ÐÂÀÕË÷ÍÅ»ïRed CryptoApp½ÓÄɼ¤½ø¼ÆıÐßÈèÊܺ¦Õß

Ðû²¼Ê±¼ä 2024-04-07
1. ÐÂÀÕË÷ÍÅ»ïRed CryptoApp½ÓÄɼ¤½ø¼ÆıÐßÈèÊܺ¦Õß


4ÔÂ4ÈÕ£¬Netenrich µÄÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪ Red Ransomware Group (Red CryptoApp) µÄÐÂÀÕË÷×éÖ¯¡£¸Ã×éÖ¯µÄÔË×÷·½Ê½ÓëµäÐ͵ÄÀÕË÷Èí¼þ×éÖ¯²îÒ죬ËûÃǵÄÀÕË÷¼ÆıÓÐËù²îÒì¡£Óë´ó¶àÊýÒþ²ØÆä²Ù×÷µÄÀÕË÷Èí¼þ×éÖ¯²îÒ죬Red CryptoApp Ëƺõ½ÓÄÉÁ˼¤½øµÄÒªÁì¡£¾Ý Netenrich ³Æ£¬¸Ã×éÖ¯½¨Á¢ÁË¡°Ðß³Üǽ¡±£¬²¢Ðû²¼ÁËËûÃÇÀÖ³ÉÃé×¼µÄ¹«Ë¾Ãû³Æ¡£ÕâÖÖ¼ÆıּÔÚÐßÈèÊܺ¦Õß²¢ÆÈʹËûÃÇÖ§¸¶Êê½ðÒÔɾ³ýËûÃǵÄÃû×Ö¡£Ñо¿ÈËÔ±×¢Òâµ½¸Ã×é֯׫дµÄÒ»·ÝÀÕË÷Èí¼þÌõ¼ÇÓë 2020 Äê Maze ÀÕË÷Èí¼þÍÅ»ïÓÐһЩÏàËÆÖ®´¦¡£Õâ¿ÉÄÜÊÇÇɺÏ£¬Ò²¿ÉÄÜÊÇÇɺÏ¡£Òò´Ë£¬Éв»Çå³þ Red Ransomware Group ÊÇ·ñÊÇ Maze ÍÅ»ïµÄÑÜÉúÆ·£¬Maze ÍÅ»ïÓÚ 2020 Äê 11 Ô¹رÕÁËÆäÒµÎñ¡£Red CryptoApp ÀÕË÷Èí¼þÍÅ»ïµÄÐß³Üǽ£¬ÃÀ¹úÊÇÖ÷ҪĿ±ê£¬Æä´ÎÊǵ¤Âó¡¢Ó¡¶È¡¢Î÷°àÑÀ¡¢Òâ´óÀû¡¢Ð¼ÓƺͼÓÄôóµÈÆäËû¹ú¼Ò¡£¾ÍÄ¿±êÐÐÒµ¶øÑÔ£¬Èí¼þºÍÖÆÔìÒµ³ÉΪ×î³£¼ûµÄÄ¿±êÐÐÒµ£¬½ÌÓý¡¢½¨Öþ¡¢¾ÆµêºÍ IT ÐÐÒµÒ²Êܵ½¹Ø×¢¡£


https://www.hackread.com/red-ransomware-group-red-cryptoapp-wall-of-shame/?web_view=true


