¶íÂÞ˹µçÉ̹«Ë¾e.wayй¶ԼĪ700ÍòÌõÓû§µÄÊý¾Ý
Ðû²¼Ê±¼ä 2023-02-09
¾ÝýÌå2ÔÂ7ÈÕ±¨µÀ£¬Cybernews·¢ÏÖÁËÒ»¸ö̻¶µÄÊý¾Ý¿â£¬°üÂÞ1.1TBÊý¾Ý¡£Ñо¿ÈËÔ±ÔÚ1ÔÂ24ÈÕ·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬²¢½«Æä¹éÒòÓÚ¶íÂÞ˹µçÆø¹¤³Ì¹«Ë¾ElevelÆìϵÄÔÚÏßÉ̵êe.way¡£Õâ¸öÊý¾Ý¿â°üÂÞ700ÍòÌõÊý¾Ý£¬Ð¹Â¶ÁËÁ½ÄêµÄ¿Í»§ÐÅÏ¢£¬ÈçÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ºÍËÍ»õµØÖ·µÈ¡£´ËÍ⣬Ëü°üÂÞÒÔURL±àÂëµÄµÇ¼Êý¾ÝºÍÃÜÂ룬ÕâÊÇÒ»ÖÖ½ÏÈõµÄ±£»¤»úÖÆ£¬ºÜÈÝÒ×±»½âÂ롣Ŀǰ£¬Êý¾Ý¿âÒѾÎÞ·¨·ÃÎÊ£¬µ«¸Ã¹«Ë¾ÉÐδ×ö³ö»ØÓ¦¡£
https://cybernews.com/privacy/russian-e-commerce-giant-data-leak/
2¡¢NodariaÀûÓöñÒâÐÅÏ¢ÇÔÈ¡·¨Ê½Graphiron¹¥»÷ÎÚ¿ËÀ¼
SymantecÔÚ2ÔÂ8ÈÕ³ÆÆä·¢ÏÖ¶íÂÞ˹NodariaÀûÓÃÐÂÐͶñÒâÈí¼þGraphiron¹¥»÷ÎÚ¿ËÀ¼µÄ»î¶¯¡£×îÔçµÄ¹¥»÷¿É×·Ëݵ½2022Äê10Ô£¬²¢ÖÁÉÙÁ¬Ðøµ½2023Äê1ÔÂÖÐÑ®¡£GraphironÊÇÓÃGo¿ª·¢µÄ£¬ÓÉdownloaderºÍpayload×é³É£¬Ö¼ÔÚ´ÓÇÔȡϵͳÐÅÏ¢¡¢Æ¾¾Ý¡¢ÆÁÄ»½ØÍ¼ºÍÎļþµÈ¶àÖÖÐÅÏ¢¡£GraphironÓë¾ÉµÄNodaria¹¤¾ß£¨ÀýÈçGraphSteelºÍGrimPlant£©ÓÐһЩÏàËÆÖ®´¦¡£³ý´ËÖ®Í⣬ÓëÔçÆÚµÄ¶ñÒâÈí¼þÒ»Ñù£¬GraphironʹÓö˿Ú443ÓëC&C·þÎñÆ÷ͨÐÅ£¬²¢Ê¹ÓÃAESÃÜÂë¶ÔͨÐŽøÐмÓÃÜ¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer
3¡¢Sophos½üÆÚ·¢ÏÖͨ¹ý¶ñÒâOneNotÎļþ·Ö·¢QBotµÄ»î¶¯
¾Ý2ÔÂ6ÈÕ±¨µÀ£¬ÐÂÒ»ÂÖQakNote¹¥»÷»î¶¯ÀûÓÃMicrosoft OneNoteÎļþ·Ö·¢¶ñÒâÈí¼þQBot¡£1ÔÂ31ÈÕ¿ªÊ¼£¬QBotµÄÔËÓªÈËÔ±¿ªÊ¼ÊÔÑéÕâÖÖеķַ¢ÒªÁ죬ʹÓÃOneNoteÎļþ£¬ÆäÖаüÂÞÒ»¸öǶÈëµÄHTMLÓ¦Ó÷¨Ê½£¨HTAÎļþ£©£¬¿ÉÒÔ¼ìË÷µ½QBot¶ñÒâÈí¼þµÄpayload¡£´ËÍ⣬QBot payload½«×ÔÉí×¢ÈëWindows¸¨Öú¼¼Êõ¹ÜÀí·¨Ê½£¨¡°AtBroker.exe¡±£©ÒÔÈÆ¹ýAV¹¤¾ßµÄ¼ì²â¡£×÷ΪӦ¶Ô´ëÊ©£¬Sophos½¨Òé¹ÜÀíÔ±×èÖ¹ËùÓÐ.oneÎļþ£¬ÒòΪËüÃÇͨ³£²»×÷Ϊ¸½¼þ·¢ËÍ¡£
