еÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

Ðû²¼Ê±¼ä 2022-12-28
1¡¢ÐµÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

      

¾Ý12ÔÂ24ÈÕ±¨µÀ£¬ £¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐÂÐÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRisePro¡£¡£¡£¡£ËüÓÚ2022Äê12ÔÂ13ÈÕÊ״α»¼ì²âµ½£¬ £¬£¬ÕýÔÚͨ¹ýPrivateLoader°´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þÏÂÔØÐ§À;ÙÐзַ¢¡£¡£¡£¡£RiseProÓÉC++¿ª·¢£¬ £¬£¬Ëƺõ¾ßÓÐÓëVidarÀàËÆµÄ¹¦Ð§£¬ £¬£¬Ö¼ÔÚ×ÊÖú¹¥»÷Õß´Ó±»Ñ¬È¾µÄ×°±¸ÖÐÇÔȡĿµÄµÄÐÅÓÿ¨¡¢ÃÜÂëºÍ¼ÓÃÜÇ®°ü¡£¡£¡£¡£Flashpoint±¨¸æ³Æ£¬ £¬£¬¹¥»÷ÕßÒѾ­ÔÚ¶íÂÞ˹°µÍøÊг¡ÉϳöÊÛÊýÒÔǧ¼ÆµÄRiseProÈÕÖ¾£¨´Ó±»Ñ¬È¾×°±¸ÖÐÇÔÈ¡µÄÊý¾Ý°ü£©¡£¡£¡£¡£ 


https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/


2¡¢RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ

      

¾ÝýÌå12ÔÂ26ÈÕ±¨µÀ£¬ £¬£¬RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ¡£¡£¡£¡£ÍßŬ°¢Í¼ÔøÔÚ11Ô³õÐû²¼ËûÃÇÔâµ½ÁËÀÕË÷¹¥»÷£¬ £¬£¬ÔÚ¿ìÒªÒ»¸öÔºóÈÔδÍêÈ«»Ö¸´¡£¡£¡£¡£12ÔÂ24ÈÕ£¬ £¬£¬RansomHouseÍŻォÍßŬ°¢Í¼Õþ¸®ÁÐÈëÁËËûÃǵÄÍøÕ¾£¬ £¬£¬³ÆÒÑÓÚ10ÔÂ6ÈÕ¼ÓÃÜËûÃǵÄϵͳ£¬ £¬£¬²¢ÇÔÈ¡ÁË3.2 TBµÄÎļþ¡£¡£¡£¡£Ðû²¼µÄÑù±¾ÖÐÎļþ¿´ÆðÀ´È·ÊµÓëÕþ¸®µÄÎļþÒ»Ö£¬ £¬£¬ÆäÖв»°üÀ¨Ð¡ÎÒ˽¼Ò»òÃô¸ÐµÄÎļþ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊê½ð½ð¶îÊǼ¸¶à£¬ £¬£¬»òÊÇ·ñ¾ÙÐйý̸ÅС£¡£¡£¡£


https://www.databreaches.net/vanuatu-ransomware-attack-claimed-by-ransomhouse/


3¡¢CrowdStrikeÅû¶GuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì

      

CrowdStrikeÔÚ12ÔÂ19ÈÕÅû¶ÁËGuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì¡£¡£¡£¡£GuLoader£¨ÓÖÃûCloudEyE£©£¬ £¬£¬ÊÇÒ»ÖÖVisual Basic Script(VBS)ÏÂÔØ³ÌÐò£¬ £¬£¬ÓÚ2019ÄêÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£ËüʹÓöà̬shellcode¼ÓÔØ³ÌÐòÀ´Èƹý¹Å°åÇå¾²½â¾ö¼Æ»®£¬ £¬£¬Ñо¿Ö°Ô±Îª¶ñÒâÈí¼þʹÓõÄÿ¸öAPIÓ³ÉäËùÓÐǶÈëʽDJB2¹þÏ£ÖµÀ´ÆÊÎöÆä»î¶¯¡£¡£¡£¡£ÐµÄshellcode·´ÆÊÎöÊÖÒÕͨ¹ýɨÃèÕû¸öÀú³ÌÄÚ´æÀ´²éÕÒÓëÐéÄâ»ú(VM)Ïà¹ØµÄ×Ö·û´®£¬ £¬£¬ÐµÄÈßÓà´úÂë×¢Èë»úÖÆÒâζ×Åͨ¹ýʹÓÃÄÚÁª»ã±àÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄÓû§Ä£Ê½hookÀ´È·±£´úÂëµÄÖ´ÐС£¡£¡£¡£


https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/


4¡¢TrendMicro·¢Ã÷ʹÓùȸèPPC¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯

      