2. CoralRaiderºÚ¿ÍÍÅ»ïÃé×¼Õû¸öÑÇÖ޵ĽðÈÚÐÐÒµ


4ÔÂ5ÈÕ£¬Ë¼¿Æ Talos µÄÑо¿ÈËÔ±·¢ÏÖÁËһϵÁÐÃûΪ CoralRaider µÄºÚ¿Í»î¶¯£¬ÀûÓÃÉø͸¶ñÒâÈí¼þ¹¥»÷Ó¡¶È¡¢Öйú¡¢º«¹ú¡¢ÃϼÓÀ­¹ú¡¢°Í»ù˹̹¡¢Ó¡¶ÈÄáÎ÷ÑǺ͹úÄÚÄ¿±ê¡£Talos ·Ç³£ÓÐÐÅÐĵؽ«¸Ã×éÖ¯µÄÆðÔ´¹éÒòÓÚÔ½ÄÏ£¬²¢Ö¸³öºÚ¿ÍÔÚÆä Telegram ÃüÁîºÍ¿ØÖÆͨµÀÖÐʹÓÃÔ½ÄÏÓ²¢½«Ô½ÄÏÓïµ¥´ÊÓ²±àÂëµ½ÓÐЧ¸ºÔضþ½øÖÆÎļþÖС£ÆäIPµØÖ·¿É×·Ëݵ½ºÓÄÚ¡£ºÚ¿ÍʹÓà RotBot£¨Ò»ÖÖ¶¨ÖƵÄÔ¶³Ì·ÃÎʹ¤¾ß£¨ Quasar RATµÄ±äÌ壩£©ÏÂÔØÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¸Ã·¨Ê½»á²éÕÒ°üÂÞÖ§¸¶¿¨µÈÊý¾ÝµÄÉÌÒµÉ罻ýÌåÕÊ»§¡£µ±Óû§´ò¿ª¶ñÒâ Windows ¿ì½Ý·½Ê½Îļþʱ£¬CoralRaider ¹¥»÷¾Í»á¿ªÊ¼£¬´Ó¶ø´¥·¢Ñ¬È¾Á´¡£ËþÂå˹ÌåÏÖ£¬Ä¿Ç°Éв»Çå³þÍþвÕßÈçºÎ½«Îļþͨ±¨¸øÊܺ¦Õß¡£¼¤»îµÄLNKÎļþ»áÏÂÔØÒ»¸öHTMLÓ¦Ó÷¨Ê½Îļþ£¬¸ÃÎļþÖ´ÐÐVirtual Basic½Å±¾£¬¸Ã½Å±¾ÓÖÔÚÄÚ´æÖÐÖ´ÐÐPowerShell½Å±¾¡°½âÃܲ¢Ë³ÐòÖ´ÐÐÆäËûÈý¸öPowerShell½Å±¾£¬ÕâЩ½Å±¾Ö´Ðз´ÐéÄâ»úºÍ·´·ÖÎö¼ì²é£¬ÈƹýÓû§·ÃÎÊ¿ØÖÆ¡¢½ûÓÃÊܺ¦Õß»úÆ÷É쵀 Windows ºÍÓ¦Ó÷¨Ê½Í¨Öª£¬×îºóÏÂÔز¢ÔËÐÐ RotBot¡£


https://www.govinfosecurity.com/vietnamese-threat-actor-targeting-financial-data-across-asia-a-24796?&web_view=true


3. Ð嵀 Latrodectus ¶ñÒâÈí¼þÈ¡´úÁËÍøÂ究´ÖÐµÄ IcedID


4ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ Latrodectus µÄÏà¶Ô½ÏеĶñÒâÈí¼þ±»ÈÏΪÊÇ IcedID ¼ÓÔØ·¨Ê½µÄÑݱ䣬¸Ã¼ÓÔØ·¨Ê½×Ô 2023 Äê 11 ÔÂÒÔÀ´Ò»Ö±ÔÚ¶ñÒâµç×ÓÓʼþ»î¶¯ÖзºÆð¡£ProofpointºÍ Team CymruµÄÑо¿ÈËÔ±·¢ÏÖÁ˸öñÒâÈí¼þ  £¬ËûÃÇÅäºÏ¼Ç¼ÁËÆ书Ч£¬µ«ÕâЩ¹¦Ð§ÈÔÈ»²»Îȶ¨ÇÒ´¦ÓÚʵÑé½×¶Î¡£IcedID ÊÇÒ»¸öÓÚ 2017 ÄêÊ״η¢ÏֵĶñÒâÈí¼þ¼Ò×壬×î³õ±»¹éÀàΪÄ£¿é»¯ÒøÐÐľÂí£¬Ö¼ÔÚ´ÓÊÜѬȾµÄ¼ÆËã»úÖÐÇÔÈ¡²ÆÕþÐÅÏ¢¡£Ëæ×Åʱ¼äµÄÍÆÒÆ£¬Ëü±äµÃÔ½·¢ÅÓ´ó£¬Ôö¼ÓÁËÌӱܺÍÃüÁîÖ´Ðй¦Ð§¡£½üÄêÀ´£¬Ëü³äµ±Á˼ÓÔØ·¨Ê½µÄ½ÇÉ«£¬¿ÉÒÔ½«ÆäËûÀàÐ͵ĶñÒâÈí¼þ£¨°üÂÞÀÕË÷Èí¼þ£©´«Ë͵½ÊÜѬȾµÄϵͳÉÏ¡£´Ó 2022 Ä꿪ʼ£¬¶à¸ö IcedID »î¶¯Õ¹Ê¾ÁË ¶àÑù»¯µÄͨ±¨¼Æı£¬µ«Ö÷ÒªµÄ·Ö·¢·½Ê½ÈÔÈ»ÊǶñÒâµç×ÓÓʼþ¡£2022 ÄêÄ©£¬ ¸Ã¶ñÒâÈí¼þµÄбäÖÖ ±»ÓÃÓÚ¹¥»÷£¬²¢ÊµÑéÁËÖÖÖÖ¹æ±Ü¼¼ÇɺÍÐµĹ¥»÷¼¯¡£


https://www.bleepingcomputer.com/news/security/new-latrodectus-malware-replaces-icedid-in-network-breaches/?&web_view=true


