EmCareÔâºÚ¿ÍÈëÇÖ£»£»£»£»£»ÀÕË÷Èí¼þCryptoMixºÍInpivx£»£»£»£»£»¹¥»÷»î¶¯Aggah
Ðû²¼Ê±¼ä 2019-04-22
ƾ֤EmCare¹«Ë¾Ðû²¼µÄͨ¸æ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ2ÔÂ19ÈÕÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄÓÊÏäÕË»§Ôâµ½µÚÈý·½Î´ÊÚȨ»á¼û£¬£¬£¬£¬£¬Ô¼6ÍòÃûÔ±¹¤¡¢»¼Õß¼°³Ð°üÉ̵ÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÄêËêÒÔ¼°Ò»Ð©»¼ÕßµÄÁÙ´²ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£Ä³Ð©ÇéÐÎÏ£¬£¬£¬£¬£¬Ò²°üÀ¨Éç»áÇå¾²ºÅÂëºÍ¼ÝʻִÕÕºÅÂë¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ»¼ÕßÊýĿԼΪ3.1ÍòÈË¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÒÑΪÉç»áÇå¾²ºÅÂëºÍ¼ÝʻִÕÕºÅÂëй¶µÄ»¼ÕߺÍÔ±¹¤ÌṩÁËÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bloomberg.com/news/articles/2019-04-20/kkr-s-emcare-says-patient-employee-personal-data-was-accessed-jupwipt72.ÀÕË÷Èí¼þCryptoMixбäÌ壬£¬£¬£¬£¬Ö÷Ҫͨ¹ýÔ¶³Ì×ÀÃæÐ§ÀÍ·Ö·¢
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dll-cryptomix-ransomware-variant-installed-via-remote-desktop/3.ÐÂÀÕË÷Èí¼þInpivx£¬£¬£¬£¬£¬ÊÛ¼Û500ÃÀÔªºÍÌṩÏà¹Ø½Ì³Ì

ÐÂÀÕË÷Èí¼þInpivxÕýÔÚTorÍøÂçÉϳöÊÛ£¬£¬£¬£¬£¬ÊÛ¼ÛΪ500ÃÀÔª£¬£¬£¬£¬£¬ÌײÍÄÚ»¹°üÀ¨½âÃܹ¤¾ßºÍÏêϸµÄ½Ì³Ì¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÊÇÓÃC++±àдµÄ£¬£¬£¬£¬£¬Ö§³Ö´ÓWindows XPµ½Windows 10µÈWindows°æ±¾£¬£¬£¬£¬£¬ÆäÒDZí°åÔòʹÓÃPHP±àÂë¡£¡£¡£¡£¡£¡£¡£Inpivx²»ÌṩÍйÜЧÀÍ£¬£¬£¬£¬£¬µ«ËüÌṩÀÕË÷Èí¼þºÍÖÎÀíÃæ°åµÄÔ´´úÂ룬£¬£¬£¬£¬ÕâʹµÃ¹¥»÷Õß¿ÉÒÔºÜÈÝÒ׵ض¨ÖÆ×Ô¼ºµÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£Inpivx½øÒ»²½Íƶ¯ÁËÀÕË÷Èí¼þ¼´Ð§À͵Ŀ´·¨£¬£¬£¬£¬£¬Ê¹µÃûÓÐÊÖÒյ폷¨·Ö×Ó¿ÉÒÔÈÝÒ׽ṹ×Ô¼ºµÄ¶ñÒâÈí¼þºÍÒDZí°å¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/84273/breaking-news/inpivx-ransomware-service.html4.жñÒâ¹¥»÷»î¶¯Aggah£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢RevengeRAT
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/revengerat-distributed-via-bitly-blogspot-and-pastebin-c2-infrastructure/5.Ñо¿ÍŶÓÐû²¼Ocean Lotus¶ñÒâÈí¼þÃûÌÃµÄÆÊÎö±¨¸æ
Malwarebytes LabsÐû²¼Ocean LotusʹÓõķǵ䷶¶ñÒâÈí¼þÃûÌÃµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ocean LotusÓÖ³ÆAPT32£¬£¬£¬£¬£¬ÊÇÒ»¸öÓëÔ½ÄÏÓйص폷¨ÍŻ£¬£¬£¬£¬ÆäʹÓÃ×Ô½ç˵µÄ¶ñÒâÈí¼þÃûÌÃÒÔÌӱܾ²Ì¬¼ì²âºÍÆÊÎö¡£¡£¡£¡£¡£¡£¡£¸ÃÑù±¾°üÀ¨Á½¸öδ×ÅÃûÌõĿÉÖ´ÐÐÎļþ£¨.BLOBºÍ.CAB£©£¬£¬£¬£¬£¬ÎļþÃûÌÃÊÇ´ÓPEÃûÌÃת»»¶øÀ´£¬£¬£¬£¬£¬µ«ÎÊÌâÊÇÍêÈ«×Ô½ç˵µÄ£¬£¬£¬£¬£¬¼ÓÔØ·½·¨ÓëPEҲûÓÐÏàËÆÖ®´¦¡£¡£¡£¡£¡£¡£¡£BLOBºÍCABÎļþʹÓÃXOR¾ÙÐÐÄ£ºý´¦Öóͷ££¬£¬£¬£¬£¬²¢Í¨¹ýhp6000.dll¼ÓÔØ£¬£¬£¬£¬£¬¼ÓÔØº¯ÊýÔÚÖ´ÐÐDllMainʱ£¬£¬£¬£¬£¬»áÐÞ²¹DLLÖеÄmainÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2019/04/funky-malware-format-found-in-ocean-lotus-sample/6.б¨¸æ³ÆWipro¹¥»÷ÕßÕë¶ÔÁíÍâÆß¼Ò½â¾ö¼Æ»®¹©Ó¦ÉÌ
ƾ֤KrebsOnSecurityµÄ±¨¸æ£¬£¬£¬£¬£¬ÔÚ3Ô·ÝÕë¶ÔWiproÌᳫ¹¥»÷µÄ´¹ÂÚ¹¥»÷ÕßËÆºõÒ²Õë¶ÔÁíÍâÆß¼Ò½â¾ö¼Æ»®¹©Ó¦ÉÌÌᳫ¹¥»÷£¬£¬£¬£¬£¬°üÀ¨Avanade¡¢Capgemini¡¢Cognizant¡¢Infosys¡¢PCM¡¢RackspaceºÍSlalom¡£¡£¡£¡£¡£¡£¡£Avanade֤ʵ¸Ã¹«Ë¾µÄ34ÃûÔ±¹¤ÔÚ2Ô·ÝÔâµ½¹¥»÷£¬£¬£¬£¬£¬RackspaceºÍInfosysÐû²¼µÄÉùÃ÷Ôòδ֤ʵҲδ·ñ¶¨¸Ã¹«Ë¾ÊÇ·ñ³ÉΪĿµÄ£¬£¬£¬£¬£¬ÆäÓ๫˾²¢Î´¾ÙÐлØÓ¦¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.crn.com/news/security/wipro-hackers-also-went-after-seven-other-solution-provider-giants-report