LOCKBIT ¾íÍÁÖØÀ´£¬ÍþвÃé×¼¸ü¶àÕþ¸®×éÖ¯
Ðû²¼Ê±¼ä 2024-02-271. LOCKBIT ¾íÍÁÖØÀ´£¬ÍþвÃé×¼¸ü¶àÕþ¸®×éÖ¯
2ÔÂ26ÈÕ£¬ÔÚÖ´·¨²¿ÃÅ×¥»ñ LockBit ÍÅ»ïµÄ²¿ÃųÉÔ±ºó£¬LockBit ÍÅ»ï¾íÍÁÖØÀ´²¢½¨Á¢ÁËеĻù´¡ÉèÊ©¡£NCA ¼°ÆäÈ«ÇòºÏ×÷»ï°éÒÑ»ñµÃ 1,000 ¶à¸ö½âÃÜÃÜÔ¿£¬ÕâЩÃÜÔ¿½«ÔÊÐí¸ÃÍÅ»ïµÄÊܺ¦ÕßÃâ·Ñ»Ö¸´ËûÃǵÄÎļþ¡£NCA ½«ÔÚδÀ´¼¸Ìì»ò¼¸ÖÜÄÚÁªÏµÓ¢¹úµÄÊܺ¦Õߣ¬Ìṩ֧³ÖÒÔ×ÊÖúËûÃǻָ´¼ÓÃÜÊý¾Ý¡£LockBitÍŻﲢ²»ÊÇÊÔͼÖØÐÂÆô¶¯Æä RaaS ÒµÎñ£¬¶øÊÇÒѾ½¨Á¢ÁËеĻù´¡ÉèÊ©£¬²¢ÍþвҪ¶ÔÕþ¸®²¿ÃŽøÐÐÍøÂç¹¥»÷¡£¸ÃÍÅ»ïÔÚÆäÍøÕ¾ÉÏÌí¼ÓÁË 12 ÃûÊܺ¦Õߣ¬ÆäÖÐ 5 ÃûÊܺ¦ÕߵĽØÖ¹ÈÕÆÚÒѵ½¡£
https://securityaffairs.com/159584/cyber-crime/lockbit-gang-resumed-raas.html
2. ºÚ¿Í´Ó Axie Infinity ÁªºÏÊ×´´È˵ĸöÈËÕË»§ÇÔÈ¡½ü 1000 ÍòÃÀÔª
2ÔÂ24ÈÕ£¬ÊÓƵÓÎÏ· Axie Infinity ºÍÏà¹Ø Ronin Network µÄÁªºÏÊ×´´ÈËÖ®Ò»µÄ¸öÈËÕË»§Öнü 1000 ÍòÃÀÔªµÄ¼ÓÃÜ»õ±Ò±»µÁ¡£±¨µÀ³Æ£¬Jeff ¡°Jihoz¡± Zirlin µÄÇ®°ü±»ºÚ¿ÍÈëÇÖ£¬ËðʧÁË 3,248 ¸öÒÔÌ«±Ò£¬Ô¼ºÏ 970 ÍòÃÀÔª¡£ÖÜËÄÍí£¬ÆëÁÖÔÚÉ罻ýÌåÉÏ֤ʵ£¬ËûµÄÁ½¸öÕË»§Ô⵽й¶¡£Ronin Network ÊÇAxie InfinityµÄ»ù´¡£¬Axie Infinity ÓµÓлùÓÚÒÔÌ«·»µÄ¼´Í漴׬¾¼Ã¡£ËüÔÚ¶«ÄÏÑÇÌرðÊÜ»¶Ó¡£2022 Äê 3 Ô£¬ºÚ¿Í´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË 6 ÒÚÃÀÔªµÄ¼ÓÃÜ»õ±Ò£¬ÃÀ¹ú¼ì²ì¹ÙËæºó½«´Ë´Î¹¥»÷¹é¾ÌÓÚ³¯Ïʹú¼ÒÖ§³ÖµÄÍøÂç·¸×ï×éÖ¯ Lazarus Group¡£·ÖÎöʦ׷×Ùµ½´Ó Zirlin ÕË»§±»µÁµÄ×ʽðÀ´×Ô Tornado Cash µÄ»î¶¯£¬Tornado Cash ÊÇÒ»¸öÖ¼ÔÚÒþ²Ø¼ÓÃÜ»õ±ÒÀ´Ô´µÄ»ìºÏÆ÷¡£¾ÝÃÀ¹úÕþ¸®³Æ£¬Lazarus ʹÓûìºÏÆ÷Ï´Ç® 2022 ÄêºÚ¿Í¹¥»÷ÖеÄ×ʽ𣬲¢µ¥¶ÀÖƲÃÁËTornado Cash¡£
https://therecord.media/hackers-steal-millions-from-axie-infinity-founder-personal-accounts?&web_view=true
3. Linux¹¥»÷ÖÐʹÓõÄNood RAT£¨Gh0st RATµÄ±äÖÖ£©µÄ·ÖÎö
