еÄRiseProͨ¹ýPrivateLoader PPI·þÎñ¾ÙÐзַ¢
Ðû²¼Ê±¼ä 2022-12-28
¾Ý12ÔÂ24ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐÂÐÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRisePro¡£ËüÓÚ2022Äê12ÔÂ13ÈÕÊ״α»¼ì²âµ½£¬ÕýÔÚͨ¹ýPrivateLoader°´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þÏÂÔØ·þÎñ¾ÙÐзַ¢¡£RiseProÓÉC++¿ª·¢£¬Ëƺõ¾ßÓÐÓëVidarÀàËÆµÄ¹¦Ð§£¬Ö¼ÔÚ×ÊÖú¹¥»÷Õß´Ó±»Ñ¬È¾µÄ×°±¸ÖÐÇÔȡĿµÄµÄÐÅÓÿ¨¡¢ÃÜÂëºÍ¼ÓÃÜÇ®°ü¡£Flashpoint±¨¸æ³Æ£¬¹¥»÷ÕßÒѾÔÚ¶íÂÞ˹°µÍøÊг¡ÉϳöÊÛÊýÒÔǧ¼ÆµÄRiseProÈÕÖ¾£¨´Ó±»Ñ¬È¾×°±¸ÖÐÇÔÈ¡µÄÊý¾Ý°ü£©¡£
https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/
2¡¢RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ
¾ÝýÌå12ÔÂ26ÈÕ±¨µÀ£¬RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ¡£ÍßŬ°¢Í¼ÔøÔÚ11Ô³õÐû²¼ËûÃÇÔâµ½ÁËÀÕË÷¹¥»÷£¬ÔÚ¿ìÒªÒ»¸öÔºóÈÔδÍêÈ«»Ö¸´¡£12ÔÂ24ÈÕ£¬RansomHouseÍŻォÍßŬ°¢Í¼Õþ¸®ÁÐÈëÁËËûÃǵÄÍøÕ¾£¬³ÆÒÑÓÚ10ÔÂ6ÈÕ¼ÓÃÜËûÃǵÄϵͳ£¬²¢ÇÔÈ¡ÁË3.2 TBµÄÎļþ¡£Ðû²¼µÄÑù±¾ÖÐÎļþ¿´ÆðÀ´È·ÊµÓëÕþ¸®µÄÎļþÒ»Ö£¬ÆäÖв»°üÀ¨Ð¡ÎÒ˽¼Ò»òÃô¸ÐµÄÎļþ¡£ÏÖÔÚÉв»ÇåÎúÊê½ð½ð¶îÊǼ¸¶à£¬»òÊÇ·ñ¾ÙÐйý̸ÅС£
https://www.databreaches.net/vanuatu-ransomware-attack-claimed-by-ransomhouse/
3¡¢CrowdStrikeÅû¶GuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì
CrowdStrikeÔÚ12ÔÂ19ÈÕÅû¶ÁËGuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì¡£GuLoader£¨ÓÖÃûCloudEyE£©£¬ÊÇÒ»ÖÖVisual Basic Script(VBS)ÏÂÔØ³ÌÐò£¬ÓÚ2019ÄêÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£ËüʹÓöà̬shellcode¼ÓÔØ³ÌÐòÀ´Èƹý¹Å°åÇå¾²½â¾ö¼Æ»®£¬Ñо¿Ö°Ô±Îª¶ñÒâÈí¼þʹÓõÄÿ¸öAPIÓ³ÉäËùÓÐǶÈëʽDJB2¹þÏ£ÖµÀ´ÆÊÎöÆäÔ˶¯¡£ÐµÄshellcode·´ÆÊÎöÊÖÒÕͨ¹ýɨÃèÕû¸öÀú³ÌÄÚ´æÀ´²éÕÒÓëÐéÄâ»ú(VM)Ïà¹ØµÄ×Ö·û´®£¬ÐµÄÈßÓà´úÂë×¢Èë»úÖÆÒâζ×Åͨ¹ýʹÓÃÄÚÁª»ã±àÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄÓû§Ä£Ê½hookÀ´È·±£´úÂëµÄÖ´ÐС£
https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/
