FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷

Ðû²¼Ê±¼ä 2024-06-06

1. FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷


6ÔÂ4ÈÕ£¬RansomHub ÀÕË÷Èí¼þ×éÖ¯Éù³ÆÇÔÈ¡ÁËÃÀ¹úµçÐŹ«Ë¾ Frontier Communications Áè¼Ý 200 Íò¿Í»§µÄÐÅÏ¢¡£RansomHub ×éÖ¯Éù³ÆÇÔÈ¡ÁËÕâ¼ÒµçОÞÍ·µÄ 5GB Êý¾Ý¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢Éç»á°ü¹ÜºÅ¡¢ÐÅÓᢷÖÊý¡¢³öÉúÈÕÆں͵绰ºÅÂë¡£½ñÄê 4 Ô£¬Frontier Communications֪ͨÃÀ¹ú֤ȯÉúÒâίԱ»á (SEC)£¬¸Ã¹«Ë¾ÔÚÔâÓöÍøÂç¹¥»÷ºó±ØÐè¹Ø±ÕijЩϵͳ¡£¸ÃÊÂÎñÓÚ 4 Ô 14 ÈÕ±»·¢Ã÷£¬Ôµ¹ÊÔ­ÓÉÊÇÒ»Ãûδ¾­ÊÚȨµÄÍþвÐÐΪÕßδ¾­ÊÚȨ»á¼ûÁ˸ù«Ë¾µÄ²¿·Ö IT ÇéÐΡ£¸Ã¹«Ë¾¶Ô¸ÃÇå¾²Îó²îÕö¿ªÁËÊӲ죬²¢½ÓÄÉÐж¯¿ØÖÆÊÂÎñ¡£¸Ã¹«Ë¾Ã»ÓÐÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬Ò²ÉÐδ͸¶ÊÜÓ°ÏìÈËÊý¡£RansomHub Ðû²¼Á˱»µÁ¼Í¼µÄͼƬ×÷ΪÊý¾Ý鶵ÄÖ¤¾Ý£¬²¢Íþв˵£¬ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚ²»Ö§¸¶Êê½ð£¬ËûÃǽ«Ðû²¼±»µÁÊý¾Ý¡£


https://securityaffairs.com/164126/data-breach/ransomhub-gang-hacked-frontier-communications.html


2. Ñо¿ÍŶӷ¢Ã÷ͨ¹ý¶ñÒâExcel¹¥»÷ÎÚ¿ËÀ¼µÄWindowsÓû§


6ÔÂ5ÈÕ£¬Ò»ÃûÍþвÐÐΪÕßÕýÊÔͼÔÚÎÚ¿ËÀ¼Óû§µÄ Windows ϵͳÉÏ°²ÅÅ Cobalt Strike ºóÎó²îʹÓù¤¾ß°ü¡£Fortinet µÄÑо¿Ö°Ô±ÔÚ±¾ÖܵÄһƪ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬¸ÃÔ˶¯µÄÖصãËƺõÊÇÍêÈ«Ô¶³Ì¿ØÖÆÄ¿µÄϵͳ£¬ÒÔ±ãδÀ´°²ÅÅÓÐÓÃÔغɲ¢¿ÉÄÜÓÃÓÚÆäËû¶ñÒâÄ¿µÄ¡£Çå¾²¹©Ó¦É̳Æ£¬ÍþвÕßʹÓôøÓÐǶÈëʽ Visual Basic Ó¦ÓóÌÐò (VBA) ºêµÄÎÚ¿ËÀ¼Ö÷Ìâ Excel Îļþ×÷Ϊ³õʼÓÕ¶ü¡£ÈôÊDz»ÉóÉ÷µÄÓû§ÆôÓøú꣬Ëü»áÔÚÊܺ¦ÕßϵͳÉÏ°²ÅŶ¯Ì¬Á´½Ó¿â (DLL) ÏÂÔسÌÐò£¨Í¨¹ý ConfuserEX ¿ªÔ´¹¤¾ß¾ÙÐлìÏý£©¡£DLL ÏÂÔسÌÐòÊ×ÏÈÒª×öµÄÒ»¼þʾÍÊDzéÕÒÊÜѬȾϵͳÉÏÊÇ·ñ±£´æ·À²¡¶¾ºÍÆäËû¶ñÒâÈí¼þ¼ì²â¹¤¾ß¡£ÈôÊÇÏÂÔسÌÐò¼ì²âµ½±£´æ£¬Ëü»áÁ¬Ã¦ÖÕÖ¹½øÒ»²½µÄÔ˶¯¡£²»È»£¬Ëü»áʹÓà Web ÇëÇó´ÓÔ¶³ÌλÖÃÌáÈ¡ÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£DLL ÏÂÔسÌÐòµÄÉè¼ÆʹÆäÖ»ÄÜÔÚλÓÚÎÚ¿ËÀ¼µÄ×°±¸ÉÏÏÂÔصڶþ½×¶ÎµÄÓÐÓøºÔØ¡£È»ºó£¬ÏÂÔسÌÐò»áÖ´ÐÐһϵÁа취£¬µ¼Ö Cobalt Strike °²Åŵ½Êܺ¦Õß×°±¸ÉÏ¡£


