´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ £¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½ £¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®·þÎñÆ÷ £¬ÊÔͼ¼ÓÃÜÎļþ £¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦ £¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£ÏÖÔÚ £¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥ £¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢ £¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£Ö»¹ÜÄÚ²¿·þÎñÊܵ½Ò»¶¨ÏÞÖÆ £¬µ«Òªº¦Íⲿ·þÎñÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ £¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó £¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇó £¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣¹ÙÔ±ÌåÏÖ £¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨ £¬µ«½«½ß¾¡È«Á¦ïÔÌ­¶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ £¬Èö²¥³ðÊÓÑÔÂÛ


9ÔÂ26ÈÕ £¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-Fi·þÎñµÄÍøÂçÇå¾²ÊÂÎñ¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾ £¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã £¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£Wi-Fi·þÎñÒÑÔÝÍ£ £¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣¾ÝÊÓ²ì £¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ £¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª £¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ £¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö £¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ £¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ £¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²·þÎñÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶ £¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸° £¬Ö¼ÔÚ¾¡¿ì»Ö¸´·þÎñ²¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв £¬Äê´´14Íò´¹ÂÚÍøÕ¾


9ÔÂ26ÈÕ £¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´·þÎñ£¨PhaaS£©Æ½Ì¨ £¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨Éè £¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏß·þÎñ×÷Ϊ¹¥»÷Ä¿µÄ £¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å £¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ £¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓзþÎñÆ÷ÉÏ¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ £¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ £¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ £¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý £¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀí·þÎñÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù £¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌå £¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦ £¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂÚÔ˶¯µÄÔöÌí £¬Òò´Ë £¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ £¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


9ÔÂ28ÈÕ £¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©Æ­ÊÖ¶Î £¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ЭÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ £¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò £¬×ÜËðʧ³¬7ÍòÃÀÔª¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÍÐ £¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£Õ©Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ £¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Óà £¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðڲƭÉúÒâ £¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵķþÎñÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢ £¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é £¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ £¬´Ó¶øºã¾ÃDZÔÚ¡£ÆÊÎöÏÔʾ £¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂç £¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£ÖµµÃ×¢ÖØµÄÊÇ £¬Ö»¹ÜÊܺ¦ÕßÖÚ¶à £¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ £¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©Æ­ÊֶεÄÈÏ֪ȱ·¦ £¬ÒÔ¼°Õ©Æ­Õßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷ £¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ £¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ £¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾ £¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£ÖÜÈý £¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐÐ £¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£ÊÖÒÕÍŶÓѸËÙ½éÈë £¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏë £¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â £¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏß £¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú £¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲâ £¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£×èÖ¹ÏÖÔÚ £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£ÎÀÉú²¿Ç¿µ÷ £¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´ £¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤ £¬ÒÔ°ü¹Ü¹«¹²ÎÀÉú·þÎñµÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷


9ÔÂ27ÈÕ £¬Î¢Èí·¢³öÖÒÑÔ £¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ £¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐÎ £¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´ £¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö £¬Ò»Ö±½ø»¯ £¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£½üÆÚ £¬ËûÃÇÌØÊâ»îÔ¾ £¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂç £¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯ £¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖá£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤ £¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë £¬ÆÆËðͬ²½ÕË»§ £¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂë £¬Èƹý±£»¤¡£µ½ÊÖºó £¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ £¬Î±×°³ÉÕýµ±Óû§Éí·Ý £¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ £¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷ £¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óá£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/