BlackCat¹¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

Ðû²¼Ê±¼ä 2022-08-02
1¡¢BlackCat³ÆÒѹ¥»÷ÖÐÅ·µÄÄÜÔ´¹«Ë¾Creos Luxembourg SA

      

¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCatÉù³Æ¶ÔÉÏÖÜÖÐÅ·¹ú¼Ò×ÔÈ»Æø¹ÜµÀºÍµçÁ¦ÍøÂçÔËÓªÉÌCreos Luxembourg SAµÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£ ¡£CreosÊÇ5¸öÅ·ÓѰî¼ÒµÄÄÜÔ´¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬Æäĸ¹«Ë¾EncevoÓÚ7ÔÂ25ÈÕ͸¶£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ7ÔÂ22ÈÕÖÁ23ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£ ¡£¹¥»÷µ¼ÖÂEncevoºÍCreosµÄ¿Í»§ÃÅ»§ÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬µ«Ð§ÀͲ¢Î´ÖÐÖ¹¡£¡£¡£¡£ ¡£BlackCatÓÚÉÏÖÜÁù½«CreosÌí¼Óµ½ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÍþвҪ¹ûÕæ180000¸ö͵ȡµÄÎļþ£¬£¬£¬£¬£¬£¬×ܾÞϸΪ150GB£¬£¬£¬£¬£¬£¬Éæ¼°ÌõÔ¼¡¢Ð­Òé¡¢»¤ÕÕ¡¢Õ˵¥ºÍµç×ÓÓʼþµÈÄÚÈÝ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/


2¡¢Group-IB·¢Ã÷ÓÉÉÏÍò¸öÓò×é³ÉÕë¶ÔÅ·ÖÞµÄÐéαͶ×ÊȦÌ×

      

Group-IBÔÚ7ÔÂ29ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÓÉ11000¶à¸öÓò×é³ÉµÄÖØ´óÍøÂ磬£¬£¬£¬£¬£¬ÓÃÓÚÏòÅ·ÖÞµÄÓû§¾ÙÐÐÐéαͶ×ÊÕ©Æ­»î¶¯¡£¡£¡£¡£ ¡£ÕâЩƽ̨ʹÓÃαÔìµÄÖ¸»Ö¤¾ÝºÍÃûÈË´úÑÔ£¬£¬£¬£¬£¬£¬ÓªÔì³öÕýµ±µÄÐÎÏó²¢ÒýÓÕ¸ü¶àÄ¿µÄ¡£¡£¡£¡£ ¡£¸Ã¹¥»÷»î¶¯ÒÔ»ñµÃ¸ß»Ø±¨Í¶×ʵÄʱ»úΪÓÕ¶ü£¬£¬£¬£¬£¬£¬Ëµ·þÄ¿µÄ´æÈëÖÁÉÙ250Å·ÔªÀ´×¢²áЧÀÍ¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Áè¼Ý5000¸ö¶ñÒâÓòÈÔÈ»´¦Óڻ״̬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢±ÈÀûʱ¡¢µÂ¹ú¡¢ºÉÀ¼¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Å²Íþ¡¢ÈðµäºÍ½Ý¿Ë¹²ºÍ¹ú¡£¡£¡£¡£ ¡£


https://blog.group-ib.com/investment-scams-europe


3¡¢LockBit¿ÉʹÓÃWindows DefenderÀ´¼ÓÔØCobalt Strike

      

Sentinel LabsÔÚ7ÔÂ28ÈÕ͸¶£¬£¬£¬£¬£¬£¬LockBitʹÓÃMicrosoft DefenderµÄMpCmdRun.exeÀ´½âÃܲ¢×°ÖÃCobalt Strike¡£¡£¡£¡£ ¡£MpCmdRun.exeÊÇWindows DefenderµÄÏÂÁîÐй¤¾ß£¬£¬£¬£¬£¬£¬Ö´ÐÐʱ£¬£¬£¬£¬£¬£¬Ëü½«¼ÓÔØÃûΪmpclient.dllµÄÕýµ±DLL¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ª·¢ÁËÎäÆ÷»¯µÄmpclient.dll£¬£¬£¬£¬£¬£¬²¢½«Æä·ÅÔÚÓÅÏȼÓÔØ¶ñÒâDLLÎļþµÄλÖ㬣¬£¬£¬£¬£¬Ö´ÐеĴúÂë´Óc0000015.logÎļþ½âÃܲ¢¼ÓÔØCobalt Strike payload¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Éв»ÇåÎúLockBitΪºÎ´ÓʹÓÃVMwareÇл»µ½Ê¹ÓÃWindows DefenderÏÂÁîÐй¤¾ßÀ´¼ÓÔØCobalt Strike¡£¡£¡£¡£ ¡£


https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/


4¡¢Ñо¿ÍŶӷ¢Ã÷ͳ³ÆÎªDawDropperµÄ¶à¸ö¶ñÒâÈí¼þ·Ö·¢Ä¾Âí

      

