ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£»£»£»£»£»£»Ó¡¶ÈIT¹«Ë¾NucleusѬȾеÄÀÕË÷Èí¼þBlackCocaine

Ðû²¼Ê±¼ä 2021-06-07

1.ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹


1.jpg


ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨¡£ ¡£¡£¡£¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬£¬£¬£¬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬£¬£¬£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬£¬£¬£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬£¬£¬£¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓᱡ£ ¡£¡£¡£¡£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬£¬£¬£¬£¬2019Äê9Ô£¬£¬£¬£¬£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html


2.Ó¡¶ÈIT¹«Ë¾NucleusѬȾеÄÀÕË÷Èí¼þBlackCocaine


2.jpg


Ó¡¶ÈNucleus Software ExportsѬȾеÄÀÕË÷Èí¼þBlackCocaine¡£ ¡£¡£¡£¡£¡£ÕâÊÇÒ»¼ÒÏòÒøÐкÍÁãÊÛµêÌṩ´û¿îÈí¼þµÄIT¹«Ë¾£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µ¼ÖÂÆäÍøÂç̱»¾ÒÔ¼°ÄÚ²¿ÉÌÒµÐÅÏ¢±»¼ÓÃÜ¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ­ÏòÃÏÂò֤ȯÉúÒâËù (BSE) ºÍÓ¡¶È¹ú¼Ò֤ȯÉúÒâËù (NSEI) ±¨¸æÁË´ËÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ¹¥»÷±¬·¢ÔÚ5ÔÂ30ÈÕ¡£ ¡£¡£¡£¡£¡£CybleÑо¿ÍŶӳƴ˴ι¥»÷À´×ÔÐÂÀÕË÷ÍÅ»ïBlackCocaine£¬£¬£¬£¬£¬£¬¶øNucleusÊÇËüµÄµÚÒ»¸öÊܺ¦Õߣ¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐδȷ¶¨¸Ã¶ñÒâÈí¼þµÄ³õʼѬȾǰÑÔ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118617/malware/blackcocaine-ransomware.html


3.INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ


3.jpg


ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ¡£ ¡£¡£¡£¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬£¬£¬£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬£¬£¬£¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬£¬£¬£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬£¬£¬£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/


4.ÎÚ¿ËÀ¼Çå¾²¾Ö³ÆÆäÒÑ×èÖ¹À´×Ô¶íÂÞ˹µÄ´ó¹æÄ£¹¥»÷»î¶¯


4.jpg


ÎÚ¿ËÀ¼Çå¾²¾ÖÅû¶ÔÚ½ñÄê6Ô³õ¶íÂÞ˹Áª°îÌØÇÚ¾Ö·Ö·¢¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯¡£ ¡£¡£¡£¡£¡£¸Ã»ú¹¹³Æ¹¥»÷Õß·¢ËÍÁË´ó×Ú¸ü¸ÄÁË·¢¼þÈ˵صãµÄÓʼþ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄ¹«¹²»ú¹¹¡¢µØ·½Õþ¸®ºÍÒªº¦»ù´¡ÉèÊ©µÄÍøÂç¡£ ¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ¿ÉÆô¶¯Ä¿µÄÅÌËã»úÉϵÄÔ¶³ÌÖÎÀí¹¤¾ß£¬£¬£¬£¬£¬£¬ÒÔÍêÈ«¿ØÖƸÃÅÌËã»ú¡£ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Çå¾²¾ÖÒѹûÕæÁ˴˴ι¥»÷µÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬ÈçIoC¡¢C2ЧÀÍÆ÷ºÍÓòÃûµÈ£¬£¬£¬£¬£¬£¬²¢½¨ÒéÏà¹Ø×éÖ¯¶Ôϵͳ¾ÙÐнôÆÈ¼ì²é£¬£¬£¬£¬£¬£¬²¢ÊµÊ±½ÓÄÉÔ¤·À²½·¥¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ssu.gov.ua/novyny/sbu-zablokuvala-masovu-kiberataku-spetssluzhb-rf-na-kompiuterni-merezhi-ukrainskykh-orhaniv-vlady


5.ESETÐû²¼2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


ESETÐû²¼ÁË2021Äê1Ôµ½4ÔÂÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚ½ñÄêµÄǰËĸöÔ£¬£¬£¬£¬£¬£¬COVID-19È»ÊÇÈ«ÇòÍ·ºÅÐÂÎÅ»°Ì⣬£¬£¬£¬£¬£¬RDPЭÒéÈÔÈ»ÊDZ©Á¦¹¥»÷µÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬£¬ÓйؼÓÃÜÇ®±ÒµÄÍþвÈÔÔÚÔöÌí£¬£¬£¬£¬£¬£¬AndroidÒøÐжñÒâÈí¼þµÄÊýÄ¿ÔÚ¼±¾çÔöÌí¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹ÆÊÎöÁËÒ»¸öÎó²îʹÓÃÁ´£¬£¬£¬£¬£¬£¬ËüÔÊÐí¹¥»÷Õß½ÓÊÜËùÓпɻá¼ûµÄExchangeЧÀÍÆ÷¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹°üÀ¨ÁËһЩ¹ØÓÚ APT×éÖ¯TurlaºÍLazarusµÄз¢Ã÷£¬£¬£¬£¬£¬£¬ÒÔ¼°ÇÔÈ¡ÒÑÔ½ÓüµÄiOS×°±¸Êý¾ÝµÄ¶ñÒâÈí¼þµÄÏà¹ØÐÅÏ¢¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2021/06/03/eset-threat-report-t12021/


6.ImpervaÐû²¼ÒÔ100ÆðÊý¾Ýй¶ÊÂÎñΪÌâµÄÆÊÎö±¨¸æ


6.jpg


ImpervaÐû²¼ÁËÒÔ100ÆðÊý¾Ýй¶ÊÂÎñΪÌâµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¡£±¨¸æÊÓ²ìÁËÒÑÍùÊ®ÄêÖÐ100ÆðÍ»³öµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÔÚÕâЩй¶ÊÂÎñÖÐÓÐ75.9%ÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡£ ¡£¡£¡£¡£¡£×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Êý¾Ýй¶ÊÂÎñµÄÊýĿÿÄê¶¼»áÔöÌí30%ÒÔÉÏ£¬£¬£¬£¬£¬£¬¶øÃ¿´ÎÊÂÎñËùй¶ÐÅÏ¢µÄÊýĿÿÄêÔöÌí130%ÒÔÉÏ¡£ ¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢µÄÊýĿƽ¾ùÿÄêÔöÌí224%¡£ ¡£¡£¡£¡£¡££¬£¬£¬£¬£¬£¬½ö2021Äê1Ô£¬£¬£¬£¬£¬£¬¾ÍÓÐÁè¼Ý8.7ÒÚÌõ¼Í¼±»Ð¹Â¶£¬£¬£¬£¬£¬£¬±È2017ÄêÕûÄêµÄй¶µÄ×ÜÊý»¹¶à¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.imperva.com/resources/resource-library/white-papers/lessons-learned-from-analyzing-100-data-breaches/