°²¼òªҽÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-09-27

1¡¢°²¼òªҽÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶


¾Ý9ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬°²¼òªµÄÒ½ÁƱ£½¡»ú¹¹Better Outcomes Registration & Network(BORN)Ô¼340ÍòÈ˵ÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ ¡£¡£¸ÃÊÂÎñÔ´ÓÚClopʹÓÃProgress MOVEit TransferÈí¼þÖÐÎó²î(CVE-2023-34362)µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ ¡£¡£BORNÓÚ5ÔÂ31ÈÕÊ×´ÎÒâʶµ½¸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬Ö®ºóµÄÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÑÇÔÈ¡°üÀ¨Ô¼340ÍòÈËÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖ÷ÒªÊÇÐÂÉú¶ùºÍÓÐÉíÕչ˻¤Ê¿»¼Õߣ¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÈËÔÚ2010Äê1ÔÂÖÁ2023Äê5ÔÂʱ´úʹÓÃÁËBORNЧÀÍ¡£¡£¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/born-ontario-child-registry-data-breach-affects-34-million-people/


2¡¢RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄáµÄϵͳ²¢½«³öÊÛÆäÊý¾Ý


¾ÝýÌå9ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬£¬RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄἯÍŵÄϵͳ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«³öÊÛÆäÊý¾ÝºÍ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚË÷Äá²»Ïë½»Êê½ð¡£¡£¡£¡£¡£¡£ ¡£¡£RansomedVCÐû²¼µÄÑù±¾ºÜС£¬£¬£¬£¬£¬£¬£¬£¬Ô¼2MB£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨PPTÑÝʾÎĸ塢һЩJavaÔ´´úÂëÎļþºÍEclipse IDE½ØÍ¼µÈ¡£¡£¡£¡£¡£¡£ ¡£¡£¸ÃÍÅ»ï³ÆÇÔÈ¡ÁË260 GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼÒÔ250ÍòÃÀÔª³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£ ¡£¡£ÁíÒ»¸öºÚ¿ÍÍÅ»ïMajorNelson³ÆRansomedVCÊÇÆ­×Ó£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃǶԴ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ ¡£¡£¸ÃÍÅ»ïÐû²¼ÁË2.4 GBµÄѹËõÎļþ×÷ΪÑù±¾£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨RansomedVCµÄÑù±¾ÖеÄËùÓÐÎļþ¡£¡£¡£¡£¡£¡£ ¡£¡£Ë÷ÄáÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/sony-investigates-cyberattack-as-hackers-fight-over-whos-responsible/


3¡¢Progressive LeasingÔâµ½¹¥»÷´ó×Ú¿Í»§µÄÐÅϢй¶


ýÌå9ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬£¬Progressive LeasingÔâµ½¹¥»÷µ¼Ö´ó×Ú¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¡£¡£ ¡£¡£ÕâÊÇÒ»¼Ò¼ÛÖµÊýÊ®ÒÚÃÀÔªµÄ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÈËÃÇ×âÁÞÏûºÄÆ·¡£¡£¡£¡£¡£¡£ ¡£¡£½²»°È˳Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²ÊÂÎñÓ°ÏìÁËProgressive LeasingµÄ²¿·Öϵͳ£¬£¬£¬£¬£¬£¬£¬£¬µ«Î´¶ÔÆäÔËÓªÔì³ÉÖØ´óÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚʱ¼äÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£ ¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬£¬AlphVÉù³Æ¶ÔÖÜÎåµÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬Òѽ«¸Ã¹«Ë¾Ìí¼Óµ½ÆäÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒÑÇÔÈ¡Áè¼Ý4000Íò¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ ¡£¡£