4. Visa ¾¯¸æÕë¶Ô½ðÈÚ»ú¹¹µÄРJSOutProx ¶ñÒâÈí¼þ±äÌå


4ÔÂ4ÈÕ£¬Visa ¾¯¸æ³Æ£¬Õë¶Ô½ðÈÚ»ú¹¹¼°Æä¿Í»§µÄа汾 JsOutProx ¶ñÒâÈí¼þ¼ì²âÊýÁ¿¼¤Ôö¡£¸Ã»î¶¯Õë¶ÔÄÏÑǺͶ«ÄÏÑÇ¡¢Öж«ºÍ·ÇÖ޵ĽðÈÚ»ú¹¹¡£JsOutProx ÓÚ 2019 Äê 12 ÔÂÊ×´ÎÓöµ½£¬ÊÇÒ»ÖÖÔ¶³Ì·ÃÎÊľÂí (RAT) ºÍ¸ß¶È»ìÏýµÄ JavaScript ºóÃÅ£¬ÔÊÐíÆä²Ù×÷ÕßÔËÐÐ shell ÃüÁî¡¢ÏÂÔØÌرðµÄ¸ºÔØ¡¢Ö´ÐÐÎļþ¡¢²¶×½ÆÁÄ»½Øͼ¡¢ÔÚÊÜѬȾµÄÉ豸ÉϽ¨Á¢³Ö¾ÃÐÔ²¢¿ØÖƼüÅ̺ÍÊó±ê¡£Visa ¾¯±¨ÖÐдµÀ£º¡°ËäÈ» PFD ÎÞ·¨È·ÈÏ×î½ü·¢ÏֵĶñÒâÈí¼þ»î¶¯µÄ×îÖÕÄ¿±ê£¬µ«¸ÃÍøÂç·¸×ï×é֮֯ǰ¿ÉÄÜÔøÕë¶Ô½ðÈÚ»ú¹¹½øÐÐÆÛÕ©»î¶¯¡£¡±¸Ã¾¯±¨ÌṩÁËÓë×îлÏà¹ØµÄÍ×Эָ±ê (IoC)£¬²¢½¨Òé½ÓÄɶàÏ½â´ëÊ©£¬°üÂÞÌá¸ß¶ÔÍøÂçµöÓã·çÏÕµÄÈÏʶ¡¢ÆôÓà EMV ºÍÄþ¾²½ÓÊܼ¼Êõ¡¢± £»¤Ô¶³Ì·ÃÎÊÒÔ¼°¼à¿Ø¿ÉÒɽ»Òס£


https://www.bleepingcomputer.com/news/security/visa-warns-of-new-jsoutprox-malware-variant-targeting-financial-orgs/?&web_view=true


5. ÎÂÄá²®´óѧÊýǧÃû½ÌÖ°Ô±¹¤ºÍѧÉúµÄÃô¸ÐÊý¾Ý±»µÁ


4ÔÂ5ÈÕ£¬¼ÓÄôóÎÂÄá²®´óѧ֤ʵ£¬ºÚ¿ÍÔÚÉϸöÔÂÄ©·¢ÉúµÄÒ»ÆðʼþÖÐÇÔÈ¡Á˸ûú¹¹µÄÃô¸ÐÐÅÏ¢£¬Ó°ÏìÁËÒÔÇ°ºÍÏÖÔÚµÄѧÉúºÍ½ÌÖ°Ô±¹¤¡£ÕâËùÓµÓÐ 18,000 ¶àÃûѧÉúºÍ 800 Ãû½ÌÖ°Ô±¹¤µÄ´óѧÔÚÖÜËĵÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬¡°±»µÁµÄÐÅÏ¢¿ÉÄÜ°üÂÞµ±Ç°ºÍÒÔÇ°µÄѧÉúºÍÔ±¹¤µÄ¸öÈËÐÅÏ¢¡£¡±ÕâÆðÍøÂçʼþÓÚ 3 Ô 25 ÈÕÊ×´ÎÐû²¼£¬Æäʱ¸Ã»ú¹¹ÏÂÏßÁËһϵÁзþÎñ¡£¼¸Ììºó£¬¸Ã´óѧУ³¤Íе¡¤Ãɶà¶û²©Ê¿ÌåÏÖ£¬ÎÂÄá²®ÔâÊÜÁË¡°Õë¶Ô´óѧÍøÂçµÄÓÐÕë¶ÔÐÔµÄÍøÂç¹¥»÷¡±¡£¸Ã´óѧÌåÏÖ£¬ÊÓ²ìÕýÔÚ½øÐÐÖУ¬¡°¿ÉÄÜÐèҪʱ¼ä£¬¿ÉÄÜÊǼ¸¸öÔ¡±£¬Ä¿Ç°¸Ã´óѧÈÏΪ¹¥»÷ÕßÄܹ»·ÃÎÊÎļþ·þÎñÆ÷¡£¸ÃÍøÂçʼþµÄÐÔÖÊÉÐδµÃµ½Ö¤Êµ£¬µ«¸Ã´óѧÌåÏÖ¡°ÍµÇÔʼþºÜ¿ÉÄÜ·¢ÉúÔÚ 3 Ô 24 ÈÕ֮ǰµÄÒ»ÖÜ¡£¡±¸Ã´óѧÌåÏÖ£¬½«ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩΪÆÚÁ½ÄêµÄÐÅÓüà¿Ø·þÎñ£¬²¢ÃãÀøËùÓÐÊÜÓ°ÏìµÄÈË×¢²á£¬²¢Ö¸³öËü»¹ÎªËæºó³ÉΪÆÛÕ©ÕßÄ¿±êµÄÈκÎÈËÌṩ±£ÏÕÌõ¿î¡£


