ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷ Êýǧ̨װ±¸±»¼ÓÃÜ

Ðû²¼Ê±¼ä 2021-12-28

ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷£¬Êýǧ̨װ±¸±»¼ÓÃÜ


ShutterflyÔâµ½ContiµÄÀÕË÷¹¥»÷£¬Êýǧ̨װ±¸±»¼ÓÃÜ.png


¾ÝýÌåÓÚ12ÔÂ27Èճƣ¬Shutterfly¹«Ë¾Ôâµ½ÁËContiÀÕË÷¹¥»÷¡£¹¥»÷±¬·¢ÔÚÁ½ÖÜǰ£¬µ¼ÖÂShutterflyÆìϵÄLifetouch¡¢BorrowLenesesºÍGroovebook·þÎñÖÐÖ¹¡£±ðµÄ£¬ContiÉù³ÆÒѼÓÃܸù«Ë¾µÄ4000¶ą̀װ±¸ºÍ120̨VMware ESXi·þÎñÆ÷¡£¾ÝϤ£¬¹¥»÷ÕßÒªÇóÖ§¸¶Êý°ÙÍòÃÀÔªµÄÊê½ð£¬²¢ÒÑÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢£¬°üÀ¨Ö´·¨Ð­Òé¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢¹«Ë¾µÇ¼ƾ֤ÒÔ¼°ShutterflyÊÐËÁµÄÔ´ÂëµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/shutterfly-services-disrupted-by-conti-ransomware-attack/


Cyble·¢Ã÷еÄsincronizadorÕë¶Ô°ÍÎ÷Ita¨² Unibanco


Cyble·¢Ã÷еÄsincronizadorÕë¶Ô°ÍÎ÷Ita¨² Unibanco.png


12ÔÂ23ÈÕ£¬CybleÐû²¼Á˹ØÓÚÐÂAndroidÒøÐÐľÂísincronizadorµÄÑо¿±¨¸æ¡£¹¥»÷Õßð³äÓë°ÍÎ÷ÒøÐÐIta¨² UnibancoÏà¹ØµÄÕýµ±Ó¦Óã¬ÒÔsincronizador.apkΪÃûÍйÜÔÚÒ»¸öαÔìµÄGoogle PlayÊÐËÁÉÏ£¬²¢ÏÔʾÏÂÔØÁ¿Áè¼Ý189Íò´Î¡£Ñо¿Ö°Ô±ÌåÏÖ£¬¸Ã¶ñÒâÓ¦ÓûáʵÑé¸Ä¶¯Óû§µÄÊäÈë×ֶΣ¬²¢ÔÚÕýµ±µÄIta¨² UnibancoÓ¦ÓÃÉϾÙÐÐڲƭÉúÒâ¡£  


Ô­ÎÄÁ´½Ó£º

https://blog.cyble.com/2021/12/23/malicious-app-targets-major-brazilian-bank-itau-unibanco/


Ñо¿ÍŶӷ¢Ã÷ÒÔOmicronΪÖ÷ÌâµÄ´¹Âڻ·Ö·¢Dridex


Dridex.png


¾ÝýÌåÔÚ12ÔÂ24ÈÕ±¨µÀ£¬MalwareHunterTeamºÍ604Kuzushi·¢Ã÷д¹ÂڻÒÔOmicronΪÖ÷Ìâ·Ö·¢Dridex¡£¹¥»÷Éù³ÆÊÕ¼þÈ˽Ӵ¥µÄÒ»¸öͬÊÂCOVID-19 OMICRON¼ì²â³ÊÑôÐÔ£¬ÐèÒª·­¿ª¸½¼þµÄExcel±í¸ñÉó²éÏêÇé¡£µ±Ä¿µÄÆôÓúêÇÒÆä×°±¸±»Ñ¬È¾ºó£¬»áÓÐÒ»¸öµ¯´°ÌáÐÑCOVID-19ÔáÀñÔ®ÖúÈÈÏߵ绰ºÅÂëÀ´¼¥Ð¦Óû§¡£ÔçÔÚÒ»ÖÜǰ£¬ÔøÓÐÒÔ¿ª³ýÐÅϢΪÖ÷ÌâµÄ´¹Âڻ·Ö·¢Dridex¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125976/cyber-crime/dridex-covid-19-omicron-campaign.html


