ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß

Ðû²¼Ê±¼ä 2023-12-21

1.ÃÀ¹úÕþ¸®Ðû²¼Òѵ·»ÙÀÕË÷ÍÅ»ïALPHV²¢Ðû²¼½âÃܹ¤¾ß


¾ÝýÌå20ÈÕ±¨µÀ£¬£¬£¬Áª°îÊÓ²ì¾ÖÐû²¼µ·»ÙÀÕË÷Èí¼þÍÅ»ï ALPHV£¬£¬£¬Õþ¸®Óë°Ä´óÀûÑÇ¡¢°ÂµØÀû¡¢µ¤Âó¡¢Î÷°àÑÀ¡¢ÈðÊ¿ºÍÓ¢¹úµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬ALPHV ¾­³£×·Çó¼ÓÃÜÇ®±Ò×éÖ¯ÍøÂçÖÐ×îÃô¸ÐµÄÊý¾Ý¡£¡£¡£¡£¡£ËûÃÇÍþв˵£¬£¬£¬ÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬ËûÃǽ«ÎÞ·¨»á¼ûÕâЩÐÅÏ¢£¬£¬£¬²¢Ðû²¼Î´¼ÓÃܵĿɶÁ°æ±¾¡£¡£¡£¡£¡£ÈôÊDz»¸¶¿î£¬£¬£¬ºÚ¿Í¾Í»áÔÚ°µÍøÍøÕ¾ÉÏÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»¸ö¹¤¾ß£¬£¬£¬×éÖ¯¿ÉÒÔʹÓøù¤¾ß½âÃÜ ALPHV ÀÕË÷Èí¼þ¡£¡£¡£¡£¡£Æù½ñΪֹ£¬£¬£¬FBI ¼°ÆäÖ´·¨ÏàÖúͬ°éÒÑÏò 500 ¶àÃûÊܺ¦ÕßÌṩÁËÕâЩ¹¤¾ß£¬£¬£¬×ÊÖúËûÃÇ×èÖ¹ÁËÔ¤¼Æ 6800 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£


https://www.securityweek.com/us-gov-disrupts-blackcat-ransomware-operation-fbi-releases-decryption-tool/


2. SymantecÅû¶SeedwormÕë¶Ô·ÇÖÞµçÐÅÐÐÒµµÄ¹¥»÷


19ÈÕ£¬£¬£¬SymantecµÄÍþвÇ鱨ÍŶÓÐû²¼ÁËһƪÓйØÒÁÀÊAPT×éÖ¯SeedwormµÄ±¨¸æ£¬£¬£¬Seedworm£¨ÓÖÃû Muddywater£©Ò»Ö±½«°£¼°¡¢ËÕµ¤ºÍ̹ɣÄáÑǵçÐÅÐÐÒµµÄ×éÖ¯×÷ΪĿµÄ¡£¡£¡£¡£¡£Ö¸³ö¸Ã×éÖ¯ÕýÔÚÒÔÀûÒæÏà¹ØÎªÃûÔÚ·ÇÖÞµØÇøµÄµçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹¾ÙÐй¥»÷¡£¡£¡£¡£¡£SeedwormʹÓÃÊ¢ÐеÄOffTheShelf¹¦Ð§Ç¿Ê¢µÄ¶ñÒâÈí¼þMimikatzºÍPoweliksÀ´Öª×ãÆäÌØ¹¤»î¶¯µÄÐèÇ󡣡£¡£¡£¡£ËûÃǶÔÌØ¶¨¹¤¾ß¾ÙÐмàÊÓºÍÇÔÈ¡²Ù×÷ϵͳ¡¢Ó¦ÓóÌÐòºÍÍøÂçÆ¾Ö¤£¬£¬£¬Í¬Ê±Ò²»á×Ô¶¯»¯Êý¾ÝÍøÂçºÍÇé±¨ÍøÂçÊÂÇé¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms


3. IBM·¢Ã÷ʹÓÃWeb×¢ÈëÕë¶ÔÎ÷Å·µÈµØ40¶à¼ÒÒøÐеĻ


19ÈÕýÌ屨µÀ£¬£¬£¬IBM Security Trusteer µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ Danabot µÄ¶ñÒâÈí¼þ½üÆÚÔÚ°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÒøÐÐÖзºÆð¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔͨ¹ýÍøÂç×¢Èë¹¥»÷ÇÔÈ¡Óû§µÄÒøÐÐÆ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£½üÄêÀ´ÕâÀ๥»÷·½·¨ÓÐËùïÔÌ­£¬£¬£¬µ«×î½ü Web ×¢Èë¹¥»÷ÓÖÖØÐ·ºÆð¡£¡£¡£¡£¡£×¨¼ÒÃÇÒÔΪÕâÖÖ¹¥»÷»áÒ»Á¬ÔöÌí£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËɵػñÈ¡´ó×ÚСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£¡£½¨ÒéÓû§ÔÚʹÓÃÒøÐÐÓ¦ÓóÌÐòʱӦ¼á³ÖСÐÄ¡£¡£¡£¡£¡£Õâ°üÀ¨ÕË»§ÉÏDZÔڵĿÉÒɻ¡¢²»´Óδ֪ȪԴÏÂÔØÈí¼þÒÔ¼°×ñÕÕÖØ´óÃÜÂëµÄÔ­ÔòºÍµç×ÓÓʼþÇå¾²µÈ¡£¡£¡£¡£¡£

