Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâÀÕË÷¹¥»÷£¬²¿·Öº½°àÑÓÎó
Ðû²¼Ê±¼ä 2022-05-271¡¢Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâµ½ÀÕË÷¹¥»÷£¬²¿·Öº½°àÑÓÎó
Ó¡¶ÈµÄº½¿Õ¹«Ë¾SpiceJetÔÚ5ÔÂ25ÈÕ֪ͨ¿Í»§£¬ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£Æ¾Ö¤¸Ã¹«Ë¾µÄͨ¸æ£¬ÆäITÍŶÓÒÑÀÖ³É×èÖ¹´Ë´Î¹¥»÷£¬Òò´Ë»Ö¸´ÁËÕý³£µÄÔËӪ״̬¡£È»¶ø£¬TwitterºÍFacebookÉϵĶà¸ö¿Í»§ÈÔÈ»·´Ó¦±£´æµÄÎÊÌ⣬ÀýÈçÁ˺½°àÑÓÎó£¬ÎÞ·¨Í¨¹ýµç»°ÁªÏµ¿Í·þ£¬ÇÒÔ¤¶©ÏµÍ³²»¿ÉÓá£×èÖ¹25ÈÕ£¬SpiceJetµÄÍøÕ¾ÖÐÖ»ÓÐÖ÷Ò³¿É»á¼û£¬¶ø´ó´ó¶¼µ×²ãϵͳºÍÍøÒ³¶¼ÎÞ·¨¼ÓÔØ£¬º½°à״̬±íÏÔʾËùÓÐÄ¿µÄµØµÄº½°à¶¼±£´æ´ó×ÚÑÓÎó¡£SpiceJetÊÇÓ¡¶ÈµÚ¶þ´óº½¿Õ¹«Ë¾£¬´Ë´Î¹¥»÷»áÓ°Ïì´ó×ÚÂÿͣ¬²¢Ôì³ÉÖØ´óµÄ¾¼ÃËðʧ¡£
https://www.bitdefender.com/blog/hotforsecurity/airline-passengers-left-stranded-after-ransomware-attack/
2¡¢¹ú¼ÊÐ̾¯×éÖ¯ÒѾв¶BECÍÅ»ïSilver TerrierµÄÍ·Ä¿
ƾ֤5ÔÂ25ÈÕ±¨µÀ£¬¹ú¼ÊÐ̾¯×éÖ¯¾Óɳ¤´ïÒ»ÄêµÄ´úºÅΪ¡°Operation Delilah¡±µÄÊÓ²ìºó£¬¾Ð²¶ÁËBECÍÅ»ïSilver TerrierµÄÍ·Ä¿¡£´Ë´ÎÖ´·¨Ðж¯ÓÚ2021Äê5ÔÂ×îÏÈ£¬ÔÚÄáÈÕÀûÑǾ¯·½ºÍGroup-IBµÈ¶à¼ÒÍøÂçÇå¾²¹«Ë¾µÄе÷Ï£¬ÓÚ2022Äê3Ô¾в¶ÁËÒ»Ãû37ËêµÄÄáÈÕÀûÑÇÄÐ×Ó¡£¹ú¼ÊÐ̾¯×éÖ¯ÔÚÉùÃ÷Öгƣ¬¸ÃÄÐ×Ó±»Ö¸¿ØÔËÓª×ÅÒ»¸ö¿ç¹úÍøÂç·¸·¨ÍŻ²¢¶Ô¹«Ë¾ºÍСÎÒ˽¼Ò¾ÙÐÐÁË´ó¹æÄ£´¹ÂÚÔ˶¯ºÍBEC¹¥»÷¡£
https://securityaffairs.co/wordpress/131659/cyber-crime/silverterrier-leader-arrested.html
3¡¢°µÍøÊг¡Versus±»±¬±£´æÐÅϢй¶Îó²îºó¾öÒ鹨±Õ
¾Ý5ÔÂ25ÈÕ±¨µÀ£¬°µÍøÊг¡Versus MarketÕýÔڹرա£ÕâÊÇ×îÊܽӴýµÄ°µÍøÊг¡Ö®Ò»£¬ÓÚ3ÄêÇ°ÍÆ³ö¡£ÉÏÖÜ£¬Ä³ºÚ¿ÍÔÚDreadÉÏÐû²¼ÁËÒ»¸ö¹ØÓÚÔõÑù»á¼û¸ÃÍøÕ¾·þÎñÆ÷ÎļþϵͳµÄPoC¡£ÓÉÓÚµ£Ðı£´æÑÏÖØµÄÎó²îÈÝÒ×Ôâµ½ºÚ¿ÍµÄ¹¥»÷£¬ÔËÓªÍŶӽ«VersusÏÂÏß²¢¾ÙÐÐÇå¾²É󼯡£µ«ÔÚÏÂÏߺó£¬Óû§×îÏȵ£ÐÄVersusÕýÔÚÍ˳ö¶øFBIÒѾ½ÓÊÜÁ˸ÃÍøÕ¾¡£²»¾ÃÖ®ºó£¬¸Ãƽ̨µÄÔËÓªÍŶÓÖØÐ·ºÆð£¬²¢Ðû²¼½«¹Ø±Õ¸ÃÊг¡¡£ÏÖÔÚÉв»ÇåÎúÖ´·¨Ö°Ô±ÊÇ·ñÒѾʹÓÃÁË´ËÎó²î¡£
https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/
