LanceflyʹÓúóÃÅMerdoor¹¥»÷ÄÏÑǺͶ«ÄÏÑǵÄ×éÖ¯

Ðû²¼Ê±¼ä 2023-05-17

1¡¢LanceflyʹÓúóÃÅMerdoor¹¥»÷ÄÏÑǺͶ«ÄÏÑǵÄ×éÖ¯


SymantecÔÚ5ÔÂ15ÈÕÅû¶ÁËAPT×éÖ¯LanceflyÕë¶ÔÄÏÑǺͶ«ÄÏÑǵÄÕþ¸®¡¢º½¿ÕºÍµçÐÅ×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£×Ô2018ÄêÒÔÀ´£¬£¬ £¬£¬ £¬£¬£¬£¬LanceflyÒ»Ö±ÔÚÕë¶ÔÐԵĹ¥»÷»î¶¯Öзַ¢Òþ²ØµÄ×Ô½ç˵ºóÃÅMerdoor£¬£¬ £¬£¬ £¬£¬£¬£¬ÒÔÔÚÄ¿µÄÍøÂçÉϽ¨É賤ÆÚÐÔ¡¢Ö´ÐÐÏÂÁîºÍ¼Í¼¼üÅÌ¡£¡£¡£¡£¡£¡£Ò»µ©½øÈëÄ¿µÄϵͳ£¬£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õ߾ͻáͨ¹ýDLL²àÔØ½«MerdoorºóÃÅ×¢ÈëÕýµ±Àú³Ìperfhost.exe»òsvchost.exe£¬£¬ £¬£¬ £¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷»î¶¯»¹Ê¹ÓÃÁ˸üа汾µÄZXShell rootkit¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor


2¡¢Check Point·¢Ã÷Camaro Dragon¹¥»÷Å·ÖÞÍâ½»×éÖ¯µÄ»î¶¯


5ÔÂ16ÈÕ£¬£¬ £¬£¬ £¬£¬£¬£¬Check Point³ÆÆä·¢Ã÷ÁËCamaro Dragonͨ¹ýѬȾסլTP-Link·ÓÉÆ÷£¬£¬ £¬£¬ £¬£¬£¬£¬À´¹¥»÷Å·ÖÞÍâ½»ÊÂÎñ×éÖ¯µÄ»î¶¯¡£¡£¡£¡£¡£¡£ÉÐδȷ¶¨¹¥»÷ÕßÔõÑùʹÓöñÒâ¹Ì¼þ¾µÏñѬȾTP-Link·ÓÉÆ÷£¬£¬ £¬£¬ £¬£¬£¬£¬µ«¿ÉÄÜÊÇͨ¹ýÎó²îʹÓûò±©Á¦ÆÆ½âÖÎÀíԱƾ֤¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷ÁËÁ½¸öľÂí»¯¹Ì¼þ¾µÏñÑù±¾£¬£¬ £¬£¬ £¬£¬£¬£¬ÓëÕýµ±°æ±¾¾ÙÐнÏÁ¿£¬£¬ £¬£¬ £¬£¬£¬£¬·¢Ã÷Äں˺ÍuBoot²¿·ÖÊÇÏàͬµÄ¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬ £¬£¬ £¬£¬£¬£¬¶ñÒâ¹Ì¼þʹÓÃÁËÒ»¸ö×Ô½ç˵µÄSquashFSÎļþϵͳ£¬£¬ £¬£¬ £¬£¬£¬£¬¸Ãϵͳ°üÀ¨ÌØÁíÍâ¶ñÒâÎļþ×é¼þ£¬£¬ £¬£¬ £¬£¬£¬£¬×÷ΪHorse ShellºóÃŵÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£


https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzing-custom-router-implant/


3¡¢º½¿Õ¹«Ë¾airBaltic½«²¿·ÖÂÿ͵ÄÔ¤¶©ÐÅÏ¢·¢Ë͸øÆäËûÈË


¾ÝýÌå5ÔÂ15ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬£¬£¬À­ÍÑάÑÇµÄÆì½¢º½¿Õ¹«Ë¾airBalticÒòÊÖÒÕ¹ýʧ£¬£¬ £¬£¬ £¬£¬£¬£¬½«²¿·ÖÂÿ͵ÄÔ¤¶©ÐÅÏ¢·¢Ë͸øÆäËûÂÿ͡£¡£¡£¡£¡£¡£5ÔÂ14ÈÕ£¬£¬ £¬£¬ £¬£¬£¬£¬¶àÃûairBalticÂÃ¿Í³ÆÆäÊÕµ½ÁË·¢¸øÆäËûÈ˵ĵç×ÓÓʼþ¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚºÍÓʼþµØµãµÈ¡£¡£¡£¡£¡£¡£airBaltic͸¶¸ÃÊÂÎñ²¢·ÇÓÉÍøÂç¹¥»÷ÒýÆð£¬£¬ £¬£¬ £¬£¬£¬£¬5ÔÂ12ÈÕ£¬£¬ £¬£¬ £¬£¬£¬£¬ÔÚairBalticµÄÓʼþ·Ö·¢ÏµÍ³Öмì²âµ½ÄÚ²¿ÊÖÒÕÎÊÌ⣬£¬ £¬£¬ £¬£¬£¬£¬Òò´ËÉÙÊýÂÿͣ¨Ô¼Õ¼0.009%µÄÔ¤¶©£©ÊÕµ½Á˹ýʧµÄÓʼþ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/airline-exposes-passenger-info-to-others-due-to-a-technical-error/


