Äþ¾²¹«Ë¾LogicMonitor͸¶Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2023-09-05

1¡¢Äþ¾²¹«Ë¾LogicMonitor͸¶Æä²¿Ãſͻ§Ôâµ½ÍøÂç¹¥»÷


¾ÝýÌå8ÔÂ31ÈÕ±¨µÀ£¬ÍøÂçÄþ¾²¹«Ë¾LogicMonitor͸¶£¬ÆäSaaSƽ̨µÄ²¿ÃÅÓû§Ôâµ½¹¥»÷ ¡£LogicMonitorÔÚ¸üÐÂÖÐ³ÆÆä·¢ÏÖus-west-2¡¢us-east-1ºÍeu-west-1µÄ²¿Ãſͻ§µÄÃÅ»§·ÃÎÊȨÏÞ¶ªÊ§£¬Ä¿Ç°¸ÃÎÊÌâÒѵõ½½â¾ö ¡£¹«Ë¾Ã»ÓÐ˵Ã÷ÊÇÀÕË÷¹¥»÷£¬µ«¾ÝÏûÏ¢ÈËÊ¿³Æ£¬¹¥»÷ÕßÈëÇÖÁ˿ͻ§ÕÊ»§£¬Äܹ»´´½¨µ±µØÕÊ»§²¢°²×°ÀÕË÷Èí¼þ ¡£ÀÕË÷Èí¼þÊÇʹÓÃ¸ÃÆ½Ì¨µÄµ±µØLogicMonitor Collector´«¸ÐÆ÷²¿ÊðµÄ£¬´Ë´«¸ÐÆ÷¼à¿ØÓû§»ù´¡ÉèÊ©£¬µ«Ò²¾ßÓнű¾¹¦Ð§ ¡£¾ÝϤ£¬ÊÜÓ°Ïì¿Í»§Ê¹ÓÃÁËLogicMonitor·ÖÅ䏸ÐÂÓû§µÄĬÈÏÈõÃÜÂ룬Òò¶øÔâµ½Á˹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/


2¡¢±£ÏÕ¹«Ë¾Trygg-Hansaй¶65Íò¿Í»§Êý¾Ý±»· £¿î300ÍòÃÀÔª


9ÔÂ4ÈÕýÌ峯£¬±£ÏÕ¹«Ë¾Trygg-HansaÒòй¶65Íò¿Í»§µÄÊý¾Ý£¬±»ÈðµäÒþ˽±£»¤¾Ö(IMY)· £¿î300ÍòÃÀÔª ¡£Moderna F?rs?kringar£¨ÏÖΪTrygg-HansaµÄÒ»²¿ÃÅ£©µÄ¿Í»§·¢ÏÖ¿Éͨ¹ý·¢Ë͸ø¿Í»§µÄ±¨¼ÛÒ³ÃæÉϵÄÁ´½Ó½øÈë±£ÏÕ¹«Ë¾µÄºǫ́£¬²¢ÏòIMY¾Ù±¨ÁË´ËÊ ¡£IMYÊÓ²ìÈ·ÈÏ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿É·ÃÎʺó¶ËÊý¾Ý¿â£¬¶øÇÒ¿ÉÒÔͨ¹ýÐÞ¸ÄURLÖеÄÁ¬Ðø¿Í»§¶ËIDÀ´ä¯ÀÀÆäËû¸öÈ˵ÄÎĵµ ¡£¸ÃʼþÓ°ÏìÔ¼ÁË650000Ãû¿Í»§£¬Ð¹Â¶Ê±¼ä³¤´ïÁ½Äê¶à£¬´Ó2018Äê10ÔÂÖÁ2021Äê2Ô ¡£IMYÌåÏÖ£¬ÔÚÊÕµ½ÓйØÂ©¶´µÄ³ÂËߺó¸Ã¹«Ë¾Ê¼ÖÕδÄܽâ¾öÎÊÌ⣬¾ö¶¨¶Ô´Ë´¦ÒÔ300ÍòÃÀÔªÐÐÕþ´¦·£ ¡£


https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/


3¡¢Interlab·¢ÏÖÀûÓÃľÂíSuperBearÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯


InterlabÔÚ9ÔÂ1ÈÕ³ÆÆä·¢ÏÖÁËÕë¶Ôº«¹úÃñ¼äÍÅÌåµÄµöÓã¹¥»÷£¬ÀûÓÃÁËÐÂÐÍRAT SuperBear ¡£¾ÝϤ£¬Ò»ÃûÐÂÎÅÊÂÇéÕßÊÕµ½ÓÐÕë¶ÔÐԵĵöÓãÓʼþ£¬ÆäÖаüÂÞ¶ñÒâLNKÎļþ ¡£LNKÎļþ»áÆô¶¯PowerShellÃüÁîÀ´Ö´ÐÐVB½Å±¾£¬¸Ã½Å±¾ÓÖ»á´ÓWordPressÍøÕ¾»ñÈ¡ÏÂÒ»½×¶Îpayload£¬°üÂÞÒ»¸öAutoit3.exe¶þ½øÖÆÎļþºÍÒ»¸öAutoIt½Å±¾ ¡£AutoIt½Å±¾Ê¹Óýø³Ì¿Õ¶´¼¼ÊõÖ´Ðнø³Ì×¢È룬ÔÚÕâÖÖÇé¿öÏ£¬»áÉú³ÉÒ»¸öExplorer.exeʵÀýÀ´×¢ÈëSuperBear ¡£¸ÃRAT¿ÉÇÔÈ¡Êý¾Ý£¬ÏÂÔØ²¢ÔËÐÐÆäËüshellÃüÁîºÍ¶¯Ì¬Á´½Ó¿â(DDL) ¡£