https://therecord.media/university-of-winnipeg-cyberattack


6. ºÚ¿ÍÀûÓà Facebook ¹ã¸æºÍ½Ù³ÖÒ³ÃæÍƹãÐé¼ÙÈ˹¤ÖÇÄÜ·þÎñ


4ÔÂ5ÈÕ£¬ÕâЩ¶ñÒâ¹ã¸æ»î¶¯ÊÇͨ¹ý½Ù³Ö Facebook ¸öÈË×ÊÁÏ´´½¨µÄ£¬ÕâЩ¸öÈË×ÊÁÏð³äÁ÷ÐеÄÈ˹¤ÖÇÄÜ·þÎñ£¬¼Ù×°Ìṩй¦Ð§µÄÔ¤ÀÀ¡£±»¹ã¸æÆÛÆ­µÄÓû§³ÉΪÆÛÕ©ÐÔ Facebook ÉçÇøµÄ³ÉÔ±£¬ÍþвÐÐΪÕßÔÚÆäÖÐÐû²¼ÐÂÎÅ¡¢È˹¤ÖÇÄÜÉú³ÉµÄͼÏñºÍÆäËûÏà¹ØÐÅÏ¢£¬ÒÔʹҳÃæ¿´ÆðÀ´ºÏ·¨¡£È»¶ø£¬ÉçÇøÌû×Ó¾­³£ÌᳫÏÞʱ·ÃÎʼ´½«ÍƳöÇÒ±¸ÊÜÆÚ´ýµÄ AI ·þÎñ£¬ÓÕÆ­Óû§ÏÂÔضñÒâ¿ÉÖ´ÐÐÎļþ£¬ÕâЩ¿ÉÖ´ÐÐÎļþ»áÀûÓà Rilide¡¢Vidar¡¢IceRAT ºÍ Nova µÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾ Windows ¼ÆËã»ú¡£ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þרעÓÚ´ÓÊܺ¦ÕßµÄä¯ÀÀÆ÷ÇÔÈ¡Êý¾Ý£¬°üÂÞ´æ´¢µÄƾ¾Ý¡¢cookie¡¢¼ÓÃÜ»õ±ÒÇ®°üÐÅÏ¢¡¢×Ô¶¯Íê³ÉÊý¾ÝºÍÐÅÓÿ¨ÐÅÏ¢¡£È»ºó£¬ÕâЩÊý¾Ý»áÔÚ°µÍøÊг¡ÉϳöÊÛ£¬»ò±»¹¥»÷ÕßÓÃÀ´ÆÆ»µÄ¿±êµÄÔÚÏßÕÊ»§£¬ÒÔ´Ù½ø½øÒ»²½µÄÕ©Æ­»ò½øÐÐÆÛÕ©¡£Facebook µÈÉ罻ýÌåÍøÂç¹æÄ£ÅӴ󣬼ÓÉϼà¹Ü²»×㣬ʹµÃÕâЩ»î¶¯Äܹ»ºã¾ÃÁ¬Ðø£¬´Ó¶ø´Ù½ø¶ñÒâÈí¼þ²»ÊÜ¿ØÖƵÄÁ÷´«£¬´Ó¶øµ¼Ö¶ñÒâÈí¼þѬȾÔì³É¹ã·ºË𺦡£


https://www.bleepingcomputer.com/news/security/fake-facebook-midjourney-ai-page-promoted-malware-to-12-million-people/