CoralRaider¶ñÒâÈí¼þ»î¶¯Ê¹ÓÃCDN»º´æÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò
Ðû²¼Ê±¼ä 2024-04-254ÔÂ24ÈÕ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Ò»ÖÖеÄÒ»Á¬¶ñÒâÈí¼þ»î¶¯ÕýÔÚ·Ö·¢ÈýÖÖ²î±ðµÄÇÔÈ¡³ÌÐò£¬£¬£¬ÀýÈçÍйÜÔÚÄÚÈݽ»¸¶ÍøÂç (CDN) »º´æÓòÉϵÄCryptBot¡¢LummaC2ºÍRhadamanthys ¡£¡£¡£Ë¼¿Æ Talos ½«´Ë´Î»î¶¯¹éÒòÓÚ±»×·×ÙΪCoralRaiderµÄÍþвÐÐΪÕߣ¬£¬£¬¸Ã×éÖ¯ÒÉËÆÔ´×ÔÔ½ÄÏ£¬£¬£¬ÓÚ½üÆÚÆØ¹â¡£¡£¡£¸Ã»î¶¯µÄÄ¿µÄº¸Ç¸÷¸öµØÇøµÄ¸÷¸öÉÌÒµ±ÊÖ±ÁìÓò£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢ÄáÈÕÀûÑÇ¡¢°Í»ù˹̹¡¢¶ò¹Ï¶à¶û¡¢µÂ¹ú¡¢°£¼°¡¢Ó¢¹ú¡¢²¨À¼¡¢·ÆÂɱö¡¢Å²Íþ¡¢ÈÕ±¾¡¢ÐðÀûÑǺÍÍÁ¶úÆä¡£¡£¡£¹¥»÷Á´Éæ¼°Óû§Í¨¹ýÍøÂçä¯ÀÀÆ÷ÏÂÔØÎ±×°³ÉÓ°Ï·ÎļþµÄÎļþ£¬£¬£¬´Ó¶øÔöÌíÁË´ó¹æÄ£¹¥»÷µÄ¿ÉÄÜÐÔ¡£¡£¡£¸Ã»î¶¯ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ËüʹÓÃÁË CryptBot µÄ¸üа汾£¬£¬£¬ÆäÖаüÀ¨Ðµķ´ÆÊÎöÊÖÒÕ£¬£¬£¬²¢ÇÒ»¹²¶»ñÃÜÂëÖÎÀíÆ÷Ó¦ÓóÌÐòÊý¾Ý¿âºÍÉí·ÝÑéÖ¤Æ÷Ó¦ÓóÌÐòÐÅÏ¢¡£¡£¡£
https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
2. Change Healthcare×îÖÕÖ§¸¶Êê½ð½«ÃæÁÙÊý¾Ýй¶µÄΣº¦
4ÔÂ24ÈÕ£¬£¬£¬ÔÚÀÕË÷Èí¼þ±ÀÀ£¿£¿£¿£×îÏÈÁ½¸ö¶àÔº󣬣¬£¬ÀÕË÷Èí¼þµÄÓ°Ïì¿°³ÆÍøÂçÇ徲ʷÉÏ×îÑÏÖØµÄÒ»´Î£¬£¬£¬Ò½Áƹ«Ë¾ Change Healthcare ÖÕÓÚ֤ʵÁËÍøÂç·¸·¨·Ö×Ó¡¢Çå¾²Ñо¿Ö°Ô±ºÍ±ÈÌØ±ÒÇø¿éÁ´ÒѾ˵µÃºÜÇåÎúµÄÊÂÇ飺Ëüȷʵ×öµ½ÁËÏòÖÙ´º·ÝÏ®»÷¸Ã¹«Ë¾µÄºÚ¿ÍÖ§¸¶Êê½ð¡£¡£¡£È»¶ø£¬£¬£¬ËüÈÔÈ»ÃæÁÙ×Åɥʧ´ó×Ú¿Í»§Ãô¸ÐÒ½ÁÆÊý¾ÝµÄΣº¦¡£¡£¡£Change