SophosLabsÅû¶AvosLockerÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú


SophosLabsÅû¶AvosLockerÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú.png


12ÔÂ22ÈÕ£¬SophosLabsÐû²¼Á˹ØÓÚAvosLockerµÄ×îÐÂÑо¿¡£AvosLockerÊ×ÏÈ»áʹÓÃÕýµ±µÄ×Ô¶¯»¯²¹¶¡¹ÜÀí¹¤¾ßPDQ Deploy½«¶à¸öWindowsÅú´¦Öóͷ£¾ç±¾×°Öõ½Ä¿µÄ×°±¸ÉÏ£¬ÕâЩ¾ç±¾¿É¸Ä¶¯»òɾ³ýÌØ¶¨Çå¾²¹¤¾ßµÄ×¢²á±íÏ²¢½¨ÉèÒ»¸öÃûΪnewadminµÄ¹ÜÀíÔ±ÕË»§£¬È»ºó×°ÖöñÒâÈí¼þ¡£±ðµÄ£¬¹¥»÷Õß»¹½«×°±¸½«»úеÉèΪÇ徲ģʽ£¬À´½ûÓÃÕýÔÚÔËÐеÄÇå¾²¹¤¾ß¡£


Ô­ÎÄÁ´½Ó£º

https://news.sophos.com/en-us/2021/12/22/avos-locker-remotely-accesses-boxes-even-running-in-safe-mode/


ÎïÁ÷¹«Ë¾DW Morgan´æ´¢Í°ÉèÖùýʧй¶100GBµÄÊý¾Ý


ÎïÁ÷¹«Ë¾DW Morgan´æ´¢Í°ÉèÖùýʧй¶100GBµÄÊý¾Ý.png


ýÌå12ÔÂ27ÈÕ±¨µÀ£¬Website Planet͸¶ÎïÁ÷¹«Ë¾DW Morganй¶Áè¼Ý100 GBµÄÊý¾Ý¡£´Ë´Îй¶ÊÂÎñÊÇÓÉAmazon S3´æ´¢Í°ÉèÖùýʧµ¼Ö£¬ÓÚ11ÔÂ12ÈÕ±»·¢Ã÷£¬¹²°üÀ¨Áè¼Ý250Íò¸öÓë»õÔ˺Ϳͻ§Ïà¹ØµÄÎļþ£¬Éæ¼°°®Á¢ÐźÍ˼¿ÆµÈ¶à¸ö¹«Ë¾¡£DW MorganÔÚÊÕµ½Ð¹Â¶¾¯±¨ºóµÄ4ÌìÄÚ½«Êý¾Ý¿â±£»¤ÆðÀ´£¬ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âÊÇ·ñ±»»á¼û¹ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/logistics-giant-d-w-morgan-exposed-clients-data/


Intel 471Ðû²¼2021ÄêQ3ÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


Intel 471Ðû²¼2021ÄêQ3ÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ.png


12ÔÂ16ÈÕ£¬Intel 471Ðû²¼ÁË2021ÄêµÚÈý¼¾¶ÈÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬2021Äê7Ôµ½9Ô£¬¹²¼ì²âµ½612´ÎÀÕË÷¹¥»÷»î¶¯£¬¿É¹éÒòÓÚ35¸ö²î±ðµÄÀÕË÷Èí¼þ±äÌå¡£ÔÚÕâЩ¹¥»÷ÖУ¬Ô¼60%µÄ»î¶¯Óë4¸ö±äÌåÓйأºLockBit 2.0£¨Õ¼±È33%£©¡¢Conti£¨15.2%£©¡¢BlackMatter£¨6.9%£©ºÍHive£¨6%£©¡£ÕâÒ»¼¾¶È£¬ÊÜÓ°Ïì×î´óµÄÐÐÒµÊÇÖÆÔì¡¢ÏûºÄÆ·ºÍ¹¤Òµ²úÆ·¡¢×¨Òµ·þÎñºÍ×ÉѯÒÔ¼°·¿µØ²úÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£º

https://intel471.com/blog/ransomware-attacks-2021-lockbit-hive-conti-clop-revil-blackmatter