³¯ÏÊLazarus GroupÀûÓÃÐé¼ÙÕÐƸÓë¶ñÒâÈí¼þËÁÅ°Çø¿éÁ´ÁìÓò

Ðû²¼Ê±¼ä 2024-09-11
1. ³¯ÏÊLazarus GroupÀûÓÃÐé¼ÙÕÐƸÓë¶ñÒâÈí¼þËÁÅ°Çø¿éÁ´ÁìÓò


9ÔÂ9ÈÕ£¬Group-IB µÄ×îгÂËß½ÒʾÁ˳¯ÏÊÕþ¸®Ö§³ÖµÄ Lazarus Group ÕýÔÚ½øÐеġ°Eager Crypto Beavers¡±»î¶¯£¬¸Ã»î¶¯ÏÔÖøÉý¼¶ÁËÆäÍøÂç¹¥»÷¼Æı£¬×¨×¢ÓÚÇø¿éÁ´¼°¼ÓÃÜ»õ±ÒÁìÓò¡£Lazarus ¼¯ÍÅÀûÓÃÅÓ´óÊֶΣ¬ÈçÐé¼ÙÊÂÇé»ú»á¡¢¶ñÒâÊÓƵ»áÒéÓ¦Ó÷¨Ê½£¨ÈçFCCCall£©ÒÔ¼°GitHubÉϵÄÓÎÏ·ºÍ¼ÓÃÜ»õ±ÒÏîÄ¿£¬ÓÕµ¼Êܺ¦ÕßÏÂÔز¢Ö´ÐÐÃûΪBeaverTailµÄ¶ñÒâÈí¼þ¡£¸ÃÈí¼þ²»½öÇÔÈ¡ä¯ÀÀÆ÷ƾ¾ÝºÍ¼ÓÃÜ»õ±ÒÇ®°üÊý¾Ý£¬»¹²¿ÊðÃûΪInvisibleFerretµÄPythonºóÃÅÒÔÀ©´ó¹¥»÷·¶Î§¡£´ËÍ⣬¹¥»÷»¹À©Õ¹ÖÁmacOSÉ豸£¬²¢Í¨¹ý»ìÏý´úÂëºÍÔ¶³Ì·ÃÎʹ¤¾ß£¨ÈçAnyDesk£©ÔÚ¶à¸ö²Ù×÷ϵͳÉÏʵÏÖ³Ö¾ÃÐÔ¡£¸üÁîÈ˵£ÓǵÄÊÇ£¬LazarusÒѽ«Ä¿±êÀ©´óÖÁä¯ÀÀÆ÷À©Õ¹¡¢ÃÜÂë¹ÜÀíÆ÷¼°Microsoft Sticky Notes£¬²¢Í¨¹ýFTPºÍTelegramµÈÇþµÀÇÔÈ¡Êý¾Ý¡£´Ë»î¶¯ÏÔʾÁËLazarusÔÚÊý¾ÝÇÔÈ¡¼¼ÊõÉϵĸ߶Èרҵ»¯ÓëÁé»îÐÔ£¬Ôö¼ÓÁËÄþ¾²¼ì²âºÍ·À·¶µÄÄѶÈ¡£


https://hackread.com/lazarus-group-blockchain-fake-video-conferencing-job-scam/?web_view=true


