Ñо¿Ö°Ô±Ðû²¼¹¥»÷Ó¡¶ÈºËµçÕ¾µÄ¶ñÒâÑùÌìÖ°Îö±¨¸æ £»£»£»¼ÓÄôóÒþ˽± £»£»£»¤·¨¹«²¼Ò»ÄêºóÊÂÎñ±¨¸æÔöÌíÖÁÁù±¶

Ðû²¼Ê±¼ä 2019-11-05
1¡¢Ñо¿Ö°Ô±Ðû²¼¹¥»÷Ó¡¶ÈºËµçÕ¾µÄ¶ñÒâÑùÌìÖ°Îö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ç徲ר¼ÒMarco Ramilli¼°ÆäÍŶӯÊÎöÁËѬȾӡ¶ÈKudankulamºËµçÕ¾µÄ¶ñÒâÑù±¾¡£¡£¡£¡£¸ÃÑù±¾ÓÚ10ÔÂ28ÈÕ±»ÉÏ´«ÖÁVirus Total£¬£¬£¬£¬£¬ÊÇÒ»¸ö±àÒëÓÚ2019-07-29 13:36:26µÄ32λPEÎļþ£¬£¬£¬£¬£¬ËüÔÚÔËÐкóÖ´ÐÐÈý¸öÖ÷Òª²Ù×÷£¬£¬£¬£¬£¬°üÀ¨µ¼È빦ЧÄ£¿£¿£¿£¿é¡¢ÍøÂçÍâµØÐÅÏ¢¼°·¢ËÍÖÁÖÐÑë½Úµã¡£¡£¡£¡£¸ÃÑù±¾ÍøÂçµÄÐÅÏ¢°üÀ¨ÍâµØIPµØµã¡¢Ê¹ÃüÁÐ±í¡¢Â·ÓɺͽӿÚÐÅÏ¢ÒÔ¼°Ô¤Éè´æ´¢ÔÚϵͳijЩ¾íÖеÄÈí¼þ¡£¡£¡£¡£ÕâЩÐÅÏ¢×îºó±»·¢Ë͵½10.38.1.35£¬£¬£¬£¬£¬ÔÚ´úÂëÖгÆÎªcontroller5kk¡£¡£¡£¡£RamilliÈ·ÈϸÃÑù±¾ÊǶ¨ÖÆ»¯µÄDTrack¶ñÒâÈí¼þ¡£¡£¡£¡£
   ¡¢Ô­ÎÄÁ´½Ó£º
https://marcoramilli.com/2019/11/04/is-lazarus-apt38-targeting-critical-infrastructures/

2¡¢Î÷°àÑÀÁ½¼Ò¹«Ë¾ÔâÕë¶ÔÐÔÀÕË÷Èí¼þ¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Î÷°àÑÀ×î´óµÄÎÞÏßµçÍøÂçCadena SERºÍIT×Éѯ¹«Ë¾EverisÔâÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£Î÷°àÑÀ¹ú¼ÒÇå¾²¾ÖÔÚÊÂÎñ±¬·¢ºóÊýСʱÄÚÐû²¼ÁËÇ徲ͨ¸æ£¬£¬£¬£¬£¬ÖÒÑÔ¹«Ë¾¸ÄÉÆÍøÂçÇå¾²²½·¥²¢±Þ²ßÆäËûÊܺ¦ÕßÏòINCIBE×·Çó×ÊÖú¡£¡£¡£¡£¾ÝÎ÷°àÑÀÍøÂçÇå¾²ÕÕÁϳÆ£¬£¬£¬£¬£¬Everis±»¼ÓÃܵÄÎļþÀ©Õ¹ÃûΪ.3v3r1s£¬£¬£¬£¬£¬ÕâÅú×¢¸Ã¹¥»÷¾ßÓкÜÇ¿µÄÕë¶ÔÐÔ¡£¡£¡£¡£¹¥»÷ÕßÒªÇóEverisÖ§¸¶75ÍòÅ·Ôª£¨83.5ÍòÃÀÔª£©µÄÊê½ð¡£¡£¡£¡£VirusTotalÊ×´´ÈËÖ¸³ö¸ÃÀÕË÷Èí¼þ¿ÉÄÜÊÇBitPaymer/IEncrypt¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúCadena SERÊÇ·ñΪͳһÀÕË÷Èí¼þµÄ¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/11/everis-spain-ransomware-attack.html

3¡¢·ðÂÞÀï´ïÖݰ¿¨À­ÊÐÊÜBECÕ©Æ­Ëðʧ74.2ÍòÃÀÔª

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

·ðÂÞÀï´ïÖݵİ¿¨À­ÊгÉΪBECÕ©Æ­µÄ×îÐÂÊܺ¦Õߣ¬£¬£¬£¬£¬Ú²Æ­Õß´Ó¸ÃÊÐÆ­×ßÁËÁè¼Ý74.2ÍòÃÀÔª¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ9Ô·Ý£¬£¬£¬£¬£¬Ú²Æ­Õßαװ³ÉÔڰ¿¨À­¹ú¼Ê»ú³¡ÖÆ×÷к½Õ¾Â¥µÄÐÞ½¨¹«Ë¾Ausley ConstructionµÄÒ»ÃûÔ±¹¤£¬£¬£¬£¬£¬Ïò¸ÃÊеĸ߼¶»á¼ÆÖ°Ô±·¢ËÍÁ˰üÀ¨Â·ÓɺÅÂë¡¢ÒøÐÐÕË»§ÒÔ¼°Ò»ÕÅÎÞЧ֧Ʊ¸±±¾µÄµç×ÓÓʼþ¡£¡£¡£¡£¸ÃÓʼþÀ´×ÔÓÚausleyconstructions.com£¬£¬£¬£¬£¬¶øÕæÊµµÄµØµãĩβûÓÐs¡£¡£¡£¡£µ±Ausley ConstructionÔÚ10ÔÂ22ÈÕ֪ͨ¸ÃÊиÿî×ÓÉÐδ֧¸¶Ê±£¬£¬£¬£¬£¬°Â¿¨À­Êвŷ¢Ã÷Ç®±»»ãÈëÁËڲƭÕßµÄÒøÐÐÕË»§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bec-fraudsters-divert-742-000-from-ocala-city-in-florida/

