FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷

Ðû²¼Ê±¼ä 2024-06-06

1. FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷


6ÔÂ4ÈÕ£¬RansomHub ÀÕË÷Èí¼þ×éÖ¯Éù³ÆÇÔÈ¡ÁËÃÀ¹úµçÐŹ«Ë¾ Frontier Communications Áè¼Ý 200 Íò¿Í»§µÄÐÅÏ¢¡£RansomHub ×éÖ¯Éù³ÆÇÔÈ¡ÁËÕâ¼ÒµçОÞÍ·µÄ 5GB Êý¾Ý¡£±»µÁÊý¾Ý°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢Éç»á±£Ïպš¢ÐÅÓᢷÖÊý¡¢³öÉúÈÕÆں͵绰ºÅÂë¡£½ñÄê 4 Ô£¬Frontier Communications֪ͨÃÀ¹ú֤ȯ½»Ò×ίԱ»á (SEC)£¬¸Ã¹«Ë¾ÔÚÔâÓöÍøÂç¹¥»÷ºó±ØÐë¹Ø±ÕijЩϵͳ¡£¸ÃʼþÓÚ 4 Ô 14 ÈÕ±»·¢ÏÖ£¬Ô­ÒòÊÇÒ»Ãûδ¾­ÊÚȨµÄÍþвÐÐΪÕßδ¾­ÊÚȨ·ÃÎÊÁ˸ù«Ë¾µÄ²¿ÃÅ IT »·¾³¡£¸Ã¹«Ë¾¶Ô¸ÃÄþ¾²Â©¶´Õ¹¿ªÁËÊӲ죬²¢½ÓÄÉÐж¯¿ØÖÆʼþ¡£¸Ã¹«Ë¾Ã»ÓÐÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬Ò²ÉÐδ͸¶ÊÜÓ°ÏìÈËÊý¡£RansomHub Ðû²¼Á˱»µÁ¼Ç¼µÄͼƬ×÷ΪÊý¾Ý鶵ÄÖ¤¾Ý£¬²¢Íþв˵£¬Èç¹ûÊܺ¦ÕßÔÚ¾ÅÌìÄÚ²»Ö§¸¶Êê½ð£¬ËûÃǽ«Ðû²¼±»µÁÊý¾Ý¡£


https://securityaffairs.com/164126/data-breach/ransomhub-gang-hacked-frontier-communications.html


2. Ñо¿ÍŶӷ¢ÏÖͨ¹ý¶ñÒâExcel¹¥»÷ÎÚ¿ËÀ¼µÄWindowsÓû§


6ÔÂ5ÈÕ£¬Ò»ÃûÍþвÐÐΪÕßÕýÊÔͼÔÚÎÚ¿ËÀ¼Óû§µÄ Windows ϵͳÉϲ¿Êð Cobalt Strike ºó©¶´ÀûÓù¤¾ß°ü¡£Fortinet µÄÑо¿ÈËÔ±ÔÚ±¾ÖܵÄһƪ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬¸Ã»î¶¯µÄÖصãËƺõÊÇÍêÈ«Ô¶³Ì¿ØÖÆÄ¿±êϵͳ£¬ÒԱ㽫À´²¿ÊðÓÐЧÔغɲ¢¿ÉÄÜÓÃÓÚÆäËû¶ñÒâÄ¿µÄ¡£Äþ¾²¹©Ó¦É̳Æ£¬ÍþвÕßʹÓôøÓÐǶÈëʽ Visual Basic Ó¦Ó÷¨Ê½ (VBA) ºêµÄÎÚ¿ËÀ¼Ö÷Ìâ Excel Îļþ×÷Ϊ³õʼÓÕ¶ü¡£Èç¹û²»½÷É÷µÄÓû§ÆôÓøú꣬Ëü»áÔÚÊܺ¦ÕßϵͳÉϲ¿Êð¶¯Ì¬Á´½Ó¿â (DLL) ÏÂÔØ·¨Ê½£¨Í¨¹ý ConfuserEX ¿ªÔ´¹¤¾ß½øÐлìÏý£©¡£DLL ÏÂÔØ·¨Ê½Ê×ÏÈÒª×öµÄÒ»¼þʾÍÊDzéÕÒÊÜѬȾϵͳÉÏÊÇ·ñ´æÔÚ·À²¡¶¾ºÍÆäËû¶ñÒâÈí¼þ¼ì²â¹¤¾ß¡£Èç¹ûÏÂÔØ·¨Ê½¼ì²âµ½´æÔÚ£¬Ëü»áÁ¢¼´ÖÕÖ¹½øÒ»²½µÄ»î¶¯¡£·ñÔò£¬Ëü»áʹÓà Web ÇëÇó´ÓÔ¶³ÌλÖÃÌáÈ¡ÏÂÒ»½×¶ÎµÄÓÐЧ¸ºÔØ¡£DLL ÏÂÔØ·¨Ê½µÄÉè¼ÆʹÆäÖ»ÄÜÔÚλÓÚÎÚ¿ËÀ¼µÄÉ豸ÉÏÏÂÔصڶþ½×¶ÎµÄÓÐЧ¸ºÔØ¡£È»ºó£¬ÏÂÔØ·¨Ê½»áÖ´ÐÐһϵÁв½Ö裬µ¼Ö Cobalt Strike ²¿Êðµ½Êܺ¦ÕßÉ豸ÉÏ¡£