Healthcare ËÆºõÒÑÓÚ 3 Ô 1 ÈÕÖ§¸¶ÁËÊê½ð£¬£¬£¬²¢Ö¸³öÒ»±Ê 350 ±ÈÌØ±Ò£¨Ô¼ºÏ 2200 ÍòÃÀÔª£©µÄÉúÒâ±»·¢Ë͵½Óë AlphV ºÚ¿ÍÏà¹ØµÄ¼ÓÃÜÇ®°üÖС£¡£¡£Õâ±ÊÉúÒâÊ×ÏÈÔÚÃûΪ RAMP µÄ¶íÂÞË¹ÍøÂç·¸·¨ÂÛ̳ÉϵÄÒ»ÌõÐÂÎÅÖлñµÃÇ¿µ÷£¬£¬£¬ÆäÖÐһλ¾Ý³Æ±» AlphV ÑïÆúµÄÏàÖúͬ°éËß¿à˵£¬£¬£¬ËûÃÇûÓÐÊÕµ½ Change Healthcare ¸¶¿îÖеķֳɡ£¡£¡£
https://news.hitb.org/content/change-healthcare-finally-admits-it-paid-ransomware-hackers-and-still-faces-patient-data
3. Î÷°àÑÀÖØÐÂÆô¶¯¶Ô Pegasus ÌØ¹¤Èí¼þ°¸¼þµÄÊÓ²ì
4ÔÂ23ÈÕ£¬£¬£¬Î÷°àÑÀ¹ú¼Ò·¨Ôº·¨¹ÙÌåÏÖ£¬£¬£¬ÓÐÀíÓÉÏàÐÅ·¨¹úÌṩµÄÐÂÐÅÏ¢¿ÉÒÔ¡°ÈÃÊÓ²ìÈ¡µÃÏ£Íû¡±¡£¡£¡£ÕâÁ½ÏîÊÓ²ì¾ùÉæ¼°ÉæÏÓʹÓÃÒÔÉ«ÁÐ NSO ¼¯ÍÅ¿ª·¢µÄ Pegasus ÌØ¹¤Èí¼þ¡£¡£¡£Ìع¤Èí¼þ»áÇÄÇĵØÉøÍ¸µ½ÊÖ»ú»òÆäËû×°±¸ÖÐÒÔÍøÂçÊý¾Ý²¢¿ÉÄܼàÊÓÆäËùÓÐÕß¡£¡£¡£NSO Éù³Æ£¬£¬£¬Ëü½öÌṩӦÕþ¸®ÓÃÓÚ¹¥»÷¿Ö²ÀÖ÷ÒåºÍÆäËûÇå¾²Íþв¡£¡£¡£Æ¾Ö¤Çå¾²Ñо¿Ö°Ô±ºÍ 2021 ÄêÈ«ÇòýÌåÊӲ죬£¬£¬Pegasus Òѱ»ÓÃÀ´¹¥»÷ 50 ¸ö¹ú¼ÒµÄ 1,000 ¶àÈË£¬£¬£¬ÆäÖаüÀ¨»î¸ÐÈËÊ¿ºÍ¼ÇÕß¡£¡£¡£Î÷°àÑÀÓÚ 2022 Äê 5 ÔÂÐû²¼£¬£¬£¬Ô׺âÅåµÂÂÞ¡¤É£ÇÐ˹¼°ÆäÈýÃû²¿³¤£¬£¬£¬°üÀ¨¹ú·À²¿³¤ºÍÄÚÕþ²¿³¤£¬£¬£¬ÒѳÉΪPegasus ÌØ¹¤Èí¼þµÄÄ¿µÄ¡£¡£¡£Óɴ˱¬·¢µÄ˾·¨ÊÓ²ìÒòδÄÜÈ¡µÃЧ¹û¶øÔÝʱÆú¾è¡£¡£¡£
https://www.securityweek.com/spain-reopens-a-probe-into-a-pegasus-spyware-case-after-a-french-request-to-work-together/
4. ºÚ¿ÍÐ®ÖÆ·À²¡¶¾¸üÐÂÒÔ·Ö·¢ºóÃźÍÍÚ¿óGuptiMiner
