ê©ÄÉÒ½ÔºÒòÔâµ½ÍøÂç¹¥»÷¶ø¹Ø±ÕÆäÒ½ÁÆÏµÍ³
Ðû²¼Ê±¼ä 2024-04-234ÔÂ22ÈÕ£¬£¬£¬¸ÃÒ½ÁÆ»ú¹¹Ò²±»³ÆÎª²¼Â³ÈüÒ½Ôº£¬£¬£¬¾öÒéÍêÈ«ÇжÏÅÌËãʱ»ú¼ûÒÔ×èÖ¹¹¥»÷£¬£¬£¬ÕâÆÈʹԱ¹¤×ªÏò±ÊºÍÖ½¼ÌÐøÎª»¼ÕßÌṩЧÀÍ¡£¡£¡£¡£¡£¡£¡£CHC-SV ÌåÏÖ£¬£¬£¬ÕýÔÚ¾¡Ò»ÇÐÆð¾¢È·±£Äܹ»ÔÚÆä»î¶¯ÁìÓòÌṩȫ·½Î»µÄÕչ˻¤Ê¿£¬£¬£¬²¢Ôö²¹Ëµ£¬£¬£¬ËüÒ»Ö±ÔÚÓëµØÇøÒ½ÁÆ»ú¹¹ÏàÖú£¬£¬£¬Æ¾Ö¤»¼ÕßµÄÐèÇóµ÷½â»¼Õߵį«Ïò¡£¡£¡£¡£¡£¡£¡£ËäÈ» CHC-SV µÄ½ôÆÈ»î¶¯ÈÔÔÚ¼ÌÐø£¬£¬£¬µ«ÉÏÖÜ×÷·ÏÁ˷ǽôÆÈÊÖÊõ³ÌÐò£¬£¬£¬µ«¾ÙÐÐÁ˲»ÒÀÀµÅÌËã»úϵͳµÄÊÖÊõÒÔ¼°Õë¶ÔÒÑÖªÂýÐÔ²¡»¼ÕßµÄÊÖÊõ¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÔºÌåÏÖÒÑ֪ͨÓйØÕþ¸®£¬£¬£¬Õþ¸®ºÍÍøÂçÇ徲ר¼ÒÕýÔÚÆÊÎö¸ÃÊÂÎñ¡£¡£¡£¡£¡£¡£¡£CHC-SV ÌåÏÖ£¬£¬£¬Æù½ñΪֹ£¬£¬£¬ÉÐδÌá³öÊê½ðÒªÇ󣬣¬£¬Ò²Ã»Óз¢Ã÷Êý¾Ý±»µÁµÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£¾ÝÒ½Ôº³Æ£¬£¬£¬¿µ¸´²Ù×÷½«ÖØµã¹Ø×¢Ó뻼ÕßÕչ˻¤Ê¿Ö±½ÓÏà¹ØµÄϵͳ¡£¡£¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬CHC-SV Ô¤¼ÆÐèÒªºÜ³¤Ê±¼ä²Å»ª»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£CHC-SV ÊÇ·¨¹úê©ÄɵÄÒ»¼ÒÓµÓÐ 840 ¸ö´²Î»µÄÒ½Ôº£¬£¬£¬ÓµÓÐ 2,000 ¶àÃûÔ±¹¤£¬£¬£¬Ìṩ¼±Õï¡¢Íâ¿Æ¡¢²ú¿Æ¡¢¶ù¿Æ¡¢Éñ¾²¡Ñ§ºÍÆäËûÒ½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/cannes-hospital-cancels-medical-procedures-following-cyberattack/
2. Windows Defender ¿ÉÄܻᱻÓկɾ³ýÊý¾Ý¿â
4ÔÂ22ÈÕ£¬£¬£¬ÐÅÏ¢Çå¾²»ú¹¹ SafeBreach µÄÑо¿Ö°Ô±ÉÏÖÜÎåÌÖÂÛÁË΢ÈíºÍ¿¨°Í˹»ùÇå¾²²úÆ·ÖпÉÄÜÔÊÐíÔ¶³Ìɾ³ýÎļþµÄȱÏÝ¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬ËûÃÇÉù³Æ£¬£¬£¬×ÝÈ»Á½¼Ò¹©Ó¦É̶¼Éù³ÆÒѾÐÞ¸´Á˸ÃÎÊÌ⣬£¬£¬¸ÃÎó²îÈÔÈ»¿ÉÒÔ±»Ê¹Óᣡ£¡£¡£¡£¡£¡£SafeBreach Çå¾²Ñо¿¸±×ܲà Tomer Bar ºÍÇå¾²Ñо¿Ô± Shmuel Cohen ÔÚÐÂ¼ÓÆÂ¾ÙÐÐµÄ Black Hat Asia ¾Û»áÉϽÒÏþ½²»°Ê±Ú¹ÊÍ˵£¬£¬£¬Microsoft Defender