ê©ÄÉÒ½ÔºÒòÔâµ½ÍøÂç¹¥»÷¶ø¹Ø±ÕÆäÒ½ÁÆÏµÍ³
Ðû²¼Ê±¼ä 2024-04-234ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬¸ÃÒ½ÁÆ»ú¹¹Ò²±»³ÆÎª²¼Â³ÈüÒ½Ôº£¬£¬£¬£¬£¬£¬¾öÒéÍêÈ«ÇжÏÅÌËãʱ»ú¼ûÒÔ×èÖ¹¹¥»÷£¬£¬£¬£¬£¬£¬ÕâÆÈʹԱ¹¤×ªÏò±ÊºÍÖ½¼ÌÐøÎª»¼ÕßÌṩЧÀÍ¡£¡£¡£¡£¡£¡£¡£CHC-SV ÌåÏÖ£¬£¬£¬£¬£¬£¬ÕýÔÚ¾¡Ò»ÇÐÆð¾¢È·±£Äܹ»ÔÚÆä»î¶¯ÁìÓòÌṩȫ·½Î»µÄÕչ˻¤Ê¿£¬£¬£¬£¬£¬£¬²¢Ôö²¹Ëµ£¬£¬£¬£¬£¬£¬ËüÒ»Ö±ÔÚÓëµØÇøÒ½ÁÆ»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬Æ¾Ö¤»¼ÕßµÄÐèÇóµ÷½â»¼Õߵį«Ïò¡£¡£¡£¡£¡£¡£¡£ËäÈ» CHC-SV µÄ½ôÆÈ»î¶¯ÈÔÔÚ¼ÌÐø£¬£¬£¬£¬£¬£¬µ«ÉÏÖÜ×÷·ÏÁ˷ǽôÆÈÊÖÊõ³ÌÐò£¬£¬£¬£¬£¬£¬µ«¾ÙÐÐÁ˲»ÒÀÀµÅÌËã»úϵͳµÄÊÖÊõÒÔ¼°Õë¶ÔÒÑÖªÂýÐÔ²¡»¼ÕßµÄÊÖÊõ¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÔºÌåÏÖÒÑ֪ͨÓйØÕþ¸®£¬£¬£¬£¬£¬£¬Õþ¸®ºÍÍøÂçÇ徲ר¼ÒÕýÔÚÆÊÎö¸ÃÊÂÎñ¡£¡£¡£¡£¡£¡£¡£CHC-SV ÌåÏÖ£¬£¬£¬£¬£¬£¬Æù½ñΪֹ£¬£¬£¬£¬£¬£¬ÉÐδÌá³öÊê½ðÒªÇ󣬣¬£¬£¬£¬£¬Ò²Ã»Óз¢Ã÷Êý¾Ý±»µÁµÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£¾ÝÒ½Ôº³Æ£¬£¬£¬£¬£¬£¬¿µ¸´²Ù×÷½«ÖØµã¹Ø×¢Ó뻼ÕßÕչ˻¤Ê¿Ö±½ÓÏà¹ØµÄϵͳ¡£¡£¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬£¬CHC-SV Ô¤¼ÆÐèÒªºÜ³¤Ê±¼ä²Å»ª»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£CHC-SV ÊÇ·¨¹úê©ÄɵÄÒ»¼ÒÓµÓÐ 840 ¸ö´²Î»µÄÒ½Ôº£¬£¬£¬£¬£¬£¬ÓµÓÐ 2,000 ¶àÃûÔ±¹¤£¬£¬£¬£¬£¬£¬Ìṩ¼±Õï¡¢Íâ¿Æ¡¢²ú¿Æ¡¢¶ù¿Æ¡¢Éñ¾²¡Ñ§ºÍÆäËûÒ½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/cannes-hospital-cancels-medical-procedures-following-cyberattack/
2. Windows Defender ¿ÉÄܻᱻÓկɾ³ýÊý¾Ý¿â
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÐÅÏ¢Çå¾²»ú¹¹ SafeBreach µÄÑо¿Ö°Ô±ÉÏÖÜÎåÌÖÂÛÁË΢ÈíºÍ¿¨°Í˹»ùÇå¾²²úÆ·ÖпÉÄÜÔÊÐíÔ¶³Ìɾ³ýÎļþµÄȱÏÝ¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬ËûÃÇÉù³Æ£¬£¬£¬£¬£¬£¬×ÝÈ»Á½¼Ò¹©Ó¦É̶¼Éù³ÆÒѾÐÞ¸´Á˸ÃÎÊÌ⣬£¬£¬£¬£¬£¬¸ÃÎó²îÈÔÈ»¿ÉÒÔ±»Ê¹Óᣡ£¡£¡£¡£¡£¡£SafeBreach Çå¾²Ñо¿¸±×ܲà Tomer Bar ºÍÇå¾²Ñо¿Ô± Shmuel Cohen ÔÚÐÂ¼ÓÆÂ¾ÙÐÐµÄ Black Hat Asia ¾Û»áÉϽÒÏþ½²»°Ê±Ú¹ÊÍ˵£¬£¬£¬£¬£¬£¬Microsoft Defender