4¡¢CiscoÅû¶RA GroupÕë¶ÔÃÀ¹úºÍº«¹ú¹«Ë¾µÄ¹¥»÷»î¶¯


Cisco TalosÓÚ5ÔÂ15ÈÕÅû¶ÁËÐÂÀÕË÷ÍÅ»ïRA GroupµÄ¹¥»÷»î¶¯£¬£¬ £¬£¬ £¬£¬£¬£¬ÈëÇÖÁËÈý¸öÃÀ¹úµÄ×éÖ¯ºÍÒ»¸öº«¹úµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ´Ó4ÔÂ22ÈÕ×îÏÈ»îÔ¾£¬£¬ £¬£¬ £¬£¬£¬£¬Éæ¼°¶à¸ö±ÊÖ±ÐÐÒµ£¬£¬ £¬£¬ £¬£¬£¬£¬°üÀ¨ÖÆÒ©¡¢°ü¹Ü¡¢²Æ²úÖÎÀíºÍÖÆÔ칫˾¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËй¶µÄÀÕË÷Èí¼þBabukµÄÔ´´úÂë¡£¡£¡£¡£¡£¡£RA GroupµÄ¼ÓÃܳÌÐò½ÓÄɼäЪ¼ÓÃÜ£¬£¬ £¬£¬ £¬£¬£¬£¬¼ÓÃÜÊý¾Ýʱ£¬£¬ £¬£¬ £¬£¬£¬£¬»áʹÓÃcurve25519ºÍeSTREAM cipher hc-128Ëã·¨¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¸Â¶¸Ã»î¶¯Õý´¦ÓÚÔçÆÚ½×¶Î¡£¡£¡£¡£¡£¡£


https://blog.talosintelligence.com/ra-group-ransomware/


5¡¢Academy MortgageÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷


ýÌå5ÔÂ15ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬£¬£¬Academy MortgageÔâµ½ÁËÀÕË÷ÍÅ»ïBlackCatµÄ¹¥»÷¡£¡£¡£¡£¡£¡£ÔÚÔÞ³ÉÖ§¸¶3850ÍòÃÀÔªÒÔ½â¾öÁª°îÖ¸¿ØµÄ¼¸¸öԺ󣬣¬ £¬£¬ £¬£¬£¬£¬Academy MortgageÓÖÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£5ÔÂ14ÈÕ£¬£¬ £¬£¬ £¬£¬£¬£¬ÀÕË÷ÍŻォAcademy MortgageÌí¼Óµ½ÆäÍøÕ¾£¬£¬ £¬£¬ £¬£¬£¬£¬³ÆÆä»ñµÃÁËÉñÃØÊý¾Ý²¢×¼±¸Ðû²¼£¬£¬ £¬£¬ £¬£¬£¬£¬°üÀ¨¿Í»§/ÏàÖúͬ°éµÄÊý¾Ý¡¢Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢²ÆÎñºÍÉñÃØÊý¾ÝµÈ¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ìáµ½Á˸ù«Ë¾Ö®Ç°µÄƶÀ§£¬£¬ £¬£¬ £¬£¬£¬£¬³ÆË¼Á¿µ½¹ó¹«Ë¾ÔÚ2022Äê12ÔÂÃæÁÙµÄÖ¸¿Ø£¬£¬ £¬£¬ £¬£¬£¬£¬Êý¾Ýй¶¿ÉÄÜ»á¶Ô¹«Ë¾µÄÉùÓþºÍÐÅÓþÔì³Éɱ¾øÐÔÓ°Ïì¡£¡£¡£¡£¡£¡£BlackCatÌåÏָù«Ë¾¾Ü¾øÖ§¸¶ÈκÎÓöȡ£¡£¡£¡£¡£¡£


https://www.databreaches.net/only-months-after-dealing-with-one-problem-academy-mortgage-gets-hit-with-a-ransomware-attack/


6¡¢Group-IBÐû²¼¹ØÓÚÀÕË÷Èí¼þQilinµÄÊÖÒÕÆÊÎö±¨¸æ


5ÔÂ15ÈÕ£¬£¬ £¬£¬ £¬£¬£¬£¬Group-IBÐû²¼Á˹ØÓÚÀÕË÷Èí¼þQilinµÄRaaS³ÌÐòµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Qilin£¬£¬ £¬£¬ £¬£¬£¬£¬ÓÖÃûAgenda£¬£¬ £¬£¬ £¬£¬£¬£¬ÔÚ2022Äê8Ô±»·¢Ã÷£¬£¬ £¬£¬ £¬£¬£¬£¬Ò»Ö±Õë¶ÔÒªº¦ÐÐÒµµÄ¹«Ë¾£¬£¬ £¬£¬ £¬£¬£¬£¬Ê¹ÓÃRustºÍGoÓïÑÔ£¨Golang£©¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£3Ô£¬£¬ £¬£¬ £¬£¬£¬£¬Group-IB·¢Ã÷QilinÔÚRaaSģʽÏÂÔË×÷£¬£¬ £¬£¬ £¬£¬£¬£¬²¢ÎªÆäÁ¥Êô×éÖ¯ÌṩÖÎÀíÃæ°å£¬£¬ £¬£¬ £¬£¬£¬£¬·ÖΪargets¡¢Blogs¡¢Stuffers¡¢News¡¢PaymentsºÍFAQsµÈ²¿·Ö£¬£¬ £¬£¬ £¬£¬£¬£¬ÒÔ¸üÓÐÓõØÖÎÀí¹¥»÷¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬ £¬£¬£¬£¬ÕâЩÁ¥Êô×éÖ¯¿É´Óÿ±ÊÊê½ðÖÐ׬ȡ80%ÖÁ85%µÄÊÕÒæ¡£¡£¡£¡£¡£¡£


https://www.group-ib.com/blog/qilin-ransomware/