ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ
Ðû²¼Ê±¼ä 2022-04-251¡¢ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ
¾ÝýÌå4ÔÂ22ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïContiÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ¡£¹¥»÷±¬·¢ÔÚÉÏÖÜ£¬Ó°ÏìÁ˰üÀ¨²ÆÎñ²¿ºÍÀ͹¤²¿ÔÚÄڵĶà¸ö²¿·Ö¡£¾ÝϤ£¬×î³õµÄ¹¥»÷ÆÈʹ²ÆÎñ²¿¹Ø±ÕÆäϵͳ³¤´ïÊýСʱ£¬¸ÃϵͳÈÏÕæÖ§¸¶¸Ã¹ú´ó²¿·Ö¹«ÎñÔ±µÄн³ê£¬Í¬Ê±Ò²´¦Öóͷ£Õþ¸®ÑøÀϽðÖ§¸¶¡£ÏÖÔÚ£¬ContiÒѹûÕæÁË50%µÄ±»µÁÊý¾Ý¡£¸ç˹´ïÀè¼Ó×ÜͳÌåÏÖ£¬ËûÃDz»»áÏòÍøÂç¹¥»÷ÍÅ»ïÖ§¸¶Êê½ð¡£
https://securityaffairs.co/wordpress/130505/cyber-crime/costa-rica-conti-ransomware.html
2¡¢Altahrea Team DDoS¹¥»÷ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAAµÄÍøÕ¾
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAA³ÆÆäÍøÕ¾Ôâµ½ÁËDDoS¹¥»÷¡£¾ÝϤ£¬´Ë´Î¹¥»÷À´×ÔÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Altahrea Team£¬Ö¼ÔÚÅê»÷ÃÀ¹úÓÚ1ÔÂ3ÈÕ¾ÙÐеľüÊÂÔ˶¯¡£IAAÌåÏÖ£¬Æä²Ù×÷ϵͳºÍÍøÂçûÓÐÊܵ½ÈκÎÓ°Ïì¡£ÔÚ´Ë֮ǰ£¬¾ÝYnet±¨µÀ£¬3ÔÂ15ÈÕÔøÓжà¸öÒÔÉ«Áйٷ½ÍøÕ¾·þÎñÖÐÖ¹£¬¿ÉÄÜÊÇÓëÒÁÓйصĹ¥»÷Õß¾ÙÐеĴó¹æÄ£ÍøÂç¹¥»÷¡£
https://www.jns.org/report-pro-iran-hackers-target-israel-airports-authority-website/
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢Ã÷ÒÔ¡°Azovstal¡±ÎªÖ÷ÌâµÄ´¹ÂÚÔ˶¯
ýÌå4ÔÂ23Èճƣ¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)Ðû²¼ÁËÐÂÒ»ÂÖ´¹ÂÚÔ˶¯µÄÇ徲ͨ¸æ¡£´Ë´ÎÔ˶¯ÒÔ¡°Azovstal¡±ÎªÖ÷Ì⣬ʹÓÃÁ˶ñÒâofficeÎļþ¡£·¿ªÎļþ²¢ÆôÓúêºó£¬Ëü½«ÔÚ´ÅÅÌÉϽ¨Éè²¢ÔËÐжñÒâDLL¡°pe.dll¡±£¬×îºóÖ¼ÔÚ×°ÖÃCobalt Strike Beacon£¬ÓÃÓÚ¿ØÖÆÄ¿µÄϵͳ¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎö¹¥»÷ÖÐʹÓõļÓÃÜÊÖÒÕ£¬Íƶϴ˴ÎÔ˶¯ÓëºÚ¿ÍÍÅ»ïTrickbotÓйء£¸Ãͨ¸æ»¹ÌṩÁ˹ØÓÚ´Ë´ÎÔ˶¯µÄIoCÒÔ¼°·ÀÓù½¨Òé¡£
https://securityaffairs.co/wordpress/130515/cyber-warfare-2/ukraine-cert-warns-azovstal-themed-phishing.html
