·¨¹úÒ½ÔºGHTÔâµ½ÀÕË÷¹¥»÷»¼ÕߺÍÖÎÀíÏà¹ØÐÅϢй¶

Ðû²¼Ê±¼ä 2022-04-26

1¡¢·¨¹úÒ½ÔºGHTÔâµ½ÀÕË÷¹¥»÷»¼ÕߺÍÖÎÀíÏà¹ØÐÅϢй¶


ýÌå4ÔÂ25Èճƣ¬£¬ £¬£¬£¬£¬£¬·¨¹úÒ½ÁƱ£½¡¼¯ÍÅGHT Coeur Grand EstÔâµ½¹¥»÷£¬£¬ £¬£¬£¬£¬£¬»¼ÕߺÍÖÎÀíÏà¹ØÐÅϢй¶ ¡£¡£¡£¡£¡£ ¡£¡£¹¥»÷±¬·¢ÔÚ4ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬£¬GHTÔÚ·¢Ã÷¹¥»÷ºóÁ¬Ã¦¶Ï¿ªÁËÒ½ÔºµÄÍøÂçÅþÁ¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»¤ÐÅϢϵͳºÍÊý¾Ý ¡£¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚÍøÕ¾Industrial Spy·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÉù³ÆÒÑÀÕË÷1300000ÃÀÔª£¬£¬ £¬£¬£¬£¬£¬¹«Ë¾ÈôÊDz»Ö§¸¶Êê½ð£¬£¬ £¬£¬£¬£¬£¬ËûÃǽ«ÔÚÍøÕ¾ÖгöÊÛÆäÇÔÈ¡µÄ28.7 GBÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨Éç»áÇå¾²ºÅÂë¡¢»¤ÕÕɨÃè¼þ¡¢ÒøÐÐÐÅÏ¢¡¢µç×ÓÓʼþºÍµç»°ºÅÂëµÈ ¡£¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/french-hospital-group-disconnects-internet-after-hackers-steal-data/


2¡¢ResecurityÏêÊö½üÆÚÓëIRSËùµÃ˰É걨ÓйصĴ¹Âڻ


4ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬£¬ResecurityÅû¶Á˽üÆÚÓëIRSËùµÃ˰É걨ÓйصĴ¹ÂڻµÄÏêϸÐÅÏ¢ ¡£¡£¡£¡£¡£ ¡£¡£¹¥»÷Õßð³äÁËÕþ¸®»ú¹¹µÄITЧÀ͹©Ó¦ÉÌ£¬£¬ £¬£¬£¬£¬£¬ÔÚ´¹ÂÚÓʼþÖÐÌí¼ÓαÔì³Éµç×Ó·¢Æ±µÄHTML¸½¼þ£¬£¬ £¬£¬£¬£¬£¬¸½¼þÖаüÀ¨»ùÓÚJSµÄ»ìÏý´úÂë ¡£¡£¡£¡£¡£ ¡£¡£HTML¸½¼þ±»·­¿ªºó£¬£¬ £¬£¬£¬£¬£¬Ëü»áʹÓý»»¥Ê½±íµ¥Ä£ÄâOffice 365ÊÚȨ»úÖÆÀ´ÓÕʹĿµÄÊäÈëÆ¾Ö¤ ¡£¡£¡£¡£¡£ ¡£¡£´¹ÂÚÓʼþÉÐÓÐÒ»¸öReturn-Path×ֶΣ¬£¬ £¬£¬£¬£¬£¬ÓÃÓÚ´¦Öóͷ£Í˻صĵç×ÓÓʼþ ¡£¡£¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬¸ÃÓʼþ²»°üÀ¨ÈκÎURL£¬£¬ £¬£¬£¬£¬£¬ÔÚÀֳɷ¢Ë͵½Ä¿µÄÓÊÏäºóÒ²²¢Î´±»±ê¼ÇΪDZÔÚÀ¬»øÓʼþ ¡£¡£¡£¡£¡£ ¡£¡£


https://resecurity.com/blog/article/cybercriminals-deliver-irs-tax-scams-phishing-campaigns-by-mimicking-government-vendors 


3¡¢eSentire·¢Ã÷Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þMore_eggsµÄ¹¥»÷»î¶¯


eSentireÔÚ4ÔÂ21ÈÕÐû²¼Á˹ØÓÚ·Ö·¢¶ñÒâÈí¼þMore_eggsµÄ¹¥»÷»î¶¯µÄ±¨¸æ ¡£¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÐÂÒ»ÂÖ´¹Âڻ£¬£¬ £¬£¬£¬£¬£¬Ã°³äÇóÖ°ÕßÓÕʹÆóÒµÕÐÆ¸Ë¾ÀíÏÂÔØÎ±ÔìµÄÇóÖ°¼òÀú£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨Á˶ñÒâÈí¼þmore_eggs ¡£¡£¡£¡£¡£ ¡£¡£Õâ¼Ò¼ÓÄôóÇå¾²¹«Ë¾ÌåÏÖÒÑ·¢Ã÷4´Î¹¥»÷»î¶¯£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐ3Æð±¬·¢ÔÚ3ÔÂ⣬£¬ £¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨Ò»¼ÒÃÀ¹úµÄº½¿Õº½Ì칫˾¡¢Ò»¼ÒÓ¢¹úµÄ»á¼Æ¹«Ë¾¡¢Ò»¼Ò״ʦÊÂÎñËùºÍÒ»¼ÒÈËÊÂÊðÀí»ú¹¹ ¡£¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëGolden ChickensÓÐ¹Ø ¡£¡£¡£¡£¡£ ¡£¡£