4ÔÂ23ÈÕ£¬£¬£¬³¯ÏʺڿÍÒ»Ö±ÔÚʹÓà eScan ·À²¡¶¾Èí¼þµÄ¸üлúÖÆÔÚ´óÐÍÆóÒµÍøÂçÉÏÖ²ÈëºóÃÅ£¬£¬£¬²¢Í¨¹ý GuptiMiner ¶ñÒâÈí¼þÈö²¥¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£Ñо¿Ö°Ô±½« GuptiMiner ÐÎòΪ¸ß¶ÈÖØ´óµÄÍþв£¬£¬£¬Ëü¿ÉÒÔÏò¹¥»÷ÕßµÄ DNS ЧÀÍÆ÷Ö´ÐÐ DNS ÇëÇ󣬣¬£¬´ÓͼÏñÖÐÌáÈ¡ÓÐÓøºÔØ£¬£¬£¬¶ÔÆäÓÐÓøºÔؾÙÐÐÊðÃû£¬£¬£¬²¢Ö´ÐÐ DLL ²àÃæ¼ÓÔØ¡£¡£¡£GuptiMiner ±³ºóµÄÍþвÐÐΪÕß¾ßÓÐÖÐÐĵÐÊÖ (AitM) µÄְ룬£¬£¬¿ÉÒÔÐ®ÖÆÕý³£µÄ²¡¶¾½ç˵¸üаü£¬£¬£¬²¢½«ÆäÌæ»»ÎªÃûΪ¡°updll62.dlz¡±µÄ¶ñÒâ°ü¡£¡£¡£¸Ã¶ñÒâÎļþ°üÀ¨ÐëÒªµÄ·À²¡¶¾¸üÐÂÒÔ¼°ÃûΪ¡°version.dll¡±µÄ DLL ÎļþÐÎʽµÄ GuptiMiner ¶ñÒâÈí¼þ¡£¡£¡£eScan ¸üгÌÐòÕý³£´¦Öóͷ£¸Ã°ü£¬£¬£¬½âѹ²¢Ö´ÐÐËü¡£¡£¡£Ôڴ˽׶Σ¬£¬£¬DLL ÓÉ eScan µÄÕýµ±¶þ½øÖÆÎļþÅÔ¼ÓÔØ£¬£¬£¬´Ó¶ø¸¶Óë¶ñÒâÈí¼þϵͳ¼¶È¨ÏÞ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-hijack-antivirus-updates-to-drop-guptiminer-malware/
5. Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Ãé×¼º«¹ú¹ú·À³Ð°üÉÌ
4ÔÂ23ÈÕ£¬£¬£¬º«¹ú¹ú¼Ò¾¯Ô±ÌüÖÒÑԳƣ¬£¬£¬Ó볯ÏÊÓйصÄÍþвÐÐΪÕßÕýÒÔ¹ú·À¹¤ÒµÊµÌåΪĿµÄ£¬£¬£¬ÇÔÈ¡¹ú·ÀÊÖÒÕÐÅÏ¢¡£¡£¡£¾Ýº«¹ú¹ú¼Ò¾¯Ô±Ìü±¨µÀ£¬£¬£¬Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Lazarus¡¢AndarielºÍKimsuky¹¥»÷Á˺«¹ú¶à¼Ò¹ú·ÀÏà¹ØµÄ¹«Ë¾¡£¡£¡£¾¯Ô±ÌüºÍ¹ú·À²É¹ºÍýÏëÖÎÀí¾Ö£¨DAPA£©¶ÔÄ¿µÄ×éÖ¯µÄÇéÐξÙÐÐÁËһϵÁÐÌØÊâ¼ì²é¡£¡£¡£ÁªºÏ¼ì²éÓÚ1ÔÂ15ÈÕÖÁ2ÔÂ16ÈÕ¾ÙÐУ¬£¬£¬ÊÜÓ°Ïì×é֯ʵÑéÁË·À»¤²½·¥¡£¡£¡£¾¯·½ÌåÏÖ£¬£¬£¬ÕâЩϮ»÷ÊÇÒÔÖÜȫսÕùµÄÐÎʽ¾ÙÐе쬣¬£¬¶à¸ö APT ×éÖ¯¼ÓÈëÆäÖС£¡£¡£Õþ¸®×¨¼ÒÖÒÑÔ˵£¬£¬£¬¹¥»÷Õß½ÓÄÉÁËÖØ´óµÄºÚ¿ÍÊÖÒÕ¡£¡£¡£º«¹ú¹ú¼Ò¾¯Ô±ÌüÌṩÁ˲î±ð APT ×é֯ʵÑéµÄ¶à´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£