https://interlab.or.kr/archives/19416


4¡¢Labyrinth ChollimaÊǽüÆÚVMConnect¹¥»÷µÄÄ»ºóºÚÊÖ


¾Ý8ÔÂ31ÈÕ±¨µÀ£¬ReversingLabs½«VMConnect»î¶¯ÓëLazarusµÄ×ÓÍÅ»ïLabyrinth ChollimaÁªÏµÆðÀ´ ¡£8Ô³õ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸ö¶ñÒ⹩ӦÁ´»î¶¯¡°VMConnect¡±£¬ÏòPyPI´æ´¢¿âÉÏ´«ÁËÁ½´ò¶ñÒâPython°ü ¡£ÏÖÔÚÓÖ·¢ÏÖÁËÁíÍâÈý¸ö¶ñÒâ°ü£¬tablediter¡¢request-plusºÍrequestspro£¬ËüÃDZ»ÈÏΪÊÇVMConnect»î¶¯µÄ¼ÌÐø ¡£Ñо¿ÈËÔ±½«Æä¹éÒòÓÚLabyrinth ChollimaÊÇ»ùÓÚÕâЩ»î¶¯ÖÐʹÓõĶñÒâ´úÂëµÄÏàËÆÐÔ ¡£


https://securityaffairs.com/150197/apt/labyrinth-chollima-pypi-supply-chain-attacks.html


5¡¢Group-IBÐû²¼¹ØÓÚClassiscam¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


8ÔÂ31ÈÕ£¬Group-IBÐû²¼Á˹ØÓÚClassiscamÔÚÈ«Çò·¶Î§ÄÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß ¡£³ÂË߳ƣ¬Classiscamͨ¹ýÆÛÆ­·ÖÀà¹ã¸æÍøÕ¾Óû§²¢ÇÔÈ¡ËûÃǵÄ×ʽðºÍÖ§¸¶¿¨ÏêϸÐÅÏ¢£¬ÒÑ׬ȡÁË6450ÍòÃÀÔª ¡£Ä¿±êÆ·ÅÆµÄÊýÁ¿Ò²´ÓÈ¥ÄêµÄ169¸öÔö¼Óµ½251¸ö£¬Ä¿Ç°ÓÐ393¸ö¹¥»÷ÍÅ»ïÕë¶Ô79¸ö¹ú¼ÒµÄÓû§£¬ÓÐ1366¸öTelegramƵµÀ½øÐÐЭµ÷ ¡£Å·ÖÞÔâµ½µÄ¹¥»÷×î¶à£¬ÆäÖе¹ú±»¹¥»÷Óû§×î¶à£¬Æä´ÎÊDz¨À¼¡¢Î÷°àÑÀ¡¢Òâ´óÀûºÍÂÞÂíÄáÑÇ ¡£Ó¢¹úÓû§µÄƽ¾ùËðʧ½ð¶î×î¸ß£¬Îª865ÃÀÔª£¬¶øÈ«Çòƽ¾ùˮƽΪ353ÃÀÔª ¡£


https://www.group-ib.com/blog/classiscam-2023/


6¡¢FortiGuardÐû²¼¹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö³ÂËß


8ÔÂ31ÈÕ£¬FortiGuardÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö³ÂËß ¡£RhysidaÊÇÒ»¸öеÄÀÕË÷ÍŻËüʹÓÃRaaSÄ£ÐÍ£¬µÚÒ»¸öÑù±¾ÓÚ5ÔÂÌá½»µ½¹«¹²ÎļþɨÃè·þÎñ ¡£RhysidaÒÀÀµµöÓã¹¥»÷×÷ÎªÑ¬È¾ÔØÌ壬¹¥»÷Õß»¹Ê¹ÓÃCobalt StrikeÔÚÄ¿±êÍøÂçÄÚºáÏòÒÆ¶¯²¢Í¨±¨payload ¡£¸ÃÍÅ»ïÒÑÁгö41¸ö±»¹¥»÷Ä¿±ê£¬ÆäÖÐÁè¼ÝÒ»°ëλÓÚÅ·ÖÞ£¬Æä´ÎÊDZ±ÃÀ ¡£¹¥»÷Ö÷ÒªÕë¶Ô½ÌÓýÐÐÒµ£¨Õ¼±È30%ÒÔÉÏ£©£¬Æä´ÎÊÇÖÆÔìÒµ¡¢Õþ¸®»ú¹¹ºÍITÐÐÒµ ¡£


https://www.fortinet.com/blog/threat-research/ransomware-roundup-rhysida