2ÔÂ26ÈÕ£¬AhnLab Äþ¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢ÏÖ Nood RAT ±»ÓÃÓÚ¶ñÒâÈí¼þ¹¥»÷¡£Nood RAT ÊÇÔÚ Linux ÉÏÔËÐÐµÄ Gh0st RAT µÄ±äÌå¡£¾¡¹ÜÓë Windows µÄ Gh0st RAT Ïà±È£¬Linux µÄ Gh0st RAT ÊýÁ¿½ÏÉÙ£¬µ« Linux µÄ Gh0st RAT °¸ÀýÈÔÔÚ²»Í£ÊÕ¼¯¡£Æ¾¾Ý´úÂëÓë Gh0st RAT [1]֮ǰ´úÂëµÄÏàËÆÐÔ£¬Nood RAT ±»¹éÀàΪ Gh0st RAT µÄ±äÌå¡£ÕÒµ½ÁË×îпª·¢ÖÐʹÓõĹ¹½¨Æ÷£¬²¢½«ÆäÃüÃûΪNood RAT£¬ÒòΪ×÷Õß½«ÆäÃüÃûΪNood¡£×Ô2018ÄêÒÔÀ´£¬Nood RATÒѱ»ÓÃÓÚÖÖÖÖ©¶´¹¥»÷¡£ËäÈ»×î½üûÓз¢ÏÖ¾ßÌåµÄ©¶´¹¥»÷°¸Àý£¬µ«Æ¾¾ÝVirusTotalÍøÕ¾µÄÊý¾Ý£¬°¸ÀýÕýÔÚ²»Í£·¢ÏÖ¡£±¾ÎÄÖصã½éÉÜÁ˹ýÈ¥¼¸Äê·¢ÏֵĶñÒâÈí¼þ±äÌ壬²¢Óë¹¹½¨ÕßÒ»Æð¶ÔÆä½øÐÐÁË·ÖÎö¡£
https://asec.ahnlab.com/en/62144/
4. ¼ÓÄôó»Ê¼ÒÆᆵ (RCMP) ¹ÙÍøÔâÓöÍøÂç¹¥»÷
2ÔÂ25ÈÕ£¬¼ÓÄôóÁª°îºÍ¹ú¼ÒÖ´·¨»ú¹¹¼ÓÄôó»Ê¼ÒÆᆵ (RCMP) ÔâÊÜÍøÂç¹¥»÷¡£»Ê¼ÒÆᆵ»¹Í¨ÖªÁËÒþ˽רԱ°ì¹«ÊÒ (OPC)¡£¼ÓÄôó»Ê¼ÒÆᆵ·¢ÑÔÈËÔÚÏò¼ÓÄôó¹ã²¥¹«Ë¾ÐÂÎÅ·¢±íµÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£º¡°Çé¿öÕýÔÚѸËÙÉú³¤£¬µ«Ä¿Ç°£¬¼ÓÄôó»Ê¼ÒÆᆵµÄÐж¯Ã»ÓÐÊܵ½Ó°Ï죬¼ÓÄôóÈ˵ÄÄþ¾²Ò²Ã»ÓÐÊܵ½ÈκÎÒÑÖªµÄÍþв¡£¡± ¡°ËäÈ»Èç´ËÑÏÖصÄÎ¥¹æÐÐΪÁîÈËÕ𾪣¬µ«¿ìËÙµÄÊÂÇéºÍ½ÓÄɵĻº½â¼Æı±íÃ÷¼ÓÄôó»Ê¼ÒÆᆵΪ¼ì²âºÍ·ÀÖ¹´ËÀàÍþвËù½ÓÄɵÄÖØÒª²½Öè¡£¡±»Ê¼ÒÆᆵÌåÏÖ£¬²»ÖªµÀ¶ÔÍâ¹ú¾¯²ìºÍÇ鱨²¿ÃÅÓÐÈκÎÓ°Ïì¡£¼ÓÄôóÖ´·¨»ú¹¹Ã»ÓÐÌṩÓйØÍøÂç¹¥»÷µÄÏêϸÐÅÏ¢¡£2023 Äê 11 Ô£¬¼ÓÄôóÕþ¸®ÔÚÍþвÐÐΪÕßÈëÇÖÆäÁ½Ãû³Ð°üÉ̺ó Åû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ¡£¼ÓÄôóÕþ¸®Ðû²¼£¬ÆäÁ½¼Ò³Ð°üÉÌ Brookfield Global Relocation Services (BGRS) ºÍ SIRVA Worldwide Relocation & Moving Services Ôâµ½ºÚ¿Í¹¥»÷£¬µ¼ÖÂÊôÓÚÊýÁ¿²»ÏêµÄÕþ¸®¹ÍÔ±µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£
