еÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

Ðû²¼Ê±¼ä 2022-12-28
1¡¢ÐµÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

      

¾Ý12ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐÂÐÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRisePro¡£¡£¡£¡£ ¡£ËüÓÚ2022Äê12ÔÂ13ÈÕÊ״α»¼ì²âµ½£¬£¬£¬£¬£¬ÕýÔÚͨ¹ýPrivateLoader°´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þÏÂÔØÐ§À;ÙÐзַ¢¡£¡£¡£¡£ ¡£RiseProÓÉC++¿ª·¢£¬£¬£¬£¬£¬Ëƺõ¾ßÓÐÓëVidarÀàËÆµÄ¹¦Ð§£¬£¬£¬£¬£¬Ö¼ÔÚ×ÊÖú¹¥»÷Õß´Ó±»Ñ¬È¾µÄ×°±¸ÖÐÇÔȡĿµÄµÄÐÅÓÿ¨¡¢ÃÜÂëºÍ¼ÓÃÜÇ®°ü¡£¡£¡£¡£ ¡£Flashpoint±¨¸æ³Æ£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾ­ÔÚ¶íÂÞ˹°µÍøÊг¡ÉϳöÊÛÊýÒÔǧ¼ÆµÄRiseProÈÕÖ¾£¨´Ó±»Ñ¬È¾×°±¸ÖÐÇÔÈ¡µÄÊý¾Ý°ü£©¡£¡£¡£¡£ ¡£ 


https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/


2¡¢RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ

      

¾ÝýÌå12ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ¡£¡£¡£¡£ ¡£ÍßŬ°¢Í¼ÔøÔÚ11Ô³õÐû²¼ËûÃÇÔâµ½ÁËÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÔÚ¿ìÒªÒ»¸öÔºóÈÔδÍêÈ«»Ö¸´¡£¡£¡£¡£ ¡£12ÔÂ24ÈÕ£¬£¬£¬£¬£¬RansomHouseÍŻォÍßŬ°¢Í¼Õþ¸®ÁÐÈëÁËËûÃǵÄÍøÕ¾£¬£¬£¬£¬£¬³ÆÒÑÓÚ10ÔÂ6ÈÕ¼ÓÃÜËûÃǵÄϵͳ£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË3.2 TBµÄÎļþ¡£¡£¡£¡£ ¡£Ðû²¼µÄÑù±¾ÖÐÎļþ¿´ÆðÀ´È·ÊµÓëÕþ¸®µÄÎļþÒ»Ö£¬£¬£¬£¬£¬ÆäÖв»°üÀ¨Ð¡ÎÒ˽¼Ò»òÃô¸ÐµÄÎļþ¡£¡£¡£¡£ ¡£ÏÖÔÚÉв»ÇåÎúÊê½ð½ð¶îÊǼ¸¶à£¬£¬£¬£¬£¬»òÊÇ·ñ¾ÙÐйý̸ÅС£¡£¡£¡£ ¡£


https://www.databreaches.net/vanuatu-ransomware-attack-claimed-by-ransomhouse/


3¡¢CrowdStrikeÅû¶GuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì

      

CrowdStrikeÔÚ12ÔÂ19ÈÕÅû¶ÁËGuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì¡£¡£¡£¡£ ¡£GuLoader£¨ÓÖÃûCloudEyE£©£¬£¬£¬£¬£¬ÊÇÒ»ÖÖVisual Basic Script(VBS)ÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬ÓÚ2019ÄêÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£ ¡£ËüʹÓöà̬shellcode¼ÓÔØ³ÌÐòÀ´Èƹý¹Å°åÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Îª¶ñÒâÈí¼þʹÓõÄÿ¸öAPIÓ³ÉäËùÓÐǶÈëʽDJB2¹þÏ£ÖµÀ´ÆÊÎöÆä»î¶¯¡£¡£¡£¡£ ¡£ÐµÄshellcode·´ÆÊÎöÊÖÒÕͨ¹ýɨÃèÕû¸öÀú³ÌÄÚ´æÀ´²éÕÒÓëÐéÄâ»ú(VM)Ïà¹ØµÄ×Ö·û´®£¬£¬£¬£¬£¬ÐµÄÈßÓà´úÂë×¢Èë»úÖÆÒâζ×Åͨ¹ýʹÓÃÄÚÁª»ã±àÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄÓû§Ä£Ê½hookÀ´È·±£´úÂëµÄÖ´ÐС£¡£¡£¡£ ¡£


https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/


4¡¢TrendMicro·¢Ã÷ʹÓùȸèPPC¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯

      

