ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð

Ðû²¼Ê±¼ä 2022-05-20

1¡¢ÔÞ±ÈÑÇÒøÐÐÔâµ½ÀÕË÷ÍÅ»ïHiveµÄ¹¥»÷²¢¾Ü¾ø¸¶Êê½ð


¾ÝýÌå5ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÔÞ±ÈÑÇÒøÐÐÔâµ½ÁËHiveÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÒøÐÐÔÚÐÂΟåÖÐÅû¶£¬£¬£¬£¬£¬£¬£¬5ÔÂ9ÈÕÆä²¿·ÖITϵͳ±¬·¢ÁËÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬ÀýÈçBureau De Change¼à¿ØÏµÍ³ºÍÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔ´ÓÚÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ËäÈ»ÔÞ±ÈÑÇÒøÐÐûÓÐ͸¶¹¥»÷µÄϸ½Ú£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±»ñϤ¹¥»÷ÊÇÀ´×ÔHive£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÒѼÓÃÜÁËÒøÐеÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸¡£¡£¡£¡£¡£¡£¡£ÒøÐеÄÊÖÒÕ×ܼàÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÀֳɱ£»£»£»£»¤Á˽¹µãϵͳ£¬£¬£¬£¬£¬£¬£¬ÏÖʵÉϲ¢Ã»Óм¸¶àÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/


2¡¢ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)й¶180Íò¹«ÃñµÄÐÅÏ¢


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úµÂ¿ËÈøË¹Öݰü¹Ü²¿(TDI)¹ûÕæÁËÓйØ1Ô·ݷ¢Ã÷µÄÊý¾Ýй¶ÊÂÎñµÄ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚWebÓ¦ÓÃÖдæ±à³Ì´úÂë¹ýʧ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊܱ£»£»£»£»¤ÇøÓò¿ÉÒÔ±»»á¼û£¬£¬£¬£¬£¬£¬£¬Éæ¼°Áè¼Ý180Íò¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¾­ÓÉÊÓ²ìÈ·¶¨£¬£¬£¬£¬£¬£¬£¬ÔÚ2019Äê3ÔÂÖÁ2022Äê1ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬Ó빤ÈËÅâ³¥ÒªÇóÓйصÄÐÅÏ¢¿ÉÄܱ»ÍⲿְԱ»á¼û£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÓйØÎ£Ïպ͹¤ÉËÅâ³¥µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹´ËǰÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÒѾ­ÏòÊÜÓ°ÏìµÄÈË·¢ËÍ֪ͨ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/texas-data-breach-exposes-personal-information-of-1-8-million-people/


3¡¢ÐµÄSpace PiratesÍÅ»ïÕë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ


Positive TechnologiesÔÚ5ÔÂ17ÈÕÅû¶ÁËSpace PiratesÍÅ»ïÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2017Äê×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÔÚÈ¥ÄêÑ×ÌìÊ״α»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Í¨¹ý´¹ÂÚÓʼþÔÚ¶íÂÞ˹µÄº½¿Õº½ÌìÐÐÒµ×éÖ¯µÄϵͳÉÏ×°ÖÃÐÂÐͶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÎäÆ÷¿â°üÀ¨Òþ²ØÔÚÓÕ¶üÎļþºóµÄ×Ô½ç˵¼ÓÔØ³ÌÐò¡¢Òѱ£´æ¶àÄêÇÒÂÔ΢Ð޸ĵĺóÃÅ¡¢PlugXºÍ¶¨ÖƺóÃÅPcShare¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷»¹Ê¹ÓÃÁËShadowPad¡¢Zupdax¡¢PoisonIvyºÍReVBShell£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°3¸öеÄÄ£¿£¿£¿é»¯¶ñÒâÈí¼þ¹¤¾ßDeed RAT¡¢BH_A006ºÍMyKLoadClient¡£¡£¡£¡£¡£¡£¡£


https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/space-pirates-tools-and-connections/


