³¯ÏÊLazarus GroupʹÓÃÐéαÕÐƸÓë¶ñÒâÈí¼þËÁÅ°Çø¿éÁ´ÁìÓò
Ðû²¼Ê±¼ä 2024-09-119ÔÂ9ÈÕ£¬Group-IB µÄ×îб¨¸æÕ¹ÏÖÁ˳¯ÏÊÕþ¸®Ö§³ÖµÄ Lazarus Group ÕýÔÚ¾ÙÐеġ°Eager Crypto Beavers¡±Ô˶¯£¬¸ÃÔ˶¯ÏÔÖøÉý¼¶ÁËÆäÍøÂç¹¥»÷Õ½ÂÔ£¬×¨×¢ÓÚÇø¿éÁ´¼°¼ÓÃÜÇ®±ÒÁìÓò¡£Lazarus ¼¯ÍÅʹÓÃÖØ´óÊֶΣ¬ÈçÐéαÊÂÇéʱ»ú¡¢¶ñÒâÊÓƵ¾Û»áÓ¦ÓóÌÐò£¨ÈçFCCCall£©ÒÔ¼°GitHubÉϵÄÓÎÏ·ºÍ¼ÓÃÜÇ®±ÒÏîÄ¿£¬ÓÕµ¼Êܺ¦ÕßÏÂÔز¢Ö´ÐÐÃûΪBeaverTailµÄ¶ñÒâÈí¼þ¡£¸ÃÈí¼þ²»µ«ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬»¹°²ÅÅÃûΪInvisibleFerretµÄPythonºóÃÅÒÔÀ©´ó¹¥»÷¹æÄ£¡£±ðµÄ£¬¹¥»÷»¹À©Õ¹ÖÁmacOS×°±¸£¬²¢Í¨¹ý»ìÏý´úÂëºÍÔ¶³Ì»á¼û¹¤¾ß£¨ÈçAnyDesk£©ÔÚ¶à¸ö²Ù×÷ϵͳÉÏʵÏÖ³¤ÆÚÐÔ¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬LazarusÒѽ«Ä¿µÄÀ©´óÖÁä¯ÀÀÆ÷À©Õ¹¡¢ÃÜÂëÖÎÀíÆ÷¼°Microsoft Sticky Notes£¬²¢Í¨¹ýFTPºÍTelegramµÈÇþµÀÇÔÈ¡Êý¾Ý¡£´ËÔ˶¯ÏÔʾÁËLazarusÔÚÊý¾ÝÇÔÈ¡ÊÖÒÕÉϵĸ߶Èרҵ»¯ÓëÎÞаÐÔ£¬ÔöÌíÁËÇå¾²¼ì²âºÍÌá·ÀµÄÄѶȡ£
https://hackread.com/lazarus-group-blockchain-fake-video-conferencing-job-scam/?web_view=true
2. RansomHubÍÅ»ïÀÄÓÃTDSSKiller½ûÓÃEDRÈí¼þ
9ÔÂ10ÈÕ£¬RansomHub ÀÕË÷Èí¼þÍÅ»ïÇÉÃîʹÓÿ¨°Í˹»ùµÄÕýµ±¹¤¾ß TDSSKiller£¬¹æ±ÜÁËÄ¿µÄϵͳµÄ¶Ëµã¼ì²âºÍÏìÓ¦£¨EDR£©·À»¤¡£TDSSKiller Ô±¾Éè¼ÆÓÃÓÚ¼ì²âÄÑÒÔ²ì¾õµÄ rootkit ºÍ bootkit ¶ñÒâÈí¼þ£¬µ«Æ书Ч±» RansomHub ¶ñÒâʹÓã¬Í¨¹ý½ûÓà Malwarebytes Anti-Malware µÈÇå¾²·þÎñ£¬Ï÷ÈõÁËϵͳ·ÀÓù¡£ÕâÒ»ÀÄÓÃÊÖ·¨Ê¹ÓÃÁË TDSSKiller µÄÕýµ±ÐÔºÍÓÐÓÃÖ¤ÊéÊðÃû£¬Ê¹ÆäÄÜÌÓ±ÜÇå¾²Èí¼þµÄ×èµ²¡£Ëæºó£¬RansomHub °²ÅÅ LaZagne