FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷

Ðû²¼Ê±¼ä 2024-06-06

1. FRONTIER COMMUNICATIONSÔâµ½ºÚ¿ÍÍÅ»ïRANSOMHUBµÄ¹¥»÷


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬RansomHub ÀÕË÷Èí¼þ×éÖ¯Éù³ÆÇÔÈ¡ÁËÃÀ¹úµçÐŹ«Ë¾ Frontier Communications Áè¼Ý 200 Íò¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£RansomHub ×éÖ¯Éù³ÆÇÔÈ¡ÁËÕâ¼ÒµçОÞÍ·µÄ 5GB Êý¾Ý¡£¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢Éç»á°ü¹ÜºÅ¡¢ÐÅÓᢷÖÊý¡¢³öÉúÈÕÆÚºÍµç»°ºÅÂë¡£¡£¡£¡£¡£½ñÄê 4 Ô£¬£¬£¬ £¬£¬£¬Frontier Communications֪ͨÃÀ¹ú֤ȯÉúÒâίԱ»á (SEC)£¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÔÚÔâÓöÍøÂç¹¥»÷ºó±ØÐè¹Ø±ÕijЩϵͳ¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ 4 Ô 14 ÈÕ±»·¢Ã÷£¬£¬£¬ £¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇÒ»Ãûδ¾­ÊÚȨµÄÍþвÐÐΪÕßδ¾­ÊÚȨ»á¼ûÁ˸ù«Ë¾µÄ²¿·Ö IT ÇéÐΡ£¡£¡£¡£¡£¸Ã¹«Ë¾¶Ô¸ÃÇå¾²Îó²îÕö¿ªÁËÊӲ죬£¬£¬ £¬£¬£¬²¢½ÓÄÉÐж¯¿ØÖÆÊÂÎñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬£¬ £¬£¬£¬Ò²ÉÐδ͸¶ÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£RansomHub Ðû²¼Á˱»µÁ¼Í¼µÄͼƬ×÷ΪÊý¾Ýй¶µÄÖ¤¾Ý£¬£¬£¬ £¬£¬£¬²¢Íþв˵£¬£¬£¬ £¬£¬£¬ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬ £¬£¬£¬ËûÃǽ«Ðû²¼±»µÁÊý¾Ý¡£¡£¡£¡£¡£


https://securityaffairs.com/164126/data-breach/ransomhub-gang-hacked-frontier-communications.html


2. Ñо¿ÍŶӷ¢Ã÷ͨ¹ý¶ñÒâExcel¹¥»÷ÎÚ¿ËÀ¼µÄWindowsÓû§


6ÔÂ5ÈÕ£¬£¬£¬ £¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÕýÊÔͼÔÚÎÚ¿ËÀ¼Óû§µÄ Windows ϵͳÉϰ²ÅÅ Cobalt Strike ºóÎó²îʹÓù¤¾ß°ü¡£¡£¡£¡£¡£Fortinet µÄÑо¿Ö°Ô±ÔÚ±¾ÖܵÄһƪ²©¿ÍÎÄÕÂÖÐÌåÏÖ£¬£¬£¬ £¬£¬£¬¸Ã»î¶¯µÄÖØµãËÆºõÊÇÍêȫԶ³Ì¿ØÖÆÄ¿µÄϵͳ£¬£¬£¬ £¬£¬£¬ÒÔ±ãδÀ´°²ÅÅÓÐÓÃÔØºÉ²¢¿ÉÄÜÓÃÓÚÆäËû¶ñÒâÄ¿µÄ¡£¡£¡£¡£¡£Çå¾²¹©Ó¦É̳Æ£¬£¬£¬ £¬£¬£¬ÍþвÕßʹÓôøÓÐǶÈëʽ Visual Basic Ó¦ÓóÌÐò (VBA) ºêµÄÎÚ¿ËÀ¼Ö÷Ìâ Excel Îļþ×÷Ϊ³õʼÓÕ¶ü¡£¡£¡£¡£¡£ÈôÊDz»ÉóÉ÷µÄÓû§ÆôÓøú꣬£¬£¬ £¬£¬£¬Ëü»áÔÚÊܺ¦ÕßϵͳÉϰ²ÅŶ¯Ì¬Á´½Ó¿â (DLL) ÏÂÔØ³ÌÐò£¨Í¨¹ý ConfuserEX ¿ªÔ´¹¤¾ß¾ÙÐлìÏý£©¡£¡£¡£¡£¡£DLL ÏÂÔØ³ÌÐòÊ×ÏÈÒª×öµÄÒ»¼þʾÍÊDzéÕÒÊÜѬȾϵͳÉÏÊÇ·ñ±£´æ·À²¡¶¾ºÍÆäËû¶ñÒâÈí¼þ¼ì²â¹¤¾ß¡£¡£¡£¡£¡£ÈôÊÇÏÂÔØ³ÌÐò¼ì²âµ½±£´æ£¬£¬£¬ £¬£¬£¬Ëü»áÁ¬Ã¦ÖÕÖ¹½øÒ»²½µÄ»î¶¯¡£¡£¡£¡£¡£²»È»£¬£¬£¬ £¬£¬£¬Ëü»áʹÓà Web ÇëÇó´ÓÔ¶³ÌλÖÃÌáÈ¡ÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£DLL ÏÂÔØ³ÌÐòµÄÉè¼ÆÊ¹ÆäÖ»ÄÜÔÚλÓÚÎÚ¿ËÀ¼µÄ×°±¸ÉÏÏÂÔØµÚ¶þ½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£È»ºó£¬£¬£¬ £¬£¬£¬ÏÂÔØ³ÌÐò»áÖ´ÐÐһϵÁа취£¬£¬£¬ £¬£¬£¬µ¼Ö Cobalt Strike °²Åŵ½Êܺ¦Õß×°±¸ÉÏ¡£¡£¡£¡£¡£


