³¯ÏÊLazarus GroupʹÓÃÐéαÕÐÆ¸Óë¶ñÒâÈí¼þËÁÅ°Çø¿éÁ´ÁìÓò
Ðû²¼Ê±¼ä 2024-09-119ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Group-IB µÄ×îб¨¸æÕ¹ÏÖÁ˳¯ÏÊÕþ¸®Ö§³ÖµÄ Lazarus Group ÕýÔÚ¾ÙÐеġ°Eager Crypto Beavers¡±»î¶¯£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÏÔÖøÉý¼¶ÁËÆäÍøÂç¹¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬×¨×¢ÓÚÇø¿éÁ´¼°¼ÓÃÜÇ®±ÒÁìÓò¡£¡£¡£Lazarus ¼¯ÍÅʹÓÃÖØ´óÊֶΣ¬£¬£¬£¬£¬£¬ÈçÐéαÊÂÇéʱ»ú¡¢¶ñÒâÊÓÆµ¾Û»áÓ¦ÓóÌÐò£¨ÈçFCCCall£©ÒÔ¼°GitHubÉϵÄÓÎÏ·ºÍ¼ÓÃÜÇ®±ÒÏîÄ¿£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ²¢Ö´ÐÐÃûΪBeaverTailµÄ¶ñÒâÈí¼þ¡£¡£¡£¸ÃÈí¼þ²»µ«ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬£¬»¹°²ÅÅÃûΪInvisibleFerretµÄPythonºóÃÅÒÔÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷»¹À©Õ¹ÖÁmacOS×°±¸£¬£¬£¬£¬£¬£¬²¢Í¨¹ý»ìÏý´úÂëºÍÔ¶³Ì»á¼û¹¤¾ß£¨ÈçAnyDesk£©ÔÚ¶à¸ö²Ù×÷ϵͳÉÏʵÏÖ³¤ÆÚÐÔ¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬LazarusÒѽ«Ä¿µÄÀ©´óÖÁä¯ÀÀÆ÷À©Õ¹¡¢ÃÜÂëÖÎÀíÆ÷¼°Microsoft Sticky Notes£¬£¬£¬£¬£¬£¬²¢Í¨¹ýFTPºÍTelegramµÈÇþµÀÇÔÈ¡Êý¾Ý¡£¡£¡£´Ë»î¶¯ÏÔʾÁËLazarusÔÚÊý¾ÝÇÔÈ¡ÊÖÒÕÉϵĸ߶Èרҵ»¯ÓëÎÞаÐÔ£¬£¬£¬£¬£¬£¬ÔöÌíÁËÇå¾²¼ì²âºÍÌá·ÀµÄÄѶȡ£¡£¡£
https://hackread.com/lazarus-group-blockchain-fake-video-conferencing-job-scam/?web_view=true
2. RansomHubÍÅ»ïÀÄÓÃTDSSKiller½ûÓÃEDRÈí¼þ
9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬RansomHub ÀÕË÷Èí¼þÍÅ»ïÇÉÃîʹÓÿ¨°Í˹»ùµÄÕýµ±¹¤¾ß TDSSKiller£¬£¬£¬£¬£¬£¬¹æ±ÜÁËÄ¿µÄϵͳµÄ¶Ëµã¼ì²âºÍÏìÓ¦£¨EDR£©·À»¤¡£¡£¡£TDSSKiller Ô±¾Éè¼ÆÓÃÓÚ¼ì²âÄÑÒÔ²ì¾õµÄ rootkit ºÍ bootkit ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬µ«Æä¹¦Ð§±» RansomHub ¶ñÒâʹÓ㬣¬£¬£¬£¬£¬Í¨¹ý½ûÓà Malwarebytes Anti-Malware µÈÇ徲ЧÀÍ£¬£¬£¬£¬£¬£¬Ï÷ÈõÁËϵͳ·ÀÓù¡£¡£¡£ÕâÒ»ÀÄÓÃÊÖ·¨Ê¹ÓÃÁË TDSSKiller µÄÕýµ±ÐÔºÍÓÐÓÃÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬£¬Ê¹ÆäÄÜÌÓ±ÜÇå¾²Èí¼þµÄ×èµ²¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬RansomHub °²ÅÅ LaZagne Æ¾Ö¤ÍøÂ繤¾ß£¬£¬£¬£¬£¬£¬´Ó¶àÖÖÓ¦ÓÃÊý¾Ý¿âÖÐÇÔÈ¡µÇ¼ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÖúÁ¦ÆäÔÚÍøÂçÖкáÏòÀ©É¢¡£¡£¡£LaZagne