°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

Ðû²¼Ê±¼ä 2022-10-09
1¡¢°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

      

¾ÝýÌå10ÔÂ7ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬ÓɰÍÎ÷Õþ¸®¿ØÖƵİÍÎ÷ÀûÑÇÒøÐÐÔâµ½Á˹¥»÷£¬£¬ £¬£¬ £¬£¬²¢±»ÀÕË÷50 BTC¡£¡£¡£¡£ÍâµØÐÂÎÅýÌåTecmundoÉù³Æ£¬£¬ £¬£¬ £¬£¬ÃûΪCrydatµÄºÚ¿ÍÁªÏµÁËËûÃÇ£¬£¬ £¬£¬ £¬£¬²¢ÒªÇóËûÃÇÔÚ10ÔÂ6ÈÕ15:00֮ǰ֧¸¶520Íò°ÍÎ÷À×ÑǶû¡£¡£¡£¡£Õë¶ÔºÚ¿ÍÕâÒ»ÒªÇ󣬣¬ £¬£¬ £¬£¬°ÍÎ÷ÀûÑÇÒøÐÐÒ»Ö±¼á³ÖĬȻ¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬ £¬£¬¹¥»÷ÕßʹÓÃÁËÀÕË÷Èí¼þLockBit£¬£¬ £¬£¬ £¬£¬ÓÚ10ÔÂ3ÈÕѬȾ¸ÃÒøÐУ¬£¬ £¬£¬ £¬£¬ÍâµØÈÏÕæ¹¥»÷ÍøÂç·¸·¨»î¶¯µÄÖ´·¨²¿·ÖÕýÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£


https://www.databreaches.net/bank-of-brasilia-attacked-by-ransomware-demanding-50-btc/


2¡¢Ð¾Æ¬ÖÆÔìÉÌADATA·ñ¶¨ÆäÔâµ½RansomHouse¹¥»÷µÄ˵·¨

      

¾Ý10ÔÂ8ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬¹¥»÷ÕßÔÚÆäÍøÕ¾ÉϹûÕæ±»µÁÊý¾Ýºó£¬£¬ £¬£¬ £¬£¬Öйų́ÍåÐ¾Æ¬ÖÆÔìÉÌADATA·ñ¶¨ÆäÔâµ½¹¥»÷µÄ˵·¨¡£¡£¡£¡£RansomHouseÔÚ±¾Öܶþ½«ADATAÌí¼Óµ½ËûÃǵÄÍøÕ¾£¬£¬ £¬£¬ £¬£¬²¢Éù³ÆÔÚ2022ÄêµÄ¹¥»÷ÖÐÒÑÀÖ³ÉÇÔÈ¡1TBµÄÎļþ£¬£¬ £¬£¬ £¬£¬»¹¹ûÕæÁ˱»µÁÎļþµÄÑù±¾¡£¡£¡£¡£ADATAÐû²¼ÉùÃ÷³ÆËü×î½üûÓÐÔâµ½¹¥»÷£¬£¬ £¬£¬ £¬£¬RansomHouseÒ²²¢Î´ÔÚЧÀÍÆ÷ÖÐÁôÏÂÊê½ð¼Í¼À´Ö¤Êµ¹¥»÷»î¶¯¡£¡£¡£¡£Ð¹Â¶µÄÎļþÀ´×Ô2021Äê5ÔµÄRagnarLockerÀÕË÷¹¥»÷ £¬£¬ £¬£¬ £¬£¬ÆäʱÓÐ1.5 TBµÄÊý¾Ý±»µÁ¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬ £¬£¬RansomHouse¼á³ÆËûÃǹ¥»÷ÁËADATA£¬£¬ £¬£¬ £¬£¬²¢ÌåÏÖÒѾͱ»µÁÊý¾Ý¾ÙÐÐÁË̸ÅС£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/adata-denies-ransomhouse-cyberattack-says-leaked-data-from-2021-breach/


3¡¢LofyGangÒÑ·Ö·¢Ô¼200¸öÇÔÊØÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâNPM°ü

      

CheckmarxÔÚ10ÔÂ7ÈÕ³ÆÆä·¢Ã÷ÁËÔ¼200¸ö¶ñÒâNPM°ü£¬£¬ £¬£¬ £¬£¬ÓëÃûΪLofyGangµÄ¹¥»÷ÍÅ»ïÓйØ¡£¡£¡£¡£¸ÃÍÅ»ïÒÑÔËÓªÁËÒ»Äê¶à£¬£¬ £¬£¬ £¬£¬Ä¿µÄÊÇÇÔÊØÐÅÓÿ¨Êý¾Ý£¬£¬ £¬£¬ £¬£¬ÒÔ¼°ÓëDiscord Nitro¡¢ÓÎÏ·ºÍÁ÷ýÌåЧÀÍÏà¹ØµÄÕÊ»§¡£¡£¡£¡£¸ÃÍÅ»ï¿ÉÄÜÓë°ÍÎ÷ÓйØ£¬£¬ £¬£¬ £¬£¬Ëü½¨ÉèÁËÒ»¸öDiscord»úеÈË¡°Lofy Boost¡±£¬£¬ £¬£¬ £¬£¬ÓÃÓÚ°²Åű»µÁÐÅÓÿ¨¡£¡£¡£¡£¸ÃÍŻﻹÒÔÓÖÃûDyPolarLofyÔÚºÚ¿ÍÉçÇøÐ¹Â¶ÁËÊýǧ¸öDisney+ºÍMinecraftÕÊ»§£¬£¬ £¬£¬ £¬£¬²¢ÔÚËûÃǵÄGitHubÒ³ÃæÏÂÍÆ¹ãºÚ¿Í¹¤¾ßºÍ»úеÈ˵È¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬ £¬£¬Ðí¶à¶ñÒâÈí¼þ°üÒѱ»É¾³ý£¬£¬ £¬£¬ £¬£¬µ«ÉÐÓв¿·ÖÈԿɹ©ÏÂÔØ¡£¡£¡£¡£


https://checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/


4¡¢ÐÂAndroid¶ñÒâÈí¼þRatMiladÖ÷ÒªÕë¶ÔÖж«µÄ×éÖ¯

      

