¶íÂÞ˹ÂÉËùRKPLawÔ¼1TBµÄÊý¾Ý±»¹ûÕæÔÚDDoSecrets

Ðû²¼Ê±¼ä 2022-06-07

1¡¢¶íÂÞ˹ÂÉËùRKPLawÔ¼1TBµÄÊý¾Ý±»¹ûÕæÔÚDDoSecrets


¾Ý6ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¶íÂÞ˹״ʦÊÂÎñËùRustam Kurmaev and Partners(RKP Law) Ô¼1TBµÄÊý¾ÝÒѾ­Ð¹Â¶¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬RKP LawÔâµ½ÁËAnonymousµÄÁ¥Êô×éÖ¯B00daºÍPorteurÈëÇÖ¡£¡£¡£PorteurÔÚTwitterÉÏÌåÏÖÇÔÈ¡Á˵ç×ÓÓʼþ¡¢·¨Í¥Îļþ¡¢¿Í»§ÎļþºÍ±¸·ÝµÈÎļþ£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸öºÜÊÇ´óµÄ£¨220¸ö¿Í»§£©¿Í»§Áбí¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬±»µÁÊý¾ÝÒ²±»·ÅÔÚÁËDDoSecretsÉÏ¡£¡£¡£¸Ã¹«Ë¾´ú±íÔ¼500¼Ò¿Í»§£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹¹«¹²Æû³µ¼¯ÍÅ¡¢Ò˼ҡ¢·áÌïºÍÖÙÁ¿ÁªÐеȣ¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÂÎñ¿ÉÄܶԸù«Ë¾Ôì³Éɱ¾øÐԵĹ¥»÷¡£¡£¡£


https://www.hackread.com/anonymous-hacktivists-leak-1tb-russia-law-firm-data/


2¡¢ÐºڿÍÍÅ»ïCyber SpetsnazÖ÷ÒªÕë¶Ô±±Ô¼µÄ»ù´¡ÉèÊ©


¾ÝýÌå6ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Resecurity·¢Ã÷½üÆÚÓÉкڿÍÍÅ»ïCyber SpetsnazÌᳫµÄ¹¥»÷»î¶¯ÓÐËùÔöÌí¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶Ô±±Ô¼»ù´¡ÉèÊ©¾ÙÐÐÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£Ô¼ÄªÔÚ4Ô£¬£¬£¬£¬£¬£¬¸ÃÍŻィÉèÁ˵ÚÒ»¸ö²¿·ÖZarya£¬£¬£¬£¬£¬£¬²¢¶Ô±±Ô¼µÄ×éÖ¯¾ÙÐÐÁËÊ×´ÎЭͬ¹¥»÷¡£¡£¡£6ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬Ð²¿·ÖSparta½¨É裬£¬£¬£¬£¬£¬Ö÷ÒªÈÏÕæÖÐÖ¹ÍøÂç×ÊÔ´ÖÐÖ¹ºÍÇÔÈ¡Ç鱨µÈ£¬£¬£¬£¬£¬£¬ÊÇKillnet CollectiveÍÅ»ïµÄÕýʽ×é³É²¿·Ö¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯»¹¹¥»÷ÁËÒâ´óÀûµÄ5¸öÎïÁ÷ÖÕ¶Ë£¨Sech¡¢Trieste¡¢TDT¡¢Yilprort¡¢VTP£©ºÍ¼¸¼ÒÖ÷ÒªµÄ½ðÈÚ»ú¹¹¡£¡£¡£


https://securityaffairs.co/wordpress/131967/hacking/exclusive-pro-russia-cyber-spetsnaz-is-attacking-government-agencies.html


3¡¢ÃÀ¹úFTCÌåÏÖÈ¥Äê¼ÓÃÜÇ®±Ò¹¥»÷Ôì³ÉÁè¼Ý10ÒÚÃÀÔªËðʧ


ÃÀ¹úÁª°îÉÌҵίԱ»á(FTC)ÔÚ6ÔÂ3ÈÕÌåÏÖ£¬£¬£¬£¬£¬£¬2021Äê1ÔÂÖÁ2022Äê3Ô£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý46000¸öÃÀ¹ú¹«Ãñ±¨¸æ³ÆÔâµ½Á˼ÓÃÜÇ®±ÒÕ©Æ­¹¥»÷£¬£¬£¬£¬£¬£¬×ܼÛÖµÁè¼Ý10ÒÚÃÀÔª¡£¡£¡£ÕâÓëFTCÈ¥ÄêµÄ±¨¸æÏà±ÈÔöÌíÏÔÖø£¬£¬£¬£¬£¬£¬Æäʱ¸Ã»ú¹¹³ÆÔ¼7000ÈË³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ËðʧԼΪ8000ÍòÃÀÔª¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬2021ÄêIC3ÊÕµ½ÁË34202ÆðÉæ¼°Ê¹ÓüÓÃÜÇ®±ÒµÄͶËߣ¬£¬£¬£¬£¬£¬±»¹¥»÷ÈËÊý±È2020Ä꣨35229ÈË£©ÓÐËùïÔÌ­£¬£¬£¬£¬£¬£¬µ«Ëðʧ½ð¶îÔöÌíÁ˽üÆß±¶£¬£¬£¬£¬£¬£¬´ÓÔ¼2.4ÒÚÃÀÔªÔöÌíµ½16ÒÚÃÀÔª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/americans-report-losing-over-1-billion-to-cryptocurrency-scams/