4¡¢TrendMicro·¢Ã÷ʹÓùȸèPPC¹ã¸æ·Ö·¢IcedIDµÄÔ˶¯
12ÔÂ23ÈÕ£¬Trend Micro͸¶Æä·¢Ã÷½©Ê¬ÍøÂçIcedIDµÄ·Ö·¢·½·¨±¬·¢ÁËÖØ´óת±ä¡£×Ô2022Äê12ÔÂÒÔÀ´£¬Ñо¿Ö°Ô±ÊӲ쵽ʹÓùȸèÿ´Îµã»÷¸¶·Ñ(PPC)¹ã¸æ·Ö·¢IcedIDµÄÔ˶¯¡£IcedIDÔËÓªÍÅ»ïÐ®ÖÆÁËAdobe¡¢FortinetºÍDiscordµÈÆ·ÅÆºÍÓ¦ÓÃËùʹÓõÄÒªº¦´ÊÀ´ÏÔʾ¶ñÒâ¹ã¸æ¡£µ±Óû§ËÑË÷Òªº¦×Öʱ£¬Ö¸Ïò¶ñÒâÍøÕ¾µÄ¹ã¸æÏÔʾÔÚ×ÔÈ»ËÑË÷Ч¹ûÉÏ·½¡£ÔÚ´ËÔ˶¯ÖУ¬¼ÓÔØ³ÌÐòÊÇͨ¹ýMSIÎļþ·Ö·¢µÄ£¬Õâ¹ØÓÚIcedIDÀ´ËµÊDz»³£¼ûµÄ¡£±ðµÄ£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄKeitaroÁ÷Á¿µ¼Ïòϵͳ(TDS)À´¹ýÂËÀ´×ÔÑо¿Ö°Ô±ºÍɳºÐµÄÁ÷Á¿¡£
https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html
5¡¢Ö¥¼Ó¸çµÄÄÜÔ´¹«Ë¾Sargent & LundyÔâµ½ÀÕË÷¹¥»÷
ýÌå12ÔÂ27Èճƣ¬ÃÀ¹úCNN͸¶ºÚ¿ÍÔÚ½üÆÚµÄÀÕË÷¹¥»÷ÖÐÇÔÈ¡Á˶à¼ÒµçÁ¦¹«Ë¾µÄÊý¾Ý¡£´Ë´ÎÀÕË÷¹¥»÷Õë¶ÔµÄÊÇ×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄSargent & Lundy¹¤³Ì¹«Ë¾£¬¸Ã¹«Ë¾Éè¼ÆÁË900¶à¸ö·¢µçÕ¾ºÍÊýǧӢÀïµÄµçÁ¦ÏµÍ³£¬²¢³ÖÓÐÕâЩÏîÄ¿µÄÃô¸ÐÊý¾Ý¡£¾ÝÆäÍøÕ¾³Æ£¬¸Ã¹«Ë¾»¹´¦Öóͷ£ºËÇå¾²ÎÊÌâ¡£¾ÝϤ£¬¸ÃÊÂÎñÒÑ»ñµÃ¿ØÖƺ͵÷½â£¬Ëƺõ²¢Î´¶ÔÆäËüµçÁ¦ÐÐÒµµÄ¹«Ë¾Ôì³ÉÓ°Ï죬ҲûÓÐÊý¾Ý±»Ðû²¼µ½°µÍøÉÏ¡£
https://www.databreaches.net/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/
6¡¢KasperskyÐû²¼Õë¶Ô°¢¶û°ÍÄáÑǵÄÁ½ÂÖ¹¥»÷µÄÆÊÎö±¨¸æ
KasperskyÔÚ12ÔÂ22ÈÕÐû²¼ÁËÕë¶Ô°¢¶û°ÍÄáÑÇ×éÖ¯µÄÁ½ÂÖ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£¸Ã±¨¸æÖ÷Òª½ÏÁ¿ÁËÕâÁ½ÂÖ¹¥»÷Ô˶¯ËùʹÓõÄÀÕË÷Èí¼þºÍ²Á³ý¶ñÒâÈí¼þÖ®¼äµÄÇø±ð¡£¹ØÓÚÀÕË÷Èí¼þ£¬Á½ÂÖ¹¥»÷Ô˶¯µÄÑù±¾¾ßÓÐÏàͬµÄÊðÃûÖ¤Êé²ÎÊý£¬Óë¿ÆÍþÌØµçÐŹ«Ë¾Óйء£¹¥»÷Õß¶ÔµÚ¶þÂÖʹÓõIJÁ³ý¶ñÒâÈí¼þ¾ÙÐÐÁ˶à´ÎÐ޸ģ¬¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²â£¬Ö÷Ҫת±äÊÇʹÓÃNvidiaÖ¤Êé¶Ô¶ñÒâÈí¼þÊðÃû¡¢ÔÚ¶ñÒâÈí¼þÖÐǶÈëEldoS RawDiskÇý¶¯³ÌÐò£¬ÒÔ¼°ÔÚÇý¶¯³ÌÐò×°ÖúóÁ¬Ã¦Æô¶¯É¾³ýÀý³Ì¡£
https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/


¾©¹«Íø°²±¸11010802024551ºÅ