ƾ֤ÍøÂ繤¾ß£¬´Ó¶àÖÖÓ¦ÓÃÊý¾Ý¿âÖÐÇÔÈ¡µÇ¼ÐÅÏ¢£¬ÖúÁ¦ÆäÔÚÍøÂçÖкáÏòÀ©É¢¡£LaZagne µÄÔ˶¯ËäÒ×±»·¢Ã÷£¬µ« TDSSKiller µÄ½éÈëʹÆäÔ½·¢Òþ²Ø¡£Malwarebytes ±¨¸æÖ¸³ö£¬TDSSKiller Ö´ÐÐʱ½ÓÄɶ¯Ì¬ÎļþÃû£¬Òþ²ØÓÚÔÝʱĿ¼ÖУ¬ÔöÌíÁ˼ì²âÄѶȡ£ÃæÁÙ´ËÍþв£¬Çå¾²¹«Ë¾½¨ÒéÔöÇ¿ EDR ½â¾ö¼Æ»®µÄ·À¸Ä¶¯¹¦Ð§£¬±ÜÃâÀàËÆ TDSSKiller µÄ¹¤¾ß½ûÓ÷À»¤¡£Í¬Ê±£¬¼à¿ØÌض¨ÃüÁîÐвÎÊýºÍÖ´ÐÐÐÐΪҲÊÇÓÐÓ÷ÀÓù²½·¥¡£
https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/
3. KonniºÚ¿Í×éÖ¯£ºÕë¶Ô¶íº«µÄÍøÂçÌع¤¹¥»÷Õ½ÂÔ
9ÔÂ10ÈÕ£¬Ñо¿Ö°Ô±½üÆÚ·¢Ã÷£¬Ó볯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯KimsukyÓйØÁªµÄÍþвÐÐΪÕßKonni£¬Õý¼Ó´ó¶Ôº«¹úºÍ¶íÂÞ˹µÄÍøÂç¹¥»÷Á¦¶È¡£KonniÔÚ¶ÔÕâÁ½¸ö¹ú¼ÒµÄ¹¥»÷ÖУ¬Õ¹ÏÖÁ˸߶ȵÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÏàËÆÐÔ£¬Ö÷ҪĿµÄÊǾÙÐÐÍøÂçÌع¤Ô˶¯¡£×Ô2021ÄêÆð£¬KonniÒÑÕë¶Ô¶íÂÞ˹Íâ½»²¿¡¢¶íÂÞ˹פӡÄá´óʹ¹Ý¼°¶à¼Òº«¹úÆóÒµÌᳫ¹¥»÷£¬°üÀ¨ÔÚ2022Äê1ÔÂʹÓÃÐÂÄê×£¸£ÓʼþÏò¶íÂÞ˹´óʹ¹ÝÍâ½»¹ÙÈö²¥¶ñÒâÈí¼þ¡£ÆäÔ˶¯¿É×·ËÝÖÁ2014Ä꣬ºã¾ÃÇÒÒ»Á¬¡£Konni½ÓÄÉ´¹ÂÚÓʼþ×÷ΪÈëÇÖÊֶΣ¬Ê¹ÓÃË°ÊÕ¡¢½±Ñ§½ðµÈÓÕ¶ü»ñȡϵͳ»á¼ûȨÏÞ£¬²¢Í¨¹ý×Ô½ç˵µÄÔ¶³Ì»á¼ûľÂíÍêÈ«¿ØÖÆÊܺ¦ÏµÍ³¡£ÔÚ¹¥»÷Àú³ÌÖУ¬¸Ã×é֯ʹÓÃÏàËÆÊÖÒÕ½«ÊÜѬȾװ±¸½ÓÈëºÚ¿Í¿ØÖƵÄÏÂÁî·þÎñÆ÷£¬Í¨¹ýÄÚÊÖÏÂÁîʵÏÖÅþÁ¬¡£Ö»¹Ü¹¥»÷ģʽ¶àÄêδ±ä£¬µ«KonniҲ͎áÐÂÓ±Õ½ÂÔÒÔÌáÉýÀÖ³ÉÂÊ¡£Ñо¿Ö°Ô±Ç¿µ÷£¬¹Ø×¢KonniÔÚ²î±ð¹ú¼Ò¼ä¹¥»÷µÄÏàËÆÐÔ£¬¹ØÓÚÇ徲ר¼ÒÖƶ©¸üÓÐÓõķÀÓùÕ½ÂԺ;«×¼¹éÒò¾ßÓÐÖ÷ÒªÒâÒ壬ÓÐÖúÓÚ¸üºÃµØ±£»¤Ä¿µÄʵÌåÃâÊÜ´ËÀàÍøÂçÍþвµÄË𺦡£
https://therecord.media/kimsuky-north-korea-hackers-targeting-russia-south-korea?&web_view=true
