·¨¹úÒ½ÔºCHSF±»ÀÕË÷1000ÍòÃÀÔªºó½«»¼Õß×ªÒÆµ½±ð´¦
Ðû²¼Ê±¼ä 2022-08-25
¾ÝýÌå8ÔÂ23ÈÕ±¨µÀ£¬·¨¹ú°ÍÀèµÄÄÏ·¨À¼Î÷ÁÖÖÐÐÄÒ½Ôº(CHSF)Ôâµ½ÍøÂç¹¥»÷ºó£¬½«»¼ÕßתÕïÖÁÆäËü»ú¹¹²¢ÍƳÙÊÖÊõÔ¤Ô¼¡£CHSFÌåÏÖ£¬Ò½ÔºµÄÓªÒµÈí¼þ¡¢´æ´¢ÏµÍ³£¨ÌØÊâÊÇҽѧ³ÉÏñ£©ºÍÓ뻼ÕßÏà¹ØµÄÐÅϢϵͳÔÝʱÎÞ·¨»á¼û£¬¹¥»÷ÕßÒªÇó10000000ÃÀÔªµÄÊê½ðÀ´»»È¡½âÃÜÃÜÔ¿¡£·¨¹úýÌå·¢Ã÷ѬȾLockBit 3.0µÄ¼£Ï󣬵«ÏÖÔÚÉÐδȷ¶¨¹¥»÷ÕßµÄÉí·Ý¡£ÈôÊÇLockBit 3.0¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ÄÇôËü¾ÍÎ¥·´ÁËRaaSÍýÏëեȡ¹¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¹æÔò¡£
https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/
2¡¢Áè¼Ý8Íǫ̀º£¿µÍþÊÓÉãÏñÍ·Ò×Êܵ½ÏÂÁî×¢ÈëÎó²îµÄÓ°Ïì
¾Ý8ÔÂ22ÈÕ±¨µÀ£¬CYFIRMAÑо¿Ö°Ô±·¢Ã÷Áè¼Ý80000̨º£¿µÍþÊÓÉãÏñÍ·ÈÝÒ×Ôâµ½ÏÂÁî×¢ÈëÎó²î£¨CVE-2021-36260£©µÄÓ°Ïì¡£¸ÃÎó²îÒÑͨ¹ý2021Äê9ÔµĹ̼þ¸üÐÂÐÞ¸´¡£2021Äê12Ô£¬MoobotµÄ»ùÓÚMiraiµÄ½©Ê¬ÍøÂç×îÏÈʹÓøÃÎó²îÈö²¥£¬Ñо¿Ö°Ô±»¹ÔÚ°µÍø·¢Ã÷¶à¸öºÚ¿ÍÏ£ÍûʹÓøÃÎó²îÈëÇÖÄ¿µÄ×°±¸¡£ËäÈ»Îó²îʹÓÃÔ˶¯ÏÖÔÚ²¢Î´×ñÕÕÌØ¶¨Ä£Ê½£¬µ«CYFIRMAÇ¿µ÷£¬APT41ºÍAPT10ÒÔ¼°¶à¸ö¶íÂÞ˹µÄºÚ¿ÍÍŻﶼ¿ÉÄÜ»áÕë¶ÔÒ×±»¹¥»÷µÄ×°±¸¡£
https://securityaffairs.co/wordpress/134756/security/hikvision-cameras-vulnerability.html
3¡¢Êý¾Ý¿âÉèÖùýʧµ¼ÖÂÓ¡¶ÈÁª°î¾¯Ô±ºÍÒøÐÐÏà¹ØÐÅϢй¶
CybernewsÔÚ8ÔÂ24ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö¹ûÕæµÄElasticsearchÊý¾Ý¿â£¬ÆäÖаüÀ¨ÊôÓÚÓ¡¶ÈÁª°î¾¯Ô±µÄ½ðÈÚÚ²ÆÊÓ²ì¼Í¼µÈÊý¾Ý¡£¸ÃÊý¾Ý¿âÔ¼24 GB£¬×ܹ²°üÀ¨3350ÍòÌõ¼Í¼£¬Éæ¼°ÒøÐÐÕË»§³ÖÓÐÈËÐÕÃû¡¢Óà¶î¡¢Õʺš¢ÉúÒâÀàÐÍ¡¢½ð¶îºÍÓ¡¶ÈÖÐÑëÇ鱨¾Ö(CBI)´¦Öóͷ£µÄ°¸¼þ¡£¸üÔã¸âµÄÊÇ£¬Ñо¿Ö°Ô±ÔÚÊý¾Ý¿âÖл¹·¢Ã÷ÁË200¶à¼ÒÒøÐеļͼ¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âµÄ³ÖÓÐÕߣ¬µ«ÆäÖÐÐÅÏ¢µÄÐÔ×ÓÅú×¢Ëü¿ÉÄÜÓÉÓ¡¶È·¨Ôº»ò˽È˵ÄÚ²ÆÊÓ²ì»ú¹¹³ÖÓС£
