еÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

Ðû²¼Ê±¼ä 2022-12-28
1¡¢ÐµÄRiseProͨ¹ýPrivateLoader PPIЧÀ;ÙÐзַ¢

      

¾Ý12ÔÂ24ÈÕ±¨µÀ £¬£¬£¬ £¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐÂÐÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRisePro¡£¡£¡£ ¡£¡£ËüÓÚ2022Äê12ÔÂ13ÈÕÊ״α»¼ì²âµ½ £¬£¬£¬ £¬£¬£¬ÕýÔÚͨ¹ýPrivateLoader°´×°Öø¶·Ñ(PPI)¶ñÒâÈí¼þÏÂÔØÐ§À;ÙÐзַ¢¡£¡£¡£ ¡£¡£RiseProÓÉC++¿ª·¢ £¬£¬£¬ £¬£¬£¬Ëƺõ¾ßÓÐÓëVidarÀàËÆµÄ¹¦Ð§ £¬£¬£¬ £¬£¬£¬Ö¼ÔÚ×ÊÖú¹¥»÷Õß´Ó±»Ñ¬È¾µÄ×°±¸ÖÐÇÔȡĿµÄµÄÐÅÓÿ¨¡¢ÃÜÂëºÍ¼ÓÃÜÇ®°ü¡£¡£¡£ ¡£¡£Flashpoint±¨¸æ³Æ £¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÒѾ­ÔÚ¶íÂÞ˹°µÍøÊг¡ÉϳöÊÛÊýÒÔǧ¼ÆµÄRiseProÈÕÖ¾£¨´Ó±»Ñ¬È¾×°±¸ÖÐÇÔÈ¡µÄÊý¾Ý°ü£©¡£¡£¡£ ¡£¡£ 


https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites/


2¡¢RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ

      

¾ÝýÌå12ÔÂ26ÈÕ±¨µÀ £¬£¬£¬ £¬£¬£¬RansomHouseÉù³Æ¶ÔÍßŬ°¢Í¼Õþ¸®Ôâµ½µÄÀÕË÷¹¥»÷ÈÏÕæ¡£¡£¡£ ¡£¡£ÍßŬ°¢Í¼ÔøÔÚ11Ô³õÐû²¼ËûÃÇÔâµ½ÁËÀÕË÷¹¥»÷ £¬£¬£¬ £¬£¬£¬ÔÚ¿ìÒªÒ»¸öÔºóÈÔδÍêÈ«»Ö¸´¡£¡£¡£ ¡£¡£12ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬RansomHouseÍŻォÍßŬ°¢Í¼Õþ¸®ÁÐÈëÁËËûÃǵÄÍøÕ¾ £¬£¬£¬ £¬£¬£¬³ÆÒÑÓÚ10ÔÂ6ÈÕ¼ÓÃÜËûÃǵÄϵͳ £¬£¬£¬ £¬£¬£¬²¢ÇÔÈ¡ÁË3.2 TBµÄÎļþ¡£¡£¡£ ¡£¡£Ðû²¼µÄÑù±¾ÖÐÎļþ¿´ÆðÀ´È·ÊµÓëÕþ¸®µÄÎļþÒ»Ö £¬£¬£¬ £¬£¬£¬ÆäÖв»°üÀ¨Ð¡ÎÒ˽¼Ò»òÃô¸ÐµÄÎļþ¡£¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎúÊê½ð½ð¶îÊǼ¸¶à £¬£¬£¬ £¬£¬£¬»òÊÇ·ñ¾ÙÐйý̸ÅС£¡£¡£ ¡£¡£


https://www.databreaches.net/vanuatu-ransomware-attack-claimed-by-ransomhouse/


3¡¢CrowdStrikeÅû¶GuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì

      

CrowdStrikeÔÚ12ÔÂ19ÈÕÅû¶ÁËGuLoaderÈÆ¹ýÇå¾²¼ì²âµÄ¶à¸öÒªÁì¡£¡£¡£ ¡£¡£GuLoader£¨ÓÖÃûCloudEyE£© £¬£¬£¬ £¬£¬£¬ÊÇÒ»ÖÖVisual Basic Script(VBS)ÏÂÔØ³ÌÐò £¬£¬£¬ £¬£¬£¬ÓÚ2019ÄêÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£ ¡£¡£ËüʹÓöà̬shellcode¼ÓÔØ³ÌÐòÀ´Èƹý¹Å°åÇå¾²½â¾ö¼Æ»® £¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±Îª¶ñÒâÈí¼þʹÓõÄÿ¸öAPIÓ³ÉäËùÓÐǶÈëʽDJB2¹þÏ£ÖµÀ´ÆÊÎöÆä»î¶¯¡£¡£¡£ ¡£¡£ÐµÄshellcode·´ÆÊÎöÊÖÒÕͨ¹ýɨÃèÕû¸öÀú³ÌÄÚ´æÀ´²éÕÒÓëÐéÄâ»ú(VM)Ïà¹ØµÄ×Ö·û´® £¬£¬£¬ £¬£¬£¬ÐµÄÈßÓà´úÂë×¢Èë»úÖÆÒâζ×Åͨ¹ýʹÓÃÄÚÁª»ã±àÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄÓû§Ä£Ê½hookÀ´È·±£´úÂëµÄÖ´ÐС£¡£¡£ ¡£¡£


https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/


4¡¢TrendMicro·¢Ã÷ʹÓùȸèPPC¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯

      

