ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
Ðû²¼Ê±¼ä 2023-12-211.ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
¾ÝýÌå20ÈÕ±¨µÀ£¬£¬£¬£¬Áª°îÊÓ²ì¾ÖÐû²¼µ·»ÙÀÕË÷Èí¼þÍÅ»ï ALPHV£¬£¬£¬£¬Õþ¸®Óë°Ä´óÀûÑÇ¡¢°ÂµØÀû¡¢µ¤Âó¡¢Î÷°àÑÀ¡¢ÈðÊ¿ºÍÓ¢¹úµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬ALPHV ¾³£×·Çó¼ÓÃÜÇ®±Ò×éÖ¯ÍøÂçÖÐ×îÃô¸ÐµÄÊý¾Ý¡£¡£¡£¡£ËûÃÇÍþв˵£¬£¬£¬£¬ÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬£¬ËûÃǽ«ÎÞ·¨»á¼ûÕâЩÐÅÏ¢£¬£¬£¬£¬²¢Ðû²¼Î´¼ÓÃܵĿɶÁ°æ±¾¡£¡£¡£¡£ÈôÊDz»¸¶¿î£¬£¬£¬£¬ºÚ¿Í¾Í»áÔÚ°µÍøÍøÕ¾ÉÏÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬£¬£¬£¬×éÖ¯¿ÉÒÔʹÓøù¤¾ß½âÃÜ ALPHV ÀÕË÷Èí¼þ¡£¡£¡£¡£Æù½ñΪֹ£¬£¬£¬£¬FBI ¼°ÆäÖ´·¨ÏàÖúͬ°éÒÑÏò 500 ¶àÃûÊܺ¦ÕßÌṩÁËÕâЩ¹¤¾ß£¬£¬£¬£¬×ÊÖúËûÃÇ×èÖ¹ÁËÔ¤¼Æ 6800 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£
https://www.securityweek.com/us-gov-disrupts-blackcat-ransomware-operation-fbi-releases-decryption-tool/
2. SymantecÅû¶SeedwormÕë¶Ô·ÇÖÞµçÐÅÐÐÒµµÄ¹¥»÷
19ÈÕ£¬£¬£¬£¬SymantecµÄÍþвÇ鱨ÍŶÓÐû²¼ÁËһƪÓйØÒÁÀÊAPT×éÖ¯SeedwormµÄ±¨¸æ£¬£¬£¬£¬Seedworm£¨ÓÖÃû Muddywater£©Ò»Ö±½«°£¼°¡¢ËÕµ¤ºÍ̹ɣÄáÑǵçÐÅÐÐÒµµÄ×éÖ¯×÷ΪĿµÄ¡£¡£¡£¡£Ö¸³ö¸Ã×éÖ¯ÕýÔÚÒÔÀûÒæÏà¹ØÎªÃûÔÚ·ÇÖÞµØÇøµÄµçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹¾ÙÐй¥»÷¡£¡£¡£¡£SeedwormʹÓÃÊ¢ÐеÄOffTheShelf¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þMimikatzºÍPoweliksÀ´Öª×ãÆäÌØ¹¤»î¶¯µÄÐèÇ󡣡£¡£¡£ËûÃǶÔÌØ¶¨¹¤¾ß¾ÙÐмàÊÓºÍÇÔÈ¡²Ù×÷ϵͳ¡¢Ó¦ÓóÌÐòºÍÍøÂçÆ¾Ö¤£¬£¬£¬£¬Í¬Ê±Ò²»á×Ô¶¯»¯Êý¾ÝÍøÂçºÍÇé±¨ÍøÂçÊÂÇé¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms
3. IBM·¢Ã÷ʹÓÃWeb×¢ÈëÕë¶ÔÎ÷Å·µÈµØ40¶à¼ÒÒøÐеĻ
19ÈÕýÌ屨µÀ£¬£¬£¬£¬IBM Security Trusteer µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ Danabot µÄ¶ñÒâÈí¼þ½üÆÚÔÚ°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÒøÐÐÖзºÆð¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔͨ¹ýÍøÂç×¢Èë¹¥»÷ÇÔÈ¡Óû§µÄÒøÐÐÆ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£½üÄêÀ´ÕâÀ๥»÷·½·¨ÓÐËùïÔÌ£¬£¬£¬£¬µ«×î½ü Web ×¢Èë¹¥»÷ÓÖÖØÐ·ºÆð¡£¡£¡£¡£×¨¼ÒÃÇÒÔΪÕâÖÖ¹¥»÷»áÒ»Á¬ÔöÌí£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËɵػñÈ¡´ó×ÚСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£½¨ÒéÓû§ÔÚʹÓÃÒøÐÐÓ¦ÓóÌÐòʱӦ¼á³ÖСÐÄ¡£¡£¡£¡£Õâ°üÀ¨ÕË»§ÉÏDZÔڵĿÉÒɻ¡¢²»´Óδ֪ȪԴÏÂÔØÈí¼þÒÔ¼°×ñÕÕÖØ´óÃÜÂëµÄÔÔòºÍµç×ÓÓʼþÇå¾²µÈ¡£¡£¡£¡£
