Microsoft 365Ôٴα¬·¢·þÎñÖÐÖ¹Ö÷ÒªÓ°ÏìÎ÷Å·µØÇø
Ðû²¼Ê±¼ä 2023-05-241¡¢Microsoft 365Ôٴα¬·¢·þÎñÖÐÖ¹Ö÷ÒªÓ°ÏìÎ÷Å·µØÇø
¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬MicrosoftÕýÔÚÊÓ²ìÓû§ÎÞ·¨»á¼ûÆäMicrosoft 365ÕÊ»§ºÍÒÑ×°ÖÃÓ¦ÓóÌÐòµÄÎÊÌâ¡£ÊÜÓ°ÏìµÄ¿Í»§³ÆÔÚ»á¼ûOutlookÓÊÏäʱÓöµ½ÎÊÌ⣬²¢ÇÒÎÞ·¨ÅþÁ¬µ½Microsoft 365·þÎñÆ÷¡£¸Ã¹«Ë¾ÔÚͨ¸æÖÐÌåÏÖ£¬Ö÷Ó°ÏìÁ˱±ÃÀ¡¢²¨À¼ºÍÓ¢¹úµÄÓû§£¬µ«ÆäËüµØÇøµÄÓû§Ò²¿ÉÄÜÊܵ½Ó°Ïì¡£ÏÖÔÚ£¬ÎÊÌâÒѾ»ñµÃÏàʶ¾ö¡£ÉϸöÔ£¬ÁíÒ»ÆðMicrosoft 365·þÎñÖÐÖ¹ÊÂÎñµ¼Ö±±ÃÀÓû§ÎÞ·¨»á¼ûExchange Online¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-365-hit-by-new-outage-causing-connectivity-issues/
2¡¢µÂ¹ú¾üÆ÷¹«Ë¾RheinmetallÔâµ½Black BastaµÄ¹¥»÷
¾Ý5ÔÂ23ÈÕ±¨µÀ£¬µÂ¹úÆû³µºÍÎäÆ÷ÖÆÔìÉÌRheinmetall AG³Æ£¬ËüÔâµ½ÁËBlackBastaµÄÀÕË÷¹¥»÷£¬ÃñÓÃÓªÒµÊܵ½Ó°Ïì¡£5ÔÂ20ÈÕ£¬BlackBastaÔÚÆäÍøÕ¾Ðû²¼ÁË´ÓRheinmetallÇÔÈ¡µÄÊý¾ÝÑù±¾£¬ÆäÖаüÀ¨±£ÃÜÐÒé¡¢ÊÖÒÕʾÒâͼ¡¢»¤ÕÕɨÃè¼þºÍ²É¹º¶©µ¥µÈ¡£¸Ã¹«Ë¾Í¸Â¶£¬ËûÃÇÔÚ4ÔÂ14ÈÕ·¢Ã÷¹¥»÷Ô˶¯£¬ÓÉÓÚ¼¯ÍÅÄÚ²¿µÄIT»ù´¡ÉèÊ©ÊÇÑÏ¿áÊèÉ¢µÄ£¬Òò´ËÆä¾üÊÂӪҵδÊܵ½´Ë´Î¹¥»÷µÄÓ°Ïì¡£
https://therecord.media/rheinmetall-confirms-black-basta-ransomware-group-behind-cyberattack
3¡¢¿µ½¡°ü¹Ü¹«Ë¾Point32HealthÔâµ½ÀÕË÷¹¥»÷»¼ÕßÐÅϢй¶
ýÌå5ÔÂ23Èճƣ¬¿µ½¡°ü¹Ü¹«Ë¾Point32HealthÕýÔÚ֪ͨ»¼ÕßËûÃǵÄÐÅÏ¢¿ÉÄÜÒÑй¶¡£Point32HealthÊÇTufts Health PlanºÍHarvard Pilgrim Health Careĸ¹«Ë¾£¬¹¥»÷ÕßÔÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕʱ´ú£¬´ÓHarvard PilgrimµÄϵͳÖи´ÖƲ¢ÇÔÈ¡ÁËÊý¾Ý¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬Éв»È·¶¨Óм¸¶àÈËÊܵ½Ó°Ï죬µ«¿ÉÄÜ»áÓ°Ïì´Ó2012Äê3ÔÂ28ÈÕÖÁ½ñ×¢²áµÄÓû§¡£°ü¹Ü¹«Ë¾µÄ½²»°ÈËûÓÐ͸¶ÊÇ·ñ½»ÁËÊê½ð¡£
https://www.databreaches.net/after-ransomware-attack-states-second-largest-health-insurer-says-patient-data-were-stolen/
