ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ

Ðû²¼Ê±¼ä 2022-04-25

1¡¢ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ


¾ÝýÌå4ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïContiÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÉÏÖÜ£¬£¬£¬£¬£¬Ó°ÏìÁ˰üÀ¨²ÆÎñ²¿ºÍÀ͹¤²¿ÔÚÄڵĶà¸ö²¿·Ö¡£¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬×î³õµÄ¹¥»÷ÆÈʹ²ÆÎñ²¿¹Ø±ÕÆäϵͳ³¤´ïÊýСʱ£¬£¬£¬£¬£¬¸ÃϵͳÈÏÕæÖ§¸¶¸Ã¹ú´ó²¿·Ö¹«ÎñÔ±µÄн³ê£¬£¬£¬£¬£¬Í¬Ê±Ò²´¦Öóͷ£Õþ¸®ÑøÀϽðÖ§¸¶¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ContiÒѹûÕæÁË50%µÄ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¸ç˹´ïÀè¼Ó×ÜͳÌåÏÖ£¬£¬£¬£¬£¬ËûÃDz»»áÏòÍøÂç¹¥»÷ÍÅ»ïÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/130505/cyber-crime/costa-rica-conti-ransomware.html


2¡¢Altahrea Team DDoS¹¥»÷ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAAµÄÍøÕ¾


¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÒÔÉ«Áлú³¡ÖÎÀí¾ÖIAA³ÆÆäÍøÕ¾Ôâµ½ÁËDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷À´×ÔÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Altahrea Team£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÃÀ¹úÓÚ1ÔÂ3ÈÕ¾ÙÐеľüÊ»¡£¡£¡£¡£¡£¡£¡£¡£IAAÌåÏÖ£¬£¬£¬£¬£¬Æä²Ù×÷ϵͳºÍÍøÂçûÓÐÊܵ½ÈκÎÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ë֮ǰ£¬£¬£¬£¬£¬¾ÝYnet±¨µÀ£¬£¬£¬£¬£¬3ÔÂ15ÈÕÔøÓжà¸öÒÔÉ«Áйٷ½ÍøÕ¾Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬¿ÉÄÜÊÇÓëÒÁÓйصĹ¥»÷Õß¾ÙÐеĴó¹æÄ£ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£     

https://www.jns.org/report-pro-iran-hackers-target-israel-airports-authority-website/


3¡¢ÎÚ¿ËÀ¼CERT-UA·¢Ã÷ÒÔ¡°Azovstal¡±ÎªÖ÷ÌâµÄ´¹Âڻ


ýÌå4ÔÂ23Èճƣ¬£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)Ðû²¼ÁËÐÂÒ»ÂÖ´¹ÂڻµÄÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÒÔ¡°Azovstal¡±ÎªÖ÷Ì⣬£¬£¬£¬£¬Ê¹ÓÃÁ˶ñÒâofficeÎļþ¡£¡£¡£¡£¡£¡£¡£¡£·­¿ªÎļþ²¢ÆôÓúêºó£¬£¬£¬£¬£¬Ëü½«ÔÚ´ÅÅÌÉϽ¨Éè²¢ÔËÐжñÒâDLL¡°pe.dll¡±£¬£¬£¬£¬£¬×îºóÖ¼ÔÚ×°ÖÃCobalt Strike Beacon£¬£¬£¬£¬£¬ÓÃÓÚ¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎö¹¥»÷ÖÐʹÓõļÓÃÜÊÖÒÕ£¬£¬£¬£¬£¬Íƶϴ˴λÓëºÚ¿ÍÍÅ»ïTrickbotÓйء£¡£¡£¡£¡£¡£¡£¡£¸Ãͨ¸æ»¹ÌṩÁ˹ØÓڴ˴λµÄIoCÒÔ¼°·ÀÓù½¨Òé¡£¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/130515/cyber-warfare-2/ukraine-cert-warns-azovstal-themed-phishing.html