https://securityaffairs.com/162193/apt/north-korea-south-korean-defense-contractors.html
6. ÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°¶à¼Ò»ú¹¹µÄϵͳÔâµ½ºÚ¿Í¹¥»÷
4ÔÂ23ÈÕ£¬£¬£¬ËÄÃûÒÁÀʺڿÍÔÚÂü¹þ¶ÙÁª°î·¨Ôº±»ÆðËߣ¬£¬£¬±»Ö¸¿ØÕë¶ÔÃÀ¹úÕþ¸®²¿·Ö¡¢¹ú·À³Ð°üÉ̺Í˽Ӫ¹«Ë¾¿ªÕ¹ÖØ´óµÄÍøÂçÌØ¹¤»î¶¯¡£¡£¡£ÏÖÔÚÈÔÔÚÌӵı»¸æ±»Ö¸¿ØÕë¶ÔÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°Ê®¼¸¼ÒÄܹ»»ñÈ¡¹ú·ÀÏà¹ØÐÅÏ¢µÄÃÀ¹ú˽Ӫ¹«Ë¾µÄÒªº¦ÏµÍ³¾ÙÐй¥»÷¡£¡£¡£Ë¾·¨²¿Ö¸ÔðºÚ¿ÍʹÓÃÌØÁíÍâÉç»á¹¤³ÌÊÖÒÕ£¬£¬£¬°üÀ¨Ã°³äÅ®ÐÔÀ´»ñÈ¡Êܺ¦ÕßµÄÐÅÈΡ£¡£¡£Æ¾Ö¤Î´ÃÜ·âµÄÆðËßÊ飬£¬£¬¸ÃºÚ¿Í×éÖ¯µÄ¹¥»÷µÄÊܺ¦ÕßÖ÷ÒªÊǾÓÉÔÊÐíµÄ¹ú·À³Ð°üÉÌ£¬£¬£¬ÕâЩ¹«Ë¾ÒÑ»ñµÃÃÀ¹ú¹ú·À²¿µÄÇå¾²ÔÊÐí£¬£¬£¬¿ÉÒÔ»á¼û¡¢ÎüÊպʹ洢ÉñÃØÐÅÏ¢¡£¡£¡£¸Ã×éÖ¯»¹±»Ö¸¿ØÕë¶ÔÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄ»á¼ÆÊ¦ÊÂÎñËùºÍÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄÂùݹ«Ë¾¡£¡£¡£ÔÚÆðËßÊéÆô·âµÄͬʱ£¬£¬£¬ÃÀ¹ú¹úÎñÔº»¹Ðû²¼ÐüÉÍ 1000 ÍòÃÀÔª£¬£¬£¬½±ÀøÌṩÏßË÷×¥»ñËûÃÇ£¬£¬£¬²ÆÎñ²¿»¹¶ÔÉæ°¸Ð¡ÎÒ˽¼ÒʵÑéÁËÖÆ²Ã¡£¡£¡£
https://www.securityweek.com/10-million-bounty-on-iranian-hackers-for-cyber-attacks-on-us-gov-defense-contractors/


¾©¹«Íø°²±¸11010802024551ºÅ