https://news.hitb.org/content/ukrainian-systems-hit-cobalt-strike-malicious-excel-file


3. SYNNOVIS ÔâÀÕË÷Èí¼þ¹¥»÷£¬Ó°ÏìÂ׶صĶà¼ÒÒ½Ôº


6ÔÂ5ÈÕ£¬Synnovis ÊǸÇÒÁºÍÊ¥ÍÐÂí˹ NHS »ù½ð»áÐÅÍС¢Â׶عúÍõѧԺҽԺ NHS ÐÅÍÐÒÔ¼°Å·ÖÞ×î´óµÄÒ½ÁƼì²âºÍÕï¶ÏÌṩÉÌ SYNLAB Ö®¼äµÄ²¡ÀíѧºÏ×÷»ï°é¹Øϵ¡£Synnovis ÔÚÆäÍøÕ¾ÉÏÐû²¼µÄһƪÎÄÕÂÖÐÅû¶£¬ÆäÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£Õâ¼Ò²¡ÀíѧºÍÕï¶Ï·þÎñÌṩÉÌÔÚ NHS ר¼ÒµÄ×ÊÖú϶ÔÄþ¾²Â©¶´Õ¹¿ªÁËÊӲ졣ר¼ÒÃÇÕýÔÚŬÁ¦È«ÃæÆÀ¹À¹¥»÷µÄÓ°Ï죬²¢½ÓÄÉÊʵ±´ëʩֹͣʼþ¡£¸Ã¹«Ë¾»¹Ðû²¼£¬ËûÃÇÕýÔÚÓë NHS Trust ºÏ×÷»ï°éÃÜÇкÏ×÷£¬ÒÔ¾¡Á¿¼õÉÙ¶Ô»¼ÕߺÍÆäËû·þÎñÓû§µÄÓ°Ï졣Ŀǰ£¬¸Ã¹«Ë¾ÉÐδÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬ÀýÈçѬȾÆäϵͳµÄ¶ñÒâÈí¼þ¼Ò×åÒÔ¼°ÊÇ·ñÔâÊÜÊý¾Ýй¶¡£4Ô£¬SYNLAB¼¯ÍÅÒâ´óÀû·Ö¹«Ë¾Synlab ItaliaÒòÔâÊÜBlackbastaÍøÂç¹¥»÷¶øÏÝÈëÍ£¶Ù¡£¸Ã¹«Ë¾ÔÝÍ£ÁËÒâ´óÀû²ÉÑùµã¡¢Ò½ÁÆÖÐÐĺÍʵÑéÊÒµÄËùÓл¡£


https://securityaffairs.com/164142/cyber-crime/ransomware-attack-synnovis-london-hospitals.html