4¡¢Trend MicroÅû¶BlackCat½üÆÚ¹¥»÷ÖÐÈƹý¼ì²âµÄÒªÁì
5ÔÂ22ÈÕ£¬Trend MicroÅû¶ÁËBlackCatÔÚ½üÆڵĹ¥»÷ÖÐʹÓÃÊðÃûµÄWindowsÄÚºËÇý¶¯³ÌÐòÀ´Èƹý¼ì²âµÄÒªÁì¡£¸ÃÇý¶¯³ÌÐòÊÇÈ¥ÄêÄêµ×Åû¶µÄ¶ñÒâÈí¼þPOORTRYµÄˢа汾¡£¹¥»÷ÕßÊ×ÏÈÊÔͼʹÓÃMicrosoft ÊðÃûµÄPOORTRYÇý¶¯³ÌÐò£¬µ«ÆäÊðÃû±»×÷·Ïºó¼ì²âÂʺܸߡ£Òò´Ë£¬¹¥»÷ÕßʹÓÃÁËÒ»¸öPOORTRYÄÚºËÇý¶¯µÄˢа汾£¬²¢Ê¹Óñ»µÁ»òй¶µÄ½»Ö¯ÊðÃûÖ¤Êé¾ÙÐÐÊðÃû¡£±ðµÄ£¬¸ÃÇý¶¯³ÌÐòʹÓÃSafengine Protector v2.4.0.0¹¤¾ß¾ÙÐлìÏýÒÔÈƹý¾²Ì¬ÆÊÎö¡£
https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html
5¡¢Fortinet·¢Ã÷Õë¶ÔÖж«µÄÐÂÄÚºËÇý¶¯³ÌÐòWINTAPIX
FortinetÔÚ5ÔÂ22ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÖж«¹ú¼ÒµÄÐÂÄÚºËÇý¶¯³ÌÐòWINTAPIX(WinTapix.sys)¡£Ò£²âÊý¾ÝÅú×¢£¬¸ÃÔ˶¯Ö÷ÒªÕë¶ÔɳÌØ°¢À²®¡¢Ô¼µ©¡¢¿¨Ëþ¶ûºÍ°¢À²®ÍŽáÇõ³¤¹ú¡£WinTapix.sysʵÖÊÉÏÊÇÒ»¸ö¼ÓÔسÌÐò£¬Ö÷ҪĿµÄÊÇÌìÉúºÍÖ´ÐÐÏÂÒ»½×¶ÎµÄ¹¥»÷¡£Ò»µ©±»¼ÓÔص½ÄÚºËÖУ¬WinTapix.sys¾Í»á½«Ç¶Èëʽshellcode×¢Èëµ½Êʵ±µÄÓû§Ä£Ê½Àú³ÌÖУ¬¶ø¸ÃÀú³ÌÓÖ»áÖ´ÐмÓÃܵÄ.NET payload¡£.NET¶ñÒâÈí¼þ¾ßÓкóÃźÍÊðÀí¹¦Ð§£¬¿ÉÒÔÖ´ÐÐÏÂÁϺÍÉÏ´«Îļþ£¬ÒÔ¼°³äµ±ÊðÀíÔÚÁ½¸öͨѶ¶ËµãÖ®¼äת´ïÊý¾Ý¡£
https://www.fortinet.com/blog/threat-research/wintapix-kernal-driver-middle-east-countries
6¡¢Ñо¿ÍŶӳÆGUI-vilÍÅ»ïʹÓÃAWS EC2ʵÀýÀ´ÍÚ¿ó
5ÔÂ22ÈÕ£¬Permiso P0 Labs³ÆÓ¡¶ÈÄáÎ÷ÑǺڿÍÍÅ»ïGUI-vilʹÓÃAWS EC2ʵÀýÀ´Íڿ󡣸Ã×éÖ¯ÓÚ2021Äê11ÔÂÊ״α»¼ì²âµ½£¬×î½üÒ»´ÎµÄÔ˶¯±¬·¢ÔÚ½ñÄê4Ô·ݡ£¸ÃÍÅ»ïÆ«ºÃʹÓÃͼÐÎÓû§½çÃæ(GUI) ¹¤¾ß£¬ÌØÊâÊǽϾɰ汾µÄS3ä¯ÀÀÆ÷¡£GUI-vilÊ×ÏÈËÑË÷̻¶µÄAWSÃÜÔ¿ºÍɨÃè±£´æÎó²î£¨ÈçCVE-2021-22205£©µÄGitLabʵÀý£¬À´»ñµÃ³õʼ»á¼ûȨÏÞ¡£ÀÖ³ÉÈëÇÖºóÊÇȨÏÞÌáÉýºÍÄÚ²¿Õì̽£¬ÆäÖ÷ҪʹÃüÊǽ¨ÉèEC2ʵÀý£¬ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¿óÔ˶¯¡£
https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/