2. RansomHubÍÅ»ïÀÄÓÃTDSSKiller½ûÓÃEDRÈí¼þ


9ÔÂ10ÈÕ£¬RansomHub ÀÕË÷Èí¼þÍÅ»ïÇÉÃîÀûÓÿ¨°Í˹»ùµÄºÏ·¨¹¤¾ß TDSSKiller£¬¹æ±ÜÁËÄ¿±êϵͳµÄ¶Ëµã¼ì²âºÍÏìÓ¦£¨EDR£©·À»¤¡£TDSSKiller Ô­±¾Éè¼ÆÓÃÓÚ¼ì²âÄÑÒÔ²ì¾õµÄ rootkit ºÍ bootkit ¶ñÒâÈí¼þ£¬µ«Æ书Ч±» RansomHub ¶ñÒâÀûÓã¬Í¨¹ý½ûÓà Malwarebytes Anti-Malware µÈÄþ¾²·þÎñ£¬Ï÷ÈõÁËϵͳ·ÀÓù¡£ÕâÒ»ÀÄÓÃÊÖ·¨ÀûÓÃÁË TDSSKiller µÄºÏ·¨ÐÔºÍÓÐЧ֤ÊéÇ©Ãû£¬Ê¹ÆäÄÜÌÓ±ÜÄþ¾²Èí¼þµÄÀ¹½Ø¡£Ëæºó£¬RansomHub ²¿Êð LaZagne ƾ֤ÊÕ¼¯¹¤¾ß£¬´Ó¶àÖÖÓ¦ÓÃÊý¾Ý¿âÖÐÇÔÈ¡µÇ¼ÐÅÏ¢£¬ÖúÁ¦ÆäÔÚÍøÂçÖкáÏòÀ©É¢¡£LaZagne µÄ»î¶¯ËäÒ×±»·¢ÏÖ£¬µ« TDSSKiller µÄ½éÈëʹÆäÔ½·¢Òþ±Î¡£Malwarebytes ³ÂËßÖ¸³ö£¬TDSSKiller Ö´ÐÐʱ½ÓÄɶ¯Ì¬ÎļþÃû£¬Òþ²ØÓÚÁÙʱĿ¼ÖУ¬Ôö¼ÓÁ˼ì²âÄѶÈ¡£Ãæ¶Ô´ËÍþв£¬Äþ¾²¹«Ë¾½¨Òé¼ÓÇ¿ EDR ½â¾ö·½°¸µÄ·À¸Ä¶¯¹¦Ð§£¬·ÀÖ¹ÀàËÆ TDSSKiller µÄ¹¤¾ß½ûÓ÷À»¤¡£Í¬Ê±£¬¼à¿ØÌض¨ÊýÁîÐвÎÊýºÍÖ´ÐÐÐÐΪҲÊÇÓÐЧ·ÀÓù´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/


3. KonniºÚ¿Í×éÖ¯£ºÕë¶Ô¶íº«µÄÍøÂç¼äµý¹¥»÷¼Æı


9ÔÂ10ÈÕ£¬Ñо¿ÈËÔ±½üÆÚ·¢ÏÖ£¬Ó볯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯KimsukyÓйØÁªµÄÍþвÐÐΪÕßKonni£¬Õý¼Ó´ó¶Ôº«¹úºÍ¶íÂÞ˹µÄÍøÂç¹¥»÷Á¦¶È¡£KonniÔÚ¶ÔÕâÁ½¸ö¹ú¼ÒµÄ¹¥»÷ÖУ¬Õ¹ÏÖÁ˸߶ȵļÆı¡¢¼¼ÊõºÍ·¨Ê½ÏàËÆÐÔ£¬Ö÷ҪĿµÄÊǽøÐÐÍøÂç¼äµý»î¶¯¡£×Ô2021ÄêÆð£¬KonniÒÑÕë¶Ô¶íÂÞ˹Íâ½»²¿¡¢¶íÂÞ˹פӡÄá´óʹ¹Ý¼°¶à¼Òº«¹úÆóÒµÌᳫ¹¥»÷£¬°üÂÞÔÚ2022Äê1ÔÂÀûÓÃÐÂÄê×£¸£ÓʼþÏò¶íÂÞ˹´óʹ¹ÝÍâ½»¹ÙÁ÷´«¶ñÒâÈí¼þ¡£Æä»î¶¯¿É×·ËÝÖÁ2014Ä꣬ºã¾ÃÇÒÁ¬Ðø¡£Konni½ÓÄɵöÓãÓʼþ×÷ΪÈëÇÖÊֶΣ¬ÀûÓÃË°ÊÕ¡¢½±Ñ§½ðµÈÓÕ¶ü»ñȡϵͳ·ÃÎÊȨÏÞ£¬²¢Í¨¹ý×Ô½ç˵µÄÔ¶³Ì·ÃÎÊľÂíÍêÈ«¿ØÖÆÊܺ¦ÏµÍ³¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬¸Ã×éÖ¯ÀûÓÃÏàËƼ¼Êõ½«ÊÜѬȾÉ豸½ÓÈëºÚ¿Í¿ØÖƵÄÃüÁî·þÎñÆ÷£¬Í¨¹ýÄÚ²¿ÃüÁîʵÏÖÁ¬½Ó¡£¾¡¹Ü¹¥»÷ģʽ¶àÄêδ±ä£¬µ«KonniÒ²½áºÏÐÂÓ±¼ÆıÒÔÌáÉýÀÖ³ÉÂÊ¡£Ñо¿ÈËԱǿµ÷£¬¹Ø×¢KonniÔÚ²îÒì¹ú¼Ò¼ä¹¥»÷µÄÏàËÆÐÔ£¬¶ÔÓÚÄþ¾²×¨¼ÒÖƶ¨¸üÓÐЧµÄ·ÀÓù¼ÆıºÍ¾«×¼¹éÒò¾ßÓÐÖØÒªÒâÒ壬ÓÐÖúÓÚ¸üºÃµØ±£»¤Ä¿±êʵÌåÃâÊÜ´ËÀàÍøÂçÍþвµÄÇÖº¦¡£


https://therecord.media/kimsuky-north-korea-hackers-targeting-russia-south-korea?&web_view=true


