INC RANSOM ´ÓËÕ¸ñÀ¼ NHS ÖÐÇÔÈ¡ 3TB µÄÊý¾Ý

Ðû²¼Ê±¼ä 2024-03-29
1. INC RANSOM ´ÓËÕ¸ñÀ¼ NHS ÖÐÇÔÈ¡ 3TB µÄÊý¾Ý


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬INC ÀÕË÷ÀÕË÷ÍŻォËÕ¸ñÀ¼¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ (NHS) Ìí¼Óµ½Æä Tor Ð¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÂç·¸·¨×éÖ¯Éù³ÆÇÔÈ¡ÁË 3 TB µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÍþвҪй¶ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ËÕ¸ñÀ¼µÄ NHS£¨¼´¹úÃñÒ½ÁÆÐ§ÀÍϵͳ£©ÊÇΪËÕ¸ñÀ¼Ð§À͵Ĺ«¹²×ÊÖúµÄÒ½ÁƱ£½¡ÏµÍ³¡£¡£¡£¡£¡£¡£¡£¡£ËüÌṩÆÕ±éµÄÒ½ÁƱ£½¡Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Ò½Ôº¡¢È«¿ÆÒ½Éú (GP)¡¢ÐÄÀí¿µ½¡Ð§ÀͺÍÉçÇøÒ½ÁƱ£½¡¡£¡£¡£¡£¡£¡£¡£¡£ËÕ¸ñÀ¼Õþ¸®ÈÏÕæ¼àÊÓËÕ¸ñÀ¼µÄ NHS£¬£¬£¬£¬£¬£¬£¬ £¬ÆäÔË×÷ÓëÓ¢¸ñÀ¼¡¢Íþ¶ûÊ¿ºÍ±±°®¶ûÀ¼µÄ NHS ϵͳÍÑÀë¡£¡£¡£¡£¡£¡£¡£¡£NHSScotland ÏÖÔÚÓµÓÐÔ¼ 140000 ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬ £¬ÂþÑÜÔÚ 14 ¸öµØÇø NHS ίԱ»á¡¢7 ¸ö NHS ÌØÊâίԱ»áºÍ 1 ¸ö¹«¹²ÎÀÉúÆø¹¹¡£¡£¡£¡£¡£¡£¡£¡£Ã¿¸ö NHS ίԱ»á¶¼¶ÔËÕ¸ñÀ¼²¿³¤ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬ £¬²¢»ñµÃËÕ¸ñÀ¼Õþ¸®ÎÀÉúºÍÉç»á±£½¡ÀíÊ»áµÄÖ§³Ö¡£¡£¡£¡£¡£¡£¡£¡£µØÇø NHS ίԱ»áÈÏÕæ±£»£»£»¤ºÍ¸ÄÉÆÆäÈËÃñµÄ¿µ½¡²¢ÌṩһÏßÒ½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£ÌØÊâ NHS ίԱ»áͨ¹ýÌṩһϵÁÐÖ÷ÒªµÄר¼ÒºÍ¹ú¼ÒЧÀÍÀ´Ö§³ÖµØÇø NHS ίԱ»á¡£¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/161143/data-breach/inc-ransom-hacked-national-health-service-of-scotland.html


2. Stork ¼à¿Ø¹¤¾ßÖеÄÎó²î¿ÉÄܵ¼ÖÂЧÀÍÆ÷±»Ð®ÖÆ


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬Çå¾²Ñо¿Ö°Ô±ÔÚ Stork Öз¢Ã÷ÁËÒ»¸öÑÏÖØÎó²î(CVE-2024-28872)£¬£¬£¬£¬£¬£¬£¬ £¬Stork ÊÇ Kea DHCP ЧÀÍÆ÷µÄÊ¢ÐпªÔ´ÍøÂç¼à¿Ø¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¡£Õâ¸öȱÏÝ¿ÉÄܵ¼Ö¹¥»÷Õß¿ÉÄÜ»áÐ®ÖÆ Stork ЧÀÍÆ÷¡¢ÆÆËðÃô¸ÐÊý¾Ý²¢ÆÆËð»ù±¾ÍøÂçЧÀÍ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ Stork ÑéÖ¤ TLS Ö¤ÊéµÄ·½·¨ÖС£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý´Ó Stork ЧÀÍÆ÷»ñÈ¡ÓÐÓÃµÄ TLS Ö¤Ê鲢ʹÓÃËüÅþÁ¬µ½ Stork ÊðÀí£¨ÓëÊÜ¼à¿ØÐ§ÀÍÒ»ÆðÔËÐеÄÈí¼þ£©À´Ê¹ÓôËȱÏÝ¡£¡£¡£¡£¡£¡£¡£¡£Ò»µ©½¨ÉèÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õ߾ͿÉÒÔÏòÊÜ¼à¿ØµÄЧÀÍ£¨ÀýÈç Kea »ò BIND 9£©·¢Ë;ßÓÐÌáÉýȨÏ޵ĶñÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£¾¡¿ì½« Stork ¸üе½×îеÄÐÞ²¹°æ±¾£¨1.15.1 »ò¸ü¸ß°æ±¾£©¡£¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/cve-2024-28872-vulnerability-in-stork-monitoring-tool-could-enable-server-takeover/


