ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð
Ðû²¼Ê±¼ä 2022-05-201¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð
¾ÝýÌå5ÔÂ18ÈÕ±¨µÀ£¬£¬£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬£¬£¬5ÔÂ9ÈÕÆä²¿·ÖITϵͳ±¬·¢ÁËÖÐÖ¹£¬£¬£¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬£¬£¬¿ÉÄÜÔ´ÓÚÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ËäÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐ͸¶¹¥»÷µÄϸ½Ú£¬£¬£¬µ«Ñо¿Ö°Ô±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£¡£¡£¡£ÒøÐеÄÊÖÒÕ×ܼàÌåÏÖ£¬£¬£¬ËûÃÇÀֳɱ£»£»£»£»¤Á˽¹µãϵͳ£¬£¬£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/
2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢
5ÔÂ18ÈÕ£¬£¬£¬ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)¹ûÕæÁËÓйØ1Ô·ݷ¢Ã÷µÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚWebÓ¦ÓÃÖдæ±à³Ì´úÂë¹ýʧ£¬£¬£¬µ¼ÖÂÊܱ£»£»£»£»¤ÇøÓò¿ÉÒÔ±»»á¼û£¬£¬£¬Éæ¼°Áè¼Ý180Íò¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¾ÓÉÊÓ²ìÈ·¶¨£¬£¬£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂʱ´ú£¬£¬£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»ÍⲿְԱ»á¼û£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÓйØÎ£Ïպ͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹´ËǰÌåÏÖ£¬£¬£¬ÒѾÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/
3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ
Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2017Äê×îÏÈ»îÔ¾£¬£¬£¬ÔÚÈ¥ÄêÑ×ÌìÊ״α»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Í¨¹ý´¹ÂÚÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÎäÆ÷¿â°üÀ¨Òþ²ØÔÚÓÕ¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ³ÌÐò¡¢Òѱ£´æ¶àÄêÇÒÂÔ΢Ð޸ĵĺóÃÅ¡¢PlugXºÍ¶¨ÖƺóÃÅPcShare¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬£¬£¬ÒÔ¼°3¸öеÄÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£¡£¡£¡£¡£¡£¡£
https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/
4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%
5ÔÂ19ÈÕ£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÔÚÒÑÍùµÄ6¸öÔÂÖУ¬£¬£¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£¡£¡£¡£¡£¡£¡£XorDdosÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÖÆºÍ¼á³Ö³¤ÆÚÐÔµÄÕ½ÂÔ£¬£¬£¬Ê¹ÆäÄÑÒÔ±»É¨³ý¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯ÖÐÊӲ쵽£¬£¬£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½ÚÁýÕÖÃô¸ÐÎļþÀ´Òþ²Ø¶ñÒâ»î¶¯ÒÔ±ÜÃâ±»ÆÊÎö¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬³ýÁËÌᳫDDoS¹¥»÷Í⣬£¬£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬£¬ÈçºóÃÅTsunami¡£¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
5¡¢CISAºÍMS-ISACÐû²¼Ê¹ÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ
5ÔÂ18ÈÕ£¬£¬£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Á˹ØÓÚʹÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ¡£¡£¡£¡£¡£¡£¡£F5ÓÚ5ÔÂ4ÈÕÐû²¼ÁËÕë¶ÔÎó²îCVE-2022-1388µÄ²¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬½ñЧ¹ûÕæÁËPOCÎó²îʹÓ㬣¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØµã»ñµÃÄ¿µÄϵͳµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹ûÕæ±¨¸æ£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£Ç徲ͨ¸æÌṩÁËÎó²îµÄÊÖÒÕϸ½Ú¡¢¼ì²âÒªÁì¡¢ÊÂÎñÏìÓ¦»ººÍ½â²½·¥£¬£¬£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§Ê¹ÓøÃÖ¸ÄÏ×ÊÖú×éÖ¯µÖÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.cisa.gov/uscert/ncas/alerts/aa22-138a
6¡¢PRODAFTÐû²¼¹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ
PRODAFTÔÚ5ÔÂ16ÈÕÐû²¼Á˹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ£¬£¬£¬Õ¹ÏÖÁËÆä×éÖ¯½á¹¹ºÍÄîÍ·¡£¡£¡£¡£¡£¡£¡£Wizard SpiderµÄ´ó²¿·ÖÄ¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú£¬£¬£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛֵĿµÄ£¬£¬£¬²¢½«»ñµÃµÄ²¿·Ö×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹Âڻ£¬£¬£¬ÓÐʱҲʹÓÃBEC¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ò»µ©Àֳɣ¬£¬£¬¾Í»á×°ÖÃCobalt Strike£¬£¬£¬²¢ÊµÑé»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬£¬£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍÊðÀíÀ´Òþ²ØÆä×Ù¼££¬£¬£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºóÏÅ»£Ä¿µÄ£¬£¬£¬ÆÈʹÆä¸¶¿î¡£¡£¡£¡£¡£¡£¡£
https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/