INC RANSOM ´ÓËÕ¸ñÀ¼ NHS ÖÐÇÔÈ¡ 3TB µÄÊý¾Ý
Ðû²¼Ê±¼ä 2024-03-293ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬INC ÀÕË÷ÀÕË÷ÍŻォËÕ¸ñÀ¼¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ (NHS) Ìí¼Óµ½Æä Tor Ð¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¡£¡£¡£¡£¸ÃÍøÂç·¸·¨×éÖ¯Éù³ÆÇÔÈ¡ÁË 3 TB µÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÍþвҪй¶ÕâЩÊý¾Ý¡£¡£¡£¡£¡£ËÕ¸ñÀ¼µÄ NHS£¨¼´¹úÃñÒ½ÁÆÐ§ÀÍϵͳ£©ÊÇΪËÕ¸ñÀ¼Ð§À͵Ĺ«¹²×ÊÖúµÄÒ½ÁƱ£½¡ÏµÍ³¡£¡£¡£¡£¡£ËüÌṩÆÕ±éµÄÒ½ÁƱ£½¡Ð§ÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨Ò½Ôº¡¢È«¿ÆÒ½Éú (GP)¡¢ÐÄÀí¿µ½¡Ð§ÀͺÍÉçÇøÒ½ÁƱ£½¡¡£¡£¡£¡£¡£ËÕ¸ñÀ¼Õþ¸®ÈÏÕæ¼àÊÓËÕ¸ñÀ¼µÄ NHS£¬£¬£¬£¬£¬£¬ÆäÔË×÷ÓëÓ¢¸ñÀ¼¡¢Íþ¶ûÊ¿ºÍ±±°®¶ûÀ¼µÄ NHS ϵͳÍÑÀë¡£¡£¡£¡£¡£NHSScotland ÏÖÔÚÓµÓÐÔ¼ 140000 ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬ÂþÑÜÔÚ 14 ¸öµØÇø NHS ίԱ»á¡¢7 ¸ö NHS ÌØÊâίԱ»áºÍ 1 ¸ö¹«¹²ÎÀÉúÆø¹¹¡£¡£¡£¡£¡£Ã¿¸ö NHS ίԱ»á¶¼¶ÔËÕ¸ñÀ¼²¿³¤ÈÏÕæ£¬£¬£¬£¬£¬£¬²¢»ñµÃËÕ¸ñÀ¼Õþ¸®ÎÀÉúºÍÉç»á±£½¡ÀíÊ»áµÄÖ§³Ö¡£¡£¡£¡£¡£µØÇø NHS ίԱ»áÈÏÕæ±£»£»£»£»¤ºÍ¸ÄÉÆÆäÈËÃñµÄ¿µ½¡²¢ÌṩһÏßÒ½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£ÌØÊâ NHS ίԱ»áͨ¹ýÌṩһϵÁÐÖ÷ÒªµÄר¼ÒºÍ¹ú¼ÒЧÀÍÀ´Ö§³ÖµØÇø NHS ίԱ»á¡£¡£¡£¡£¡£
https://securityaffairs.com/161143/data-breach/inc-ransom-hacked-national-health-service-of-scotland.html
2. Stork ¼à¿Ø¹¤¾ßÖеÄÎó²î¿ÉÄܵ¼ÖÂЧÀÍÆ÷±»Ð®ÖÆ
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±ÔÚ Stork Öз¢Ã÷ÁËÒ»¸öÑÏÖØÎó²î(CVE-2024-28872)£¬£¬£¬£¬£¬£¬Stork ÊÇ Kea DHCP ЧÀÍÆ÷µÄÊ¢ÐпªÔ´ÍøÂç¼à¿Ø¹¤¾ß¡£¡£¡£¡£¡£Õâ¸öȱÏÝ¿ÉÄܵ¼Ö¹¥»÷Õß¿ÉÄÜ»áÐ®ÖÆ Stork ЧÀÍÆ÷¡¢ÆÆËðÃô¸ÐÊý¾Ý²¢ÆÆËð»ù±¾ÍøÂçЧÀÍ¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ Stork ÑéÖ¤ TLS Ö¤ÊéµÄ·½·¨ÖС£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý´Ó Stork ЧÀÍÆ÷»ñÈ¡ÓÐÓÃµÄ TLS Ö¤Ê鲢ʹÓÃËüÅþÁ¬µ½ Stork ÊðÀí£¨ÓëÊÜ¼à¿ØÐ§ÀÍÒ»ÆðÔËÐеÄÈí¼þ£©À´Ê¹ÓôËȱÏÝ¡£¡£¡£¡£¡£Ò»µ©½¨ÉèÅþÁ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߾ͿÉÒÔÏòÊÜ¼à¿ØµÄЧÀÍ£¨ÀýÈç Kea »ò BIND 9£©·¢Ë;ßÓÐÌáÉýȨÏ޵ĶñÒâÏÂÁî¡£¡£¡£¡£¡£¾¡¿ì½« Stork ¸üе½×îеÄÐÞ²¹°æ±¾£¨1.15.1 »ò¸ü¸ß°æ±¾£©¡£¡£¡£¡£¡£
