ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
Ðû²¼Ê±¼ä 2023-12-211.ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß
¾ÝýÌå20ÈÕ±¨µÀ£¬£¬£¬Áª°îÊÓ²ì¾ÖÐû²¼µ·»ÙÀÕË÷Èí¼þÍÅ»ï ALPHV£¬£¬£¬Õþ¸®Óë°Ä´óÀûÑÇ¡¢°ÂµØÀû¡¢µ¤Âó¡¢Î÷°àÑÀ¡¢ÈðÊ¿ºÍÓ¢¹úµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬ALPHV ¾³£×·Çó¼ÓÃÜÇ®±Ò×éÖ¯ÍøÂçÖÐ×îÃô¸ÐµÄÊý¾Ý¡£¡£¡£¡£¡£ËûÃÇÍþв˵£¬£¬£¬ÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬ËûÃǽ«ÎÞ·¨»á¼ûÕâЩÐÅÏ¢£¬£¬£¬²¢Ðû²¼Î´¼ÓÃܵĿɶÁ°æ±¾¡£¡£¡£¡£¡£ÈôÊDz»¸¶¿î£¬£¬£¬ºÚ¿Í¾Í»áÔÚ°µÍøÍøÕ¾ÉÏÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬£¬£¬×éÖ¯¿ÉÒÔʹÓøù¤¾ß½âÃÜ ALPHV ÀÕË÷Èí¼þ¡£¡£¡£¡£¡£Æù½ñΪֹ£¬£¬£¬FBI ¼°ÆäÖ´·¨ÏàÖúͬ°éÒÑÏò 500 ¶àÃûÊܺ¦ÕßÌṩÁËÕâЩ¹¤¾ß£¬£¬£¬×ÊÖúËûÃÇ×èÖ¹ÁËÔ¤¼Æ 6800 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£
https://www.securityweek.com/us-gov-disrupts-blackcat-ransomware-operation-fbi-releases-decryption-tool/
2. SymantecÅû¶SeedwormÕë¶Ô·ÇÖÞµçÐÅÐÐÒµµÄ¹¥»÷
19ÈÕ£¬£¬£¬SymantecµÄÍþвÇ鱨ÍŶÓÐû²¼ÁËһƪÓйØÒÁÀÊAPT×éÖ¯SeedwormµÄ±¨¸æ£¬£¬£¬Seedworm£¨ÓÖÃû Muddywater£©Ò»Ö±½«°£¼°¡¢ËÕµ¤ºÍ̹ɣÄáÑǵçÐÅÐÐÒµµÄ×éÖ¯×÷ΪĿµÄ¡£¡£¡£¡£¡£Ö¸³ö¸Ã×éÖ¯ÕýÔÚÒÔÀûÒæÏà¹ØÎªÃûÔÚ·ÇÖÞµØÇøµÄµçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹¾ÙÐй¥»÷¡£¡£¡£¡£¡£SeedwormʹÓÃÊ¢ÐеÄOffTheShelf¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þMimikatzºÍPoweliksÀ´Öª×ãÆäÌØ¹¤»î¶¯µÄÐèÇ󡣡£¡£¡£¡£ËûÃǶÔÌØ¶¨¹¤¾ß¾ÙÐмàÊÓºÍÇÔÈ¡²Ù×÷ϵͳ¡¢Ó¦ÓóÌÐòºÍÍøÂçÆ¾Ö¤£¬£¬£¬Í¬Ê±Ò²»á×Ô¶¯»¯Êý¾ÝÍøÂçºÍÇé±¨ÍøÂçÊÂÇé¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms
3. IBM·¢Ã÷ʹÓÃWeb×¢ÈëÕë¶ÔÎ÷Å·µÈµØ40¶à¼ÒÒøÐеĻ
19ÈÕýÌ屨µÀ£¬£¬£¬IBM Security Trusteer µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ Danabot µÄ¶ñÒâÈí¼þ½üÆÚÔÚ°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÒøÐÐÖзºÆð¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔͨ¹ýÍøÂç×¢Èë¹¥»÷ÇÔÈ¡Óû§µÄÒøÐÐÆ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£½üÄêÀ´ÕâÀ๥»÷·½·¨ÓÐËùïÔÌ£¬£¬£¬µ«×î½ü Web ×¢Èë¹¥»÷ÓÖÖØÐ·ºÆð¡£¡£¡£¡£¡£×¨¼ÒÃÇÒÔΪÕâÖÖ¹¥»÷»áÒ»Á¬ÔöÌí£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËɵػñÈ¡´ó×ÚСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£¡£½¨ÒéÓû§ÔÚʹÓÃÒøÐÐÓ¦ÓóÌÐòʱӦ¼á³ÖСÐÄ¡£¡£¡£¡£¡£Õâ°üÀ¨ÕË»§ÉÏDZÔڵĿÉÒɻ¡¢²»´Óδ֪ȪԴÏÂÔØÈí¼þÒÔ¼°×ñÕÕÖØ´óÃÜÂëµÄÔÔòºÍµç×ÓÓʼþÇå¾²µÈ¡£¡£¡£¡£¡£