https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
4. Ñо¿Ö°Ô±ÑÝʾ½µµÍOpenSSHÅþÁ¬Çå¾²ÐÔµÄTerrapin¹¥»÷
19ÈÕ±¨µÀ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͹¥»÷·½·¨£¬£¬£¬£¬ÃûΪTerrapin£¬£¬£¬£¬¿ÉÒÔͨ¹ý¸Ä¶¯×èÁ¦ÒÔ¼°½µ¼¶Çå¾²ÐÒéµÄ·½·¨£¬£¬£¬£¬½µµÍOpenSSHÅþÁ¬µÄÇå¾²ÐÔ¡£¡£¡£¡£Terrapin¹¥»÷ʹÓÃSSHÐÒéµÄȱÏÝ£¬£¬£¬£¬½èÖúÅÌËã»úÍøÂç´ø¿íÖÎÀíÈí¼þtcµÄ"¡°ÑÓ³ÙºÍÑÓ³Ù²ü¶¶(Delay and Jitter)"¹¦Ð§¶ÔÍøÂçÅþÁ¬¾ÙÐе÷½â£¬£¬£¬£¬´Ó¶ø½µµÍSSHÅþÁ¬µÄÇå¾²±ê×¼¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã¹¥»÷×î´óµÄÒòËØÊÇ MiTM£¬£¬£¬£¬ÕâʹµÃ Terrapin µÄÍþв²»ÄÇôÑÏÖØ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/
5. ESETÐû²¼¹ØÓÚ2023ÄêϰëÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ
19ÈÕÔÚESETÐû²¼µÄ2023ÄêϰëÄêÍþв±¨¸æÖÐÖ¸³ö£¬£¬£¬£¬2023ÄêϰëÄêÍøÂç·¸·¨»î¶¯µÄÊýÄ¿ºÍÖØÆ¯ºó½«½øÒ»²½ÔöÌí¡£¡£¡£¡£Cl0p ÊÇÒ»¸öÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬ÒÔ´ó¹æÄ£ÊµÑéÀÕË÷Èí¼þ¹¥»÷¶øÖøÃû£¬£¬£¬£¬Ëüͨ¹ýÆÕ±éµÄ¡°MOVEit ºÚ¿Í¹¥»÷¡±ÒýÆðÁËÈËÃǵĹØ×¢£¬£¬£¬£¬µ«ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬£¬¸ÃºÚ¿Í¹¥»÷²¢Î´Éæ¼°ÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£ÔÚÎïÁªÍøÁìÓò£¬£¬£¬£¬¸ú×Ù¼à¿ØMozi IoT ½©Ê¬ÍøÂ磬£¬£¬£¬ÒÔ¼° Android ÌØ¹¤Èí¼þ°¸ÀýÏÔÖøÔöÌí£¬£¬£¬£¬ÕâÖ÷Òª¹éÒòÓÚ SpinOk ÌØ¹¤Èí¼þµÄ±£´æ¡£¡£¡£¡£±¨¸æ»¹ÖÒÑÔ˵£¬£¬£¬£¬ÐéÄâÇ®±ÒÉúÒâËù¿ÉÄÜÃæÁÙ¸üƵÈԵĹ¥»÷£¬£¬£¬£¬²¢¾¯Ê¾Õþ¸®ºÍÆóÒµÓ¦Ô½·¢¹Ø×¢ÍøÂçÇå¾²ºÍÌØ¹¤»î¶¯¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/
6. ¹ú¼ÊÖ´·¨Ðж¯¾Ð²¶3500ÃûÍøÂç·¸·¨ÏÓÒÉÈ˲¢»ñ3ÒÚÃÀÔª
19ÈÕýÌ屨µÀ£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯¾ÙÐеÄÒ»Ïî´úºÅΪ¡°HAECHI IV Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Ðж¯¾Ð²¶ÁË3500ÃûÍøÂç×ï·¸£¬£¬£¬£¬²¢²é»ñÁ˼ÛÖµ3ÒÚÃÀÔªµÄ×ʲú£¬£¬£¬£¬º«¹úÕþ¸®Ö÷µ¼ÁË HAECHI Ðж¯£¬£¬£¬£¬²¢ÓëÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢ÖйúÏã¸ÛºÍÓ¡¶ÈµÈ 34 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬×îеÄÐж¯±¬·¢ÔÚ 2023 Äê 7 ÔÂÖÁ 12 ÔÂʱ´ú£¬£¬£¬£¬Ä¿µÄÊÇ´ÓÊÂÓïÒôÍøÂç´¹ÂÚ¡¢Áµ°®Õ©Æ¡¢ÔÚÏßÐÔÀÕË÷¡¢Í¶×Êڲơ¢Óë²»·¨ÔÚÏ߶IJ©Ïà¹ØµÄÏ´Ç®¡¢ÉÌÒµµç×ÓÓʼþй¶ºÍµç×ÓÉÌÎñڲƵÄÍþвÐÐΪÕß¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/


¾©¹«Íø°²±¸11010802024551ºÅ