INC RANSOM ´ÓËÕ¸ñÀ¼ NHS ÖÐÇÔÈ¡ 3TB µÄÊý¾Ý
Ðû²¼Ê±¼ä 2024-03-293ÔÂ27ÈÕ£¬INC ÀÕË÷ÀÕË÷ÍŻォËÕ¸ñÀ¼¹ú¼ÒÒ½ÁÆ·þÎñϵͳ (NHS) Ìí¼Óµ½Æä Tor й¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¸ÃÍøÂç·¸·¨×éÖ¯Éù³ÆÇÔÈ¡ÁË 3 TB µÄÊý¾Ý£¬²¢ÍþвҪй¶ÕâЩÊý¾Ý¡£ËÕ¸ñÀ¼µÄ NHS£¨¼´¹úÃñÒ½ÁÆ·þÎñϵͳ£©ÊÇΪËÕ¸ñÀ¼·þÎñµÄ¹«¹²×ÊÖúµÄÒ½ÁƱ£½¡ÏµÍ³¡£ËüÌṩÆÕ±éµÄÒ½ÁƱ£½¡·þÎñ£¬°üÀ¨Ò½Ôº¡¢È«¿ÆÒ½Éú (GP)¡¢ÐÄÀí¿µ½¡·þÎñºÍÉçÇøÒ½ÁƱ£½¡¡£ËÕ¸ñÀ¼Õþ¸®ÈÏÕæ¼àÊÓËÕ¸ñÀ¼µÄ NHS£¬ÆäÔË×÷ÓëÓ¢¸ñÀ¼¡¢Íþ¶ûÊ¿ºÍ±±°®¶ûÀ¼µÄ NHS ϵͳÍÑÀë¡£NHSScotland ÏÖÔÚÓµÓÐÔ¼ 140000 ÃûÔ±¹¤£¬ÂþÑÜÔÚ 14 ¸öµØÇø NHS ίԱ»á¡¢7 ¸ö NHS ÌØÊâίԱ»áºÍ 1 ¸ö¹«¹²ÎÀÉúÆø¹¹¡£Ã¿¸ö NHS ίԱ»á¶¼¶ÔËÕ¸ñÀ¼²¿³¤ÈÏÕ棬²¢»ñµÃËÕ¸ñÀ¼Õþ¸®ÎÀÉúºÍÉç»á±£½¡ÀíÊ»áµÄÖ§³Ö¡£µØÇø NHS ίԱ»áÈÏÕæ±£»¤ºÍ¸ÄÉÆÆäÈËÃñµÄ¿µ½¡²¢ÌṩһÏßÒ½ÁƱ£½¡·þÎñ¡£ÌØÊâ NHS ίԱ»áͨ¹ýÌṩһϵÁÐÖ÷ÒªµÄר¼ÒºÍ¹ú¼Ò·þÎñÀ´Ö§³ÖµØÇø NHS ίԱ»á¡£
https://securityaffairs.com/161143/data-breach/inc-ransom-hacked-national-health-service-of-scotland.html
2. Stork ¼à¿Ø¹¤¾ßÖеÄÎó²î¿ÉÄܵ¼Ö·þÎñÆ÷±»Ð®ÖÆ
2ÔÂ27ÈÕ£¬Çå¾²Ñо¿Ö°Ô±ÔÚ Stork Öз¢Ã÷ÁËÒ»¸öÑÏÖØÎó²î(CVE-2024-28872)£¬Stork ÊÇ Kea DHCP ·þÎñÆ÷µÄÊ¢ÐпªÔ´ÍøÂç¼à¿Ø¹¤¾ß¡£Õâ¸öȱÏÝ¿ÉÄܵ¼Ö¹¥»÷Õß¿ÉÄÜ»áЮÖÆ Stork ·þÎñÆ÷¡¢ÆÆËðÃô¸ÐÊý¾Ý²¢ÆÆËð»ù±¾ÍøÂç·þÎñ¡£¸ÃÎó²î±£´æÓÚ Stork ÑéÖ¤ TLS Ö¤ÊéµÄ·½·¨ÖС£¹¥»÷Õß¿ÉÒÔͨ¹ý´Ó Stork ·þÎñÆ÷»ñÈ¡ÓÐÓÃµÄ TLS Ö¤Ê鲢ʹÓÃËüÅþÁ¬µ½ Stork ÊðÀí£¨ÓëÊܼà¿Ø·þÎñÒ»ÆðÔËÐеÄÈí¼þ£©À´Ê¹ÓôËȱÏÝ¡£Ò»µ©½¨ÉèÅþÁ¬£¬¹¥»÷Õ߾ͿÉÒÔÏòÊܼà¿ØµÄ·þÎñ£¨ÀýÈç Kea »ò BIND 9£©·¢Ë;ßÓÐÌáÉýȨÏ޵ĶñÒâÏÂÁî¡£¾¡¿ì½« Stork ¸üе½×îеÄÐÞ²¹°æ±¾£¨1.15.1 »ò¸ü¸ß°æ±¾£©¡£
https://securityonline.info/cve-2024-28872-vulnerability-in-stork-monitoring-tool-could-enable-server-takeover/
3. WarzoneRAT ¾íÍÁÖØÀ´£¬°²ÅÅÖØ´óµÄ¶à½×¶Î¹¥»÷
3ÔÂ27ÈÕ£¬ WarzoneRAT£¨Ò²³ÆΪ Avemaria£©ÔÚ 2 ÔÂ·Ý FBI ¿ÛѺÆä»ù´¡ÉèÊ©µ¼Ö¶ÌÔÝÖÐÖ¹ºó¾íÍÁÖØÀ´¡£Æ¾Ö¤Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒµÄÒ»·Ýб¨¸æ(CRIL)£¬ÍþвÐÐΪÕßÏÖÔÚÕýÔÚÉñÃØ¡¢¶à½×¶Î¹¥»÷ÖÐÆð¾¢°²ÅÅÕâÖÖÔöÇ¿ÐÍ RAT¡£×îÐ嵀 WarzoneRATÔ˶¯Ö÷Ҫͨ¹ýÒÔË°ÊÕΪÖ÷ÌâµÄÀ¬»øÓʼþÀ´Õë¶ÔÊܺ¦Õߣ¬ÇÉÃîµØʹÓÃʵʱÇÒ¾³£ÒýÆð½¹ÂǵÄÖ÷ÌâÀ´ÔöÌíÓû§·¿ª¶ñÒ⸽¼þµÄ¿ÉÄÜÐÔ¡£WarzoneRAT µÄ¾íÍÁÖØÀ´ÌáÐÑÈËÃÇ£¬×ÝÈ»ÊÇÖÐÖ¹µÄ¶ñÒâÈí¼þ²Ù×÷Ò²¿ÉÄÜ»áѸËÙ»Ö¸´£¬²¢ÇÒͨ³£»áÒÔ¸üÖØ´óµÄÐÎʽ»Ö¸´¡£×Ô¶¯Ð¡Ðĺͷֲã·ÀÓùÕ½ÂÔ¹ØÓÚСÎÒ˽¼ÒºÍ×éÖ¯±£»¤×Ô¼ºÃâÊÜÕâÖÖһֱת±äµÄÍþвÖÁ¹ØÖ÷Òª¡£
https://securityonline.info/infamous-warzonerat-malware-returns-deploys-sophisticated-multi-stage-attacks/
4. ÒþÃصÄРGolang ľÂíʹÓÃÐéα֤Êé¾ÙÐÐÌÓ±ÜͨѶ
3ÔÂ27ÈÕ£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓà Golang ±à³ÌÓïÑÔ±àдµÄ½ÆÕ©µÄÐÂľÂí¡£ÕâÖÖÒõÏյĶñÒâÈí¼þ½ÓÄÉһϵÁÐÓÕÆÕ½ÂÔ£¬°üÀ¨µØÀí¼ì²éºÍ×°ÖÃÚ²ÆÐÔ¸ùÖ¤Ê飬ÒÔά³ÖÓëÆäÏÂÁîºÍ¿ØÖÆ (C2) ·þÎñÆ÷µÄÒþ²ØͨѶͨµÀ¡£ÕâÖÖÖØ´óµÄÌØÂåÒÁľÂíÊ×ÏÈÅÄÉãÊÜѬȾϵͳµÄ¿ìÕÕ£¬¿ÉÄÜ»áÍøÂçÓÐÕë¶ÔÐԵĹ¥»÷µÄÖ÷ÒªÐÅÏ¢¡£È»ºó£¬Ëü»á´óµ¨µØÔÚ Windows ×¢²á±íÖÐ×°ÖÃαÔìµÄ¸ùÖ¤Êé¡£Õâһа¶ñ°ì·¨Ê¹ÆäÄܹ»×èµ²²¢¿ÉÄÜʹÓüÓÃÜµÄ HTTPS Á÷Á¿£¬´Ó¶øʹÓû§ÈÝÒ×ÔâÊÜÊý¾Ý͵ÇÔ¡£ËäȻûÓÐÌض¨µÄ¶ñÒâÈí¼þ¼Ò×åÓë¸ÃľÂíÏà¹Ø£¬µ«Ñо¿Ö°Ô±ÖÒÑÔ˵£¬ÔÚ֮ǰÓë PureLog Stealer¡¢AgentTesla ºÍ GuLoader µÈÎÛÃûÕÑÖøµÄÍþвÏà¹ØµÄÔ˶¯ÖÐÒѾ·¢Ã÷ÁËËùÉæ¼°µÄ IP ºÍ URL µØµã¡£
