ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷ Êýǧ̨װ±¸±»¼ÓÃÜ

Ðû²¼Ê±¼ä 2021-12-28

ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷ £¬Êýǧ̨װ±¸±»¼ÓÃÜ


ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷£¬Êýǧ̨װ±¸±»¼ÓÃÜ.png


¾ÝýÌåÓÚ12ÔÂ27ÈÕ³Æ £¬Shutterfly¹«Ë¾Ôâµ½ÁËContiÀÕË÷¹¥»÷¡£¹¥»÷±¬·¢ÔÚÁ½ÖÜǰ £¬µ¼ÖÂShutterflyÆìϵÄLifetouch¡¢BorrowLenesesºÍGroovebook·þÎñÖÐÖ¹¡£±ðµÄ £¬ContiÉù³ÆÒѼÓÃܸù«Ë¾µÄ4000¶ą̀װ±¸ºÍ120̨VMware ESXi·þÎñÆ÷¡£¾ÝϤ £¬¹¥»÷ÕßÒªÇóÖ§¸¶Êý°ÙÍòÃÀÔªµÄÊê½ð £¬²¢ÒÑÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢ £¬°üÀ¨Ö´·¨Ð­Òé¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢¹«Ë¾µÇ¼ƾ֤ÒÔ¼°ShutterflyÊÐËÁµÄÔ´ÂëµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/shutterfly-services-disrupted-by-conti-ransomware-attack/


Cyble·¢Ã÷еÄsincronizadorÕë¶Ô°ÍÎ÷Ita¨² Unibanco


Cyble·¢Ã÷еÄsincronizadorÕë¶Ô°ÍÎ÷Ita¨² Unibanco.png


12ÔÂ23ÈÕ £¬CybleÐû²¼Á˹ØÓÚÐÂAndroidÒøÐÐľÂísincronizadorµÄÑо¿±¨¸æ¡£¹¥»÷Õßð³äÓë°ÍÎ÷ÒøÐÐIta¨² UnibancoÏà¹ØµÄÕýµ±Ó¦Óà £¬ÒÔsincronizador.apkΪÃûÍйÜÔÚÒ»¸öαÔìµÄGoogle PlayÊÐËÁÉÏ £¬²¢ÏÔʾÏÂÔØÁ¿Áè¼Ý189Íò´Î¡£Ñо¿Ö°Ô±ÌåÏÖ £¬¸Ã¶ñÒâÓ¦ÓûáʵÑé¸Ä¶¯Óû§µÄÊäÈë×Ö¶Î £¬²¢ÔÚÕýµ±µÄIta¨² UnibancoÓ¦ÓÃÉϾÙÐÐڲƭÉúÒâ¡£  


Ô­ÎÄÁ´½Ó£º

https://blog.cyble.com/2021/12/23/malicious-app-targets-major-brazilian-bank-itau-unibanco/


Ñо¿ÍŶӷ¢Ã÷ÒÔOmicronΪÖ÷ÌâµÄ´¹ÂÚÔ˶¯·Ö·¢Dridex


Dridex.png


¾ÝýÌåÔÚ12ÔÂ24ÈÕ±¨µÀ £¬MalwareHunterTeamºÍ604Kuzushi·¢Ã÷д¹ÂÚÔ˶¯ÒÔOmicronΪÖ÷Ìâ·Ö·¢Dridex¡£¹¥»÷Éù³ÆÊÕ¼þÈ˽Ӵ¥µÄÒ»¸öͬÊÂCOVID-19 OMICRON¼ì²â³ÊÑôÐÔ £¬ÐèÒª·­¿ª¸½¼þµÄExcel±í¸ñÉó²éÏêÇé¡£µ±Ä¿µÄÆôÓúêÇÒÆä×°±¸±»Ñ¬È¾ºó £¬»áÓÐÒ»¸öµ¯´°ÌáÐÑCOVID-19ÔáÀñÔ®ÖúÈÈÏߵ绰ºÅÂëÀ´¼¥Ð¦Óû§¡£ÔçÔÚÒ»ÖÜǰ £¬ÔøÓÐÒÔ¿ª³ýÐÅϢΪÖ÷ÌâµÄ´¹ÂÚÔ˶¯·Ö·¢Dridex¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125976/cyber-crime/dridex-covid-19-omicron-campaign.html


