Ó¢¹úÓÊÕþ¹«Ë¾Royal Mail͸¶ÆäÔâµ½LockBitÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2023-01-13
1¡¢Ó¢¹úÓÊÕþ¹«Ë¾Royal Mail͸¶ÆäÔâµ½LockBitÀÕË÷¹¥»÷

      

¾ÝýÌå1ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬Ó¢¹ú×î´óµÄÓÊÕþЧÀÍRoyal MailÔâµ½ÓëLockBitÀÕË÷Èí¼þÓйصĹ¥»÷¡£¡£¡£¡£¡£1ÔÂ11ÈÕ£¬£¬£¬£¬Royal Mail͸¶³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬¹ú¼Êº½ÔËЧÀÍÊܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾²¢Î´Í¸Â¶¹ØÓÚ¹¥»÷µÄÈκÎϸ½Ú£¬£¬£¬£¬µ«¡¶ÖðÈÕµçѶ±¨¡·ÔÚ1ÔÂ12ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÏÖÔÚÒÑÈ·ÈϹ¥»÷À´×ÔLockBit£¬£¬£¬£¬»òÕßÓй¥»÷ÕßʹÓÃÁËËûÃǵļÓÃܳÌÐò¡£¡£¡£¡£¡£¹¥»÷»î¶¯¼ÓÃÜÁ˹ú¼ÊÔËÊäµÄ×°±¸£¬£¬£¬£¬²¢ÔÚÓÃÓÚº£¹Ø±¸°¸µÄ´òÓ¡»úÉÏ´òÓ¡Êê½ð¼Í¼¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/royal-mail-cyberattack-linked-to-lockbit-ransomware-operation/


2¡¢Vice SocietyÉù³Æ¶Ô°Ä´óÀûÑÇÏû·À¶ÓÔâµ½µÄ¹¥»÷ÈÏÕæ

      

ýÌå1ÔÂ12Èճƣ¬£¬£¬£¬ÀÕË÷ÍÅ»ïVice SocietyÉù³Æ¶Ô°Ä´óÀûÑÇÏû·À¶Ó(FRVP)Ôâµ½µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2022Äê12ÔÂ15ÈÕ£¬£¬£¬£¬Ôì³ÉÁËÆÕ±éÇÒÒ»Á¬µÄITЧÀÍÖÐÖ¹£¬£¬£¬£¬µ«²¢Î´Ó°Ïì¸Ã»ú¹¹µÄÓ¦¼±ÏìӦЧÀÍ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬FRVÌåÏÖºÚ¿Í»¹ÇÔÈ¡ÁËÆäÅÌËã»úÖеÄÊý¾Ý£¬£¬£¬£¬°üÀ¨Ô±¹¤¡¢³Ð°üÉÌ¡¢½èµ÷Ö°Ô±ºÍÇóÖ°ÕßµÄÐÅÏ¢¡£¡£¡£¡£¡£1ÔÂ10ÈÕ£¬£¬£¬£¬Vice SocietyÔÚÆäÍøÕ¾ÁгöÁËFRV£¬£¬£¬£¬»¹Ðû²¼ÁËÖ¸Ïò±»µÁÊý¾ÝµÄÁ´½Ó£¬£¬£¬£¬µ«¸ÃÁ´½ÓÏÖÔÚÊÇÎÞЧµÄ¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬¹¥»÷ÕßÒѸÄÓÃÒ»ÖÖеÄ×Ô½ç˵¼ÓÃÜÆ÷PolyVice¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-australian-firefighting-service/


3¡¢GootloaderʹÓÃVLCµÈ¹¤¾ß¹¥»÷°Ä´óÀûÑÇÒ½ÁƱ£½¡ÐÐÒµ

      

Trend MicroÔÚ1ÔÂ9ÈÕÅû¶Á˶ñÒâÈí¼þGootkit Loader£¨ÓÖÃû Gootloader£©Õë¶Ô°Ä´óÀûÑÇÒ½ÁƱ£½¡ÐÐÒµµÄ»î¶¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ2022Äê10Ô£¬£¬£¬£¬Ê¹ÓÃÁËSEOÖж¾¾ÙÐгõʼ»á¼û²¢ÀÄÓÃVLCýÌå²¥·ÅÆ÷µÈÕýµ±¹¤¾ß¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÑù±¾Ê¹ÓÃÁËÒªº¦´ÊÒ½Ôº¡¢¿µ½¡¡¢Ò½ÁÆºÍÆóҵЭÒ飬£¬£¬£¬²¢Óë°Ä´óÀûÑǶ¼»áÃû³ÆÅä¶Ô¡£¡£¡£¡£¡£¸Ã»î¶¯Ö¼ÔÚÔÚÄ¿µÄ×°±¸ÉÏ×°ÖÃCobalt Strike¿ª·¢¹¤¾ß°ü£¬£¬£¬£¬ÒÔ±ã½øÈëÆóÒµÍøÂç¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/a/gootkit-loader-actively-targets-the-australian-healthcare-indust.html


4¡¢Ñо¿Ö°Ô±Åû¶Scattered SpiderÈÆ¹ýÇå¾²¼ì²âµÄÒªÁì

      

