CoralRaider¶ñÒâÈí¼þ»î¶¯Ê¹ÓÃCDN»º´æÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò

Ðû²¼Ê±¼ä 2024-04-25
1. CoralRaider¶ñÒâÈí¼þ»î¶¯Ê¹ÓÃCDN»º´æÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò


4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Ò»ÖÖеÄÒ»Á¬¶ñÒâÈí¼þ»î¶¯ÕýÔÚ·Ö·¢ÈýÖÖ²î±ðµÄÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÀýÈçÍйÜÔÚÄÚÈݽ»¸¶ÍøÂç (CDN) »º´æÓòÉϵÄCryptBot¡¢LummaC2ºÍRhadamanthys ¡£¡£¡£Ë¼¿Æ Talos ½«´Ë´Î»î¶¯¹éÒòÓÚ±»×·×ÙΪCoralRaiderµÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÉËÆÔ´×ÔÔ½ÄÏ£¬£¬£¬£¬£¬£¬£¬ÓÚ½üÆÚÆØ¹â¡£¡£¡£¸Ã»î¶¯µÄÄ¿µÄº­¸Ç¸÷¸öµØÇøµÄ¸÷¸öÉÌÒµ±ÊÖ±ÁìÓò£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢ÄáÈÕÀûÑÇ¡¢°Í»ù˹̹¡¢¶ò¹Ï¶à¶û¡¢µÂ¹ú¡¢°£¼°¡¢Ó¢¹ú¡¢²¨À¼¡¢·ÆÂɱö¡¢Å²Íþ¡¢ÈÕ±¾¡¢ÐðÀûÑǺÍÍÁ¶úÆä¡£¡£¡£¹¥»÷Á´Éæ¼°Óû§Í¨¹ýÍøÂçä¯ÀÀÆ÷ÏÂÔØÎ±×°³ÉÓ°Ï·ÎļþµÄÎļþ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔöÌíÁË´ó¹æÄ£¹¥»÷µÄ¿ÉÄÜÐÔ¡£¡£¡£¸Ã»î¶¯ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃÁË CryptBot µÄ¸üа汾£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ðµķ´ÆÊÎöÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ»¹²¶»ñÃÜÂëÖÎÀíÆ÷Ó¦ÓóÌÐòÊý¾Ý¿âºÍÉí·ÝÑéÖ¤Æ÷Ó¦ÓóÌÐòÐÅÏ¢¡£¡£¡£


https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html


2. Change Healthcare×îÖÕÖ§¸¶Êê½ð½«ÃæÁÙÊý¾Ýй¶µÄΣº¦


4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÚÀÕË÷Èí¼þ±ÀÀ £¿£¿£¿£¿£×îÏÈÁ½¸ö¶àԺ󣬣¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þµÄÓ°Ïì¿°³ÆÍøÂçÇ徲ʷÉÏ×îÑÏÖØµÄÒ»´Î£¬£¬£¬£¬£¬£¬£¬Ò½Áƹ«Ë¾ Change Healthcare ÖÕÓÚ֤ʵÁËÍøÂç·¸·¨·Ö×Ó¡¢Çå¾²Ñо¿Ö°Ô±ºÍ±ÈÌØ±ÒÇø¿éÁ´ÒѾ­ËµµÃºÜÇåÎúµÄÊÂÇ飺Ëüȷʵ×öµ½ÁËÏòÖÙ´º·ÝÏ®»÷¸Ã¹«Ë¾µÄºÚ¿ÍÖ§¸¶Êê½ð¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ËüÈÔÈ»ÃæÁÙ×Åɥʧ´ó×Ú¿Í»§Ãô¸ÐÒ½ÁÆÊý¾ÝµÄΣº¦¡£¡£¡£Change Healthcare ËÆºõÒÑÓÚ 3 Ô 1 ÈÕÖ§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÒ»±Ê 350 ±ÈÌØ±Ò£¨Ô¼ºÏ 2200 ÍòÃÀÔª£©µÄÉúÒâ±»·¢Ë͵½Óë AlphV ºÚ¿ÍÏà¹ØµÄ¼ÓÃÜÇ®°üÖС£¡£¡£Õâ±ÊÉúÒâÊ×ÏÈÔÚÃûΪ RAMP µÄ¶íÂÞË¹ÍøÂç·¸·¨ÂÛ̳ÉϵÄÒ»ÌõÐÂÎÅÖлñµÃÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÆäÖÐһλ¾Ý³Æ±» AlphV ÑïÆúµÄÏàÖúͬ°éËß¿à˵£¬£¬£¬£¬£¬£¬£¬ËûÃÇûÓÐÊÕµ½ Change Healthcare ¸¶¿îÖеķֳÉ¡£¡£¡£


https://news.hitb.org/content/change-healthcare-finally-admits-it-paid-ransomware-hackers-and-still-faces-patient-data