4¡¢ÃÀ¹úʳÎ﹫˾Bob's Red Mill֪ͨ¿Í»§ÆäÐÅÏ¢ÒѾй¶
ýÌå4ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹úÈ«ÂóʳÎ﹫˾Bob's Red Mill֪ͨÔÚÏ߿ͻ§£¬ÆäÐÅÏ¢ÒѾй¶¡£Í¨ÖªÖÐдµÀ£¬¸Ã¹«Ë¾×î½ü·¢Ã÷ÔÚ2ÔÂ23ÈÕÖÁ3ÔÂ1ÈÕʱ´ú£¬¹¥»÷ÕßʹÓöñÒâÈí¼þÇÔÈ¡ÆäÍøÕ¾ÖеÄÖ§¸¶ÐÅÏ¢¡£´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÔÚÏ߿ͻ§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢Õ˵¥¡¢ËÍ»õµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍ¹ºÖýð¶îµÈ¡£¸Ã¹«Ë¾ÌåÏÖ£¬ÒÑÓÐÐí¶àÖ÷¹Ë±¨¸æËûÃÇÔâµ½ÁËÚ²ÆÐÔÏûºÄ£¬ËäÈ»²»ÖªµÀÕâЩÊÂÎñÊÇ·ñÓëÊý¾ÝÇÔÈ¡Óйأ¬µ«ÏÖÔÚ¿´À´£¬Ö§¸¶¿¨ÐÅÏ¢¿ÉÄÜÒѾй¶¡£
https://www.infosecurity-magazine.com/news/bobs-red-mill-reports-data-breach/
5¡¢CrowdStrikeÐû²¼¹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄÆÊÎö±¨¸æ
4ÔÂ21ÈÕ£¬CrowdStrikeÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬½©Ê¬ÍøÂçÔËÓªÍÅ»ïLemonDuckʹÓÃLinux·þÎñÆ÷ÉϵÄDocker API¾ÙÐдó¹æÄ£MoneroÍÚ¿óÔ˶¯¡£LemonDuckͨ¹ý»á¼û̻¶µÄDocker API²¢ÔËÐжñÒâÈÝÆ÷À´ÏÂÔØÎ±×°³ÉPNGͼÏñµÄBash¾ç±¾£¬Ëü»¹»áͨ¹ý½ûÓð¢ÀïÔÆµÄ¼à¿Ø·þÎñÀ´Èƹý¼ì²â¡£Óë´Ëͬʱ£¬Cisco TalosÒ²Åû¶ÁËÒ»¸öÓëTeamTNTÓйصĹ¥»÷Ô˶¯£¬Õë¶ÔAmazon Web ServicesÉÏ̻¶µÄDocker API¡£
https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷Èí¼þBlackByteµÄÆÊÎö±¨¸æ
Unit 42ÔÚ4ÔÂ21ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlackByteµÄÆÊÎö±¨¸æ¡£BlackByteÊÇÒ»ÖÖRaaS£¬ÓÚ2021Äê7ÔÂÊ״ηºÆð£¬¹¥»÷ÕßÖ÷ҪʹÓÃProxyShellÎó²î¡£¸ÃÀÕË÷Èí¼þµÄÔ˶¯Ò»Ö±·Ç³£»îÔ¾£¬×Ô2021Äê11ÔÂÒÔÀ´£¬Õë¶ÔÈ«ÇòµÄ¶à¸ö×éÖ¯£¬Éæ¼°ÄÜÔ´¡¢Å©ÒµºÍ½ðÈÚ·þÎñµÈÐÐÒµ¡£Unit 42ÔÚÒ°Íâ¼ì²âµ½ÁËËüµÄ¶à¸ö±äÌ壬°üÀ¨ÓÃGoºÍÓÃ.NET±àдµÄ£¬ÒÔ¼°ÓÃGoºÍC»ìÏý±àдµÄ±äÌå¡£BlackByteÓëLockbit 2.0µÈÀÕË÷Èí¼þÓÐÏàËÆÖ®´¦£¬ËüÃǶ¼ÈƹýÁËʹÓöíÓïµÈ¶àÖÖ¶«Å·ÓïÑÔµÄϵͳ¡£
https://unit42.paloaltonetworks.com/blackbyte-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