https://news.hitb.org/content/ukrainian-systems-hit-cobalt-strike-malicious-excel-file


3. SYNNOVIS ÔâÀÕË÷Èí¼þ¹¥»÷£¬Ó°ÏìÂ׶صĶà¼ÒÒ½Ôº


6ÔÂ5ÈÕ£¬Synnovis ÊǸÇÒÁºÍÊ¥ÍÐÂí˹ NHS »ù½ð»áÐÅÍС¢Â׶عúÍõѧԺҽԺ NHS ÐÅÍÐÒÔ¼°Å·ÖÞ×î´óµÄÒ½ÁƼì²âºÍÕï¶ÏÌṩÉÌ SYNLAB Ö®¼äµÄ²¡ÀíѧÏàÖúͬ°é¹Øϵ¡£Synnovis ÔÚÆäÍøÕ¾ÉÏÐû²¼µÄһƪÎÄÕÂÖÐÅû¶£¬ÆäÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£Õâ¼Ò²¡ÀíѧºÍÕï¶Ï·þÎñÌṩÉÌÔÚ NHS ר¼ÒµÄ×ÊÖú϶ÔÇå¾²Îó²îÕö¿ªÁËÊӲ졣ר¼ÒÃÇÕýÔÚÆð¾¢ÖÜÈ«ÆÀ¹À¹¥»÷µÄÓ°Ï죬²¢½ÓÄÉÊʵ±²½·¥×èÖ¹ÊÂÎñ¡£¸Ã¹«Ë¾»¹Ðû²¼£¬ËûÃÇÕýÔÚÓë NHS Trust ÏàÖúͬ°éÇ×½üÏàÖú£¬ÒÔÖ»¹ÜïÔÌ­¶Ô»¼ÕߺÍÆäËû·þÎñÓû§µÄÓ°Ïì¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ÉÐδÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬ÀýÈçѬȾÆäϵͳµÄ¶ñÒâÈí¼þ¼Ò×åÒÔ¼°ÊÇ·ñÔâÊÜÊý¾Ýй¶¡£4Ô£¬SYNLAB¼¯ÍÅÒâ´óÀû·Ö¹«Ë¾Synlab ItaliaÒòÔâÊÜBlackbastaÍøÂç¹¥»÷¶øÏÝÈëÍ£Áô¡£¸Ã¹«Ë¾ÔÝÍ£ÁËÒâ´óÀû²ÉÑùµã¡¢Ò½ÁÆÖÐÐĺÍʵÑéÊÒµÄËùÓÐÔ˶¯¡£


https://securityaffairs.com/164142/cyber-crime/ransomware-attack-synnovis-london-hospitals.html