https://therecord.media/product-leasing-giant-progressive-ransomware


4¡¢RhysidaÍÅ»ïÉù³Æ¶Ô¿ÆÍþÌØ²ÆÎñ²¿Ôâµ½µÄ¹¥»÷ÈÏÕæ


9ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïRhysida¶Ô¿ÆÍþÌØ²ÆÎñ²¿Ôâµ½µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ ¡£¡£¹¥»÷±¬·¢ÔÚ9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ÆÍþÌØ²ÆÎñ²¿ÔÚµ±Ìì·¢Ìû³ÆÒѹرÕÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ½øÒ»²½µÄ¹¥»÷¡£¡£¡£¡£¡£¡£ ¡£¡£¸Ã²¿»¹È·ÈÏ£¬£¬£¬£¬£¬£¬£¬£¬Ð½×Êϵͳ²»»áÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕþ¸®µÄ²ÆÎñϵͳÊÇ×ÔÁ¦µÄ¡£¡£¡£¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã²¿ÉÐδ´ÓÀÕË÷¹¥»÷ÖÐÍêÈ«»Ö¸´£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÈÔÔÚÊÓ²ì´Ë´ÎÊÂÎñ¡£¡£¡£¡£¡£¡£ ¡£¡£RhysidaÔÚ±¾Öܽ«¸Ã»ú¹¹Ìí¼Óµ½ÆäÍøÕ¾ÖУ¬£¬£¬£¬£¬£¬£¬£¬»¹Ðû²¼ÁËÒ»×éÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£ ¡£¡£


https://securityaffairs.com/151501/cyber-crime/rhysida-ransomware-kuwait-ministry-of-finance.html


5¡¢ThreatFabricÅû¶Ö÷ÒªÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄXenomorph»î¶¯


ThreatFabricÔÚ9ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÁè¼Ý30¼ÒÃÀ¹ú½ðÈÚ»ú¹¹·Ö·¢XenomorphµÄ»î¶¯¡£¡£¡£¡£¡£¡£ ¡£¡£XenomorphÓÚ2022ÄêÍ·Ê״ηºÆð£¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô56¼ÒÅ·ÖÞµÄÒøÐС£¡£¡£¡£¡£¡£ ¡£¡£ÔÚ×îеĻÖУ¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýChromeä¯ÀÀÆ÷ÓÕʹĿµÄÏÂÔØ¶ñÒâAPK¡£¡£¡£¡£¡£¡£ ¡£¡£Ã¿¸öXenomorphÑù±¾¶¼¼ÓÔØÁËԼĪһ°Ù¸öÁýÕֲ㣬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô²î±ðµÄÒøÐкͼÓÃÜÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£ ¡£¡£ThreatFabric»¹»á¼ûÁËÍйÜpayloadµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Medusa¡¢Cabassous¡¢RisePro¡¢LummaC2ÒÔ¼°Private Loader¡£¡£¡£¡£¡£¡£ ¡£¡£


https://www.threatfabric.com/blogs/xenomorph


6¡¢Ñо¿Ö°Ô±ÏêÊöÕë¶ÔÎÚ¿ËÀ¼·Ö·¢MerlinAgentµÄ´¹ÂÚ¹¥»÷


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SecuronixÐû²¼±¨¸æÏêÊöÁËÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ ¡£¡£¸Ã»î¶¯µÄ´úºÅΪSTARK#VORTEX£¬£¬£¬£¬£¬£¬£¬£¬ÒÔPICÎÞÈË»úÊÖ²áÎĵµ×÷ΪÓÕ¶ü·Ö·¢MerlinAgent£¬£¬£¬£¬£¬£¬£¬£¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0154¡£¡£¡£¡£¡£¡£ ¡£¡£MerlinAgentÊÇÒ»¸öGo¿ª·¢µÄ¿ªÔ´C2¹¤¾ß°ü£¬£¬£¬£¬£¬£¬£¬£¬ÀàËÆÓÚCobalt Strike»òSliver¡£¡£¡£¡£¡£¡£ ¡£¡£ÓÕ¶üÊÇMicrosoft×ÊÖúÎļþ(.chm)£¬£¬£¬£¬£¬£¬£¬£¬·­¿ªºó»áÔËÐÐǶÈëµÄ¶ñÒâJavaScript£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÖ´ÐÐPowerShell´úÂ룬£¬£¬£¬£¬£¬£¬£¬¸Ã´úÂë´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡»ìÏýµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£ ¡£¡£payload»áÏÂÔØMerlin Agent£¬£¬£¬£¬£¬£¬£¬£¬¶øMerlin AgentÓÖ±»ÉèÖÃΪÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÖ´Ðй¥»÷ºóµÄ»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÓÐÓõØÕùÈ¡Ö÷»úµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£ ¡£¡£


https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/