LockBit³ÆÒÑÇÔÈ¡×Éѯ¹«Ë¾Kearney & CompanyÊý¾Ý
Ðû²¼Ê±¼ä 2022-11-08¾Ý11ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÒÑÇÔÈ¡×ÉѯºÍITЧÀÍÌṩÉÌKearney & CompanyµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£LockBitÓÚ11ÔÂ5ÈÕ½«¸Ã¹«Ë¾Ìí¼Óµ½±»¹¥»÷Ãûµ¥ÖУ¬£¬£¬£¬£¬£¬²¢ÍþвÈôÊDz»¸¶Êê½ð£¬£¬£¬£¬£¬£¬ËûÃǽ«ÔÚ2022Äê11ÔÂ26ÈÕ֮ǰÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïÒѾ¹ûÕæÁËÒ»·Ý±»µÁÊý¾ÝµÄÑù±¾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨²ÆÎñÎļþ¡¢ÌõÔ¼¡¢É󼯱¨¸æºÍÕ˵¥ÎļþµÈ¡£¡£¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïÒªÇóÖ§¸¶200ÍòÃÀÔªÒÔÏú»ÙÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÒªÇó1ÍòÃÀÔª½«¼ÆÊ±ÑÓÉì24Сʱ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html
2¡¢Çå¾²¹¤¾ßurlscan.io»áÎÞÒâÖÐй¶Ãô¸ÐµÄURLºÍÊý¾Ý
¾ÝýÌå11ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Positive Security·¢Ã÷ÍøÕ¾É¨ÃèºÍÆÊÎöÒýÇæurlscan.io¿Éй¶Ãô¸ÐµÄURLºÍÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Urlscan.io±»ÐÎòΪWebɳÏ䣬£¬£¬£¬£¬£¬Í¨¹ýÆäAPI¼¯³Éµ½¶à¸öÇå¾²½â¾ö¼Æ»®ÖС£¡£¡£¡£¡£¡£¡£¼øÓÚ´ËAPIµÄ¼¯³ÉÀàÐÍÒÔ¼°Êý¾Ý¿âÖеÄÊý¾ÝÁ¿£¬£¬£¬£¬£¬£¬Óдó×ÚµÄÊý¾Ý¿É±»ÄäÃûÓû§ËÑË÷ºÍ¼ìË÷¡£¡£¡£¡£¡£¡£¡£2Ô·ݵijõ³ÌÐò²é·¢Ã÷ÁËÊôÓÚÆ»¹ûÓòÃûµÄurl£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ»¹°üÀ¨¹²ÏíµÄiCloudÎļþºÍÈÕÀúÔ¼Çë»Ø¸´Á´½Ó¡£¡£¡£¡£¡£¡£¡£×îÖ÷ÒªµÄÊÇ£¬£¬£¬£¬£¬£¬ÆÊÎö»¹·¢Ã÷ÉèÖùýʧµÄÇå¾²¹¤¾ß»á½«Í¨¹ýÓʼþÊÕµ½µÄËùÓÐÁ´½Ó×÷Ϊ¹«¹²É¨ÃèÌá½»¸øurlscan.io¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/11/experts-find-urlscan-security-scanner.html
3¡¢Avanan·¢Ã÷ʹÓÃMicrosoft Dynamics 365µÄ´¹Âڻ
AvananÔÚ11ÔÂ3ÈÕÅû¶ÁËÀÄÓÃMicrosoft Dynamics 365 Customer VoiceµÄ´¹Âڻ¡£¡£¡£¡£¡£¡£¡£¸Ã²úÆ·ÔÊÐí×éÖ¯»ñµÃ¿Í»§µÄ·´À¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬ËüÖ÷ÒªÓÃÓÚ¾ÙÐпͻ§Öª×ã¶ÈÊӲ졣¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×ÔDynamics 365ÖеÄÊӲ칦Ч£¬£¬£¬£¬£¬£¬·¢¼þÈ˵ĵصã°üÀ¨¡°Forms Pro¡±£¬£¬£¬£¬£¬£¬ÕâÊÇÊӲ칦ЧµÄ¾É³Æ¡£¡£¡£¡£¡£¡£¡£¸ÃÐÂÎÅ֪ͨÊÕ¼þÈËÊÕµ½ÁËеÄÓïÒôÓʼþ£¬£¬£¬£¬£¬£¬µã»÷²¥·ÅÓïÒôÓʼþºó£¬£¬£¬£¬£¬£¬»á±»Öض¨Ïòµ½¿Ë¡MicrosoftµÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Í¨¹ýʹÓÃCustomer VoiceÁ´½Ó£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÇå¾²²½·¥¡£¡£¡£¡£¡£¡£¡£
https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links
