Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

Ðû²¼Ê±¼ä 2022-10-26
1¡¢Pendragon¾Ü¾øLockBitÍÅ»ï6000ÍòÃÀÔªµÄÊê½ðÒªÇó

      

ýÌå10ÔÂ24Èճƣ¬£¬£¬£¬£¬Ó¢¹úÆû³µ¾­ÏúÉÌPendragon GroupÔâµ½LockBitµÄÀÕË÷¹¥»÷¡£ ¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚԼĪһ¸öÔÂǰ£¬£¬£¬£¬£¬Î´Ó°ÏìÆäÕý³£ÔËÓª£¬£¬£¬£¬£¬ËûÃÇÒ»Ö±ÔÚÓëºÚ¿ÍÁªÏµ£¬£¬£¬£¬£¬²¢ÊÕµ½Á˱»µÁÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬£¬£¬µ«Ã»ÓоÙÐÐ̸ÅС£ ¡£¾ÝÓ¢¹úýÌ峯£¬£¬£¬£¬£¬LockBitÒªÇó6000ÍòÃÀÔªÊê½ð£¬£¬£¬£¬£¬¶øPendragon½²»°ÈËÌåÏÖËûÃǼá³Ö²»ÏòºÚ¿Í¸¶¿îµÄ¾öÒé¡£ ¡£Pendragon»¹³ÎÇåµÀ£¬£¬£¬£¬£¬ÆäITÍŶÓÔÚÔâµ½¹¥»÷ºóÁ¬Ã¦×ö³öÁË·´Ó¦£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿Í½öÇÔÈ¡ÁË5%µÄÊý¾Ý¿â¡£ ¡£


https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/


2¡¢CiscoÌáÐÑAnyConnectÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓÃ

      

CiscoÔÚ10ÔÂ25ÈÕÌáÐѿͻ§£¬£¬£¬£¬£¬ÊÊÓÃÓÚWindowsµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÖеÄÁ½¸öÎó²îÕý±»ÆÕ±éʹÓᣠ¡£ÕâЩÎó²î£¨CVE-2020-3433ºÍCVE-2020-3153£©¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´Ö´ÐÐDLLÐ®ÖÆ¹¥»÷²¢½«Îļþ¸´ÖƵ½¾ßÓÐϵͳ¼¶È¨ÏÞµÄϵͳĿ¼¡£ ¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¾ßÓÐϵͳȨÏÞµÄÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£ ¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬ÔÚ2022Äê10Ô£¬£¬£¬£¬£¬Æä·¢Ã÷ÓÐÈËÊÔͼʹÓôËÎó²î£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶¡£ ¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-admins-to-patch-anyconnect-flaw-exploited-in-attacks/


3¡¢ÎÚ¿ËÀ¼¾ÍCubaÍÅ»ïÕë¶ÔÆäÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨

      

¾Ý10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×é(CERT-UA)ÒѾÍÀÕË÷ÍÅ»ïCuba¶ÔÆäÒªº¦¼ü»ù´¡ÉèÊ©µÄ¹¥»÷·¢³ö¾¯±¨¡£ ¡£´Ó10ÔÂ21ÈÕ×îÏÈ£¬£¬£¬£¬£¬CERT-UA¾Í¼ì²âµ½ÐÂÒ»²¨´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Ã°³äÁËÎÚ¿ËÀ¼Îä×°²½¶Ó×ÜÕÕÁϲ¿ÐÂÎÅЧÀͲ¿£¬£¬£¬£¬£¬ÓÕʹÊÕ¼þÈ˵ã»÷ÆäÖеÄǶÈëʽÁ´½Ó£¬£¬£¬£¬£¬×îÖÕ»á×°ÖÃROMCOM RAT¡£ ¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬Ë¼Á¿µ½RomComºóÃŵÄʹÓÃÒÔ¼°Ïà¹ØÎļþµÄÆäËûÌØÕ÷£¬£¬£¬£¬£¬ÍƲâ´Ë´Î»î¶¯ÓëTropical Scorpius(UNC2596)ÓйØ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÈÏÕæ·Ö·¢CubaÀÕË÷Èí¼þ¡£ ¡£


https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html


4¡¢ÐÂµÄ¹ã¸æ»î¶¯Dormant Colors·Ö·¢¶ñÒâChromeÀ©Õ¹

      