4¡¢NunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ËùÓÐÕþ¸®µ¥Î»¾ùÊÜÓ°Ïì


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¼ÓÄôóNunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ËùÓÐÕþ¸®µ¥Î»¾ùÊÜÓ°Ï죬£¬£¬£¬£¬Õþ¸®¹ÙÔ±ÌåÏÖÉÐÎÞ·¨Ô¤¼ÆÐ§ÀͺÎʱ»Ö¸´ÉÏÏß¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚÖÜÁùÔ糿£¬£¬£¬£¬£¬ÍâµØÕþ¸®µÄËùÓеç×ÓÐÅϢϵͳ¾ùÊÜÓ°Ï죬£¬£¬£¬£¬Ô±¹¤ÎÞ·¨µÇ¼ÆäÕþ¸®ÕË»§£¬£¬£¬£¬£¬µç»°ÏµÍ³Ò²ÎÞ·¨Ê¹Ó㬣¬£¬£¬£¬µ«¸ÃµØÇøµÄѧУδÊÜÓ°Ïì¡£¡£¡£¡£Õþ¸®¹ÙÔ±ÌåÏÖÄ¿½ñÉÐûÓжÔСÎÒ˽¼ÒÐÅÏ¢»òÒþ˽Êý¾Ýй¶µÄµ£ÐÄ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.cbc.ca/news/canada/north/nunavut-government-ransomware-1.5346144

5¡¢¼ÓÄôóÒþ˽± £»£»£»¤·¨¹«²¼Ò»ÄêºóÊÂÎñ±¨¸æÔöÌíÖÁÁù±¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¼ÓÄôó¡¶Ð¡ÎÒ˽¼ÒÐÅÏ¢± £»£»£»¤ºÍµç×ÓÎļþ·¨¡·£¨PIPEDA£©ÓÚ2018Äê11ÔÂ1ÈÕÆðʵÑ飬£¬£¬£¬£¬Æ¾Ö¤¸ÃÖ´·¨£¬£¬£¬£¬£¬ÊÜÔ¼ÊøµÄÆóÒµ±ØÐèÏòÒþ˽רԱ°ì¹«ÊÒ£¨OPC£©±¨¸æÊý¾Ýй¶ÊÂÎñ²¢Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£ÔÚÒÑÍùµÄ12¸öÔÂÖУ¬£¬£¬£¬£¬¼ÓÄôóÊý¾Ýй¶±¨¸æµÄÊýÄ¿ÃÍÔö£¬£¬£¬£¬£¬OPC¹²ÊÕµ½ÁË680·Ý±¨¸æ£¬£¬£¬£¬£¬ÊǸÃÖ´·¨ÉúЧǰ12¸öÔÂÄÚÌá½»±¨¸æÊýÄ¿µÄÁù±¶¡£¡£¡£¡£Æ¾Ö¤ÕâЩ±¨¸æ£¬£¬£¬£¬£¬ÊÜÊý¾Ýй¶ӰÏìµÄ¼ÓÄÃÖÁ¹«ÃñÊýĿԶԶÁè¼Ý2800Íò£¬£¬£¬£¬£¬±¨¸æµÄ´ó´ó¶¼Î¥¹æÊÂÎñ£¨58£¥£©É漰δ¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.priv.gc.ca/en/blog/20191031/

6¡¢2019ÄêÖÁÉÙ13¼ÒÍйÜЧÀÍÉ̱»ÓÃÓÚÍÆËÍÀÕË÷Èí¼þ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ÍþвÇ鱨³§ÉÌArmorÐû²¼µÄÒ»·Ýб¨¸æ£¬£¬£¬£¬£¬2019ÄêÖÁÉÙÓÐ13¼ÒÍйÜЧÀÍÉÌ£¨MSP£©±»ºÚ¿ÍÓÃÓÚÍÆËÍÀÕË÷Èí¼þ¡£¡£¡£¡£Ò»µ©ºÚ¿ÍÈëÇÖMSPµÄÍøÂ磬£¬£¬£¬£¬ËûÃǾͿÉÒÔʹÓÃÔ¶³Ì»á¼û¹¤¾ß½«ÀÕË÷Èí¼þ°²Åŵ½Êý°Ù¼Ò¹«Ë¾/Êýǧ̨ÅÌËã»úÉÏ¡£¡£¡£¡£¸ÃÁбí°üÀ¨ApexÈËÁ¦×ÊÔ´ÖÎÀí¡¢CloudJumper¡¢IT By Design¡¢MetroList¡¢CorVel¡¢PM Consultants¡¢iNSYNQ¡¢TSM Consulting¡¢PerCSoft¡¢SCHOOLinSITES¡¢TrialWorks¡¢BillTrustÒÔ¼°Ò»¼Òδ֪µÄMSP¡£¡£¡£¡£ArmorÌåÏÖ¿ÉÄÜÉÐÓиü¶àµÄMSPÈëÇÖÊÂÎñδ±»±¨¸æ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/at-least-13-managed-service-providers-were-used-to-push-ransomware-this-year/