12ÔÂ23ÈÕ £¬£¬£¬ £¬£¬£¬Trend Micro͸¶Æä·¢Ã÷½©Ê¬ÍøÂçIcedIDµÄ·Ö·¢·½·¨±¬·¢ÁËÖØ´óת±ä¡£¡£¡£ ¡£¡£×Ô2022Äê12ÔÂÒÔÀ´ £¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ʹÓùȸèÿ´Îµã»÷¸¶·Ñ(PPC)¹ã¸æ·Ö·¢IcedIDµÄ»î¶¯¡£¡£¡£ ¡£¡£IcedIDÔËÓªÍÅ»ïÐ®ÖÆÁËAdobe¡¢FortinetºÍDiscordµÈÆ·ÅÆºÍÓ¦ÓÃËùʹÓõÄÒªº¦´ÊÀ´ÏÔʾ¶ñÒâ¹ã¸æ¡£¡£¡£ ¡£¡£µ±Óû§ËÑË÷Òªº¦×Öʱ £¬£¬£¬ £¬£¬£¬Ö¸Ïò¶ñÒâÍøÕ¾µÄ¹ã¸æÏÔʾÔÚ×ÔÈ»ËÑË÷Ч¹ûÉÏ·½¡£¡£¡£ ¡£¡£Ôڴ˻ÖÐ £¬£¬£¬ £¬£¬£¬¼ÓÔØ³ÌÐòÊÇͨ¹ýMSIÎļþ·Ö·¢µÄ £¬£¬£¬ £¬£¬£¬Õâ¹ØÓÚIcedIDÀ´ËµÊDz»³£¼ûµÄ¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬ £¬£¬£¬¹¥»÷ÕßʹÓÃÁËÕýµ±µÄKeitaroÁ÷Á¿µ¼Ïòϵͳ(TDS)À´¹ýÂËÀ´×ÔÑо¿Ö°Ô±ºÍɳºÐµÄÁ÷Á¿¡£¡£¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html   


5¡¢Ö¥¼Ó¸çµÄÄÜÔ´¹«Ë¾Sargent & LundyÔâµ½ÀÕË÷¹¥»÷

      

ýÌå12ÔÂ27ÈÕ³Æ £¬£¬£¬ £¬£¬£¬ÃÀ¹úCNN͸¶ºÚ¿ÍÔÚ½üÆÚµÄÀÕË÷¹¥»÷ÖÐÇÔÈ¡Á˶à¼ÒµçÁ¦¹«Ë¾µÄÊý¾Ý¡£¡£¡£ ¡£¡£´Ë´ÎÀÕË÷¹¥»÷Õë¶ÔµÄÊÇ×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄSargent & Lundy¹¤³Ì¹«Ë¾ £¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾Éè¼ÆÁË900¶à¸ö·¢µçÕ¾ºÍÊýǧӢÀïµÄµçÁ¦ÏµÍ³ £¬£¬£¬ £¬£¬£¬²¢³ÖÓÐÕâЩÏîÄ¿µÄÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£¾ÝÆäÍøÕ¾³Æ £¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾»¹´¦Öóͷ£ºËÇå¾²ÎÊÌâ¡£¡£¡£ ¡£¡£¾ÝϤ £¬£¬£¬ £¬£¬£¬¸ÃÊÂÎñÒÑ»ñµÃ¿ØÖƺ͵÷½â £¬£¬£¬ £¬£¬£¬Ëƺõ²¢Î´¶ÔÆäËüµçÁ¦ÐÐÒµµÄ¹«Ë¾Ôì³ÉÓ°Ïì £¬£¬£¬ £¬£¬£¬Ò²Ã»ÓÐÊý¾Ý±»Ðû²¼µ½°µÍøÉÏ¡£¡£¡£ ¡£¡£


https://www.databreaches.net/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/


6¡¢KasperskyÐû²¼Õë¶Ô°¢¶û°ÍÄáÑǵÄÁ½ÂÖ¹¥»÷µÄÆÊÎö±¨¸æ

      

KasperskyÔÚ12ÔÂ22ÈÕÐû²¼ÁËÕë¶Ô°¢¶û°ÍÄáÑÇ×éÖ¯µÄÁ½ÂÖ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¸Ã±¨¸æÖ÷Òª½ÏÁ¿ÁËÕâÁ½ÂÖ¹¥»÷»î¶¯ËùʹÓõÄÀÕË÷Èí¼þºÍ²Á³ý¶ñÒâÈí¼þÖ®¼äµÄÇø±ð¡£¡£¡£ ¡£¡£¹ØÓÚÀÕË÷Èí¼þ £¬£¬£¬ £¬£¬£¬Á½ÂÖ¹¥»÷»î¶¯µÄÑù±¾¾ßÓÐÏàͬµÄÊðÃûÖ¤Êé²ÎÊý £¬£¬£¬ £¬£¬£¬Óë¿ÆÍþÌØµçÐŹ«Ë¾Óйء£¡£¡£ ¡£¡£¹¥»÷Õß¶ÔµÚ¶þÂÖʹÓõIJÁ³ý¶ñÒâÈí¼þ¾ÙÐÐÁ˶à´ÎÐÞ¸Ä £¬£¬£¬ £¬£¬£¬¿ÉÄÜÊÇΪÁËÈÆ¹ý¼ì²â £¬£¬£¬ £¬£¬£¬Ö÷Ҫת±äÊÇʹÓÃNvidiaÖ¤Êé¶Ô¶ñÒâÈí¼þÊðÃû¡¢ÔÚ¶ñÒâÈí¼þÖÐǶÈëEldoS RawDiskÇý¶¯³ÌÐò £¬£¬£¬ £¬£¬£¬ÒÔ¼°ÔÚÇý¶¯³ÌÐò×°ÖúóÁ¬Ã¦Æô¶¯É¾³ýÀý³Ì¡£¡£¡£ ¡£¡£


https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/