NPDÒòÊý¾Ýй¶ÉêÇëÐÝÒµ £¬ÃæÁٶ෽ËßËÏ

Ðû²¼Ê±¼ä 2024-10-14

1. NPDÒòÊý¾Ýй¶ÉêÇëÐÝÒµ £¬ÃæÁٶ෽ËßËÏ


10ÔÂ12ÈÕ £¬ÃÀ¹ú¹ú¼Ò¹«¹²Êý¾Ý¹«Ë¾£¨NPD£© £¬×÷ΪÃÀ¹ú×î´óµÄÅä¾°ÊӲ칫˾֮һ £¬½üÆÚÒòÔâÊܺڿ͹¥»÷²¢Ð¹Â¶ÊýÒÚÈËÊý¾Ý¶øÏÝÈëÖØÖØÄæ¾³ £¬×îÖÕÓÚ10ÔÂ2ÈÕÓÉĸ¹«Ë¾Jerico PicturesÏò·ðÂÞÀï´ïÖÝÄÏÇø·¨ÔºÉêÇëÐÝÒµ¡£ºÚ¿ÍÓÚ2023Äê12ÔÂÈëÇÖNPDϵͳ £¬²¢ÓÚ½ñÄê4ÔÂÔÚBreachedºÚ¿Í·¸·¨Êг¡ÖÐÊ״ηºÆðÏà¹ØÊý¾Ý £¬ºÚ¿ÍUSDoDÉù³Æ¶Ô´ËÈÏÕæ £¬²¢ìÅÒ«ÆäÔÚÈëÇÖFBI¡¢¿Õ¿ÍµÈ»ú¹¹·½ÃæµÄ³É¼¨¡£6Ô £¬USDoDÊÔͼÒÔ350ÍòÃÀÔª³öÊÛ°üÀ¨29ÒÚÌõÃÀ¹ú¹«Ãñ¼Í¼µÄ±»µÁÊý¾Ý£»7Ô £¬ÁíÒ»ºÚ¿ÍFeniceÔÚBreachForumsÉÏÃâ·ÑÐû²¼ÁËÒ»¸ö°üÀ¨27ÒÚÌõ¼Í¼µÄÊý¾Ý¿â¡£Ð¹Â¶Êý¾Ýº­¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢ £¬ÍøÂçÇ徲ר¼Ò֤ʵ´ó²¿·ÖÐÅϢ׼ȷ¡£NPDËäÌåÏÖÒÑÅäºÏÖ´·¨²¿·ÖÊÓ²ì £¬µ«Î´Ìṩ×îÐÂÏ£Íû £¬Ò²Î´ÎªÊܺ¦ÕßÌṩ±£»¤·þÎñ¡£¹«Ë¾ÐÝҵ˵Ã÷Ö¸³ö £¬ÒòÎÞ·¨±¬·¢×ã¹»ÊÕÈë½â¾öDZÔÚÇ·Õ®¼°¼ç¸ºÏà¹ØÓÃ¶È £¬¼ÓÖ®Ò½ÁÆ»ú¹¹µÈ¿Í»§Õ¥È¡ÓÐÅä¾°ÎÊÌâµÄÆóÒµÌṩ·þÎñ £¬¹«Ë¾ÏÝÈë¾ø¾³¡£±ðµÄ £¬NPD»¹ÃæÁÙ¶àÆðÕûÌåËßËϼ°À´×Ô20¶à¸öÖÝ×ÜÉó²é³¤ÒªÇóÖ§¸¶ÃñÊ·£¿îµÄѹÁ¦ £¬ÃÀ¹úÁª°îÉÌҵίԱ»áÒ²ÔÚÉó²é´ËÊ¡£


https://therecord.media/national-public-data-bankruptcy-cyberattack?__cf_chl_rt_tk=GF.IqF4I1q4XLxFQViMGflsJ0gqSiczsmGeWUI2MOhE-1728699076-1.0.1.1-n6A6vfbEhmIy5OoZy.Ikdg9MFhV1brh0Rte3ceh4Gg8


