Çå¾²¹«Ë¾LogicMonitor͸¶Æ䲿·Ö¿Í»§Ôâµ½ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2023-09-051¡¢Çå¾²¹«Ë¾LogicMonitor͸¶Æ䲿·Ö¿Í»§Ôâµ½ÍøÂç¹¥»÷
¾ÝýÌå8ÔÂ31ÈÕ±¨µÀ£¬ÍøÂçÇå¾²¹«Ë¾LogicMonitor͸¶£¬ÆäSaaSƽ̨µÄ²¿·ÖÓû§Ôâµ½¹¥»÷¡£LogicMonitorÔÚ¸üÐÂÖгÆÆä·¢Ã÷us-west-2¡¢us-east-1ºÍeu-west-1µÄ²¿·Ö¿Í»§µÄÃÅ»§»á¼ûȨÏÞɥʧ£¬ÏÖÔÚ¸ÃÎÊÌâÒÑ»ñµÃ½â¾ö¡£¹«Ë¾Ã»ÓÐ˵Ã÷ÊÇÀÕË÷¹¥»÷£¬µ«¾ÝÐÂÎÅÈËÊ¿³Æ£¬¹¥»÷ÕßÈëÇÖÁË¿Í»§ÕÊ»§£¬Äܹ»½¨ÉèÍâµØÕÊ»§²¢×°ÖÃÀÕË÷Èí¼þ¡£ÀÕË÷Èí¼þÊÇʹÓøÃƽ̨µÄÍâµØLogicMonitor Collector´«¸ÐÆ÷°²Åŵģ¬´Ë´«¸ÐÆ÷¼à¿ØÓû§»ù´¡ÉèÊ©£¬µ«Ò²¾ßÓо籾¹¦Ð§¡£¾ÝϤ£¬ÊÜÓ°Ïì¿Í»§Ê¹ÓÃÁËLogicMonitor·ÖÅɸøÐÂÓû§µÄĬÈÏÈõÃÜÂ룬Òò¶øÔâµ½Á˹¥»÷¡£
https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/
2¡¢°ü¹Ü¹«Ë¾Trygg-Hansaй¶65Íò¿Í»§Êý¾Ý±»·£¿î300ÍòÃÀÔª
9ÔÂ4ÈÕýÌå³Æ£¬°ü¹Ü¹«Ë¾Trygg-HansaÒòй¶65Íò¿Í»§µÄÊý¾Ý£¬±»ÈðµäÒþ˽±£»¤¾Ö(IMY)·£¿î300ÍòÃÀÔª¡£Moderna F?rs?kringar£¨ÏÖΪTrygg-HansaµÄÒ»²¿·Ö£©µÄ¿Í»§·¢Ã÷¿Éͨ¹ý·¢Ë͸ø¿Í»§µÄ±¨¼ÛÒ³ÃæÉϵÄÁ´½Ó½øÈë°ü¹Ü¹«Ë¾µÄºǫ́£¬²¢ÏòIMY¾Ù±¨ÁË´ËÊ¡£IMYÊÓ²ìÈ·ÈÏ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿É»á¼ûºó¶ËÊý¾Ý¿â£¬²¢ÇÒ¿ÉÒÔͨ¹ýÐÞ¸ÄURLÖеÄÒ»Á¬¿Í»§¶ËIDÀ´ä¯ÀÀÆäËûСÎÒ˽¼ÒµÄÎĵµ¡£¸ÃÊÂÎñÓ°ÏìÔ¼ÁË650000Ãû¿Í»§£¬Ð¹Â¶Ê±¼ä³¤´ïÁ½Äê¶à£¬´Ó2018Äê10ÔÂÖÁ2021Äê2Ô¡£IMYÌåÏÖ£¬ÔÚÊÕµ½ÓйØÎó²îµÄ±¨¸æºó¸Ã¹«Ë¾Ê¼ÖÕδÄܽâ¾öÎÊÌ⣬¾öÒé¶Ô´Ë´¦ÒÔ300ÍòÃÀÔªÐÐÕþ´¦·Ö¡£
https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/
3¡¢Interlab·¢Ã÷ʹÓÃľÂíSuperBearÕë¶Ôº«¹úµÄ¹¥»÷Ô˶¯
InterlabÔÚ9ÔÂ1ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶Ôº«¹úÃñ¼äÕûÌåµÄ´¹ÂÚ¹¥»÷£¬Ê¹ÓÃÁËÐÂÐÍRAT SuperBear¡£¾ÝϤ£¬Ò»ÃûÐÂÎÅÊÂÇéÕßÊÕµ½ÓÐÕë¶ÔÐԵĴ¹ÂÚÓʼþ£¬ÆäÖаüÀ¨¶ñÒâLNKÎļþ¡£LNKÎļþ»áÆô¶¯PowerShellÏÂÁîÀ´Ö´ÐÐVB¾ç±¾£¬¸Ã¾ç±¾ÓÖ»á´ÓWordPressÍøÕ¾»ñÈ¡ÏÂÒ»½×¶Îpayload£¬°üÀ¨Ò»¸öAutoit3.exe¶þ½øÖÆÎļþºÍÒ»¸öAutoIt¾ç±¾¡£AutoIt¾ç±¾Ê¹ÓÃÀú³ÌÆÓªÊÖÒÕÖ´ÐÐÀú³Ì×¢È룬ÔÚÕâÖÖÇéÐÎÏ£¬»áÌìÉúÒ»¸öExplorer.exeʵÀýÀ´×¢ÈëSuperBear¡£¸ÃRAT¿ÉÇÔÈ¡Êý¾Ý£¬ÏÂÔز¢ÔËÐÐÆäËüshellÏÂÁîºÍ¶¯Ì¬Á´½Ó¿â(DDL)¡£
