À³Ë÷ÍÐÖÐÑëÒøÐÐ͸¶ÆäϵͳÔâµ½¹¥»÷²¿·Ö¸¶¿î¿ÉÄÜÑÓ³Ù
Ðû²¼Ê±¼ä 2023-12-19¾Ý12ÔÂ15ÈÕ±¨µÀ£¬ÄϷǹú¼ÒÀ³Ë÷ÍеÄÖÐÑëÒøÐÐÔâµ½¹¥»÷¡£¸ÃÒøÐÐת´ï³Æ£¬Æäϵͳ11ÈÕÔâµ½¹¥»÷£¬ÏÖÔÚÕýÔÚÊÓ²ì´ËÊ£¬²¢È«ÌìºòÊÂÇéÒÔ»Ö¸´ÏµÍ³¡£¸Ã»ú¹¹»¹°ü¹Ü£¬ËüûÓÐÔâµ½ÈκβÆÎñ»òÆäËüËðʧ¡£²»¹ý£¬ËüÒÑÔÝÍ£²¿·ÖϵͳÒÔ±ÜÃâ½øÒ»²½µÄ¹¥»÷¡£Òò´Ë£¬ÔÚÒøÐÐÆð¾¢»Ö¸´ÏµÍ³µÄµÄͬʱ£¬Ò»Ð©¸¶¿î¿ÉÄÜ»áÑÓ³Ù¡£ÍâµØýÌ屨µÀ£¬ÓÉÓڸùúÇ®±ÒÂåµÙÓëÄÏ·ÇÀ¼Ìعҹ³£¬ÓÐÈ˵£ÐĸÃÊÂÎñ¿ÉÄÜ»áÓ°Ïì»ãÂÊ¡£
https://therecord.media/central-bank-lesotho-cyberattack-causes-outages
2¡¢ÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾ÒòÔâµ½ÍøÂç¹¥»÷·þÎñÔÝʱÖÐÖ¹
¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬À´×ÔºÚ¿ÍÍÅ»ïGonjeshke DarandeµÄ¹¥»÷×ÌÈÅÁËÒÁÀʸ÷µØ¼ÓÓÍÕ¾µÄÔËÓª¡£¹¥»÷±¬·¢ÓÚ±¾ÖÜÒ»£¬Õâ¶ÔÊ׶¼µÂºÚÀ¼Ôì³ÉÁËÑÏÖصÄÓ°Ï죬Ðí¶à¼ÓÓÍÕ¾±»ÆÈÊÖ¶¯ÔËÐС£Ê¯ÓͲ¿³¤Javad Owji͸¶£¬´Ë´Î¹¥»÷µ¼ÖÂÒÁÀÊÔ¼70%µÄ¼ÓÓÍÕ¾·þÎñÖÐÖ¹¡£Gonjeshke DarandeÉù³Æ¶Ô´ËÊÂÎñÈÏÕ棬²¢ÌåÏÖËüÈëÇÖÁ˼ÓÓÍÕ¾µÄÖÐÑë·þÎñÆ÷£¬»ñÈ¡ÁËÌض¨¼ÓÓÍÕ¾ÐÅÏ¢¡¢Ö§¸¶ÏµÍ³ÏêϸÐÅÏ¢ºÍÖÎÀíϵͳ¡£
https://securityaffairs.com/156065/hacktivism/pro-israel-predatory-sparrow-iran-fuel-stations.html
3¡¢¼ÓÃÜÇ®±ÒÉúÒâƽ̨GokuMarketÉÏ°ÙÍòÓû§µÄÐÅϢй¶
ýÌå12ÔÂ15Èճƣ¬ByteXÆìϵļ¯ÖÐʽ¼ÓÃÜÇ®±ÒÉúÒâËùGokuMarketй¶ÁËÏÕЩËùÓÐÓû§µÄÏêϸÐÅÏ¢¡£Cybernews·¢Ã÷ÁËÒ»¸öδÊܱ£»¤µÄMongoDBʵÀý£¬´æ´¢ÁËGokuMarketÁè¼ÝÒ»°ÙÍò¿Í»§ºÍÖÎÀíÓû§µÄÏêϸÐÅÏ¢¡£Õâ¸ö̻¶µÄÊý¾Ý¿â°üÀ¨Óû§IP¡¢¹ú¼Ò¡¢ÓʼþµØµã¡¢¼ÓÃÜÃÜÂëºÍÓû§¼ÓÃÜÇ®°üµØµãµÈÐÅÏ¢£¬ÒÔ¼°35¸ö¾ßÓÐÍêÈ«ÖÎÆÊÎö¼ûȨÏÞµÄÕÊ»§¡£ËüÓÚ10Ô±»·¢Ã÷£¬²¢ÔÚ±¨¸æºóµÄµÚ¶þÌì¾Í±»±£»¤ÆðÀ´¡£
https://securityaffairs.com/155885/security/crypto-exchange-gokumarket-exposed.html
4¡¢Resecurity³ÆBianLian¡¢White RabbitºÍMario±£´æÁªÏµ
