¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2022-12-19
1¡¢¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå12ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬¸çÂ×±ÈÑÇÄÜÔ´¹«Ë¾Empresas P¨²blicas de Medell¨ªn(EPM)Ôâµ½ÁËBlackCat/ALPHVµÄÀÕË÷¹¥»÷£¬£¬£¬£¬¹«Ë¾ÔËÓªÔÝʱÖÐÖ¹¡£¡£¡£¡£¡£EPMÊǸçÂ×±ÈÑÇ×î´óµÄ¹«¹²ÄÜÔ´¡¢Ë®ºÍ×ÔÈ»Æø¹©Ó¦ÉÌÖ®Ò»£¬£¬£¬£¬ÔÚ2022Äê´´Á¢ÁËÁè¼Ý250ÒÚÃÀÔªµÄÊÕÈë¡£¡£¡£¡£¡£ÉÏÖܶþ£¬£¬£¬£¬¸Ã¹«Ë¾ÒªÇóÔ¼4000ÃûÔ±¹¤¾Ó¼ÒÊÂÇ飬£¬£¬£¬ÇÒIT»ù´¡Éèʩ̱»¾£¬£¬£¬£¬¹«Ë¾µÄÍøÕ¾Ò²²»ÔÙ¿ÉÓᣡ£¡£¡£¡£½øÒ»²½µÄÊÓ²ìÅú×¢£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜÒÑ´ÓEPMÇÔÈ¡ÁË´ó×ÚÊý¾Ý¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/


2¡¢²¿·ÖÓû§×°ÖÃWindows 10¸üкó»á·ºÆðÀ¶ÆÁËÀ»úÎÊÌâ

      

¾Ý12ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬Î¢ÈíÕë¶ÔWindows 10×°±¸µÄ¸üпÉÄܻᵼÖÂÀ¶ÆÁËÀ»ú¹ýʧ£¬£¬£¬£¬¸Ã¹«Ë¾Ú¹ÊͳÆËüÒѾ­ÔÚ¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬×°ÖÃKB5021233ºó£¬£¬£¬£¬²¿·ÖWindows×°±¸Æô¶¯Ê±¿ÉÄÜ·ºÆð¹ýʧ£¨0xc000021a£©ÒÔ¼°À¶ÆÁ¡£¡£¡£¡£¡£ÊÇÓÉÓÚ×°Öøüк󣬣¬£¬£¬c:/windows/system32ºÍc:/windows/system32/driversÖеÄhidparse.sysÎļþ°æ±¾¿ÉÄܲ»Æ¥Å䣬£¬£¬£¬µ¼ÖÂÕûÀíʱÊðÃûÑé֤ʧ°Ü¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÌṩ»º½â·½·¨£¬£¬£¬£¬²¢½¨ÒéÓû§²»ÒªÊµÑéÆäËüÐÞ¸´ÒªÁ죬£¬£¬£¬ÀýÈçɾ³ýhidparse.sys£¬£¬£¬£¬Õâ¿ÉÄÜ»áÍêÈ«ÆÆËðÅÌËã»ú¡£¡£¡£¡£¡£Î¢ÈíÏÖÔÚÕý×ÅÊÖ½â¾öÕâ¸öÎÊÌ⣬£¬£¬£¬Ã»ÓÐÔ¤¼ÆÍê³Éʱ¼ä¡£¡£¡£¡£¡£


https://news.softpedia.com/news/microsoft-warns-of-windows-10-bsods-after-the-latest-updates-536675.shtml


3¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý

      

ýÌå12ÔÂ17Èճƣ¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍøÉϳöÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý¡£¡£¡£¡£¡£Æ¾Ö¤Ñù±¾Îļþ£¬£¬£¬£¬´Ë´ÎÊÂÎñй¶ÁËÓû§ID¡¢Ñù±¾ID¡¢ÐÕÃû¡¢ÊÖ»úºÅÂëºÍЧ¹ûÈÕÆÚµÈÐÅÏ¢¡£¡£¡£¡£¡£ºÚ¿ÍÔÚÒ»¸öÌû×ÓÖÐÉù³ÆÇÔÈ¡ÁË5000¸öÓû§µÄÊý¾Ý£¬£¬£¬£¬µ«ÔÚÁíÒ»¸öÌû×ÓÖÐ˵Ëû¿ÉÒÔ»á¼ûÁè¼Ý50Íò¸öÕË»§¡£¡£¡£¡£¡£Êý¾ÝµÄÕæÊµÐÔÏÖÔÚ»¹Ã»Óб»Ö¤Êµ£¬£¬£¬£¬È»¶øºÚ¿ÍËÆºõÖ»ÄÜ»á¼ûAndra Pradesh CoWINÃÅ»§µÄÆäÖÐÒ»¸öÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬¶ø·Çϵͳ×Ô¼º¡£¡£¡£¡£¡£


https://www.timesnownews.com/technology-science/hackers-selling-user-data-from-cowin-platform-on-darkweb-article-96301909/amp