µÄ»î¶¯ËäÒ×±»·¢Ã÷£¬£¬£¬£¬£¬£¬µ« TDSSKiller µÄ½éÈëʹÆäÔ½·¢Òþ²Ø¡£¡£¡£Malwarebytes ±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬TDSSKiller Ö´ÐÐʱ½ÓÄɶ¯Ì¬ÎļþÃû£¬£¬£¬£¬£¬£¬Òþ²ØÓÚÔÝʱĿ¼ÖУ¬£¬£¬£¬£¬£¬ÔöÌíÁ˼ì²âÄѶȡ£¡£¡£ÃæÁÙ´ËÍþв£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾½¨ÒéÔöÇ¿ EDR ½â¾ö¼Æ»®µÄ·À¸Ä¶¯¹¦Ð§£¬£¬£¬£¬£¬£¬±ÜÃâÀàËÆ TDSSKiller µÄ¹¤¾ß½ûÓ÷À»¤¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¼à¿ØÌض¨ÃüÁîÐвÎÊýºÍÖ´ÐÐÐÐΪҲÊÇÓÐÓ÷ÀÓù²½·¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/
3. KonniºÚ¿Í×éÖ¯£ºÕë¶Ô¶íº«µÄÍøÂçÌØ¹¤¹¥»÷Õ½ÂÔ
9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½üÆÚ·¢Ã÷£¬£¬£¬£¬£¬£¬Ó볯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯KimsukyÓйØÁªµÄÍþвÐÐΪÕßKonni£¬£¬£¬£¬£¬£¬Õý¼Ó´ó¶Ôº«¹úºÍ¶íÂÞ˹µÄÍøÂç¹¥»÷Á¦¶È¡£¡£¡£KonniÔÚ¶ÔÕâÁ½¸ö¹ú¼ÒµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬Õ¹ÏÖÁ˸߶ȵÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÏàËÆÐÔ£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄÊǾÙÐÐÍøÂçÌØ¹¤»î¶¯¡£¡£¡£×Ô2021ÄêÆð£¬£¬£¬£¬£¬£¬KonniÒÑÕë¶Ô¶íÂÞ˹Íâ½»²¿¡¢¶íÂÞ˹פӡÄá´óʹ¹Ý¼°¶à¼Òº«¹úÆóÒµÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨ÔÚ2022Äê1ÔÂʹÓÃÐÂÄê×£¸£ÓʼþÏò¶íÂÞ˹´óʹ¹ÝÍâ½»¹ÙÈö²¥¶ñÒâÈí¼þ¡£¡£¡£Æä»î¶¯¿É×·ËÝÖÁ2014Ä꣬£¬£¬£¬£¬£¬ºã¾ÃÇÒÒ»Á¬¡£¡£¡£Konni½ÓÄÉ´¹ÂÚÓʼþ×÷ΪÈëÇÖÊֶΣ¬£¬£¬£¬£¬£¬Ê¹ÓÃ˰ÊÕ¡¢½±Ñ§½ðµÈÓÕ¶ü»ñȡϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢Í¨¹ý×Ô½ç˵µÄÔ¶³Ì»á¼ûľÂíÍêÈ«¿ØÖÆÊܺ¦ÏµÍ³¡£¡£¡£ÔÚ¹¥»÷Àú³ÌÖУ¬£¬£¬£¬£¬£¬¸Ã×é֯ʹÓÃÏàËÆÊÖÒÕ½«ÊÜѬȾװ±¸½ÓÈëºÚ¿Í¿ØÖƵÄÏÂÁîЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Í¨¹ýÄÚÊÖÏÂÁîʵÏÖÅþÁ¬¡£¡£¡£Ö»¹Ü¹¥»÷ģʽ¶àÄêδ±ä£¬£¬£¬£¬£¬£¬µ«KonniÒ²Á¬ÏµÐÂÓ±Õ½ÂÔÒÔÌáÉýÀÖ³ÉÂÊ¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬£¬£¬¹Ø×¢KonniÔÚ²î±ð¹ú¼Ò¼ä¹¥»÷µÄÏàËÆÐÔ£¬£¬£¬£¬£¬£¬¹ØÓÚÇ徲ר¼ÒÖÆ¶©¸üÓÐÓõķÀÓùÕ½ÂԺ;«×¼¹éÒò¾ßÓÐÖ÷ÒªÒâÒ壬£¬£¬£¬£¬£¬ÓÐÖúÓÚ¸üºÃµØ±£»£»£»£»£»£»¤Ä¿µÄʵÌåÃâÊÜ´ËÀàÍøÂçÍþвµÄË𺦡£¡£¡£
https://therecord.media/kimsuky-north-korea-hackers-targeting-russia-south-korea?&web_view=true