ºÍ¿¨°Í˹»ùµÄ¶Ëµã¼ì²âºÍÏìÓ¦ (EDR) ¿ÉÒÔ¼ì²â¶ñÒâÎļþµÄÎó±¨Ö¸±ê£¬£¬£¬£¬£¬£¬È»ºóɾ³ýËüÃÇ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÒÀÀµÓÚ΢ÈíºÍ¿¨°Í˹»ùʹÓÃ×Ö½ÚÊðÃû£¨ÎļþÍ·ÖÐÆæÒìµÄ×Ö½ÚÐòÁУ©À´¼ì²â¶ñÒâÈí¼þµÄÊÂʵ¡£¡£¡£¡£¡£¡£¡£Bar ºÍ Cohen Ê×ÏÈÔÚ VirusTotal ƽ̨ÉÏÕÒµ½ÁËÓë¶ñÒâÈí¼þÏà¹ØµÄ×Ö½ÚÊðÃû£¬£¬£¬£¬£¬£¬È»ºó½«Æä²åÈëÊý¾Ý¿âÖУ¬£¬£¬£¬£¬£¬ÒªÁìÊǽ¨ÉèÒ»¸öÃû³Æ°üÀ¨¸ÃÊðÃûµÄÐÂÓû§µÈ¡£¡£¡£¡£¡£¡£¡£EDR ³ÌÐòËæºóÒÔΪ´æ´¢ÊðÃûµÄÊý¾Ý¿âÒѱ»¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£¡£¡£¡£ÈôÊÇ EDR ÉèÖÃΪɾ³ýÊÜѬȾµÄÎļþ£¬£¬£¬£¬£¬£¬Ëü½«Ö´Ðд˲Ù×÷¡£¡£¡£¡£¡£¡£¡£Á½ÈËÒÔΪ£¬£¬£¬£¬£¬£¬Êý¾Ý¿â»òÐéÄâ»úÒò´Ë¿ÉÒÔ±»Ô¶³Ìɾ³ý¡£¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/04/22/edr_attack_remote_data_deletion/
3. AKIRA´Ó250¶àÃûÊܺ¦ÕßÄÇÀïÊÕµ½4200ÍòÊê½ð
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬CISA¡¢FBI¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ (NCSC-NL) Ðû²¼µÄÁªºÏͨ¸æÏÔʾ£¬£¬£¬£¬£¬£¬×Ô 2023 ÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬£¬Akira ÀÕË÷Èí¼þÔËÓªÉÌ´ÓÈ«Çò 250 ¶àÃûÊܺ¦ÕßÄÇÀïÊÕµ½ÁË 4200 ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£Akira ÀÕË÷Èí¼þ×Ô 2023 Äê 3 ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒѾÈëÇÖÁ˶à¸öÐÐÒµµÄ¶à¸ö×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨½ÌÓý¡¢½ðÈںͷ¿µØ²ú¡£¡£¡£¡£¡£¡£¡£ÓëÆäËûÀÕË÷Èí¼þÍÅ»ïÒ»Ñù£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÒ»¿îÕë¶Ô VMware ESXi ЧÀÍÆ÷µÄ Linux ¼ÓÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£Akira ÀÕË÷Èí¼þÔËÓªÉÌͨ¹ýÔÚ¼ÓÃÜ֮ǰÇÔÈ¡Êܺ¦ÕßµÄÊý¾ÝÀ´ÊµÑéË«ÖØÀÕË÷Ä£×Ó¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þµÄÔçÆÚ°æ±¾ÊÇÓà C++ ±àдµÄ£¬£¬£¬£¬£¬£¬²¢ÇҸöñÒâÈí¼þÔÚ¼ÓÃÜÎļþÖÐÌí¼ÓÁË .akira À©Õ¹Ãû¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬´Ó 2023 Äê 8 ÔÂÆð£¬£¬£¬£¬£¬£¬Ä³Ð© Akira ¹¥»÷×îÏÈʹÓà Megazord£¬£¬£¬£¬£¬£¬Ëü½ÓÄÉ»ùÓÚ Rust µÄ´úÂ벢ʹÓà .powerranges À©Õ¹Ãû¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£Akira ÍþвÐÐΪÕß¼á³Ö½»ÌæÊ¹Óà Megazord ºÍ Akira£¬£¬£¬£¬£¬£¬°üÀ¨×ÔÁ¦ÊÓ²ìÈ·¶¨µÄ Akira_v2¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/162098/cyber-crime/akira-ransomware-report-fbi.html
