TrickBotбäÖÖ¿ÉÇÔÈ¡OpenSSHºÍOpenVPNÃÜÔ¿£»Raccoon Stealerй¥»÷Ô˶¯Ö÷ÒªÕë¶Ô½ðÈÚ»ú¹¹
Ðû²¼Ê±¼ä 2019-11-25
Catch Hospitality Group¶à¼Ò²ÍÌüµÄPoSϵͳÔâ¶ñÒâÈí¼þ¹¥»÷£¬¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢±»ÇÔ¡£Æ¾Ö¤¸Ã¹«Ë¾Ðû²¼µÄÊÂÎñ֪ͨ£¬Catch NYCºÍCatch RooftopµÄPoSϵͳÔÚ2019Äê3ÔÂ19ÈÕÖÁ10ÔÂ17ÈÕÖ®¼äѬȾÁ˶ñÒâÈí¼þ£¬¶øCatch SteakµÄѬȾʱ¼äÔòΪ9ÔÂ17ÈÕÖÁ10ÔÂ17ÈÕ¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔÈ¡¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢£¬°üÀ¨¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÄÚ²¿ÑéÖ¤Â룬±ðµÄ£¬ÔÚijЩÇéÐÎÏ¿ÉÄÜ»¹°üÀ¨¿Í»§µÄÐÕÃû¡£¸Ã¹«Ë¾³Æ²¢·ÇËùÓеÄPoS×°±¸¶¼±»Ñ¬È¾£¬ÆäËùʹÓõÄÁ½ÖÖPoS×°±¸ÖÐÖ»ÓаĘ́ʹÓõÄ×°±¸Êܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/catch-restaurants-disclose-credit-card-stealing-malware-incident/2¡¢Waterloo BrewingÒòºÚ¿Í¹¥»÷Ëðʧ210ÍòÃÀÔª
Waterloo BrewingÔâºÚ¿Í¹¥»÷Ëðʧ210ÍòÃÀÔª¡£¸Ã¹«Ë¾Í¸Â¶³Æ´ËÊÂÎñÊÇÒ»Æð±¬·¢ÔÚ±¾Ô³õµÄÉç½»¹¤³ÌÍøÂç¹¥»÷£¬¹¥»÷Õßαװ³ÉծȨÈ˵ÄÔ±¹¤ÒªÇó¾ÙÐÐÒøÐÐתÕË£¬¸Ã¹«Ë¾Ö±µ½±¾ÖܲÅÒâʶµ½Ô⵽ڲơ£¸Ã¹«Ë¾ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ¿ÉÄÜÎÞ·¨ÊÕ»ØËùÓлò²¿·Ö×ʽð¡£ÔÚµÃ֪ڲƺ󣬸ù«Ë¾¶ÔÒøÐÐÕË»§ÖеÄÉúÒâ¼°ÄÚ²¿ÏµÍ³ºÍÅÌËã»úÍøÂç¾ÙÐÐÁËÉó²é£¬ÏÖÔڸù«Ë¾²»ÒÔΪÆäϵͳÔâµ½ÆÆËð£¬Ò²²»ÒÔΪÆä¿Í»§µÄÈκÎСÎÒ˽¼ÒÐÅÏ¢±£´æÎ£º¦¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/waterloo-brewing-admits-to-having-lost-21-million-in-a-social-engineering-attack-73c15cf53¡¢ÃÀ¹úÁ¬Ëø·¹µêChurch's Chicken¶à¼Ò²ÍÌüÔâºÚ¿Í¹¥»÷
ÃÀ¹úÁ¬Ëø·¹µêChurch's ChickenÔâºÚ¿Í¹¥»÷£¬¸Ã¹«Ë¾ÌåÏÖÓÃÓÚ´¦Öóͷ£¸¶¿îµÄÅÌËã»úϵͳ±£´æÎ´ÊÚȨµÄ¿ÉÒÉÔ˶¯£¬¿Í»§Êý¾Ý¿ÉÄÜй¶¡£¸ÃÊÂÎñ±¬·¢ÔÚ10ÔÂ⣬¿ÉÄÜÓ°ÏìµÄÊý¾Ý°üÀ¨¿Í»§µÄÐÅÓÿ¨ºÅÂë¡¢ÐÕÃûºÍÓÐÓÃÆÚ¡£Church's ChickenÔÚÈ«ÌìÏÂı»®×Ŷà¼Ò²Í¹Ý£¬µ«¸Ã¹«Ë¾ÌåÏÖÖ»ÓÐÃÀ¹úµÄ²¿·Ö²Í¹ÝÊܵ½Ó°Ïì¡£ÏÖÔÚÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬¸Ã¹«Ë¾ÈÔÔÚʵÑéÈ·¶¨ÊÜÓ°ÏìµÄÏêϸ²Í¹Ý¼°ÊÜÓ°Ïìʱ¼ä¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/churchs-chicken-warns-of-possible/4¡¢ÐÂÔóÎ÷ÖÝÀûÎÄ˹¶ÙÑ§ÇøÔâÀÕË÷Èí¼þ¹¥»÷
