BLACKBASTA ÍÅ»ïÉù³Æ¶Ô SYNLAB ITALIA ¹¥»÷ʼþÂôÁ¦

Ðû²¼Ê±¼ä 2024-05-06

1. BLACKBASTA ÍÅ»ïÉù³Æ¶Ô SYNLAB ITALIA ¹¥»÷ʼþÂôÁ¦


5ÔÂ4ÈÕ£¬½üÆÚÒ½ÁÆÕï¶Ï·þÎñÌṩÉÌ Synlab Italia Ò»Ö±ÒòÍøÂç¹¥»÷¶øÔâÊÜÖжÏ¡£¸Ã¹«Ë¾×î³õ½«¼¼ÊõÎÊÌâÁÐΪµ¼Ö¼ÆËã»úºÍµç»°ÏµÍ³¼°Ïà¹Ø·þÎñÔÝʱÖжϵÄÔ­Òò¡£Ransomfeed.itƽ̨µÄÑо¿ÈËԱ͸¶£¬·¸×ï×éÖ¯BlackbastaÉù³Æ¶Ô Synlab µÄÀÕË÷Èí¼þ¹¥»÷ÂôÁ¦¡£¸Ã×éÖ¯Éù³Æ͵ÇÔÁË 1.5 TB Êý¾Ý£¬°üÂÞ¹«Ë¾Êý¾Ý¡¢Ô±¹¤¸öÈËÎĵµ¡¢¿Í»§¸öÈËÊý¾Ý¡¢Ò½Ñ§·ÖÎö£¨¾«×Óͼ¡¢¶¾Àíѧ¡¢½âÆÊѧ¡­¡­£©µÈµÈ¡£×÷ΪÊý¾Ý鶵ÄÖ¤¾Ý£¬¸Ã×éÖ¯Ðû²¼ÁË»¤ÕÕ¡¢Éí·ÝÖ¤ºÍҽѧ·ÖÎöµÄͼÏñ¡£¸Ã×éÖ¯Ðû²¼µÄÆäÖÐÒ»ÕÅͼÏñÁгöÁ˱»ÇÔÈ¡µÄÎļþ¼Ð£¬ÆäÖÐһЩ°üÂÞÒ½ÁƼì²éµÄÃû³Æ£¬¶øÁíһЩÔò°üÂÞλÓÚ¿²ÅÁÄáÑǵØÓòµÄÖÐÐÄÃû³Æ£¬¾¡¹ÜÕâ´ÎÏ®»÷Ó°ÏìÁËÕû¸öÒâ´óÀûµÄ²ÉÑùµã¡£BlackBasta ÀÕË÷Èí¼þ×éÖ¯½«ÓÚ 2024 Äê 5 Ô 11 ÈÕÐû²¼±»µÁÊý¾Ý¡£Black Basta ×Ô 2022 Äê 4 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬ÓëÆäËûÀÕË÷Èí¼þ²Ù×÷Ò»Ñù£¬ËüʵʩÁËË«ÖØÀÕË÷¹¥»÷Ä£ÐÍ¡£  2022 Äê 11 Ô£¬Sentinel Labs Ñо¿ÈËÔ±³ÂËß³Æ £¬ËûÃÇ·¢ÏÖÁË Black Basta ÀÕË÷Èí¼þÍÅ»ïÓë³öÓÚ¾­¼Ã¶¯»úµÄºÚ¿Í×éÖ¯ FIN7 Ö®¼äµÄÁªÏµµÄÖ¤¾Ý¡£


https://securityaffairs.com/162741/security/blackbasta-gang-claimed-responsibility-for-synlab-italia-attack.html


