2、安全厂商发布Carbanak组织攻击活动报告
标题:Operation Grand Mars: a comprehensive profile of Carbanak activity in 2016/17
作者信息:January 18, 2017 By Thanassis Diogos
//BEGIN
The Trustwave SpiderLabs team has been actively tracking a malicious campaign conducted by the well-known Carbanak Cybercrime group for the latter part of 2016 and into 2017. Carbanak is one of the most prolific organized Russian cybercrime groups and is responsible for the theft of billions of dollars from legitimate economies to the criminal underground. Malware attributed to this group has been cited in the infamous "billion dollar bank hack" of 2015 and the massive Oracle/Micros hack of mid-2016 that led to over a million vulnerable POS servers. Carbanak malware (Carberp family) was also cited by Homeland Security and the FBI as an Indicator of Compromise for Russian Intelligence Service malicious activity in their most recent report GRIZZLY STEPPE – Russian Malicious Cyber Activity.
安全公司Trustwave的SpiderLabs实验室最近深入分析了Carbanak组织的攻击活动,时间跨度从2015年、2016年的下半年持续到今年。Carbanak组织据称是一个来自俄罗斯的攻击组织,最近几年其获利颇丰,其盗取的对象既有合法的机构也有地下组织。感染的设备除了端点还有POS机服务器等。该活动被美国的国土安全部DHS和FBI以发报告的形式公布,当时的报名名称为:GRIZZLY STEPPE。
//END
This threat report intends to provide an analysis of this operation and document:
Our analysis and findings in a way that describe the nature of malicious activities, the tactics and tradecraft utilized by the attackers, possible motives and the attribution of the threat actors behind these attacks.
Remediation actions and advice to organizations that have already been targeted by this campaign of attacks or willing to take proactive countermeasures.
Indicators of Compromise (IOCs) that will benefit organizations seeking to either undertake a compromise assessment on their own (or with the help of a team that specializes in threat hunting and compromise assessments such as Trustwave SpiderLabs), or to proactively put in place detection mechanisms for providing an early warning system if and when the organization is targeted.
However, it must be noted that this threat report does not and is not capable of replacing formal incident response actions and procedures that must be undertaken to mitigate the threat and restore business functions as per the Organizational Incident Response/Disaster Recovery roadmap.
本报告不能代替正式的事件响应规程和处置过程,这些流程对每个企业或者组织恢复其运行起指导作用。
//下载:
Operation Grand Mars.pdf
(2.33 MB, 下载次数: 219)
文件名:Operation Grand Mars.pdf
文件大小:2,441,174 bytes
MD5 : 48B39FD3765500B6F8882EA668DA876B
点评:攻击往往从钓鱼邮件开始..... |