ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§
Ðû²¼Ê±¼ä 2024-10-181. ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼Õ÷±øÓ¦ÓÃÓû§
10ÔÂ16ÈÕ£¬£¬£¬£¬ºÚ¿ÍʹÓÃMeduzaStealer¶ñÒâÈí¼þÕë¶ÔÎÚ¿ËÀ¼Ç±ÔÚÕ÷±ø¹¤¾ßÌᳫ¹¥»÷¡£¡£¡£¡£¡£ËûÃÇͨ¹ýTelegramÈö²¥¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬Î±×°³ÉÎÚ¿ËÀ¼ÐÂÕþ¸®Ó¦ÓóÌÐòReserve+µÄÊÖÒÕÖ§³Ö»úеÈË£¬£¬£¬£¬ÓÕÆÓû§ÉÏ´«°üÀ¨¶ñÒâÎļþµÄZIPµµ°¸¡£¡£¡£¡£¡£Ò»µ©Îļþ±»·¿ª£¬£¬£¬£¬MeduzaStealer¾Í»áѬȾĿµÄ×°±¸£¬£¬£¬£¬ÇÔÈ¡¾ßÓÐÌØ¶¨À©Õ¹ÃûµÄÎĵµ£¬£¬£¬£¬²¢Ëæºó×ÔÎÒɾ³ý¡£¡£¡£¡£¡£Reserve+Ó¦ÓÃÔÊÐíÎÚ¿ËÀ¼ÓÐÒåÎñ·þ±øÒÛµÄÄÐÐÔÔÚÏ߸üÐÂСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬ÓÉÓÚÍøÂçµÄÊý¾ÝÃô¸Ð£¬£¬£¬£¬ÒѳÉΪºÚ¿ÍµÄ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£×èÖ¹7Ô£¬£¬£¬£¬ÒÑÓÐÁè¼Ý450ÍòÎÚ¿ËÀ¼ÈËʹÓøÃÓ¦ÓøüÐÂÊý¾Ý¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼¹ú·À²¿Òѱ¨¸æ·¢Ã÷ð³äµÄReserve+Ó¦ÓóÌÐò£¬£¬£¬£¬¿ÉÄÜÖ¼ÔÚÍøÂçСÎÒ˽¼ÒÊý¾ÝÓÃÓÚÏ®»÷»òÐÅÏ¢ºÍÐÄÀíÐж¯¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬Óë¶íÂÞ˹ÓйصĺڿÍÒ²ÔøÀÄÓÃÊ¢ÐÐÒÆ¶¯Ó¦ÓóÌÐòºÍͨѶ¹¤¾ß¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÖ°Ô±¡£¡£¡£¡£¡£
https://therecord.media/hackers-target-ukraine-draftees-meduzastealer-malware-telegram
2. ÐÂÐÍÀÕË÷Èí¼þÀÄÓÃAWSÇÔÈ¡Êý¾Ý£¬£¬£¬£¬¿çƽ̨Èö²¥ÄÑ·À¿Ø
10ÔÂ16ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚTrend MicroµÄ±¨¸æÖÐÕ¹ÏÖÁËÒ»¸öÖØ´óµÄÀÕË÷Èí¼þ²Ù×÷£¬£¬£¬£¬¸Ã²Ù×÷ʹÓÃÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©»ù´¡ÉèÊ©À´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£ÕâÖÖÐÂÐÍÀÕË÷Èí¼þÄ£ÄâÁËÎÛÃûÕÑÖøµÄLockBitÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬µ«ÏÖʵÉÏÊÇÒ»¸öÍêÈ«²î±ðµÄʵÌå¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýAWSµÄS3´«Êä¼ÓËÙ£¨S3TA£©¹¦Ð§£¬£¬£¬£¬Ê¹ÓÃÓ²±àÂëµÄAWSƾ֤ÔÚ¹¥»÷Õß¿ØÖƵÄAmazon