https://securityonline.info/stealthy-new-golang-trojan-exploits-fake-certificates-for-evasive-communication/
5. CISA Ðû²¼ÍøÂçÊÂÎñ±¨¸æ¹æÔò²Ý°¸
3ÔÂ28ÈÕ£¬ÃÀ¹ú×î¸ßÍøÂçÇå¾²»ú¹¹Ðû²¼ÁËÒ»ÏîйæÔòµÄ³õ¸å£¬Ïêϸ˵Ã÷ÎúÒªº¦»ù´¡ÉèÊ©×éÖ¯ÐèÒªÔõÑùÏòÁª°îÕþ¸®±¨¸æÍøÂç¹¥»÷¡£ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ƾ֤¡¶Òªº¦»ù´¡ÉèÊ©ÍøÂçÊÂÎñ±¨¸æ·¨¡·Ïò¡¶Áª°î¹«±¨¡·Ðû²¼ÁË447 Ò³µÄ¹æÔò£¬ÔÊÐí¹«ÖÚ¶ÔÆä½ÒÏþ̸ÂÛ¡£ÁìÍÁÇå¾²²¿²¿³¤ÑÇÀúº¼µÂÂÞ¡¤ÂíÔ¼¿¨Ë¹ÌåÏÖ£¬ÕâЩÐÅÏ¢½«Ê¹ CISA ºÍÆäËû»ú¹¹Äܹ»¸üºÃµØÓ¦¶ÔÊÂÎñ²¢ÕÒ³öÃÀ¹úÒªº¦»ù´¡ÉèÊ©Öеı¡Èõ»·½Ú¡£CIRCIA ÒªÇóijЩҪº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ 72 СʱÄÚ±¨¸æÍøÂçÊÂÎñ£¬²¢ÔÚ 24 СʱÄÚ±¨¸æÀÕË÷Èí¼þ¸¶¿î¡£¸ÃÖ´·¨º¸ÇµÄÊÂÎñ°üÀ¨¡°¶Ô×éÖ¯µÄÔË×÷ÄÜÁ¦»ò¹ú¼ÒÇå¾²¡¢¹«¹²¿µ½¡»òÇå¾²Ôì³ÉÖØ´óË𺦻ò×é³ÉÖØ´óÍþв¡±µÄÊÂÎñ¡£
https://therecord.media/cisa-publishes-circia-rule-cyber-incident-reporting
6. µÂ¿ËÈø˹ÖݺÍ×ôÖÎÑÇÖݵÄÊÐÕþ·þÎñÔâµ½ÀÕË÷¹¥»÷
3ÔÂ28ÈÕ£¬ÃÀ¹ú¸÷µØµÄ¹ú¼Ò»ú¹¹¼ÌÐøÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄ×ÌÈÅ¡£×ôÖÎÑÇÖݼª¶ûĬÏØÕþ¸®ÔÚÆäÍøÕ¾ÉÏÐû²¼Í¨Öª£¬ÖÒÑÔÀÕË÷Èí¼þ¹¥»÷ÕýÔÚÓ°ÏìÆäÏò 30000 ¶àÃûסÃñÌṩ·þÎñµÄÄÜÁ¦¡£¡°¼ª¶ûĬÏØ×î½ü·¢Ã÷²¢ÏìÓ¦ÁËÀÕË÷Èí¼þÊÂÎñ£¬²¢ÒÑʹÊÜÓ°ÏìµÄϵͳÀëÏߣ¬Í¬Ê±ÎÒÃÇÖÂÁ¦ÓÚÇå¾²µØ±£»¤ºÍ»Ö¸´·þÎñ¡£Óë´Ëͬʱ£¬¹«ÖÚÓ¦¸ÃÔ¤ÍƲâÏØÕþ¸®»áÒò´ËÔì³ÉÑÓÎ󡣡±Í¨Öª³Æ¡£¼ª¶ûĬÏØÏòÁª°îÖ´·¨²¿·Ö·¢³öÁ˾¯±¨£¬²¢Ô¼ÇëÁËÒ»¼ÒÍøÂçÇå¾²¹«Ë¾À´½â¾ö´Ë´Î¹¥»÷Ôì³ÉµÄÖÐÖ¹ÎÊÌâ¡£¸»¶û¶ÙÏØÊÇÑÇÌØÀ¼´óµÄËùÔڵأ¬ÔÚ 1 Ô·ÝÔâÊÜ LockBit ÀÕË÷Èí¼þÍŻ﹥»÷ºó£¬¸ÃÏØÈÔÔÚ»Ö¸´Òªº¦·þÎñ¡£
https://therecord.media/texas-georgia-municipalities-face-disruptions-from-ransomware