Trend MicroÔÚ7ÔÂ29ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËÒ»Æð¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬Ê¹ÓÃGoogle PlayÊÐËÁÖеÄ17¸ö¿´ËÆÎÞº¦µÄAndroid dropper£¨Í³³ÆÎªDawDropper£©À´·Ö·¢ÒøÐÐľÂí¡£¡£¡£¡£ ¡£ÕâЩӦÓÃαװ³ÉÀýÈçÎĵµÉ¨Ã蹤¾ß¡¢VPNЧÀÍ¡¢¶þάÂëɨÃ蹤¾ßºÍͨ»°¼Í¼¹¤¾ßµÈ¡£¡£¡£¡£ ¡£DawDropperʹÓõÚÈý·½ÔÆÐ§ÀÍFirebaseʵʱÊý¾Ý¿âÀ´Èƹý¼ì²â²¢¶¯Ì¬»ñµÃpayloadµÄÏÂÔØµØµã£¬£¬£¬£¬£¬£¬Ëü»¹ÔÚGitHubÉÏÍйܶñÒâpayload¡£¡£¡£¡£ ¡£Æ¾Ö¤ÊӲ죬£¬£¬£¬£¬£¬DawDropperµÄ±äÌå¿ÉÒÔ·Ö·¢4ÖÖÀàÐ͵ÄÒøÐÐľÂí£¬£¬£¬£¬£¬£¬°üÀ¨Octo¡¢Hydra¡¢ErmacºÍTeaBot¡£¡£¡£¡£ ¡£


https://www.trendmicro.com/en_us/research/22/g/examining-new-dawdropper-banking-dropper-and-daas-on-the-dark-we.html


5¡¢ÃÀ¹úFCCÌáÐÑÖ¼ÔÚÇÔÊØÐÅÏ¢»ò½ðÈÚÕ©Æ­µÄÍøÂç¹¥»÷ÔöÌí

      

¾Ý8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îͨѶίԱ»á(FCC)ÌáÐÑ£¬£¬£¬£¬£¬£¬Ô½À´Ô½¶àµÄSMS´¹ÂڻÊÔͼÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿î×Ó¡£¡£¡£¡£ ¡£´ËÀ๥»÷Ò²³ÆÎªsmishing»òrobotsexts£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÖÖÖÖ·½·¨ÓÕʹĿµÄ½»³öÉñÃØÐÅÏ¢¡£¡£¡£¡£ ¡£FCC³Æ½üÄêÀ´¶ÔÀ¬»ø¶ÌÐŵÄͶËßÊýÄ¿ÎȲ½ÉÏÉý£¬£¬£¬£¬£¬£¬´Ó2019ÄêµÄÔ¼5700Æð¡¢2020ÄêµÄ14000Æð¡¢2021ÄêµÄ15300Æðµ½2022Äê6ÔÂ30ÈÕµÄ8500Æð¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬¾ÝһЩ×ÔÁ¦±¨¸æÔ¤¼Æ£¬£¬£¬£¬£¬£¬Ã¿ÔÂÓÐÊýÊ®ÒÚÌõrobotext£¬£¬£¬£¬£¬£¬ÈçRoboKillerÔ¤¼ÆÓû§ÔÚ6Ô·ÝÊÕµ½ÁËÁè¼Ý120ÒÚÌõrobotext¡£¡£¡£¡£ ¡£


https://securityaffairs.co/wordpress/133865/cyber-crime/fcc-warns-smishing-attacks.html


6¡¢KasperskyÐû²¼2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ 

      

7ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÇý¶¯Á¦Ö®Ò»£¬£¬£¬£¬£¬£¬¶ø¾­¼ÃÀûÒæÊÇAPT¹¥»÷±³ºóµÄÒ»Á¬ÄîÍ·Ö®Ò»¡£¡£¡£¡£ ¡£2021Äê·¢Ã÷ÁËÁ½¸öUEFIÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬±¾¼¾¶È·¢Ã÷ÁËÁíÒ»¸ö¶ñÒâUEFI×é¼þCosmicStrand¡£¡£¡£¡£ ¡£±¨¸æ»¹ÏÈÈÝÁËÕâÒ»¼¾¶ÈµÄAPT¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹UNC1151Õë¶ÔÅ·ÖÞÕþ¸®»ú¹¹·Ö·¢Ä¾ÂíSunseed£»£»£»£»£»£»£»Storm CloudÍÅ»ïʹÓÃGimmick¹¥»÷macOSÓû§£»£»£»£»£»£»£»TransparentTribe¶ÔÓ¡¶ÈÕþ¸®ÊÂÇéÖ°Ô±¾ÙÐÐÐÂÒ»ÂÖµÄÌØ¹¤¹¥»÷µÈ¡£¡£¡£¡£ ¡£


https://securelist.com/apt-trends-report-q2-2022/106995/