S3´æ´¢Í°ÖÐÉÏ´«Êܺ¦ÕßÊý¾Ý£¬£¬£¬£¬ÒÔʵÏÖ¸ü¿ìµÄÔ¶¾àÀëÊý¾Ý´«Êä¡£¡£¡£¡£¡£ÔÚ¹¥»÷¿¢ÊÂʱ£¬£¬£¬£¬×°±¸µÄ±ÚÖ½»áÄð³ÉÒ»ÕÅÌáµ½LockBitµÄͼÏñ£¬£¬£¬£¬ÒÔÔöÌíÊܺ¦Õß×ñÊØÊê½ðÒªÇóµÄѹÁ¦¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÒÔGo±à³ÌÓïÑÔ±àд£¬£¬£¬£¬¾ßÓÐ¿çÆ½Ì¨ÌØÕ÷£¬£¬£¬£¬Äܹ»Õë¶ÔWindowsºÍmacOSÇéÐΣ¬£¬£¬£¬Ê¹ÆäÓÃ;ÆÕ±éÇÒÄÑÒÔ¿ØÖÆ¡£¡£¡£¡£¡£AWSÒÑÔÝÍ£´ËÀÕË÷Èí¼þʹÓõĻá¼ûÃÜÔ¿£¬£¬£¬£¬µ«Trend Micro½¨Òé×éÖ¯¼á³ÖСÐÄ£¬£¬£¬£¬¸üÐÂÈí¼þ£¬£¬£¬£¬¼ì²éÔ¶³Ì»á¼ûÕ½ÂÔ£¬£¬£¬£¬²¢¼à¿ØÓë¶ñÒâ»î¶¯Ïà¹ØµÄAWSÕË»§ID£¬£¬£¬£¬ÒÔ¸üºÃµØ¼ì²âºÍÓ¦¶ÔDZÔڵĻùÓÚÔÆµÄÍþв¡£¡£¡£¡£¡£
https://securityonline.info/lockbit-imposter-new-ransomware-leverages-aws-for-attacks/
3. ClickFixбäÖÖ£ºÊ¹ÓÃGoogle MeetÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ
10ÔÂ17ÈÕ£¬£¬£¬£¬ClickFix ÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½ÂÔ£¬£¬£¬£¬×Ô5Ô·ÝÓÉÍøÂçÇå¾²¹«Ë¾ProofpointÊ״α¨¸æÒÔÀ´£¬£¬£¬£¬Æä»î¶¯Óú·¢ÆµÈÔ£¬£¬£¬£¬ÓÈÆäÊÇÔÚÃÀ¹úºÍÈÕ±¾¡£¡£¡£¡£¡£¸ÃÕ½ÂÔͨ¹ýð³ä Google Chrome¡¢Microsoft Word ºÍ OneDrive ¹ýʧÐÂÎÅ£¬£¬£¬£¬ÓÕÆÓû§¸´ÖƲ¢Ö´ÐÐ PowerShell ´úÂ룬£¬£¬£¬´Ó¶øÑ¬È¾ÏµÍ³¡£¡£¡£¡£¡£Êܺ¦ÕßÒò´ËÅöÃæÁÙ¶àÖÖ¶ñÒâÈí¼þµÄ¹¥»÷£¬£¬£¬£¬Èç DarkGate¡¢Matanbuchus µÈ¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬SaaS ÍøÂçÇå¾²ÌṩÉÌ Sekoia Ö¸³ö£¬£¬£¬£¬ClickFix »î¶¯Òѱ¬·¢ÏÔÖø×ª±ä£¬£¬£¬£¬°üÀ¨Ê¹Óà Google Meet ÓÕ¶ü¡¢Õë¶ÔÔËÊäºÍÎïÁ÷¹«Ë¾µÄÍøÂç´¹ÂÚÓʼþµÈ¡£¡£¡£¡£¡£¹¥»÷Õ߻ᷢËÍ¿´ËÆÕýµ±µÄ Google Meet Ô¼ÇëÓʼþ£¬£¬£¬£¬ÓÕʹÊܺ¦Õß»á¼ûÐéÎ±Ò³Ãæ¡£¡£¡£¡£¡£Ò»µ©½øÈ룬£¬£¬£¬Êܺ¦Õß»áÊÕµ½ÊÖÒÕÎÊÌâÌáÐÑ£¬£¬£¬£¬Èôµã»÷¡°ÊµÑéÐÞ¸´¡±£¬£¬£¬£¬Ôò»áÆô¶¯ ClickFix ѬȾÀú³Ì£¬£¬£¬£¬µ¼ÖÂÅÌËã»ú±»¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£¡£Windows ϵͳÖ÷ÒªÔâÊÜ Stealc »ò Rhadamanthys ÐÅÏ¢ÇÔÈ¡Èí¼þµÄ¹¥»÷£¬£¬£¬£¬¶ø macOS »úеÉÏÔòͶ·ÅÁËÃûΪ¡°Launcher_v194¡±µÄ AMOS Stealer¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Sekoia »¹·¢Ã÷ÁËÆäËû¼¸¸ö¶ñÒâÈí¼þ·Ö·¢ÇþµÀ£¬£¬£¬£¬°üÀ¨ Zoom¡¢PDF ÔĶÁÆ÷¡¢ÐéαÊÓÆµÓÎÏ·µÈ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/
4. ³¯ÏÊITÚ²ÆÍŻNickel Tapestry¡±Ê¹ÓùÍÓ¶¹ØÏµÇÔÈ¡Êý¾Ý²¢ÀÕË÷Êê½ð
