EmCareÔâºÚ¿ÍÈëÇÖ £»£»£»£»£»£»£»ÀÕË÷Èí¼þCryptoMixºÍInpivx £»£»£»£»£»£»£»¹¥»÷»î¶¯Aggah

Ðû²¼Ê±¼ä 2019-04-22
1.EmCareÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ô¼6ÍòÃû»¼Õß¼°Ô±¹¤µÄÐÅϢй¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤EmCare¹«Ë¾Ðû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ2ÔÂ19ÈÕÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄÓÊÏäÕË»§Ôâµ½µÚÈý·½Î´ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬£¬Ô¼6ÍòÃûÔ±¹¤¡¢»¼Õß¼°³Ð°üÉ̵ÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÄêËêÒÔ¼°Ò»Ð©»¼ÕßµÄÁÙ´²ÐÅÏ¢µÈ¡£ ¡£¡£¡£¡£¡£Ä³Ð©ÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬Ò²°üÀ¨Éç»áÇå¾²ºÅÂëºÍ¼ÝʻִÕÕºÅÂë¡£ ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ»¼ÕßÊýĿԼΪ3.1ÍòÈË¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÒÑΪÉç»áÇå¾²ºÅÂëºÍ¼ÝʻִÕÕºÅÂëй¶µÄ»¼ÕߺÍÔ±¹¤ÌṩÁËÉí·Ý± £»£»£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bloomberg.com/news/articles/2019-04-20/kkr-s-emcare-says-patient-employee-personal-data-was-accessed-jupwipt7

2.ÀÕË÷Èí¼þCryptoMixбäÌ壬£¬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ýÔ¶³Ì×ÀÃæÐ§ÀÍ·Ö·¢

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÀÕË÷Èí¼þCryptoMixµÄбäÌåDLLÕýÔÚÒ°ÍâÆð¾¢Èö²¥£¬£¬£¬£¬£¬£¬£¬¸Ã±äÌåͨ¹ýÈëÇÖÔ¶³Ì×ÀÃæÐ§À;ÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬»¹»áÆôÓÃĬÈÏÖÎÀíÔ±ÕË»§²¢ÐÞ¸ÄÃÜÂë¡£ ¡£¡£¡£¡£¡£¸Ã±äÌå»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.DLLÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬ÆäÌØÕ÷°üÀ¨Êê½ðƱ¾ÝÎļþÃûΪ_HELP_INSTRUCTIONS_.TXT£¬£¬£¬£¬£¬£¬£¬²¢ÇÒʹÓÃdllteam@protonmail.com¡¢dllteam1@protonmail.comµÈÓʼþµØµã¡£ ¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÉÐÎÞ¹ûÕæµÄ½âÃܹ¤¾ßÐû²¼¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dll-cryptomix-ransomware-variant-installed-via-remote-desktop/

3.ÐÂÀÕË÷Èí¼þInpivx£¬£¬£¬£¬£¬£¬£¬ÊÛ¼Û500ÃÀÔªºÍÌṩÏà¹Ø½Ì³Ì

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ÐÂÀÕË÷Èí¼þInpivxÕýÔÚTorÍøÂçÉϳöÊÛ£¬£¬£¬£¬£¬£¬£¬ÊÛ¼ÛΪ500ÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÌײÍÄÚ»¹°üÀ¨½âÃܹ¤¾ßºÍÏêϸµÄ½Ì³Ì¡£ ¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÊÇÓÃC++±àдµÄ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö´ÓWindows XPµ½Windows 10µÈWindows°æ±¾£¬£¬£¬£¬£¬£¬£¬ÆäÒDZí°åÔòʹÓÃPHP±àÂë¡£ ¡£¡£¡£¡£¡£Inpivx²»ÌṩÍйÜЧÀÍ£¬£¬£¬£¬£¬£¬£¬µ«ËüÌṩÀÕË÷Èí¼þºÍÖÎÀíÃæ°åµÄÔ´´úÂ룬£¬£¬£¬£¬£¬£¬ÕâʹµÃ¹¥»÷Õß¿ÉÒÔºÜÈÝÒ׵ض¨ÖÆ×Ô¼ºµÄÀÕË÷Èí¼þ¡£ ¡£¡£¡£¡£¡£Inpivx½øÒ»²½Íƶ¯ÁËÀÕË÷Èí¼þ¼´Ð§À͵Ŀ´·¨£¬£¬£¬£¬£¬£¬£¬Ê¹µÃûÓÐÊÖÒյ폷¨·Ö×Ó¿ÉÒÔÈÝÒ׽ṹ×Ô¼ºµÄ¶ñÒâÈí¼þºÍÒDZí°å¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84273/breaking-news/inpivx-ransomware-service.html