2. DarkVision RAT£ºÍøÂç·¸·¨·Ö×ÓµÄÇ¿Ê¢¶à¹¦Ð§¹¤¾ß¼°ÆäÊÖÒÕÑݱä


10ÔÂ13ÈÕ £¬DarkVision RATÊÇÒ»Öֵͱ¾Ç®ÇÒ¹¦Ð§Ç¿Ê¢µÄÔ¶³Ì»á¼ûľÂí£¨RAT£© £¬×Ô2020ÄêÊ״ηºÆðÒÔÀ´ £¬ÒòÆä¸ß¶È¿É¶¨ÖÆÐÔºÍÔÚHack ForumsµÈÍøÕ¾ÉÏÒÔµÍÖÁ60ÃÀÔªµÄ¼ÛÇ®³öÊÛ £¬¶øÔÚÍøÂç·¸·¨·Ö×ÓÖÐѸËÙÊ¢ÐС£¸ÃRAT¾ß±¸¶àÖÖ¹¦Ð§ £¬°üÀ¨¼üÅ̼ͼ¡¢Îļþ²Ù×÷¡¢Àú³Ì×¢Èë¡¢ÃÜÂëÇÔÈ¡ºÍÔ¶³Ì´úÂëÖ´ÐÐ £¬³ÉΪ¹¥»÷ÕßÈëÇÖϵͳºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÈÈÃŹ¤¾ß¡£×î½ü £¬ThreatLabzÊӲ쵽DarkVisionÓëÁíÒ»¿î¶ñÒâÈí¼þPureCrypterÒ»ÆðÔÚÐÂÔ˶¯ÖÐÈö²¥¡£DarkVision RATʹÓÃ×Ô½ç˵ÍøÂçЭÒéÓëÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷ͨѶ £¬ÎüÊÕÏÂÁî²¢ÇÔÈ¡Êý¾Ý¡£ÆäÌÓ±ÜÕ½ÂÔ°üÀ¨DLLЮÖÆ¡¢Àú³Ì×¢ÈëºÍ×Ô¶¯ÌáÉýÊÖÒÕ £¬ÒÔÈƹýÇå¾²·ÀÓù²¢»ñµÃÌáÉýȨÏÞ¡£±ðµÄ £¬¸ÃRAT»¹Ê¹ÓÃWindows Defenderɨ³ýºÍ¶àÖÖ³¤ÆÚÐÔ»úÖÆÀ´×èÖ¹¼ì²âºÍ¼á³ÖÔ˶¯×´Ì¬ £¬È罫¾ç±¾°²ÅÅÔÚWindowsÆô¶¯Îļþ¼ÐÖС¢Ê¹ÓÃ×Ô¶¯ÔËÐÐ×¢²á±íÏîÒÔ¼°Í¨¹ýʹÃüÍýÏë³ÌÐò°²ÅÅʹÃü¡£DarkVision RATµÄ¸ß¶È˳ӦÐÔÌåÏÖÔÚÆä±ê¼ÇÔÊÐí¹¥»÷ÕßÑ¡ÔñʹÓÃÄÄÖÖ³¤ÆÚÐÔÒªÁì £¬ÄÑÒÔ¼ì²â¡£¸ÃRAT»¹Ö§³ÖÖÖÖÖÏÂÁî £¬Í¨¹ý²å¼þʵÏÖ¸ü¶à¶ñÒ⹦Ч £¬È粶»ñ°´¼ü¡¢ÍøÂçÉãÏñÍ·¾µÍ·¡¢Â¼ÒôºÍʹÓÃϵͳÀú³Ì¡£