4¡¢Cado LabsÅû¶ºÚ¿ÍÍÅ»ïWatchDog½üÆÚ¹¥»÷»î¶¯µÄϸ½Ú


6ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬Cado LabsÅû¶ÁËÔÚ½üÆÚ¿ªÕ¹µÄÐÂÒ»ÂÖ¼ÓÃÜÐ®ÖÆ»î¶¯µÄϸ½ÚÐÅÏ¢¡£¡£¡£´Ë´Î»î¶¯Ê¹ÓÃÁËÏȽøµÄÊÖÒÕÀ´ÈëÇÖ¡¢worm-likeÈö²¥²¢ÈƹýÇå¾²Èí¼þ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô̻¶µÄDocker Engine APIÖն˺ÍRedisЧÀÍÆ÷£¬£¬£¬£¬£¬£¬¿ÉÒÔ¿ìËٵشÓһ̨±»Ñ¬È¾µÄ×°±¸Òƶ¯µ½Õû¸öÍøÂç¡£¡£¡£¹¥»÷ÕßµÄÄ¿µÄÊÇͨ¹ýÀÄÓÃÇå¾²ÐԽϲîµÄЧÀÍÆ÷µÄ¿ÉÓÃÅÌËã×ÊÔ´ÍÚ¾ò¼ÓÃÜÇ®±ÒÀ´×¬Ç®¡£¡£¡£Í¨¹ý¶Ô¹¥»÷»î¶¯µÄÕ½ÂÔ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«´Ë´Î»î¶¯¹éÒòÓÚWatchDog¡£¡£¡£


https://www.cadosecurity.com/tales-from-the-honeypot-watchdog-evolves-with-a-new-multi-stage-cryptojacking-attack/


5¡¢Mandiant³ÆÆä²¢Î´Ôâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷


¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬6ÔÂ6ÈÕÀÕË÷ÍÅ»ïLockBitÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁËÒ»¸öÐÂÒ³Ãæ£¬£¬£¬£¬£¬£¬³Æ½«¹ûÕæ´ÓMandiantÇÔÈ¡µÄ356841¸öÎļþ¡£¡£¡£Æäʱ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ¼ÆÊ±Æ÷ÏÔʾ¾àÀë¼ÆÊ±¿¢Ê½öÊ£²»µ½Èý¸öСʱµÄʱ¼ä¡£¡£¡£ÓÉÓÚ¸ÃÐ¹Â¶Ò³ÃæÉϵÄÎļþÁбíΪ¿Õ£¬£¬£¬£¬£¬£¬LockBitÒ²ÉÐδ͸¶Ëü´ÓMandiantµÄϵͳÖÐÇÔÈ¡ÁËÄÄЩÎļþ¡£¡£¡£½öÓÐÒ»¸öÃûΪ¡°mandiantyellowpress.com.7z¡±µÄ0×Ö½ÚÎļþ£¬£¬£¬£¬£¬£¬ËƺõÓëmandiantyellowpress[.]comÓò£¨¸Õ¸Õ×¢²á£©ÓйØ¡£¡£¡£MandiantÔòÌåÏÖÆäÕýÔÚÊÓ²ì´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬ÉÐδÕÒµ½Î¥¹æµÄÖ¤¾Ý¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mandiant-no-evidence-we-were-hacked-by-lockbit-ransomware/


6¡¢AvastÐû²¼Android¶ñÒâÈí¼þSMSFactoryµÄÆÊÎö±¨¸æ


AvastÔÚ6ÔÂ1ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þSMSFactoryµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Ò»¿îÃûΪSMSFactoryµÄ¶ñÒâÈí¼þ»áͨ¹ýΪĿµÄ¶©Ôĸ߼¶Ð§ÀÍÀ´ÔöÌí»°·Ñ±¾Ç®£¬£¬£¬£¬£¬£¬Æä¾ßÓжàÖÖ·Ö·¢ÇþµÀ£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâ¹ã¸æ¡¢ÍÆËÍ֪ͨ¡¢ÍøÕ¾ÉϵĴÙÏúµ¯´°ºÍÆÆ½âÓÎÏ·µÄÊÓÆµµÈ¡£¡£¡£¾ÝAvast³Æ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÔÚ2021Äê5ÔÂÖÁ2022Äê5ÔÂѬȾÁËÁè¼Ý165000¸öAndroid×°±¸£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚ¶íÂÞ˹¡¢°ÍÎ÷¡¢°¢¸ùÍ¢¡¢ÍÁ¶úÆäºÍÎÚ¿ËÀ¼¡£¡£¡£


http://blog.avast.com/smsfactory-android-trojan