°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

Ðû²¼Ê±¼ä 2022-10-09
1¡¢°ÍÎ÷ÀûÑÇÒøÐÐÔâµ½ÍøÂç¹¥»÷²¢±»ºÚ¿ÍÀÕË÷50 BTC

      

¾ÝýÌå10ÔÂ7ÈÕ±¨µÀ £¬ÓɰÍÎ÷Õþ¸®¿ØÖƵİÍÎ÷ÀûÑÇÒøÐÐÔâµ½Á˹¥»÷ £¬²¢±»ÀÕË÷50 BTC ¡£µ±µØÐÂÎÅýÌåTecmundoÉù³Æ £¬ÃûΪCrydatµÄºÚ¿ÍÁªÏµÁËËûÃÇ £¬²¢ÒªÇóËûÃÇÔÚ10ÔÂ6ÈÕ15:00֮ǰ֧¸¶520Íò°ÍÎ÷À×ÑǶû ¡£Õë¶ÔºÚ¿ÍÕâÒ»ÒªÇó £¬°ÍÎ÷ÀûÑÇÒøÐÐÒ»Ö±±£³Ö³ÁĬ ¡£¾ÝϤ £¬¹¥»÷ÕßÀûÓÃÁËÀÕË÷Èí¼þLockBit £¬ÓÚ10ÔÂ3ÈÕѬȾ¸ÃÒøÐÐ £¬µ±µØÂôÁ¦¹¥»÷ÍøÂç·¸×ï»î¶¯µÄÖ´·¨²¿ÃÅÕýÔÚÊÓ²ì´Ëʼþ ¡£


https://www.databreaches.net/bank-of-brasilia-attacked-by-ransomware-demanding-50-btc/


2¡¢Ð¾Æ¬ÖÆÔìÉÌADATA·ñÈÏÆäÔâµ½RansomHouse¹¥»÷µÄ˵·¨

      

¾Ý10ÔÂ8ÈÕ±¨µÀ £¬¹¥»÷ÕßÔÚÆäÍøÕ¾ÉϹûÈ»±»µÁÊý¾Ýºó £¬Öйų́ÍåÐ¾Æ¬ÖÆÔìÉÌADATA·ñÈÏÆäÔâµ½¹¥»÷µÄ˵·¨ ¡£RansomHouseÔÚ±¾Öܶþ½«ADATAÌí¼Óµ½ËûÃǵÄÍøÕ¾ £¬²¢Éù³ÆÔÚ2022ÄêµÄ¹¥»÷ÖÐÒÑÀÖ³ÉÇÔÈ¡1TBµÄÎļþ £¬»¹¹ûÈ»Á˱»µÁÎļþµÄÑù±¾ ¡£ADATAÐû²¼ÉùÃ÷³ÆËü×î½üûÓÐÔâµ½¹¥»÷ £¬RansomHouseÒ²²¢Î´ÔÚ·þÎñÆ÷ÖÐÁôÏÂÊê½ð¼Ç¼À´Ö¤Ã÷¹¥»÷»î¶¯ ¡£Ð¹Â¶µÄÎļþÀ´×Ô2021Äê5ÔµÄRagnarLockerÀÕË÷¹¥»÷ £¬ÆäʱÓÐ1.5 TBµÄÊý¾Ý±»µÁ ¡£È»¶ø £¬RansomHouse¼á³ÆËûÃǹ¥»÷ÁËADATA £¬²¢ÌåÏÖÒѾͱ»µÁÊý¾Ý½øÐÐÁË̸ÅÐ ¡£


https://www.bleepingcomputer.com/news/security/adata-denies-ransomhouse-cyberattack-says-leaked-data-from-2021-breach/


3¡¢LofyGangÒÑ·Ö·¢Ô¼200¸öÇÔÈ¡ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâNPM°ü

      

CheckmarxÔÚ10ÔÂ7ÈÕ³ÆÆä·¢ÏÖÁËÔ¼200¸ö¶ñÒâNPM°ü £¬ÓëÃûΪLofyGangµÄ¹¥»÷ÍÅ»ïÓйØ ¡£¸ÃÍÅ»ïÒÑÔËÓªÁËÒ»Äê¶à £¬Ä¿±êÊÇÇÔÈ¡ÐÅÓÿ¨Êý¾Ý £¬ÒÔ¼°ÓëDiscord Nitro¡¢ÓÎÏ·ºÍÁ÷ýÌå·þÎñÏà¹ØµÄÕÊ»§ ¡£¸ÃÍÅ»ï¿ÉÄÜÓë°ÍÎ÷ÓÐ¹Ø £¬Ëü´´½¨ÁËÒ»¸öDiscord»úÆ÷ÈË¡°Lofy Boost¡± £¬ÓÃÓÚ²¿Êð±»µÁÐÅÓÿ¨ ¡£¸ÃÍŻﻹÒÔ±ðÃûDyPolarLofyÔÚºÚ¿ÍÉçÇøÐ¹Â¶ÁËÊýǧ¸öDisney+ºÍMinecraftÕÊ»§ £¬²¢ÔÚËûÃǵÄGitHubÒ³ÃæÏÂÍÆ¹ãºÚ¿Í¹¤¾ßºÍ»úÆ÷È˵È ¡£Ä¿Ç° £¬Ðí¶à¶ñÒâÈí¼þ°üÒѱ»É¾³ý £¬µ«»¹Óв¿ÃÅÈԿɹ©ÏÂÔØ ¡£


https://checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/


4¡¢ÐÂAndroid¶ñÒâÈí¼þRatMiladÖ÷ÒªÕë¶ÔÖж«µÄ×éÖ¯

      

