Ñо¿Ö°Ô±Ðû²¼¹¥»÷Ó¡¶ÈºËµçÕ¾µÄ¶ñÒâÑùÌìÖ°Îö±¨¸æ£»¼ÓÄôóÒþ˽±£»¤·¨¹«²¼Ò»ÄêºóÊÂÎñ±¨¸æÔöÌíÖÁÁù±¶
Ðû²¼Ê±¼ä 2019-11-05
Ç徲ר¼ÒMarco Ramilli¼°ÆäÍŶӯÊÎöÁËѬȾӡ¶ÈKudankulamºËµçÕ¾µÄ¶ñÒâÑù±¾¡£¸ÃÑù±¾ÓÚ10ÔÂ28ÈÕ±»ÉÏ´«ÖÁVirus Total£¬ÊÇÒ»¸ö±àÒëÓÚ2019-07-29 13:36:26µÄ32λPEÎļþ£¬ËüÔÚÔËÐкóÖ´ÐÐÈý¸öÖ÷Òª²Ù×÷£¬°üÀ¨µ¼È빦Чģ¿é¡¢ÍøÂçÍâµØÐÅÏ¢¼°·¢ËÍÖÁÖÐÑë½Úµã¡£¸ÃÑù±¾ÍøÂçµÄÐÅÏ¢°üÀ¨ÍâµØIPµØµã¡¢Ê¹ÃüÁÐ±í¡¢Â·ÓɺͽӿÚÐÅÏ¢ÒÔ¼°Ô¤Éè´æ´¢ÔÚϵͳijЩ¾íÖеÄÈí¼þ¡£ÕâЩÐÅÏ¢×îºó±»·¢Ë͵½10.38.1.35£¬ÔÚ´úÂëÖгÆÎªcontroller5kk¡£RamilliÈ·ÈϸÃÑù±¾ÊǶ¨ÖÆ»¯µÄDTrack¶ñÒâÈí¼þ¡£
¡¢ÔÎÄÁ´½Ó£º
https://marcoramilli.com/2019/11/04/is-lazarus-apt38-targeting-critical-infrastructures/
2¡¢Î÷°àÑÀÁ½¼Ò¹«Ë¾ÔâÕë¶ÔÐÔÀÕË÷Èí¼þ¹¥»÷
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/11/everis-spain-ransomware-attack.html3¡¢·ðÂÞÀï´ïÖݰ¿¨ÀÊÐÊÜBECÕ©ÆËðʧ74.2ÍòÃÀÔª

·ðÂÞÀï´ïÖݵİ¿¨ÀÊгÉΪBECթƵÄ×îÐÂÊܺ¦Õߣ¬Ú²ÆÕß´Ó¸ÃÊÐÆ×ßÁËÁè¼Ý74.2ÍòÃÀÔª¡£¸ÃÊÂÎñ±¬·¢ÔÚ9Ô·ݣ¬Ú²ÆÕßαװ³ÉÔڰ¿¨À¹ú¼Ê»ú³¡ÖÆ×÷к½Õ¾Â¥µÄÐÞ½¨¹«Ë¾Ausley ConstructionµÄÒ»ÃûÔ±¹¤£¬Ïò¸ÃÊеĸ߼¶»á¼ÆÖ°Ô±·¢ËÍÁ˰üÀ¨Â·ÓɺÅÂë¡¢ÒøÐÐÕË»§ÒÔ¼°Ò»ÕÅÎÞЧ֧Ʊ¸±±¾µÄµç×ÓÓʼþ¡£¸ÃÓʼþÀ´×ÔÓÚausleyconstructions.com£¬¶øÕæÊµµÄµØµãĩβûÓÐs¡£µ±Ausley ConstructionÔÚ10ÔÂ22ÈÕ֪ͨ¸ÃÊиÿî×ÓÉÐδ֧¸¶Ê±£¬°Â¿¨ÀÊвŷ¢Ã÷Ç®±»»ãÈëÁËÚ²ÆÕßµÄÒøÐÐÕË»§¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bec-fraudsters-divert-742-000-from-ocala-city-in-florida/4¡¢NunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬ËùÓÐÕþ¸®µ¥Î»¾ùÊÜÓ°Ïì