2. APT42ʹÓÃÉç½»¹¤³Ì¹¥»÷ÇÖÈëÎ÷·½ºÍÖж«Ä¿±ê


5ÔÂ4ÈÕ£¬APT42Ê״α»MandiantÓÚ2022Äê9ԼǼ£¬³ÂËß³ÆÕâЩÍþвÐÐΪÕß×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬ÒÑÔÚ14¸ö¹ú¼Ò½øÐÐÁËÖÁÉÙ30´Î²Ù×÷¡£Òѱ»ÊӲ쵽Õë¶Ô·ÇÕþ¸®×éÖ¯¡¢Ã½Ìå»ú¹¹¡¢½ÌÓý»ú¹¹¡¢»î¸ÐÈËÊ¿ºÍÖ´·¨·þÎñ¡£APT42µÄ¹¥»÷ÒÀÀµÓÚÉç½»¹¤³ÌºÍµöÓ㣬Æä×îÖÕÄ¿±êÊÇͨ¹ý¶¨ÖƵĺóÃÅѬȾĿ±êÉ豸£¬´Ó¶øʹÍþвÐÐΪÕß»ñµÃ¶Ô×éÖ¯ÍøÂçµÄ³õʼ·ÃÎÊȨÏÞ¡£¹¥»÷´Óð³ä¼ÇÕß¡¢·ÇÕþ¸®×éÖ¯´ú±í»ò»î¶¯×éÖ¯ÕßµÄÔÚÏßÉí·Ý·¢Ë͵ĵç×ÓÓʼþ¿ªÊ¼£¬ÕâЩµç×ÓÓʼþµÄÓòÃû¡°typosquat¡±£¨Ê¹ÓÃÀàËƵÄURL£©ÓëºÏ·¨×éÖ¯µÄÓòÃûÏàËÆ¡£¹¥»÷ÕßÓëÊܺ¦Õß½øÐÐ×ã¹»µÄÏàͬÒÔ½¨Á¢ÐÅÈκ󣬻áÏòÊܺ¦Õß·¢ËÍÓë»áÒé»òÐÂÎÅÎÄÕÂÏà¹ØµÄÎĵµÁ´½Ó£¬¾ßÌåÈ¡¾öÓÚËùÑ¡µÄÓÕ¶üÖ÷Ìâ¡£µã»÷ÕâЩÁ´½Ó»á½«Ä¿±êÖض¨Ïòµ½Ä£·ÂÖªÃû·þÎñ£¨ÈçGoogleºÍMicrosoft£©»òÓëÊܺ¦ÕßÊÂÇéÁìÓòÏà¹ØµÄרҵƽ̨µÄÐé¼ÙµÇ¼ҳÃæ¡£APT42ʹÓÃÁ½¸ö¶¨ÖƵĺóÃŶñÒâÈí¼þ£¬·Ö±ðÃüÃûΪNicecurlºÍTamecat£¬Ã¿¸öºóÃŶ¼Õë¶ÔÍøÂç¼äµý»î¶¯ÖеÄÌض¨¹¦Ð§¡£NicecurlÊÇ»ùÓÚVBScriptµÄºóÃÅ£¬Äܹ»Ö´ÐÐÃüÁî¡¢ÏÂÔغÍÖ´ÐÐÆäËûÔغÉ£¬»òÔÚ±»Ñ¬È¾µÄÖ÷»úÉϽøÐÐÊý¾ÝÍÚ¾ò¡£TamecatÊÇÒ»¸ö¸üÅÓ´óµÄPowerShellºóÃÅ£¬¿ÉÒÔÖ´ÐÐÈÎÒâPS´úÂë»òC#½Å±¾£¬Ê¹APT42ÔÚÖ´ÐÐÊý¾Ý͵ÇԺ͹㷺µÄϵͳ²Ù×÷ʱ¾ßÓиü´óµÄ²Ù×÷Áé»îÐÔ¡£ÓëNicecurlÏà±È£¬TamecatʹÓÃbase64»ìÏýÆäC2ͨÐÅ£¬¿ÉÒÔ¶¯Ì¬¸üÐÂÆäÅäÖ㬲¢ÔÚÍⲿִÐÐ֮ǰÆÀ¹À±»Ñ¬È¾µÄ»·¾³¡£


https://www.bleepingcomputer.com/news/security/iranian-hackers-pose-as-journalists-to-push-backdoor-malware/