4¡¢Ñо¿ÍŶÓÅû¶Crimson KingsnakeÍÅ»ïµÄBEC¹¥»÷»î¶¯
¾ÝAbnormal Security 11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÐµÄCrimson KingsnakeÍÅ»ïÔÚBEC¹¥»÷ÖÐð³ä״ʦÊÂÎñËù¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê3ÔÂÊ״η¢Ã÷ÁËCrimson KingsnakeµÄ»î¶¯£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒÑÈ·¶¨ÁË92¸öÏà¹ØÓò£¬£¬£¬£¬£¬£¬ÕâЩÓò¶¼Ä£ÄâÁËÕæÕýµÄ״ʦÊÂÎñËùÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßð³ä״ʦ·¢ËÍÓâÆÚ¸¶¿îµÄ·¢Æ±£¬£¬£¬£¬£¬£¬ÓÕÆÄ¿µÄÔ±¹¤¿ìËÙÖ§¸¶ÐéαµÄ·¢Æ±¡£¡£¡£¡£¡£¡£¡£µ±¹¥»÷ÕߵĻÓöµ½×èÁ¦Ê±£¬£¬£¬£¬£¬£¬ËûÃÇ»¹»áµ÷½âÕ½ÂÔÀ´Ã°³äµÚ¶þ¸ö½ÇÉ«£ºÄ¿µÄ¹«Ë¾µÄ¸ß¹Ü£¬£¬£¬£¬£¬£¬À´ÓÕʹԱ¹¤¼ÌÐø¸¶¿î¡£¡£¡£¡£¡£¡£¡£
https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks
5¡¢Å·ÖÞÍøÂçÇå¾²»ú¹¹ENISAÐû²¼2022ÄêÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ
Å·ÖÞÍøÂçÇå¾²»ú¹¹ENISAÔÚ11ÔÂ3ÈÕÐû²¼ÁËÆä2022ÄêENISAÍþÐ²Ì¬ÊÆ(ETL)±¨¸æ¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÄê¶È±¨¸æµÄµÚ10°æ£¬£¬£¬£¬£¬£¬ÆÊÎöÁË2021Äê7ÔÂÖÁ2022Äê7ÔÂʱ´ú±¬·¢µÄÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÈ«Çò×éÖ¯ÃæÁÙµÄ×îΣÏÕµÄÍþв֮һ£¬£¬£¬£¬£¬£¬Ã¿ÔÂÓÐÁè¼Ý10 TBµÄÊý¾Ý±»µÁ£¬£¬£¬£¬£¬£¬60%µÄÊÜÓ°Ïì×éÖ¯¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£2021ÄêÊӲ쵽66¸öÁãÈÕÎó²îÅû¶¡£¡£¡£¡£¡£¡£¡£ÍøÂç´¹ÂÚÈÔÈ»ÊÇÒ»ÖÖÊ¢ÐеÄÊÖÒÕ£¬£¬£¬£¬£¬£¬ÏÖÔÚ·ºÆðÁËеĴ¹ÂÚ¹¥»÷ÐÎʽ£¬£¬£¬£¬£¬£¬Èçspear-phishing¡¢whaling¡¢smishingºÍvishing¡£¡£¡£¡£¡£¡£¡£µÚÈý·½Çå¾²ÊÂÎñÕ¼2021ÄêÈëÇÖÊÂÎñµÄ17%£¬£¬£¬£¬£¬£¬¶ø2020ÄêÊDz»µ½1%¡£¡£¡£¡£¡£¡£¡£
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022
6¡¢BlackBerryÐû²¼¹ØÓÚRomCom RAT·Ö·¢»î¶¯µÄÆÊÎö±¨¸æ
11ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬BlackBerryÏêÊöÁËRomCom RATÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ˡÁËSolarWinds Network Performance Monitor (NPM)¡¢KeePassÃÜÂëÖÎÀíÆ÷ºÍPDF Reader ProµÄ¹Ù·½ÏÂÔØÃÅ»§ÍøÕ¾£¬£¬£¬£¬£¬£¬½«¶ñÒâÈí¼þαװ³ÉÕýµ±³ÌÐò¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇÔÚÆÊÎöÓëÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ¹¥»÷µ¼ÖµÄRomComRATѬȾÏà¹ØµÄ¹¤¼þʱ·¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Unit 42»¹·¢Ã÷ÁËÒ»¸öð³äVeeam Backup and RecoveryÈí¼þµÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£
https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass