¬À´×ÔÎåÖÝ»¼ÕßµÄ˽ÃÜÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢ÁªÏµ·½Ê½µÈÓ×ÎÒÉí·ÝÐÅÏ¢£¬ÒÔ¼°¾ßÌåµÄÉúÀí½¡È«ÆÀ¹À¡¢´¦·½Ò©Çåµ¥¡¢Ò½ÁƲ¹Öú¿¨ÐÅÏ¢µÈ¡£ÓÈΪÑϳÁµÄÊÇ£¬Ð¹Â¶Êý¾Ý»¹Éæ¼°ÒôƵÊÓÆµ¼Í¼£¬»áÉÌÁ˼«ÎªË½ÃܵļÒÍ¥ÎÊÌâ¡£Confidant HealthѸ¿ìÈϿɲ¢ÏÞ¶ÈÁ˽Ӽû£¬µ«Ð¹Â¶µÄ³ÖÐø¹¦·ò¼°Ç±ÔÚÓ°ÏìÁìÓòÉв»Ë¬ÀÊ¡£Ö»¹Ü²¿ÃÅÎļþÊÜÏ޶ȽӼû£¬µ«ÒÑй¶µÄÎļþõè¾¶ºÍ´æ´¢µØÎ»ÈÔ¿ÉÄܳÉΪºÚ¿Í¹¥»÷µÄÌø°å£¬¼Ó¾ç»¼ÕßÃæ¶ÔµÄ·çÏÕ¡£´ËÀàÊý¾Ýй¶²»½ö¿ÉÄÜÒý·¢Éí·Ý͵ÇÔ¡¢Ò½ÁÆÚ²ÆµÈÑϳÁºó¹û£¬»¹¿ÉÄܶԻ¼ÕßÔìÓÐÒâÁéѹÁ¦ºÍÉúÀíÖÐÉË¡£
https://hackread.com/ai-firm-misconfigured-server-exposed-mental-health-data/
6. NoNameÀÕË÷Èí¼þÍÅ»ï×î½ü²¿ÊðÁËRansomHub¶ñÒâÈí¼þ
9ÔÂ10ÈÕ£¬NoNameÀÕË÷Èí¼þÍÅ»ï½üÄêÀ´ÖÂÁ¦ÓÚÔÚÈ«ÇòÁìÓòÄÚÕë¶ÔÖÐÓ×ÐÍÆóÒµÖ´Ðй¥»÷£¬ÒÔÉèÖÃÆäÔÚÀÕË÷Èí¼þ½çµÄÃûÓþ¡£¸ÃÍÅ»ïÀûÓÃÔ̺¬EternalBlueºÍZeroLogonÔÚÄڵĶàÖ־ɷì϶£¬Í¨¹ý±©Á¦ÆÆ½â»ñÈ¡ÍøÂç½Ó¼ûȨÏÞ£¬²¢²¿ÊðÆä¶¨Ô칤¾ßSpacecolon¶ñÒâÈí¼þ¼Ò×å¡£½üÆÚ£¬NoNameתÏòʹÓÃScRansomÀÕË÷Èí¼þ£¬´úÌæÁË֮ǰµÄScarab¼ÓÃÜÆ÷£¬²¢ÊÔͼͨ¹ý·ÂÕÕLockBit 3.0µÈ³ÛÃûÀÕË÷Èí¼þÀ´Ìá¸ßÆä³ÛÃû¶È¡£ScRansom¹ÌÈ»²»ÈçÆäËûÀÕË÷Èí¼þ¸´ÔÓ£¬µ«¾ß±¸²¿ÃżÓÃÜ¡¢ÎļþÄÚÈÝ´úÌæµÈÄÜÁ¦£¬²¢ÄܼÓÃܶàÖÖÇý¶¯Æ÷ÉϵÄÎļþ¡£ESETÖ¸³ö£¬¸ÃÍÅ»ïÔÚ½âÃܹý³ÌÖвû·¢²»³ÉÊ죬ӰÏìÁËÆäÃûÓþºÍÊܺ¦Õ߸¶¿îµÄÒâÔ¸¡£´Ë±í£¬NoName»¹ÀûÓöà¸öSMB»·¾³Öеķì϶£¬Ô̺¬EternalBlueºÍZerologonµÈ£¬ÒÔ¼°Í¨¹ý½ûÓÃWindows DefenderµÈ¼¿Á©ÌáÉý¹¥»÷³ÉЧ¡£×î½ü£¬Óм£ÏóÅú×¢NoName¿ÉÄÜÒѳÉΪRansomHubµÄ´ÓÊô»ú¹¹£¬Í¨¹ý²¿ÊðRansomHubµÄEDRɱÊÖºÍÀÕË÷Èí¼þÀ´À©´óÆä»î¶¯ÁìÓò¡£Ö»¹ÜÓëRansomHubµÄÕýʽ¹ØÁªÉдýÈ·ÈÏ£¬µ«NoNameÏÔÈ»²¢Î´ÉÕ»ÙÆäÀÕË÷Èí¼þÒµÎñ£¬ScRansom¼ÓÃÜÆ÷ÈÔÔÚ»ý¼«¿ª·¢ÖС£
https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