https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/


4. Ñо¿Ö°Ô±ÑÝʾ½µµÍOpenSSHÅþÁ¬Çå¾²ÐÔµÄTerrapin¹¥»÷


19ÈÕ±¨µÀ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͹¥»÷·½·¨£¬£¬£¬ÃûΪTerrapin£¬£¬£¬¿ÉÒÔͨ¹ý¸Ä¶¯×èÁ¦ÒÔ¼°½µ¼¶Ç徲ЭÒéµÄ·½·¨£¬£¬£¬½µµÍOpenSSHÅþÁ¬µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£Terrapin¹¥»÷ʹÓÃSSHЭÒéµÄȱÏÝ£¬£¬£¬½èÖúÅÌËã»úÍøÂç´ø¿íÖÎÀíÈí¼þtcµÄ"¡°ÑÓ³ÙºÍÑÓ³Ù²ü¶¶(Delay and Jitter)"¹¦Ð§¶ÔÍøÂçÅþÁ¬¾ÙÐе÷½â£¬£¬£¬´Ó¶ø½µµÍSSHÅþÁ¬µÄÇå¾²±ê×¼¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã¹¥»÷×î´óµÄÒòËØÊÇ MiTM£¬£¬£¬ÕâʹµÃ Terrapin µÄÍþв²»ÄÇôÑÏÖØ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/terrapin-attacks-can-downgrade-security-of-openssh-connections/


5. ESETÐû²¼¹ØÓÚ2023ÄêϰëÄêµÄÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ


19ÈÕÔÚESETÐû²¼µÄ2023ÄêϰëÄêÍþв±¨¸æÖÐÖ¸³ö£¬£¬£¬2023ÄêϰëÄêÍøÂç·¸·¨»î¶¯µÄÊýÄ¿ºÍÖØÆ¯ºó½«½øÒ»²½ÔöÌí¡£¡£¡£¡£¡£Cl0p ÊÇÒ»¸öÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬ÒÔ´ó¹æÄ£ÊµÑéÀÕË÷Èí¼þ¹¥»÷¶øÖøÃû£¬£¬£¬Ëüͨ¹ýÆÕ±éµÄ¡°MOVEit ºÚ¿Í¹¥»÷¡±ÒýÆðÁËÈËÃǵĹØ×¢£¬£¬£¬µ«ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬¸ÃºÚ¿Í¹¥»÷²¢Î´Éæ¼°ÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£ÔÚÎïÁªÍøÁìÓò£¬£¬£¬¸ú×Ù¼à¿ØMozi IoT ½©Ê¬ÍøÂ磬£¬£¬ÒÔ¼° Android ÌØ¹¤Èí¼þ°¸ÀýÏÔÖøÔöÌí£¬£¬£¬ÕâÖ÷Òª¹éÒòÓÚ SpinOk ÌØ¹¤Èí¼þµÄ±£´æ¡£¡£¡£¡£¡£±¨¸æ»¹ÖÒÑÔ˵£¬£¬£¬ÐéÄâÇ®±ÒÉúÒâËù¿ÉÄÜÃæÁÙ¸üƵÈԵĹ¥»÷£¬£¬£¬²¢¾¯Ê¾Õþ¸®ºÍÆóÒµÓ¦Ô½·¢¹Ø×¢ÍøÂçÇå¾²ºÍÌØ¹¤»î¶¯¡£¡£¡£¡£¡£


https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/


6. ¹ú¼ÊÖ´·¨Ðж¯¾Ð²¶3500ÃûÍøÂç·¸·¨ÏÓÒÉÈ˲¢»ñ3ÒÚÃÀÔª


19ÈÕýÌ屨µÀ£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯¾ÙÐеÄÒ»Ïî´úºÅΪ¡°HAECHI IV Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Ðж¯¾Ð²¶ÁË3500ÃûÍøÂç×ï·¸£¬£¬£¬²¢²é»ñÁ˼ÛÖµ3ÒÚÃÀÔªµÄ×ʲú£¬£¬£¬º«¹úÕþ¸®Ö÷µ¼ÁË HAECHI Ðж¯£¬£¬£¬²¢ÓëÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢ÖйúÏã¸ÛºÍÓ¡¶ÈµÈ 34 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬×îеÄÐж¯±¬·¢ÔÚ 2023 Äê 7 ÔÂÖÁ 12 ÔÂʱ´ú£¬£¬£¬Ä¿µÄÊÇ´ÓÊÂÓïÒôÍøÂç´¹ÂÚ¡¢Áµ°®Õ©Æ­¡¢ÔÚÏßÐÔÀÕË÷¡¢Í¶×Êڲƭ¡¢Óë²»·¨ÔÚÏ߶IJ©Ïà¹ØµÄÏ´Ç®¡¢ÉÌÒµµç×ÓÓʼþй¶ºÍµç×ÓÉÌÎñڲƭµÄÍþвÐÐΪÕß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/