4.жñÒâ¹¥»÷»î¶¯Aggah£¬£¬£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢RevengeRAT

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӷ¢Ã÷жñÒâ¹¥»÷»î¶¯Aggah£¬£¬£¬£¬£¬£¬£¬AggahʹÓÃBit.ly¡¢BlogSpotºÍPastebinµÈÕýµ±Ð§ÀÍÀ´¹¹½¨C2»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬ÒÔÌÓ±ÜÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£ ¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô±±ÃÀ¡¢Å·ÖÞ¡¢ÑÇÖÞºÍÖж«µÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÐÐÒµ°üÀ¨ÊÖÒÕ¡¢ÁãÊÛ¡¢ÖÆÔì¡¢Õþ¸®»ú¹¹¡¢Ò½Ôº¡¢ÖÆÒ©µÈ¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ÒªÊÍ·ÅRevengeRAT£¬£¬£¬£¬£¬£¬£¬¸ÃľÂí¿É·­¿ªÔ¶³Ìshell£¬£¬£¬£¬£¬£¬£¬ÖÎÀíϵͳÎļþ¡¢Àú³ÌºÍЧÀÍ£¬£¬£¬£¬£¬£¬£¬±à¼­×¢²á±í£¬£¬£¬£¬£¬£¬£¬¼üÅ̼ͼ¼°»á¼ûÉãÏñÍ·µÈ¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/revengerat-distributed-via-bitly-blogspot-and-pastebin-c2-infrastructure/

5.Ñо¿ÍŶÓÐû²¼Ocean Lotus¶ñÒâÈí¼þÃûÌÃµÄÆÊÎö±¨¸æ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Malwarebytes LabsÐû²¼Ocean LotusʹÓõķǵ䷶¶ñÒâÈí¼þÃûÌÃµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¡£Ocean LotusÓÖ³ÆAPT32£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»¸öÓëÔ½ÄÏÓйص폷¨ÍŻ£¬£¬£¬£¬£¬£¬ÆäʹÓÃ×Ô½ç˵µÄ¶ñÒâÈí¼þÃûÌÃÒÔÌӱܾ²Ì¬¼ì²âºÍÆÊÎö¡£ ¡£¡£¡£¡£¡£¸ÃÑù±¾°üÀ¨Á½¸öδ×ÅÃûÌõĿÉÖ´ÐÐÎļþ£¨.BLOBºÍ.CAB£©£¬£¬£¬£¬£¬£¬£¬ÎļþÃûÌÃÊÇ´ÓPEÃûÌÃת»»¶øÀ´£¬£¬£¬£¬£¬£¬£¬µ«ÎÊÌâÊÇÍêÈ«×Ô½ç˵µÄ£¬£¬£¬£¬£¬£¬£¬¼ÓÔØ·½·¨ÓëPEҲûÓÐÏàËÆÖ®´¦¡£ ¡£¡£¡£¡£¡£BLOBºÍCABÎļþʹÓÃXOR¾ÙÐÐÄ£ºý´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýhp6000.dll¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬¼ÓÔØº¯ÊýÔÚÖ´ÐÐDllMainʱ£¬£¬£¬£¬£¬£¬£¬»áÐÞ²¹DLLÖеÄmainÄ£¿£¿£¿ £¿é¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2019/04/funky-malware-format-found-in-ocean-lotus-sample/

6.б¨¸æ³ÆWipro¹¥»÷ÕßÕë¶ÔÁíÍâÆß¼Ò½â¾ö¼Æ»®¹©Ó¦ÉÌ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤KrebsOnSecurityµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÔÚ3Ô·ÝÕë¶ÔWiproÌᳫ¹¥»÷µÄ´¹ÂÚ¹¥»÷ÕßËÆºõÒ²Õë¶ÔÁíÍâÆß¼Ò½â¾ö¼Æ»®¹©Ó¦ÉÌÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨Avanade¡¢Capgemini¡¢Cognizant¡¢Infosys¡¢PCM¡¢RackspaceºÍSlalom¡£ ¡£¡£¡£¡£¡£Avanade֤ʵ¸Ã¹«Ë¾µÄ34ÃûÔ±¹¤ÔÚ2Ô·ÝÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬RackspaceºÍInfosysÐû²¼µÄÉùÃ÷Ôòδ֤ʵҲδ·ñ¶¨¸Ã¹«Ë¾ÊÇ·ñ³ÉΪĿµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÓ๫˾²¢Î´¾ÙÐлØÓ¦¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.crn.com/news/security/wipro-hackers-also-went-after-seven-other-solution-provider-giants-report