10ÔÂ23ÈÕ£¬£¬£¬£¬£¬Guardio LabsÅû¶ÁËÐÂÒ»ÂֵĶñÒâ¹ã¸æ»î¶¯Dormant Colors¡£ ¡£µ½2022Äê10ÔÂÖÐÑ®£¬£¬£¬£¬£¬ÔÚChromeºÍEdgeÍøÂçÊÐËÁÖж¼ÓÐ30¸öä¯ÀÀÆ÷À©Õ¹µÄ±äÖÖ£¬£¬£¬£¬£¬ÀÛ¼ÆÁè¼Ý100ÍòµÄ×°ÖÃÁ¿¡£ ¡£¸Ã»î¶¯µÄÖ÷ÌâÓëÑÕÉ«ÓйØ£¬£¬£¬£¬£¬Ê¼ÓÚ¶ñÒâ¹ã¸æ»î¶¯£¬£¬£¬£¬£¬ÒÔÐÂÓ±µÄÒªÁìÔÚûÈË×¢ÖØµÄÇéÐÎϲà¼ÓÔØÕæÕýµÄ¶ñÒâ´úÂë¡£ ¡£×îºó£¬£¬£¬£¬£¬²»µ«ÇÔȡĿµÄËÑË÷ºÍä¯ÀÀÊý¾Ý£¬£¬£¬£¬£¬²¢Îª10000¸öÍøÕ¾ÒýÁ÷£¬£¬£¬£¬£¬Óû§ÔÚÕâÐ©ÍøÕ¾ÉϾÙÐеÄÈκιºÖÃÐÐΪ¶¼»áΪ¹¥»÷Õß´øÀ´Ó¶½ð¡£ ¡£


https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849


5¡¢SideWinderʹÓÃкóÃÅWarHawk¹¥»÷°Í»ù˹̹µÄ×éÖ¯

      

¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬ZscalerÅû¶Á˺ڿÍÍÅ»ïSideWinderµÄкóÃÅWarHawk¡£ ¡£SideWinderÒÉËÆÓëÓ¡¶ÈÓйØ£¬£¬£¬£¬£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞµÝÈ¥£¬£¬£¬£¬£¬ÓÈÆäÊǰͻù˹̹µÄÕþ¸®¡¢¾ü¶ÓºÍÆóÒµ×éÖ¯¡£ ¡£½ñÄê9Ô£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°Í»ù˹̹¹ú¼ÒµçÁ¦î¿Ïµ¾ÖµÄÕýµ±ÍøÕ¾nepra[.]org[.]pk·¢Ã÷Ò»¸öÎäÆ÷»¯ISOÎļþ£¬£¬£¬£¬£¬À´¼¤»îÓÃÀ´×°ÖÃWarHawkµÄkillchain¡£ ¡£WarHawkÔòαװ³ÉASUS Update SetupºÍRealtek HD Audio ManagerµÈÕýµ±Ó¦Ó㬣¬£¬£¬£¬Ëü·Ö·¢Cobalt Strike×÷Ϊ×îÖÕpayload¡£ ¡£


https://thehackernews.com/2022/10/sidewinder-apt-using-new-warhawk.html


6¡¢ÐÞ½¨¹«Ë¾InterserveÒòÔâµ½ÀÕË÷¹¥»÷±»·£¿£¿£¿£¿£¿£¿î440ÍòÓ¢°÷


10ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬Ó¢¹úÐÞ½¨¹«Ë¾InterserveÒòÀÕË÷¹¥»÷й¶113000ÃûÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬±»Ó¢¹úÊý¾Ý±£»£»¤î¿Ïµ»ú¹¹·£¿£¿£¿£¿£¿£¿î440ÍòÓ¢°÷¡£ ¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬£¬£¬£¬£¬Interserve GroupδÄܽÓÄÉÊʵ±µÄÇå¾²²½·¥À´Ìá·ÀÍøÂç¹¥»÷¡£ ¡£ICOÚ¹Ê͵À£¬£¬£¬£¬£¬¹¥»÷ʼÓÚ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Ä³Ô±¹¤·­¿ªºóÎÞÒâÖÐÏÂÔØÁ˶ñÒâÈí¼þ£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄAVÈí¼þÒÑ·¢Ë;¯±¨¡£ ¡£µ«ºóÐøÊӲ첻·ó³¹µ×£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß»á¼ûÁË283¸öϵͳºÍ16¸öÕË»§£¬£¬£¬£¬£¬²¢Ð¶ÔØÁ˹«Ë¾µÄAVÈí¼þ¡£ ¡£Interserve ÒѾͷ£¿£¿£¿£¿£¿£¿îÏòICOÌá³öÉÏËߣ¬£¬£¬£¬£¬µ«×îÖÕ·£¿£¿£¿£¿£¿£¿î²¢Î´ïÔÌ­¡£ ¡£


https://therecord.media/british-company-fined-4-4-million-over-ransomware-attack/