4¡¢Î¢ÈíÔÚ½üÆÚ¼ì²âµ½LinuxľÂíXorDDoSµÄ»î¶¯¼¤Ôö254%


5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÔÚÒÑÍùµÄ6¸öÔÂÖУ¬£¬£¬£¬£¬£¬£¬¼ì²âµ½LinuxľÂíXorDDoSµÄ¹¥»÷»î¶¯¼¤ÔöÁË254%¡£¡£¡£¡£¡£¡£¡£XorDdosÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÆäÃû³ÆÔ´ÓÚÆäÕë¶ÔLinuxµÄ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÔÚͨѶÖÐʹÓûùÓÚXORµÄ¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁ˶àÖÖÈÆ¹ý»úÖÆºÍ¼á³Ö³¤ÆÚÐÔµÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÄÑÒÔ±»É¨³ý¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ½üÆÚµÄ»î¶¯ÖÐÊӲ쵽£¬£¬£¬£¬£¬£¬£¬Ëü»¹Í¨¹ýÓÿÕ×Ö½ÚÁýÕÖÃô¸ÐÎļþÀ´Òþ²Ø¶ñÒâ»î¶¯ÒÔ±ÜÃâ±»ÆÊÎö¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬³ýÁËÌᳫDDoS¹¥»÷Í⣬£¬£¬£¬£¬£¬£¬XorDDoS»¹±»ÓÃÀ´×°ÖÃÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÈçºóÃÅTsunami¡£¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/


5¡¢CISAºÍMS-ISACÐû²¼Ê¹ÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬CISAºÍ¶à¹úÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Á˹ØÓÚʹÓÃF5 BIG-IPÎó²î¹¥»÷µÄͨ¸æ¡£¡£¡£¡£¡£¡£¡£F5ÓÚ5ÔÂ4ÈÕÐû²¼ÁËÕë¶ÔÎó²îCVE-2022-1388µÄ²¹¶¡£¬£¬£¬£¬£¬£¬£¬½ñЧ¹ûÕæÁËPOCÎó²îʹÓ㬣¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îͨ¹ýÖÎÀí¶Ë¿Ú»ò×ÔIPµØµã»ñµÃÄ¿µÄϵͳµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹ûÕæ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£Ç徲ͨ¸æÌṩÁËÎó²îµÄÊÖÒÕϸ½Ú¡¢¼ì²âÒªÁì¡¢ÊÂÎñÏìÓ¦»ººÍ½â²½·¥£¬£¬£¬£¬£¬£¬£¬CISA ºÍ MS-ISACÇ¿ÁÒ½¨ÒéÓû§Ê¹ÓøÃÖ¸ÄÏ×ÊÖú×éÖ¯µÖÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/alerts/aa22-138a


6¡¢PRODAFTÐû²¼¹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ


PRODAFTÔÚ5ÔÂ16ÈÕÐû²¼Á˹ØÓÚWizard SpiderµÄÉî¶ÈÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËÆä×éÖ¯½á¹¹ºÍÄîÍ·¡£¡£¡£¡£¡£¡£¡£Wizard SpiderµÄ´ó²¿·ÖÄ¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØÊâµÄÆÆ½â¹¤¾ßÀ´ÈëÇָ߼ÛֵĿµÄ£¬£¬£¬£¬£¬£¬£¬²¢½«»ñµÃµÄ²¿·Ö×ʽðÓÃÓÚ¿ª·¢Ð¹¤¾ßºÍÈ˲ŵÄÏîÄ¿¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ¹¥»÷ʼÓÚQBotºÍSystemBCµÄ´¹Âڻ£¬£¬£¬£¬£¬£¬£¬ÓÐʱҲʹÓÃBEC¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ò»µ©Àֳɣ¬£¬£¬£¬£¬£¬£¬¾Í»á×°ÖÃCobalt Strike£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑé»ñÈ¡ÓòÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬£¬£¬×îºó×°ÖÃÀÕË÷Èí¼þConti¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»áʹÓÃVPNºÍÊðÀíÀ´Òþ²ØÆä×Ù¼££¬£¬£¬£¬£¬£¬£¬²¢Í¶×ÊÁËVoIPϵͳÓÃÀ´ÔÚ¹¥»÷ºóÏÅ»£Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ÆÈʹÆä¸¶¿î¡£¡£¡£¡£¡£¡£¡£


https://www.zdnet.com/article/wizard-spider-hacking-group-hires-cold-callers-to-scare-ransomware-victims-into-paying-up/