https://news.hitb.org/content/ukrainian-systems-hit-cobalt-strike-malicious-excel-file


3. SYNNOVIS ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬Ó°ÏìÂ׶صĶà¼ÒÒ½Ôº


6ÔÂ5ÈÕ£¬£¬£¬ £¬£¬£¬Synnovis ÊǸÇÒÁºÍÊ¥ÍÐÂí˹ NHS »ù½ð»áÐÅÍС¢Â׶عúÍõѧԺҽԺ NHS ÐÅÍÐÒÔ¼°Å·ÖÞ×î´óµÄÒ½ÁƼì²âºÍÕï¶ÏÌṩÉÌ SYNLAB Ö®¼äµÄ²¡ÀíѧÏàÖúͬ°é¹ØÏµ¡£¡£¡£¡£¡£Synnovis ÔÚÆäÍøÕ¾ÉÏÐû²¼µÄһƪÎÄÕÂÖÐÅû¶£¬£¬£¬ £¬£¬£¬ÆäÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£¡£¡£¡£¡£Õâ¼Ò²¡ÀíѧºÍÕï¶ÏЧÀÍÌṩÉÌÔÚ NHS ר¼ÒµÄ×ÊÖú϶ÔÇå¾²Îó²îÕö¿ªÁËÊӲ졣¡£¡£¡£¡£×¨¼ÒÃÇÕýÔÚÆð¾¢ÖÜÈ«ÆÀ¹À¹¥»÷µÄÓ°Ï죬£¬£¬ £¬£¬£¬²¢½ÓÄÉÊʵ±²½·¥×èÖ¹ÊÂÎñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾»¹Ðû²¼£¬£¬£¬ £¬£¬£¬ËûÃÇÕýÔÚÓë NHS Trust ÏàÖúͬ°éÇ×½üÏàÖú£¬£¬£¬ £¬£¬£¬ÒÔÖ»¹ÜïÔÌ­¶Ô»¼ÕßºÍÆäËûЧÀÍÓû§µÄÓ°Ïì¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÉÐδÌṩÓйش˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÀýÈçѬȾÆäϵͳµÄ¶ñÒâÈí¼þ¼Ò×åÒÔ¼°ÊÇ·ñÔâÊÜÊý¾Ýй¶¡£¡£¡£¡£¡£4Ô£¬£¬£¬ £¬£¬£¬SYNLAB¼¯ÍÅÒâ´óÀû·Ö¹«Ë¾Synlab ItaliaÒòÔâÊÜBlackbastaÍøÂç¹¥»÷¶øÏÝÈëÍ£Áô¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÝÍ£ÁËÒâ´óÀû²ÉÑùµã¡¢Ò½ÁÆÖÐÐĺÍʵÑéÊÒµÄËùÓл¡£¡£¡£¡£¡£


https://securityaffairs.com/164142/cyber-crime/ransomware-attack-synnovis-london-hospitals.html


