¼ÓÄôóBCÊ¡µÄ¶à¸öÕþ¸®ÏµÍ³Ôâµ½ºÚ¿Í¹¥»÷
Ðû²¼Ê±¼ä 2024-05-145ÔÂ12ÈÕ£¬²»Áе߸çÂ×±ÈÑÇÊ¡¹«¹²·þÎñÈÏÕæÈËÐû²¼£¬¸ß¶ÈÈ·ÐÅÓйú¼Ò»ò¹ú¼Ò×ÊÖúµÄ¹¥»÷ÕßÊÔͼÔÚÍøÂç¹¥»÷ÖÐÆÆËðÕþ¸®ÏµÍ³¡£Ã»ÓÐÖ¤¾ÝÅú×¢ÍøÂç¹¥»÷ÀֳɻñÈ¡ÁËÃô¸ÐÐÅÏ¢£¬Ò²Ã»ÓÐÌá³öÊê½ðÒªÇó¡£Salter ÌåÏÖ£¬¶ÔÍøÂç¹¥»÷µÄÊӲ콫¼ÌÐø¾ÙÐУ¬²¢Ç¿µ÷ÕýÔÚÆÊÎöÁè¼Ý 40 TB µÄÊý¾Ý£¬±ÈÃÀ¹ú¹ú»áͼÊé¹ÝÉúÑĵÄÊý¾Ý»¹Òª¶à¡£ÏÖÔÚÍøÂç¹¥»÷±³ºóµÄÄîÍ·ÈÔ²»ÇåÎú¡£¸ÃÊ¡Ê×ϯÐÅÏ¢¹ÙÒÑָʾ¹«¹²·þÎñÔ±¹¤¸ü¸ÄÃÜÂ룬ÒÔ¡°È·±£Õþ¸®µç×ÓÓʼþϵͳµÄÇå¾²¡±¡£BC ͼÊé¹ÝÌåÏÖ£¬¸Ã»ú¹¹Ò²³ÉΪһÃûºÚ¿ÍµÄ¹¥»÷Ä¿µÄ£¬¸ÃºÚ¿ÍÍþв³Æ£¬ÈôÊDz»Ö§¸¶Êê½ð£¬¾Í»áй¶Óû§Êý¾Ý¡£
https://www.cbc.ca/news/canada/british-columbia/bc-government-cyberattack-state-actor-1.7200735
2. ³¯ÏʺڿͰ²ÅŶñÒâÈí¼þDurianÃé×¼¼ÓÃÜÇ®±Ò¹«Ë¾
5ÔÂ13ÈÕ£¬¾Ý±¨µÀ£¬³¯ÏʺڿÍÕýÔÚʹÓÃÒ»ÖÖÃûΪDurianµÄÒýÈËעĿµÄжñÒâÈí¼þ±äÌå¶Ôº«¹ú¼ÓÃÜÇ®±Ò¹«Ë¾Ìᳫ¹¥»÷¡£Æ¾Ö¤ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ù 5 Ô 9 ÈÕµÄÍþв±¨¸æ£¬³¯ÏʺڿÍ×éÖ¯ Kimsuky ʹÓÃжñÒâÈí¼þ¶ÔÖÁÉÙÁ½¼Ò¼ÓÃÜÇ®±Ò¹«Ë¾¾ÙÐÐÁËһϵÁÐÓÐÕë¶ÔÐԵĹ¥»÷¡£ÕâÊÇͨ¹ýʹÓú«¹ú¼ÓÃܹ«Ë¾×¨ÓõÄÕýµ±Çå¾²Èí¼þ¾ÙÐÐÒ»Á¬¹¥»÷À´Íê³ÉµÄ¡£ÒÔǰδ֪µÄ Durian ¶ñÒâÈí¼þ³äµ±×°ÖóÌÐò£¬°²ÅÅÒ»Á¬µÄ¶ñÒâÈí¼þÁ÷£¬°üÀ¨ÃûΪAppleSeedµÄºóÃÅ¡¢ÃûΪ LazyLoad µÄ×Ô½ç˵ÊðÀí¹¤¾ßÒÔ¼° Chrome Ô¶³Ì×ÀÃæµÈÆäËûÕýµ±¹¤¾ß¡£
https://news.hitb.org/content/north-korean-hackers-deploy-durian-malware-targeting-crypto-firms
3. ¶íÂÞ˹ºÚ¿ÍЮÖÆÎÚ¿ËÀ¼µçÊǪ́µÄÐźÅת²¥Ê¤ÀûÈÕÔıø
5ÔÂ11ÈÕ£¬ºÚ¿ÍЮÖÆÁ˼¸¼ÒÎÚ¿ËÀ¼µçÊÓƵµÀ£¬×ª²¥ÄªË¹¿ÆʤÀûÈÕÓÎÐУ¬¼ÍÄî¶þÕ½ÖÐÄÉ´âµÂ¹úµÄÕ½°Ü¡£¾ÝÎÚ¿ËÀ¼ÈÏÕæµçÊӺ͹㲥µÄ»ú¹¹ Nacrada ³Æ£¬ºÚ¿ÍЮÖÆÁËÐǹâýÌåÆìÏÂÖÁÉÙ 15 ¸öµçÊÓƵµÀµÄ¹ã²¥¡£¸Ã»ú¹¹ÌåÏÖ£¬ºÚ¿Í×ÌÈÅÁˬɱ¤ SES ¹«Ë¾ÓµÓкÍÔËÓªµÄ Astra ͨѶÎÀÐǵÄÔËÐС£ÄÉ¿ËÀ´ïÌåÏÖ£¬Æ¾Ö¤ SES µÄ˵·¨£¬´ËÀà¸ÉÔ¤¡°Ò»Ö±ÔÚ±¬·¢¡±£¬²¢ÇÒͨ³£À´×Ô¶íÂÞ˹¡£ÎÚ¿ËÀ¼½¨Òé¹ã²¥¹«Ë¾Ê¹Óá°Ìæ»»ÒªÁ족ÎüÊÕÐźŲ¢ÊµÊ±ÏìÓ¦¸ÉÔ¤²½·¥¡£ÀÍÑάÑǹú¼Òµç×ÓýÌåίԱ»á (NEPLP) Ö÷ϯÒÁÍ߶û˹¡¤°¢²©ÁÖ˹ (Ivars Abolins) ÌåÏÖ£¬ÖÜËÄ£¬ºÚ¿Í»¹Ð®ÖÆÁËÀÍÑάÑǵçÊÓÍøÂç Balticom À´×ª²¥ÄªË¹¿ÆµÄÔıøʽ¡£¾Ý NEPLP ³Æ£¬Balticom ×Ô¼ºµÄ»ù´¡ÉèÊ©²¢Î´Êܵ½Ë𺦣¬µ«ÍøÂç¹¥»÷Õë¶ÔµÄÊÇ Balticom λÓÚ±£¼ÓÀûÑǵĻ¥¶¯µçÊÓ·þÎñÆ÷¡£
https://therecord.media/russian-hackers-hijack-ukraine-tv
4. Ñо¿ÍŶӷ¢Ã÷Caretoʱ¸ô 10 Äêºó¾íÍÁÖØÀ´
5ÔÂ11ÈÕ£¬Ê®¶àÄêÀ´Ê§×ٵĸ߼¶Ò»Á¬Íþв (APT) ×é֯ͻȻÔÚÕë¶ÔÀ¶¡ÃÀÖÞºÍÖзÇ×éÖ¯µÄÍøÂçÌع¤Ô˶¯ÖÐÖØзºÆ𡣸Ã×éÖ¯ÃûΪ¡°Careto¡±»ò¡° The Mask ¡±£¬ÓÚ 2007 Äê×îÏÈÔË×÷£¬È»ºóÔÚ 2013 ÄêËƺõÏûÊŵÃÎÞÓ°ÎÞ×Ù¡£ÔÚ´Ëʱ´ú£¬Õâ¸ö½²Î÷°àÑÀÓïµÄÍþвÐÐΪÕßÔÚÃÀ¹ú¡¢Ó¢¹úµÈ 31 ¸ö¹ú¼Ò/µØÇøÔì³ÉÁËÔ¼ 380 Ãû²î±ðµÄÊܺ¦Õß¡£¿¨°Í˹»ùÑо¿Ö°Ô±ÔÚ 10 ÄêÇ°×·×Ù¹ý Careto£¬×î½üÒ²·¢Ã÷ÁËËüµÄй¥»÷£¬ËûÃÇ·¢Ã÷Careto ֮ǰµÄÊܺ¦Õß°üÀ¨Õþ¸®»ú¹¹¡¢Íâ½»»ú¹¹ºÍ´óʹ¹Ý¡¢ÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»Æø¹«Ë¾¡¢Ñо¿»ú¹¹ºÍ˽ļ¹ÉȨ¹«Ë¾¡£
https://www.darkreading.com/cyberattacks-data-breaches/-the-mask-espionage-group-resurfaces-after-10-year-hiatus?&web_view=true
5. FIN7ʹÓöñÒâ Google ¹ã¸æÈö²¥ NetSupport RAT
5ÔÂ12ÈÕ£¬¾ÝÊӲ죬³öÓÚ¾¼ÃÄîÍ·µÄÍþвÐÐΪÕßFIN7ʹÓÃÓÕÆÕýµ±Æ·ÅƵĶñÒâ Google ¹ã¸æ×÷ΪÌṩ MSIX ×°ÖóÌÐòµÄÊֶΣ¬×îÖÕ°²ÅÅNetSupport RAT¡£ÍøÂçÇå¾²¹«Ë¾ eSentireÔÚ±¾ÖÜÔçЩʱ¼äÐû²¼µÄÒ»·Ý±¨¸æÖÐÌåÏÖ£º¡°ÍþвÐÐΪÕßʹÓöñÒâÍøվð³ä×ÅÃûÆ·ÅÆ£¬°üÀ¨ AnyDesk¡¢WinSCP¡¢BlackRock¡¢Asana¡¢Concur¡¢»ª¶û½ÖÈÕ±¨¡¢Workable ºÍ Google Meet¡£¡±FIN7£¨ÓÖÃû Carbon Spider ºÍ Sangria Tempest£©ÊÇÒ»¸öÒ»Á¬±£´æµÄµç×Ó·¸·¨×éÖ¯£¬×Ô 2013 ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬×î³õÉæ×ãÕë¶ÔÏúÊÛµã (PoS) ×°±¸µÄ¹¥»÷ÒÔÇÔÈ¡Ö§¸¶Êý¾Ý£¬ØʺóתÏòͨ¹ýÀÕË÷Èí¼þÔ˶¯ÆÆËð´óÐ͹«Ë¾¡£¶àÄêÀ´£¬ÍþвÐÐΪÕßË¢ÐÂÁËÆäÕ½ÂԺͶñÒâÈí¼þ¿â£¬½ÓÄÉÁËÖÖÖÖ ×Ô½ç˵¶ñÒâÈí¼þϵÁУ¬ÀýÈç BIRDWATCH¡¢Carbanak¡¢DICELOADER£¨ÓÖÃû Lizar ºÍ Tirion£©¡¢POWERPLANT¡¢POWERTRASH ºÍ TERMITE µÈ¡£FIN7 ¶ñÒâÈí¼þͨ³£Í¨¹ýÓã²æʽÍøÂç´¹ÂÚÔ˶¯°²ÅÅ£¬×÷ΪĿµÄÍøÂç»òÖ÷»úµÄÈë¿Ú£¬Ö»¹Ü×î½ü¼¸¸öÔ¸Ã×éÖ¯ÒÑʹÓöñÒâ¹ã¸æÊÖÒÕÀ´Æô¶¯¹¥»÷Á´¡£
https://thehackernews.com/2024/05/fin7-hacker-group-leverages-malicious.html
6. ¼ÓÃÜÓʼþ·þÎñ Proton Ôٴν«ÏÓÒÉÈ˵ÄÐÅÏ¢½»¸ø¾¯·½
5ÔÂ13ÈÕ£¬¼ÓÃܵç×ÓÓʼþ·þÎñ Proton Mail ÔÚijЩ·½ÃæÔÙ´ÎÏÝÈëÄæ¾³£¬²¢ÇÒ֮ǰҲÔøÔâÊܹýÆ·ÆÀ£º½«Óû§Êý¾ÝÒƽ»¸øÖ´·¨²¿·Ö¡£Proton Ìṩ¶àÏî×Ô³ÆÇå¾²¿É¿¿µÄ·þÎñ£¬ÆäÖаüÀ¨¶Ëµ½¶Ë¼ÓÃܵç×ÓÓʼþ²úÆ·¡£ÍâòÉÏÊÇΪÁËÒþ˽Òâʶ¶øÉè¼ÆµÄ£¬Proton Éù³ÆÎÞ·¨ÔĶÁµç×ÓÓʼþºÍ¸½¼þµÄÄÚÈÝ£¬Ã»Óиú×ÙÆ÷ºÍ¹ã¸æ£¬²¢ÇÒÓµÓС°×î¸ßµÄÒþ˽±ê×¼¡±¡£Ö»¹ÜÔÆÔÆ£¬Proton ÈÔÈ»¿ÉÒÔ»á¼û²¢±»ÆÈй¶Óû§ÐÅÏ¢¡£2021 Ä꣬Õâ¼ÒÈðÊ¿¹©Ó¦ÉÌÏòÈðÊ¿¾¯·½ÌṩÁ˾¯·½ÊÔͼʶ±ðµÄÒ»ÃûÍøÃñµÄ IP µØµãºÍ×°±¸ÏêϸÐÅÏ¢¡£¸ÃÈËÊÇÒ»Ãû·¨¹úÌìÆøÔ˶¯¼Ò£¬ØʺóÔÚ Proton Óë·¨¹ú¾¯·½·ÖÏíÏàͬÊý¾Ýºó±»²¶¡£ÕⳡÔÓÂÒ±¬·¢ºó²»¾Ã£¬Proton¾Íɾ³ýÁËÆäÍøÕ¾ÉÏδ¸ú×ÙÓû§ IP µØµãµÄÉùÃ÷¡£´ËÇ°»¹±»Ö¸¿ØÏòÕþ¸®ÌṩÓû§ÊµÊ±¼à¿Ø¡£
https://www.theregister.com/2024/05/13/infosec_in_brief/