4. WPSÆØ95ÍòÓû§ÐÅÏ¢ÔâMOVEitºÚ¿Í¹¥»÷й¶
9ÔÂ10ÈÕ£¬Íþ˹¿µÐÇÖÝҽʦ·þÎñ°ü¹Ü¹«Ë¾£¨WPS£©½üÆÚÈ·ÈÏ£¬Ô¼950,000ÃûСÎÒ˽¼ÒµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2023ÄêµÄÒ»ÆðMOVEitºÚ¿Í¹¥»÷ÊÂÎñÖÐÔâй¶¡£¸ÃÊÂÎñÔ´ÓÚProgress SoftwareÆìϵÄMOVEit TransferÈí¼þ±»¶íÓïCl0pÀÕË÷Èí¼þ×é֯ʹÓÃÁãÈÕÎó²îÇÖÈ룬µ¼ÖÂÈ«Çò½ü2,800¸ö×éÖ¯ÊÜ´´£¬ÀÛ¼ÆСÎÒ˽¼ÒÐÅϢй¶Á¿¸ß´ï9600ÍòÌõ¡£WPS×÷ΪÊܺ¦ÕßÖ®Ò»£¬ÓÚ9ÔÂ6ÈÕÐû²¼£¬Æä946,801ÃûÒ½ÁÆ°ü¹ÜÊÜÒæÈË¿ÉÄÜÊܵ½²¨¼°£¬°üÀ¨²¿·ÖCMS£¨Ò½ÁÆ°ü¹ÜºÍÒ½ÁƽòÌù·þÎñÖÐÐÄ£©ÊÜÒæÈË¡£Ö»¹Ü³õ³ÌÐò²éÏÔʾÎÞÖ±½ÓÖ¤¾ÝÅú×¢Êý¾Ý±»¸´ÖÆ£¬µ«ËæºóµÄÉîÈëÊÓ²ìÈ·ÈÏ£¬²¿·Ö°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅµÈÃô¸ÐÐÅÏ¢µÄÎļþÒÑ´ÓWPSµÄMOVEitϵͳÖб»µÁ¡£Ö»¹ÜÏÖÔÚδÊÕµ½ÒòÐÅϢ鶵¼ÖµÄڲƱ¨¸æ£¬WPSÈÔ½ÓÄÉÆð¾¢²½·¥£¬ÎªÊÜÓ°ÏìµÄÒ½ÁÆ°ü¹ÜÊÜÒæÈËÌ滻кÅÂëµÄÒ½ÁÆ°ü¹Ü¿¨£¬²¢ÌṩΪÆÚÒ»ÄêµÄÐÅÓüà¿ØºÍÉí·Ý±£»¤·þÎñ£¬Í¬Ê±ÌáÐѹ«ÖÚ¼á³ÖСÐÄ£¬Ìá·ÀDZÔÚΣº¦¡£
https://www.securityweek.com/wisconsin-insurer-discloses-data-breach-impacting-950000-individuals/
5. Confidant Health 5.3TBÐÄÀí¿µ½¡¼Í¼Ôâй¶
9ÔÂ6ÈÕ£¬ÃÀ¹úÈ˹¤ÖÇÄÜÒ½Áƹ«Ë¾Confidant HealthÒò·þÎñÆ÷ÉèÖùýʧ£¬ÒâÍâй¶Á˸ߴï5.3TBµÄÃô¸ÐÐÄÀí¿µ½¡¼Í¼£¬ÄÚÈÝÉ漰СÎÒ˽¼ÒÐÅÏ¢¡¢ÐÄÀíÆÀ¹À¼°Ï꾡ҽÁÆÊý¾Ý£¬Ö±½ÓÍþвµ½Áè¼Ý12.6ÍòÃû»¼ÕßµÄÒþ˽Çå¾²¡£¸ÃÊÂÎñÓÉÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆ£¬Ëû·¢Ã÷ÁËδÉèÃÜÂë±£»¤µÄ·þÎñÆ÷£¬ÄÚº¬À´×ÔÎåÖÝ»¼ÕßµÄ˽ÃÜÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÁªÏµ·½·¨µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬ÒÔ¼°ÏêϸµÄÐÄÀí¿µ½¡ÆÀ¹À¡¢´¦·½Ò©Çåµ¥¡¢Ò½ÁƽòÌù¿¨ÐÅÏ¢µÈ¡£ÓÈΪÑÏÖصÄÊÇ£¬Ð¹Â¶Êý¾Ý»¹Éæ¼°ÒôƵÊÓƵ¼Í¼£¬ÌÖÂÛÁ˼«ÎªË½ÃܵļÒÍ¥ÎÊÌâ¡£Confidant