Ô½ÄÏÍøÂç·¸·¨ÍÅ»ï CoralRaiderÒâÍâй¶Æä²ÆÎñÊý¾Ý
Ðû²¼Ê±¼ä 2024-04-104ÔÂ9ÈÕ£¬£¬£¬£¬£¬Ò»¸öÓëÔ½ÄÏÓйصÄÐÂÍøÂç·¸·¨×éÖ¯ÒÔÑÇÖÞµÄСÎÒ˽¼ÒºÍ×é֯ΪĿµÄ£¬£¬£¬£¬£¬ÊÔͼÇÔÈ¡É罻ýÌåÕÊ»§ÐÅÏ¢ºÍÓû§Êý¾Ý¡£¡£¡£¡£¡£CoralRaider ÓÚ 2023 Äêµ×Ê״ηºÆð£¬£¬£¬£¬£¬Ë¼¿Æ Talos ÍþвÇ鱨С×éµÄÍþвÑо¿Ö°Ô±ÔÚ CoralRaider µÄ×îÐÂÆÊÎöÖÐÖ¸³ö£¬£¬£¬£¬£¬¸Ã×éÖ¯Ò²·¸ÁËһЩÐÂÊÖ¹ýʧ£¬£¬£¬£¬£¬ÀýÈçÎÞÒâÖÐѬȾÁË×Ô¼ºµÄϵͳ£¬£¬£¬£¬£¬´Ó¶øÌ»Â¶ÁËËûÃǵĻ¡£¡£¡£¡£¡£CoralRaider »î¶¯Í¨³£´Ó Windows ¿ì½Ý·½·¨ (.LNK) Îļþ×îÏÈ£¬£¬£¬£¬£¬Í¨³£Ê¹Óà .PDF À©Õ¹Ãû£¬£¬£¬£¬£¬ÊÔͼÓÕÆÊܺ¦Õß·¿ªÎļþ¡£¡£¡£¡£¡£CoralRaider ×é֯ʹÓà Telegram ЧÀÍÉϵÄ×Ô¶¯»¯»úеÈË×÷ΪÏÂÁîºÍ¿ØÖÆÍ¨µÀ£¬£¬£¬£¬£¬²¢´ÓÊܺ¦ÕßµÄϵͳÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯ËÆºõÒѾѬȾÁËËûÃÇ×Ô¼ºµÄһ̨»úе£¬£¬£¬£¬£¬ÓÉÓÚ˼¿ÆÑо¿Ö°Ô±·¢Ã÷ÁËÐû²¼µ½¸ÃƵµÀµÄÐÅÏ¢µÄÆÁÄ»½ØÍ¼¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/vietnamese-cybercrime-group-coralraider-nets-financial-data
2. ¿¨°Í˹»ù2023Ä걨¸æÊý¾ÝÇÔÈ¡¶ñÒâÈí¼þÊÂÎñ¼¤Ôö
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬¿¨°Í˹»ù±¨¸æÏÔʾ£¬£¬£¬£¬£¬2023 Ä꣬£¬£¬£¬£¬Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þÊÂÎñ¼¤Ôö£¬£¬£¬£¬£¬Õë¶Ô½ü 1000 Íǫ̀װ±¸£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÆ½¾ùÔÚÿ̨ÊÜѬȾװ±¸ÉÏÌáÈ¡ 50.9 ¸öµÇ¼ƾ֤¡£¡£¡£¡£¡£ÕâЩƾ֤±»ÓÃÓÚ¶ñÒâÄ¿µÄ£¬£¬£¬£¬£¬ÀýÈç²ß»®ÍøÂç¹¥»÷»òÔÚ°µÍøÂÛ̳ºÍ Telegram ƵµÀÉϳöÊÛËüÃÇ¡£¡£¡£¡£¡£±»µÁƾ֤º¸Ç¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬´ÓÉ罻ýÌåµÇ¼µ½ÍøÉÏÒøÐÐЧÀÍ¡¢¼ÓÃÜÇ®°üºÍÆóÒµÔÚÏ߯½Ì¨µÇ¼¡£¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷ .com ÓòÃûÊDZ»µÁÕÊ»§µÄÖØµã£¬£¬£¬£¬£¬½ôËæØÊºóµÄÊÇÓë°ÍÎ÷ (.br)¡¢Ó¡¶È (.in)¡¢¸çÂ×±ÈÑÇ (.co) ºÍÔ½ÄÏ (.vn) Ïà¹ØµÄÓòÃûÇøÓò¡£¡£¡£¡£¡£À´×Ô¿¨°Í˹»ùÊý×Ö×ã¼£Ç鱨µÄÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬ÒÑÍùÈýÄêÖжñÒâÈí¼þÊýÄ¿¼¤Ôö 643%¡£¡£¡£¡£¡£ÕâÍ»ÏÔÁ˶ñÒâÈí¼þ¶ÔÈ«ÇòСÎÒ˽¼ÒÏûºÄÕßºÍÆóÒµ×é³ÉµÄÈÕÒæÑÏÖØµÄÍþв¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬£¬£¬£¬ÒÑÍùÎåÄêÀ´£¬£¬£¬£¬£¬È«ÇòÓÐ 443000 ¸öÍøÕ¾ÃæÁÙÆ¾Ö¤Ð¹Â¶ÎÊÌâ¡£¡£¡£¡£¡£
https://securityboulevard.com/2024/04/10-million-devices-were-infected-by-data-stealing-malware-in-2023/
3. ÃÀ¹ú»·±£¾ÖÊÓ²ìºÚ¿Íй¶ÆäÊý¾ÝµÄÇå¾²ÊÂÎñ
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÇéÐα£»£»£»¤ÊðÕýÔÚÊÓ²ìºÚ¿Íй¶Á˸ûú¹¹Òªº¦»ù´¡ÉèÊ©³Ð°üÉÌÊý¾Ý¿âÖеĴó×ÚÁªÏµÐÅÏ¢µÄÖ¸¿Ø¡£¡£¡£¡£¡£±»³ÆÎª USDoD µÄÍþвÐÐΪÕßÔÚÒ»¸ö¿É¹ûÕæ»á¼ûµÄºÚ¿ÍÂÛ̳ÉÏÐû²¼ÁËËûËù˵µÄ 500 MB µÄÁªÏµÐÅÏ¢ºÍ EPA Êý¾Ý¿âÖÐµÄÆäËûÊý¾Ý¡£¡£¡£¡£¡£ÐÅÏ¢Ç徲ýÌ弯ÍÅ֤ʵ£¬£¬£¬£¬£¬×èÖ¹ÖÜÒ»ÏÂÖ磬£¬£¬£¬£¬¸ÃÌû×ÓÈÔÔÚÂÛ̳ÉÏÐû²¼£¬£¬£¬£¬£¬ÆäÖаüÀ¨Éù³Æ°üÀ¨´ÓÈ«Ãû¡¢µç×ÓÓʼþµØµãµ½ÊðÀí³Ð°üÉÌÏÖʵµØµãÐÅÏ¢µÈËùÓÐÐÅÏ¢µÄѹËõÎļþ¡£¡£¡£¡£¡£Ìû×ÓÖÐдµÀ£º¡°¸÷È˺㬣¬£¬£¬£¬Breachforums£¬£¬£¬£¬£¬ÕâÊÇÄãÃÇ×îϲ»¶µÄ TA£¬£¬£¬£¬£¬½ñÌìÎÒºÜ×ÔºÀµØËµ£¬£¬£¬£¬£¬ÎÒÕýÔÚÐû²¼ epa.gov ÁªÏµÈËÁбíÊý¾Ý¿â¡£¡£¡£¡£¡£ÕâÊÇËûÃÇ [Òªº¦»ù´¡ÉèÊ©] µÄËùÓÐÁªÏµÈË£¬£¬£¬£¬£¬²»µ«Õë¶Ô¸Ã»ú¹¹½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬¸Ã»ú¹¹¶Ô¾Ý³ÆÐ¹Â¶µÄÊý¾Ý¾ÙÐÐÁË¡°ÆðÔ´ÆÊÎö¡±£¬£¬£¬£¬£¬·¢Ã÷ÕâЩ¼ÍÂ¼ËÆºõ°üÀ¨ÒÑÏò¹«ÖÚ¹ûÕæµÄÉÌÒµÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬¡°ÒÔÌṩÇéÐÎÓ°ÏìµÄÖÜÈ«ÇéÐΡ± ¡±¡£¡£¡£¡£¡£
https://news.hitb.org/content/us-epa-investigates-alleged-data-breach-government-hacker
4. unit42¶ñÒâÈí¼þÌᳫµÄÎó²îɨÃè³ÊÉÏÉýÇ÷ÊÆ
