Ó¢¹úÓÊÕþ¹«Ë¾Royal Mail͸¶ÆäÔâµ½LockBitÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2023-01-13
1¡¢Ó¢¹úÓÊÕþ¹«Ë¾Royal Mail͸¶ÆäÔâµ½LockBitÀÕË÷¹¥»÷

      

¾ÝýÌå1ÔÂ12ÈÕ±¨µÀ£¬Ó¢¹ú×î´óµÄÓÊÕþ·þÎñRoyal MailÔâµ½ÓëLockBitÀÕË÷Èí¼þÓйصĹ¥»÷¡£1ÔÂ11ÈÕ£¬Royal Mail͸¶³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬¹ú¼Êº½ÔË·þÎñÊܵ½ÁËÓ°Ïì¡£ËäÈ»¸Ã¹«Ë¾²¢Î´Í¸Â¶¹ØÓÚ¹¥»÷µÄÈκÎϸ½Ú£¬µ«¡¶Ã¿ÈÕµçѶ±¨¡·ÔÚ1ÔÂ12ÈÕ±¨µÀ³Æ£¬Ä¿Ç°ÒÑÈ·ÈϹ¥»÷À´×ÔLockBit£¬»òÕßÓй¥»÷ÕßʹÓÃÁËËûÃǵļÓÃÜ·¨Ê½¡£¹¥»÷»î¶¯¼ÓÃÜÁ˹ú¼ÊÔËÊäµÄÉ豸£¬²¢ÔÚÓÃÓÚº£¹Ø´æ°¸µÄ´òÓ¡»úÉÏ´òÓ¡Êê½ð¼Ç¼¡£


https://www.bleepingcomputer.com/news/security/royal-mail-cyberattack-linked-to-lockbit-ransomware-operation/


2¡¢Vice SocietyÉù³Æ¶Ô°Ä´óÀûÑÇÏû·À¶ÓÔâµ½µÄ¹¥»÷ÂôÁ¦

      

ýÌå1ÔÂ12Èճƣ¬ÀÕË÷ÍÅ»ïVice SocietyÉù³Æ¶Ô°Ä´óÀûÑÇÏû·À¶Ó(FRVP)Ôâµ½µÄ¹¥»÷ÂôÁ¦¡£¹¥»÷·¢ÉúÔÚ2022Äê12ÔÂ15ÈÕ£¬Ôì³ÉÁ˹㷺ÇÒÁ¬ÐøµÄIT·þÎñÖжÏ£¬µ«²¢Î´Ó°Ïì¸Ã»ú¹¹µÄÓ¦¼±ÏìÓ¦·þÎñ¡£´ËÍ⣬FRVÌåÏÖºÚ¿Í»¹ÇÔÈ¡ÁËÆä¼ÆËã»úÖеÄÊý¾Ý£¬°üÂÞÔ±¹¤¡¢³Ð°üÉÌ¡¢½èµ÷ÈËÔ±ºÍÇóÖ°ÕßµÄÐÅÏ¢¡£1ÔÂ10ÈÕ£¬Vice SocietyÔÚÆäÍøÕ¾ÁгöÁËFRV£¬»¹Ðû²¼ÁËÖ¸Ïò±»µÁÊý¾ÝµÄÁ´½Ó£¬µ«¸ÃÁ´½ÓĿǰÊÇÎÞЧµÄ¡£×î½ü£¬¹¥»÷ÕßÒѸÄÓÃÒ»ÖÖеÄ×Ô½ç˵¼ÓÃÜÆ÷PolyVice¡£


https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-australian-firefighting-service/


3¡¢GootloaderÀûÓÃVLCµÈ¹¤¾ß¹¥»÷°Ä´óÀûÑÇÒ½ÁƱ£½¡ÐÐÒµ

      

Trend MicroÔÚ1ÔÂ9ÈÕÅû¶Á˶ñÒâÈí¼þGootkit Loader£¨ÓÖÃû Gootloader£©Õë¶Ô°Ä´óÀûÑÇÒ½ÁƱ£½¡ÐÐÒµµÄ»î¶¯¡£¹¥»÷ʼÓÚ2022Äê10Ô£¬ÀûÓÃÁËSEOÖж¾½øÐгõʼ·ÃÎʲ¢ÀÄÓÃVLCýÌå²¥·ÅÆ÷µÈºÏ·¨¹¤¾ß¡£Ñо¿ÈËÔ±·¢ÏÖµÄÑù±¾ÀûÓÃÁËÒªº¦´ÊÒ½Ôº¡¢½¡¿µ¡¢Ò½ÁÆºÍÆóҵЭÒ飬²¢Óë°Ä´óÀûÑǶ¼ÊÐÃû³ÆÅä¶Ô¡£¸Ã»î¶¯Ö¼ÔÚÔÚÄ¿±êÉ豸Éϰ²×°Cobalt Strike¿ª·¢¹¤¾ß°ü£¬ÒÔ±ã½øÈëÆóÒµÍøÂç¡£


https://www.trendmicro.com/en_us/research/23/a/gootkit-loader-actively-targets-the-australian-healthcare-indust.html


4¡¢Ñо¿ÈËÔ±Åû¶Scattered SpiderÈÆ¹ýÄþ¾²¼ì²âµÄÒªÁì

      