ºÍ¿¨°Í˹»ùµÄ¶Ëµã¼ì²âºÍÏìÓ¦ (EDR) ¿ÉÒÔ¼ì²â¶ñÒâÎļþµÄÎó±¨Ö¸±ê£¬£¬£¬È»ºóɾ³ýËüÃÇ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÒÀÀµÓÚ΢ÈíºÍ¿¨°Í˹»ùʹÓÃ×Ö½ÚÊðÃû£¨ÎļþÍ·ÖÐÆæÒìµÄ×Ö½ÚÐòÁУ©À´¼ì²â¶ñÒâÈí¼þµÄÊÂʵ¡£¡£¡£¡£¡£¡£¡£Bar ºÍ Cohen Ê×ÏÈÔÚ VirusTotal ƽ̨ÉÏÕÒµ½ÁËÓë¶ñÒâÈí¼þÏà¹ØµÄ×Ö½ÚÊðÃû£¬£¬£¬È»ºó½«Æä²åÈëÊý¾Ý¿âÖУ¬£¬£¬ÒªÁìÊǽ¨ÉèÒ»¸öÃû³Æ°üÀ¨¸ÃÊðÃûµÄÐÂÓû§µÈ¡£¡£¡£¡£¡£¡£¡£EDR ³ÌÐòËæºóÒÔΪ´æ´¢ÊðÃûµÄÊý¾Ý¿âÒѱ»¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£¡£¡£¡£ÈôÊÇ EDR ÉèÖÃΪɾ³ýÊÜѬȾµÄÎļþ£¬£¬£¬Ëü½«Ö´Ðд˲Ù×÷¡£¡£¡£¡£¡£¡£¡£Á½ÈËÒÔΪ£¬£¬£¬Êý¾Ý¿â»òÐéÄâ»úÒò´Ë¿ÉÒÔ±»Ô¶³Ìɾ³ý¡£¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/04/22/edr_attack_remote_data_deletion/
3. AKIRA´Ó250¶àÃûÊܺ¦ÕßÄÇÀïÊÕµ½4200ÍòÊê½ð
4ÔÂ21ÈÕ£¬£¬£¬CISA¡¢FBI¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC-NL) Ðû²¼µÄÁªºÏͨ¸æÏÔʾ£¬£¬£¬×Ô 2023 ÄêÍ·ÒÔÀ´£¬£¬£¬Akira ÀÕË÷Èí¼þÔËÓªÉÌ´ÓÈ«Çò 250 ¶àÃûÊܺ¦ÕßÄÇÀïÊÕµ½ÁË 4200 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£Akira ÀÕË÷Èí¼þ×Ô 2023 Äê 3 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒѾÈëÇÖÁ˶à¸öÐÐÒµµÄ¶à¸ö×éÖ¯£¬£¬£¬°üÀ¨½ÌÓý¡¢½ðÈںͷ¿µØ²ú¡£¡£¡£¡£¡£¡£¡£ÓëÆäËûÀÕË÷Èí¼þÍÅ»ïÒ»Ñù£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÒ»¿îÕë¶Ô VMware ESXi ЧÀÍÆ÷µÄ Linux ¼ÓÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£Akira ÀÕË÷Èí¼þÔËÓªÉÌͨ¹ýÔÚ¼ÓÃÜ֮ǰÇÔÈ¡Êܺ¦ÕßµÄÊý¾ÝÀ´ÊµÑéË«ÖØÀÕË÷Ä£×Ó¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þµÄÔçÆÚ°æ±¾ÊÇÓà C++ ±àдµÄ£¬£¬£¬²¢ÇҸöñÒâÈí¼þÔÚ¼ÓÃÜÎļþÖÐÌí¼ÓÁË .akira À©Õ¹Ãû¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬´Ó 2023 Äê 8 ÔÂÆð£¬£¬£¬Ä³Ð© Akira ¹¥»÷×îÏÈʹÓà