4. BianLian й¶Êý¾Ýºó£¬£¬£¬ £¬£¬£¬°Ä´óÀûÑÇ¿óÒµ¹«Ë¾Åû¶Υ¹æÐÐΪ


6ÔÂ5ÈÕ£¬£¬£¬ £¬£¬£¬±±·½¿óÒµ¹«Ë¾ÔçЩʱ¼äÐû²¼Í¨¸æÖÒÑԳƣ¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÔâÓöÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ £¬£¬£¬µ¼Ö²¿·Ö±»µÁÊý¾Ý±»Ðû²¼ÔÚ°µÍøÉÏ¡£¡£¡£¡£¡£Northern Minerals ÊÇÒ»¼Ò°Ä´óÀûÑǹ«Ë¾£¬£¬£¬ £¬£¬£¬×¨×¢ÓÚ¿±Ì½ºÍ¿ª·¢ÖØÏ¡ÍÁÔªËØ (HRE)£¬£¬£¬ £¬£¬£¬ÌØÊâÊÇïáºÍï«£¬£¬£¬ £¬£¬£¬ÓÃÓÚµç×Ó¡¢µç³ØºÍ·É»ú¡£¡£¡£¡£¡£¸Ã¹«Ë¾¶Ô°Ä´óÀûÑÇÕþ¸®À´Ëµ¾ßÓÐÖÁ¹ØÖ÷ÒªµÄÕ½ÂÔÒâÒ壬£¬£¬ £¬£¬£¬×î½ü°Ä´óÀûÑÇÕþ¸®ºôÓõÖйú¹É¶«³öÊÛÆäÔÚ¸ÃÏ¡ÍÁ¿ó¹«Ë¾µÄ¹É·Ý¾Í֤ʵÎúÕâÒ»µã¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ°Ä´óÀûÑÇ֤ȯÉúÒâËù (ASX) ¹ûÕæÉúÒ⣬£¬£¬ £¬£¬£¬¹ÉƱ´úÂëΪ¡°NTU¡±£¬£¬£¬ £¬£¬£¬Òò´ËÓÐÖ´·¨ÒåÎñʵʱÅû¶ÈκÎÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾½ñÌìÅû¶£¬£¬£¬ £¬£¬£¬ÆäϵͳÖеÄÊý¾ÝÓÚ 2024 Äê 3 ÔÂÏÂÑ®±»ÇÔÈ¡£¬£¬£¬ £¬£¬£¬ËæºóÐû²¼ÔÚ°µÍøÉÏ£¬£¬£¬ £¬£¬£¬µ«Ã»ÓÐÍ¸Â¶ÕØÊÂÕßµÄÃû×Ö¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬ £¬£¬£¬Òѽ«´Ëʼû¸æ°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐĺͰĴóÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¬£¬£¬ £¬£¬£¬Í¬Ê±»¹½«Í¨¹ý¸öÐÔ»¯Í¨Öª¼û¸æÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/australian-mining-company-discloses-breach-after-bianlian-leaks-data/


5. ÐÂÐÍ V3B ÍøÂç´¹ÂÚ¹¤¾ß°üÃé×¼ 54 ¼ÒÅ·ÖÞÒøÐеĿͻ§


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ Telegram ÉÏÍÆ¹ãÒ»ÖÖÃûΪ¡°V3B¡±µÄÐÂÐÍÍøÂç´¹ÂÚ¹¤¾ß°ü£¬£¬£¬ £¬£¬£¬ÏÖÔڸù¤¾ß°üµÄÄ¿µÄÊǰ®¶ûÀ¼¡¢ºÉÀ¼¡¢·ÒÀ¼¡¢°ÂµØÀû¡¢µÂ¹ú¡¢·¨¹ú¡¢±ÈÀûʱ¡¢Ï£À°¡¢Â¬É­±¤ºÍÒâ´óÀûµÄ 54 ¼ÒÖ÷Òª½ðÈÚ»ú¹¹µÄ¿Í»§¡£¡£¡£¡£¡£¸ÃÍøÂç´¹ÂÚ¹¤¾ß°üµÄ¼ÛÇ®ÔÚÿÔ 130 ÖÁ 450 ÃÀÔªÖ®¼ä£¬£¬£¬ £¬£¬£¬Ïêϸȡ¾öÓÚ¹ºÖõÄÄÚÈÝ£¬£¬£¬ £¬£¬£¬¾ßÓи߼¶»ìÏý¡¢ÍâµØ»¯Ñ¡Ïî¡¢OTP/TAN/2FA Ö§³Ö¡¢ÓëÊܺ¦ÕßµÄʵʱ̸ÌìÒÔ¼°ÖÖÖÖÌӱܻúÖÆ¡£¡£¡£¡£¡£¾Ý·¢Ã÷ V3B µÄ Resecurity Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬£¬Æä Telegram ƵµÀÒѾ­ÓµÓÐÁè¼Ý 1,250 Ãû³ÉÔ±£¬£¬£¬ £¬£¬£¬ÕâÅúעеÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ (PhaaS) ƽ̨ÕýÔÚÍøÂç·¸·¨ÁìÓòѸËÙ»ñµÃ¹Ø×¢¡£¡£¡£¡£¡£V3B ÔÚ×Ô½ç˵ CMS ÉÏʹÓø߶ȻìÏýµÄ JavaScript ´úÂëÀ´Ìӱܷ´ÍøÂç´¹ÂÚºÍËÑË÷ÒýÇæ»úеÈ˵ļì²â²¢±ÜÃâÑо¿Ö°Ô±µÄ¹¥»÷¡£¡£¡£¡£¡£Ëü°üÀ¨·ÒÀ¼Óï¡¢·¨Óï¡¢Òâ´óÀûÓï¡¢²¨À¼ÓïºÍµÂÓïµÈ¶àÖÖÓïÑÔµÄרҵ·­ÒëÒ³Ãæ£¬£¬£¬ £¬£¬£¬ÒÔÔöÇ¿ÍøÂç´¹ÂÚ¹¥»÷µÄÓÐÓÃÐÔ£¬£¬£¬ £¬£¬£¬Ê¹ÍþвÐÐΪÕßÄܹ»¿ªÕ¹¶à¹ú»î¶¯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-v3b-phishing-kit-targets-customers-of-54-european-banks/