https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware


4¡¢Anonymous³ÆÆäOpRussia»î¶¯ÒѹûÕæ¶íÂÞ˹5.8TBµÄÊý¾Ý


ýÌå4ÔÂ24Èճƣ¬£¬ £¬£¬£¬£¬£¬Anonymous³ÆÆäÌᳫµÄOpRussia»î¶¯ÒÑͨ¹ýDDoSecretsÐû²¼Á˶íÂÞ˹Լ5.8 TBµÄÊý¾Ý ¡£¡£¡£¡£¡£ ¡£¡£½üÆÚÔâµ½Anonymous¹¥»÷µÄ¹«Ë¾°üÀ¨£º¶íÂÞ˹×î´óµÄҺѹ¹¤¾ßÉú²úÉÌ£¬£¬ £¬£¬£¬£¬£¬432 GBÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨645000·âÓʼþ£»£»£»£»£»ÉÌÒµ·¿µØ²úͶ×ʹ«Ë¾Accent Capital£¬£¬ £¬£¬£¬£¬£¬211GBÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨365000·âÓʼþ£»£»£»£»£»ÎïÒµÖÎÀí¹«Ë¾Sawatzky°üÀ¨575000·âÓʼþµÄ432 GBÊý¾Ý£»£»£»£»£»ÒÔ¼°Í¶×ʹ«Ë¾Worldwide Invest°üÀ¨250000·âÓʼþÔÚÄÚµÄ432 GBÊý¾Ý ¡£¡£¡£¡£¡£ ¡£¡£


https://securityaffairs.co/wordpress/130554/hacktivism/anonymous-leaked-5-8-tb-russian-data.html


5¡¢Trend MicroÐû²¼2022ÄêÍøÂçÇå¾²Ì¬ÊÆµÄÕ¹Íû±¨¸æ


4ÔÂ24ÈÕ£¬£¬ £¬£¬£¬£¬£¬Trend MicroÐû²¼ÁË2022ÄêÍøÂçÇå¾²Ì¬ÊÆµÄÕ¹Íû±¨¸æ ¡£¡£¡£¡£¡£ ¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬¹©Ó¦Á´¹¥»÷»î¶¯½«¼¤Ôö£»£»£»£»£»ÀÕË÷Èí¼þ½«¼ÌÐøÉú³¤²¢Ê¢ÐУ¬£¬ £¬£¬£¬£¬£¬Õ¹Íû½«·ºÆðÁ½¸öÇ÷ÊÆ£¬£¬ £¬£¬£¬£¬£¬ÏÖ´úÀÕË÷Èí¼þ½«±äµÃÔ½À´Ô½ÓÐÕë¶ÔÐÔ£¬£¬ £¬£¬£¬£¬£¬Ð§·Â¹Å°åµÄAPT¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°ÀÕË÷ÍŻォʹÓøüÖØ´óµÄÀÕË÷Õ½ÂÔ£»£»£»£»£»ÁãÈÕÎó²îʹÓÃÔöÌí£¬£¬ £¬£¬£¬£¬£¬²¢Áè¼Ý2021Äê´´¼Í¼µÄÊýÄ¿£»£»£»£»£»Õë¶ÔÆû³µÐÐÒµµÄ¹¥»÷Ò²½«ÔöÌí ¡£¡£¡£¡£¡£ ¡£¡£±¨¸æ½¨ÒéÓû§´Ó3¸ö·½ÃæÖƶ©Çå¾²Õ½ÂÔ£¬£¬ £¬£¬£¬£¬£¬°üÀ¨¹¥»÷ÃæÖÎÀí£¨ASM£©¡¢ÀÕË÷Èí¼þ»º½âÒÔ¼°Îó²îºÍ²¹¶¡ÖÎÀí ¡£¡£¡£¡£¡£ ¡£¡£


https://www.trendmicro.com/en_us/ciso/21/l/cybersecurity-trends-2022.html


6¡¢ZscalerÐû²¼2021ÄêÍøÂç´¹ÂÚ¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


ZscalerÔÚ4ÔÂ29ÈÕÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚ¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£¡£ ¡£¡£È¥ÄêZscale¼ì²âµ½µÄ´¹ÂÚ¹¥»÷ÔÚÈ«Çò¹æÄ£ÄÚÉÏÉýÁË29%£¬£¬ £¬£¬£¬£¬£¬µÖ´ïÁË8.739ÒڴεÄмͼ£»£»£»£»£»ÁãÊÛºÍÅú·¢ÊÇ×îÔâµ½¹¥»÷×î¶àµÄÐÐÒµ£¬£¬ £¬£¬£¬£¬£¬ÔÚÒÑÍù12¸öÔÂÖеĹ¥»÷ÔöÌíÁËÁè¼Ý400%£»£»£»£»£»ÃÀ¹ú¡¢ÐÂ¼ÓÆÂ¡¢µÂ¹ú¡¢ºÉÀ¼ºÍÓ¢¹úÊÇ´¹Âڻ×îÖ÷ÒªµÄÄ¿µÄ£»£»£»£»£»Ëæ×ÅÓû§¶Ô¿ÉÒɵç×ÓÓʼþµÄСÐÄÔöÌí£¬£¬ £¬£¬£¬£¬£¬ÐÂÐ˵Ĵ¹ÂÚǰÑÔ£¨ÀýÈçSMS´¹ÂÚ£©±È¹Å°åÒªÁìÔöÌíµÃ¸ü¿ì£»£»£»£»£»Ò»Ö±ÔöÌíµÄ´¹ÂڻÓëphishing- as-a-serviceÖ±½ÓÏà¹Ø ¡£¡£¡£¡£¡£ ¡£¡£


https://info.zscaler.com/resources-industry-report-threatlabz-state-of-phishing-report