10ÔÂ17ÈÕ£¬£¬£¬£¬³¯Ïʺã¾ÃÒÔÀ´Ò»Ö±ÅÉDzITרҵְԱµ½¸»×ã¹ú¼ÒµÄÆóÒµ¾ÍÖ°£¬£¬£¬£¬ÒÔÇÔÈ¡ÍøÂçÊý¾Ý»òΪ¸Ã¹úµÄÎäÆ÷ÍýÏëıȡÊÕÈë¡£¡£¡£¡£¡£ÕâЩڲÆÐÔµÄITÊÂÇéÕßʹÓÃÐéα»ò͵À´µÄÉí·Ý£¬£¬£¬£¬²¢Í¨¹ýÌõ¼Ç±¾µçÄÔÅ©³¡ºÍÃÀ¹úµÄÕ¾µã·ÓÉÁ÷Á¿À´ÑÚÊÎÆäÕæÊµÎ»Öᣡ£¡£¡£¡£ËûÃÇ×èֹʹÓÃÊÓÆµÍ¨»°»òÔÚÊÓÆµ¾Û»áʱ´úÒþ²ØÃ沿£¬£¬£¬£¬ÒÔ±ÜÃâ±»·¢Ã÷¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾SecureworksµÄÊӲ죬£¬£¬£¬Ò»¸öÃûΪ¡°Nickel Tapestry¡±£¨Mandiant³ÆÎªUNC5267£©µÄ×éÖ¯ÈÏÕæ×éÖ¯ºÍе÷ÕâЩ³¯ÏÊITÊÂÇéÕß¡£¡£¡£¡£¡£ÔÚ¹ÍÓ¶ÕâЩÍⲿ³Ð°üÉ̺󣬣¬£¬£¬Ò»¼Ò¹«Ë¾ÏÕЩÁ¬Ã¦ÔâÓöÁËÊý¾ÝÇÔÈ¡£¬£¬£¬£¬Êý¾Ýͨ¹ý¹«Ë¾µÄÐéÄâ×ÀÃæ»ù´¡ÉèÊ©´«Ê䵽СÎÒ˽¼ÒGoogle DriveÔÆ´æ´¢¡£¡£¡£¡£¡£ÔÚ¹ÍÓ¶¹ØÏµÖÕÖ¹ºó£¬£¬£¬£¬¸Ã¹«Ë¾×îÏÈÊÕµ½ÀÕË÷µç×ÓÓʼþ£¬£¬£¬£¬ÒªÇóÖ§¸¶ÁùλÊýµÄ¼ÓÃÜÇ®±ÒÊê½ðÒÔ»»È¡²»¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£¡£¡£Secureworks»¹·¢Ã÷£¬£¬£¬£¬Nickel TapestryÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËAstrill VPN¡¢×¡Õ¬ÊðÀíºÍAnyDeskµÈ¹¤¾ß¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬£¬£¬³¯ÏʵÄITÊÂÇéÕß¾³£Ï໥е÷£¬£¬£¬£¬Ìá¹©ÍÆ¼ö£¬£¬£¬£¬Òò´Ë×éÖ¯ÔÚÕÐÆ¸Ô¶³ÌÊÂÇéÕßʱӦ¼á³ÖСÐÄ£¬£¬£¬£¬²¢×¢ÖØÚ²Æ¼£Ï󡣡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/undercover-north-korean-it-workers-now-steal-data-extort-employers/
5. BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¹¥»÷²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú²¢ÇÔÈ¡Êý¾Ý
10ÔÂ17ÈÕ£¬£¬£¬£¬BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô²¨Ê¿¶Ù¶ùͯ¿µ½¡Ò½Éú£¨BCHP£©·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬£¬£¬¸Ã×éÖ¯ÊÇÒ»¸öÓÉ300¶àÃû¶ù¿ÆÒ½ÉúºÍר¼Ò×é³ÉµÄÍøÂ磬£¬£¬£¬ÔÚŦԼºÍ¿µÄùµÒ¸ñÖݵĶà¸öËùÔÚÌṩҽÁÆÐ§ÀÍ¡£¡£¡£¡£¡£9ÔÂ6ÈÕ£¬£¬£¬£¬BCHPµÄIT¹©Ó¦ÉÌÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬¼¸Ììºó£¬£¬£¬£¬BCHP¼ì²âµ½ÆäÍøÂçÉÏÓÐδ¾ÊÚȨµÄ»î¶¯£¬£¬£¬£¬²¢Á¬Ã¦Æô¶¯ÁËÊÂÎñÏìÓ¦ÐÒ飬£¬£¬£¬°üÀ¨¹Ø±Õϵͳ×÷Ϊ±£»£»£»£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬ÍþвÐÐΪÕßÒÑ»ñµÃ¶ÔBCHPϵͳµÄδ¾ÊÚȨµÄ»á¼û£¬£¬£¬£¬²¢ÇÔÈ¡Á˰üÀ¨È«Ãû¡¢Éç»á°ü¹ÜºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƼͼ±àºÅ¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Õ˵¥ÐÅÏ¢ÒÔ¼°ÓÐÏÞµÄÖÎÁÆÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¡£¡£¡£¡£¡£µ«BCHPµÄµç×Ó²¡ÀúϵͳδÊÜÓ°Ï죬£¬£¬£¬ÓÉÓÚËüÃÇÍйÜÔÚµ¥¶ÀµÄÍøÂçÉÏ¡£¡£¡£¡£¡£È·ÈÏÊܵ½Ó°ÏìµÄСÎÒ˽¼Ò½«ÔÚ10ÔÂ25ÈÕ֮ǰÊÕµ½BCHPµÄÐÅ£¬£¬£¬£¬Ð¹Â¶SSNºÍ¼ÝÕÕµÄÈË»¹½«»ñµÃÐÅÓÃ¼à¿ØºÍ±£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢Éù³ÆÓµÓвÆÎñºÍÈËÁ¦×ÊÔ´Êý¾Ý¡¢µç×ÓÓʼþͨѶ¡¢Êý¾Ý¿âת´¢µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬µ«ÉÐδй¶ÈκÎÄÚÈÝ£¬£¬£¬£¬Ò²Î´Åû¶×îºóÏÞÆÚ£¬£¬£¬£¬Åú×¢ËûÃÇÈÔÏ£ÍûÓëBCHP¾ÙÐÐ̸ÅС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/
6. SideWinder APT×éÖ¯À©´ó¹¥»÷¹æÄ££¬£¬£¬£¬½ÓÄÉÐÂÐÍÖØ´ó¹¤¾ß°ü
10ÔÂ17ÈÕ£¬£¬£¬£¬Ò»¸öÃûΪSideWinderµÄÒÉËÆÓëÓ¡¶ÈÓйØÁªµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©ÐÐΪÕߣ¬£¬£¬£¬½üÆÚ¶ÔÖж«ºÍ·ÇÖ޵Ķà¸ö×ÅÃûʵÌåºÍÕ½ÂÔ»ù´¡ÉèÊ©·¢¶¯Á˹¥»÷¡£¡£¡£¡£¡£¸Ã×éÖ¯Ò²±»³ÆÎªAPT-C-17¡¢Baby ElephantµÈ¶à¸öÃû³Æ¡£¡£¡£¡£¡£Ö»¹ÜÆäʹÓùûÕæµÄÎó²îʹÓóÌÐòºÍ¶ñÒâÎļþ×÷ΪѬȾǰÑÔ£¬£¬£¬£¬¿´ËÆÊÖÒÕˮƽ½ÏµÍ£¬£¬£¬£¬µ«×ÐϸÆÊÎöÆäÐж¯Ï¸½Úºó£¬£¬£¬£¬·¢Ã÷ÆäÕæÊµÄÜÁ¦½ûֹСêï¡£¡£¡£¡£¡£¹¥»÷Ä¿µÄ°üÀ¨ÃϼÓÀ¹ú¡¢¼ª²¼ÌáµÈ¶à¸ö¹ú¼ÒµÄÕþ¸®ºÍ¾üÊÂʵÌå¡¢ÎïÁ÷¡¢»ù´¡ÉèÊ©ºÍµçÐŹ«Ë¾¡¢½ðÈÚ»ú¹¹µÈ¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬SideWinderʹÓöà½×¶ÎѬȾÁ´×ª´ïÁËÒ»¸öÃûΪStealerBotµÄºó¿ª·¢¹¤¾ß°ü£¬£¬£¬£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ×îÏÈ£¬£¬£¬£¬Ö´ÐÐһϵÁÐÏÂÔØ³ÌÐò£¬£¬£¬£¬×îÖÕ°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçϵͳÐÅÏ¢¡¢ÏÂÔØÆäËûÓÐÓøºÔØ£¬£¬£¬£¬²¢Í¨ÊºóÃżÓÔØÄ£¿£¿£¿£¿éÖ²ÈëStealerBot£¬£¬£¬£¬ÓÃÓÚÌØ¹¤»î¶¯£¬£¬£¬£¬ÈçÇÔÈ¡ÃÜÂë¡¢Îļþ¡¢¼Í¼»÷¼üµÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬SideWinderµÄµØÀíÁýÕÖ¹æÄ£Ò»Ö±À©´ó£¬£¬£¬£¬Ê¹ÓÃÁËеÄÖØ´ó¹¤¾ß°ü£¬£¬£¬£¬²¢Óë¾ÝÐÅÀ´×Ô°Í»ù˹̹µÄÍþвÐÐΪÕßAPT36½¨ÉèÁªÏµ¡£¡£¡£¡£¡£
https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html