4. BianLian й¶Êý¾Ýºó£¬°Ä´óÀûÑÇ¿óÒµ¹«Ë¾Åû¶Υ¹æÐÐΪ


6ÔÂ5ÈÕ£¬±±·½¿óÒµ¹«Ë¾ÔçЩʱ¼äÐû²¼Í¨¸æÖÒÑԳƣ¬¸Ã¹«Ë¾ÔâÓöÍøÂç¹¥»÷ÊÂÎñ£¬µ¼Ö²¿·Ö±»µÁÊý¾Ý±»Ðû²¼ÔÚ°µÍøÉÏ¡£Northern Minerals ÊÇÒ»¼Ò°Ä´óÀûÑǹ«Ë¾£¬×¨×¢ÓÚ¿±Ì½ºÍ¿ª·¢ÖØÏ¡ÍÁÔªËØ (HRE)£¬ÌØÊâÊÇïáºÍï«£¬ÓÃÓÚµç×Ó¡¢µç³ØºÍ·É»ú¡£¸Ã¹«Ë¾¶Ô°Ä´óÀûÑÇÕþ¸®À´Ëµ¾ßÓÐÖÁ¹ØÖ÷ÒªµÄÕ½ÂÔÒâÒ壬×î½ü°Ä´óÀûÑÇÕþ¸®ºôÓõÖйú¹É¶«³öÊÛÆäÔÚ¸ÃÏ¡ÍÁ¿ó¹«Ë¾µÄ¹É·Ý¾Í֤ʵÎúÕâÒ»µã¡£¸Ã¹«Ë¾ÔÚ°Ä´óÀûÑÇ֤ȯÉúÒâËù (ASX) ¹ûÕæÉúÒ⣬¹ÉƱ´úÂëΪ¡°NTU¡±£¬Òò´ËÓÐÖ´·¨ÒåÎñʵʱÅû¶ÈκÎÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾½ñÌìÅû¶£¬ÆäϵͳÖеÄÊý¾ÝÓÚ 2024 Äê 3 ÔÂÏÂÑ®±»ÇÔÈ¡£¬ËæºóÐû²¼ÔÚ°µÍøÉÏ£¬µ«Ã»ÓÐ͸¶ÕØÊÂÕßµÄÃû×Ö¡£¸Ã¹«Ë¾ÌåÏÖ£¬Òѽ«´Ëʼû¸æ°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐĺͰĴóÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¬Í¬Ê±»¹½«Í¨¹ý¸öÐÔ»¯Í¨Öª¼û¸æÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£


https://www.bleepingcomputer.com/news/security/australian-mining-company-discloses-breach-after-bianlian-leaks-data/


5. ÐÂÐÍ V3B ÍøÂç´¹ÂÚ¹¤¾ß°üÃé×¼ 54 ¼ÒÅ·ÖÞÒøÐеĿͻ§


6ÔÂ4ÈÕ£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ Telegram ÉÏÍƹãÒ»ÖÖÃûΪ¡°V3B¡±µÄÐÂÐÍÍøÂç´¹ÂÚ¹¤¾ß°ü£¬ÏÖÔڸù¤¾ß°üµÄÄ¿µÄÊÇ°®¶ûÀ¼¡¢ºÉÀ¼¡¢·ÒÀ¼¡¢°ÂµØÀû¡¢µÂ¹ú¡¢·¨¹ú¡¢±ÈÀûʱ¡¢Ï£À°¡¢Â¬É­±¤ºÍÒâ´óÀûµÄ 54 ¼ÒÖ÷Òª½ðÈÚ»ú¹¹µÄ¿Í»§¡£¸ÃÍøÂç´¹ÂÚ¹¤¾ß°üµÄ¼ÛÇ®ÔÚÿÔ 130 ÖÁ 450 ÃÀÔªÖ®¼ä£¬Ïêϸȡ¾öÓÚ¹ºÖõÄÄÚÈÝ£¬¾ßÓи߼¶»ìÏý¡¢ÍâµØ»¯Ñ¡Ïî¡¢OTP/TAN/2FA Ö§³Ö¡¢ÓëÊܺ¦ÕßµÄʵʱ̸ÌìÒÔ¼°ÖÖÖÖÌӱܻúÖÆ¡£¾Ý·¢Ã÷ V3B µÄ Resecurity Ñо¿Ö°Ô±³Æ£¬Æä Telegram ƵµÀÒѾ­ÓµÓÐÁè¼Ý 1,250 Ãû³ÉÔ±£¬ÕâÅúעеÄÍøÂç´¹ÂÚ¼´·þÎñ (PhaaS) ƽ̨ÕýÔÚÍøÂç·¸·¨ÁìÓòѸËÙ»ñµÃ¹Ø×¢¡£V3B ÔÚ×Ô½ç˵ CMS ÉÏʹÓø߶ȻìÏýµÄ JavaScript ´úÂëÀ´Ìӱܷ´ÍøÂç´¹ÂÚºÍËÑË÷ÒýÇæ»úеÈ˵ļì²â²¢±ÜÃâÑо¿Ö°Ô±µÄ¹¥»÷¡£Ëü°üÀ¨·ÒÀ¼Óï¡¢·¨Óï¡¢Òâ´óÀûÓï¡¢²¨À¼ÓïºÍµÂÓïµÈ¶àÖÖÓïÑÔµÄרҵ·­ÒëÒ³Ã棬ÒÔÔöÇ¿ÍøÂç´¹ÂÚ¹¥»÷µÄÓÐÓÃÐÔ£¬Ê¹ÍþвÐÐΪÕßÄܹ»¿ªÕ¹¶à¹úÔ˶¯¡£