¾Ý1ÔÂ10ÈÕ±¨µÀ£¬Scattered SpiderÊÔͼÔÚBYOVD¹¥»÷Öа²×°Ó¢ÌضûÒÔÌ«ÍøÕï¶ÏÇý¶¯·¨Ê½£¬À´ÈƹýEDRÄþ¾²²úÎïµÄ¼ì²â¡£CrowdStrike³ÂË߳ƣ¬¸ÃÍÅ»ïʵÑéÀûÓÃÓ¢ÌØ¶ûÒÔÌ«ÍøÕï¶ÏÇý¶¯·¨Ê½ÖеÄÒ»¸ö¸ßΣ©¶´£¨CVE-2015-2291£©£¬Ëü¿Éͨ¹ýÌØÖÆµ÷ÓÃÒÔÄÚºËȨÏÞÖ´ÐÐÈÎÒâ´úÂë¡£¾¡¹ÜËüÒÑÓÚ2015ÄêÐÞ¸´£¬µ«Í¨¹ýÔÚÄ¿±êÉ豸ÖÐÖ²Èë¾É°æ±¾£¬ÎÞÂÛÄ¿±êÓ¦ÓÃÁËʲô¸üй¥»÷Õß¶¼¿ÉÒÔÀûÓøÃ©¶´¡£¹¥»÷ÕßʹÓõÄÇý¶¯·¨Ê½ÊÇÓÉ´ÓNVIDIAºÍGlobal Software LLCµÈÇ©Ãû»ú¹¹ÇÔÈ¡µÄÖ¤Êé½øÐÐÇ©Ãû£¬Òò´ËWindows²»»á×èÖ¹Ëü¡£


https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/


5¡¢±£ÏÕ¹«Ë¾AflacÈÕÌìÖ°¹«Ë¾³ÆÆä100¶àÍò¿Í»§µÄÐÅϢй¶

      

ýÌå1ÔÂ11ÈÕ±¨µÀ³Æ£¬±£ÏÕ¹«Ë¾AflacÈÕÌìÖ°¹«Ë¾Í¸Â¶Æä100¶àÍò¿Í»§µÄÐÅϢй¶¡£1ÔÂ9ÈÕ£¬¸Ã¹«Ë¾»ñϤÆä¿Í»§µÄÐÅÏ¢±»Ðû²¼ÔÚÒ»¸öÐÅÏ¢Ð¹Â¶ÍøÕ¾ÉÏ£¬¾­È·ÈÏÊý¾ÝÀ´×ÔÆäµÚÈý·½·þÎñÌṩÉÌ¡£¸ÃʼþÓ°ÏìÁ˶©¹ºÓë°©Ö¢Ïà¹ØµÄ±£ÏÕµÄ1323468¸ö¿Í»§£¬Êý¾Ý×ÜÊýΪ3158199Ìõ£¬Éæ¼°ÐÕÃû¡¢ÄêÁä¡¢ÐԱ𡢱£µ¥ºÅÂë¡¢±£ÏÕ½ð¶îºÍ±£ÏշѵÈ¡£Óë´Ëͬʱ£¬ÈðÊ¿±£ÏÕ¹«Ë¾ËÕÀèÊÀÒ²ÈÏ¿ÉÆäÁè¼Ý200ÍòÈÕ±¾¿Í»§µÄÊý¾ÝÒѾ­Ð¹Â¶¡£


https://www.theregister.com/2023/01/11/japan_aflac_zurich_data_breaches/


6¡¢AvastÐû²¼¹ØÓÚNeedleDropperµÄ¼¼Êõ·ÖÎö³ÂËß

      

1ÔÂ11ÈÕ£¬AvastÐû²¼Á˹ØÓÚNeedleDropperµÄ¼¼Êõ·ÖÎö³ÂËß¡£NeedleDropper²»½öÊÇÒ»¸öµ¥Ò»µÄ¿ÉÖ´ÐÐÎļþ£¬ËüЯ´ø¶à¸öÎļþ£¬ÕâЩÎļþÒ»Æð´´½¨¶ñÒâµÄÖ´ÐУ¬ÌáÈ¡ÎļþÒÔ½âÃܺÍ×¢Èë¶ñÒâ´úÂë¡£¸Ã¶ñÒâÈí¼þͨ¹ý·Ö·¢¶à¸öδʹÓõÄÎÞЧÎļþÀ´Òþ²Ø×Ô¼º£¬²¢½«ÖØÒªÊý¾Ý´æ´¢ÔÚÊýMB²»ÖØÒªµÄÊý¾ÝÖ®¼ä£¬»¹ÀûÓúϷ¨Ó¦ÓÃÀ´Ö´ÐС£NeedleDropperËÆºõÊÇÒ»¸öеĶñÒâÈí¼þϵÁУ¬Ê¹Óá°-as-a-service¡±µÄÉÌҵģʽ£¬ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¸øÆäËü¹¥»÷Õߣ¬ÒÔÒþ²Ø×îÖÕµÄpayload¡£Avast³Æ£¬½ØÖÁĿǰËüÒÑ×èÖ¹ÁËÁè¼Ý30000´Î´ËÀ๥»÷ʵÑé¡£


https://decoded.avast.io/threatresearch/needledropper/