4. WPSÆØ95ÍòÓû§ÐÅÏ¢ÔâMOVEitºÚ¿Í¹¥»÷й¶


9ÔÂ10ÈÕ£¬Íþ˹¿µÐÇÖÝҽʦ·þÎñ±£ÏÕ¹«Ë¾£¨WPS£©½üÆÚÈ·ÈÏ£¬Ô¼950,000Ãû¸öÈ˵ĸöÈËÐÅÏ¢ÔÚ2023ÄêµÄÒ»ÆðMOVEitºÚ¿Í¹¥»÷ʼþÖÐÔâй¶¡£¸ÃʼþÔ´ÓÚProgress SoftwareÆìϵÄMOVEit TransferÈí¼þ±»¶íÓïCl0pÀÕË÷Èí¼þ×éÖ¯ÀûÓÃÁãÈÕ©¶´ÇÖÈ룬µ¼ÖÂÈ«Çò½ü2,800¸ö×éÖ¯ÊÜ´´£¬ÀۼƸöÈËÐÅϢй¶Á¿¸ß´ï9600ÍòÌõ¡£WPS×÷ΪÊܺ¦ÕßÖ®Ò»£¬ÓÚ9ÔÂ6ÈÕÐû²¼£¬Æä946,801ÃûÒ½ÁƱ£ÏÕÊÜÒæÈË¿ÉÄÜÊܵ½²¨¼°£¬°üÂÞ²¿ÃÅCMS£¨Ò½ÁƱ£ÏÕºÍÒ½ÁƲ¹Öú·þÎñÖÐÐÄ£©ÊÜÒæÈË¡£¾¡¹Ü³õ·¨Ê½²éÏÔʾÎÞÖ±½ÓÖ¤¾Ý±íÃ÷Êý¾Ý±»¸´ÖÆ£¬µ«ËæºóµÄÉîÈëÊÓ²ìÈ·ÈÏ£¬²¿ÃÅ°üÂÞÐÕÃû¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅµÈÃô¸ÐÐÅÏ¢µÄÎļþÒÑ´ÓWPSµÄMOVEitϵͳÖб»µÁ¡£¾¡¹ÜĿǰδÊÕµ½ÒòÐÅϢ鶵¼ÖµÄÆÛÕ©³ÂËߣ¬WPSÈÔ½ÓÄÉ»ý¼«´ëÊ©£¬ÎªÊÜÓ°ÏìµÄÒ½ÁƱ£ÏÕÊÜÒæÈ˸ü»»ÐºÅÂëµÄÒ½ÁƱ£ÏÕ¿¨£¬²¢ÌṩΪÆÚÒ»ÄêµÄÐÅÓüà¿ØºÍÉí·Ý±£»¤·þÎñ£¬Í¬Ê±ÌáÐѹ«ÖÚ±£³Ö¾¯Ì裬·À·¶Ç±ÔÚ·çÏÕ¡£


https://www.securityweek.com/wisconsin-insurer-discloses-data-breach-impacting-950000-individuals/


5. Confidant Health 5.3TBÐÄÀí½¡¿µ¼Ç¼Ôâй¶


9ÔÂ6ÈÕ£¬ÃÀ¹úÈ˹¤ÖÇÄÜÒ½Áƹ«Ë¾Confidant HealthÒò·þÎñÆ÷ÅäÖôíÎó£¬ÒâÍâй¶Á˸ߴï5.3TBµÄÃô¸ÐÐÄÀí½¡¿µ¼Ç¼£¬ÄÚÈÝÉæ¼°¸öÈËÐÅÏ¢¡¢ÐÄÀíÆÀ¹À¼°Ï꾡ҽÁÆÊý¾Ý£¬Ö±½ÓÍþвµ½Áè¼Ý12.6ÍòÃû»¼ÕßµÄÒþ˽Äþ¾²¡£¸ÃʼþÓÉÍøÂçÄþ¾²×¨¼ÒJeremiah Fowler½Ò¶£¬Ëû·¢ÏÖÁËδÉèÃÜÂë±£»¤µÄ·þÎñÆ÷£¬ÄÚº¬À´×ÔÎåÖÝ»¼ÕßµÄ˽ÃÜÐÅÏ¢£¬°üÂÞÐÕÃû¡¢µØÖ·¡¢ÁªÏµ·½Ê½µÈ¸öÈËÉí·ÝÐÅÏ¢£¬ÒÔ¼°ÏêϸµÄÐÄÀí½¡¿µÆÀ¹À¡¢´¦·½Ò©Çåµ¥¡¢Ò½ÁƲ¹Öú¿¨ÐÅÏ¢µÈ¡£ÓÈΪÑÏÖصÄÊÇ£¬Ð¹Â¶Êý¾Ý»¹Éæ¼°ÒôƵÊÓƵ¼Ç¼£¬ÌÖÂÛÁ˼«ÎªË½ÃܵļÒÍ¥ÎÊÌâ¡£Confidant HealthѸËÙÈϿɲ¢ÏÞÖÆÁË·ÃÎÊ£¬µ«Ð¹Â¶µÄÁ¬Ðøʱ¼ä¼°Ç±ÔÚÓ°Ï췶ΧÉв»Ã÷ÀÊ¡£¾¡¹Ü²¿ÃÅÎļþÊÜÏÞÖÆ·ÃÎÊ£¬µ«ÒÑ鶵ÄÎļþ·¾¶ºÍ´æ´¢Î»ÖÃÈÔ¿ÉÄܳÉΪºÚ¿Í¹¥»÷µÄÌø°å£¬¼Ó¾ç»¼ÕßÃæÁٵķçÏÕ¡£´ËÀàÊý¾Ýй¶²»½ö¿ÉÄÜÒý·¢Éí·Ý͵ÇÔ¡¢Ò½ÁÆÆÛÕ©µÈÑÏÖغó¹û£¬»¹¿ÉÄܶԻ¼ÕßÔì³É¾«ÉñѹÁ¦ºÍÐÄÀíÉ˺¦¡£