4. BianLian й¶Êý¾Ýºó£¬°Ä´óÀûÑÇ¿óÒµ¹«Ë¾Åû¶Υ¹æÐÐΪ


6ÔÂ5ÈÕ£¬±±·½¿óÒµ¹«Ë¾ÔçЩʱºòÐû²¼Í¨¸æ¾¯¸æ³Æ£¬¸Ã¹«Ë¾ÔâÓöÍøÂç¹¥»÷ʼþ£¬µ¼Ö²¿Ãű»µÁÊý¾Ý±»Ðû²¼ÔÚ°µÍøÉÏ¡£Northern Minerals ÊÇÒ»¼Ò°Ä´óÀûÑǹ«Ë¾£¬×¨×¢ÓÚ¿±Ì½ºÍ¿ª·¢ÖØÏ¡ÍÁÔªËØ (HRE)£¬ÌرðÊÇïáºÍï«£¬ÓÃÓÚµç×Ó¡¢µç³ØºÍ·É»ú¡£¸Ã¹«Ë¾¶Ô°Ä´óÀûÑÇÕþ¸®À´Ëµ¾ßÓÐÖÁ¹ØÖØÒªµÄÕ½ÂÔÒâÒ壬×î½ü°Ä´óÀûÑÇÕþ¸®ºôÓõÖйú¹É¶«³öÊÛÆäÔÚ¸ÃÏ¡ÍÁ¿ó¹«Ë¾µÄ¹É·Ý¾ÍÖ¤Ã÷ÁËÕâÒ»µã¡£¸Ã¹«Ë¾ÔÚ°Ä´óÀûÑÇ֤ȯ½»Ò×Ëù (ASX) ¹ûÈ»½»Ò×£¬¹ÉƱ´úÂëΪ¡°NTU¡±£¬Òò´ËÓÐÖ´·¨ÒåÎñ¼°Ê±Åû¶ÈκÎÊý¾Ýй¶Ê¼þ¡£¸Ã¹«Ë¾½ñÌìÅû¶£¬ÆäϵͳÖеÄÊý¾ÝÓÚ 2024 Äê 3 ÔÂÏÂÑ®±»ÇÔÈ¡£¬ËæºóÐû²¼ÔÚ°µÍøÉÏ£¬µ«Ã»ÓÐ͸¶ÕØÊÂÕßµÄÃû×Ö¡£¸Ã¹«Ë¾ÌåÏÖ£¬Òѽ«´Ëʼû¸æ°Ä´óÀûÑÇÍøÂçÄþ¾²ÖÐÐĺͰĴóÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¬Í¬Ê±»¹½«Í¨¹ý¸öÐÔ»¯Í¨Öª¼û¸æÊÜÓ°ÏìµÄ¸öÈË¡£


https://www.bleepingcomputer.com/news/security/australian-mining-company-discloses-breach-after-bianlian-leaks-data/


5. ÐÂÐÍ V3B ÍøÂçµöÓ㹤¾ß°üÃé×¼ 54 ¼ÒÅ·ÖÞÒøÐеĿͻ§


6ÔÂ4ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓÕýÔÚ Telegram ÉÏÍƹãÒ»ÖÖÃûΪ¡°V3B¡±µÄÐÂÐÍÍøÂçµöÓ㹤¾ß°ü£¬Ä¿Ç°¸Ã¹¤¾ß°üµÄÄ¿±êÊÇ°®¶ûÀ¼¡¢ºÉÀ¼¡¢·ÒÀ¼¡¢°ÂµØÀû¡¢µÂ¹ú¡¢·¨¹ú¡¢±ÈÀûʱ¡¢Ï£À°¡¢Â¬É­±¤ºÍÒâ´óÀûµÄ 54 ¼ÒÖ÷Òª½ðÈÚ»ú¹¹µÄ¿Í»§¡£¸ÃÍøÂçµöÓ㹤¾ß°üµÄ¼Û¸ñÔÚÿÔ 130 ÖÁ 450 ÃÀÔªÖ®¼ä£¬¾ßÌåÈ¡¾öÓÚ¹ºÖõÄÄÚÈÝ£¬¾ßÓи߼¶»ìÏý¡¢µ±µØ»¯Ñ¡Ïî¡¢OTP/TAN/2FA Ö§³Ö¡¢ÓëÊܺ¦ÕßµÄʵʱÁÄÌìÒÔ¼°ÖÖÖÖÌӱܻúÖÆ¡£¾Ý·¢ÏÖ V3B µÄ Resecurity Ñо¿ÈËÔ±³Æ£¬Æä Telegram ƵµÀÒѾ­ÓµÓÐÁè¼Ý 1,250 Ãû³ÉÔ±£¬Õâ±íÃ÷еÄÍøÂçµöÓã¼´·þÎñ (PhaaS) ƽ̨ÕýÔÚÍøÂç·¸×ïÁìÓòѸËÙ»ñµÃ¹Ø×¢¡£V3B ÔÚ×Ô½ç˵ CMS ÉÏʹÓø߶ȻìÏýµÄ JavaScript ´úÂëÀ´Ìӱܷ´ÍøÂçµöÓãºÍËÑË÷ÒýÇæ»úÆ÷È˵ļì²â²¢·ÀÖ¹Ñо¿ÈËÔ±µÄ¹¥»÷¡£Ëü°üÂÞ·ÒÀ¼Óï¡¢·¨Óï¡¢Òâ´óÀûÓï¡¢²¨À¼ÓïºÍµÂÓïµÈ¶àÖÖÓïÑÔµÄרҵ·­ÒëÒ³Ã棬ÒÔÔöÇ¿ÍøÂçµöÓã¹¥»÷µÄÓÐЧÐÔ£¬Ê¹ÍþвÐÐΪÕßÄܹ»¿ªÕ¹¶à¹ú»î¶¯¡£


