ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
Ðû²¼Ê±¼ä 2023-12-211.ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
¾ÝýÌå20ÈÕ±¨µÀ£¬£¬£¬£¬£¬Áª°îÊÓ²ì¾ÖÐû²¼µ·»ÙÀÕË÷Èí¼þÍÅ»ï ALPHV£¬£¬£¬£¬£¬Õþ¸®Óë°Ä´óÀûÑÇ¡¢°ÂµØÀû¡¢µ¤Âó¡¢Î÷°àÑÀ¡¢ÈðÊ¿ºÍÓ¢¹úµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬£¬ALPHV ¾³£×·Çó¼ÓÃÜÇ®±Ò×éÖ¯ÍøÂçÖÐ×îÃô¸ÐµÄÊý¾Ý¡£¡£¡£¡£¡£¡£ËûÃÇÍþв˵£¬£¬£¬£¬£¬ÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬ËûÃǽ«ÎÞ·¨»á¼ûÕâЩÐÅÏ¢£¬£¬£¬£¬£¬²¢Ðû²¼Î´¼ÓÃܵĿɶÁ°æ±¾¡£¡£¡£¡£¡£¡£ÈôÊDz»¸¶¿î£¬£¬£¬£¬£¬ºÚ¿Í¾Í»áÔÚ°µÍøÍøÕ¾ÉÏÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬£¬£¬£¬£¬×éÖ¯¿ÉÒÔʹÓøù¤¾ß½âÃÜ ALPHV ÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£Æù½ñΪֹ£¬£¬£¬£¬£¬FBI ¼°ÆäÖ´·¨ÏàÖúͬ°éÒÑÏò 500 ¶àÃûÊܺ¦ÕßÌṩÁËÕâЩ¹¤¾ß£¬£¬£¬£¬£¬×ÊÖúËûÃÇ×èÖ¹ÁËÔ¤¼Æ 6800 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/us-gov-disrupts-blackcat-ransomware-operation-fbi-releases-decryption-tool/
2. SymantecÅû¶SeedwormÕë¶Ô·ÇÖÞµçÐÅÐÐÒµµÄ¹¥»÷
19ÈÕ£¬£¬£¬£¬£¬SymantecµÄÍþвÇ鱨ÍŶÓÐû²¼ÁËһƪÓйØÒÁÀÊAPT×éÖ¯SeedwormµÄ±¨¸æ£¬£¬£¬£¬£¬Seedworm£¨ÓÖÃû Muddywater£©Ò»Ö±½«°£¼°¡¢ËÕµ¤ºÍ̹ɣÄáÑǵçÐÅÐÐÒµµÄ×éÖ¯×÷ΪĿµÄ¡£¡£¡£¡£¡£¡£Ö¸³ö¸Ã×éÖ¯ÕýÔÚÒÔÀûÒæÏà¹ØÎªÃûÔÚ·ÇÖÞµØÇøµÄµçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£SeedwormʹÓÃÊ¢ÐеÄOffTheShelf¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þMimikatzºÍPoweliksÀ´Öª×ãÆäÌØ¹¤»î¶¯µÄÐèÇ󡣡£¡£¡£¡£¡£ËûÃǶÔÌØ¶¨¹¤¾ß¾ÙÐмàÊÓºÍÇÔÈ¡²Ù×÷ϵͳ¡¢Ó¦ÓóÌÐòºÍÍøÂçÆ¾Ö¤£¬£¬£¬£¬£¬Í¬Ê±Ò²»á×Ô¶¯»¯Êý¾ÝÍøÂçºÍÇé±¨ÍøÂçÊÂÇé¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms
3. IBM·¢Ã÷ʹÓÃWeb×¢ÈëÕë¶ÔÎ÷Å·µÈµØ40¶à¼ÒÒøÐеĻ
19ÈÕýÌ屨µÀ£¬£¬£¬£¬£¬IBM Security Trusteer µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ Danabot µÄ¶ñÒâÈí¼þ½üÆÚÔÚ°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÒøÐÐÖзºÆð¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔͨ¹ýÍøÂç×¢Èë¹¥»÷ÇÔÈ¡Óû§µÄÒøÐÐÆ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£½üÄêÀ´ÕâÀ๥»÷·½·¨ÓÐËùïÔÌ£¬£¬£¬£¬£¬µ«×î½ü Web ×¢Èë¹¥»÷ÓÖÖØÐ·ºÆð¡£¡£¡£¡£¡£¡£×¨¼ÒÃÇÒÔΪÕâÖÖ¹¥»÷»áÒ»Á¬ÔöÌí£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËɵػñÈ¡´ó×ÚСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£¡£¡£½¨ÒéÓû§ÔÚʹÓÃÒøÐÐÓ¦ÓóÌÐòʱӦ¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£Õâ°üÀ¨ÕË»§ÉÏDZÔڵĿÉÒɻ¡¢²»´Óδ֪ȪԴÏÂÔØÈí¼þÒÔ¼°×ñÕÕÖØ´óÃÜÂëµÄÔÔòºÍµç×ÓÓʼþÇå¾²µÈ¡£¡£¡£¡£¡£¡£
