FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷
Ðû²¼Ê±¼ä 2024-06-061. FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬RansomHub ÀÕË÷Èí¼þ×éÖ¯Éù³ÆÇÔÈ¡ÁËÃÀ¹úµçÐŹ«Ë¾ Frontier Communications Áè¼Ý 200 Íò¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£RansomHub ×éÖ¯Éù³ÆÇÔÈ¡ÁËÕâ¼ÒµçОÞÍ·µÄ 5GB Êý¾Ý¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢Éç»á°ü¹ÜºÅ¡¢ÐÅÓᢷÖÊý¡¢³öÉúÈÕÆÚºÍµç»°ºÅÂë¡£¡£¡£¡£¡£¡£½ñÄê 4 Ô£¬£¬£¬£¬£¬Frontier Communications֪ͨÃÀ¹ú֤ȯÉúÒâίԱ»á (SEC)£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÔâÓöÍøÂç¹¥»÷ºó±ØÐè¹Ø±ÕijЩϵͳ¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ 4 Ô 14 ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÊÇÒ»Ãûδ¾ÊÚȨµÄÍþвÐÐΪÕßδ¾ÊÚȨ»á¼ûÁ˸ù«Ë¾µÄ²¿·Ö IT ÇéÐΡ£¡£¡£¡£¡£¡£¸Ã¹«Ë¾¶Ô¸ÃÇå¾²Îó²îÕö¿ªÁËÊӲ죬£¬£¬£¬£¬²¢½ÓÄÉÐж¯¿ØÖÆÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬Ò²ÉÐδ͸¶ÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£¡£RansomHub Ðû²¼Á˱»µÁ¼Í¼µÄͼƬ×÷ΪÊý¾Ýй¶µÄÖ¤¾Ý£¬£¬£¬£¬£¬²¢Íþв˵£¬£¬£¬£¬£¬ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬ËûÃǽ«Ðû²¼±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/164126/data-breach/ransomhub-gang-hacked-frontier-communications.html
2. Ñо¿ÍŶӷ¢Ã÷ͨ¹ý¶ñÒâExcel¹¥»÷ÎÚ¿ËÀ¼µÄWindowsÓû§
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÕýÊÔͼÔÚÎÚ¿ËÀ¼Óû§µÄ Windows ϵͳÉϰ²ÅÅ Cobalt Strike ºóÎó²îʹÓù¤¾ß°ü¡£¡£¡£¡£¡£¡£Fortinet µÄÑо¿Ö°Ô±ÔÚ±¾ÖܵÄһƪ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬£¬£¬£¬¸Ã»î¶¯µÄÖØµãËÆºõÊÇÍêȫԶ³Ì¿ØÖÆÄ¿µÄϵͳ£¬£¬£¬£¬£¬ÒÔ±ãδÀ´°²ÅÅÓÐÓÃÔØºÉ²¢¿ÉÄÜÓÃÓÚÆäËû¶ñÒâÄ¿µÄ¡£¡£¡£¡£¡£¡£Çå¾²¹©Ó¦É̳ƣ¬£¬£¬£¬£¬ÍþвÕßʹÓôøÓÐǶÈëʽ Visual Basic Ó¦ÓóÌÐò (VBA) ºêµÄÎÚ¿ËÀ¼Ö÷Ìâ Excel Îļþ×÷Ϊ³õʼÓÕ¶ü¡£¡£¡£¡£¡£¡£ÈôÊDz»ÉóÉ÷µÄÓû§ÆôÓøú꣬£¬£¬£¬£¬Ëü»áÔÚÊܺ¦ÕßϵͳÉϰ²ÅŶ¯Ì¬Á´½Ó¿â (DLL) ÏÂÔØ³ÌÐò£¨Í¨¹ý