https://news.sophos.com/en-us/2023/02/06/qakbot-onenote-attacks/
4¡¢Medusa½©Ê¬ÍøÂç»Ø¹éÐÂÔöÀÕË÷Èí¼þºÍ±©Á¦ÆÆ½âÄ£¿é
ýÌå2ÔÂ7Èճƣ¬»ùÓÚMirai´úÂëµÄаæDDoS½©Ê¬ÍøÂçMedusa·ºÆð£¬¾ßÓÐÀÕË÷Èí¼þÄ£¿éºÍTelnet±©Á¦ÆÆ½â·¨Ê½¡£MedusaµÄÀÕË÷Èí¼þÄ£¿éʹÓÃ256λAES¼ÓÃÜÎļþ£¬µ«¼ÓÃÜÒªÁìËÆºõÒÑË𻵣¬½«ÀÕË÷Èí¼þÄð³ÉÁËÊý¾Ý²Á³ý·¨Ê½¡£´ËÍ⣬ֻÓÐÔÚɾ³ýÎļþºó£¬Ëü²Å»áÏÔʾһ¸öÒªÇó0.5 BTCµÄÊê½ð¼Ç¼¡£ÕâËÆºõÊÇÓÐÎÊÌâµÄ£¬Òò´ËÑо¿ÈËÔ±ÍÆ²âбäÌå»ò´Ë¹¦Ð§ÈÔÔÚ¿ª·¢ÖС£±©Á¦ÆÆ½â¹¦Ð§¿ÉÕë¶ÔÁªÍøÉ豸ʵÑé³£ÓõÄÓû§ÃûºÍÃÜÂ룬ÔÚ½¨Á¢TelnetÁ¬½Óºó£¬¶ñÒâÈí¼þ»áʹÓÃÖ÷ÒªµÄMedusa payloadѬȾϵͳ¡£
https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/
5¡¢AhnlabÅû¶ÀûÓÃ˽ÈËHTS·Ö·¢Quasar RATµÄ»î¶¯
AhnlabÓÚ2ÔÂ8ÈÕÅû¶Á˽üÆÚͨ¹ý˽È˼ÒÍ¥½»Ò×ϵͳ£¨HTS£©·¢ÏÖQuasar RATµÄ·Ö·¢»î¶¯¡£HTSÒ»ÖÖʹͶ×ÊÕßʹÓüÒÍ¥»ò°ì¹«ÊÒPC½øÐÐ¹ÉÆ±½»Ò×µÄϵͳ£¬¶øÎÞÐè·ÃÎÊ¹ÉÆ±½»Ò×¹«Ë¾»ò´òµç»°¡£µÚÒ»¸ö°²×°µÄ·¨Ê½ÊÇNSIS°²×°·¨Ê½HPlusSetup.exe£¬Asset.exeÊǰ²×°ºóÖ´ÐеĵÚÒ»¸ö·¨Ê½£¬ºóÕß¼ÈÊÇÆô¶¯·¨Ê½ÓÖÊǸüз¨Ê½¡£HPlusSocketManager20221208.exe»áÆô¶¯vbc.exe²¢×¢ÈëQuasar RAT¡£
https://asec.ahnlab.com/en/47283/
6¡¢Outpost24Ðû²¼2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö³ÂËß
2ÔÂ7ÈÕ£¬Outpost24Ðû²¼ÁË2022ÄêÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±ÔÚ2022Äê×ܹ²¼ì²âµ½ÖÖÖÖÀÕË÷ÍÅ»ïÔÚDLSÉÏ×ܹ²Åû¶ÁË2363¸ö×éÖ¯¡£×î»îÔ¾µÄÀÕË÷ÍÅ»ïΪLockBit¡¢BlackCat¡¢ContiºÍHiveµÈ£¬ÆäÖÐLockBit¶Ôµ±Äê34%µÄ¹¥»÷ÂôÁ¦£¬Æ½¾ùÿÔÂÔ¼67´Î¡£ÉÌÒµºÍÉÌÒµÏà¹Ø¹«Ë¾ÊÜÀÕË÷¹¥»÷µÄÓ°Ïì×î´ó£¬ÈçÉÌÒµÉèÊ©¡¢½ðÈÚ¡¢½¨Öþ¡¢Ö´·¨ÒÔ¼°Åú·¢ÁãÊÛÐÐÒµ£¬Õâ±íÃ÷¹¥»÷ÕßÖ÷ÒªÕë¶Ô¾ßÓиü¸ßÖ§¸¶ÄÜÁ¦µÄ×éÖ¯¡£ÔÚµØÀíÂþÑÜ·½Ã棬½öÃÀ¹ú¾ÍÕ¼42%£¬¶øÅ·ÖÞ¹ú¼ÒÔ¼Õ¼28%¡£
https://outpost24.com/blog/ransomware-report-2023