6. ºÚ¿ÍÍÅ»ïͨ¹ý DM ¹¥»÷¸ß×ÅÃû¶ÈµÄ TikTok Óû§


6ÔÂ5ÈÕ£¬£¬£¬ £¬£¬£¬TikTok ÌåÏÖ£¬£¬£¬ £¬£¬£¬ÏÖÔÚÕýÔÚ½ÓÄɲ½·¥Ìá·ÀÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬¸Ã¹¥»÷ͨ¹ýÖ±½ÓÐÂÎÅÕë¶ÔһЩ×ÅÃûÓû§£¬£¬£¬ £¬£¬£¬ÊÔÍ¼Ð®ÖÆËûÃǵÄÕË»§¡£¡£¡£¡£¡£TikTok Òþ˽ºÍÇå¾²ÍŶӽ²»°ÈË Jason Grosse ÌåÏÖ£º¡°ÎÒÃÇÒѽÓÄɲ½·¥×èÖ¹´Ë´Î¹¥»÷£¬£¬£¬ £¬£¬£¬²¢±ÜÃâδÀ´Ôٴα¬·¢¡£¡£¡£¡£¡£ÎÒÃÇÕýÔÚÓëÊÜÓ°ÏìµÄÕË»§ËùÓÐÕßÖ±½ÓÏàÖú£¬£¬£¬ £¬£¬£¬ÒÔÔÚÐëҪʱ»Ö¸´»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡±Grosse ÌåÏÖ£¬£¬£¬ £¬£¬£¬TikTok ÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷£¬£¬£¬ £¬£¬£¬ÏÖÔÚÎÞ·¨¾ÍÆä¹æÄ£»£»£»£» £»òÅÓºéˮƽ½ÒÏþ̸ÂÛ£¬£¬£¬ £¬£¬£¬³Æ¸ÃÍþв½ö½öÊÇ¡°Ç±ÔÚµÄÎó²î¡±¡£¡£¡£¡£¡£TikTok ÈϿɴËÊÂ֮ǰ£¬£¬£¬ £¬£¬£¬ÖܶþÓб¨µÀ³Æ£¬£¬£¬ £¬£¬£¬CNN µÄÕ˺ÅÉÏÖÜÔø±»ÔÝʱÈëÇÖ¡£¡£¡£¡£¡£Semafor Ô®Òý¸ÃÐÂÎÅ»ú¹¹Ò»Î»ÄäÃûÐÂÎÅÈËÊ¿µÄ»°³Æ£¬£¬£¬ £¬£¬£¬´Ë´ÎÈëÇÖ¡°Ëƺõ²»ÊÇÓÐÈË´Ó CNN ÄÇÀï»ñµÃ»á¼ûȨÏÞµÄЧ¹û¡±¡£¡£¡£¡£¡£CNN ûÓÐÁ¬Ã¦»ØÓ¦¡¶Á¬Ïß¡·ÔÓÖ¾µÄÖÃÆÀÇëÇ󡣡£¡£¡£¡£¼øÓÚ½ñÄêÇïÌì¼´½«¾ÙÐеÄ×Üͳ´óÑ¡£¬£¬£¬ £¬£¬£¬ÈËÃǶÔÃÀ¹úÐÂÎÅ»ú¹¹Ôâµ½ºÚ¿Í¹¥»÷µÄµ£ÐÄÓÈÆä¸ßÕÇ¡£¡£¡£¡£¡£


https://news.hitb.org/content/tiktok-hack-targets-high-profile-users-dms