Megazord£¬£¬£¬Ëü½ÓÄÉ»ùÓÚ Rust µÄ´úÂ벢ʹÓà .powerranges À©Õ¹Ãû¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£Akira ÍþвÐÐΪÕß¼á³Ö½»ÌæÊ¹Óà Megazord ºÍ Akira£¬£¬£¬°üÀ¨×ÔÁ¦ÊÓ²ìÈ·¶¨µÄ Akira_v2¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/162098/cyber-crime/akira-ransomware-report-fbi.html
4. 2024ÄêµÚÒ»¼¾¶ÈÀÕË÷Èí¼þÖ§¸¶¶î½µÖÁ28%µÄÀúʷеÍ
4ÔÂ21ÈÕ£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷Õß½ñÄêµÄ¿ª¾Ö²¢²»Ë³Ë죬£¬£¬ÍøÂçÇå¾²¹«Ë¾ Coveware µÄͳ¼ÆÊý¾ÝÏÔʾ£¬£¬£¬Ô½À´Ô½¶àµÄ¹«Ë¾¾Ü¾øÖ§¸¶ÀÕË÷ÒªÇ󣬣¬£¬µ¼Ö 2024 ÄêµÚÒ»¼¾¶ÈÖ§¸¶Êê½ðµÄ¹«Ë¾µÖ´ïÀúÊ·ÐÂµÍ 28%¡£¡£¡£¡£¡£¡£¡£2023 ÄêµÚËÄÐò¶ÈÕâÒ»Êý×Ö Îª 29%£¬£¬£¬Coveware µÄͳ¼ÆÊý¾ÝÏÔʾ£¬£¬£¬×Ô 2019 ÄêÍ·ÒÔÀ´£¬£¬£¬Ö§¸¶½ð¶îµÄïÔÌÒ»Ö±¼á³ÖÎȹ̡£¡£¡£¡£¡£¡£¡£ÕâÖÖϽµÊÇÓÉÓÚ×é֯ʵÑéÁ˸üÏȽøµÄ±£»£»£»£»¤²½·¥£¬£¬£¬Ò»Ö±¼Ó´óµÄÖ´·¨Ñ¹Á¦À´Öª×ãÆ×ӵIJÆÎñÒªÇ󣬣¬£¬ÒÔ¼°ÍøÂç·¸·¨·Ö×ÓÒ»ÔÙÎ¥·´ÔÚÖ§¸¶Êê½ðµÄÇéÐÎϲ»»áÐû²¼»òתÊÛ±»µÁÊý¾ÝµÄÔÊÐí¡£¡£¡£¡£¡£¡£¡£´ÓÒÑÈ·¶¨µÄÎó²îÀ´¿´£¬£¬£¬Ô¶³Ì»á¼ûºÍÎó²îʹÓÃʩչÁË×î´óµÄ×÷Ó㬣¬£¬ÆäÖÐ CVE-2023-20269¡¢CVE-2023-4966 ºÍ CVE-2024-1708-9 ȱÏÝÔÚµÚÒ»¼¾¶È±»ÀÕË÷Èí¼þÔËÓªÉÌʹÓõÃ×îΪÆÕ±é¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-of-28-percent-in-q1-2024/
5. Veriti Research·¢Ã÷Androxgh0stµÄ¹¥»÷»î¶¯¼¤Ôö
4ÔÂ21ÈÕ£¬£¬£¬Veriti Research ·¢Ã÷ Androxgh0st ¶ñÒâÈí¼þ¼Ò×åÌᳫµÄ¹¥»÷»î¶¯¼¤Ôö£¬£¬£¬·¢Ã÷ 600 ¶ą̀ЧÀÍÆ÷Êܵ½Íþв£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÃÀ¹úºÍÓ¡¶È¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ Veriti µÄ²©¿ÍÎÄÕ£¬£¬£¬Androxgh0st ±³ºóµÄµÐÊÖµÄ C2 ЧÀÍÆ÷±»Ì»Â¶£¬£¬£¬Õâ¿ÉÒÔͨ¹ý̻¶ÊÜÓ°ÏìµÄÄ¿µÄÀ´¾ÙÐл¹»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ëæºó¼ÌÐøÏòÊܺ¦Õß·¢³ö¾¯±¨¡£¡£¡£¡£¡£¡£¡£½øÒ»²½Ñо¿ÏÔʾ£¬£¬£¬Androxgh0st