https://interlab.or.kr/archives/19416
4¡¢Labyrinth ChollimaÊǽüÆÚVMConnect¹¥»÷µÄÄ»ºóºÚÊÖ
¾Ý8ÔÂ31ÈÕ±¨µÀ£¬ReversingLabs½«VMConnectÔ˶¯ÓëLazarusµÄ×ÓÍÅ»ïLabyrinth ChollimaÁªÏµÆðÀ´¡£8Ô³õ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö¶ñÒ⹩ӦÁ´Ô˶¯¡°VMConnect¡±£¬ÏòPyPI´æ´¢¿âÉÏ´«ÁËÁ½´ò¶ñÒâPython°ü¡£ÏÖÔÚÓÖ·¢Ã÷ÁËÁíÍâÈý¸ö¶ñÒâ°ü£¬tablediter¡¢request-plusºÍrequestspro£¬ËüÃDZ»ÒÔΪÊÇVMConnectÔ˶¯µÄ¼ÌÐø¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚLabyrinth ChollimaÊÇ»ùÓÚÕâЩÔ˶¯ÖÐʹÓõĶñÒâ´úÂëµÄÏàËÆÐÔ¡£
https://securityaffairs.com/150197/apt/labyrinth-chollima-pypi-supply-chain-attacks.html
5¡¢Group-IBÐû²¼¹ØÓÚClassiscam¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
8ÔÂ31ÈÕ£¬Group-IBÐû²¼Á˹ØÓÚClassiscamÔÚÈ«Çò¹æÄ£ÄÚ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£±¨¸æ³Æ£¬Classiscamͨ¹ýÓÕÆ·ÖÀà¹ã¸æÍøÕ¾Óû§²¢ÇÔÈ¡ËûÃǵÄ×ʽðºÍÖ§¸¶¿¨ÏêϸÐÅÏ¢£¬ÒÑ׬ȡÁË6450ÍòÃÀÔª¡£Ä¿µÄÆ·ÅƵÄÊýÄ¿Ò²´ÓÈ¥ÄêµÄ169¸öÔöÌíµ½251¸ö£¬ÏÖÔÚÓÐ393¸ö¹¥»÷ÍÅ»ïÕë¶Ô79¸ö¹ú¼ÒµÄÓû§£¬ÓÐ1366¸öTelegramƵµÀ¾ÙÐÐе÷¡£Å·ÖÞÔâµ½µÄ¹¥»÷×î¶à£¬ÆäÖе¹ú±»¹¥»÷Óû§×î¶à£¬Æä´ÎÊDz¨À¼¡¢Î÷°àÑÀ¡¢Òâ´óÀûºÍÂÞÂíÄáÑÇ¡£Ó¢¹úÓû§µÄƽ¾ùËðʧ½ð¶î×î¸ß£¬Îª865ÃÀÔª£¬¶øÈ«Çòƽ¾ùˮƽΪ353ÃÀÔª¡£
https://www.group-ib.com/blog/classiscam-2023/
6¡¢FortiGuardÐû²¼¹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö±¨¸æ
8ÔÂ31ÈÕ£¬FortiGuardÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRhysidaµÄ×ÛÊö±¨¸æ¡£RhysidaÊÇÒ»¸öеÄÀÕË÷ÍŻËüʹÓÃRaaSÄ£×Ó£¬µÚÒ»¸öÑù±¾ÓÚ5ÔÂÌá½»µ½¹«¹²ÎļþɨÃè·þÎñ¡£RhysidaÒÀÀµ´¹ÂÚ¹¥»÷×÷ΪѬȾÔØÌ壬¹¥»÷Õß»¹Ê¹ÓÃCobalt StrikeÔÚÄ¿µÄÍøÂçÄÚºáÏòÒƶ¯²¢×ª´ïpayload¡£¸ÃÍÅ»ïÒÑÁгö41¸ö±»¹¥»÷Ä¿µÄ£¬ÆäÖÐÁè¼ÝÒ»°ëλÓÚÅ·ÖÞ£¬Æä´ÎÊDZ±ÃÀ¡£¹¥»÷Ö÷ÒªÕë¶Ô½ÌÓýÐÐÒµ£¨Õ¼±È30%ÒÔÉÏ£©£¬Æä´ÎÊÇÖÆÔìÒµ¡¢Õþ¸®»ú¹¹ºÍITÐÐÒµ¡£
https://www.fortinet.com/blog/threat-research/ransomware-roundup-rhysida