12ÔÂ23ÈÕ£¬£¬£¬£¬£¬Trend Micro͸¶Æä·¢Ã÷½©Ê¬ÍøÂçIcedIDµÄ·Ö·¢·½·¨±¬·¢ÁËÖØ´óת±ä¡£¡£¡£¡£ ¡£×Ô2022Äê12ÔÂÒÔÀ´£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ʹÓùȸèÿ´Îµã»÷¸¶·Ñ(PPC)¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯¡£¡£¡£¡£ ¡£IcedIDÔËÓªÍÅ»ïÐ®ÖÆÁËAdobe¡¢FortinetºÍDiscordµÈÆ·ÅÆºÍÓ¦ÓÃËùʹÓõÄÒªº¦´ÊÀ´ÏÔʾ¶ñÒâ¹ã¸æ¡£¡£¡£¡£ ¡£µ±Óû§ËÑË÷Òªº¦×Öʱ£¬£¬£¬£¬£¬Ö¸Ïò¶ñÒâÍøÕ¾µÄ¹ã¸æÏÔʾÔÚ×ÔÈ»ËÑË÷Ч¹ûÉÏ·½¡£¡£¡£¡£ ¡£Ôڴ˻ÖУ¬£¬£¬£¬£¬¼ÓÔØ³ÌÐòÊÇͨ¹ýMSIÎļþ·Ö·¢µÄ£¬£¬£¬£¬£¬Õâ¹ØÓÚIcedIDÀ´ËµÊDz»³£¼ûµÄ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄKeitaroÁ÷Á¿µ¼Ïòϵͳ(TDS)À´¹ýÂËÀ´×ÔÑо¿Ö°Ô±ºÍɳºÐµÄÁ÷Á¿¡£¡£¡£¡£ ¡£


https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html   


5¡¢Ö¥¼Ó¸çµÄÄÜÔ´¹«Ë¾Sargent & LundyÔâµ½ÀÕË÷¹¥»÷

      

ýÌå12ÔÂ27Èճƣ¬£¬£¬£¬£¬ÃÀ¹úCNN͸¶ºÚ¿ÍÔÚ½üÆÚµÄÀÕË÷¹¥»÷ÖÐÇÔÈ¡Á˶à¼ÒµçÁ¦¹«Ë¾µÄÊý¾Ý¡£¡£¡£¡£ ¡£´Ë´ÎÀÕË÷¹¥»÷Õë¶ÔµÄÊÇ×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄSargent & Lundy¹¤³Ì¹«Ë¾£¬£¬£¬£¬£¬¸Ã¹«Ë¾Éè¼ÆÁË900¶à¸ö·¢µçÕ¾ºÍÊýǧӢÀïµÄµçÁ¦ÏµÍ³£¬£¬£¬£¬£¬²¢³ÖÓÐÕâЩÏîÄ¿µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£ ¡£¾ÝÆäÍøÕ¾³Æ£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹´¦Öóͷ£ºËÇå¾²ÎÊÌâ¡£¡£¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬£¬¸ÃÊÂÎñÒÑ»ñµÃ¿ØÖƺ͵÷½â£¬£¬£¬£¬£¬Ëƺõ²¢Î´¶ÔÆäËüµçÁ¦ÐÐÒµµÄ¹«Ë¾Ôì³ÉÓ°Ï죬£¬£¬£¬£¬Ò²Ã»ÓÐÊý¾Ý±»Ðû²¼µ½°µÍøÉÏ¡£¡£¡£¡£ ¡£


https://www.databreaches.net/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/


6¡¢KasperskyÐû²¼Õë¶Ô°¢¶û°ÍÄáÑǵÄÁ½ÂÖ¹¥»÷µÄÆÊÎö±¨¸æ

      

KasperskyÔÚ12ÔÂ22ÈÕÐû²¼ÁËÕë¶Ô°¢¶û°ÍÄáÑÇ×éÖ¯µÄÁ½ÂÖ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¸Ã±¨¸æÖ÷Òª½ÏÁ¿ÁËÕâÁ½ÂÖ¹¥»÷»î¶¯ËùʹÓõÄÀÕË÷Èí¼þºÍ²Á³ý¶ñÒâÈí¼þÖ®¼äµÄÇø±ð¡£¡£¡£¡£ ¡£¹ØÓÚÀÕË÷Èí¼þ£¬£¬£¬£¬£¬Á½ÂÖ¹¥»÷»î¶¯µÄÑù±¾¾ßÓÐÏàͬµÄÊðÃûÖ¤Êé²ÎÊý£¬£¬£¬£¬£¬Óë¿ÆÍþÌØµçÐŹ«Ë¾ÓйØ¡£¡£¡£¡£ ¡£¹¥»÷Õß¶ÔµÚ¶þÂÖʹÓõIJÁ³ý¶ñÒâÈí¼þ¾ÙÐÐÁ˶à´ÎÐ޸쬣¬£¬£¬£¬¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²â£¬£¬£¬£¬£¬Ö÷Ҫת±äÊÇʹÓÃNvidiaÖ¤Êé¶Ô¶ñÒâÈí¼þÊðÃû¡¢ÔÚ¶ñÒâÈí¼þÖÐǶÈëEldoS RawDiskÇý¶¯³ÌÐò£¬£¬£¬£¬£¬ÒÔ¼°ÔÚÇý¶¯³ÌÐò×°ÖúóÁ¬Ã¦Æô¶¯É¾³ýÀý³Ì¡£¡£¡£¡£ ¡£


https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/