Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

Ðû²¼Ê±¼ä 2022-10-26
1¡¢Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

      

ýÌå10ÔÂ24Èճƣ¬£¬£¬£¬Ó¢¹úÆû³µ¾­ÏúÉÌPendragon GroupÔâµ½LockBitµÄÀÕË÷¹¥»÷ ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚԼĪһ¸öÔÂǰ£¬£¬£¬£¬Î´Ó°ÏìÆäÕý³£ÔËÓª£¬£¬£¬£¬ËûÃÇÒ»Ö±ÔÚÓëºÚ¿ÍÁªÏµ£¬£¬£¬£¬²¢ÊÕµ½Á˱»µÁÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬£¬µ«Ã»ÓоÙÐÐ̸ÅÐ ¡£¡£¡£¡£¡£¡£¾ÝÓ¢¹úýÌ峯£¬£¬£¬£¬LockBitÒªÇó6000ÍòÃÀÔªÊê½ð£¬£¬£¬£¬¶øPendragon½²»°ÈËÌåÏÖËûÃǼá³Ö²»ÏòºÚ¿Í¸¶¿îµÄ¾öÒé ¡£¡£¡£¡£¡£¡£Pendragon»¹³ÎÇåµÀ£¬£¬£¬£¬ÆäITÍŶÓÔÚÔâµ½¹¥»÷ºóÁ¬Ã¦×ö³öÁË·´Ó¦£¬£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿Í½öÇÔÈ¡ÁË5%µÄÊý¾Ý¿â ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/


2¡¢CiscoÌáÐÑAnyConnectÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓÃ

      

CiscoÔÚ10ÔÂ25ÈÕÌáÐѿͻ§£¬£¬£¬£¬ÊÊÓÃÓÚWindowsµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓà ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î£¨CVE-2020-3433ºÍCVE-2020-3153£©¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´Ö´ÐÐDLLÐ®ÖÆ¹¥»÷²¢½«Îļþ¸´ÖƵ½¾ßÓÐϵͳ¼¶È¨ÏÞµÄϵͳĿ¼ ¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¾ßÓÐϵͳȨÏÞµÄÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ÔÚ2022Äê10Ô£¬£¬£¬£¬Æä·¢Ã÷ÓÐÈËÊÔͼʹÓôËÎó²î£¬£¬£¬£¬²¢Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-admins-to-patch-anyconnect-flaw-exploited-in-attacks/


3¡¢ÎÚ¿ËÀ¼¾ÍCubaÍÅ»ïÕë¶ÔÆäÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨

      

¾Ý10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)ÒѾÍÀÕË÷ÍÅ»ïCuba¶ÔÆäÒªº¦¼ü»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨ ¡£¡£¡£¡£¡£¡£´Ó10ÔÂ21ÈÕ×îÏÈ£¬£¬£¬£¬CERT-UA¾Í¼ì²âµ½ÐÂÒ»²¨´¹ÂÚÓʼþ£¬£¬£¬£¬Ã°³äÁËÎÚ¿ËÀ¼Îä×°²½¶Ó×ÜÕÕÁϲ¿ÐÂÎÅЧÀͲ¿£¬£¬£¬£¬ÓÕʹÊÕ¼þÈ˵ã»÷ÆäÖеÄǶÈëʽÁ´½Ó£¬£¬£¬£¬×îÖÕ»á×°ÖÃROMCOM RAT ¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬Ë¼Á¿µ½RomComºóÃŵÄʹÓÃÒÔ¼°Ïà¹ØÎļþµÄÆäËûÌØÕ÷£¬£¬£¬£¬ÍƲâ´Ë´Î»î¶¯ÓëTropical Scorpius(UNC2596)Óйأ¬£¬£¬£¬¸ÃÍÅ»ïÈÏÕæ·Ö·¢CubaÀÕË÷Èí¼þ ¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html


4¡¢ÐÂµÄ¹ã¸æ»î¶¯Dormant Colors·Ö·¢¶ñÒâChromeÀ©Õ¹

      

10ÔÂ23ÈÕ£¬£¬£¬£¬Guardio LabsÅû¶ÁËÐÂÒ»ÂֵĶñÒâ¹ã¸æ»î¶¯Dormant Colors ¡£¡£¡£¡£¡£¡£µ½2022Äê10ÔÂÖÐÑ®£¬£¬£¬£¬ÔÚChromeºÍEdgeÍøÂçÊÐËÁÖж¼ÓÐ30¸öä¯ÀÀÆ÷À©Õ¹µÄ±äÖÖ£¬£¬£¬£¬ÀÛ¼ÆÁè¼Ý100ÍòµÄ×°ÖÃÁ¿ ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯µÄÖ÷ÌâÓëÑÕÉ«Óйأ¬£¬£¬£¬Ê¼ÓÚ¶ñÒâ¹ã¸æ»î¶¯£¬£¬£¬£¬ÒÔÐÂÓ±µÄÒªÁìÔÚûÈË×¢ÖØµÄÇéÐÎϲà¼ÓÔØÕæÕýµÄ¶ñÒâ´úÂë ¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬²»µ«ÇÔȡĿµÄËÑË÷ºÍä¯ÀÀÊý¾Ý£¬£¬£¬£¬²¢Îª10000¸öÍøÕ¾ÒýÁ÷£¬£¬£¬£¬Óû§ÔÚÕâÐ©ÍøÕ¾ÉϾÙÐеÄÈκιºÖÃÐÐΪ¶¼»áΪ¹¥»÷Õß´øÀ´Ó¶½ð ¡£¡£¡£¡£¡£¡£


https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849


5¡¢SideWinderʹÓÃкóÃÅWarHawk¹¥»÷°Í»ù˹̹µÄ×éÖ¯

      

¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ZscalerÅû¶Á˺ڿÍÍÅ»ïSideWinderµÄкóÃÅWarHawk ¡£¡£¡£¡£¡£¡£SideWinderÒÉËÆÓëÓ¡¶ÈÓйأ¬£¬£¬£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞµÝÈ¥£¬£¬£¬£¬ÓÈÆäÊǰͻù˹̹µÄÕþ¸®¡¢¾ü¶ÓºÍÆóÒµ×éÖ¯ ¡£¡£¡£¡£¡£¡£½ñÄê9Ô£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°Í»ù˹̹¹ú¼ÒµçÁ¦î¿Ïµ¾ÖµÄÕýµ±ÍøÕ¾nepra[.]org[.]pk·¢Ã÷Ò»¸öÎäÆ÷»¯ISOÎļþ£¬£¬£¬£¬À´¼¤»îÓÃÀ´×°ÖÃWarHawkµÄkillchain ¡£¡£¡£¡£¡£¡£WarHawkÔòαװ³ÉASUS Update SetupºÍRealtek HD Audio ManagerµÈÕýµ±Ó¦Ó㬣¬£¬£¬Ëü·Ö·¢Cobalt Strike×÷Ϊ×îÖÕpayload ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/10/sidewinder-apt-using-new-warhawk.html


6¡¢ÐÞ½¨¹«Ë¾InterserveÒòÔâµ½ÀÕË÷¹¥»÷±»·£¿ £¿£¿ £¿£¿ £¿£¿î440ÍòÓ¢°÷


10ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ó¢¹úÐÞ½¨¹«Ë¾InterserveÒòÀÕË÷¹¥»÷й¶113000ÃûÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬±»Ó¢¹úÊý¾Ý±£»£»£»£»¤î¿Ïµ»ú¹¹·£¿ £¿£¿ £¿£¿ £¿£¿î440ÍòÓ¢°÷ ¡£¡£¡£¡£¡£¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬£¬£¬£¬Interserve GroupδÄܽÓÄÉÊʵ±µÄÇå¾²²½·¥À´Ìá·ÀÍøÂç¹¥»÷ ¡£¡£¡£¡£¡£¡£ICOÚ¹Ê͵À£¬£¬£¬£¬¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬£¬Ä³Ô±¹¤·­¿ªºóÎÞÒâÖÐÏÂÔØÁ˶ñÒâÈí¼þ£¬£¬£¬£¬¸Ã¹«Ë¾µÄAVÈí¼þÒÑ·¢Ë;¯±¨ ¡£¡£¡£¡£¡£¡£µ«ºóÐøÊӲ첻·ó³¹µ×£¬£¬£¬£¬µ¼Ö¹¥»÷Õß»á¼ûÁË283¸öϵͳºÍ16¸öÕË»§£¬£¬£¬£¬²¢Ð¶ÔØÁ˹«Ë¾µÄAVÈí¼þ ¡£¡£¡£¡£¡£¡£Interserve ÒѾͷ£¿ £¿£¿ £¿£¿ £¿£¿îÏòICOÌá³öÉÏËߣ¬£¬£¬£¬µ«×îÖÕ·£¿ £¿£¿ £¿£¿ £¿£¿î²¢Î´ïÔÌ­ ¡£¡£¡£¡£¡£¡£


https://therecord.media/british-company-fined-4-4-million-over-ransomware-attack/