ŦԼ½ôÆÈÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-09-201¡¢Å¦Ô¼½ôÆÈÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå9ÔÂ17ÈÕ±¨µÀ£¬Î»ÓÚŦԼµÄ½ôÆÈÏìÓ¦ºÍ¾È»¤³µ·þÎñÌṩÉÌEmpress EMS£¨½ôÆÈÒ½ÁÆ·þÎñ£©Åû¶ÁËÒ»Æð¿Í»§ÐÅϢй¶ÊÂÎñ¡£Æ¾Ö¤Í¨Öª£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ»á¼ûȨÏÞ£¬ÔÚÔ¼Ò»¸ö°ëÔº󣬼´7ÔÂ13ÈÕÇÔÈ¡ÁËһС²¿·ÖÎļþ¡£Empress EMSÕýÔÚ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬²¢ÎªÇкÏÌõ¼þµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿Ø·þÎñ¡£Ö»¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬µ«Ðí¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ
ýÌå9ÔÂ19Èճƣ¬¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬²¢»ñµÃÁËСÎÒ˽¼ÒÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬֮ºóÁ¬Ã¦±£»¤ÁËÊÊÓõÄÓʼþÕÊ»§£¬²¢Ô¼ÇëÁ˵ÚÈý·½Ç徲ȡ֤¹«Ë¾¾ÙÐÐÊӲ죬ÒÔÈ·¶¨ÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£¸Ãº½¿Õ¹«Ë¾¾Ü¾øÍ¸Â¶ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÄ¿£¬µ«ÌåÏÖÕâÊÇÒ»¸öºÜÊÇСµÄÊý×Ö£¬ÇÒûÓÐÊý¾Ý±»ÀÄÓã¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£
https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/
3¡¢CISAºÍNSAÐû²¼¿ª·ÅÎÞÏßµç½ÓÈëÍøÂçÇå¾²µÄ×¢ÖØÊÂÏî
9ÔÂ16ÈÕ£¬CISAºÍNSAÐû²¼ÁË¿ª·ÅÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©Çå¾²µÄ×¢ÖØÊÂÏî¡£Open RANÊǹŰåRAN¼Ü¹¹ÑݱäΪ¿ª·Å»¥²Ù×÷½Ó¿Ú¡¢ÐéÄ⻯¡¢´óÊý¾ÝºÍÖ§³ÖÈ˹¤ÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓOpen RAN¼Ü¹¹·¿ªÁËÔÆºÍÐéÄ⻯µÄ´óÃÅ£¬Í¬Ê±Í¨¹ý½¨Éè¶à¹©Ó¦ÉÌÉú̬ϵͳÀ´Ôö½ø¾ºÕù¼Ó¾ç¡¢¹©Ó¦É̶àÑùÐÔºÍÁ¢Òì¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëʵÑ鿪·ÅRAN¼Ü¹¹Ïà¹ØµÄÀûÒæºÍÇå¾²×¢ÖØÊÂÏCISAÃãÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©Ó¦É̺ÍÀûÒæÏà¹ØÕßÉó²éÕâÐ©×¢ÖØÊÂÏî¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security
4¡¢ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÈÏÕæ
¾Ý9ÔÂ15ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾BellÊÖÒÕ½â¾ö¼Æ»®(BTS)ϵͳµÄ¹¥»÷ÈÏÕæ¡£BTSÊÇÒ»¼ÒÓµÓÐ4500¶àÃûÔ±¹¤µÄ×ÔÁ¦×Ó¹«Ë¾£¬×¨ÃÅΪ°²¼òªʡºÍ¿ý±±¿ËÊ¡µÄסլºÍСÐÍÆóÒµ¿Í»§×°ÖÃBell·þÎñ¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐ͸¶¹¥»÷±¬·¢µÄʱ¼ä£¬µ«HiveÔÚÆäÍøÕ¾ÖÐÌåÏÖÔÚÔ¼Ò»¸öÔÂǰ£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£BTSµÄÍøÕ¾ÏÖÔÚÈÔÎÞ·¨»á¼û£¬²¿·Ö¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒÈö²¥
KasperskyÔÚ9ÔÂ15ÈÕ͸¶£¬Ò»¸öеĶñÒâÈí¼þ°üʹÓñ»¹¥»÷µÄYouTubeƵµÀÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒÈö²¥¡£ÕâЩÊÓÆµÍ¨³£°üÀ¨ÏÂÔØ¼ÙµÄÆÆ½âºÍ×÷±×Èí¼þµÄÁ´½Ó£¬ÏÖʵÉÏ»á×°ÖÃ×ÔÎÒÈö²¥µÄ¶ñÒâÈí¼þ°ü£¬Ö÷ÒªÕë¶ÔFIFA¡¢×îÖÕÀíÏë¡¢¼«ÏÞ¾ºËÙµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÈÓÎÏ·µÄ·ÛË¿¡£Ôʼ°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬ÆäÖаüÀ¨Ðí¶à¶ñÒâÎļþ¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬»®·ÖΪRedLineÇÔÈ¡³ÌÐò¡¢¿ó¹¤ºÍÅú´¦Öóͷ£Îļþ¡£
https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
6¡¢AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
9ÔÂ15ÈÕ£¬AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£×Ô9Ô³õÒÔÀ´£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢Ã÷ÁËTeamTNTÔ˶¯µÄ¼£Ï󣬲¢ÐÅÍиúڿÍ×éÖ¯ÓÖ×îÏÈÐж¯ÁË¡£Ñо¿Ö°Ô±ÔÚTeamTNTÐÂÒ»ÂÖµÄÔ˶¯ÖÐÊӲ쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬Ê¹Óñ»Ð®ÖÆ·þÎñÆ÷µÄÅÌËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»Cronb¹¥»÷£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈÊÖÒÕ£»What Will Be¹¥»÷£¬Õë¶ÔDockerÊØ»¤Àú³Ì£¬Ê¹ÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬Ê¹ÓÃÎó²î´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£
https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt


¾©¹«Íø°²±¸11010802024551ºÅ