ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß

Ðû²¼Ê±¼ä 2023-12-21

1.ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß


¾ÝýÌå20ÈÕ±¨µÀ £¬£¬£¬£¬Áª°îÊÓ²ì¾ÖÐû²¼µ·»ÙÀÕË÷Èí¼þÍÅ»ï ALPHV £¬£¬£¬£¬Õþ¸®Óë°Ä´óÀûÑÇ¡¢°ÂµØÀû¡¢µ¤Âó¡¢Î÷°àÑÀ¡¢ÈðÊ¿ºÍÓ¢¹úµÄÖ´·¨»ú¹¹ÏàÖú £¬£¬£¬£¬ALPHV ¾­³£×·Çó¼ÓÃÜÇ®±Ò×éÖ¯ÍøÂçÖÐ×îÃô¸ÐµÄÊý¾Ý¡£¡£¡£¡£¡£¡£ËûÃÇÍþв˵ £¬£¬£¬£¬ÈôÊDz»Ö§¸¶Êê½ð £¬£¬£¬£¬ËûÃǽ«ÎÞ·¨»á¼ûÕâЩÐÅÏ¢ £¬£¬£¬£¬²¢Ðû²¼Î´¼ÓÃܵĿɶÁ°æ±¾¡£¡£¡£¡£¡£¡£ÈôÊDz»¸¶¿î £¬£¬£¬£¬ºÚ¿Í¾Í»áÔÚ°µÍøÍøÕ¾ÉÏÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß £¬£¬£¬£¬×éÖ¯¿ÉÒÔʹÓøù¤¾ß½âÃÜ ALPHV ÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£Æù½ñΪֹ £¬£¬£¬£¬FBI ¼°ÆäÖ´·¨ÏàÖúͬ°éÒÑÏò 500 ¶àÃûÊܺ¦ÕßÌṩÁËÕâЩ¹¤¾ß £¬£¬£¬£¬×ÊÖúËûÃÇ×èÖ¹ÁËÔ¤¼Æ 6800 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/us-gov-disrupts-blackcat-ransomware-operation-fbi-releases-decryption-tool/


2. SymantecÅû¶SeedwormÕë¶Ô·ÇÖÞµçÐÅÐÐÒµµÄ¹¥»÷


19ÈÕ £¬£¬£¬£¬SymantecµÄÍþвÇ鱨ÍŶÓÐû²¼ÁËһƪÓйØÒÁÀÊAPT×éÖ¯SeedwormµÄ±¨¸æ £¬£¬£¬£¬Seedworm£¨ÓÖÃû Muddywater£©Ò»Ö±½«°£¼°¡¢ËÕµ¤ºÍ̹ɣÄáÑǵçÐÅÐÐÒµµÄ×éÖ¯×÷ΪĿµÄ¡£¡£¡£¡£¡£¡£Ö¸³ö¸Ã×éÖ¯ÕýÔÚÒÔÀûÒæÏà¹ØÎªÃûÔÚ·ÇÖÞµØÇøµÄµçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£SeedwormʹÓÃÊ¢ÐеÄOffTheShelf¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þMimikatzºÍPoweliksÀ´Öª×ãÆäÌØ¹¤»î¶¯µÄÐèÇ󡣡£¡£¡£¡£¡£ËûÃǶÔÌØ¶¨¹¤¾ß¾ÙÐмàÊÓºÍÇÔÈ¡²Ù×÷ϵͳ¡¢Ó¦ÓóÌÐòºÍÍøÂçÆ¾Ö¤ £¬£¬£¬£¬Í¬Ê±Ò²»á×Ô¶¯»¯Êý¾ÝÍøÂçºÍÇé±¨ÍøÂçÊÂÇé¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms


3. IBM·¢Ã÷ʹÓÃWeb×¢ÈëÕë¶ÔÎ÷Å·µÈµØ40¶à¼ÒÒøÐеĻ


19ÈÕýÌ屨µÀ £¬£¬£¬£¬IBM Security Trusteer µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ Danabot µÄ¶ñÒâÈí¼þ½üÆÚÔÚ°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÒøÐÐÖзºÆð¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔͨ¹ýÍøÂç×¢Èë¹¥»÷ÇÔÈ¡Óû§µÄÒøÐÐÆ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£½üÄêÀ´ÕâÀ๥»÷·½·¨ÓÐËùïÔÌ­ £¬£¬£¬£¬µ«×î½ü Web ×¢Èë¹¥»÷ÓÖÖØÐ·ºÆð¡£¡£¡£¡£¡£¡£×¨¼ÒÃÇÒÔΪÕâÖÖ¹¥»÷»áÒ»Á¬ÔöÌí £¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËɵػñÈ¡´ó×ÚСÎÒ˽¼ÒÊý¾Ý £¬£¬£¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£¡£¡£½¨ÒéÓû§ÔÚʹÓÃÒøÐÐÓ¦ÓóÌÐòʱӦ¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£Õâ°üÀ¨ÕË»§ÉÏDZÔڵĿÉÒɻ¡¢²»´Óδ֪ȪԴÏÂÔØÈí¼þÒÔ¼°×ñÕÕÖØ´óÃÜÂëµÄÔ­ÔòºÍµç×ÓÓʼþÇå¾²µÈ¡£¡£¡£¡£¡£¡£