https://securityonline.info/darkvision-rat-the-60-malware-threatening-your-data/


3. Game FreakÔâÓö¡°Teraleak¡±Êý¾Ýй¶ £¬½ü1TBÃô¸ÐPok¨¦monÊý¾ÝÍâй


10ÔÂ13ÈÕ £¬¿Ú´üÑý¹ÖϵÁÐÓÎÏ·µÄ¿ª·¢ÉÌGame Freak £¬½üÆÚÔâÓöÁ˱»³ÆΪ¡°Teraleak¡±µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬µ¼Ö½ü1TBµÄÃô¸ÐÊý¾ÝÍâй £¬Ó°ÏìÁË2,606ÃûÔ±¹¤ºÍ³Ð°üÉÌ¡£Ð¹Â¶ÄÚÈÝ°üÀ¨Ô´´úÂë¡¢×÷·ÏµÄÓÎÏ·¡¢¿´·¨Í¼¡¢Î´Ðû²¼µÄÏîÄ¿µÈ £¬Ê±¼ä¿ç¶È´Ó25ÄêÇ°µÄÄÚ²¿Îļþµ½¼´½«ÍƳöµÄÐÂÓÎÏ·¡£Ð¹Â¶µÄÊý¾Ý×î³õÔÚÉ罻ýÌåºÍÂÛ̳Èçr/PokeLeaksÉÏÈö²¥ £¬Éæ¼°µÄÖÊÁÏ°üÀ¨¿Ú´üÑý¹ÖÉè¼Æ¡¢¶¯ÂþÉè¼ÆÎĵµ¡¢Î´Ê¹Óõľ«Á鱦¿ÉÃÎÉè¼Æ¡¢Ó°Ï·Ðø¼¯Ðû´«Æ¬ÒÔ¼°ÈÎÌìÌÃSwitch 2µÄÊÖÒÕÑÝʾµÈ¡£ËäȻйÃÜÕßÁгöµÄÄÚÈÝ°üÀ¨Õæ¼ÙÄѱæµÄÎļþ £¬µ«Òªº¦ÎļþÈ硶¾«Á鱦¿ÉÃκÚ2/°×2¡·µÄ¿ª·¢°æ±¾¡¢¡¶¾«Á鱦¿ÉÃÎÒøÐС·µÄÔ´´úÂëµÈÒѱ»È·ÈÏ¡£´Ë´Î鶻¹Õ¹ÏÖÁËGame Freak¶à¸öÏîÄ¿µÄ´úºÅ £¬°üÀ¨ÓëILCAÅäºÏ¿ª·¢µÄδÐû²¼¶àÈËÓÎÏ·¡°Synapse¡±µÈ¡£ÏÖÔÚ £¬ºÚ¿Í¼°ÆäÄîÍ·Éв»ÇåÎú £¬µ«´Ë´ÎйÃÜ¿ÉÄÜÊÇÓÎÏ·Ê·ÉÏ×î´óµÄйÃÜÊÂÎñÖ®Ò» £¬Game FreakÔ¤¼Æ½«ÃæÁÙ½øÒ»²½µÄЧ¹û £¬¶øÖÜÈ«Ó°ÏìÉдýÍêÈ«Ïàʶ¡£