3. WarzoneRAT ¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬£¬ £¬°²ÅÅÖØ´óµÄ¶à½×¶Î¹¥»÷


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬ WarzoneRAT£¨Ò²³ÆÎª Avemaria£©ÔÚ 2 ÔÂ·Ý FBI ¿ÛѺÆä»ù´¡ÉèÊ©µ¼Ö¶ÌÔÝÖÐÖ¹ºó¾íÍÁÖØÀ´¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒµÄÒ»·Ýб¨¸æ(CRIL)£¬£¬£¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßÏÖÔÚÕýÔÚÉñÃØ¡¢¶à½×¶Î¹¥»÷ÖÐÆð¾¢°²ÅÅÕâÖÖÔöÇ¿ÐÍ RAT¡£¡£¡£¡£¡£¡£¡£¡£×îÐ嵀 WarzoneRAT»î¶¯Ö÷Ҫͨ¹ýÒÔ˰ÊÕΪÖ÷ÌâµÄÀ¬»øÓʼþÀ´Õë¶ÔÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬ £¬ÇÉÃîµØÊ¹ÓÃʵʱÇÒ¾­³£ÒýÆð½¹ÂǵÄÖ÷ÌâÀ´ÔöÌíÓû§·­¿ª¶ñÒ⸽¼þµÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£¡£¡£WarzoneRAT µÄ¾íÍÁÖØÀ´ÌáÐÑÈËÃÇ£¬£¬£¬£¬£¬£¬£¬ £¬×ÝÈ»ÊÇÖÐÖ¹µÄ¶ñÒâÈí¼þ²Ù×÷Ò²¿ÉÄÜ»áѸËÙ»Ö¸´£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÇÒͨ³£»£»£»áÒÔ¸üÖØ´óµÄÐÎʽ»Ö¸´¡£¡£¡£¡£¡£¡£¡£¡£×Ô¶¯Ð¡Ðĺͷֲã·ÀÓùÕ½ÂÔ¹ØÓÚСÎÒ˽¼ÒºÍ×éÖ¯±£»£»£»¤×Ô¼ºÃâÊÜÕâÖÖһֱת±äµÄÍþвÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/infamous-warzonerat-malware-returns-deploys-sophisticated-multi-stage-attacks/


4. ÒþÃØµÄРGolang ľÂíʹÓÃÐéα֤Êé¾ÙÐÐÌÓ±ÜͨѶ


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓà Golang ±à³ÌÓïÑÔ±àдµÄ½ÆÕ©µÄÐÂľÂí¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÒõÏյĶñÒâÈí¼þ½ÓÄÉһϵÁÐÓÕÆ­Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ £¬°üÀ¨µØÀí¼ì²éºÍ×°ÖÃڲƭÐÔ¸ùÖ¤Ê飬£¬£¬£¬£¬£¬£¬ £¬ÒÔά³ÖÓëÆäÏÂÁîºÍ¿ØÖÆ (C2) ЧÀÍÆ÷µÄÒþ²ØÍ¨Ñ¶Í¨µÀ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄÌØÂåÒÁľÂíÊ×ÏÈÅÄÉãÊÜѬȾϵͳµÄ¿ìÕÕ£¬£¬£¬£¬£¬£¬£¬ £¬¿ÉÄÜ»áÍøÂçÓÐÕë¶ÔÐԵĹ¥»÷µÄÖ÷ÒªÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬£¬ £¬Ëü»á´óµ¨µØÔÚ Windows ×¢²á±íÖÐ×°ÖÃαÔìµÄ¸ùÖ¤Êé¡£¡£¡£¡£¡£¡£¡£¡£Õâһа¶ñ°ì·¨Ê¹ÆäÄܹ»×èµ²²¢¿ÉÄÜʹÓüÓÃÜµÄ HTTPS Á÷Á¿£¬£¬£¬£¬£¬£¬£¬ £¬´Ó¶øÊ¹Óû§ÈÝÒ×ÔâÊÜÊý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£¡£¡£ËäȻûÓÐÌØ¶¨µÄ¶ñÒâÈí¼þ¼Ò×åÓë¸ÃľÂíÏà¹Ø£¬£¬£¬£¬£¬£¬£¬ £¬µ«Ñо¿Ö°Ô±ÖÒÑÔ˵£¬£¬£¬£¬£¬£¬£¬ £¬ÔÚ֮ǰÓë PureLog Stealer¡¢AgentTesla ºÍ GuLoader µÈÎÛÃûÕÑÖøµÄÍþвÏà¹ØµÄ»î¶¯ÖÐÒѾ­·¢Ã÷ÁËËùÉæ¼°µÄ IP ºÍ URL µØµã¡£¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/stealthy-new-golang-trojan-exploits-fake-certificates-for-evasive-communication/


