Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

Ðû²¼Ê±¼ä 2022-10-26
1¡¢Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

      

ýÌå10ÔÂ24Èճƣ¬£¬£¬Ó¢¹úÆû³µ¾­ÏúÉÌPendragon GroupÔâµ½LockBitµÄÀÕË÷¹¥»÷¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬¹¥»÷±¬·¢ÔÚԼĪһ¸öÔÂǰ£¬£¬£¬Î´Ó°ÏìÆäÕý³£ÔËÓª£¬£¬£¬ËûÃÇÒ»Ö±ÔÚÓëºÚ¿ÍÁªÏµ£¬£¬£¬²¢ÊÕµ½Á˱»µÁÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬µ«Ã»ÓоÙÐÐ̸ÅС£¡£¾ÝÓ¢¹úýÌ峯£¬£¬£¬LockBitÒªÇó6000ÍòÃÀÔªÊê½ð£¬£¬£¬¶øPendragon½²»°ÈËÌåÏÖËûÃǼá³Ö²»ÏòºÚ¿Í¸¶¿îµÄ¾öÒé¡£¡£Pendragon»¹³ÎÇåµÀ£¬£¬£¬ÆäITÍŶÓÔÚÔâµ½¹¥»÷ºóÁ¬Ã¦×ö³öÁË·´Ó¦£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿Í½öÇÔÈ¡ÁË5%µÄÊý¾Ý¿â¡£¡£


https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/


2¡¢CiscoÌáÐÑAnyConnectÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓÃ

      

CiscoÔÚ10ÔÂ25ÈÕÌáÐѿͻ§£¬£¬£¬ÊÊÓÃÓÚWindowsµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓᣡ£ÕâЩÎó²î£¨CVE-2020-3433ºÍCVE-2020-3153£©¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´Ö´ÐÐDLLÐ®ÖÆ¹¥»÷²¢½«Îļþ¸´ÖƵ½¾ßÓÐϵͳ¼¶È¨ÏÞµÄϵͳĿ¼¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¾ßÓÐϵͳȨÏÞµÄÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬ÔÚ2022Äê10Ô£¬£¬£¬Æä·¢Ã÷ÓÐÈËÊÔͼʹÓôËÎó²î£¬£¬£¬²¢Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-admins-to-patch-anyconnect-flaw-exploited-in-attacks/


3¡¢ÎÚ¿ËÀ¼¾ÍCubaÍÅ»ïÕë¶ÔÆäÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨

      

¾Ý10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)ÒѾÍÀÕË÷ÍÅ»ïCuba¶ÔÆäÒªº¦¼ü»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨¡£¡£´Ó10ÔÂ21ÈÕ×îÏÈ£¬£¬£¬CERT-UA¾Í¼ì²âµ½ÐÂÒ»²¨´¹ÂÚÓʼþ£¬£¬£¬Ã°³äÁËÎÚ¿ËÀ¼Îä×°²½¶Ó×ÜÕÕÁϲ¿ÐÂÎÅЧÀͲ¿£¬£¬£¬ÓÕʹÊÕ¼þÈ˵ã»÷ÆäÖеÄǶÈëʽÁ´½Ó£¬£¬£¬×îÖÕ»á×°ÖÃROMCOM RAT¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬Ë¼Á¿µ½RomComºóÃŵÄʹÓÃÒÔ¼°Ïà¹ØÎļþµÄÆäËûÌØÕ÷£¬£¬£¬ÍƲâ´Ë´Î»î¶¯ÓëTropical Scorpius(UNC2596)ÓйØ£¬£¬£¬¸ÃÍÅ»ïÈÏÕæ·Ö·¢CubaÀÕË÷Èí¼þ¡£¡£


https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html


4¡¢ÐÂµÄ¹ã¸æ»î¶¯Dormant Colors·Ö·¢¶ñÒâChromeÀ©Õ¹

      