https://securityaffairs.com/159568/hacking/cyber-attack-hit-royal-canadian-mounted-police.html
5. ÀûÓà ScreenConnect ©¶´²¿Êð¶ñÒâÈí¼þ
2ÔÂ25ÈÕ£¬Sophos X-Ops Öصã¹Ø×¢ÁË ConnectWise ScreenConnect °²×°£¨Ò»Öֹ㷺ʹÓõÄÔ¶³Ì¼à¿ØºÍ¹ÜÀíÈí¼þ£©ÖЩ¶´ÀûÓõÄÁîÈ˵£ÓǵÄÇ÷ÊÆ¡£×î½üÅû¶µÄScreenConnect©¶´£¨CVE-2024-1709¡¢CVE-2024-1708£©ÐèÒªÁ¢¼´½ÓÄÉÐж¯¡£Õë¶Ôµ±µØ°²×°µÄ¹ã·ºÀûÓÃÐèÒª¿ìËÙÐÞ²¹¡¢Ö÷¶¯ÍþвËÑÑ°ºÍÔöÇ¿µÄÍøÂç·ÀÓù¡£2024 Äê 2 Ô 19 ÈÕ£¬ConnectWise ¾ÍÓ°ÏìÆä ScreenConnect Èí¼þ¾É°æ±¾µÄÁ½¸öÑÏÖØ©¶´·¢³ö¾¯±¨¡£Èç¹û²»ÐÞ²¹ÕâЩ©¶´£¬¹¥»÷Õß¿ÉÄÜ»á»ñµÃÖ´ÐÐÔ¶³Ì´úÂë»ò·ÃÎÊ»úÃÜÊý¾ÝµÄÄÜÁ¦¡£ÕâЩȱÏݱ»Ö¸¶¨Îª CVE-2024-1709 ºÍ CVE-2024-1708£¬Éæ¼°·þÎñÆ÷Èí¼þÖеÄÉí·ÝÑéÖ¤ÈƹýºÍ·¾¶±éÀúÎÊÌ⣬¶ÔʹÓÃÊÜÓ°ÏìÈí¼þ°æ±¾µÄ×éÖ¯×é³ÉÑÏÖØÍþв¡£Õë¶ÔÕâЩ©¶´£¬ConnectWiseÒÑÐû²¼ScreenConnect²¹¶¡£¬½¨ÒéËùÓÐÓû§Éý¼¶µ½23.9.8»ò¸ü¸ß°æ±¾¡£
https://securityonline.info/screenconnect-vulnerabilities-exploited-to-deploy-malware/
6. PyPI Èí¼þ°üdjango-log-tracker±»ÓÃÀ´Á÷´« Nova Sentinel ¶ñÒâÈí¼þ
2ÔÂ23ÈÕ£¬Python °üË÷Òý (PyPI) ´æ´¢¿âÉϵÄÒ»¸öÐÝÃß°üÔÚ½üÁ½Äêºó½øÐÐÁ˸üУ¬ÒÔÁ÷´«ÃûΪ Nova Sentinel µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝÈí¼þ¹©Ó¦Á´Äþ¾²¹«Ë¾ Phylum ³Æ£¬¸ÃÈí¼þ°üÃûΪdjango-log-tracker £¬ÓÚ 2022 Äê 4 ÔÂÊ×´ÎÐû²¼µ½ PyPI£¬¸Ã¹«Ë¾ÓÚ 2024 Äê 2 Ô 21 ÈÕ¼ì²âµ½¸Ã¿âµÄÒì³£¸üС£ËäÈ»Á´½ÓµÄ GitHub ´æ´¢¿â×Ô 2022 Äê 4 Ô 10 ÈÕÒÔÀ´Ò»Ö±Ã»ÓиüУ¬µ«¶ñÒâ¸üеÄÒýÈë±íÃ÷ÊôÓÚ¿ª·¢ÈËÔ±µÄ PyPI ÕÊ»§¿ÉÄÜÊܵ½Ë𺦡£Django-log-trackerÆù½ñΪֹÒѱ»ÏÂÔØ 3,866 ´Î£¬ÆäÖÐÁ÷Ã¥°æ±¾ (1.0.4) ÔÚÐû²¼Ö®ÈÕÏÂÔØÁË 107 ´Î¡£¸ÃÈí¼þ°ü²»ÔÙ¿ÉÒÔ´Ó PyPI ÏÂÔØ¡£
https://thehackernews.com/2024/02/dormant-pypi-package-compromised-to.html?&web_view=true