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬¼øºÚµ£±£ÍøÒ£²âÊý¾ÝÅú×¢£¬£¬£¬£¬£¬Ô½À´Ô½¶àµÄÍþв¼ÓÈëÕßÕýÔÚתÏò¶ñÒâÈí¼þÌᳫµÄɨÃè¹¥»÷¡£¡£¡£¡£¡£±¾ÎÄ»ØÊ×Á˹¥»÷ÕßÔõÑùʹÓÃÊÜѬȾµÄÖ÷»ú¶ÔÆäÄ¿µÄ¾ÙÐлùÓÚ¶ñÒâÈí¼þµÄɨÃ裬£¬£¬£¬£¬¶ø²»ÊÇʹÓøü¹Å°åµÄÖ±½ÓɨÃèÒªÁì¡£¡£¡£¡£¡£ÍþвÐÐΪÕߺã¾ÃÒÔÀ´Ò»Ö±ÔÚʹÓÃɨÃèÒªÁìÀ´²éÃ÷ÍøÂç»òϵͳÖеÄÎó²î¡£¡£¡£¡£¡£Ò»Ð©É¨Ãè¹¥»÷Ô´×ÔÁ¼ÐÔÍøÂ磬£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÊÜѬȾÅÌËã»úÉϵĶñÒâÈí¼þÇý¶¯µÄ¡£¡£¡£¡£¡£µ±¹¥»÷ÕßÌá³«ÍøÂçÇëÇóÒÔÊÔͼʹÓÃÄ¿µÄÖ÷»úµÄDZÔÚÎó²îʱ£¬£¬£¬£¬£¬¾Í»á±¬·¢É¨Ãè¡£¡£¡£¡£¡£Ä¿µÄÖ÷»úͨ³£ÊÇÁ¼ÐԵ쬣¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÈÝÒ×Êܵ½¹¥»÷ÕßÕë¶ÔµÄ CVE µÄ¹¥»÷¡£¡£¡£¡£¡£Í¨¹ý¸ú×ÙÀ´×Ô¶à¸öÍøÂçµÄÁ÷Á¿ÈÕÖ¾£¬£¬£¬£¬£¬ÎÒÃÇ·¢Ã÷¶Ô´ó×ÚÄ¿µÄµØµÄÇëÇó¾ßÓп´ËÆÁ¼ÐԵķ¾¶¡£¡£¡£¡£¡£Ðí¶àɨÃè°¸Àý£¬£¬£¬£¬£¬ÆäÖй¥»÷ÕßǶÈëÁËÒÔǰδ¼û¹ýµÄ URL£¬£¬£¬£¬£¬ÓÃÓÚÓÐÓøºÔØ´«Êä»ò C2 ÒÔ¼°Îó²îʹÓÃÇëÇ󡣡£¡£¡£¡£Õâ½µµÍÁ˺óÐøÓÐÓøºÔØ»ò C2 URL ±»Çå¾²¹©Ó¦ÉÌ×èÖ¹µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£ÓÉÓÚÕâЩÓÐÓøºÔØ´«ËÍ»ò C2 URL ¹ØÓÚÇå¾²¹©Ó¦ÉÌÀ´ËµÊÇÐµģ¬£¬£¬£¬£¬Òò´Ë¼ì²âºÍ×èÖ¹´ËÀà³õʼɨÃèÇëÇóÖÁ¹ØÖ÷Òª£¬£¬£¬£¬£¬ÓÉÓÚ¹©Ó¦É̲»Ì«¿ÉÄÜ×èÖ¹ºóÐøÇëÇ󡣡£¡£¡£¡£
https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/
5. ÀÕË÷ÍÅ»ïRansomHub ´Ó Change Healthcare ÇÔÈ¡4TBÊý¾Ý
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬¾Ý±¨µÀ£¬£¬£¬£¬£¬Change Healthcare ÕýÃæÁÙÁíÒ»´Î¹¥»÷£¬£¬£¬£¬£¬Õâ´ÎÊÇÀÕË÷Èí¼þÍÅ»ï RansomHub ÌᳫµÄ¹¥»÷£¬£¬£¬£¬£¬¶ø¾ÍÔÚ¼¸ÖÜǰ£¬£¬£¬£¬£¬¸Ã×éÖ¯³ÉΪALPHV/BlackCat ÍøÂç¹¥»÷µÄÊܺ¦Õß¡£¡£¡£¡£¡£RansomHub ÒªÇóΪÆä´Ó¸Ã¹«Ë¾ÇÔÈ¡µÄ 4TB Êý¾ÝÚ²ÆÀÕË÷£»£»£»²»È»£¬£¬£¬£¬£¬Ëü»áÍþвÔÚ 12 