ConfuserEX ¿ªÔ´¹¤¾ß¾ÙÐлìÏý£©¡£¡£¡£¡£¡£¡£DLL ÏÂÔØ³ÌÐòÊ×ÏÈÒª×öµÄÒ»¼þʾÍÊDzéÕÒÊÜѬȾϵͳÉÏÊÇ·ñ±£´æ·À²¡¶¾ºÍÆäËû¶ñÒâÈí¼þ¼ì²â¹¤¾ß¡£¡£¡£¡£¡£¡£ÈôÊÇÏÂÔØ³ÌÐò¼ì²âµ½±£´æ£¬£¬£¬£¬£¬Ëü»áÁ¬Ã¦ÖÕÖ¹½øÒ»²½µÄ»î¶¯¡£¡£¡£¡£¡£¡£²»È»£¬£¬£¬£¬£¬Ëü»áʹÓà Web ÇëÇó´ÓÔ¶³ÌλÖÃÌáÈ¡ÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£DLL ÏÂÔØ³ÌÐòµÄÉè¼ÆÊ¹ÆäÖ»ÄÜÔÚλÓÚÎÚ¿ËÀ¼µÄ×°±¸ÉÏÏÂÔØµÚ¶þ½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬ÏÂÔØ³ÌÐò»áÖ´ÐÐһϵÁа취£¬£¬£¬£¬£¬µ¼Ö Cobalt Strike °²Åŵ½Êܺ¦Õß×°±¸ÉÏ¡£¡£¡£¡£¡£¡£
https://news.hitb.org/content/ukrainian-systems-hit-cobalt-strike-malicious-excel-file
3. SYNNOVIS ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìÂ׶صĶà¼ÒÒ½Ôº
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬Synnovis ÊǸÇÒÁºÍÊ¥ÍÐÂí˹ NHS »ù½ð»áÐÅÍС¢Â׶عúÍõѧԺҽԺ NHS ÐÅÍÐÒÔ¼°Å·ÖÞ×î´óµÄÒ½ÁƼì²âºÍÕï¶ÏÌṩÉÌ SYNLAB Ö®¼äµÄ²¡ÀíѧÏàÖúͬ°é¹ØÏµ¡£¡£¡£¡£¡£¡£Synnovis ÔÚÆäÍøÕ¾ÉÏÐû²¼µÄһƪÎÄÕÂÖÐÅû¶£¬£¬£¬£¬£¬ÆäÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£Õâ¼Ò²¡ÀíѧºÍÕï¶ÏЧÀÍÌṩÉÌÔÚ NHS ר¼ÒµÄ×ÊÖú϶ÔÇå¾²Îó²îÕö¿ªÁËÊӲ졣¡£¡£¡£¡£¡£×¨¼ÒÃÇÕýÔÚÆð¾¢ÖÜÈ«ÆÀ¹À¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬²¢½ÓÄÉÊʵ±²½·¥×èÖ¹ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾»¹Ðû²¼£¬£¬£¬£¬£¬ËûÃÇÕýÔÚÓë NHS Trust ÏàÖúͬ°éÇ×½üÏàÖú£¬£¬£¬£¬£¬ÒÔÖ»¹ÜïÔ̶Ի¼ÕßºÍÆäËûЧÀÍÓû§µÄÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçѬȾÆäϵͳµÄ¶ñÒâÈí¼þ¼Ò×åÒÔ¼°ÊÇ·ñÔâÊÜÊý¾Ýй¶¡£¡£¡£¡£¡£¡£4Ô£¬£¬£¬£¬£¬SYNLAB¼¯ÍÅÒâ´óÀû·Ö¹«Ë¾Synlab ItaliaÒòÔâÊÜBlackbastaÍøÂç¹¥»÷¶øÏÝÈëÍ£Áô¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÝÍ£ÁËÒâ´óÀû²ÉÑùµã¡¢Ò½ÁÆÖÐÐĺÍʵÑéÊÒµÄËùÓл¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/164142/cyber-crime/ransomware-attack-synnovis-london-hospitals.html
4. BianLian й¶Êý¾Ýºó£¬£¬£¬£¬£¬°Ä´óÀûÑÇ¿óÒµ¹«Ë¾Åû¶Υ¹æÐÐΪ