https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/


4. Ñо¿Ö°Ô±ÑÝʾ½µµÍOpenSSHÅþÁ¬Çå¾²ÐÔµÄTerrapin¹¥»÷


19ÈÕ±¨µÀ £¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͹¥»÷·½·¨ £¬£¬£¬£¬ÃûΪTerrapin £¬£¬£¬£¬¿ÉÒÔͨ¹ý¸Ä¶¯×èÁ¦ÒÔ¼°½µ¼¶Ç徲ЭÒéµÄ·½·¨ £¬£¬£¬£¬½µµÍOpenSSHÅþÁ¬µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£Terrapin¹¥»÷ʹÓÃSSHЭÒéµÄȱÏÝ £¬£¬£¬£¬½èÖúÅÌËã»úÍøÂç´ø¿íÖÎÀíÈí¼þtcµÄ"¡°ÑÓ³ÙºÍÑÓ³Ù²ü¶¶(Delay and Jitter)"¹¦Ð§¶ÔÍøÂçÅþÁ¬¾ÙÐе÷½â £¬£¬£¬£¬´Ó¶ø½µµÍSSHÅþÁ¬µÄÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬¸Ã¹¥»÷×î´óµÄÒòËØÊÇ MiTM £¬£¬£¬£¬ÕâʹµÃ Terrapin µÄÍþв²»ÄÇôÑÏÖØ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/


5. ESETÐû²¼¹ØÓÚ2023ÄêϰëÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ


19ÈÕÔÚESETÐû²¼µÄ2023ÄêϰëÄêÍþв±¨¸æÖÐÖ¸³ö £¬£¬£¬£¬2023ÄêϰëÄêÍøÂç·¸·¨»î¶¯µÄÊýÄ¿ºÍÖØÆ¯ºó½«½øÒ»²½ÔöÌí¡£¡£¡£¡£¡£¡£Cl0p ÊÇÒ»¸öÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯ £¬£¬£¬£¬ÒÔ´ó¹æÄ£ÊµÑéÀÕË÷Èí¼þ¹¥»÷¶øÖøÃû £¬£¬£¬£¬Ëüͨ¹ýÆÕ±éµÄ¡°MOVEit ºÚ¿Í¹¥»÷¡±ÒýÆðÁËÈËÃǵĹØ×¢ £¬£¬£¬£¬µ«ÁîÈ˾ªÑȵÄÊÇ £¬£¬£¬£¬¸ÃºÚ¿Í¹¥»÷²¢Î´Éæ¼°ÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£¡£ÔÚÎïÁªÍøÁìÓò £¬£¬£¬£¬¸ú×Ù¼à¿ØMozi IoT ½©Ê¬ÍøÂç £¬£¬£¬£¬ÒÔ¼° Android ÌØ¹¤Èí¼þ°¸ÀýÏÔÖøÔöÌí £¬£¬£¬£¬ÕâÖ÷Òª¹éÒòÓÚ SpinOk ÌØ¹¤Èí¼þµÄ±£´æ¡£¡£¡£¡£¡£¡£±¨¸æ»¹ÖÒÑÔ˵ £¬£¬£¬£¬ÐéÄâÇ®±ÒÉúÒâËù¿ÉÄÜÃæÁÙ¸üƵÈԵĹ¥»÷ £¬£¬£¬£¬²¢¾¯Ê¾Õþ¸®ºÍÆóÒµÓ¦Ô½·¢¹Ø×¢ÍøÂçÇå¾²ºÍÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£


https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/


6. ¹ú¼ÊÖ´·¨Ðж¯¾Ð²¶3500ÃûÍøÂç·¸·¨ÏÓÒÉÈ˲¢»ñ3ÒÚÃÀÔª


19ÈÕýÌ屨µÀ £¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯¾ÙÐеÄÒ»Ïî´úºÅΪ¡°HAECHI IV Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Ðж¯¾Ð²¶ÁË3500ÃûÍøÂç×ï·¸ £¬£¬£¬£¬²¢²é»ñÁ˼ÛÖµ3ÒÚÃÀÔªµÄ×ʲú £¬£¬£¬£¬º«¹úÕþ¸®Ö÷µ¼ÁË HAECHI Ðж¯ £¬£¬£¬£¬²¢ÓëÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢ÖйúÏã¸ÛºÍÓ¡¶ÈµÈ 34 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú £¬£¬£¬£¬×îеÄÐж¯±¬·¢ÔÚ 2023 Äê 7 ÔÂÖÁ 12 ÔÂʱ´ú £¬£¬£¬£¬Ä¿µÄÊÇ´ÓÊÂÓïÒôÍøÂç´¹ÂÚ¡¢Áµ°®Õ©Æ­¡¢ÔÚÏßÐÔÀÕË÷¡¢Í¶×Êڲƭ¡¢Óë²»·¨ÔÚÏ߶IJ©Ïà¹ØµÄÏ´Ç®¡¢ÉÌÒµµç×ÓÓʼþй¶ºÍµç×ÓÉÌÎñڲƭµÄÍþвÐÐΪÕß¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/