https://securityonline.info/cve-2024-28872-vulnerability-in-stork-monitoring-tool-could-enable-server-takeover/
3. WarzoneRAT ¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬°²ÅÅÖØ´óµÄ¶à½×¶Î¹¥»÷
3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ WarzoneRAT£¨Ò²³ÆÎª Avemaria£©ÔÚ 2 ÔÂ·Ý FBI ¿ÛѺÆä»ù´¡ÉèÊ©µ¼Ö¶ÌÔÝÖÐÖ¹ºó¾íÍÁÖØÀ´¡£¡£¡£¡£¡£Æ¾Ö¤Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒµÄÒ»·Ýб¨¸æ(CRIL)£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÏÖÔÚÕýÔÚÉñÃØ¡¢¶à½×¶Î¹¥»÷ÖÐÆð¾¢°²ÅÅÕâÖÖÔöÇ¿ÐÍ RAT¡£¡£¡£¡£¡£×îÐ嵀 WarzoneRAT»î¶¯Ö÷Ҫͨ¹ýÒÔ˰ÊÕΪÖ÷ÌâµÄÀ¬»øÓʼþÀ´Õë¶ÔÊܺ¦Õߣ¬£¬£¬£¬£¬£¬ÇÉÃîµØÊ¹ÓÃʵʱÇÒ¾³£ÒýÆð½¹ÂǵÄÖ÷ÌâÀ´ÔöÌíÓû§·¿ª¶ñÒ⸽¼þµÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£WarzoneRAT µÄ¾íÍÁÖØÀ´ÌáÐÑÈËÃÇ£¬£¬£¬£¬£¬£¬×ÝÈ»ÊÇÖÐÖ¹µÄ¶ñÒâÈí¼þ²Ù×÷Ò²¿ÉÄÜ»áѸËÙ»Ö¸´£¬£¬£¬£¬£¬£¬²¢ÇÒͨ³£»£»£»£»áÒÔ¸üÖØ´óµÄÐÎʽ»Ö¸´¡£¡£¡£¡£¡£×Ô¶¯Ð¡Ðĺͷֲã·ÀÓùÕ½ÂÔ¹ØÓÚСÎÒ˽¼ÒºÍ×éÖ¯±£»£»£»£»¤×Ô¼ºÃâÊÜÕâÖÖһֱת±äµÄÍþвÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£
https://securityonline.info/infamous-warzonerat-malware-returns-deploys-sophisticated-multi-stage-attacks/
4. ÒþÃØµÄРGolang ľÂíʹÓÃÐéα֤Êé¾ÙÐÐÌÓ±ÜͨѶ
3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓà Golang ±à³ÌÓïÑÔ±àдµÄ½ÆÕ©µÄÐÂľÂí¡£¡£¡£¡£¡£ÕâÖÖÒõÏյĶñÒâÈí¼þ½ÓÄÉһϵÁÐÓÕÆÕ½ÂÔ£¬£¬£¬£¬£¬£¬°üÀ¨µØÀí¼ì²éºÍ×°ÖÃÚ²ÆÐÔ¸ùÖ¤Ê飬£¬£¬£¬£¬£¬ÒÔά³ÖÓëÆäÏÂÁîºÍ¿ØÖÆ (C2) ЧÀÍÆ÷µÄÒþ²ØÍ¨Ñ¶Í¨µÀ¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄÌØÂåÒÁľÂíÊ×ÏÈÅÄÉãÊÜѬȾϵͳµÄ¿ìÕÕ£¬£¬£¬£¬£¬£¬¿ÉÄÜ»áÍøÂçÓÐÕë¶ÔÐԵĹ¥»÷µÄÖ÷ÒªÐÅÏ¢¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬Ëü»á´óµ¨µØÔÚ Windows ×¢²á±íÖÐ×°ÖÃαÔìµÄ¸ùÖ¤Êé¡£¡£¡£¡£¡£Õâһа¶ñ°ì·¨Ê¹ÆäÄܹ»×èµ²²¢¿ÉÄÜʹÓüÓÃÜµÄ HTTPS Á÷Á¿£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹Óû§ÈÝÒ×ÔâÊÜÊý¾Ý͵ÇÔ¡£¡£¡£¡£¡£ËäȻûÓÐÌØ¶¨µÄ¶ñÒâÈí¼þ¼Ò×åÓë¸ÃľÂíÏà¹Ø£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÖÒÑÔ˵£¬£¬£¬£¬£¬£¬ÔÚ֮ǰÓë PureLog Stealer¡¢AgentTesla ºÍ GuLoader µÈÎÛÃûÕÑÖøµÄÍþвÏà¹ØµÄ»î¶¯ÖÐÒѾ·¢Ã÷ÁËËùÉæ¼°µÄ IP ºÍ URL µØµã¡£¡£¡£¡£¡£