HealthѸËÙÈϿɲ¢ÏÞÖÆÁË»á¼û£¬µ«Ð¹Â¶µÄÒ»Á¬Ê±¼ä¼°Ç±ÔÚÓ°Ïì¹æÄ£Éв»ÇåÀÊ¡£Ö»¹Ü²¿·ÖÎļþÊÜÏÞÖÆ»á¼û£¬µ«ÒÑ鶵ÄÎļþ·¾¶ºÍ´æ´¢Î»ÖÃÈÔ¿ÉÄܳÉΪºÚ¿Í¹¥»÷µÄÌø°å£¬¼Ó¾ç»¼ÕßÃæÁÙµÄΣº¦¡£´ËÀàÊý¾Ýй¶²»µ«¿ÉÄÜÒý·¢Éí·Ý͵ÇÔ¡¢Ò½ÁÆڲƵÈÑÏÖØЧ¹û£¬»¹¿ÉÄܶԻ¼ÕßÔì³É¾«ÉñѹÁ¦ºÍÐÄÀíΣÏÕ¡£
https://hackread.com/ai-firm-misconfigured-server-exposed-mental-health-data/
6. NoNameÀÕË÷Èí¼þÍÅ»ï×î½ü°²ÅÅÁËRansomHub¶ñÒâÈí¼þ
9ÔÂ10ÈÕ£¬NoNameÀÕË÷Èí¼þÍÅ»ï½üÄêÀ´ÖÂÁ¦ÓÚÔÚÈ«Çò¹æÄ£ÄÚÕë¶ÔÖÐСÐÍÆóҵʵÑé¹¥»÷£¬ÒÔÊ÷Á¢ÆäÔÚÀÕË÷Èí¼þ½çµÄÉùÓþ¡£¸ÃÍÅ»ïʹÓðüÀ¨EternalBlueºÍZeroLogonÔÚÄڵĶàÖÖ¾ÉÎó²î£¬Í¨¹ý±©Á¦Æƽâ»ñÈ¡ÍøÂç»á¼ûȨÏÞ£¬²¢°²ÅÅÆ䶨Öƹ¤¾ßSpacecolon¶ñÒâÈí¼þ¼Ò×å¡£½üÆÚ£¬NoNameתÏòʹÓÃScRansomÀÕË÷Èí¼þ£¬Ìæ»»ÁË֮ǰµÄScarab¼ÓÃÜÆ÷£¬²¢ÊÔͼͨ¹ýÄ£ÄâLockBit 3.0µÈ×ÅÃûÀÕË÷Èí¼þÀ´Ìá¸ßÆä×ÅÃû¶È¡£ScRansomËäÈ»²»ÈçÆäËûÀÕË÷Èí¼þÖش󣬵«¾ß±¸²¿·Ö¼ÓÃÜ¡¢ÎļþÄÚÈÝÌæ»»µÈÄÜÁ¦£¬²¢ÄܼÓÃܶàÖÖÇý¶¯Æ÷ÉϵÄÎļþ¡£ESETÖ¸³ö£¬¸ÃÍÅ»ïÔÚ½âÃÜÀú³ÌÖÐÌåÏÖ²»¿ÉÊ죬ӰÏìÁËÆäÉùÓþºÍÊܺ¦Õ߸¶¿îµÄÒâÔ¸¡£±ðµÄ£¬NoName»¹Ê¹Óöà¸öSMBÇéÐÎÖеÄÎó²î£¬°üÀ¨EternalBlueºÍZerologonµÈ£¬ÒÔ¼°Í¨¹ý½ûÓÃWindows DefenderµÈÊÖ¶ÎÌáÉý¹¥»÷Ч¹û¡£×î½ü£¬Óм£ÏóÅú×¢NoName¿ÉÄÜÒѳÉΪRansomHubµÄÁ¥Êô»ú¹¹£¬Í¨¹ý°²ÅÅRansomHubµÄEDRɱÊÖºÍÀÕË÷Èí¼þÀ´À©Õ¹ÆäÔ˶¯¹æÄ£¡£Ö»¹ÜÓëRansomHubµÄÕýʽ¹ØÁªÉдýÈ·ÈÏ£¬µ«NoNameÏÔÈ»²¢Î´·ÅÆúÆäÀÕË÷Èí¼þÓªÒµ£¬ScRansom¼ÓÃÜÆ÷ÈÔÔÚÆ𾢿ª·¢ÖС£
https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/