ResecurityÔÚ12ÔÂ15ÈÕÅû¶Á˺ڿÍÍÅ»ïBianLian¡¢White RabbitºÍMarioÖ®¼äµÄÁªÏµ¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÕâ3¸ö¹¥»÷ÍÅ»ïÏàÖúÍŽῪչÕë¶ÔÉÏÊнðÈÚ·þÎñ¹«Ë¾µÄÀÕË÷¹¥»÷¡£ÕâÖÖÍŽáµÄÀÕË÷¹¥»÷²¢Î´¼¸¼û£¬µ«ÓÉÓÚIABÓë°µÍøÉ϶à¸ö¹¥»÷ÍÅ»ïµÄÏàÖú£¬ÕâÖÖÔ˶¯¿ÉÄÜ»á±äµÃÔ½À´Ô½³£¼û¡£Resecurity¹ûÕæÁËÓë3¸öÍÅ»ïͬʱִÐÐ"ÃÜÂëÅçÉä"¹¥»÷Ïà¹ØµÄIPµØµãÁÐ±í£¬Ê¹ÓÃÁËÑÇÌ«µØÇøµÄ¶à¸öסլIPÊðÀí¡£¹¥»÷Õß»¹Ê¹ÓÃBEC×÷ΪÔØÌ壬ʹÓÃÆäËü×éÖ¯µÄ±»¹¥»÷ÓʼþÕÊ»§ÄäÃû·¢ËÍÊê½ðÒªÇ󣬽øÒ»²½ÔöÌíÁËÊÓ²ìµÄÄѶȡ£
https://www.resecurity.com/blog/article/Exposing-Cyber-Extortion-Trinity-BianLian-White-Rabbit-Mario-Ransomware-Gangs-Spotted-Joint-Campaign
5¡¢ESETÅû¶OilRig¶à¸öÒÀÀµÓÚÔÆ·þÎñ¾ÙÐÐC&CµÄÏÂÔسÌÐò
12ÔÂ14ÈÕ£¬ESETÆÊÎöÁËһϵÁÐеÄOilRigÏÂÔسÌÐò£¬ËüÃǶ¼ÒÀÀµÕýµ±µÄÔÆ·þÎñÌṩÉÌ¡£OilRig£¬Ò²³ÆAPT34£¬×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¸ÃÍÅ»ïÔÚ2022ÄêµÄÒ»ÔÙÔ˶¯Öж¼Ê¹ÓÃÁ˶à¸öÏÂÔسÌÐò£¬°üÀ¨SampleCheck5000(SC5k v1-v3)¡¢OilCheck¡¢ODAgentºÍOilBooster¡£ÕâЩÏÂÔسÌÐòµÄÏÔÖøÌصãÊÇʹÓÃÁ˶à¸öÕýµ±ÔÆ·þÎñAPI¾ÙÐÐC&CͨѶºÍÊý¾Ýй¶£¬ÀýÈçMicrosoft Graph OneDrive API¡¢Microsoft Graph Outlook APIºÍMicrosoft Office EWS API¡£
https://www.welivesecurity.com/en/eset-research/oilrig-persistent-attacks-cloud-service-powered-downloaders/
6¡¢Check PointÐû²¼Rhadamanthysа汾µÄÆÊÎö±¨¸æ
12ÔÂ14ÈÕ£¬Check PointÐû²¼Á˹ØÓÚRhadamanthys 0.5.0°æ±¾µÄÆÊÎö±¨¸æ¡£ÕâÊÇÒ»ÖÖC++ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬ÓÚ2022Äê8ÔÂÊ״α»·¢Ã÷£¬Ä¿µÄÊǵç×ÓÓʼþ¡¢FTPºÍÔÚÏßÒøÐзþÎñÕÊ»§Æ¾Ö¤¡£±¨¸æÖ¸³ö£¬¸Ã°æ±¾ÒýÈëÁËÒ»¸öеIJå¼þϵͳ£¬¿É¶ÔÌض¨·Ö·¢ÐèÇó¾ÙÐиü¸ß¼¶±ðµÄ¶¨ÖÆ¡£0.5.0°æ»¹Ë¢ÐÂÁË´æ¸ù¹¹½¨ºÍ¿Í»§¶ËÖ´ÐÐÀú³Ì£¬ÐÞ¸´ÁËÕë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄϵͳ£¬²¢ÐÞ¸´ÁËDiscordÁîÅÆ»ñÈ¡ÎÊÌâ¡£
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/