ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷ Êýǧ̨װ±¸±»¼ÓÃÜ
Ðû²¼Ê±¼ä 2021-12-28ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷£¬£¬£¬Êýǧ̨װ±¸±»¼ÓÃÜ
¾ÝýÌåÓÚ12ÔÂ27Èճƣ¬£¬£¬Shutterfly¹«Ë¾Ôâµ½ÁËContiÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÁ½ÖÜǰ£¬£¬£¬µ¼ÖÂShutterflyÆìϵÄLifetouch¡¢BorrowLenesesºÍGroovebookЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ContiÉù³ÆÒѼÓÃܸù«Ë¾µÄ4000¶ą̀װ±¸ºÍ120̨VMware ESXiЧÀÍÆ÷¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬¹¥»÷ÕßÒªÇóÖ§¸¶Êý°ÙÍòÃÀÔªµÄÊê½ð£¬£¬£¬²¢ÒÑÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢£¬£¬£¬°üÀ¨Ö´·¨ÐÒé¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢¹«Ë¾µÇ¼ƾ֤ÒÔ¼°ShutterflyÊÐËÁµÄÔ´ÂëµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shutterfly-services-disrupted-by-conti-ransomware-attack/
Cyble·¢Ã÷еÄsincronizadorÕë¶Ô°ÍÎ÷Ita¨² Unibanco
12ÔÂ23ÈÕ£¬£¬£¬CybleÐû²¼Á˹ØÓÚÐÂAndroidÒøÐÐľÂísincronizadorµÄÑо¿±¨¸æ¡£¡£¡£¡£¡£¹¥»÷Õßð³äÓë°ÍÎ÷ÒøÐÐIta¨² UnibancoÏà¹ØµÄÕýµ±Ó¦Ó㬣¬£¬ÒÔsincronizador.apkΪÃûÍйÜÔÚÒ»¸öαÔìµÄGoogle PlayÊÐËÁÉÏ£¬£¬£¬²¢ÏÔʾÏÂÔØÁ¿Áè¼Ý189Íò´Î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬¸Ã¶ñÒâÓ¦ÓûáʵÑé¸Ä¶¯Óû§µÄÊäÈë×ֶΣ¬£¬£¬²¢ÔÚÕýµ±µÄIta¨² UnibancoÓ¦ÓÃÉϾÙÐÐÚ²ÆÉúÒâ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.cyble.com/2021/12/23/malicious-app-targets-major-brazilian-bank-itau-unibanco/
Ñо¿ÍŶӷ¢Ã÷ÒÔOmicronΪÖ÷ÌâµÄ´¹Âڻ·Ö·¢Dridex
¾ÝýÌåÔÚ12ÔÂ24ÈÕ±¨µÀ£¬£¬£¬MalwareHunterTeamºÍ604Kuzushi·¢Ã÷д¹ÂڻÒÔOmicronΪÖ÷Ìâ·Ö·¢Dridex¡£¡£¡£¡£¡£¹¥»÷Éù³ÆÊÕ¼þÈ˽Ӵ¥µÄÒ»¸öͬÊÂCOVID-19 OMICRON¼ì²â³ÊÑôÐÔ£¬£¬£¬ÐèÒª·¿ª¸½¼þµÄExcel±í¸ñÉó²éÏêÇé¡£¡£¡£¡£¡£µ±Ä¿µÄÆôÓúêÇÒÆä×°±¸±»Ñ¬È¾ºó£¬£¬£¬»áÓÐÒ»¸öµ¯´°ÌáÐÑCOVID-19ÔáÀñÔ®ÖúÈÈÏߵ绰ºÅÂëÀ´¼¥Ð¦Óû§¡£¡£¡£¡£¡£ÔçÔÚÒ»ÖÜǰ£¬£¬£¬ÔøÓÐÒÔ¿ª³ýÐÅϢΪÖ÷ÌâµÄ´¹Âڻ·Ö·¢Dridex¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/125976/cyber-crime/dridex-covid-19-omicron-campaign.html