4¡¢ÃÀ¹úʳÎ﹫˾Bob's Red Mill֪ͨ¿Í»§ÆäÐÅÏ¢ÒѾ­Ð¹Â¶


ýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úÈ«ÂóʳÎ﹫˾Bob's Red Mill֪ͨÔÚÏ߿ͻ§£¬£¬£¬£¬£¬ÆäÐÅÏ¢ÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£Í¨ÖªÖÐдµÀ£¬£¬£¬£¬£¬¸Ã¹«Ë¾×î½ü·¢Ã÷ÔÚ2ÔÂ23ÈÕÖÁ3ÔÂ1ÈÕʱ´ú£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓöñÒâÈí¼þÇÔÈ¡ÆäÍøÕ¾ÖеÄÖ§¸¶ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÔÚÏ߿ͻ§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢Õ˵¥¡¢ËÍ»õµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍ¹ºÖýð¶îµÈ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ÒÑÓÐÐí¶àÖ÷¹Ë±¨¸æËûÃÇÔâµ½ÁËڲƭÐÔÏûºÄ£¬£¬£¬£¬£¬ËäÈ»²»ÖªµÀÕâЩÊÂÎñÊÇ·ñÓëÊý¾ÝÇÔÈ¡Óйأ¬£¬£¬£¬£¬µ«ÏÖÔÚ¿´À´£¬£¬£¬£¬£¬Ö§¸¶¿¨ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/bobs-red-mill-reports-data-breach/


5¡¢CrowdStrikeÐû²¼¹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄÆÊÎö±¨¸æ


4ÔÂ21ÈÕ£¬£¬£¬£¬£¬CrowdStrikeÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬½©Ê¬ÍøÂçÔËÓªÍÅ»ïLemonDuckʹÓÃLinuxЧÀÍÆ÷ÉϵÄDocker API¾ÙÐдó¹æÄ£MoneroÍÚ¿ó»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£LemonDuckͨ¹ý»á¼û̻¶µÄDocker API²¢ÔËÐжñÒâÈÝÆ÷À´ÏÂÔØÎ±×°³ÉPNGͼÏñµÄBash¾ç±¾£¬£¬£¬£¬£¬Ëü»¹»áͨ¹ý½ûÓð¢ÀïÔÆµÄ¼à¿ØÐ§ÀÍÀ´Èƹý¼ì²â¡£¡£¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬Cisco TalosÒ²Åû¶ÁËÒ»¸öÓëTeamTNTÓйصĹ¥»÷»î¶¯£¬£¬£¬£¬£¬Õë¶ÔAmazon Web ServicesÉÏ̻¶µÄDocker API¡£¡£¡£¡£¡£¡£¡£¡£


https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/


6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷Èí¼þBlackByteµÄÆÊÎö±¨¸æ

Unit 42ÔÚ4ÔÂ21ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlackByteµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£BlackByteÊÇÒ»ÖÖRaaS£¬£¬£¬£¬£¬ÓÚ2021Äê7ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ҪʹÓÃProxyShellÎó²î¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þµÄ»î¶¯Ò»Ö±·Ç³£» £»£»£»£»£»îÔ¾£¬£¬£¬£¬£¬×Ô2021Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬Õë¶ÔÈ«ÇòµÄ¶à¸ö×éÖ¯£¬£¬£¬£¬£¬Éæ¼°ÄÜÔ´¡¢Å©ÒµºÍ½ðÈÚЧÀ͵ÈÐÐÒµ¡£¡£¡£¡£¡£¡£¡£¡£Unit 42ÔÚÒ°Íâ¼ì²âµ½ÁËËüµÄ¶à¸ö±äÌ壬£¬£¬£¬£¬°üÀ¨ÓÃGoºÍÓÃ.NET±àдµÄ£¬£¬£¬£¬£¬ÒÔ¼°ÓÃGoºÍC»ìÏý±àдµÄ±äÌå¡£¡£¡£¡£¡£¡£¡£¡£BlackByteÓëLockbit 2.0µÈÀÕË÷Èí¼þÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬ËüÃǶ¼ÈƹýÁËʹÓöíÓïµÈ¶àÖÖ¶«Å·ÓïÑÔµÄϵͳ¡£¡£¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/blackbyte-ransomware/