3. ¶íÂÞ˹ APT28 ÀûÓà Outlook ©¶´¹¥»÷½Ý¿ËºÍµÂ¹ú


5ÔÂ4ÈÕ£¬½Ý¿ËºÍµÂ¹ú͸¶£¬ËüÃÇÊÇÓë¶íÂÞ˹ÓÐÁªÏµµÄÃñ×å¹ú¼Ò×éÖ¯APT28½øÐеĺã¾ÃÍøÂç¼äµý»î¶¯µÄÄ¿±ê£¬´Ë¾ÙÒýÆðÁËÅ·ÃË (EU)¡¢±±´óÎ÷ÑóÌõÔ¼×éÖ¯ (NATO) µÄÇ´Ô𡣽ݿ˹²ºÍ¹úÍâ½»²¿ (MFA) ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬¸Ã¹úһЩδ͸¶ÐÕÃûµÄʵÌåÒòÈ¥Äê³õÆعâµÄ Microsoft Outlook Äþ¾²Â©¶´¶øÔâµ½¹¥»÷¡£Íâ½»²¿ÌåÏÖÕë¶ÔÕþÖÎʵÌå¡¢¹ú¼Ò»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷²»½ö¶Ô¹ú¼ÒÄþ¾²×é³ÉÍþв£¬¶øÇÒÆÆ»µÁËÎÒÃÇ×ÔÓÉÉç»áËùÒÀÀµµÄÃñÖ÷½ø³Ì¡£ËùÉæ¼°µÄÄþ¾²Â©¶´ÊÇCVE-2023-23397£¬ÕâÊÇ Outlook ÖÐÏÖÒÑÐÞ²¹µÄÒ»¸öÒªº¦È¨ÏÞÉý¼¶Â©¶´£¬¿ÉÄÜÔÊÐí¹¥»÷Õß·ÃÎÊ Net-NTLMv2 ¹þÏ£Öµ£¬È»ºóʹÓÃËüÃÇͨ¹ýÖм̹¥»÷À´ÑéÖ¤×Ô¼ºµÄÉí·Ý¡£µÂ¹úÁª°îÕþ¸®£¨ÓÖÃû Bundesregierung£©½«ÍþвÐÐΪÕß¹é¾ÌÓÚÕë¶ÔÉç»áÃñÖ÷µ³Ö´ÐÐίԱ»áµÄÍøÂç¹¥»÷£¬¸Ã¹¥»÷ÔÚ¡°Ïà¶Ô½Ï³¤µÄʱ¼äÄÚ¡±Ê¹ÓÃÏàͬµÄ Outlook ©¶´£¬Ê¹ÆäÄܹ»¡°Î£º¦´óÁ¿µç×ÓÓʼþÕÊ»§¡±¡£¸Ã»î¶¯Õë¶ÔµÄһЩ´¹Ö±ÐÐÒµ°üÂÞλÓڵ¹ú¡¢ÎÚ¿ËÀ¼ºÍÅ·ÖÞµÄÎïÁ÷¡¢¾ü±¸¡¢º½¿Õº½Ì칤ҵ¡¢IT ·þÎñ¡¢»ù½ð»áºÍЭ»á£¬Áª°î¼à¹Ü»ú¹¹»¹ÌåÏÖ¸Ã×éÖ¯¼ÓÈëÁË 2015 Äê¶ÔµÂ¹úÁª°îÒé»á£¨Bundestag£©¡£APT28 ¾­ÆÀ¹ÀÓë¶íÂÞ˹Áª°î¾üÊÂÇ鱨»ú¹¹ GRU µÄ¾üʵ¥Ôª 26165 ÓÐÁªÏµ£¬Ò²±»¸ü¹ã·ºµÄÍøÂçÄþ¾²ÉçÇøÒÔ BlueDelta¡¢Fancy Bear¡¢Forest Blizzard£¨ÒÔÇ°³ÆΪ Strontium£©¡¢FROZENLAKE¡¢Iron Twilight¡¢Pawn Storm¡¢ Sednit¡¢Sofacy ºÍ TA422¡£