https://cybernews.com/privacy/federal-police-and-banking-records-exposed-by-database-leak-in-india/
4¡¢º½¿ÕÊÖÒպͷþÎñÌṩÉÌAccelyaÔâµ½Black CatµÄ¹¥»÷
ýÌå8ÔÂ23ÈÕ±¨µÀ³Æ£¬º½¿ÕÊÖÒպͷþÎñÌṩÉÌAccelyaÔâµ½ÁËBlack CatµÄÀÕË÷¹¥»÷¡£AccelyaΪ´ïÃÀº½¿Õ¡¢Ó¢¹úº½¿Õ¹«Ë¾¡¢Î¬Õä´óÎ÷Ñ󺽿չ«Ë¾ºÍÃÀ¹úº½¿Õ¹«Ë¾µÈÌṩ·þÎñºÍÊÖÒÕ¡£ÉÏÖÜËÄ£¬Black Cat¹ûÕæÁ˾ݳƴÓAccelyaÇÔÈ¡µÄÊý¾Ý£¬°üÀ¨µç×ÓÓʼþºÍ¹¤ÈËÌõÔ¼µÈ¡£¸Ã¹«Ë¾µÄ½²»°È˳ƣ¬ËûÃÇÔÚ·¢Ã÷¹¥»÷ºóÁ¬Ã¦¸ôÀëÁËÀÕË÷Èí¼þ£¬Ã»ÓÐʹÆä´Ó±»Ñ¬È¾ÏµÍ³ºáÏòÒÆ¶¯µ½¿Í»§µÄϵͳÖС£ÏÖÔÚ£¬AccelyaÕýÔÚÉó²éй¶µÄÊý¾Ý£¬²¢Í¨ÖªÊÜÓ°Ïì¿Í»§¡£
https://therecord.media/major-airline-technology-provider-accelya-attacked-by-ransomware-group/
5¡¢ÒÁÀʺڿÍÍÅ»ïʹÓÃй¤¾ßHyperscraperÇÔȡĿµÄÓʼþ
8ÔÂ23ÈÕ£¬Google¹ûÕæÁËÒÁÀʺڿÍÍÅ»ïCharming KittenʹÓÃй¤¾ßHyperscraperÇÔȡĿµÄÓʼþµÄÔ˶¯¡£¸Ã¹¤¾ßÓÚ2021Äê12ÔÂÊ״α»·¢Ã÷£¬ÓÃ.NET±àд£¬¿ÉÇÔÈ¡Gmail¡¢Yahoo!ºÍMicrosoft OutlookÕÊ»§ÖеÄÓû§Êý¾Ý¡£³ýÁËÏÂÔØºÍÇÔȡĿµÄÊÕ¼þÏäÖеÄÄÚÈÝÖ®Í⣬Ëü»¹¿ÉÒÔͨ¹ýɾ³ý¹È¸è·¢Ë͵ÄÇå¾²ÓʼþÀ´ÑÚÊÎÆä×Ù¼£¡£ÈôÊÇÓʼþÔ±¾ÊÇδ¶ÁµÄ£¬¸Ã¹¤¾ß»áÔÚ·¿ª²¢ÏÂÔØÓʼþΪ".eml "ÎļþºóÔÙ½«Æä±ê¼ÇΪδ¶Á¡£
https://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/
6¡¢Unit 42³ÆÀÄÓÃÕýµ±SaaSƽ̨µÄ´¹ÂÚ¹¥»÷¼¤Ôö1100%
8ÔÂ23ÈÕ£¬Unit 42Ðû²¼Á˹ØÓÚÀÄÓÃÈí¼þ¼´·þÎñ(SaaS)ƽ̨µÄÇ÷ÊÆµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬´Ó2021Äê6Ôµ½2022Äê6Ô£¬Ð¼ì²âµ½ÍйÜÔÚÕýµ±SaaSƽ̨ÉϵÄÍøÂç´¹ÂÚURLµÄ±ÈÂÊÔöÌíÁËÁè¼Ý1100%¡£Unit 42½«±»ÀÄÓÃµÄÆ½Ì¨·ÖΪÁùÀࣺÎļþ¹²ÏíºÍÍйÜÍøÕ¾¡¢±í¸ñºÍÊӲ칹½¨¹¤¾ß¡¢ÍøÕ¾¹¹½¨¹¤¾ß¡¢Ìõ¼ÇºÍÎĵµ±àдƽ̨ÒÔ¼°Ð¡ÎÒ˽¼ÒÎļþ¿Õ¼ä£¬Ã¿ÖÖÆ½Ì¨µÄ´¹ÂÚÔ˶¯ÔÚ2021ÄêϰëÄê¶¼ÓÐËùÔöÌí£¬ÆäÖÐ×îÏÔ×ŵÄÔöÌí±¬·¢ÔÚ2021Äê9ÔÂÖÁ10Ô¡£
https://unit42.paloaltonetworks.com/platform-abuse-phishing/


¾©¹«Íø°²±¸11010802024551ºÅ