https://hackread.com/teraleak-pokemon-developer-game-freak-hacked-data-leak/


4. ÒÁÀʺڿÍ×éÖ¯OilRig¼Ó´ó¶ÔÖж«¹¥»÷ £¬Ê¹ÓÃкóÃÅÇÔȡƾ֤


10ÔÂ13ÈÕ £¬ÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT34£¨OilRig£©½üÆÚÕë¶Ô°¢À­²®ÍŽáÇõ³¤¹úºÍº£ÍåµØÇøµÄÕþ¸®ºÍÒªº¦»ù´¡ÉèʩʵÌåÌᳫÁËÐµĹ¥»÷Ô˶¯¡£ÔÚÕâЩ¹¥»÷ÖÐ £¬OilRig°²ÅÅÁËÒ»¸öÐÂÐͺóÃÅ £¬Ê¹ÓÃMicrosoft Exchange·þÎñÆ÷ÇÔȡƾ֤ £¬²¢½èÖúWindows CVE-2024-30088Îó²îÌáÉýȨÏÞ¡£¸ÃÎó²îËäÒѱ»Î¢ÈíÐÞ¸´ £¬µ«ÉÐδ±»±ê¼ÇΪÕýÔÚ±»Æð¾¢Ê¹Ó᣹¥»÷Õßͨ¹ýÉÏ´«Web shellÖ´ÐÐÔ¶³Ì´úÂëºÍPowerShellÏÂÁî £¬½ø¶øʹÓÃCVE-2024-30088Îó²î £¬×¢²áÃÜÂë¹ýÂËÆ÷DLL×赲ƾ֤ £¬²¢ÏÂÔØÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ß¡°ngrok¡±¡£±ðµÄ £¬OilRig»¹Ê¹ÓÃÃûΪ¡°StealHook¡±µÄкóÃÅÇÔȡƾ֤ £¬²¢Í¨¹ýÕþ¸®Exchange·þÎñÆ÷·¢Ëͺ¬Óб»µÁÃÜÂëµÄµç×ÓÓʼþ £¬Ê¹ÕâÒ»Àú³Ì¿´ËÆÕýµ±¡£Ç÷ÊƿƼ¼Ö¸³ö £¬StealHookÓëOilRigÒÑÍùµÄºóÃÅÔÚ´úÂëÉÏÓÐÏàËÆÖ®´¦ £¬ÏÔʾÆäÊÇÒ»´Î½ø»¯¶ø·Çȫд´×÷¡£Í¬Ê± £¬OilRigÓëÁíÒ»¸öÒÁÀÊAPT×éÖ¯FOX Kitten±£´æÁªÏµ £¬¿ÉÄܽ«ÀÕË÷Èí¼þÌí¼Óµ½Æä¹¥»÷ÎäÆ÷¿âÖС£ÓÉÓÚÄ¿µÄʵÌå¶àÊôÄÜÔ´ÁìÓò £¬ÔËÓªÖÐÖ¹¿ÉÄܶÔÐí¶àÈ˱¬·¢ÑÏÖØÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/


5. TelekopyeÕ©Æ­¹¤¾ß°üж¯Ïò£º½ø¾üסËÞÔ¤¶©Æ½Ì¨


10ÔÂ10ÈÕ £¬ESET Research×îзÖÏíÁ˹ØÓÚTelekopyeÕ©Æ­¹¤¾ß°üµÄ·¢Ã÷¡£TelekopyeÊÇÒ»¸ö»ùÓÚTelegramµÄÕ©Æ­¹¤¾ß°ü £¬×Ô2016ÄêÒÔÀ´±»ÍøÂç·¸·¨·Ö×ÓÓÃÓÚÔÚÏßÊг¡Õ©Æ­ £¬ÏÖÒѽ«Ä¿µÄÀ©´óµ½ÈÈÃÅסËÞÔ¤¶©Æ½Ì¨ÈçBooking.comºÍAirbnb¡£Õ©Æ­Õßͨ¹ý͵ȡÕýµ±ÂùݺÍסËÞÌṩÉ̵ÄÕË»§ÐÅÏ¢ £¬ÏòÊܺ¦Õß·¢ËÍ¿´ËÆÕýµ±µÄÔ¤¶©ÎÊÌâÐÂÎÅ £¬Ö¸µ¼Æäµã»÷´¹ÂÚÁ´½Ó²¢ÊäÈëÖ§¸¶¿¨ÐÅÏ¢¡£ÕâÖÖеÄÕ©Æ­·½·¨Ê¹ÓÃÁËÊܺ¦Õ߶ÔÔ¤¶©Æ½Ì¨µÄÐÅÍÐ £¬Ê¹µÃȦÌ׸üÄѱ»·¢Ã÷¡£±ðµÄ £¬TelekopyeÕ©Æ­ÍŻﻹˢÐÂÁ˹¤¾ßºÍÔËÓª·½·¨ £¬Èç×Ô¶¯ÌìÉú´¹ÂÚÒ³Ãæ¡¢½ÓÄɼ´Ê±·­Ò빦ЧµÄ½»»¥Ê½Ì¸Ìì»úеÈËÒÔ¼°ÊµÑé·´DDoS²½·¥µÈ £¬ÒÔÔöÌí²ÆÎñ»Ø±¨¡£Æ¾Ö¤ESETÒ£²âÊý¾Ý £¬´ËÀàÕ©Æ­ÔÚ2024ÄêÊî¼Ùʱ´úÓÈΪ·Å×Ý¡£ESET»¹ÌṩÁËÌá·À´ËÀàÕ©Æ­µÄ½¨Òé £¬°üÀ¨ÔÚƽ̨ÉÏÉóÉ÷Ïàͬ¡¢ºËʵ¶Ô·½ÐÅÏ¢ÒÔ¼°×Ðϸ¼ì²éÍøÕ¾URLµÈ¡£Í¬Ê± £¬¾¯·½Ò²ÒѽÓÄÉÐж¯¹¥»÷ʹÓÃTelekopyeµÄ·¸·¨Ô˶¯¡£