ÐÂÔóÎ÷ÖÝÀûÎÄ˹¶Ù¹«Á¢Ñ§ÇøÓÚ11ÔÂ21ÈÕÊܵ½ÀÕË÷Èí¼þ¹¥»÷£¬¸ÃÑ§ÇøÒÑִ֪ͨ·¨²¿·Ö£¬²¢ÕýÔÚÓëÇå¾²¹«Ë¾ÏàÖúÊÓ²ìºÍ¶ÔÆäϵͳ¾ÙÐÐÆÊÎö¡£¸ÃÑ§ÇøÖ¸³ö´ó´ó¶¼Ñ§Ð£·þÎñ¶¼Òѻָ´Õý³£ÔËÐУ¬µ«ËüÃǵÄͨÀýµç»°ÏµÍ³ºÍ¼Ò³¤»á¼ûÃÅ»§ÍøÕ¾ÈÔ²»¿ÉÓá£ÏÖÔÚÉÐδÅû¶¹¥»÷ÕßÊÇÔõÑù½øÈë¸ÃÑ§ÇøµÄÍøÂçµÄ£¬Ò²²»ÇåÎúѬȾµÄÀÕË÷Èí¼þÀàÐÍ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/livingston-school-district-in-new-jersey-hit-with-ransomware/
5¡¢TrickBotбäÖÖ¿ÉÇÔÈ¡OpenSSHºÍOpenVPNÃÜÔ¿
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӷ¢Ã÷TrickBotµÄбäÖÖ¸üÐÂÁËÃÜÂëÇÔȡģ¿é£¬¿ÉÓÃÓÚÇÔÈ¡OpenSSH˽ԿÒÔ¼°OpenVPNÃÜÂëºÍÉèÖÃÎļþ¡£¸ÃÄ£¿é²¢²»ÊÇÐÂÔöÌíµÄ£¬ÔçÔÚ2018Äê11ÔÂÑо¿Ö°Ô±¾Í·¢Ã÷Á˿ɴӶà¸öä¯ÀÀÆ÷ºÍÓ¦ÓóÌÐòÖÐÇÔÈ¡ÃÜÂëµÄÄ£¿é¡£¸ÃÄ£¿éÔÚ2Ô·ݾÙÐÐÁËÉý¼¶£¬¿ÉÒÔÇÔÈ¡VNC¡¢PuTTY¼°RDP·þÎñÖеÄÉí·ÝÑé֤ƾ֤¡£ÏÖÔÚ11Ô·ÝÑо¿Ö°Ô±·¢Ã÷¸ÃÄ£¿éÕýÔÚͨ¹ýHTTP POSTÇëÇó½«OpenSSH˽ԿÒÔ¼°OpenVPNÃÜÂëºÍÉèÖÃÎļþ·¢Ë͵½C2·þÎñÆ÷¡£ÕâÅú×¢×Ô2016Äê10Ô±»·¢Ã÷ÒÔÀ´£¬TrickBotÒ»Ö±ÔÚ¸üÐÂÆä¹¦Ð§ºÍÄ£¿é¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/trickbot-trojan-getting-ready-to-steal-openssh-and-openvpn-keys/
6¡¢Raccoon Stealerй¥»÷Ô˶¯Ö÷ÒªÕë¶Ô½ðÈÚ»ú¹¹
ƾ֤CofenseÐû²¼µÄ±¨¸æ£¬¶ñÒâÈí¼þRaccoon Stealer±³ºóµÄ·¸·¨·Ö×Ó½ÓÄÉÁËÒ»ÖÖ¼òÆÓÓÐÓõÄÊÖÒÕÀ´Èƹý΢ÈíºÍÈüÃÅÌú¿ËµÄ·´À¬»øÓʼþÍø¹Ø£¬²¢ÔÚ×î½üµÄBEC¹¥»÷Ô˶¯ÖÐÖ÷ÒªÕë¶Ô½ðÈÚ»ú¹¹¡£¸Ã¶ñÒâÈí¼þͨ¹ýÓɺڿͿØÖƵÄDropboxÕÊ»§ÖÐÍйܵÄ.IMGÎļþ·Ö·¢¡£Æ¾Ö¤CybereasonÔÚ10ÔÂÐû²¼µÄÑо¿±¨¸æ£¬×Ô4ÔÂÒÔÀ´£¬¸Ã¶ñÒâÈí¼þÒÑѬȾÁËÉÏÍò¸öWindowsϵͳ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/raccoon-stealer-malware-scurries-past-microsoft-messaging-gateways/150545/


¾©¹«Íø°²±¸11010802024551ºÅ