¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2022-12-19
1¡¢¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå12ÔÂ16ÈÕ±¨µÀ£¬ £¬£¬£¬¸çÂ×±ÈÑÇÄÜÔ´¹«Ë¾Empresas P¨²blicas de Medell¨ªn(EPM)Ôâµ½ÁËBlackCat/ALPHVµÄÀÕË÷¹¥»÷£¬ £¬£¬£¬¹«Ë¾ÔËÓªÔÝʱÖÐÖ¹¡£¡£¡£¡£EPMÊǸçÂ×±ÈÑÇ×î´óµÄ¹«¹²ÄÜÔ´¡¢Ë®ºÍ×ÔÈ»Æø¹©Ó¦ÉÌÖ®Ò»£¬ £¬£¬£¬ÔÚ2022Äê´´Á¢ÁËÁè¼Ý250ÒÚÃÀÔªµÄÊÕÈë¡£¡£¡£¡£ÉÏÖܶþ£¬ £¬£¬£¬¸Ã¹«Ë¾ÒªÇóÔ¼4000ÃûÔ±¹¤¾Ó¼ÒÊÂÇ飬 £¬£¬£¬ÇÒIT»ù´¡Éèʩ̱»¾£¬ £¬£¬£¬¹«Ë¾µÄÍøÕ¾Ò²²»ÔÙ¿ÉÓᣡ£¡£¡£½øÒ»²½µÄÊÓ²ìÅú×¢£¬ £¬£¬£¬ºÚ¿Í¿ÉÄÜÒÑ´ÓEPMÇÔÈ¡ÁË´ó×ÚÊý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/


2¡¢²¿·ÖÓû§×°ÖÃWindows 10¸üкó»á·ºÆðÀ¶ÆÁËÀ»úÎÊÌâ

      

¾Ý12ÔÂ18ÈÕ±¨µÀ£¬ £¬£¬£¬Î¢ÈíÕë¶ÔWindows 10×°±¸µÄ¸üпÉÄܻᵼÖÂÀ¶ÆÁËÀ»ú¹ýʧ£¬ £¬£¬£¬¸Ã¹«Ë¾Ú¹ÊͳÆËüÒѾ­ÔÚ¾ÙÐÐÐÞ¸´¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬ £¬£¬£¬×°ÖÃKB5021233ºó£¬ £¬£¬£¬²¿·ÖWindows×°±¸Æô¶¯Ê±¿ÉÄÜ·ºÆð¹ýʧ£¨0xc000021a£©ÒÔ¼°À¶ÆÁ¡£¡£¡£¡£ÊÇÓÉÓÚ×°Öøüкó£¬ £¬£¬£¬c:/windows/system32ºÍc:/windows/system32/driversÖеÄhidparse.sysÎļþ°æ±¾¿ÉÄܲ»Æ¥Å䣬 £¬£¬£¬µ¼ÖÂÕûÀíʱÊðÃûÑé֤ʧ°Ü¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÌṩ»º½â·½·¨£¬ £¬£¬£¬²¢½¨ÒéÓû§²»ÒªÊµÑéÆäËüÐÞ¸´ÒªÁ죬 £¬£¬£¬ÀýÈçɾ³ýhidparse.sys£¬ £¬£¬£¬Õâ¿ÉÄÜ»áÍêÈ«ÆÆËðÅÌËã»ú¡£¡£¡£¡£Î¢ÈíÏÖÔÚÕý×ÅÊÖ½â¾öÕâ¸öÎÊÌ⣬ £¬£¬£¬Ã»ÓÐÔ¤¼ÆÍê³Éʱ¼ä¡£¡£¡£¡£


https://news.softpedia.com/news/microsoft-warns-of-windows-10-bsods-after-the-latest-updates-536675.shtml


3¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý

      

ýÌå12ÔÂ17Èճƣ¬ £¬£¬£¬ºÚ¿ÍÔÚ°µÍøÉϳöÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý¡£¡£¡£¡£Æ¾Ö¤Ñù±¾Îļþ£¬ £¬£¬£¬´Ë´ÎÊÂÎñй¶ÁËÓû§ID¡¢Ñù±¾ID¡¢ÐÕÃû¡¢ÊÖ»úºÅÂëºÍЧ¹ûÈÕÆÚµÈÐÅÏ¢¡£¡£¡£¡£ºÚ¿ÍÔÚÒ»¸öÌû×ÓÖÐÉù³ÆÇÔÈ¡ÁË5000¸öÓû§µÄÊý¾Ý£¬ £¬£¬£¬µ«ÔÚÁíÒ»¸öÌû×ÓÖÐ˵Ëû¿ÉÒÔ»á¼ûÁè¼Ý50Íò¸öÕË»§¡£¡£¡£¡£Êý¾ÝµÄÕæÊµÐÔÏÖÔÚ»¹Ã»Óб»Ö¤Êµ£¬ £¬£¬£¬È»¶øºÚ¿ÍËÆºõÖ»ÄÜ»á¼ûAndra Pradesh CoWINÃÅ»§µÄÆäÖÐÒ»¸öÖÎÀíÔ±ÕÊ»§£¬ £¬£¬£¬¶ø·Çϵͳ×Ô¼º¡£¡£¡£¡£


https://www.timesnownews.com/technology-science/hackers-selling-user-data-from-cowin-platform-on-darkweb-article-96301909/amp