4. WPSÆØ95ÍòÓû§ÐÅÏ¢ÔâMOVEitºÚ¿Í¹¥»÷й¶
9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Íþ˹¿µÐÇÖÝҽʦЧÀͰü¹Ü¹«Ë¾£¨WPS£©½üÆÚÈ·ÈÏ£¬£¬£¬£¬£¬£¬Ô¼950,000ÃûСÎÒ˽¼ÒµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2023ÄêµÄÒ»ÆðMOVEitºÚ¿Í¹¥»÷ÊÂÎñÖÐÔâй¶¡£¡£¡£¸ÃÊÂÎñÔ´ÓÚProgress SoftwareÆìϵÄMOVEit TransferÈí¼þ±»¶íÓïCl0pÀÕË÷Èí¼þ×é֯ʹÓÃÁãÈÕÎó²îÇÖÈ룬£¬£¬£¬£¬£¬µ¼ÖÂÈ«Çò½ü2,800¸ö×éÖ¯ÊÜ´´£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÐ¡ÎÒ˽¼ÒÐÅϢй¶Á¿¸ß´ï9600ÍòÌõ¡£¡£¡£WPS×÷ΪÊܺ¦ÕßÖ®Ò»£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ6ÈÕÐû²¼£¬£¬£¬£¬£¬£¬Æä946,801ÃûÒ½Áưü¹ÜÊÜÒæÈË¿ÉÄÜÊܵ½²¨¼°£¬£¬£¬£¬£¬£¬°üÀ¨²¿·ÖCMS£¨Ò½Áưü¹ÜºÍÒ½ÁƽòÌùЧÀÍÖÐÐÄ£©ÊÜÒæÈË¡£¡£¡£Ö»¹Ü³õ³ÌÐò²éÏÔʾÎÞÖ±½ÓÖ¤¾ÝÅú×¢Êý¾Ý±»¸´ÖÆ£¬£¬£¬£¬£¬£¬µ«ËæºóµÄÉîÈëÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬²¿·Ö°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅµÈÃô¸ÐÐÅÏ¢µÄÎļþÒÑ´ÓWPSµÄMOVEitϵͳÖб»µÁ¡£¡£¡£Ö»¹ÜÏÖÔÚδÊÕµ½ÒòÐÅϢй¶µ¼ÖµÄڲƱ¨¸æ£¬£¬£¬£¬£¬£¬WPSÈÔ½ÓÄÉÆð¾¢²½·¥£¬£¬£¬£¬£¬£¬ÎªÊÜÓ°ÏìµÄÒ½Áưü¹ÜÊÜÒæÈËÌæ»»ÐºÅÂëµÄÒ½Áưü¹Ü¿¨£¬£¬£¬£¬£¬£¬²¢ÌṩΪÆÚÒ»ÄêµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬Í¬Ê±ÌáÐѹ«ÖÚ¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬Ìá·ÀDZÔÚΣº¦¡£¡£¡£
https://www.securityweek.com/wisconsin-insurer-discloses-data-breach-impacting-950000-individuals/
5. Confidant Health 5.3TBÐÄÀí¿µ½¡¼Í¼Ôâй¶
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÈ˹¤ÖÇÄÜÒ½Áƹ«Ë¾Confidant HealthÒòЧÀÍÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬£¬ÒâÍâй¶Á˸ߴï5.3TBµÄÃô¸ÐÐÄÀí¿µ½¡¼Í¼£¬£¬£¬£¬£¬£¬ÄÚÈÝÉæ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢ÐÄÀíÆÀ¹À¼°Ï꾡ҽÁÆÊý¾Ý£¬£¬£¬£¬£¬£¬Ö±½ÓÍþвµ½Áè¼Ý12.6ÍòÃû»¼ÕßµÄÒþ˽Çå¾²¡£¡£¡£¸ÃÊÂÎñÓÉÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆ£¬£¬£¬£¬£¬£¬Ëû·¢Ã÷ÁËδÉèÃÜÂë±£»£»£»£»£»£»¤µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÄÚº¬À´×ÔÎåÖÝ»¼ÕßµÄ˽ÃÜÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÁªÏµ·½·¨µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°ÏêϸµÄÐÄÀí¿µ½¡ÆÀ¹À¡¢´¦·½Ò©Çåµ¥¡¢Ò½ÁƽòÌù¿¨ÐÅÏ¢µÈ¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý»¹Éæ¼°ÒôƵÊÓÆµ¼Í¼£¬£¬£¬£¬£¬£¬ÌÖÂÛÁ˼«ÎªË½ÃܵļÒÍ¥ÎÊÌâ¡£¡£¡£Confidant