°²´óÂÔÒ½ÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-09-27

1¡¢°²´óÂÔÒ½ÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶


¾Ý9ÔÂ25ÈÕ±¨µÀ£¬°²´óÂÔµÄÒ½ÁƱ£½¡»ú¹¹Better Outcomes Registration & Network(BORN)Ô¼340ÍòÈ˵ÄÊý¾Ýй¶ ¡£¸ÃʼþÔ´ÓÚClopÀûÓÃProgress MOVEit TransferÈí¼þÖЩ¶´(CVE-2023-34362)µÄ¹¥»÷»î¶¯ ¡£BORNÓÚ5ÔÂ31ÈÕÊ×´ÎÒâʶµ½¸ÃÎÊÌ⣬֮ºóµÄÊÓ²ìÏÔʾ£¬¹¥»÷ÕßÒÑÇÔÈ¡°üÂÞÔ¼340ÍòÈËÐÅÏ¢µÄÎļþ£¬ÆäÖÐÖ÷ÒªÊÇÐÂÉú¶ùºÍ»³Ôл¤Àí»¼Õߣ¬ÕâЩÈËÔÚ2010Äê1ÔÂÖÁ2023Äê5ÔÂÆÚ¼äʹÓÃÁËBORN·þÎñ ¡£


https://www.bleepingcomputer.com/news/security/born-ontario-child-registry-data-breach-affects-34-million-people/


2¡¢RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄáµÄϵͳ²¢½«³öÊÛÆäÊý¾Ý


¾ÝýÌå9ÔÂ26Èճƣ¬RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄἯÍŵÄϵͳ£¬²¢ÌåÏÖ½«³öÊÛÆäÊý¾ÝºÍ·ÃÎÊȨÏÞ£¬ÒòΪË÷Äá²»Ïë½»Êê½ð ¡£RansomedVCÐû²¼µÄÑù±¾ºÜС£¬Ô¼2MB£¬°üÂÞPPTÑÝʾÎĸ塢һЩJavaÔ´´úÂëÎļþºÍEclipse IDE½ØÍ¼µÈ ¡£¸ÃÍÅ»ï³ÆÇÔÈ¡ÁË260 GBÊý¾Ý£¬²¢ÊÔͼÒÔ250ÍòÃÀÔª³öÊÛÕâЩÊý¾Ý ¡£ÁíÒ»¸öºÚ¿ÍÍÅ»ïMajorNelson³ÆRansomedVCÊÇÆ­×Ó£¬²¢ÌåÏÖËûÃǶԴ˴ι¥»÷ÂôÁ¦ ¡£¸ÃÍÅ»ïÐû²¼ÁË2.4 GBµÄѹËõÎļþ×÷ΪÑù±¾£¬ÆäÖаüÂÞRansomedVCµÄÑù±¾ÖеÄËùÓÐÎļþ ¡£Ë÷ÄáĿǰÕýÔÚÊÓ²ì´Ë´Î¹¥»÷ʼþ ¡£


https://www.bleepingcomputer.com/news/security/sony-investigates-cyberattack-as-hackers-fight-over-whos-responsible/


3¡¢Progressive LeasingÔâµ½¹¥»÷´óÁ¿¿Í»§µÄÐÅϢй¶


ýÌå9ÔÂ26Èճƣ¬Progressive LeasingÔâµ½¹¥»÷µ¼Ö´óÁ¿¿Í»§µÄÐÅϢй¶ ¡£ÕâÊÇÒ»¼Ò¼ÛÖµÊýÊ®ÒÚÃÀÔªµÄ¹«Ë¾£¬ÔÊÐíÈËÃÇ×âÁÞÏû·ÑÆ· ¡£·¢ÑÔÈ˳Æ£¬´Ë´ÎÄþ¾²Ê¼þÓ°ÏìÁËProgressive LeasingµÄ²¿ÃÅϵͳ£¬µ«Î´¶ÔÆäÔËÓªÔì³ÉÖØ´óÓ°Ï죬Ŀǰʱ¼äÈÔÔÚÊÓ²ìÖÐ ¡£¾ÝϤ£¬AlphVÉù³Æ¶ÔÖÜÎåµÄ¹¥»÷ÂôÁ¦£¬Òѽ«¸Ã¹«Ë¾Ìí¼Óµ½ÆäÍøÕ¾£¬²¢ÌåÏÖÒÑÇÔÈ¡Áè¼Ý4000Íò¿Í»§µÄ¸öÈËÐÅÏ¢ ¡£