https://www.bleepingcomputer.com/news/security/new-v3b-phishing-kit-targets-customers-of-54-european-banks/


6. ºÚ¿ÍÍÅ»ïͨ¹ý DM ¹¥»÷¸ßÖªÃû¶ÈµÄ TikTok Óû§


6ÔÂ5ÈÕ£¬TikTok ÌåÏÖ£¬Ä¿Ç°ÕýÔÚ½ÓÄÉ´ëÊ©·À·¶ÍøÂç¹¥»÷£¬¸Ã¹¥»÷ͨ¹ýÖ±½ÓÏûÏ¢Õë¶ÔһЩ֪ÃûÓû§£¬ÊÔͼ½Ù³ÖËûÃǵÄÕË»§¡£TikTok Òþ˽ºÍÄþ¾²ÍŶӷ¢ÑÔÈË Jason Grosse ÌåÏÖ£º¡°ÎÒÃÇÒѽÓÄÉ´ëÊ©×èÖ¹´Ë´Î¹¥»÷£¬²¢·ÀÖ¹½«À´Ôٴη¢Éú¡£ÎÒÃÇÕýÔÚÓëÊÜÓ°ÏìµÄÕË»§ËùÓÐÕßÖ±½ÓºÏ×÷£¬ÒÔÔÚÐëҪʱ»Ö¸´·ÃÎÊȨÏÞ¡£¡±Grosse ÌåÏÖ£¬TikTok ÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷£¬Ä¿Ç°ÎÞ·¨¾ÍÆä¹æÄ£»òÅÓ´óˮƽ·¢±íÆÀÂÛ£¬³Æ¸ÃÍþв½ö½öÊÇ¡°Ç±Ôڵĩ¶´¡±¡£TikTok ÈÏ¿É´ËÊÂ֮ǰ£¬ÖܶþÓб¨µÀ³Æ£¬CNN µÄÕ˺ÅÉÏÖÜÔø±»ÔÝʱÈëÇÖ¡£Semafor Ô®Òý¸ÃÐÂÎÅ»ú¹¹Ò»Î»ÄäÃûÏûÏ¢ÈËÊ¿µÄ»°³Æ£¬´Ë´ÎÈëÇÖ¡°Ëƺõ²»ÊÇÓÐÈË´Ó CNN ÄÇÀï»ñµÃ·ÃÎÊȨÏ޵Ľá¹û¡±¡£CNN ûÓÐÁ¢¼´»ØÓ¦¡¶Á¬Ïß¡·ÔÓÖ¾µÄÖÃÆÀÇëÇó¡£¼øÓÚ½ñÄêÇïÌì¼´½«¾ÙÐеÄ×Üͳ´óÑ¡£¬ÈËÃǶÔÃÀ¹úÐÂÎÅ»ú¹¹Ôâµ½ºÚ¿Í¹¥»÷µÄµ£ÓÇÓÈÆä¸ßÕÇ¡£


https://news.hitb.org/content/tiktok-hack-targets-high-profile-users-dms