4¡¢É罻ýÌåÆÊÎöÍøÕ¾Social BladeÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

      

¾Ý12ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬É罻ýÌåÆÊÎöÍøÕ¾Social Blade³ÆÆäÓû§µÄÐÅÏ¢Òѱ»Ð¹Â¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓоʹËÊÂÎñ·¢³ö¹ûÕæÍ¨¸æ£¬£¬£¬£¬¶øÊÇÖ±½Óͨ¹ýÓʼþ֪ͨÓû§¡£¡£¡£¡£¡£ÓʼþÖÐдµ½£¬£¬£¬£¬12ÔÂ14Èոù«Ë¾ÊÕµ½ÁËDZÔÚÊý¾Ýй¶µÄ֪ͨ£¬£¬£¬£¬¾ÝϤºÚ¿ÍÇÔÈ¡ÁËÆäÓû§Êý¾Ý¿â²¢ÊÔͼÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£¡£Ñù±¾ÒÑÐû²¼£¬£¬£¬£¬¾­Ö¤ÊµÊý¾ÝȷʵÊÇÕæÊµµÄ£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÁËÍøÕ¾ÉϵÄÎó²îÀ´·ÃÊý¾Ý¿â¡£¡£¡£¡£¡£Social Blade³Æ£¬£¬£¬£¬Ð¹Â¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþ¡¢IPºÍ¼ÒÍ¥µØµã£¬£¬£¬£¬ÒÔ¼°ÃÜÂëµÄ¹þÏ£Öµ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/social-blade-confirms-data-breach/


5¡¢Nozomi·¢Ã÷¶ñÒâÈí¼þGluptebaÔÚÈ«Çò¹æÄ£ÄڵĹ¥»÷»î¶¯

      

NozomiÔÚ12ÔÂ15ÈÕ³ÆÆä·¢Ã÷ÁËGluptebaÔÚ¿ìÒªÒ»ÄêµÄÖÐÖ¹ºóÖØÐ»îÔ¾ÆðÀ´£¬£¬£¬£¬Ñ¬È¾ÁËÈ«ÇòµÄ×°±¸¡£¡£¡£¡£¡£2021Äê12Ô£¬£¬£¬£¬¹È¸èÀÖ³ÉµØÆÆËðÁËÕâ¸öÖ§³ÖÇø¿éÁ´µÄ½©Ê¬ÍøÂ磬£¬£¬£¬»ñµÃÁË¿ØÖƽ©Ê¬ÍøÂç»ù´¡ÉèÊ©µÄ·¨ÔºÏÂÁ£¬£¬£¬²¢¶ÔÁ½¸ö¶íÂÞ˹ÔËÓªÍÅ»ïÌáÆðËßËÏ¡£¡£¡£¡£¡£Nozomi½üÆÚµÄÊÓ²ìÈ·¶¨ÁË4ÆðGlupteba¹¥»÷»î¶¯ÖÐʹÓõÄ15¸ö±ÈÌØ±ÒµØµã£¬£¬£¬£¬×î½üÒ»´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£ÓëÒÑÍùÏà±È£¬£¬£¬£¬´Ë´Î»î¶¯Ê¹ÓÃÁ˸ü¶àµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬Ê¹½©Ê¬ÍøÂç¸ü¾ßµ¯ÐÔ¡£¡£¡£¡£¡£


https://www.nozominetworks.com/blog/tracking-malicious-glupteba-activity-through-the-blockchain/


6¡¢Î¢ÈíÐû²¼¹ØÓÚеÄDDoS½©Ê¬ÍøÂçMCCrashµÄÆÊÎö±¨¸æ

      

12ÔÂ15ÈÕ£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³Æ£¬£¬£¬£¬Ò»ÖÖÃûΪMCCrashµÄÐÂÐÍ¿çÆ½Ì¨¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚѬȾWindows¡¢LinuxºÍÎïÁªÍø×°±¸£¬£¬£¬£¬Ö¼ÔÚ¶ÔMinecraftЧÀÍÆ÷¾ÙÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£½©Ê¬ÍøÂçµÄ³õʼѬȾǰÑÔÊÇαÔìµÄWindowsÔÊÐíÖ¤µÄÆÆ½â¹¤¾ß£¬£¬£¬£¬Ò»µ©ËüѬȾÁË×°±¸£¬£¬£¬£¬¾Í¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âSSHƾ֤Èö²¥µ½ÍøÂçÉÏµÄÆäËüϵͳ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬´ó´ó¶¼±»MCCrashѬȾµÄ×°±¸Î»ÓÚ¶íÂÞ˹£¬£¬£¬£¬Æä´ÎÄ«Î÷¸ç¡¢Òâ´óÀûºÍÓ¡¶ÈµÈµØ¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2022/12/15/mccrash-cross-platform-ddos-botnet-targets-private-minecraft-servers/