SophosLabsÅû¶AvosLockerÐÂÒ»ÂÖ¹¥»÷Ô˶¯µÄϸ½Ú


SophosLabsÅû¶AvosLockerÐÂÒ»ÂÖ¹¥»÷Ô˶¯µÄϸ½Ú.png


12ÔÂ22ÈÕ £¬SophosLabsÐû²¼Á˹ØÓÚAvosLockerµÄ×îÐÂÑо¿¡£AvosLockerÊ×ÏÈ»áʹÓÃÕýµ±µÄ×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ßPDQ Deploy½«¶à¸öWindowsÅú´¦Öóͷ£¾ç±¾×°Öõ½Ä¿µÄ×°±¸ÉÏ £¬ÕâЩ¾ç±¾¿É¸Ä¶¯»òɾ³ýÌØ¶¨Çå¾²¹¤¾ßµÄ×¢²á±íÏî £¬²¢½¨ÉèÒ»¸öÃûΪnewadminµÄÖÎÀíÔ±ÕË»§ £¬È»ºó×°ÖöñÒâÈí¼þ¡£±ðµÄ £¬¹¥»÷Õß»¹½«×°±¸½«»úеÉèΪÇ徲ģʽ £¬À´½ûÓÃÕýÔÚÔËÐеÄÇå¾²¹¤¾ß¡£


Ô­ÎÄÁ´½Ó£º

https://news.sophos.com/en-us/2021/12/22/avos-locker-remotely-accesses-boxes-even-running-in-safe-mode/


ÎïÁ÷¹«Ë¾DW Morgan´æ´¢Í°ÉèÖùýʧй¶100GBµÄÊý¾Ý


ÎïÁ÷¹«Ë¾DW Morgan´æ´¢Í°ÉèÖùýʧй¶100GBµÄÊý¾Ý.png


ýÌå12ÔÂ27ÈÕ±¨µÀ £¬Website Planet͸¶ÎïÁ÷¹«Ë¾DW Morganй¶Áè¼Ý100 GBµÄÊý¾Ý¡£´Ë´Îй¶ÊÂÎñÊÇÓÉAmazon S3´æ´¢Í°ÉèÖùýʧµ¼Ö £¬ÓÚ11ÔÂ12ÈÕ±»·¢Ã÷ £¬¹²°üÀ¨Áè¼Ý250Íò¸öÓë»õÔ˺Ϳͻ§Ïà¹ØµÄÎļþ £¬Éæ¼°°®Á¢ÐźÍ˼¿ÆµÈ¶à¸ö¹«Ë¾¡£DW MorganÔÚÊÕµ½Ð¹Â¶¾¯±¨ºóµÄ4ÌìÄÚ½«Êý¾Ý¿â±£»¤ÆðÀ´ £¬ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âÊÇ·ñ±»»á¼û¹ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/logistics-giant-d-w-morgan-exposed-clients-data/


Intel 471Ðû²¼2021ÄêQ3ÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


Intel 471Ðû²¼2021ÄêQ3ÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ.png


12ÔÂ16ÈÕ £¬Intel 471Ðû²¼ÁË2021ÄêµÚÈý¼¾¶ÈÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö £¬2021Äê7Ôµ½9Ô £¬¹²¼ì²âµ½612´ÎÀÕË÷¹¥»÷Ô˶¯ £¬¿É¹éÒòÓÚ35¸ö²î±ðµÄÀÕË÷Èí¼þ±äÌå¡£ÔÚÕâЩ¹¥»÷ÖÐ £¬Ô¼60%µÄÔ˶¯Óë4¸ö±äÌåÓйأºLockBit 2.0£¨Õ¼±È33%£©¡¢Conti£¨15.2%£©¡¢BlackMatter£¨6.9%£©ºÍHive£¨6%£©¡£ÕâÒ»¼¾¶È £¬ÊÜÓ°Ïì×î´óµÄÐÐÒµÊÇÖÆÔì¡¢ÏûºÄÆ·ºÍ¹¤Òµ²úÆ·¡¢×¨Òµ·þÎñºÍ×ÉѯÒÔ¼°·¿µØ²úÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£º

https://intel471.com/blog/ransomware-attacks-2021-lockbit-hive-conti-clop-revil-blackmatter