4¡¢É罻ýÌåÆÊÎöÍøÕ¾Social BladeÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

      

¾Ý12ÔÂ16ÈÕ±¨µÀ£¬ £¬£¬£¬É罻ýÌåÆÊÎöÍøÕ¾Social Blade³ÆÆäÓû§µÄÐÅÏ¢Òѱ»Ð¹Â¶¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓоʹËÊÂÎñ·¢³ö¹ûÕæÍ¨¸æ£¬ £¬£¬£¬¶øÊÇÖ±½Óͨ¹ýÓʼþ֪ͨÓû§¡£¡£¡£¡£ÓʼþÖÐдµ½£¬ £¬£¬£¬12ÔÂ14Èոù«Ë¾ÊÕµ½ÁËDZÔÚÊý¾Ýй¶µÄ֪ͨ£¬ £¬£¬£¬¾ÝϤºÚ¿ÍÇÔÈ¡ÁËÆäÓû§Êý¾Ý¿â²¢ÊÔͼÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£Ñù±¾ÒÑÐû²¼£¬ £¬£¬£¬¾­Ö¤ÊµÊý¾ÝȷʵÊÇÕæÊµµÄ£¬ £¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÁËÍøÕ¾ÉϵÄÎó²îÀ´·ÃÊý¾Ý¿â¡£¡£¡£¡£Social Blade³Æ£¬ £¬£¬£¬Ð¹Â¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÐÅÏ¢£¬ £¬£¬£¬µ«°üÀ¨µç×ÓÓʼþ¡¢IPºÍ¼ÒÍ¥µØµã£¬ £¬£¬£¬ÒÔ¼°ÃÜÂëµÄ¹þÏ£Öµ¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/social-blade-confirms-data-breach/


5¡¢Nozomi·¢Ã÷¶ñÒâÈí¼þGluptebaÔÚÈ«Çò¹æÄ£ÄڵĹ¥»÷»î¶¯

      

NozomiÔÚ12ÔÂ15ÈÕ³ÆÆä·¢Ã÷ÁËGluptebaÔÚ¿ìÒªÒ»ÄêµÄÖÐÖ¹ºóÖØÐ»îÔ¾ÆðÀ´£¬ £¬£¬£¬Ñ¬È¾ÁËÈ«ÇòµÄ×°±¸¡£¡£¡£¡£2021Äê12Ô£¬ £¬£¬£¬¹È¸èÀÖ³ÉµØÆÆËðÁËÕâ¸öÖ§³ÖÇø¿éÁ´µÄ½©Ê¬ÍøÂ磬 £¬£¬£¬»ñµÃÁË¿ØÖƽ©Ê¬ÍøÂç»ù´¡ÉèÊ©µÄ·¨ÔºÏÂÁ £¬£¬£¬²¢¶ÔÁ½¸ö¶íÂÞ˹ÔËÓªÍÅ»ïÌáÆðËßËÏ¡£¡£¡£¡£Nozomi½üÆÚµÄÊÓ²ìÈ·¶¨ÁË4ÆðGlupteba¹¥»÷»î¶¯ÖÐʹÓõÄ15¸ö±ÈÌØ±ÒµØµã£¬ £¬£¬£¬×î½üÒ»´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬ £¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£ÓëÒÑÍùÏà±È£¬ £¬£¬£¬´Ë´Î»î¶¯Ê¹ÓÃÁ˸ü¶àµÄ±ÈÌØ±ÒµØµã£¬ £¬£¬£¬Ê¹½©Ê¬ÍøÂç¸ü¾ßµ¯ÐÔ¡£¡£¡£¡£


https://www.nozominetworks.com/blog/tracking-malicious-glupteba-activity-through-the-blockchain/


6¡¢Î¢ÈíÐû²¼¹ØÓÚеÄDDoS½©Ê¬ÍøÂçMCCrashµÄÆÊÎö±¨¸æ

      

12ÔÂ15ÈÕ£¬ £¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³Æ£¬ £¬£¬£¬Ò»ÖÖÃûΪMCCrashµÄÐÂÐÍ¿çÆ½Ì¨¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚѬȾWindows¡¢LinuxºÍÎïÁªÍø×°±¸£¬ £¬£¬£¬Ö¼ÔÚ¶ÔMinecraftЧÀÍÆ÷¾ÙÐÐDDoS¹¥»÷¡£¡£¡£¡£½©Ê¬ÍøÂçµÄ³õʼѬȾǰÑÔÊÇαÔìµÄWindowsÔÊÐíÖ¤µÄÆÆ½â¹¤¾ß£¬ £¬£¬£¬Ò»µ©ËüѬȾÁË×°±¸£¬ £¬£¬£¬¾Í¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âSSHƾ֤Èö²¥µ½ÍøÂçÉÏµÄÆäËüϵͳ¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬´ó´ó¶¼±»MCCrashѬȾµÄ×°±¸Î»ÓÚ¶íÂÞ˹£¬ £¬£¬£¬Æä´ÎÄ«Î÷¸ç¡¢Òâ´óÀûºÍÓ¡¶ÈµÈµØ¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2022/12/15/mccrash-cross-platform-ddos-botnet-targets-private-minecraft-servers/