BlackCat¹¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

Ðû²¼Ê±¼ä 2022-08-02
1¡¢BlackCat³ÆÒѹ¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

      

¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCatÉù³Æ¶ÔÉÏÖÜÖÐÅ·¹ú¼Ò×ÔÈ»Æø¹ÜµÀºÍµçÁ¦ÍøÂçÔËÓªÉÌCreos Luxembourg SAµÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£CreosÊÇ5¸öÅ·ÓѰî¼ÒµÄÄÜÔ´¹©Ó¦ÉÌ £¬£¬£¬£¬£¬£¬£¬£¬Æäĸ¹«Ë¾EncevoÓÚ7ÔÂ25ÈÕ͸¶ £¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ7ÔÂ22ÈÕÖÁ23ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂEncevoºÍCreosµÄ¿Í»§ÃÅ»§ÎÞ·¨»á¼û £¬£¬£¬£¬£¬£¬£¬£¬µ«Ð§ÀͲ¢Î´ÖÐÖ¹¡£¡£¡£¡£¡£BlackCatÓÚÉÏÖÜÁù½«CreosÌí¼Óµ½ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÍþвҪ¹ûÕæ180000¸ö͵ȡµÄÎļþ £¬£¬£¬£¬£¬£¬£¬£¬×ܾÞϸΪ150GB £¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÌõÔ¼¡¢Ð­Òé¡¢»¤ÕÕ¡¢Õ˵¥ºÍµç×ÓÓʼþµÈÄÚÈÝ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/


2¡¢Group-IB·¢Ã÷ÓÉÉÏÍò¸öÓò×é³ÉÕë¶ÔÅ·ÖÞµÄÐéαͶ×ÊȦÌ×

      

Group-IBÔÚ7ÔÂ29ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÓÉ11000¶à¸öÓò×é³ÉµÄÖØ´óÍøÂç £¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÏòÅ·ÖÞµÄÓû§¾ÙÐÐÐéαͶ×ÊÕ©Æ­»î¶¯¡£¡£¡£¡£¡£ÕâЩƽ̨ʹÓÃαÔìµÄÖ¸»Ö¤¾ÝºÍÃûÈË´úÑÔ £¬£¬£¬£¬£¬£¬£¬£¬ÓªÔì³öÕýµ±µÄÐÎÏó²¢ÒýÓÕ¸ü¶àÄ¿µÄ¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÒÔ»ñµÃ¸ß»Ø±¨Í¶×ʵÄʱ»úΪÓÕ¶ü £¬£¬£¬£¬£¬£¬£¬£¬Ëµ·þÄ¿µÄ´æÈëÖÁÉÙ250Å·ÔªÀ´×¢²áЧÀÍ¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý5000¸ö¶ñÒâÓòÈÔÈ»´¦Óڻ״̬ £¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢±ÈÀûʱ¡¢µÂ¹ú¡¢ºÉÀ¼¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Å²Íþ¡¢ÈðµäºÍ½Ý¿Ë¹²ºÍ¹ú¡£¡£¡£¡£¡£


https://blog.group-ib.com/investment-scams-europe


3¡¢LockBit¿ÉʹÓÃWindows DefenderÀ´¼ÓÔØCobalt Strike

      

Sentinel LabsÔÚ7ÔÂ28ÈÕ͸¶ £¬£¬£¬£¬£¬£¬£¬£¬LockBitʹÓÃMicrosoft DefenderµÄMpCmdRun.exeÀ´½âÃܲ¢×°ÖÃCobalt Strike¡£¡£¡£¡£¡£MpCmdRun.exeÊÇWindows DefenderµÄÏÂÁîÐй¤¾ß £¬£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐʱ £¬£¬£¬£¬£¬£¬£¬£¬Ëü½«¼ÓÔØÃûΪmpclient.dllµÄÕýµ±DLL¡£¡£¡£¡£¡£¹¥»÷Õß¿ª·¢ÁËÎäÆ÷»¯µÄmpclient.dll £¬£¬£¬£¬£¬£¬£¬£¬²¢½«Æä·ÅÔÚÓÅÏȼÓÔØ¶ñÒâDLLÎļþµÄλÖà £¬£¬£¬£¬£¬£¬£¬£¬Ö´ÐеĴúÂë´Óc0000015.logÎļþ½âÃܲ¢¼ÓÔØCobalt Strike payload¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬£¬£¬Éв»ÇåÎúLockBitΪºÎ´ÓʹÓÃVMwareÇл»µ½Ê¹ÓÃWindows DefenderÏÂÁîÐй¤¾ßÀ´¼ÓÔØCobalt Strike¡£¡£¡£¡£¡£


https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/


4¡¢Ñо¿ÍŶӷ¢Ã÷ͳ³ÆÎªDawDropperµÄ¶à¸ö¶ñÒâÈí¼þ·Ö·¢Ä¾Âí

      