https://thehackernews.com/2024/05/microsoft-outlook-flaw-exploited-by.html


4. ÎÚ¿ËÀ¼¼Ç¼¶íÂÞ˹ºÚ¿Í³öÓÚ¾­¼Ã¶¯»úµÄ¹¥»÷ÓÐËùÔö¼Ó


5ÔÂ3ÈÕ£¬ÎÚ¿ËÀ¼Õþ¸®³ÂË߳ƣ¬Óë¶íÂÞ˹ÓйصÄÏÈÇ°Éí·Ý²»Ã÷µÄºÚ¿Í³öÓÚ¾­¼Ã¶¯»úÌᳫµÄÍøÂç¹¥»÷ÓÐËùÔö¼Ó¡£Æ¾¾Ý×î½üµÄÒ»·Ý³ÂËߣ¬ÕâЩ×éÖ¯ÔÚ 2023 ÄêÏ°ëÄêÔÚÎÚ¿ËÀ¼ÍøÂçÖбäµÃÔ½·¢»îÔ¾£¬µ¼ÖÂ֮ǰÓÉ¿ËÀïÄ·ÁÖ¹¬Ö§³ÖµÄÖøÃûºÚ¿Í×éÖ¯£¨Èç¡°Sandworm¡±ºÍ¡°Armageddon¡±£©Ö÷µ¼µÄÁ¬ÐøÍøÂçÕ½Õù·¢ÉúÁËת±ä¡£ÎÚ¿ËÀ¼¼ÆËã»úÓ¦¼±ÏìӦС×é (CERT-UA) ÂôÁ¦ÈË Yevheniia Volivnyk ÌåÏÖмÓÈëÕߵķºÆð±íÃ÷¶íÂÞ˹ÓÐÒâʹÆäÍøÂçÕ½ÎäÆ÷¿â¶àÑù»¯¡£ÕâЩÍÅÌå¿ÉÄÜÓµÓÐÆæÌصļ¼ÄÜ»òרעÓÚÌض¨µÄÔËӪĿ±ê¡£ÎÚ¿ËÀ¼ÍøÂçÑо¿ÈËÔ±ÌåÏÖ£¬ÕâЩÐÂ×é֯ͨ¹ýʹÓþ­¹ýÉî˼ÊìÂǵÄÍøÂçµöÓã¹¥»÷¶øÍÑÓ±¶ø³ö¡£Ö÷ҪĿ±êÊÇ·Ö·¢¶ñÒâÔ¶³Ì·ÃÎÊÈí¼þ£¨ÀýÈçRemcosRATºÍ RemoteUtilities£©»òÊý¾Ý͵ÇÔ·¨Ê½£¨°üÂÞ LummaStealer ºÍ MeduzaStealer£©¡£ÔÚ CERT-UA ·ÖÎöÆڼ䣬½ü 40% µÄ³ÂËßʼþÓë½ðÈÚ͵ÇÔÓйØ¡£CERT-UA ÌåÏÖ£¬°üÂÞµçÐÅÐÐÒµÔÚÄÚµÄÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©ÈÔÈ»ÊǶíÂÞ˹ºÚ¿ÍµÄ×îÓÅÏÈÄ¿±ê£¬¶øÇÒÕâÖÖÇ÷ÊÆ¿ÉÄÜ»áÁ¬ÐøÏÂÈ¥¡£¶íÂÞ˹Õë¶ÔÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©µÄÐí¶àÐж¯±»ÃèÊöΪ¡°»ìºÏ¡±Ðж¯¡£ÀýÈ磬ÎÚ¿ËÀ¼×î´óµÄÒƶ¯ÔËÓªÉÌ Kyivstar£¨Îª 2500 ÍòÓû§Ìṩ·þÎñ£©Ôâµ½¹¥»÷£¬Ç¡·ê¶ÔÎÚ¿ËÀ¼½øÐдó¹æÄ£µ¼µ¯Ï®»÷¡£


https://therecord.media/ukraine-russia-increase-financially-motivated-cyberattacks?&web_view=true