https://www.bleepingcomputer.com/news/security/new-v3b-phishing-kit-targets-customers-of-54-european-banks/


6. ºÚ¿ÍÍÅ»ïͨ¹ý DM ¹¥»÷¸ß×ÅÃû¶ÈµÄ TikTok Óû§


6ÔÂ5ÈÕ£¬TikTok ÌåÏÖ£¬ÏÖÔÚÕýÔÚ½ÓÄɲ½·¥Ìá·ÀÍøÂç¹¥»÷£¬¸Ã¹¥»÷ͨ¹ýÖ±½ÓÐÂÎÅÕë¶ÔһЩ×ÅÃûÓû§£¬ÊÔͼЮÖÆËûÃǵÄÕË»§¡£TikTok Òþ˽ºÍÇå¾²ÍŶӽ²»°ÈË Jason Grosse ÌåÏÖ£º¡°ÎÒÃÇÒѽÓÄɲ½·¥×èÖ¹´Ë´Î¹¥»÷£¬²¢±ÜÃâδÀ´Ôٴα¬·¢¡£ÎÒÃÇÕýÔÚÓëÊÜÓ°ÏìµÄÕË»§ËùÓÐÕßÖ±½ÓÏàÖú£¬ÒÔÔÚÐëҪʱ»Ö¸´»á¼ûȨÏÞ¡£¡±Grosse ÌåÏÖ£¬TikTok ÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷£¬ÏÖÔÚÎÞ·¨¾ÍÆä¹æÄ £»òÅÓºéˮƽ½ÒÏþ̸ÂÛ£¬³Æ¸ÃÍþв½ö½öÊÇ¡°Ç±ÔÚµÄÎó²î¡±¡£TikTok ÈÏ¿É´ËÊÂ֮ǰ£¬ÖܶþÓб¨µÀ³Æ£¬CNN µÄÕ˺ÅÉÏÖÜÔø±»ÔÝʱÈëÇÖ¡£Semafor Ô®Òý¸ÃÐÂÎÅ»ú¹¹Ò»Î»ÄäÃûÐÂÎÅÈËÊ¿µÄ»°³Æ£¬´Ë´ÎÈëÇÖ¡°Ëƺõ²»ÊÇÓÐÈË´Ó CNN ÄÇÀï»ñµÃ»á¼ûȨÏÞµÄЧ¹û¡±¡£CNN ûÓÐÁ¬Ã¦»ØÓ¦¡¶Á¬Ïß¡·ÔÓÖ¾µÄÖÃÆÀÇëÇó¡£¼øÓÚ½ñÄêÇïÌì¼´½«¾ÙÐеÄ×Üͳ´óÑ¡£¬ÈËÃǶÔÃÀ¹úÐÂÎÅ»ú¹¹Ôâµ½ºÚ¿Í¹¥»÷µÄµ£ÐÄÓÈÆä¸ßÕÇ¡£


https://news.hitb.org/content/tiktok-hack-targets-high-profile-users-dms