https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
4. Ñо¿Ö°Ô±ÑÝʾ½µµÍOpenSSHÅþÁ¬Çå¾²ÐÔµÄTerrapin¹¥»÷
19ÈÕ±¨µÀ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͹¥»÷·½·¨£¬£¬£¬ÃûΪTerrapin£¬£¬£¬¿ÉÒÔͨ¹ý¸Ä¶¯×èÁ¦ÒÔ¼°½µ¼¶Çå¾²ÐÒéµÄ·½·¨£¬£¬£¬½µµÍOpenSSHÅþÁ¬µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£Terrapin¹¥»÷ʹÓÃSSHÐÒéµÄȱÏÝ£¬£¬£¬½èÖúÅÌËã»úÍøÂç´ø¿íÖÎÀíÈí¼þtcµÄ"¡°ÑÓ³ÙºÍÑÓ³Ù²ü¶¶(Delay and Jitter)"¹¦Ð§¶ÔÍøÂçÅþÁ¬¾ÙÐе÷½â£¬£¬£¬´Ó¶ø½µµÍSSHÅþÁ¬µÄÇå¾²±ê×¼¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã¹¥»÷×î´óµÄÒòËØÊÇ MiTM£¬£¬£¬ÕâʹµÃ Terrapin µÄÍþв²»ÄÇôÑÏÖØ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/
5. ESETÐû²¼¹ØÓÚ2023ÄêϰëÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ
19ÈÕÔÚESETÐû²¼µÄ2023ÄêϰëÄêÍþв±¨¸æÖÐÖ¸³ö£¬£¬£¬2023ÄêϰëÄêÍøÂç·¸·¨»î¶¯µÄÊýÄ¿ºÍÖØÆ¯ºó½«½øÒ»²½ÔöÌí¡£¡£¡£¡£¡£Cl0p ÊÇÒ»¸öÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬ÒÔ´ó¹æÄ£ÊµÑéÀÕË÷Èí¼þ¹¥»÷¶øÖøÃû£¬£¬£¬Ëüͨ¹ýÆÕ±éµÄ¡°MOVEit ºÚ¿Í¹¥»÷¡±ÒýÆðÁËÈËÃǵĹØ×¢£¬£¬£¬µ«ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬¸ÃºÚ¿Í¹¥»÷²¢Î´Éæ¼°ÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£ÔÚÎïÁªÍøÁìÓò£¬£¬£¬¸ú×Ù¼à¿ØMozi IoT ½©Ê¬ÍøÂ磬£¬£¬ÒÔ¼° Android ÌØ¹¤Èí¼þ°¸ÀýÏÔÖøÔöÌí£¬£¬£¬ÕâÖ÷Òª¹éÒòÓÚ SpinOk ÌØ¹¤Èí¼þµÄ±£´æ¡£¡£¡£¡£¡£±¨¸æ»¹ÖÒÑÔ˵£¬£¬£¬ÐéÄâÇ®±ÒÉúÒâËù¿ÉÄÜÃæÁÙ¸üƵÈԵĹ¥»÷£¬£¬£¬²¢¾¯Ê¾Õþ¸®ºÍÆóÒµÓ¦Ô½·¢¹Ø×¢ÍøÂçÇå¾²ºÍÌØ¹¤»î¶¯¡£¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/
6. ¹ú¼ÊÖ´·¨Ðж¯¾Ð²¶3500ÃûÍøÂç·¸·¨ÏÓÒÉÈ˲¢»ñ3ÒÚÃÀÔª
19ÈÕýÌ屨µÀ£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯¾ÙÐеÄÒ»Ïî´úºÅΪ¡°HAECHI IV Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Ðж¯¾Ð²¶ÁË3500ÃûÍøÂç×ï·¸£¬£¬£¬²¢²é»ñÁ˼ÛÖµ3ÒÚÃÀÔªµÄ×ʲú£¬£¬£¬º«¹úÕþ¸®Ö÷µ¼ÁË HAECHI Ðж¯£¬£¬£¬²¢ÓëÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢ÖйúÏã¸ÛºÍÓ¡¶ÈµÈ 34 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬×îеÄÐж¯±¬·¢ÔÚ 2023 Äê 7 ÔÂÖÁ 12 ÔÂʱ´ú£¬£¬£¬Ä¿µÄÊÇ´ÓÊÂÓïÒôÍøÂç´¹ÂÚ¡¢Áµ°®Õ©Æ¡¢ÔÚÏßÐÔÀÕË÷¡¢Í¶×Êڲơ¢Óë²»·¨ÔÚÏ߶IJ©Ïà¹ØµÄÏ´Ç®¡¢ÉÌÒµµç×ÓÓʼþй¶ºÍµç×ÓÉÌÎñڲƵÄÍþвÐÐΪÕß¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/