ÌìÄÚ½«Êý¾Ý³öÊÛ¸ø³ö¼Û×î¸ßÕß¡£¡£¡£¡£¡£±»µÁÐÅÏ¢°üÀ¨ÃÀ¹ú¾üÊÂÖ°Ô±ºÍ»¼ÕßµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÒÔ¼°Ò½ÁƼͼºÍ²ÆÎñÐÅÏ¢µÈ¡£¡£¡£¡£¡£ÕâʹµÃÁªºÏÒ½ÁƱ£½¡¹«Ë¾µÄ×Ó¹«Ë¾ Change Healthcare ÏÝÈëÁËÒ»¸öÄæ¾³£¬£¬£¬£¬£¬ÓÉÓÚËü¸Õ¸Õ´ÓÉϴεĹ¥»÷Öлָ´¹ýÀ´£¬£¬£¬£¬£¬±ØÐè¾öÒéÖ§¸¶Êê½ðÊÇ·ñÊÇ×îºÃµÄÑ¡Ôñ¡£¡£¡£¡£¡£Ö»¹ÜÈËÃÇ¶Ô ALPHV ÊÇ·ñ¸üÃûΪ RansomHub£¬£¬£¬£¬£¬»òÕßÊÇ·ñ±£´æÈκÎÁªÏµ±£´æÖØ´óÍÆ²â£¬£¬£¬£¬£¬µ«ÎÖ¿ËÌåÏÖ£¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓлñµÃ֤ʵ£¬£¬£¬£¬£¬ÓÉÓÚÏÖÔÚϽáÂÛ»¹ÎªÊ±¹ýÔç¡£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/round-2-change-healthcare-targeted-second-ransomware-attack
6. AGENT TESLA ¶ñÒâÈí¼þÇÔÈ¡ Chrome ºÍ Firefox µÄµÇ¼ƾ֤
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊÓ²ìÁË×î½üÕë¶ÔÃÀ¹úºÍ°Ä´óÀûÑÇ×éÖ¯µÄ Agent Tesla ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓôøÓÐÐéα²É¹º¶©µ¥µÄÍøÂç´¹ÂÚµç×ÓÓʼþÀ´ÓÕÆÊܺ¦Õßµã»÷¶ñÒâÁ´½Ó¡£¡£¡£¡£¡£µ¥»÷ºó£¬£¬£¬£¬£¬ÊÜ Cassandra Protector ±£»£»£»¤µÄ»ìÏýµÄ Agent Tesla Ñù±¾¾Í»á±»ÏÂÔØ²¢Ö´ÐУ¬£¬£¬£¬£¬´Ó¶øÇÔÈ¡»÷¼üºÍµÇ¼ƾ֤¡£¡£¡£¡£¡£ÊӲ췢Ã÷ÁËÁ½ÃûÍøÂç·¸·¨·Ö×Ó Bignosa£¨Ö÷ÒªÍþв£©ºÍ Gods£¬£¬£¬£¬£¬ËûÃÇʹÓôóÐ͵ç×ÓÓʼþÊý¾Ý¿âºÍ¶à¸öЧÀÍÆ÷¾ÙÐÐ RDP ÅþÁ¬ºÍ¶ñÒâÈí¼þ»î¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»î¶¯ÔÚ·Ö·¢¶ñÒâÀ¬»øÓʼþÖ®Ç°Éæ¼°¶à¸ö°ì·¨µÄ×¼±¸½×¶Î¡£¡£¡£¡£¡£Bignosa ʹÓà Agent Tesla ¾ÙÐÐÁËÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬¶ø Gods Ö¸µ¼ Bignosa Ò²Ôø¾ÙÐйýÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£ËûÃÇͨ¹ý Jabber ºÍTeamViewer¾ÙÐÐͨѶ£¬£¬£¬£¬£¬¶ø Bignosa ʹÓà RDP ÅþÁ¬µ½ VDS ЧÀÍÆ÷²¢·Ö·¢ Agent Tesla¡£¡£¡£¡£¡£
https://gbhackers.com/agent-tesla-malware-steals-login-credentials-from-chrome-firefox/