5. CISA Ðû²¼ÍøÂçÊÂÎñ±¨¸æ¹æÔò²Ý°¸


3ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹ú×î¸ßÍøÂçÇå¾²»ú¹¹Ðû²¼ÁËÒ»ÏîйæÔòµÄ³õ¸å£¬£¬£¬£¬£¬£¬£¬ £¬Ïêϸ˵Ã÷ÎúÒªº¦»ù´¡ÉèÊ©×éÖ¯ÐèÒªÔõÑùÏòÁª°îÕþ¸®±¨¸æÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA)ƾ֤¡¶Òªº¦»ù´¡ÉèÊ©ÍøÂçÊÂÎñ±¨¸æ·¨¡·Ïò¡¶Áª°î¹«±¨¡·Ðû²¼ÁË447 Ò³µÄ¹æÔò£¬£¬£¬£¬£¬£¬£¬ £¬ÔÊÐí¹«ÖÚ¶ÔÆä½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£¡£¡£ÁìÍÁÇå¾²²¿²¿³¤ÑÇÀúº¼µÂÂÞ¡¤ÂíÔ¼¿¨Ë¹ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ £¬ÕâЩÐÅÏ¢½«Ê¹ CISA ºÍÆäËû»ú¹¹Äܹ»¸üºÃµØÓ¦¶ÔÊÂÎñ²¢ÕÒ³öÃÀ¹úÒªº¦»ù´¡ÉèÊ©Öеı¡Èõ»·½Ú¡£¡£¡£¡£¡£¡£¡£¡£CIRCIA ÒªÇóijЩҪº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ 72 СʱÄÚ±¨¸æÍøÂçÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÔÚ 24 СʱÄÚ±¨¸æÀÕË÷Èí¼þ¸¶¿î¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÖ´·¨º­¸ÇµÄÊÂÎñ°üÀ¨¡°¶Ô×éÖ¯µÄÔË×÷ÄÜÁ¦»ò¹ú¼ÒÇå¾²¡¢¹«¹²¿µ½¡»òÇå¾²Ôì³ÉÖØ´óË𺦻ò×é³ÉÖØ´óÍþв¡±µÄÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/cisa-publishes-circia-rule-cyber-incident-reporting


6. µÂ¿ËÈøË¹ÖݺÍ×ôÖÎÑÇÖݵÄÊÐÕþЧÀÍÔâµ½ÀÕË÷¹¥»÷


3ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹ú¸÷µØµÄ¹ú¼Ò»ú¹¹¼ÌÐøÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄ×ÌÈÅ¡£¡£¡£¡£¡£¡£¡£¡£×ôÖÎÑÇÖݼª¶ûÄ¬ÏØÕþ¸®ÔÚÆäÍøÕ¾ÉÏÐû²¼Í¨Öª£¬£¬£¬£¬£¬£¬£¬ £¬ÖÒÑÔÀÕË÷Èí¼þ¹¥»÷ÕýÔÚÓ°ÏìÆäÏò 30000 ¶àÃûסÃñÌṩЧÀ͵ÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£¡£¡°¼ª¶ûÄ¬ÏØ×î½ü·¢Ã÷²¢ÏìÓ¦ÁËÀÕË÷Èí¼þÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÒÑʹÊÜÓ°ÏìµÄϵͳÀëÏߣ¬£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±ÎÒÃÇÖÂÁ¦ÓÚÇå¾²µØ±£»£»£»¤ºÍ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬£¬ £¬¹«ÖÚÓ¦¸ÃÔ¤ÍÆ²âÏØÕþ¸®»áÒò´ËÔì³ÉÑÓÎ󡣡£¡£¡£¡£¡£¡£¡£¡±Í¨Öª³Æ¡£¡£¡£¡£¡£¡£¡£¡£¼ª¶ûÄ¬ÏØÏòÁª°îÖ´·¨²¿·Ö·¢³öÁ˾¯±¨£¬£¬£¬£¬£¬£¬£¬ £¬²¢Ô¼ÇëÁËÒ»¼ÒÍøÂçÇå¾²¹«Ë¾À´½â¾ö´Ë´Î¹¥»÷Ôì³ÉµÄÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£¸»¶û¶ÙÏØÊÇÑÇÌØÀ¼´óµÄËùÔڵأ¬£¬£¬£¬£¬£¬£¬ £¬ÔÚ 1 Ô·ÝÔâÊÜ LockBit ÀÕË÷Èí¼þÍŻ﹥»÷ºó£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÏØÈÔÔÚ»Ö¸´Òªº¦Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£  


https://therecord.media/texas-georgia-municipalities-face-disruptions-from-ransomware