https://www.welivesecurity.com/en/eset-research/telekopye-hits-new-hunting-ground-hotel-booking-scams/


6. PureLogs¶ñÒâÈí¼þ£ºµÍ¼Û¸ßЧµÄÐÅÏ¢ÇÔÈ¡¹¤¾ßÔÚÍøÂçÖÐÂþÒç


10ÔÂ12ÈÕ £¬PureLogsÊÇÒ»ÖÖÐÂÐ˵ĶñÒâÈí¼þ £¬ÒÔÆäµÍÁ®µÄ¼ÛÇ®ºÍÇ¿Ê¢µÄ¹¦Ð§ÔÚ¹¥»÷ÕßÖб¸ÊÜÇàíù¡£Õâ¿îÓÃC#¹¹½¨µÄ64λÐÅÏ¢ÇÔÈ¡³ÌÐò £¬Äܹ»Í¨¹ýChrome¡¢Edge¡¢OperaµÈä¯ÀÀÆ÷»ñȡ˽ÈËÐÅÏ¢ £¬ÓëÉÙÊýÆäËû¶ñÒâÈí¼þÈçLumma¡¢VidarºÍMeduza¾ßÓÐÏàËƵÄÄÜÁ¦¡£PureLogs×î³õÔÚµØÏÂÊг¡ÉϳöÊÛ £¬²¢ÔÚ¶à¸öµØÏÂÂÛ̳ÉϾÙÐÐÍƹ㠣¬ÏÖÔÚͨ¹ýTelegram»úеÈËÌṩ֧³ÖºÍÏúÊÛÅÌÎÊ £¬¼ÛÇ®Ïà¶ÔµÍÁ® £¬³ÉΪÊг¡ÉÏ×î×ÔÖƵÄÐÅÏ¢ÇÔÈ¡³ÌÐòÖ®Ò»¡£¾ÝFlashpoint Intel Team±¨¸æ £¬PureLogs·ÖÈý¸ö½×¶ÎÔËÐÐ £¬°üÀ¨¼ÓÔغÍÖ´Ðн׶Ρ¢·´É³Ïä²âÊÔºÍÍøÂçÉèÖý׶ÎÒÔ¼°ÊµÑéÐÅÏ¢ÇÔÈ¡³ÌÐò´úÂë½×¶Î¡£ËüÄܹ»»ñÈ¡ä¯ÀÀÊý¾Ý¡¢ä¯ÀÀÆ÷À©Õ¹¡¢¼ÓÃÜÇ®±ÒÇ®°üÓ¦ÓóÌÐò¡¢×ÀÃæÓ¦ÓóÌÐòÒÔ¼°Êܺ¦ÕßÅÌËã»úÐÅÏ¢µÈ £¬²¢½«Ïà¹ØÊý¾Ý´«Êäµ½Telegram¡£PureLogsµÄTelegramÃæ°å¿ÉÒÔÏÔʾÊܺ¦ÕßµÄÏêϸÐÅÏ¢¡¢±»ÇÔÊý¾ÝµÄÊýÄ¿¡¢²¶»ñµÄÆÁÄ»½ØͼÒÔ¼°ÈÕÖ¾ÎļþµÈ¡£


https://cybersecuritynews.com/purelogs-chrome-browser/