https://hackread.com/ai-firm-misconfigured-server-exposed-mental-health-data/


6. NoNameÀÕË÷Èí¼þÍÅ»ï×î½ü²¿ÊðÁËRansomHub¶ñÒâÈí¼þ


9ÔÂ10ÈÕ£¬NoNameÀÕË÷Èí¼þÍÅ»ï½üÄêÀ´ÖÂÁ¦ÓÚÔÚÈ«Çò·¶Î§ÄÚÕë¶ÔÖÐСÐÍÆóҵʵʩ¹¥»÷£¬ÒÔÊ÷Á¢ÆäÔÚÀÕË÷Èí¼þ½çµÄÉùÓþ¡£¸ÃÍÅ»ïÀûÓðüÂÞEternalBlueºÍZeroLogonÔÚÄڵĶàÖ־ɩ¶´£¬Í¨¹ý±©Á¦Æƽâ»ñÈ¡ÍøÂç·ÃÎÊȨÏÞ£¬²¢²¿ÊðÆ䶨Öƹ¤¾ßSpacecolon¶ñÒâÈí¼þ¼Ò×å¡£½üÆÚ£¬NoNameתÏòʹÓÃScRansomÀÕË÷Èí¼þ£¬Ìæ´úÁË֮ǰµÄScarab¼ÓÃÜÆ÷£¬²¢ÊÔͼͨ¹ýÄ£·ÂLockBit 3.0µÈÖªÃûÀÕË÷Èí¼þÀ´Ìá¸ßÆäÖªÃû¶È¡£ScRansomËäÈ»²»ÈçÆäËûÀÕË÷Èí¼þÅӴ󣬵«¾ß±¸²¿ÃżÓÃÜ¡¢ÎļþÄÚÈÝÌæ»»µÈÄÜÁ¦£¬²¢ÄܼÓÃܶàÖÖÇý¶¯Æ÷ÉϵÄÎļþ¡£ESETÖ¸³ö£¬¸ÃÍÅ»ïÔÚ½âÃܹý³ÌÖÐÌåÏÖ²»³ÉÊ죬ӰÏìÁËÆäÉùÓþºÍÊܺ¦Õ߸¶¿îµÄÒâÔ¸¡£´ËÍ⣬NoName»¹ÀûÓöà¸öSMB»·¾³ÖеÄ©¶´£¬°üÂÞEternalBlueºÍZerologonµÈ£¬ÒÔ¼°Í¨¹ý½ûÓÃWindows DefenderµÈÊÖ¶ÎÌáÉý¹¥»÷Ч¹û¡£×î½ü£¬Óм£Ïó±íÃ÷NoName¿ÉÄÜÒѳÉΪRansomHubµÄÁ¥Êô»ú¹¹£¬Í¨¹ý²¿ÊðRansomHubµÄEDRɱÊÖºÍÀÕË÷Èí¼þÀ´À©Õ¹Æä»î¶¯·¶Î§¡£¾¡¹ÜÓëRansomHubµÄÕýʽ¹ØÁªÉдýÈ·ÈÏ£¬µ«NoNameÏÔÈ»²¢Î´·ÅÆúÆäÀÕË÷Èí¼þÒµÎñ£¬ScRansom¼ÓÃÜÆ÷ÈÔÔÚ»ý¼«¿ª·¢ÖС£


https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/