°²¼òªҽÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶
Ðû²¼Ê±¼ä 2023-09-271¡¢°²¼òªҽÁÆ»ú¹¹BORNÔâµ½¹¥»÷Ô¼340ÍòÈ˵ÄÊý¾Ýй¶
¾Ý9ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬°²¼òªµÄÒ½ÁƱ£½¡»ú¹¹Better Outcomes Registration & Network(BORN)Ô¼340ÍòÈ˵ÄÊý¾Ýй¶¡£¡£¡£¡£¡£¸ÃÊÂÎñÔ´ÓÚClopʹÓÃProgress MOVEit TransferÈí¼þÖÐÎó²î(CVE-2023-34362)µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£BORNÓÚ5ÔÂ31ÈÕÊ×´ÎÒâʶµ½¸ÃÎÊÌ⣬£¬£¬£¬£¬£¬Ö®ºóµÄÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÑÇÔÈ¡°üÀ¨Ô¼340ÍòÈËÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬£¬ÆäÖÐÖ÷ÒªÊÇÐÂÉú¶ùºÍÓÐÉíÕչ˻¤Ê¿»¼Õߣ¬£¬£¬£¬£¬£¬ÕâЩÈËÔÚ2010Äê1ÔÂÖÁ2023Äê5ÔÂʱ´úʹÓÃÁËBORNЧÀÍ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/born-ontario-child-registry-data-breach-affects-34-million-people/
2¡¢RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄáµÄϵͳ²¢½«³öÊÛÆäÊý¾Ý
¾ÝýÌå9ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬RansomedVCÉù³ÆÒÑÈëÇÖË÷ÄἯÍŵÄϵͳ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«³öÊÛÆäÊý¾ÝºÍ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÓÉÓÚË÷Äá²»Ïë½»Êê½ð¡£¡£¡£¡£¡£RansomedVCÐû²¼µÄÑù±¾ºÜС£¬£¬£¬£¬£¬£¬Ô¼2MB£¬£¬£¬£¬£¬£¬°üÀ¨PPTÑÝʾÎĸ塢һЩJavaÔ´´úÂëÎļþºÍEclipse IDE½ØÍ¼µÈ¡£¡£¡£¡£¡£¸ÃÍÅ»ï³ÆÇÔÈ¡ÁË260 GBÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÊÔͼÒÔ250ÍòÃÀÔª³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£¡£ÁíÒ»¸öºÚ¿ÍÍÅ»ïMajorNelson³ÆRansomedVCÊÇÆ×Ó£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃǶԴ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¸ÃÍÅ»ïÐû²¼ÁË2.4 GBµÄѹËõÎļþ×÷ΪÑù±¾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨RansomedVCµÄÑù±¾ÖеÄËùÓÐÎļþ¡£¡£¡£¡£¡£Ë÷ÄáÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sony-investigates-cyberattack-as-hackers-fight-over-whos-responsible/
3¡¢Progressive LeasingÔâµ½¹¥»÷´ó×Ú¿Í»§µÄÐÅϢй¶
ýÌå9ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬Progressive LeasingÔâµ½¹¥»÷µ¼Ö´ó×Ú¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¡£ÕâÊÇÒ»¼Ò¼ÛÖµÊýÊ®ÒÚÃÀÔªµÄ¹«Ë¾£¬£¬£¬£¬£¬£¬ÔÊÐíÈËÃÇ×âÁÞÏûºÄÆ·¡£¡£¡£¡£¡£½²»°È˳ƣ¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²ÊÂÎñÓ°ÏìÁËProgressive LeasingµÄ²¿·Öϵͳ£¬£¬£¬£¬£¬£¬µ«Î´¶ÔÆäÔËÓªÔì³ÉÖØ´óÓ°Ï죬£¬£¬£¬£¬£¬ÏÖÔÚʱ¼äÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬AlphVÉù³Æ¶ÔÖÜÎåµÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬Òѽ«¸Ã¹«Ë¾Ìí¼Óµ½ÆäÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒÑÇÔÈ¡Áè¼Ý4000Íò¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£
https://therecord.media/product-leasing-giant-progressive-ransomware
4¡¢RhysidaÍÅ»ïÉù³Æ¶Ô¿ÆÍþÌØ²ÆÎñ²¿Ôâµ½µÄ¹¥»÷ÈÏÕæ
9ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïRhysida¶Ô¿ÆÍþÌØ²ÆÎñ²¿Ôâµ½µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬¿ÆÍþÌØ²ÆÎñ²¿ÔÚµ±Ìì·¢Ìû³ÆÒѹرÕÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ½øÒ»²½µÄ¹¥»÷¡£¡£¡£¡£¡£¸Ã²¿»¹È·ÈÏ£¬£¬£¬£¬£¬£¬Ð½×Êϵͳ²»»áÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬£¬ÓÉÓÚÕþ¸®µÄ²ÆÎñϵͳÊÇ×ÔÁ¦µÄ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã²¿ÉÐδ´ÓÀÕË÷¹¥»÷ÖÐÍêÈ«»Ö¸´£¬£¬£¬£¬£¬£¬ËûÃÇÈÔÔÚÊÓ²ì´Ë´ÎÊÂÎñ¡£¡£¡£¡£¡£RhysidaÔÚ±¾Öܽ«¸Ã»ú¹¹Ìí¼Óµ½ÆäÍøÕ¾ÖУ¬£¬£¬£¬£¬£¬»¹Ðû²¼ÁËÒ»×éÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£
https://securityaffairs.com/151501/cyber-crime/rhysida-ransomware-kuwait-ministry-of-finance.html
5¡¢ThreatFabricÅû¶Ö÷ÒªÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄXenomorph»î¶¯
ThreatFabricÔÚ9ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÁè¼Ý30¼ÒÃÀ¹ú½ðÈÚ»ú¹¹·Ö·¢XenomorphµÄ»î¶¯¡£¡£¡£¡£¡£XenomorphÓÚ2022ÄêÍ·Ê״ηºÆð£¬£¬£¬£¬£¬£¬Õë¶Ô56¼ÒÅ·ÖÞµÄÒøÐС£¡£¡£¡£¡£ÔÚ×îеĻÖУ¬£¬£¬£¬£¬£¬Í¨¹ýChromeä¯ÀÀÆ÷ÓÕʹĿµÄÏÂÔØ¶ñÒâAPK¡£¡£¡£¡£¡£Ã¿¸öXenomorphÑù±¾¶¼¼ÓÔØÁËԼĪһ°Ù¸öÁýÕֲ㣬£¬£¬£¬£¬£¬Õë¶Ô²î±ðµÄÒøÐкͼÓÃÜÓ¦ÓóÌÐò¡£¡£¡£¡£¡£ThreatFabric»¹»á¼ûÁËÍйÜpayloadµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨Medusa¡¢Cabassous¡¢RisePro¡¢LummaC2ÒÔ¼°Private Loader¡£¡£¡£¡£¡£
https://www.threatfabric.com/blogs/xenomorph
6¡¢Ñо¿Ö°Ô±ÏêÊöÕë¶ÔÎÚ¿ËÀ¼·Ö·¢MerlinAgentµÄ´¹ÂÚ¹¥»÷
9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬SecuronixÐû²¼±¨¸æÏêÊöÁËÕë¶ÔÎÚ¿ËÀ¼¾üÊ»ú¹¹µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã»î¶¯µÄ´úºÅΪSTARK#VORTEX£¬£¬£¬£¬£¬£¬ÒÔPICÎÞÈË»úÊÖ²áÎĵµ×÷ΪÓÕ¶ü·Ö·¢MerlinAgent£¬£¬£¬£¬£¬£¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0154¡£¡£¡£¡£¡£MerlinAgentÊÇÒ»¸öGo¿ª·¢µÄ¿ªÔ´C2¹¤¾ß°ü£¬£¬£¬£¬£¬£¬ÀàËÆÓÚCobalt Strike»òSliver¡£¡£¡£¡£¡£ÓÕ¶üÊÇMicrosoft×ÊÖúÎļþ(.chm)£¬£¬£¬£¬£¬£¬·¿ªºó»áÔËÐÐǶÈëµÄ¶ñÒâJavaScript£¬£¬£¬£¬£¬£¬ÒÔÖ´ÐÐPowerShell´úÂ룬£¬£¬£¬£¬£¬¸Ã´úÂë´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡»ìÏýµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£payload»áÏÂÔØMerlin Agent£¬£¬£¬£¬£¬£¬¶øMerlin AgentÓÖ±»ÉèÖÃΪÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬ÒÔÖ´Ðй¥»÷ºóµÄ»î¶¯£¬£¬£¬£¬£¬£¬´Ó¶øÓÐÓõØÕùÈ¡Ö÷»úµÄ¿ØÖÆÈ¨¡£¡£¡£¡£¡£
https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/


¾©¹«Íø°²±¸11010802024551ºÅ