HealthѸËÙÈϿɲ¢ÏÞÖÆÁË»á¼û£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÒ»Á¬Ê±¼ä¼°Ç±ÔÚÓ°Ïì¹æÄ£Éв»ÇåÀÊ¡£¡£¡£Ö»¹Ü²¿·ÖÎļþÊÜÏÞÖÆ»á¼û£¬£¬£¬£¬£¬£¬µ«ÒÑй¶µÄÎļþ·¾¶ºÍ´æ´¢Î»ÖÃÈÔ¿ÉÄܳÉΪºÚ¿Í¹¥»÷µÄÌø°å£¬£¬£¬£¬£¬£¬¼Ó¾ç»¼ÕßÃæÁÙµÄΣº¦¡£¡£¡£´ËÀàÊý¾Ýй¶²»µ«¿ÉÄÜÒý·¢Éí·Ý͵ÇÔ¡¢Ò½ÁÆÚ²ÆµÈÑÏÖØÐ§¹û£¬£¬£¬£¬£¬£¬»¹¿ÉÄܶԻ¼ÕßÔì³É¾«ÉñѹÁ¦ºÍÐÄÀíΣÏÕ¡£¡£¡£
https://hackread.com/ai-firm-misconfigured-server-exposed-mental-health-data/
6. NoNameÀÕË÷Èí¼þÍÅ»ï×î½ü°²ÅÅÁËRansomHub¶ñÒâÈí¼þ
9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬NoNameÀÕË÷Èí¼þÍÅ»ï½üÄêÀ´ÖÂÁ¦ÓÚÔÚÈ«Çò¹æÄ£ÄÚÕë¶ÔÖÐСÐÍÆóҵʵÑé¹¥»÷£¬£¬£¬£¬£¬£¬ÒÔÊ÷Á¢ÆäÔÚÀÕË÷Èí¼þ½çµÄÉùÓþ¡£¡£¡£¸ÃÍÅ»ïʹÓðüÀ¨EternalBlueºÍZeroLogonÔÚÄڵĶàÖÖ¾ÉÎó²î£¬£¬£¬£¬£¬£¬Í¨¹ý±©Á¦ÆÆ½â»ñÈ¡ÍøÂç»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢°²Åů䶍֯¹¤¾ßSpacecolon¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬NoNameתÏòʹÓÃScRansomÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Ìæ»»ÁË֮ǰµÄScarab¼ÓÃÜÆ÷£¬£¬£¬£¬£¬£¬²¢ÊÔͼͨ¹ýÄ£ÄâLockBit 3.0µÈ×ÅÃûÀÕË÷Èí¼þÀ´Ìá¸ßÆä×ÅÃû¶È¡£¡£¡£ScRansomËäÈ»²»ÈçÆäËûÀÕË÷Èí¼þÖØ´ó£¬£¬£¬£¬£¬£¬µ«¾ß±¸²¿·Ö¼ÓÃÜ¡¢ÎļþÄÚÈÝÌæ»»µÈÄÜÁ¦£¬£¬£¬£¬£¬£¬²¢ÄܼÓÃܶàÖÖÇý¶¯Æ÷ÉϵÄÎļþ¡£¡£¡£ESETÖ¸³ö£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔÚ½âÃÜÀú³ÌÖÐÌåÏÖ²»¿ÉÊ죬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäÉùÓþºÍÊܺ¦Õ߸¶¿îµÄÒâÔ¸¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬NoName»¹Ê¹Óöà¸öSMBÇéÐÎÖеÄÎó²î£¬£¬£¬£¬£¬£¬°üÀ¨EternalBlueºÍZerologonµÈ£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ý½ûÓÃWindows DefenderµÈÊÖ¶ÎÌáÉý¹¥»÷Ч¹û¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬Óм£ÏóÅú×¢NoName¿ÉÄÜÒѳÉΪRansomHubµÄÁ¥Êô»ú¹¹£¬£¬£¬£¬£¬£¬Í¨¹ý°²ÅÅRansomHubµÄEDRɱÊÖºÍÀÕË÷Èí¼þÀ´À©Õ¹Æä»î¶¯¹æÄ£¡£¡£¡£Ö»¹ÜÓëRansomHubµÄÕýʽ¹ØÁªÉдýÈ·ÈÏ£¬£¬£¬£¬£¬£¬µ«NoNameÏÔÈ»²¢Î´·ÅÆúÆäÀÕË÷Èí¼þÓªÒµ£¬£¬£¬£¬£¬£¬ScRansom¼ÓÃÜÆ÷ÈÔÔÚÆð¾¢¿ª·¢ÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/