±£¼ÓÀûÑÇ×Üͳ°ì¹«ÊÒµÈÕþ¸®»ú¹¹µÄÍøÕ¾Ôâµ½DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-10-18
±£¼ÓÀûÑÇ×ÜÉó²é³¤°ì¹«ÊÒ10ÔÂ15ÈÕÌåÏÖ£¬±£¼ÓÀûÑÇÕþ¸®»ú¹¹µÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£DDoS¹¥»÷¡£×ÜÉó²é³¤³Æ£¬³ýÁË×Üͳ°ì¹«ÊÒ£¬´Ë´ÎDDoS¹¥»÷»¹µ¼Ö¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Ë¾·¨²¿ºÍÏÜ·¨·¨ÔºµÄÍøÕ¾·þÎñÖÐÖ¹¡£ËûÔö²¹µÀ£¬´Ë´Î¹¥»÷À´×Ô¶íÂÞ˹¶¼»áÂí¸ñÄáÍиç¶û˹¿Ë£¨Magnitogorsk£©¡£±£¼ÓÀûÑÇÕþ¸®ÒѶÔÕâÒ»ÊÂÎñÕö¿ªÊӲ죬²¢ÒѽÓÄɲ½·¥ïÔ̹¥»÷´øÀ´µÄÓ°Ïì¡£
https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html
2¡¢0patchƽ̨Ðû²¼MotWÖÐÒѱ»Ê¹ÓõÄÎó²îµÄ·Ç¹Ù·½²¹¶¡
¾ÝýÌå10ÔÂ17ÈÕ±¨µÀ£¬0patchƽ̨Ðû²¼ÁËÒ»¸öÃâ·ÑµÄ·Ç¹Ù·½²¹¶¡£¬ÒÔÐÞ¸´Windows Mark of the Web(MotW)Çå¾²»úÖÆÖб»Æð¾¢Ê¹ÓõÄÎó²î¡£¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´×èÖ¹WindowsÔÚ´ÓInternetÏÂÔØµÄZIP´æµµÖÐÌáÈ¡µÄÎļþÉÏÓ¦ÓÃ(MotW)±êÇ©¡£Ñо¿Ö°Ô±ÓÚ7ÔÂÏòMicrosoft±¨¸æÁ˸ÃÎÊÌ⣬ËûÊ×ÏÈ·¢Ã÷ÁËZIPÎĵµÎ´×¼È·Ìí¼ÓMoTW±ê¼Ç¡£ÔÚ΢ÈíÐû²¼¹Ù·½¸üÐÂ֮ǰ£¬0patchΪ¶à¸öÊÜÓ°ÏìµÄ°æ±¾¿ª·¢ÁËÃâ·ÑµÄ²¹¶¡¡£
https://www.bleepingcomputer.com/news/microsoft/windows-mark-of-the-web-bypass-zero-day-gets-unofficial-patch/
3¡¢Woolworths³ÆÆä220ÍòMyDeal¿Í»§µÄÐÅÏ¢ÒѾй¶
¾Ý10ÔÂ15ÈÕ±¨µÀ£¬WoolworthsµÄ×Ó¹«Ë¾MyDealÅû¶ÁËÒ»ÆðÓ°Ïì220Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£ÉÏÖÜÎ壬MyDealÌåÏÖºÚ¿ÍʹÓÃй¶µÄÓû§Æ¾Ö¤»á¼ûÁ˹«Ë¾µÄ¿Í»§¹ØÏµÖÎÀí(CRM) ϵͳ£¬´Ó¶ø¿ÉÒÔÉó²éºÍµ¼³ö¿Í»§ÐÅÏ¢¡£ÉÏÖÜÈÕ£¬¹¥»÷Õß×îÏÈÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏÒÔ600ÃÀÔªµÄ¼ÛÇ®³öÊÛ±»µÁÊý¾Ý¡£¹¥»÷ÕßÉù³Æ¸ÃÊý¾ÝÏÖÔÚ°üÀ¨100Íò¸öÌõÄ¿£¬µ«µ±ËûÃÇÍê³É¶ÔÊý¾Ý¿âµÄÆÊÎöʱ£¬Ð¹Â¶µÄ¿Í»§ÊýÄ¿½«»áÔöÌí¡£10ÔÂ17ÈÕ£¬ºÚ¿Í¹ûÕæÁË286¸öMyDeal¿Í»§µÄÐÅÏ¢×÷Ϊ±»µÁÊý¾ÝµÄÑù±¾¡£