5. Goldoon ½©Ê¬ÍøÂçÀûÓà 9 ÄêÇ°µÄ©¶´Ãé×¼ D-Link É豸


5ÔÂ4ÈÕ£¬Fortinet µÄ FortiGuard ʵÑéÊÒµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°Goldoon¡±µÄн©Ê¬ÍøÂçÍþв£¬×¨ÃÅÕë¶ÔD-Link ·ÓÉÆ÷ºÍÍøÂ總¼Ó´æ´¢ (NAS) É豸¡£¸Ã¶ñÒâÈí¼þÀûÓÃCVE-2015-2051£¨CVSSÆÀ·Ö£º10.0£©Â©¶´Ñ¬È¾É豸£¬¿ÉÄÜʹÓû§Êý¾ÝºÍÍøÂçÄþ¾²ÃæÁÙ·çÏÕ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬ 2015 Äê 2 Ô·¢ÏÖµÄÄþ¾²Â©¶´CVE-2015-2051ÒÑÓнüÊ®ÄêµÄÀúÊ·¡£´Ë©¶´Ö÷ÒªÓ°Ï챨·ÏÉ豸¡£2022 Äê 9 Ô£¬Palo Alto Networks µÄ Unit 42·¢ÏÖÎÛÃûÕÑÖøµÄ Mirai ½©Ê¬ÍøÂçµÄ±äÌ壨³ÆΪ MooBot£©ÕýÔÚÀûÓÃÏàͬµÄ©¶´£¬Õë¶Ô D-Link É豸¡£D-Link ÓÚ 2015 Äê½â¾öÁ˸ÃÎÊÌ⡣ƾ¾Ý Fortinet ³ÂËߣ¬Goldoon ÀûÓñ©Á¦¹¥»÷À´»ñÈ¡¶Ô D-Link É豸µÄ·ÃÎÊȨÏÞ¡£±©Á¦¹¥»÷É漰ϵͳµØʵÑé²îÒìµÄÓû§ÃûºÍÃÜÂë×éºÏ£¬Ö±µ½»ñµÃδ¾­ÊÚȨµÄ·ÃÎÊ¡£¸Ã³ÂËß±íÃ÷£¬ÕâЩ¹¥»÷ÀûÓÃÁËÄ¿±êÉ豸ÉϽÏÈõµÄĬÈÏƾ¾Ý»ò¹ýʱµÄ¹Ì¼þ¡£


https://www.hackread.com/goldoon-botnet-targeting-d-link-devices/


6. LOCKBIT Ðû²¼ÁË´Óê©ÄÉ SIMONE VEIL Ò½ÔºÇÔÈ¡µÄÊý¾Ý


5ÔÂ3ÈÕ£¬LockBit ÀÕË÷Èí¼þÔËÓªÉÌÐû²¼Á˾ݳƴÓê©ÄÉ Simone Veil Ò½ÔºÇÔÈ¡µÄÃô¸ÐÊý¾Ý¡£4 Ô£¬ê©ÄÉ Simone Veil Ò½Ôº(CHC-SV) ÔâÊÜÍøÂç¹¥»÷£¬ÆÈʹÊÂÇéÈËÔ±ÖØÐÂʹÓñʺÍÖ½¡£Ò½Ôº±»ÆȹرÕËùÓмÆËã»ú£¬µ«µç»°ÏßδÊÜÓ°Ïì¡£Ò½ÔºÕýÔÚ ANSSI¡¢Cert Sant¨¦¡¢Orange Cyber D¨¦fense ºÍ GHT06 µÄ×ÊÖúÏÂÊÓ²ìÕâһʼþ¡£ê©ÄÉÎ÷ÃÉÄÈ¡¤Î¬¶ûÒ½ÔºÊÇÒ»¼ÒλÓÚ·¨¹úê©ÄɵĹ«Á¢Ò½Ôº¡£Ò½ÔºÎªµ±µØÉçÇø¼°ÖܱߵØÓòÌṩһϵÁÐÒ½ÁÆ·þÎñºÍ±£½¡ÉèÊ©¡£CHC-SVÓµÓÐ2000¶àÃûÔ±¹¤£¬¿ÉÈÝÄÉ800¶àÕÅ´²Î»¡£LockBitÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢ÔÚÒ½Ôº¾Ü¾øÖ§¸¶Êê½ðºóÓÚ 5 Ô 1 ÈÕÐû²¼Á˱»µÁµÄ»úÃÜÊý¾Ý¡£ê©ÄÉÎ÷ÃÉÄÈ¡¤Î¤ÒÁÒ½ÔºÖÐÐÄÔÚÆäÍøÕ¾ÉÏ·¢±íÉùÃ÷£¬È·ÈÏÀÕË÷Èí¼þ×éÖ¯Ðû²¼µÄÊý¾ÝÊôÓÚÆäËùÓС£¹ýÈ¥£¬·¨¹úÆäËûÒ½ÔºÒ²ÊÇÍøÂç¹¥»÷µÄÊܺ¦Õß¡£2022 Äê 12 Ô£¬ ·²¶ûÈüÒ½ÔºÖÐÐÄ ÔâÊÜÍøÂç¹¥»÷ £¬±»ÆÈÈ¡ÏûÔËÓª²¢½«²¿ÃÅ»¼ÕßתÒƵ½ÆäËûÒ½Ôº¡£


https://securityaffairs.com/162721/cyber-crime/lockbit-published-simone-veil-hospital-data.html