ÔËÓªÕßÕýÔÚʹÓöà¸ö CVE£¨°üÀ¨CVE-2021-3129ºÍCVE-2024-1709£© ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷Éϰ²ÅÅ Web shell£¬£¬£¬´Ó¶øÊÚÓèÔ¶³Ì¿ØÖƹ¦Ð§¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÓÐÖ¤¾ÝÅú×¢»îÔ¾µÄ Web shell ÓëCVE-2019-2725Ïà¹Ø¡£¡£¡£¡£¡£¡£¡£×Ô 2022 Äê 12 ÔÂÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬Hackread.com Ò»Ö±ÔÚ¸ú×Ù Androxgh0st µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔËÓªÕßÒÔ°²ÅÅAdhublika ÀÕË÷Èí¼þ¶øÖøÃû£¬£¬£¬Ö®Ç°ÔøÊӲ쵽ÓëÓë Adhublika ×éÖ¯Ïà¹ØµÄ IP µØµã¾ÙÐÐͨѶ¡£¡£¡£¡£¡£¡£¡£
https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/
6. Hellokity ÀÕË÷Èí¼þµÄ¹¥»÷ÕßÒÔHelloGookie»Ø¹é
4ÔÂ22ÈÕ£¬£¬£¬ÍøÂç·¸·¨×éÖ¯£¨ÒÔǰ³ÆÎª Hellokity£©ÒÔÐÂÓÖÃû¡°HelloGookie¡±ÖØÐ·ºÆð¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²î¿Ïµ»ú¹¹ MonThreat ͨ¹ýÆä Twitter ÕÊ»§±¨¸æÁËÕâһϣÍû¡£¡£¡£¡£¡£¡£¡£Hellokity ÒÔÆä±¸ÊÜÖõÄ¿µÄÍøÂç¹¥»÷¶øÖøÃû£¬£¬£¬Ò»Ö±ÊÇÊý×ÖÀÕË÷µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Òò°²ÅÅÀÕË÷Èí¼þÉøÍ¸ÆóÒµÍøÂç¡¢¼ÓÃÜÊý¾ÝÒÔ¼°Ë÷Òª¾Þ¶îÊê½ð»»È¡½âÃÜÃÜÔ¿¶øÎÛÃûÕÑÖø¡£¡£¡£¡£¡£¡£¡£ËûÃǵÄÔËÓª¶Ô¸÷¸öÐÐÒµÔì³ÉÁË×ÌÈÅ£¬£¬£¬Ó°ÏìÁËÓªÒµÔËÓªºÍÏûºÄÕßÊý¾ÝÒþ˽¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ MonThreat ·ÖÏíµÄÏêϸÐÅÏ¢£¬£¬£¬Hellokity ²»µ«¸ü¸ÄÁËÃû³Æ£¬£¬£¬²¢ÇÒËÆºõ»¹Éý¼¶ÁËÆäÀÕË÷Èí¼þ¹¤¾ßºÍÕ½ÂÔ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÆ·ÅÆÖØËÜ¿ÉÄÜÊÇΪÁËÌÓ±ÜÒÑ˳ӦÆäÏÈǰҪÁìµÄÖ´·¨ºÍÍøÂçÇå¾²·ÀÓù¡£¡£¡£¡£¡£¡£¡£Hellokity ÒÔÐÂÃû³Æ¡°HelloGookie¡±»Ø¹é£¬£¬£¬¸øÍøÂçÇ徲רҵÈËÊ¿´øÀ´ÁËеÄÌôÕ½¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/hellokity-ransomware-new-name/