3. Î÷°àÑÀÖØÐÂÆô¶¯¶Ô Pegasus ÌØ¹¤Èí¼þ°¸¼þµÄÊÓ²ì


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀ¹ú¼Ò·¨Ôº·¨¹ÙÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÓÐÀíÓÉÏàÐÅ·¨¹úÌṩµÄÐÂÐÅÏ¢¿ÉÒÔ¡°ÈÃÊÓ²ìÈ¡µÃÏ£Íû¡±¡£¡£¡£ÕâÁ½ÏîÊÓ²ì¾ùÉæ¼°ÉæÏÓʹÓÃÒÔÉ«ÁÐ NSO ¼¯ÍÅ¿ª·¢µÄ Pegasus ÌØ¹¤Èí¼þ¡£¡£¡£Ìع¤Èí¼þ»áÇÄÇĵØÉøÍ¸µ½ÊÖ»ú»òÆäËû×°±¸ÖÐÒÔÍøÂçÊý¾Ý²¢¿ÉÄܼàÊÓÆäËùÓÐÕß¡£¡£¡£NSO Éù³Æ£¬£¬£¬£¬£¬£¬£¬Ëü½öÌṩӦÕþ¸®ÓÃÓÚ¹¥»÷¿Ö²ÀÖ÷ÒåºÍÆäËûÇå¾²Íþв¡£¡£¡£Æ¾Ö¤Çå¾²Ñо¿Ö°Ô±ºÍ 2021 ÄêÈ«ÇòýÌåÊӲ죬£¬£¬£¬£¬£¬£¬Pegasus Òѱ»ÓÃÀ´¹¥»÷ 50 ¸ö¹ú¼ÒµÄ 1,000 ¶àÈË£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨»î¸ÐÈËÊ¿ºÍ¼ÇÕß¡£¡£¡£Î÷°àÑÀÓÚ 2022 Äê 5 ÔÂÐû²¼£¬£¬£¬£¬£¬£¬£¬Ô׺âÅåµÂÂÞ¡¤É£ÇÐ˹¼°ÆäÈýÃû²¿³¤£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹ú·À²¿³¤ºÍÄÚÕþ²¿³¤£¬£¬£¬£¬£¬£¬£¬ÒѳÉΪPegasus ÌØ¹¤Èí¼þµÄÄ¿µÄ¡£¡£¡£Óɴ˱¬·¢µÄ˾·¨ÊÓ²ìÒòδÄÜÈ¡µÃЧ¹û¶øÔÝʱÆú¾è¡£¡£¡£


https://www.securityweek.com/spain-reopens-a-probe-into-a-pegasus-spyware-case-after-a-french-request-to-work-together/


4. ºÚ¿ÍÐ®ÖÆ·À²¡¶¾¸üÐÂÒÔ·Ö·¢ºóÃźÍÍÚ¿óGuptiMiner


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍÒ»Ö±ÔÚʹÓà eScan ·À²¡¶¾Èí¼þµÄ¸üлúÖÆÔÚ´óÐÍÆóÒµÍøÂçÉÏÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý GuptiMiner ¶ñÒâÈí¼þÈö²¥¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£Ñо¿Ö°Ô±½« GuptiMiner ÐÎòΪ¸ß¶ÈÖØ´óµÄÍþв£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔÏò¹¥»÷ÕßµÄ DNS ЧÀÍÆ÷Ö´ÐÐ DNS ÇëÇ󣬣¬£¬£¬£¬£¬£¬´ÓͼÏñÖÐÌáÈ¡ÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬¶ÔÆäÓÐÓøºÔؾÙÐÐÊðÃû£¬£¬£¬£¬£¬£¬£¬²¢Ö´ÐÐ DLL ²àÃæ¼ÓÔØ¡£¡£¡£GuptiMiner ±³ºóµÄÍþвÐÐΪÕß¾ßÓÐÖÐÐĵÐÊÖ (AitM) µÄְ룬£¬£¬£¬£¬£¬£¬¿ÉÒÔÐ®ÖÆÕý³£µÄ²¡¶¾½ç˵¸üаü£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÌæ»»ÎªÃûΪ¡°updll62.dlz¡±µÄ¶ñÒâ°ü¡£¡£¡£¸Ã¶ñÒâÎļþ°üÀ¨ÐëÒªµÄ·À²¡¶¾¸üÐÂÒÔ¼°ÃûΪ¡°version.dll¡±µÄ DLL ÎļþÐÎʽµÄ GuptiMiner ¶ñÒâÈí¼þ¡£¡£¡£eScan ¸üгÌÐòÕý³£´¦Öóͷ£¸Ã°ü£¬£¬£¬£¬£¬£¬£¬½âѹ²¢Ö´ÐÐËü¡£¡£¡£Ôڴ˽׶Σ¬£¬£¬£¬£¬£¬£¬DLL ÓÉ eScan µÄÕýµ±¶þ½øÖÆÎļþÅÔ¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¸¶Óë¶ñÒâÈí¼þϵͳ¼¶È¨ÏÞ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-hijack-antivirus-updates-to-drop-guptiminer-malware/


5. Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Ãé×¼º«¹ú¹ú·À³Ð°üÉÌ


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬º«¹ú¹ú¼Ò¾¯Ô±ÌüÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬Ó볯ÏÊÓйصÄÍþвÐÐΪÕßÕýÒÔ¹ú·À¹¤ÒµÊµÌåΪĿµÄ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡¹ú·ÀÊÖÒÕÐÅÏ¢¡£¡£¡£¾Ýº«¹ú¹ú¼Ò¾¯Ô±Ìü±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ó볯ÏÊÓйØÁªµÄ APT ×éÖ¯Lazarus¡¢AndarielºÍKimsuky¹¥»÷Á˺«¹ú¶à¼Ò¹ú·ÀÏà¹ØµÄ¹«Ë¾¡£¡£¡£¾¯Ô±ÌüºÍ¹ú·À²É¹ºÍýÏëÖÎÀí¾Ö£¨DAPA£©¶ÔÄ¿µÄ×éÖ¯µÄÇéÐξÙÐÐÁËһϵÁÐÌØÊâ¼ì²é¡£¡£¡£ÁªºÏ¼ì²éÓÚ1ÔÂ15ÈÕÖÁ2ÔÂ16ÈÕ¾ÙÐУ¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì×é֯ʵÑéÁË·À»¤²½·¥¡£¡£¡£¾¯·½ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâЩϮ»÷ÊÇÒÔÖÜȫսÕùµÄÐÎʽ¾ÙÐеÄ£¬£¬£¬£¬£¬£¬£¬¶à¸ö APT ×éÖ¯¼ÓÈëÆäÖС£¡£¡£Õþ¸®×¨¼ÒÖÒÑÔ˵£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½ÓÄÉÁËÖØ´óµÄºÚ¿ÍÊÖÒÕ¡£¡£¡£º«¹ú¹ú¼Ò¾¯Ô±ÌüÌṩÁ˲î±ð APT ×é֯ʵÑéµÄ¶à´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£


https://securityaffairs.com/162193/apt/north-korea-south-korean-defense-contractors.html


6. ÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°¶à¼Ò»ú¹¹µÄϵͳÔâµ½ºÚ¿Í¹¥»÷


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ËÄÃûÒÁÀʺڿÍÔÚÂü¹þ¶ÙÁª°î·¨Ôº±»ÆðËߣ¬£¬£¬£¬£¬£¬£¬±»Ö¸¿ØÕë¶ÔÃÀ¹úÕþ¸®²¿·Ö¡¢¹ú·À³Ð°üÉ̺Í˽Ӫ¹«Ë¾¿ªÕ¹ÖØ´óµÄÍøÂçÌØ¹¤»î¶¯¡£¡£¡£ÏÖÔÚÈÔÔÚÌӵı»¸æ±»Ö¸¿ØÕë¶ÔÃÀ¹ú²ÆÎñ²¿ºÍ¹úÎñÔºÒÔ¼°Ê®¼¸¼ÒÄܹ»»ñÈ¡¹ú·ÀÏà¹ØÐÅÏ¢µÄÃÀ¹ú˽Ӫ¹«Ë¾µÄÒªº¦ÏµÍ³¾ÙÐй¥»÷¡£¡£¡£Ë¾·¨²¿Ö¸ÔðºÚ¿ÍʹÓÃÌØÁíÍâÉç»á¹¤³ÌÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ã°³äÅ®ÐÔÀ´»ñÈ¡Êܺ¦ÕßµÄÐÅÈΡ£¡£¡£Æ¾Ö¤Î´ÃÜ·âµÄÆðËßÊ飬£¬£¬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯µÄ¹¥»÷µÄÊܺ¦ÕßÖ÷ÒªÊǾ­ÓÉÔÊÐíµÄ¹ú·À³Ð°üÉÌ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹«Ë¾ÒÑ»ñµÃÃÀ¹ú¹ú·À²¿µÄÇå¾²ÔÊÐí£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ»á¼û¡¢ÎüÊպʹ洢ÉñÃØÐÅÏ¢¡£¡£¡£¸Ã×éÖ¯»¹±»Ö¸¿ØÕë¶ÔÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄ»á¼ÆÊ¦ÊÂÎñËùºÍÒ»¼Ò×ܲ¿Î»ÓÚŦԼµÄÂùݹ«Ë¾¡£¡£¡£ÔÚÆðËßÊéÆô·âµÄͬʱ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¹úÎñÔº»¹Ðû²¼ÐüÉÍ 1000 ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬½±ÀøÌṩÏßË÷×¥»ñËûÃÇ£¬£¬£¬£¬£¬£¬£¬²ÆÎñ²¿»¹¶ÔÉæ°¸Ð¡ÎÒ˽¼ÒʵÑéÁËÖÆ²Ã¡£¡£¡£


https://www.securityweek.com/10-million-bounty-on-iranian-hackers-for-cyber-attacks-on-us-gov-defense-contractors/