https://www.databreaches.net/woolworths-says-2-2m-mydeal-customers-data-hacked/
4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÍŽáÐж¯¾Ð²¶Black AxeÍÅ»ïµÄ75ÈË
10ÔÂ17ÈÕ±¨µÀ£¬¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶Á˺ڿÍÍÅ»ïBlack AxµÄ75ÈË£¬ÆäÖÐÁ½ÈËÔÚÉϸöÔÂβ²ß»®Á˶àÖÖÚ²ÆÔ˶¯²¢×¬Ç®180ÍòÃÀÔª¡£ÕâЩÏÓÒÉÈËÊÇÔÚ2022Äê9ÔÂ26ÈÕÖÁ30ÈÕʱ´úÔÚÄϷǾÙÐеĹú¼ÊÍŽáÖ´·¨Ðж¯Operation JackalÖб»²¶µÄ¡£Black AxeÓÚ1977ÄêÔÚÄáÈÕÀûÑǽ¨É裬±»ÒÔΪÊÇÌìÏÂÉÏÓ°Ïì×îÉîÔ¶¡¢×îΣÏյ폷¨ÍÅ»ïÖ®Ò»£¬ÓÚ2015ÄêÊ×´ÎÉæ×ãÍøÂç·¸·¨¡£´Ë´ÎÖ´·¨Ðж¯¾ÙÐÐÁË49´Î¹¤ÒµËѲ飬²é»ñÁË12000ÕÅSIM¿¨ºÍ´ó×򵀮äËü×ʲú¡£
https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html
5¡¢WIP19ÍÅ»ïÖ÷ÒªÕë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ
ýÌå10ÔÂ14ÈÕ͸¶£¬SentinelOne³ÆÆä·¢Ã÷ÁËÐµĹ¥»÷ÍÅ»ïWIP19Ò»Ö±Õë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ¡£¸ÃÍÅ»ïʹÓÃÓɺ«¹ú¹«Ë¾DEEPSoft½ÒÏþµÄÕýµ±µÄ±»µÁÊý×ÖÖ¤ÊéÀ´Ç©ÊðÔÚѬȾÁ´ÖÐ×°ÖõĶñÒ⹤¼þ£¬ÒÔÈÆ¹ý¼ì²â¡£Ëü»¹ÓëOperation Shadow ForceÓÐËùÖØµþ£¬µ«Ê¹ÓÃÁËеĶñÒâÈí¼þºÍ²î±ðµÄÊÖÒÕ¡£±ðµÄ£¬¹¥»÷ÕßÔÚÔ˶¯ÖÐʹÓÃÁ˶àÖÖ¹¤¾ß£¬°üÀ¨Æ¾Ö¤×ª´¢³ÌÐò¡¢ÍøÂçɨÃ蹤¾ß¡¢ä¯ÀÀÆ÷ÇÔÈ¡³ÌÐò¡¢¼üÅ̼ͼ¹¤¾ßºÍÆÁÄ»¼Í¼¹¤¾ß¡£
https://thehackernews.com/2022/10/new-chinese-cyberespionage-group.html
6¡¢HP³ÆMagniberͨ¹ýJavaScriptÎļþѬȾWindowsÓû§
HPÔÚ10ÔÂ13ÈÕÐû²¼±¨¸æÕ¹ÏÖÁËÀÕË÷Èí¼þMagniberÐÂÒ»Âֵķַ¢Ô˶¯¡£ÔÚ֮ǰµÄÔ˶¯ÖУ¬¹¥»÷ÕßʹÓÃÁËMSIºÍEXEÎļþ£¬¶ø×î½ü£¬ËüÇл»µ½ÁËJavaScriptÎļþ¡£ÕâЩÎļþ¾ÓÉ»ìÏý´¦Öóͷ££¬²¢Ê¹ÓÃDotNetToJScriptÊÖÒյıäÌåÔÚϵͳÄÚ´æÖÐÖ´ÐÐ.NETÎļþ¡£.NETÎļþ¶Ôshellcode¾ÙÐнâÂë²¢½«Æä×¢ÈëÐÂÀú³Ì¡£×îÖÕ£¬Magniber¶ÔÖ÷»úÉϵÄÎļþ¾ÙÐмÓÃÜ£¬²¢ÁôÏÂÊê½ð¼Í¼¡£HPÖ¸³ö£¬¸ÃÍÅ»ï»áÒªÇó¼ÒÍ¥Óû§Ö§¸¶¸ß´ï2500ÃÀÔªµÄÓöÈÀ´»Ö¸´Îļþ¡£
https://threatresearch.ext.hp.com/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates/


¾©¹«Íø°²±¸11010802024551ºÅ