4¡¢Â׶ظÛÎñ¾ÖPLAµÄ¹ÙÍøÔâµ½À´×ÔALtahreaµÄDDoS¹¥»÷
Â׶ظÛÎñ¾Ö£¨PLA£©ÓÚ5ÔÂ24ÈÕÈ·ÈÏ£¬Æä¹ÙÍøÔâµ½¹¥»÷±»ÆÈ¹Ø±Õ¡£PLAÊÇÒ»¸ö¹«¹²ÐÅÍлú¹¹£¬ÓªÒµÁýÕÖ´ÓÌ©¶¡¶Ùµ½±±º£µÄÌ©ÎîÊ¿ºÓ¡£Check PointÌåÏÖ£¬´Ë´ÎÖÐÖ¹Ô´ÓÚÒ»¸öÒÁÀÊ×éÖ¯ÌᳫµÄÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷¡£²»¾Ãºó£¬ºÚ¿ÍÍÅ»ïALtahrea TeamÔÚTelegramÉÏÉù³Æ¶Ô´ËÊÂÈÏÕæ¡£ALtahreaÓëÒÁÀÊÓйأ¬Ôø¹¥»÷¹ýÒÔÉ«ÁиÛÎñ¾Ö¡¢ÒÔÉ«ÁÐ9ƵµÀºÍÍÁ¶úÆä×ÜͳµÄ¹Ù·½ÍøÕ¾µÈ¡£ÏÖÔÚ£¬¸ÃÍøÕ¾ÒÑ¾ÖØÐÂÉÏÏß¡£
https://www.hackread.com/pro-iran-altahrea-hit-port-of-london-website-ddos-attack/
5¡¢Red Canary·¢Ã÷еÄä¯ÀÀÆ÷Ð®ÖÆ¶ñÒâÈí¼þChromeLoader
5ÔÂ25ÈÕ£¬Red CanaryÐû²¼Á˹ØÓÚжñÒâÈí¼þChromeLoaderµÄÊÖÒÕÆÊÎö±¨¸æ¡£ChromeLoaderÊÇÒ»ÖÖä¯ÀÀÆ÷Ð®ÖÆ³ÌÐò£¬Ëü»áÐÞ¸ÄÄ¿µÄµÄä¯ÀÀÆ÷ÉèÖò¢½«Óû§Á÷Á¿Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£ÕâÀàÐ®ÖÆ³ÌÐòÓÐÐí¶à£¬µ«ChromeLoaderÒòÆä³¤ÆÚÐÔºÍѬȾ;¾¶µÈÌØÕ÷ÍÑÓ±¶ø³ö¡£Ëüαװ³ÉÆÆ½â°æÓÎÏ·»òÉÌÒµÈí¼þISO£¬ÔÚ·¿ªºó½«±»¹ÒÔØÎªÒ»¸öÐéÄâµÄCD-ROMÇý¶¯Æ÷¡£×îÖÕ£¬Ëü»áÓÃPowerShell½«×Ô¼º×¢Èëµ½ä¯ÀÀÆ÷ÖУ¬²¢½«¶ñÒâÀ©Õ¹Ìí¼Óµ½ä¯ÀÀÆ÷ÖУ¬Í¨³£²»»á±»¼ì²âµ½¡£
https://www.bleepingcomputer.com/news/security/new-chromeloader-malware-surge-threatens-browsers-worldwide/
6¡¢QCT¶à¿î·þÎñÆ÷Ò×ÊÜPantsdownÎó²îCVE-2019-6260µÄÓ°Ïì
ýÌå5ÔÂ26Èճƣ¬¹ã´ïÔÆÊÖÒÕ(QCT)·þÎñÆ÷ÈÝÒ×Êܵ½»ù°åÖÎÀí¿ØÖÆÆ÷(BMC)Îó²î¡°Pantsdown¡±µÄÓ°Ïì¡£¸ÃÎó²î×·×ÙΪCVE-2019-6260£¨CVSSÆÀ·Ö9.8£©£¬ÓÚ2019Äê1ÔÂÊ×´ÎÆØ¹â£¬Éæ¼°¶ÔBMCÎïÀíµØµã¿Õ¼äµÄí§Òâ¶Áд»á¼û£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС£Ñо¿Ö°Ô±³Æ£¬ÀÖ³ÉʹÓøÃÎó²î¿É»ñµÃ·þÎñÆ÷µÄÍêÈ«¿ØÖÆÈ¨£¬´Ó¶øÊ¹ÓöñÒâ´úÂëÁýÕÖBMC¹Ì¼þ¡¢×°ÖöñÒâÈí¼þ¡¢Ð¹Â¶Êý¾Ý£¬ÉõÖÁÆÆËðϵͳ¡£ÊÜÓ°ÏìµÄQCT·þÎñÆ÷ÐͺŰüÀ¨D52BQ-2U¡¢D52BQ-2U 3UPIºÍD52BV-2U¡£Îó²îÓÚ2021Äê10ÔÂ7ÈÕÅû¶֮ºó£¬²¹¶¡ÒÑÓÚ½ñÄê4ÔÂ15ÈÕÌṩӦ¿Í»§¡£
https://thehackernews.com/2022/05/critical-pantsdown-bmc-vulnerability.html


¾©¹«Íø°²±¸11010802024551ºÅ