¾Ý1ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬Scattered SpiderÊÔͼÔÚBYOVD¹¥»÷ÖÐ×°ÖÃÓ¢ÌØ¶ûÒÔÌ«ÍøÕï¶ÏÇý¶¯³ÌÐò£¬£¬£¬£¬À´ÈƹýEDRÇå¾²²úÆ·µÄ¼ì²â¡£¡£¡£¡£¡£CrowdStrike±¨¸æ³Æ£¬£¬£¬£¬¸ÃÍÅ»ïʵÑéʹÓÃÓ¢ÌØ¶ûÒÔÌ«ÍøÕï¶ÏÇý¶¯³ÌÐòÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2015-2291£©£¬£¬£¬£¬Ëü¿Éͨ¹ýÌØÖÆÅ²ÓÃÒÔÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Ö»¹ÜËüÒÑÓÚ2015ÄêÐÞ¸´£¬£¬£¬£¬µ«Í¨¹ýÔÚÄ¿µÄ×°±¸ÖÐÖ²Èë¾É°æ±¾£¬£¬£¬£¬ÎÞÂÛÄ¿µÄÓ¦ÓÃÁËʲô¸üй¥»÷Õß¶¼¿ÉÒÔʹÓøÃÎó²î¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÇý¶¯³ÌÐòÊÇÓÉ´ÓNVIDIAºÍGlobal Software LLCµÈÊðÃû»ú¹¹ÇÔÈ¡µÄÖ¤Êé¾ÙÐÐÊðÃû£¬£¬£¬£¬Òò´ËWindows²»»á×èÖ¹Ëü¡£¡£¡£¡£¡£


https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/


5¡¢°ü¹Ü¹«Ë¾AflacÈÕÌìÖ°¹«Ë¾³ÆÆä100¶àÍò¿Í»§µÄÐÅϢй¶

      

ýÌå1ÔÂ11ÈÕ±¨µÀ³Æ£¬£¬£¬£¬°ü¹Ü¹«Ë¾AflacÈÕÌìÖ°¹«Ë¾Í¸Â¶Æä100¶àÍò¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¡£1ÔÂ9ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾»ñϤÆä¿Í»§µÄÐÅÏ¢±»Ðû²¼ÔÚÒ»¸öÐÅÏ¢Ð¹Â¶ÍøÕ¾ÉÏ£¬£¬£¬£¬¾­È·ÈÏÊý¾ÝÀ´×ÔÆäµÚÈý·½Ð§ÀÍÌṩÉÌ¡£¡£¡£¡£¡£¸ÃÊÂÎñÓ°ÏìÁ˶©¹ºÓë°©Ö¢Ïà¹ØµÄ°ü¹ÜµÄ1323468¸ö¿Í»§£¬£¬£¬£¬Êý¾Ý×ÜÊýΪ3158199Ìõ£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢ÄêËê¡¢ÐԱ𡢱£µ¥ºÅÂë¡¢°ü¹Ü½ð¶îºÍ°ü¹Ü·ÑµÈ¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬ÈðÊ¿°ü¹Ü¹«Ë¾ËÕÀèÊÀÒ²ÈÏ¿ÉÆäÁè¼Ý200ÍòÈÕ±¾¿Í»§µÄÊý¾ÝÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£


https://www.theregister.com/2023/01/11/japan_aflac_zurich_data_breaches/


6¡¢AvastÐû²¼¹ØÓÚNeedleDropperµÄÊÖÒÕÆÊÎö±¨¸æ

      

1ÔÂ11ÈÕ£¬£¬£¬£¬AvastÐû²¼Á˹ØÓÚNeedleDropperµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£NeedleDropper²»µ«ÊÇÒ»¸ö¼òµ¥µÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬ËüЯ´ø¶à¸öÎļþ£¬£¬£¬£¬ÕâЩÎļþÒ»Æð½¨Éè¶ñÒâµÄÖ´ÐУ¬£¬£¬£¬ÌáÈ¡ÎļþÒÔ½âÃܺÍ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ̫ͨ¹ý·¢¶à¸öδʹÓõÄÎÞЧÎļþÀ´Òþ²Ø×Ô¼º£¬£¬£¬£¬²¢½«Ö÷ÒªÊý¾Ý´æ´¢ÔÚÊýMB²»Ö÷ÒªµÄÊý¾ÝÖ®¼ä£¬£¬£¬£¬»¹Ê¹ÓÃÕýµ±Ó¦ÓÃÀ´Ö´ÐС£¡£¡£¡£¡£NeedleDropperËÆºõÊÇÒ»¸öеĶñÒâÈí¼þϵÁУ¬£¬£¬£¬Ê¹Óá°-as-a-service¡±µÄÉÌҵģʽ£¬£¬£¬£¬ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¸øÆäËü¹¥»÷Õߣ¬£¬£¬£¬ÒÔÒþ²Ø×îÖÕµÄpayload¡£¡£¡£¡£¡£Avast³Æ£¬£¬£¬£¬×èÖ¹ÏÖÔÚËüÒÑ×èÖ¹ÁËÁè¼Ý30000´Î´ËÀ๥»÷ʵÑé¡£¡£¡£¡£¡£


https://decoded.avast.io/threatresearch/needledropper/