https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
4. Ñо¿Ö°Ô±ÑÝʾ½µµÍOpenSSHÅþÁ¬Çå¾²ÐÔµÄTerrapin¹¥»÷
19ÈÕ±¨µÀ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͹¥»÷·½·¨£¬£¬£¬£¬£¬ÃûΪTerrapin£¬£¬£¬£¬£¬¿ÉÒÔͨ¹ý¸Ä¶¯×èÁ¦ÒÔ¼°½µ¼¶Çå¾²ÐÒéµÄ·½·¨£¬£¬£¬£¬£¬½µµÍOpenSSHÅþÁ¬µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£Terrapin¹¥»÷ʹÓÃSSHÐÒéµÄȱÏÝ£¬£¬£¬£¬£¬½èÖúÅÌËã»úÍøÂç´ø¿íÖÎÀíÈí¼þtcµÄ"¡°ÑÓ³ÙºÍÑÓ³Ù²ü¶¶(Delay and Jitter)"¹¦Ð§¶ÔÍøÂçÅþÁ¬¾ÙÐе÷½â£¬£¬£¬£¬£¬´Ó¶ø½µµÍSSHÅþÁ¬µÄÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã¹¥»÷×î´óµÄÒòËØÊÇ MiTM£¬£¬£¬£¬£¬ÕâʹµÃ Terrapin µÄÍþв²»ÄÇôÑÏÖØ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/
5. ESETÐû²¼¹ØÓÚ2023ÄêϰëÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ
19ÈÕÔÚESETÐû²¼µÄ2023ÄêϰëÄêÍþв±¨¸æÖÐÖ¸³ö£¬£¬£¬£¬£¬2023ÄêϰëÄêÍøÂç·¸·¨»î¶¯µÄÊýÄ¿ºÍÖØÆ¯ºó½«½øÒ»²½ÔöÌí¡£¡£¡£¡£¡£¡£Cl0p ÊÇÒ»¸öÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬£¬ÒÔ´ó¹æÄ£ÊµÑéÀÕË÷Èí¼þ¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬Ëüͨ¹ýÆÕ±éµÄ¡°MOVEit ºÚ¿Í¹¥»÷¡±ÒýÆðÁËÈËÃǵĹØ×¢£¬£¬£¬£¬£¬µ«ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬£¬£¬¸ÃºÚ¿Í¹¥»÷²¢Î´Éæ¼°ÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£¡£ÔÚÎïÁªÍøÁìÓò£¬£¬£¬£¬£¬¸ú×Ù¼à¿ØMozi IoT ½©Ê¬ÍøÂ磬£¬£¬£¬£¬ÒÔ¼° Android ÌØ¹¤Èí¼þ°¸ÀýÏÔÖøÔöÌí£¬£¬£¬£¬£¬ÕâÖ÷Òª¹éÒòÓÚ SpinOk ÌØ¹¤Èí¼þµÄ±£´æ¡£¡£¡£¡£¡£¡£±¨¸æ»¹ÖÒÑÔ˵£¬£¬£¬£¬£¬ÐéÄâÇ®±ÒÉúÒâËù¿ÉÄÜÃæÁÙ¸üƵÈԵĹ¥»÷£¬£¬£¬£¬£¬²¢¾¯Ê¾Õþ¸®ºÍÆóÒµÓ¦Ô½·¢¹Ø×¢ÍøÂçÇå¾²ºÍÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/
6. ¹ú¼ÊÖ´·¨Ðж¯¾Ð²¶3500ÃûÍøÂç·¸·¨ÏÓÒÉÈ˲¢»ñ3ÒÚÃÀÔª
19ÈÕýÌ屨µÀ£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯¾ÙÐеÄÒ»Ïî´úºÅΪ¡°HAECHI IV Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Ðж¯¾Ð²¶ÁË3500ÃûÍøÂç×ï·¸£¬£¬£¬£¬£¬²¢²é»ñÁ˼ÛÖµ3ÒÚÃÀÔªµÄ×ʲú£¬£¬£¬£¬£¬º«¹úÕþ¸®Ö÷µ¼ÁË HAECHI Ðж¯£¬£¬£¬£¬£¬²¢ÓëÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢ÖйúÏã¸ÛºÍÓ¡¶ÈµÈ 34 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬£¬×îеÄÐж¯±¬·¢ÔÚ 2023 Äê 7 ÔÂÖÁ 12 ÔÂʱ´ú£¬£¬£¬£¬£¬Ä¿µÄÊÇ´ÓÊÂÓïÒôÍøÂç´¹ÂÚ¡¢Áµ°®Õ©Æ¡¢ÔÚÏßÐÔÀÕË÷¡¢Í¶×Êڲơ¢Óë²»·¨ÔÚÏ߶IJ©Ïà¹ØµÄÏ´Ç®¡¢ÉÌÒµµç×ÓÓʼþй¶ºÍµç×ÓÉÌÎñڲƵÄÍþвÐÐΪÕß¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/


¾©¹«Íø°²±¸11010802024551ºÅ