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬±±·½¿óÒµ¹«Ë¾ÔçЩʱ¼äÐû²¼Í¨¸æÖÒÑԳƣ¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔâÓöÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬µ¼Ö²¿·Ö±»µÁÊý¾Ý±»Ðû²¼ÔÚ°µÍøÉÏ¡£¡£¡£¡£¡£¡£Northern Minerals ÊÇÒ»¼Ò°Ä´óÀûÑǹ«Ë¾£¬£¬£¬£¬£¬×¨×¢ÓÚ¿±Ì½ºÍ¿ª·¢ÖØÏ¡ÍÁÔªËØ (HRE)£¬£¬£¬£¬£¬ÌØÊâÊÇïáºÍï«£¬£¬£¬£¬£¬ÓÃÓÚµç×Ó¡¢µç³ØºÍ·É»ú¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾¶Ô°Ä´óÀûÑÇÕþ¸®À´Ëµ¾ßÓÐÖÁ¹ØÖ÷ÒªµÄÕ½ÂÔÒâÒ壬£¬£¬£¬£¬×î½ü°Ä´óÀûÑÇÕþ¸®ºôÓõÖйú¹É¶«³öÊÛÆäÔÚ¸ÃÏ¡ÍÁ¿ó¹«Ë¾µÄ¹É·Ý¾Í֤ʵÎúÕâÒ»µã¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ°Ä´óÀûÑÇ֤ȯÉúÒâËù (ASX) ¹ûÕæÉúÒ⣬£¬£¬£¬£¬¹ÉƱ´úÂëΪ¡°NTU¡±£¬£¬£¬£¬£¬Òò´ËÓÐÖ´·¨ÒåÎñʵʱÅû¶ÈκÎÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾½ñÌìÅû¶£¬£¬£¬£¬£¬ÆäϵͳÖеÄÊý¾ÝÓÚ 2024 Äê 3 ÔÂÏÂÑ®±»ÇÔÈ¡£¬£¬£¬£¬£¬ËæºóÐû²¼ÔÚ°µÍøÉÏ£¬£¬£¬£¬£¬µ«Ã»ÓÐÍ¸Â¶ÕØÊÂÕßµÄÃû×Ö¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬Òѽ«´Ëʼû¸æ°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐĺͰĴóÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¬£¬£¬£¬£¬Í¬Ê±»¹½«Í¨¹ý¸öÐÔ»¯Í¨Öª¼û¸æÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/australian-mining-company-discloses-breach-after-bianlian-leaks-data/
5. ÐÂÐÍ V3B ÍøÂç´¹ÂÚ¹¤¾ß°üÃé×¼ 54 ¼ÒÅ·ÖÞÒøÐеĿͻ§
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ Telegram ÉÏÍÆ¹ãÒ»ÖÖÃûΪ¡°V3B¡±µÄÐÂÐÍÍøÂç´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬ÏÖÔڸù¤¾ß°üµÄÄ¿µÄÊǰ®¶ûÀ¼¡¢ºÉÀ¼¡¢·ÒÀ¼¡¢°ÂµØÀû¡¢µÂ¹ú¡¢·¨¹ú¡¢±ÈÀûʱ¡¢Ï£À°¡¢Â¬É±¤ºÍÒâ´óÀûµÄ 54 ¼ÒÖ÷Òª½ðÈÚ»ú¹¹µÄ¿Í»§¡£¡£¡£¡£¡£¡£¸ÃÍøÂç´¹ÂÚ¹¤¾ß°üµÄ¼ÛÇ®ÔÚÿÔ 130 ÖÁ 450 ÃÀÔªÖ®¼ä£¬£¬£¬£¬£¬Ïêϸȡ¾öÓÚ¹ºÖõÄÄÚÈÝ£¬£¬£¬£¬£¬¾ßÓи߼¶»ìÏý¡¢ÍâµØ»¯Ñ¡Ïî¡¢OTP/TAN/2FA Ö§³Ö¡¢ÓëÊܺ¦ÕßµÄʵʱ̸ÌìÒÔ¼°ÖÖÖÖÌӱܻúÖÆ¡£¡£¡£¡£¡£¡£¾Ý·¢Ã÷ V3B µÄ Resecurity Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬Æä Telegram ƵµÀÒѾӵÓÐÁè¼Ý 1,250 Ãû³ÉÔ±£¬£¬£¬£¬£¬ÕâÅúעеÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ (PhaaS) ƽ̨ÕýÔÚÍøÂç·¸·¨ÁìÓòѸËÙ»ñµÃ¹Ø×¢¡£¡£¡£¡£¡£¡£V3B ÔÚ×Ô½ç˵ CMS ÉÏʹÓø߶ȻìÏýµÄ JavaScript ´úÂëÀ´Ìӱܷ´ÍøÂç´¹ÂÚºÍËÑË÷ÒýÇæ»úеÈ˵ļì²â²¢±ÜÃâÑо¿Ö°Ô±µÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ëü°üÀ¨·ÒÀ¼Óï¡¢·¨Óï¡¢Òâ´óÀûÓï¡¢²¨À¼ÓïºÍµÂÓïµÈ¶àÖÖÓïÑÔµÄרҵ·ÒëÒ³Ãæ£¬£¬£¬£¬£¬ÒÔÔöÇ¿ÍøÂç´¹ÂÚ¹¥»÷µÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄܹ»¿ªÕ¹¶à¹ú»î¶¯¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-v3b-phishing-kit-targets-customers-of-54-european-banks/
6. ºÚ¿ÍÍÅ»ïͨ¹ý DM ¹¥»÷¸ß×ÅÃû¶ÈµÄ TikTok Óû§
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬TikTok ÌåÏÖ£¬£¬£¬£¬£¬ÏÖÔÚÕýÔÚ½ÓÄɲ½·¥Ìá·ÀÍøÂç¹¥»÷£¬£¬£¬£¬£¬¸Ã¹¥»÷ͨ¹ýÖ±½ÓÐÂÎÅÕë¶ÔһЩ×ÅÃûÓû§£¬£¬£¬£¬£¬ÊÔÍ¼Ð®ÖÆËûÃǵÄÕË»§¡£¡£¡£¡£¡£¡£TikTok Òþ˽ºÍÇå¾²ÍŶӽ²»°ÈË Jason Grosse ÌåÏÖ£º¡°ÎÒÃÇÒѽÓÄɲ½·¥×èÖ¹´Ë´Î¹¥»÷£¬£¬£¬£¬£¬²¢±ÜÃâδÀ´Ôٴα¬·¢¡£¡£¡£¡£¡£¡£ÎÒÃÇÕýÔÚÓëÊÜÓ°ÏìµÄÕË»§ËùÓÐÕßÖ±½ÓÏàÖú£¬£¬£¬£¬£¬ÒÔÔÚÐëҪʱ»Ö¸´»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡±Grosse ÌåÏÖ£¬£¬£¬£¬£¬TikTok ÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷£¬£¬£¬£¬£¬ÏÖÔÚÎÞ·¨¾ÍÆä¹æÄ£»£»£»£»£»òÅÓºéˮƽ½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬³Æ¸ÃÍþв½ö½öÊÇ¡°Ç±ÔÚµÄÎó²î¡±¡£¡£¡£¡£¡£¡£TikTok ÈϿɴËÊÂ֮ǰ£¬£¬£¬£¬£¬ÖܶþÓб¨µÀ³Æ£¬£¬£¬£¬£¬CNN µÄÕ˺ÅÉÏÖÜÔø±»ÔÝʱÈëÇÖ¡£¡£¡£¡£¡£¡£Semafor Ô®Òý¸ÃÐÂÎÅ»ú¹¹Ò»Î»ÄäÃûÐÂÎÅÈËÊ¿µÄ»°³Æ£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖ¡°Ëƺõ²»ÊÇÓÐÈË´Ó CNN ÄÇÀï»ñµÃ»á¼ûȨÏÞµÄЧ¹û¡±¡£¡£¡£¡£¡£¡£CNN ûÓÐÁ¬Ã¦»ØÓ¦¡¶Á¬Ïß¡·ÔÓÖ¾µÄÖÃÆÀÇëÇ󡣡£¡£¡£¡£¡£¼øÓÚ½ñÄêÇïÌì¼´½«¾ÙÐеÄ×Üͳ´óÑ¡£¬£¬£¬£¬£¬ÈËÃǶÔÃÀ¹úÐÂÎÅ»ú¹¹Ôâµ½ºÚ¿Í¹¥»÷µÄµ£ÐÄÓÈÆä¸ßÕÇ¡£¡£¡£¡£¡£¡£
https://news.hitb.org/content/tiktok-hack-targets-high-profile-users-dms