https://securityonline.info/stealthy-new-golang-trojan-exploits-fake-certificates-for-evasive-communication/
5. CISA Ðû²¼ÍøÂçÊÂÎñ±¨¸æ¹æÔò²Ý°¸
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î¸ßÍøÂçÇå¾²»ú¹¹Ðû²¼ÁËÒ»ÏîйæÔòµÄ³õ¸å£¬£¬£¬£¬£¬£¬Ïêϸ˵Ã÷ÎúÒªº¦»ù´¡ÉèÊ©×éÖ¯ÐèÒªÔõÑùÏòÁª°îÕþ¸®±¨¸æÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ƾ֤¡¶Òªº¦»ù´¡ÉèÊ©ÍøÂçÊÂÎñ±¨¸æ·¨¡·Ïò¡¶Áª°î¹«±¨¡·Ðû²¼ÁË447 Ò³µÄ¹æÔò£¬£¬£¬£¬£¬£¬ÔÊÐí¹«ÖÚ¶ÔÆä½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£ÁìÍÁÇå¾²²¿²¿³¤ÑÇÀúº¼µÂÂÞ¡¤ÂíÔ¼¿¨Ë¹ÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢½«Ê¹ CISA ºÍÆäËû»ú¹¹Äܹ»¸üºÃµØÓ¦¶ÔÊÂÎñ²¢ÕÒ³öÃÀ¹úÒªº¦»ù´¡ÉèÊ©Öеı¡Èõ»·½Ú¡£¡£¡£¡£¡£CIRCIA ÒªÇóijЩҪº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ 72 СʱÄÚ±¨¸æÍøÂçÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÔÚ 24 СʱÄÚ±¨¸æÀÕË÷Èí¼þ¸¶¿î¡£¡£¡£¡£¡£¸ÃÖ´·¨º¸ÇµÄÊÂÎñ°üÀ¨¡°¶Ô×éÖ¯µÄÔË×÷ÄÜÁ¦»ò¹ú¼ÒÇå¾²¡¢¹«¹²¿µ½¡»òÇå¾²Ôì³ÉÖØ´óË𺦻ò×é³ÉÖØ´óÍþв¡±µÄÊÂÎñ¡£¡£¡£¡£¡£
https://therecord.media/cisa-publishes-circia-rule-cyber-incident-reporting
6. µÂ¿ËÈøË¹ÖݺÍ×ôÖÎÑÇÖݵÄÊÐÕþЧÀÍÔâµ½ÀÕË÷¹¥»÷
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¸÷µØµÄ¹ú¼Ò»ú¹¹¼ÌÐøÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄ×ÌÈÅ¡£¡£¡£¡£¡£×ôÖÎÑÇÖݼª¶ûÄ¬ÏØÕþ¸®ÔÚÆäÍøÕ¾ÉÏÐû²¼Í¨Öª£¬£¬£¬£¬£¬£¬ÖÒÑÔÀÕË÷Èí¼þ¹¥»÷ÕýÔÚÓ°ÏìÆäÏò 30000 ¶àÃûסÃñÌṩЧÀ͵ÄÄÜÁ¦¡£¡£¡£¡£¡£¡°¼ª¶ûÄ¬ÏØ×î½ü·¢Ã÷²¢ÏìÓ¦ÁËÀÕË÷Èí¼þÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÒÑʹÊÜÓ°ÏìµÄϵͳÀëÏߣ¬£¬£¬£¬£¬£¬Í¬Ê±ÎÒÃÇÖÂÁ¦ÓÚÇå¾²µØ±£»£»£»£»¤ºÍ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬¹«ÖÚÓ¦¸ÃÔ¤ÍÆ²âÏØÕþ¸®»áÒò´ËÔì³ÉÑÓÎ󡣡£¡£¡£¡£¡±Í¨Öª³Æ¡£¡£¡£¡£¡£¼ª¶ûÄ¬ÏØÏòÁª°îÖ´·¨²¿·Ö·¢³öÁ˾¯±¨£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÁËÒ»¼ÒÍøÂçÇå¾²¹«Ë¾À´½â¾ö´Ë´Î¹¥»÷Ôì³ÉµÄÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£¡£¸»¶û¶ÙÏØÊÇÑÇÌØÀ¼´óµÄËùÔڵأ¬£¬£¬£¬£¬£¬ÔÚ 1 Ô·ÝÔâÊÜ LockBit ÀÕË÷Èí¼þÍŻ﹥»÷ºó£¬£¬£¬£¬£¬£¬¸ÃÏØÈÔÔÚ»Ö¸´Òªº¦Ð§ÀÍ¡£¡£¡£¡£¡£
https://therecord.media/texas-georgia-municipalities-face-disruptions-from-ransomware