LockBit³ÆÒÑÇÔÈ¡×Éѯ¹«Ë¾Kearney & CompanyÊý¾Ý

Ðû²¼Ê±¼ä 2022-11-08
1¡¢LockBit³ÆÒÑÇÔÈ¡×Éѯ¹«Ë¾Kearney & CompanyµÄÊý¾Ý

¾Ý11ÔÂ6ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÒÑÇÔÈ¡×ÉѯºÍIT·þÎñÌṩÉÌKearney & CompanyµÄÊý¾Ý¡£LockBitÓÚ11ÔÂ5ÈÕ½«¸Ã¹«Ë¾Ìí¼Óµ½±»¹¥»÷Ãûµ¥ÖУ¬²¢ÍþвÈç¹û²»¸¶Êê½ð£¬ËûÃǽ«ÔÚ2022Äê11ÔÂ26ÈÕ֮ǰÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£Ä¿Ç°£¬ÀÕË÷ÍÅ»ïÒѾ­¹ûÈ»ÁËÒ»·Ý±»µÁÊý¾ÝµÄÑù±¾£¬ÆäÖаüÂÞ²ÆÕþÎļþ¡¢ºÏͬ¡¢É󼯳ÂËߺÍÕ˵¥ÎļþµÈ¡£ÀÕË÷ÍÅ»ïÒªÇóÖ§¸¶200ÍòÃÀÔªÒÔÏú»ÙÊý¾Ý£¬²¢ÒªÇó1ÍòÃÀÔª½«¼ÆÊ±ÑÓ³¤24Сʱ¡£

https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html

2¡¢Äþ¾²¹¤¾ßurlscan.io»áÎÞÒâÖÐй¶Ãô¸ÐµÄURLºÍÊý¾Ý

¾ÝýÌå11ÔÂ7ÈÕ±¨µÀ£¬Positive Security·¢ÏÖÍøÕ¾É¨ÃèºÍ·ÖÎöÒýÇæurlscan.io¿Éй¶Ãô¸ÐµÄURLºÍÊý¾Ý¡£Urlscan.io±»ÃèÊöΪWebɳÏ䣬ͨ¹ýÆäAPI¼¯³Éµ½¶à¸öÄþ¾²½â¾ö·½°¸ÖС£¼øÓÚ´ËAPIµÄ¼¯³ÉÀàÐÍÒÔ¼°Êý¾Ý¿âÖеÄÊý¾ÝÁ¿£¬ÓдóÁ¿µÄÊý¾Ý¿É±»ÄäÃûÓû§ËÑË÷ºÍ¼ìË÷¡£2Ô·ݵijõ·¨Ê½²é·¢ÏÖÁËÊôÓÚÆ»¹ûÓòÃûµÄurl£¬ÆäÖÐһЩ»¹°üÂÞ¹²ÏíµÄiCloudÎļþºÍÈÕÀúÑûÇë»Ø¸´Á´½Ó¡£×îÖØÒªµÄÊÇ£¬·ÖÎö»¹·¢ÏÖÅäÖôíÎóµÄÄþ¾²¹¤¾ß»á½«Í¨¹ýÓʼþÊÕµ½µÄËùÓÐÁ´½Ó×÷Ϊ¹«¹²É¨ÃèÌá½»¸øurlscan.io¡£

https://thehackernews.com/2022/11/experts-find-urlscan-security-scanner.html

3¡¢Avanan·¢ÏÖÀûÓÃMicrosoft Dynamics 365µÄµöÓã»î¶¯

AvananÔÚ11ÔÂ3ÈÕÅû¶ÁËÀÄÓÃMicrosoft Dynamics 365 Customer VoiceµÄµöÓã»î¶¯¡£¸Ã²úÎïÔÊÐí×éÖ¯»ñµÃ¿Í»§µÄ·´À¡£¬ËüÖ÷ÒªÓÃÓÚ½øÐпͻ§ÂúÒâ¶ÈÊӲ졣µöÓãÓʼþÀ´×ÔDynamics 365ÖеÄÊӲ칦Ч£¬·¢¼þÈ˵ĵØÖ·°üÂÞ¡°Forms Pro¡±£¬ÕâÊÇÊӲ칦ЧµÄ¾É³Æ¡£¸ÃÏûϢ֪ͨÊÕ¼þÈËÊÕµ½ÁËеÄÓïÒôÓʼþ£¬µã»÷²¥·ÅÓïÒôÓʼþºó£¬»á±»Öض¨Ïòµ½¿Ë¡MicrosoftµÇÂ¼Ò³ÃæµÄµöÓãÍøÕ¾¡£Í¨¹ýʹÓÃCustomer VoiceÁ´½Ó£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄþ¾²´ëÊ©¡£

https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links 

4¡¢Ñо¿ÍŶÓÅû¶Crimson KingsnakeÍÅ»ïµÄBEC¹¥»÷»î¶¯

¾ÝAbnormal Security 11ÔÂ3ÈÕ±¨µÀ£¬ÐµÄCrimson KingsnakeÍÅ»ïÔÚBEC¹¥»÷ÖÐð³äÂÉʦÊÂÎñËù¡£Ñо¿ÈËÔ±ÓÚ2022Äê3ÔÂÊ״η¢ÏÖÁËCrimson KingsnakeµÄ»î¶¯£¬²¢ÌåÏÖÒÑÈ·¶¨ÁË92¸öÏà¹ØÓò£¬ÕâЩÓò¶¼Ä£·ÂÁËÕæÕýµÄÂÉʦÊÂÎñËùÍøÕ¾¡£¹¥»÷Õßð³äÂÉʦ·¢ËÍÓâÆÚ¸¶¿îµÄ·¢Æ±£¬ÆÛÆ­Ä¿±êÔ±¹¤¿ìËÙÖ§¸¶Ðé¼ÙµÄ·¢Æ±¡£µ±¹¥»÷ÕߵĻÓöµ½×èÁ¦Ê±£¬ËûÃÇ»¹»áµ÷Õû¼ÆÄ±À´Ã°³äµÚ¶þ¸ö½ÇÉ«£ºÄ¿±ê¹«Ë¾µÄ¸ß¹Ü£¬À´ÓÕʹԱ¹¤¼ÌÐø¸¶¿î¡£

https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks

5¡¢Å·ÖÞÍøÂçÄþ¾²»ú¹¹ENISAÐû²¼2022ÄêÍþÐ²Ì¬ÊÆ·ÖÎö³ÂËß

Å·ÖÞÍøÂçÄþ¾²»ú¹¹ENISAÔÚ11ÔÂ3ÈÕÐû²¼ÁËÆä2022ÄêENISAÍþÐ²Ì¬ÊÆ(ETL)³ÂËß¡£ÕâÊÇÄê¶È³ÂËߵĵÚ10°æ£¬·ÖÎöÁË2021Äê7ÔÂÖÁ2022Äê7ÔÂÆÚ¼ä·¢ÉúµÄʼþ¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÈ«Çò×éÖ¯ÃæÁÙµÄ×îΣÏÕµÄÍþв֮һ£¬Ã¿ÔÂÓÐÁè¼Ý10 TBµÄÊý¾Ý±»µÁ£¬60%µÄÊÜÓ°Ïì×éÖ¯¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£2021ÄêÊӲ쵽66¸öÁãÈÕ©¶´Åû¶¡£ÍøÂçµöÓãÈÔÈ»ÊÇÒ»ÖÖÁ÷Ðеļ¼Êõ£¬Ä¿Ç°·ºÆðÁËеĵöÓã¹¥»÷ÐÎʽ£¬Èçspear-phishing¡¢whaling¡¢smishingºÍvishing¡£µÚÈý·½Äþ¾²Ê¼þÕ¼2021ÄêÈëÇÖʼþµÄ17%£¬¶ø2020ÄêÊDz»µ½1%¡£

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022

6¡¢BlackBerryÐû²¼¹ØÓÚRomCom RAT·Ö·¢»î¶¯µÄ·ÖÎö³ÂËß

11ÔÂ2ÈÕ£¬BlackBerryÏêÊöÁËRomCom RATÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£Ôڴ˴λÖУ¬¹¥»÷Õ߿ˡÁËSolarWinds Network Performance Monitor (NPM)¡¢KeePassÃÜÂë¹ÜÀíÆ÷ºÍPDF Reader ProµÄ¹Ù·½ÏÂÔØÃÅ»§ÍøÕ¾£¬½«¶ñÒâÈí¼þαװ³ÉºÏ·¨·¨Ê½½øÐзַ¢¡£ÕâЩ¹¥»÷ÊÇÔÚ·ÖÎöÓëÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ¹¥»÷µ¼ÖµÄRomComRATѬȾÏà¹ØµÄ¹¤¼þʱ·¢Ïֵġ£´ËÍ⣬Unit 42»¹·¢ÏÖÁËÒ»¸öð³äVeeam Backup and RecoveryÈí¼þµÄÍøÕ¾¡£

https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass