Ó¢¹úij¹«Ë¾µÄITÄþ¾²·ÖÎöʦð³äºÚ¿ÍÍÅ»ïÀÕË÷¹ÍÖ÷±»²¶
Ðû²¼Ê±¼ä 2023-05-251¡¢Ó¢¹úij¹«Ë¾µÄITÄþ¾²·ÖÎöʦð³äºÚ¿ÍÍÅ»ïÀÕË÷¹ÍÖ÷±»²¶
¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬28ËêµÄÓ¢¹úÄÐ×ÓAshley LilesÒòδ¾ÊÚȨ·ÃÎʼÆËã»ú²¢ÀÕË÷Æä¹ÍÖ÷±»ÖÎ×ï¡£2018Äê2Ô£¬¸ÃÄÐ×ÓÔÚÒ»¼ÒÔâµ½ÁËÀÕË÷¹¥»÷µÄÅ£½ò¹«Ë¾µ£ÈÎITÄþ¾²·ÖÎöʦ¡£ÓëÆäËü¹¥»÷Ò»Ñù£¬ºÚ¿ÍÁªÏµÁ˹«Ë¾µÄ¸ß¹Ü£¬ÒªÇó½»Êê½ð¡£LilesÔÚ¾¯²ì¡¢Í¬Êº͹ÍÖ÷²»ÖªµÀµÄÇé¿öÏ£¬¶Ô¹«Ë¾½øÐÐÁ˵¥¶ÀµÄ¶þ´Î¹¥»÷¡£Ëû·ÃÎÊÁËÒ»Ãû¶Ê»á³ÉÔ±µÄ˽ÈËÓʼþÁè¼Ý300´Î£¬¸ü¸ÄÁËÔʼÀÕË÷Óʼþ£¬±¾ÒâÊǽ«Êê½ð×ªÒÆµ½×Ô¼ºµÄ¼ÓÃÜ»õ±ÒÇ®°ü¡£È»¶ø£¬¹«Ë¾²¢Î´½»Êê½ð£¬ÆäʱÈÔÔÚ½øÐеÄÄÚ²¿ÊӲ죬·¢ÏÖLilesδ¾ÊÚȨ·ÃÎÊ˽ÈËÓʼþ£¬²¢Ö¸ÏòËû¼ÒµÄIPµØÖ·¡£¸ÃÔ±¹¤½«ÓÚ2023Äê7ÔÂ11ÈÕ·µ»Ø·¨Í¥ÌýÈ¡Åоö¡£
https://www.bleepingcomputer.com/news/security/it-employee-impersonates-ransomware-gang-to-extort-employer/
2¡¢Ó¡¶È±£ÏÕÐÅÏ¢¾Ö½ü30¸öϵͳ±»¼ÓÃܲ¢±»ÀÕË÷25ÍòÃÀÔª
ýÌå5ÔÂ23Èճƣ¬Ó¡¶È±£ÏÕÐÅÏ¢¾Ö(IIB) Ôâµ½ÁËÀÕË÷¹¥»÷£¬½ü30¸ö·þÎñÆ÷ϵͳ±»¼ÓÃÜ£¬µ¼Ö¸ûú¹¹µÄÊý¾ÝÎÞ·¨·ÃÎÊ¡£¹¥»÷·¢ÉúÓÚ4ÔÂ2ÈÕ£¬IIBÔÚ×î³õÑ¡Ôñ¶Ô¹¥»÷½øÐб£ÃÜ¡£È»¶ø£¬Ëæ×ÅÇé¿öÔ½À´Ô½ÑÏÖØ£¬ËûÃÇ×îÖÕ³ÂË߸øÁËCyberabad¾¯·½¡£¾ÝϤ£¬ºÚ¿ÍÒªÇó½»250000ÃÀÔªµÄ±ÈÌØ±ÒÀ´½âËøÊý¾Ý¡£IIB¾ö¶¨²»Ìý´ÓºÚ¿ÍµÄÒªÇó£¬Ïà·´£¬ËûÃÇÒÀ¿¿Ãô¸ÐÊý¾ÝµÄ±¸·ÝÀ´Î¬³ÖÈÕ³£ÔËÓª¡£Ä¿Ç°£¬¶Ô´Ë´Î¹¥»÷µÄÊÓ²ìÈÔÔÚ½øÐÐÖС£
https://www.the420.in/indian-insurance-information-bureau-hit-by-ransomware-attack-russian-hackers-demand-250000-as-ransom/
3¡¢ESETÔÚGoogle Play¼ì²âµ½±»AhRatľÂí»¯µÄiRecorder
5ÔÂ23ÈÕ£¬ESET³ÆÆäÔÚGoogle PlayÉ̵êÖмì²âµ½Ò»ÖÖеÄRAT£¬ËüÒþ²ØÔÚÒ»¿îAndroidÆÁÄ»Â¼ÖÆÓ¦Óá°iRecorder - Screen Recorder¡±ÖС£¸ÃÓ¦ÓÃÓÚ2021Äê9ÔÂÊ×´ÎÉÏ´«µ½É̵꣬µ«¿ÉÄÜÔÚ½«½üÒ»ÄêºóµÄ2022Äê8ÔÂÐû²¼µÄ¸üÐÂÖб»Ä¾Âí»¯¡£ÔÚ±»É¾³ý֮ǰ£¬Æä°²×°Á¿ÒÑÁè¼Ý50000´Î¡£ÕâÊÇÒ»¸öеĻùÓÚAhMythµÄAndroid RAT£¬±»ÃüÃûΪAhRat£¬¿É¸ú×ÙλÖá¢ÇÔȡͨ»°¼Ç¼¡¢ÇÔÈ¡ÁªÏµÈ˺ͶÌÐÅ¡¢·¢ËͶÌÐÅ¡¢ÅÄÕÕºÍÂ¼ÖÆÅä¾°ÒôƵ¡£
https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/
4¡¢KasperskyÅû¶GoldenJackalÕë¶ÔÕþ¸®ºÍÍâ½»»ú¹¹µÄ¹¥»÷
KasperskyÔÚ5ÔÂ23ÈÕÅû¶ÁËGoldenJackal×Ô2019ÄêÒÔÀ´Ò»Ö±Õë¶ÔÖж«ºÍÄÏÑǵÄÕþ¸®ºÍÍâ½»»ú¹¹µÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÀûÓÃÁËÒ»×é×Ô½ç˵µÄ.NET¶ñÒâÈí¼þ¹¤¾ß£¬ÕâЩ¹¤¾ßÌṩÁËÖÖÖÖ¹¦Ð§¡£Ê×ÏÈѬȾϵͳµÄÖ÷ÒªpayloadÊÇJackalControl£¬¿ÉÔ¶³Ì¿ØÖÆÄ¿±ê¼ÆËã»ú¡£µÚ¶þ¸ö¹¤¾ßÊÇJackalSteal£¬¿É´ÓÄ¿±êµÄËùÓÐÂß¼Çý¶¯Æ÷ÖÐÇÔÈ¡Êý¾Ý¡£µÚÈý¸öJackalWorm£¬Ëü»áѬȾUSBÇý¶¯Æ÷²¢ÔÚÆäËü¼ÆËã»úÉÏÁ÷´«¡£µÚËĸöÊÇJacklPerInfo£¬Ò»¸ö»ù±¾µÄϵͳÐÅÏ¢ÊÕ¼¯·¨Ê½¡£×îºóÒ»¸öÊÇJackalScreenWatcher£¬ÓÃÓÚÔÚÄ¿±êÉ豸ÉϽØÈ¡ÆÁÄ»½ØÍ¼¡£
https://securelist.com/goldenjackal-apt-group/109677/
5¡¢Apria Healthcare¹ûȻӰÏìÔ¼20Íò»¼ÕßµÄÊý¾Ýй¶Ê¼þ
¾Ý5ÔÂ24ÈÕ±¨µÀ£¬Apria Healthcare¹ûÈ»ÁË2019ÄêºÍ2021ÄêµÄÊý¾Ýй¶Ê¼þ£¬Ó°ÏìÁËÔ¼180ÍòÓû§¡£Î¥¹æÐÐΪ¿çÔ½Á½¸öʱÆÚ£¬2019Äê4ÔÂ5ÈÕÖÁ5ÔÂ7ÈÕ£¬ÒÔ¼°2021Äê8ÔÂ27ÈÕÖÁ10ÔÂ10ÈÕ£¬Éæ¼°Õʺš¢ÒøÐп¨ºÅ¡¢ÕÊ»§Äþ¾²´úÂë¡¢·ÃÎÊ´úÂë¡¢ÃÜÂëºÍPINµÈÐÅÏ¢¡£ApriaÌåÏÖ£¬¹¥»÷µÄÄ¿µÄÊÇÒÔÆÛÕ©ÊֶδÓApria»ñÈ¡×ʽ𣬶ø²»ÊÇ·ÃÎÊÆä»¼Õß»òÔ±¹¤µÄ¸öÈËÐÅÏ¢¡£¸Ã¹«Ë¾³Æ£¬Ã»ÓÐÖ¤¾Ý±íÃ÷×ʽðÒѱ»×ªÒÆ£¬Ò²Ã»ÓÐÓë´ËʼþÏà¹ØµÄ¸öÈËÐÅÏ¢±»ÀÄÓá£
https://www.hackread.com/apria-healthcare-major-data-breach/
6¡¢SentinelLabsÐû²¼¹ØÓÚKimsuky¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
5ÔÂ23ÈÕ£¬SentinelLabsÐû²¼Á˹ØÓÚ³¯ÏÊAPT×éÖ¯KimsukyÕýÔÚ½øÐеÄÒ»Ïî»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã»î¶¯µÄÖØµãÊÇʹÓöñÒâÈí¼þRandomQueryµÄ±äÌå½øÐÐÎļþÕì²ìºÍÐÅϢй¶£¬´Ó¶øÊµÏÖºóÐøµÄ¾«×¼¹¥»÷¡£KimsukyÀûÓÃÁËMicrosoft±àÒëµÄHTML×ÊÖú(CHM)Îļþ·Ö·¢RandomQuery£¬ÕâÊÇËûÃÇ·Ö·¢¶ñÒâÈí¼þ¼¯µÄºã¾ÃÕ½Êõ¡£´ËÍ⣬Kimsuky»¹½ÓÄÉÁËÐµĶ¥¼¶ÓòÃûºÍÓòÃû×÷Ϊ¶ñÒâ»ù´¡ÉèÊ©£¬Ä£·Â³ß¶ÈµÄ.com¶¥¼¶ÓòÃûÀ´ÆÛÆÄ¿±ê¡£
https://www.sentinelone.com/labs/kimsuky-ongoing-campaign-using-tailored-reconnaissance-toolkit/