12ÔÂ23ÈÕ£¬ £¬£¬Trend Micro͸¶Æä·¢Ã÷½©Ê¬ÍøÂçIcedIDµÄ·Ö·¢·½·¨±¬·¢ÁËÖØ´óת±ä¡£¡£¡£¡£×Ô2022Äê12ÔÂÒÔÀ´£¬ £¬£¬Ñо¿Ö°Ô±ÊӲ쵽ʹÓùȸèÿ´Îµã»÷¸¶·Ñ(PPC)¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯¡£¡£¡£¡£IcedIDÔËÓªÍÅ»ïÐ®ÖÆÁËAdobe¡¢FortinetºÍDiscordµÈÆ·ÅÆºÍÓ¦ÓÃËùʹÓõÄÒªº¦´ÊÀ´ÏÔʾ¶ñÒâ¹ã¸æ¡£¡£¡£¡£µ±Óû§ËÑË÷Òªº¦×Öʱ£¬ £¬£¬Ö¸Ïò¶ñÒâÍøÕ¾µÄ¹ã¸æÏÔʾÔÚ×ÔÈ»ËÑË÷Ч¹ûÉÏ·½¡£¡£¡£¡£Ôڴ˻ÖУ¬ £¬£¬¼ÓÔØ³ÌÐòÊÇͨ¹ýMSIÎļþ·Ö·¢µÄ£¬ £¬£¬Õâ¹ØÓÚIcedIDÀ´ËµÊDz»³£¼ûµÄ¡£¡£¡£¡£±ðµÄ£¬ £¬£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄKeitaroÁ÷Á¿µ¼Ïòϵͳ(TDS)À´¹ýÂËÀ´×ÔÑо¿Ö°Ô±ºÍɳºÐµÄÁ÷Á¿¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html   


5¡¢Ö¥¼Ó¸çµÄÄÜÔ´¹«Ë¾Sargent & LundyÔâµ½ÀÕË÷¹¥»÷

      

ýÌå12ÔÂ27Èճƣ¬ £¬£¬ÃÀ¹úCNN͸¶ºÚ¿ÍÔÚ½üÆÚµÄÀÕË÷¹¥»÷ÖÐÇÔÈ¡Á˶à¼ÒµçÁ¦¹«Ë¾µÄÊý¾Ý¡£¡£¡£¡£´Ë´ÎÀÕË÷¹¥»÷Õë¶ÔµÄÊÇ×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄSargent & Lundy¹¤³Ì¹«Ë¾£¬ £¬£¬¸Ã¹«Ë¾Éè¼ÆÁË900¶à¸ö·¢µçÕ¾ºÍÊýǧӢÀïµÄµçÁ¦ÏµÍ³£¬ £¬£¬²¢³ÖÓÐÕâЩÏîÄ¿µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¾ÝÆäÍøÕ¾³Æ£¬ £¬£¬¸Ã¹«Ë¾»¹´¦Öóͷ£ºËÇå¾²ÎÊÌâ¡£¡£¡£¡£¾ÝϤ£¬ £¬£¬¸ÃÊÂÎñÒÑ»ñµÃ¿ØÖƺ͵÷½â£¬ £¬£¬Ëƺõ²¢Î´¶ÔÆäËüµçÁ¦ÐÐÒµµÄ¹«Ë¾Ôì³ÉÓ°Ï죬 £¬£¬Ò²Ã»ÓÐÊý¾Ý±»Ðû²¼µ½°µÍøÉÏ¡£¡£¡£¡£


https://www.databreaches.net/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/


6¡¢KasperskyÐû²¼Õë¶Ô°¢¶û°ÍÄáÑǵÄÁ½ÂÖ¹¥»÷µÄÆÊÎö±¨¸æ

      

KasperskyÔÚ12ÔÂ22ÈÕÐû²¼ÁËÕë¶Ô°¢¶û°ÍÄáÑÇ×éÖ¯µÄÁ½ÂÖ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÖ÷Òª½ÏÁ¿ÁËÕâÁ½ÂÖ¹¥»÷»î¶¯ËùʹÓõÄÀÕË÷Èí¼þºÍ²Á³ý¶ñÒâÈí¼þÖ®¼äµÄÇø±ð¡£¡£¡£¡£¹ØÓÚÀÕË÷Èí¼þ£¬ £¬£¬Á½ÂÖ¹¥»÷»î¶¯µÄÑù±¾¾ßÓÐÏàͬµÄÊðÃûÖ¤Êé²ÎÊý£¬ £¬£¬Óë¿ÆÍþÌØµçÐŹ«Ë¾Óйء£¡£¡£¡£¹¥»÷Õß¶ÔµÚ¶þÂÖʹÓõIJÁ³ý¶ñÒâÈí¼þ¾ÙÐÐÁ˶à´ÎÐ޸ģ¬ £¬£¬¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²â£¬ £¬£¬Ö÷Ҫת±äÊÇʹÓÃNvidiaÖ¤Êé¶Ô¶ñÒâÈí¼þÊðÃû¡¢ÔÚ¶ñÒâÈí¼þÖÐǶÈëEldoS RawDiskÇý¶¯³ÌÐò£¬ £¬£¬ÒÔ¼°ÔÚÇý¶¯³ÌÐò×°ÖúóÁ¬Ã¦Æô¶¯É¾³ýÀý³Ì¡£¡£¡£¡£


https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/