Trend MicroÔÚ7ÔÂ29ÈÕÐû²¼±¨¸æ £¬£¬£¬£¬£¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËÒ»Æð¶ñÒâ»î¶¯ £¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃGoogle PlayÊÐËÁÖеÄ17¸ö¿´ËÆÎÞº¦µÄAndroid dropper£¨Í³³ÆÎªDawDropper£©À´·Ö·¢ÒøÐÐľÂí¡£¡£¡£¡£¡£ÕâЩӦÓÃαװ³ÉÀýÈçÎĵµÉ¨Ã蹤¾ß¡¢VPNЧÀÍ¡¢¶þάÂëɨÃ蹤¾ßºÍͨ»°¼Í¼¹¤¾ßµÈ¡£¡£¡£¡£¡£DawDropperʹÓõÚÈý·½ÔÆÐ§ÀÍFirebaseʵʱÊý¾Ý¿âÀ´Èƹý¼ì²â²¢¶¯Ì¬»ñµÃpayloadµÄÏÂÔØµØµã £¬£¬£¬£¬£¬£¬£¬£¬Ëü»¹ÔÚGitHubÉÏÍйܶñÒâpayload¡£¡£¡£¡£¡£Æ¾Ö¤ÊÓ²ì £¬£¬£¬£¬£¬£¬£¬£¬DawDropperµÄ±äÌå¿ÉÒÔ·Ö·¢4ÖÖÀàÐ͵ÄÒøÐÐľÂí £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Octo¡¢Hydra¡¢ErmacºÍTeaBot¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/g/examining-new-dawdropper-banking-dropper-and-daas-on-the-dark-we.html


5¡¢ÃÀ¹úFCCÌáÐÑÖ¼ÔÚÇÔÊØÐÅÏ¢»ò½ðÈÚÕ©Æ­µÄÍøÂç¹¥»÷ÔöÌí

      

¾Ý8ÔÂ1ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îͨѶίԱ»á(FCC)ÌáÐÑ £¬£¬£¬£¬£¬£¬£¬£¬Ô½À´Ô½¶àµÄSMS´¹ÂڻÊÔͼÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿î×Ó¡£¡£¡£¡£¡£´ËÀ๥»÷Ò²³ÆÎªsmishing»òrobotsexts £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÖÖÖÖ·½·¨ÓÕʹĿµÄ½»³öÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£FCC³Æ½üÄêÀ´¶ÔÀ¬»ø¶ÌÐŵÄͶËßÊýÄ¿ÎȲ½ÉÏÉý £¬£¬£¬£¬£¬£¬£¬£¬´Ó2019ÄêµÄÔ¼5700Æð¡¢2020ÄêµÄ14000Æð¡¢2021ÄêµÄ15300Æðµ½2022Äê6ÔÂ30ÈÕµÄ8500Æð¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬£¬¾ÝһЩ×ÔÁ¦±¨¸æÔ¤¼Æ £¬£¬£¬£¬£¬£¬£¬£¬Ã¿ÔÂÓÐÊýÊ®ÒÚÌõrobotext £¬£¬£¬£¬£¬£¬£¬£¬ÈçRoboKillerÔ¤¼ÆÓû§ÔÚ6Ô·ÝÊÕµ½ÁËÁè¼Ý120ÒÚÌõrobotext¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/133865/cyber-crime/fcc-warns-smishing-attacks.html


6¡¢KasperskyÐû²¼2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ 

      

7ÔÂ28ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬£¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÇý¶¯Á¦Ö®Ò» £¬£¬£¬£¬£¬£¬£¬£¬¶ø¾­¼ÃÀûÒæÊÇAPT¹¥»÷±³ºóµÄÒ»Á¬ÄîÍ·Ö®Ò»¡£¡£¡£¡£¡£2021Äê·¢Ã÷ÁËÁ½¸öUEFIÖ²Èë³ÌÐò £¬£¬£¬£¬£¬£¬£¬£¬±¾¼¾¶È·¢Ã÷ÁËÁíÒ»¸ö¶ñÒâUEFI×é¼þCosmicStrand¡£¡£¡£¡£¡£±¨¸æ»¹ÏÈÈÝÁËÕâÒ»¼¾¶ÈµÄAPT¹¥»÷»î¶¯ £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹UNC1151Õë¶ÔÅ·ÖÞÕþ¸®»ú¹¹·Ö·¢Ä¾ÂíSunseed£»£» £» £»£»£»Storm CloudÍÅ»ïʹÓÃGimmick¹¥»÷macOSÓû§£»£» £» £»£»£»TransparentTribe¶ÔÓ¡¶ÈÕþ¸®ÊÂÇéÖ°Ô±¾ÙÐÐÐÂÒ»ÂÖµÄÌØ¹¤¹¥»÷µÈ¡£¡£¡£¡£¡£


https://securelist.com/apt-trends-report-q2-2022/106995/