SophosLabsÅû¶AvosLockerÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú
12ÔÂ22ÈÕ£¬£¬£¬SophosLabsÐû²¼Á˹ØÓÚAvosLockerµÄ×îÐÂÑо¿¡£¡£¡£¡£¡£AvosLockerÊ×ÏÈ»áʹÓÃÕýµ±µÄ×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ßPDQ Deploy½«¶à¸öWindowsÅú´¦Öóͷ£¾ç±¾×°Öõ½Ä¿µÄ×°±¸ÉÏ£¬£¬£¬ÕâЩ¾ç±¾¿É¸Ä¶¯»òɾ³ýÌØ¶¨Çå¾²¹¤¾ßµÄ×¢²á±íÏ£¬£¬²¢½¨ÉèÒ»¸öÃûΪnewadminµÄÖÎÀíÔ±ÕË»§£¬£¬£¬È»ºó×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õß»¹½«×°±¸½«»úеÉèΪÇ徲ģʽ£¬£¬£¬À´½ûÓÃÕýÔÚÔËÐеÄÇå¾²¹¤¾ß¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2021/12/22/avos-locker-remotely-accesses-boxes-even-running-in-safe-mode/
ÎïÁ÷¹«Ë¾DW Morgan´æ´¢Í°ÉèÖùýʧй¶100GBµÄÊý¾Ý
ýÌå12ÔÂ27ÈÕ±¨µÀ£¬£¬£¬Website Planet͸¶ÎïÁ÷¹«Ë¾DW Morganй¶Áè¼Ý100 GBµÄÊý¾Ý¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñÊÇÓÉAmazon S3´æ´¢Í°ÉèÖùýʧµ¼Ö£¬£¬£¬ÓÚ11ÔÂ12ÈÕ±»·¢Ã÷£¬£¬£¬¹²°üÀ¨Áè¼Ý250Íò¸öÓë»õÔ˺Ϳͻ§Ïà¹ØµÄÎļþ£¬£¬£¬Éæ¼°°®Á¢ÐźÍ˼¿ÆµÈ¶à¸ö¹«Ë¾¡£¡£¡£¡£¡£DW MorganÔÚÊÕµ½Ð¹Â¶¾¯±¨ºóµÄ4ÌìÄÚ½«Êý¾Ý¿â±£»£»£»£»£»£»¤ÆðÀ´£¬£¬£¬ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âÊÇ·ñ±»»á¼û¹ý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/logistics-giant-d-w-morgan-exposed-clients-data/
Intel 471Ðû²¼2021ÄêQ3ÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ
12ÔÂ16ÈÕ£¬£¬£¬Intel 471Ðû²¼ÁË2021ÄêµÚÈý¼¾¶ÈÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬2021Äê7Ôµ½9Ô£¬£¬£¬¹²¼ì²âµ½612´ÎÀÕË÷¹¥»÷»î¶¯£¬£¬£¬¿É¹éÒòÓÚ35¸ö²î±ðµÄÀÕË÷Èí¼þ±äÌå¡£¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ÖУ¬£¬£¬Ô¼60%µÄ»î¶¯Óë4¸ö±äÌåÓйأºLockBit 2.0£¨Õ¼±È33%£©¡¢Conti£¨15.2%£©¡¢BlackMatter£¨6.9%£©ºÍHive£¨6%£©¡£¡£¡£¡£¡£ÕâÒ»¼¾¶È£¬£¬£¬ÊÜÓ°Ïì×î´óµÄÐÐÒµÊÇÖÆÔì¡¢ÏûºÄÆ·ºÍ¹¤Òµ²úÆ·¡¢×¨ÒµÐ§ÀͺÍ×ÉѯÒÔ¼°·¿µØ²úÐÐÒµ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://intel471.com/blog/ransomware-attacks-2021-lockbit-hive-conti-clop-revil-blackmatter