10ÔÂ5ÈÕ £¬ZimperiumÅû¶ÁËÃûΪRatMiladµÄAndroid¶ñÒâÈí¼þ ¡£RatMiladµÄԭʼ±äÌåÒþ²ØÔÚVPNºÍÃûΪText MeµÄµç»°ºÅÂëÆÛÆ­Ó¦ÓÃÖ®ºó £¬ÕâÊÇÉ罻ýÌåÓû§ÔÚ·ÃÎÊÊÜÏ޵Ĺú¼ÒºÍµØÓòʹÓõij£Óù¤¾ß ¡£¸Ã¶ñÒâÓ¦ÓÃͨ¹ýÉ罻ýÌåºÍTelegramµÈͨÐŹ¤¾ßÉϵÄÁ´½Ó·Ö·¢ £¬ÓÕʹÓû§²à¼ÓÔØÓ¦Óò¢ÊÚÓè¹ã·ºµÄȨÏÞ ¡£ZimperiumÍÆ²â £¬ÂôÁ¦RatMiladµÄÔËÓªÍŶӴÓÒÁÀʺڿÍÍÅ»ïAppMiladÄÇÀï»ñµÃÁËÔ´´úÂë £¬²¢½«Æä¼¯³Éµ½ÁËÒ»¸öÆÛÕ©ÐÔÓ¦Ó÷¨Ê½ÖÐ ¡£


https://blog.zimperium.com/we-smell-a-ratmilad-mobile-spyware/


5¡¢Rapid7Åû¶ÀûÓÃZCSÖÐRCE©¶´µÄ¹¥»÷»î¶¯µÄ¼¼Êõϸ½Ú

      

Rapid7ÔÚ10ÔÂ6ÈÕ͸¶¹¥»÷ÕßÕýÔÚ»ý¼«ÀûÓÃZimbra Collaboration Suite (ZCS)ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´ ¡£¸Ã©¶´×·×ÙΪCVE-2022-41352 £¬CVSSÆÀ·Ö9.8 £¬¿É±»ÓÃÀ´Í¨¹ýAmavis£¨µç×ÓÓʼþÄþ¾²ÏµÍ³£©ÉÏ´«ÈÎÒâÎļþ £¬ÀÖ³ÉÀûÓøÃ©¶´¿ÉÁýÕÖZimbra webroot¡¢Ö²Èëshellcode²¢·ÃÎÊÆäËûÓû§µÄÕÊ»§ ¡£¸Ã©¶´×Ô9ÔÂÒÔÀ´Ò»Ö±±»ÀûÓà £¬Rapid7¹ûÈ»Á˹ØÓڸé¶´µÄ¼¼ÊõÎĵµ £¬°üÂÞPoCºÍIoC ¡£Ñо¿¾ÍÈËÔ±½¨ÒéÓû§°²×°paxÓ¦Óà £¬È»ºóÖØÐÂÆô¶¯ Zimbra £¬Í¬Ê±¼à¿ØÀ´×ÔZimbraµÄÈí¼þ¸üР¡£


https://www.rapid7.com/blog/post/2022/10/06/exploitation-of-unpatched-zero-day-remote-code-execution-vulnerability-in-zimbra-collaboration-suite-cve-2022-41352/


6¡¢KasperskyÐû²¼2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ

      

10ÔÂ6ÈÕ £¬KasperskyÐû²¼ÁË2020-2022ÄêATM/PoS¶ñÒâÈí¼þÌ¬ÊÆ¸ÅÀÀ ¡£³ÂËßÖ¸³ö £¬2022Äêǰ8¸öÔ £¬±»ATM/PoS¶ñÒâÈí¼þÓ°ÏìµÄÉ豸ÊýÁ¿Óë2020ÄêͬÆÚÏà±ÈÔö³¤ÁË19% £¬Óë2021ÄêÏà±ÈÔö³¤Á˽ü4% ¡£ÊÜ´ËÀà¶ñÒâÈí¼þÓ°Ïì×î¶àµÄ¹ú¼Ò°üÂÞ¶íÂÞ˹¡¢ÒÁÀÊ¡¢°ÍÎ÷¡¢Ô½ÄϺÍÓ¡¶ÈµÈ ¡£2022Äê×î»îÔ¾µÄ¶ñÒâÈí¼þ¼Ò×åΪHydraPoSºÍAbaddonPoS £¬Õ¼±È·Ö±ðΪ36%ºÍ35% £¬Æä´ÎÊÇPloutus£¨3%£©¡¢Prilex£¨2%£©ºÍRawPoS£¨2%£© ¡£KasperskyÍÆ²â £¬Ô¤¼ÆÍøÂç·¸×ï»î¶¯½«½øÒ»²½Ôö¼Ó ¡£


https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/