4. 2024ÄêµÚÒ»¼¾¶ÈÀÕË÷Èí¼þÖ§¸¶¶î½µÖÁ28%µÄÀúʷеÍ
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷Õß½ñÄêµÄ¿ª¾Ö²¢²»Ë³Ë죬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ Coveware µÄͳ¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬Ô½À´Ô½¶àµÄ¹«Ë¾¾Ü¾øÖ§¸¶ÀÕË÷ÒªÇ󣬣¬£¬£¬£¬£¬µ¼Ö 2024 ÄêµÚÒ»¼¾¶ÈÖ§¸¶Êê½ðµÄ¹«Ë¾µÖ´ïÀúÊ·ÐÂµÍ 28%¡£¡£¡£¡£¡£¡£¡£2023 ÄêµÚËÄÐò¶ÈÕâÒ»Êý×Ö Îª 29%£¬£¬£¬£¬£¬£¬Coveware µÄͳ¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬×Ô 2019 ÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬£¬Ö§¸¶½ð¶îµÄïÔÌÒ»Ö±¼á³ÖÎȹ̡£¡£¡£¡£¡£¡£¡£ÕâÖÖϽµÊÇÓÉÓÚ×é֯ʵÑéÁ˸üÏȽøµÄ±£»£»£»£»¤²½·¥£¬£¬£¬£¬£¬£¬Ò»Ö±¼Ó´óµÄÖ´·¨Ñ¹Á¦À´Öª×ãÆ×ӵIJÆÎñÒªÇ󣬣¬£¬£¬£¬£¬ÒÔ¼°ÍøÂç·¸·¨·Ö×ÓÒ»ÔÙÎ¥·´ÔÚÖ§¸¶Êê½ðµÄÇéÐÎϲ»»áÐû²¼»òתÊÛ±»µÁÊý¾ÝµÄÔÊÐí¡£¡£¡£¡£¡£¡£¡£´ÓÒÑÈ·¶¨µÄÎó²îÀ´¿´£¬£¬£¬£¬£¬£¬Ô¶³Ì»á¼ûºÍÎó²îʹÓÃʩչÁË×î´óµÄ×÷Ó㬣¬£¬£¬£¬£¬ÆäÖÐ CVE-2023-20269¡¢CVE-2023-4966 ºÍ CVE-2024-1708-9 ȱÏÝÔÚµÚÒ»¼¾¶È±»ÀÕË÷Èí¼þÔËÓªÉÌʹÓõÃ×îΪÆÕ±é¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-of-28-percent-in-q1-2024/
5. Veriti Research·¢Ã÷Androxgh0stµÄ¹¥»÷»î¶¯¼¤Ôö
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Veriti Research ·¢Ã÷ Androxgh0st ¶ñÒâÈí¼þ¼Ò×åÌᳫµÄ¹¥»÷»î¶¯¼¤Ôö£¬£¬£¬£¬£¬£¬·¢Ã÷ 600 ¶ą̀ЧÀÍÆ÷Êܵ½Íþв£¬£¬£¬£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÃÀ¹úºÍÓ¡¶È¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ Veriti µÄ²©¿ÍÎÄÕ£¬£¬£¬£¬£¬£¬Androxgh0st ±³ºóµÄµÐÊÖµÄ C2 ЧÀÍÆ÷±»Ì»Â¶£¬£¬£¬£¬£¬£¬Õâ¿ÉÒÔͨ¹ý̻¶ÊÜÓ°ÏìµÄÄ¿µÄÀ´¾ÙÐл¹»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ëæºó¼ÌÐøÏòÊܺ¦Õß·¢³ö¾¯±¨¡£¡£¡£¡£¡£¡£¡£½øÒ»²½Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬Androxgh0st ÔËÓªÕßÕýÔÚʹÓöà¸ö CVE£¨°üÀ¨CVE-2021-3129ºÍCVE-2024-1709£© ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷Éϰ²ÅÅ Web shell£¬£¬£¬£¬£¬£¬´Ó¶øÊÚÓèÔ¶³Ì¿ØÖƹ¦Ð§¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓÐÖ¤¾ÝÅú×¢»îÔ¾µÄ Web shell ÓëCVE-2019-2725Ïà¹Ø¡£¡£¡£¡£¡£¡£¡£×Ô 2022 Äê 12 ÔÂÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬£¬£¬Hackread.com Ò»Ö±ÔÚ¸ú×Ù Androxgh0st µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔËÓªÕßÒÔ°²ÅÅAdhublika ÀÕË÷Èí¼þ¶øÖøÃû£¬£¬£¬£¬£¬£¬Ö®Ç°ÔøÊӲ쵽ÓëÓë Adhublika ×éÖ¯Ïà¹ØµÄ IP µØµã¾ÙÐÐͨѶ¡£¡£¡£¡£¡£¡£¡£
https://www.hackread.com/androxgh0st-malware-servers-botnets-attacks/
6. Hellokity ÀÕË÷Èí¼þµÄ¹¥»÷ÕßÒÔHelloGookie»Ø¹é
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯£¨ÒÔǰ³ÆÎª Hellokity£©ÒÔÐÂÓÖÃû¡°HelloGookie¡±ÖØÐ·ºÆð¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²î¿Ïµ»ú¹¹ MonThreat ͨ¹ýÆä Twitter ÕÊ»§±¨¸æÁËÕâһϣÍû¡£¡£¡£¡£¡£¡£¡£Hellokity ÒÔÆä±¸ÊÜÖõÄ¿µÄÍøÂç¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬£¬Ò»Ö±ÊÇÊý×ÖÀÕË÷µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Òò°²ÅÅÀÕË÷Èí¼þÉøÍ¸ÆóÒµÍøÂç¡¢¼ÓÃÜÊý¾ÝÒÔ¼°Ë÷Òª¾Þ¶îÊê½ð»»È¡½âÃÜÃÜÔ¿¶øÎÛÃûÕÑÖø¡£¡£¡£¡£¡£¡£¡£ËûÃǵÄÔËÓª¶Ô¸÷¸öÐÐÒµÔì³ÉÁË×ÌÈÅ£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÓªÒµÔËÓªºÍÏûºÄÕßÊý¾ÝÒþ˽¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ MonThreat ·ÖÏíµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬Hellokity ²»µ«¸ü¸ÄÁËÃû³Æ£¬£¬£¬£¬£¬£¬²¢ÇÒËÆºõ»¹Éý¼¶ÁËÆäÀÕË÷Èí¼þ¹¤¾ßºÍÕ½ÂÔ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÆ·ÅÆÖØËÜ¿ÉÄÜÊÇΪÁËÌÓ±ÜÒÑ˳ӦÆäÏÈǰҪÁìµÄÖ´·¨ºÍÍøÂçÇå¾²·ÀÓù¡£¡£¡£¡£¡£¡£¡£Hellokity ÒÔÐÂÃû³Æ¡°HelloGookie¡±»Ø¹é£¬£¬£¬£¬£¬£¬¸øÍøÂçÇ徲רҵÈËÊ¿´øÀ´ÁËеÄÌôÕ½¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/hellokity-ransomware-new-name/


¾©¹«Íø°²±¸11010802024551ºÅ