https://therecord.media/product-leasing-giant-progressive-ransomware


4¡¢RhysidaÍÅ»ïÉù³Æ¶Ô¿ÆÍþÌØ²ÆÕþ²¿Ôâµ½µÄ¹¥»÷ÂôÁ¦


9ÔÂ26ÈÕ±¨µÀ³Æ£¬ÀÕË÷ÍÅ»ïRhysida¶Ô¿ÆÍþÌØ²ÆÕþ²¿Ôâµ½µÄ¹¥»÷ÂôÁ¦ ¡£¹¥»÷·¢ÉúÔÚ9ÔÂ18ÈÕ£¬¿ÆÍþÌØ²ÆÕþ²¿ÔÚµ±Ìì·¢Ìû³ÆÒѹرÕÊÜÓ°ÏìµÄϵͳ£¬ÒÔ·ÀÖ¹½øÒ»²½µÄ¹¥»÷ ¡£¸Ã²¿»¹È·ÈÏ£¬Ð½×Êϵͳ²»»áÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬ÒòΪÕþ¸®µÄ²ÆÕþϵͳÊǶÀÁ¢µÄ ¡£Ä¿Ç°£¬¸Ã²¿ÉÐδ´ÓÀÕË÷¹¥»÷ÖÐÍêÈ«»Ö¸´£¬ËûÃÇÈÔÔÚÊÓ²ì´Ë´Îʼþ ¡£RhysidaÔÚ±¾Öܽ«¸Ã»ú¹¹Ìí¼Óµ½ÆäÍøÕ¾ÖУ¬»¹Ðû²¼ÁËÒ»×éÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý ¡£


https://securityaffairs.com/151501/cyber-crime/rhysida-ransomware-kuwait-ministry-of-finance.html


5¡¢ThreatFabricÅû¶Ö÷ÒªÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄXenomorph»î¶¯


ThreatFabricÔÚ9ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÁè¼Ý30¼ÒÃÀ¹ú½ðÈÚ»ú¹¹·Ö·¢XenomorphµÄ»î¶¯ ¡£XenomorphÓÚ2022Äê³õÊ״ηºÆð£¬Õë¶Ô56¼ÒÅ·ÖÞµÄÒøÐÐ ¡£ÔÚ×îеĻÖУ¬Í¨¹ýChromeä¯ÀÀÆ÷ÓÕʹĿ±êÏÂÔØ¶ñÒâAPK ¡£Ã¿¸öXenomorphÑù±¾¶¼¼ÓÔØÁËԼĪһ°Ù¸öÁýÕֲ㣬Õë¶Ô²îÒìµÄÒøÐкͼÓÃÜÓ¦Ó÷¨Ê½ ¡£ThreatFabric»¹·ÃÎÊÁËÍйÜpayloadµÄ»ù´¡ÉèÊ©£¬·¢ÏÖÁËÆäËü¶ñÒâÈí¼þ£¬°üÂÞMedusa¡¢Cabassous¡¢RisePro¡¢LummaC2ÒÔ¼°Private Loader ¡£


https://www.threatfabric.com/blogs/xenomorph


6¡¢Ñо¿ÈËÔ±ÏêÊöÕë¶ÔÎÚ¿ËÀ¼·Ö·¢MerlinAgentµÄµöÓã¹¥»÷


9ÔÂ25ÈÕ£¬SecuronixÐû²¼³ÂËßÏêÊöÁËÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄµöÓã¹¥»÷»î¶¯ ¡£¸Ã»î¶¯µÄ´úºÅΪSTARK#VORTEX£¬ÒÔPICÎÞÈË»úÊÖ²áÎĵµ×÷ΪÓÕ¶ü·Ö·¢MerlinAgent£¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0154 ¡£MerlinAgentÊÇÒ»¸öGo¿ª·¢µÄ¿ªÔ´C2¹¤¾ß°ü£¬ÀàËÆÓÚCobalt Strike»òSliver ¡£ÓÕ¶üÊÇMicrosoft×ÊÖúÎļþ(.chm)£¬´ò¿ªºó»áÔËÐÐǶÈëµÄ¶ñÒâJavaScript£¬ÒÔÖ´ÐÐPowerShell´úÂ룬¸Ã´úÂë´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡»ìÏýµÄ¶þ½øÖÆÎļþ ¡£payload»áÏÂÔØMerlin Agent£¬¶øMerlin AgentÓÖ±»ÅäÖÃΪÓëC2·þÎñÆ÷ͨÐÅ£¬ÒÔÖ´Ðй¥»÷ºóµÄ»î¶¯£¬´Ó¶øÓÐЧµØ¶áÈ¡Ö÷»úµÄ¿ØÖÆÈ¨ ¡£


https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/