¼ÓÄôóNunavutÔâÀÕË÷Èí¼þ¹¥»÷£¬ËùÓÐÕþ¸®µ¥Î»¾ùÊÜÓ°Ï죬Õþ¸®¹ÙÔ±ÌåÏÖÉÐÎÞ·¨Ô¤¼Æ·þÎñºÎʱ»Ö¸´ÉÏÏß¡£¸ÃÊÂÎñ±¬·¢ÔÚÖÜÁùÔ糿£¬ÍâµØÕþ¸®µÄËùÓеç×ÓÐÅϢϵͳ¾ùÊÜÓ°Ï죬Ա¹¤ÎÞ·¨µÇ¼ÆäÕþ¸®ÕË»§£¬µç»°ÏµÍ³Ò²ÎÞ·¨Ê¹Ó㬵«¸ÃµØÇøµÄѧУδÊÜÓ°Ïì¡£Õþ¸®¹ÙÔ±ÌåÏÖÄ¿½ñÉÐûÓжÔСÎÒ˽¼ÒÐÅÏ¢»òÒþ˽Êý¾Ýй¶µÄµ£ÐÄ¡£
ÔÎÄÁ´½Ó£º
https://www.cbc.ca/news/canada/north/nunavut-government-ransomware-1.5346144
5¡¢¼ÓÄôóÒþ˽±£»¤·¨¹«²¼Ò»ÄêºóÊÂÎñ±¨¸æÔöÌíÖÁÁù±¶
¼ÓÄôó¡¶Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»¤ºÍµç×ÓÎļþ·¨¡·£¨PIPEDA£©ÓÚ2018Äê11ÔÂ1ÈÕÆðʵÑ飬ƾ֤¸ÃÖ´·¨£¬ÊÜÔ¼ÊøµÄÆóÒµ±ØÐèÏòÒþ˽רԱ°ì¹«ÊÒ£¨OPC£©±¨¸æÊý¾Ýй¶ÊÂÎñ²¢Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£ÔÚÒÑÍùµÄ12¸öÔÂÖУ¬¼ÓÄôóÊý¾Ýй¶±¨¸æµÄÊýÄ¿ÃÍÔö£¬OPC¹²ÊÕµ½ÁË680·Ý±¨¸æ£¬ÊǸÃÖ´·¨ÉúЧǰ12¸öÔÂÄÚÌá½»±¨¸æÊýÄ¿µÄÁù±¶¡£Æ¾Ö¤ÕâЩ±¨¸æ£¬ÊÜÊý¾Ýй¶ӰÏìµÄ¼ÓÄÃÖÁ¹«ÃñÊýĿԶԶÁè¼Ý2800Íò£¬±¨¸æµÄ´ó´ó¶¼Î¥¹æÊÂÎñ£¨58£¥£©É漰δ¾ÊÚȨµÄ»á¼û¡£
ÔÎÄÁ´½Ó£º
https://www.priv.gc.ca/en/blog/20191031/
6¡¢2019ÄêÖÁÉÙ13¼ÒÍйܷþÎñÉ̱»ÓÃÓÚÍÆËÍÀÕË÷Èí¼þ
ƾ֤ÍþвÇ鱨³§ÉÌArmorÐû²¼µÄÒ»·Ýб¨¸æ£¬2019ÄêÖÁÉÙÓÐ13¼ÒÍйܷþÎñÉÌ£¨MSP£©±»ºÚ¿ÍÓÃÓÚÍÆËÍÀÕË÷Èí¼þ¡£Ò»µ©ºÚ¿ÍÈëÇÖMSPµÄÍøÂ磬ËûÃǾͿÉÒÔʹÓÃÔ¶³Ì»á¼û¹¤¾ß½«ÀÕË÷Èí¼þ°²Åŵ½Êý°Ù¼Ò¹«Ë¾/Êýǧ̨ÅÌËã»úÉÏ¡£¸ÃÁбí°üÀ¨ApexÈËÁ¦×ÊÔ´ÖÎÀí¡¢CloudJumper¡¢IT By Design¡¢MetroList¡¢CorVel¡¢PM Consultants¡¢iNSYNQ¡¢TSM Consulting¡¢PerCSoft¡¢SCHOOLinSITES¡¢TrialWorks¡¢BillTrustÒÔ¼°Ò»¼Òδ֪µÄMSP¡£ArmorÌåÏÖ¿ÉÄÜÉÐÓиü¶àµÄMSPÈëÇÖÊÂÎñδ±»±¨¸æ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/at-least-13-managed-service-providers-were-used-to-push-ransomware-this-year/


¾©¹«Íø°²±¸11010802024551ºÅ