10ÔÂ5ÈÕ£¬£¬ £¬£¬ £¬£¬ZimperiumÅû¶ÁËÃûΪRatMiladµÄAndroid¶ñÒâÈí¼þ¡£¡£¡£¡£RatMiladµÄԭʼ±äÌåÒþ²ØÔÚVPNºÍÃûΪText MeµÄµç»°ºÅÂëÓÕÆ­Ó¦ÓÃÖ®ºó£¬£¬ £¬£¬ £¬£¬ÕâÊÇÉ罻ýÌåÓû§ÔÚ»á¼ûÊÜÏ޵Ĺú¼ÒºÍµØÇøÊ¹Óõij£Óù¤¾ß¡£¡£¡£¡£¸Ã¶ñÒâÓ¦ÓÃͨ¹ýÉ罻ýÌåºÍTelegramµÈͨѶ¹¤¾ßÉϵÄÁ´½Ó·Ö·¢£¬£¬ £¬£¬ £¬£¬ÓÕʹÓû§²à¼ÓÔØÓ¦Óò¢ÊÚÓèÆÕ±éµÄȨÏÞ¡£¡£¡£¡£ZimperiumÍÆ²â£¬£¬ £¬£¬ £¬£¬ÈÏÕæRatMiladµÄÔËÓªÍŶӴÓÒÁÀʺڿÍÍÅ»ïAppMiladÄÇÀï»ñµÃÁËÔ´´úÂ룬£¬ £¬£¬ £¬£¬²¢½«Æä¼¯³Éµ½ÁËÒ»¸öڲƭÐÔÓ¦ÓóÌÐòÖС£¡£¡£¡£


https://blog.zimperium.com/we-smell-a-ratmilad-mobile-spyware/


5¡¢Rapid7Åû¶ʹÓÃZCSÖÐRCEÎó²îµÄ¹¥»÷»î¶¯µÄÊÖÒÕϸ½Ú

      

Rapid7ÔÚ10ÔÂ6ÈÕ͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃZimbra Collaboration Suite (ZCS)ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-41352£¬£¬ £¬£¬ £¬£¬CVSSÆÀ·Ö9.8£¬£¬ £¬£¬ £¬£¬¿É±»ÓÃÀ´Í¨¹ýAmavis£¨µç×ÓÓʼþÇ徲ϵͳ£©ÉÏ´«í§ÒâÎļþ£¬£¬ £¬£¬ £¬£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÁýÕÖZimbra webroot¡¢Ö²Èëshellcode²¢»á¼ûÆäËûÓû§µÄÕÊ»§¡£¡£¡£¡£¸ÃÎó²î×Ô9ÔÂÒÔÀ´Ò»Ö±±»Ê¹Ó㬣¬ £¬£¬ £¬£¬Rapid7¹ûÕæÁ˹ØÓÚ¸ÃÎó²îµÄÊÖÒÕÎĵµ£¬£¬ £¬£¬ £¬£¬°üÀ¨PoCºÍIoC¡£¡£¡£¡£Ñо¿¾ÍÖ°Ô±½¨ÒéÓû§×°ÖÃpaxÓ¦Ó㬣¬ £¬£¬ £¬£¬È»ºóÖØÐÂÆô¶¯ Zimbra£¬£¬ £¬£¬ £¬£¬Í¬Ê±¼à¿ØÀ´×ÔZimbraµÄÈí¼þ¸üС£¡£¡£¡£


https://www.rapid7.com/blog/post/2022/10/06/exploitation-of-unpatched-zero-day-remote-code-execution-vulnerability-in-zimbra-collaboration-suite-cve-2022-41352/


6¡¢KasperskyÐû²¼2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ

      

10ÔÂ6ÈÕ£¬£¬ £¬£¬ £¬£¬KasperskyÐû²¼ÁË2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬ £¬£¬2022Äêǰ8¸öÔ£¬£¬ £¬£¬ £¬£¬±»ATM/PoS¶ñÒâÈí¼þÓ°ÏìµÄ×°±¸ÊýÄ¿Óë2020ÄêͬÆÚÏà±ÈÔöÌíÁË19%£¬£¬ £¬£¬ £¬£¬Óë2021ÄêÏà±ÈÔöÌíÁ˽ü4%¡£¡£¡£¡£ÊÜ´ËÀà¶ñÒâÈí¼þÓ°Ïì×î¶àµÄ¹ú¼Ò°üÀ¨¶íÂÞ˹¡¢ÒÁÀÊ¡¢°ÍÎ÷¡¢Ô½ÄϺÍÓ¡¶ÈµÈ¡£¡£¡£¡£2022Äê×î»îÔ¾µÄ¶ñÒâÈí¼þ¼Ò×åΪHydraPoSºÍAbaddonPoS£¬£¬ £¬£¬ £¬£¬Õ¼±È»®·ÖΪ36%ºÍ35%£¬£¬ £¬£¬ £¬£¬Æä´ÎÊÇPloutus£¨3%£©¡¢Prilex£¨2%£©ºÍRawPoS£¨2%£©¡£¡£¡£¡£KasperskyÍÆ²â£¬£¬ £¬£¬ £¬£¬Ô¤¼ÆÍøÂç·¸·¨»î¶¯½«½øÒ»²½ÔöÌí¡£¡£¡£¡£


https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/