10ÔÂ23ÈÕ£¬£¬£¬Guardio LabsÅû¶ÁËÐÂÒ»ÂֵĶñÒâ¹ã¸æ»î¶¯Dormant Colors¡£¡£µ½2022Äê10ÔÂÖÐÑ®£¬£¬£¬ÔÚChromeºÍEdgeÍøÂçÊÐËÁÖж¼ÓÐ30¸öä¯ÀÀÆ÷À©Õ¹µÄ±äÖÖ£¬£¬£¬ÀÛ¼ÆÁè¼Ý100ÍòµÄ×°ÖÃÁ¿¡£¡£¸Ã»î¶¯µÄÖ÷ÌâÓëÑÕÉ«ÓйØ£¬£¬£¬Ê¼ÓÚ¶ñÒâ¹ã¸æ»î¶¯£¬£¬£¬ÒÔÐÂÓ±µÄÒªÁìÔÚûÈË×¢ÖØµÄÇéÐÎϲà¼ÓÔØÕæÕýµÄ¶ñÒâ´úÂë¡£¡£×îºó£¬£¬£¬²»µ«ÇÔȡĿµÄËÑË÷ºÍä¯ÀÀÊý¾Ý£¬£¬£¬²¢Îª10000¸öÍøÕ¾ÒýÁ÷£¬£¬£¬Óû§ÔÚÕâÐ©ÍøÕ¾ÉϾÙÐеÄÈκιºÖÃÐÐΪ¶¼»áΪ¹¥»÷Õß´øÀ´Ó¶½ð¡£¡£


https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849


5¡¢SideWinderʹÓÃкóÃÅWarHawk¹¥»÷°Í»ù˹̹µÄ×éÖ¯

      

¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬ZscalerÅû¶Á˺ڿÍÍÅ»ïSideWinderµÄкóÃÅWarHawk¡£¡£SideWinderÒÉËÆÓëÓ¡¶ÈÓйØ£¬£¬£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞµÝÈ¥£¬£¬£¬ÓÈÆäÊǰͻù˹̹µÄÕþ¸®¡¢¾ü¶ÓºÍÆóÒµ×éÖ¯¡£¡£½ñÄê9Ô£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°Í»ù˹̹¹ú¼ÒµçÁ¦î¿Ïµ¾ÖµÄÕýµ±ÍøÕ¾nepra[.]org[.]pk·¢Ã÷Ò»¸öÎäÆ÷»¯ISOÎļþ£¬£¬£¬À´¼¤»îÓÃÀ´×°ÖÃWarHawkµÄkillchain¡£¡£WarHawkÔòαװ³ÉASUS Update SetupºÍRealtek HD Audio ManagerµÈÕýµ±Ó¦Ó㬣¬£¬Ëü·Ö·¢Cobalt Strike×÷Ϊ×îÖÕpayload¡£¡£


https://thehackernews.com/2022/10/sidewinder-apt-using-new-warhawk.html


6¡¢ÐÞ½¨¹«Ë¾InterserveÒòÔâµ½ÀÕË÷¹¥»÷±»·£¿£¿£¿î440ÍòÓ¢°÷


10ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬Ó¢¹úÐÞ½¨¹«Ë¾InterserveÒòÀÕË÷¹¥»÷й¶113000ÃûÔ±¹¤µÄÊý¾Ý£¬£¬£¬±»Ó¢¹úÊý¾Ý±£»£»£»£»£»£»¤î¿Ïµ»ú¹¹·£¿£¿£¿î440ÍòÓ¢°÷¡£¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬£¬£¬Interserve GroupδÄܽÓÄÉÊʵ±µÄÇå¾²²½·¥À´Ìá·ÀÍøÂç¹¥»÷¡£¡£ICOÚ¹Ê͵À£¬£¬£¬¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬Ä³Ô±¹¤·­¿ªºóÎÞÒâÖÐÏÂÔØÁ˶ñÒâÈí¼þ£¬£¬£¬¸Ã¹«Ë¾µÄAVÈí¼þÒÑ·¢Ë;¯±¨¡£¡£µ«ºóÐøÊӲ첻·ó³¹µ×£¬£¬£¬µ¼Ö¹¥»÷Õß»á¼ûÁË283¸öϵͳºÍ16¸öÕË»§£¬£¬£¬²¢Ð¶ÔØÁ˹«Ë¾µÄAVÈí¼þ¡£¡£Interserve ÒѾͷ£¿£¿£¿îÏòICOÌá³öÉÏËߣ¬£¬£¬µ«×îÖÕ·£¿£¿£¿î²¢Î´ïÔÌ­¡£¡£


https://therecord.media/british-company-fined-4-4-million-over-ransomware-attack/