Å·ÖÞÍøÂ簲ȫ¾ÖENISA°ä²¼2021ÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨

°ä²¼¹¦·ò 2021-11-04

×êÑÐÍŶӷ¢ÏÖÏÕЩÍþвËùÓдúÂëµÄ·ì϶Trojan Source


×êÑÐÍŶӷ¢ÏÖÏÕЩÍþвËùÓдúÂëµÄ·ì϶Trojan Source.png


½£ÇÅ´óѧµÄ×êÑÐÈËÔ±ÔÚ11ÔÂ1ÈÕ¹«¿ªÁËÒ»¸öÓ°Ïì´óÎÞÊýÍÆËã»ú´úÂë±àÒëÆ÷ºÍºÜ¶àÈí¼þ¿ª·¢»·¾³µÄ·ì϶Trojan Source¡£¸Ã·ì϶´æÔÚÓÚUnicodeÖÐ £¬ÓÐÁ½ÖÖÀûÓò½Ö裺ÆäÒ»ÊÇʹÓÃUnicodeµÄBidiËã·¨£¨CVE-2021-42574£© £¬¶Ô×Ö·û½øÐÐÊÓ¾õÉϵijÁÐÂÅÅÐò £¬Ê¹Æä³öÏÖÓë±àÒëÆ÷ºÍÚ¹ÊÍÆ÷Ëù·ÖÆçµÄÂß¼­°¤´Î£»ÁíÒ»ÖÖÊÇͬÐÎÎÄ×Ö¹¥»÷(CVE-2021-42694) £¬¼´ÀûÓÃÔÚÊÓ¾õÉÏ¿´ÆðÀ´ÀàËÆµÄ·ÖÆç×Ö·û¡£¸Ã·ì϶ºÏÓÃÓÚC¡¢C++¡¢C#¡¢JavaScript¡¢JavaµÈ¿í·ºÊ¹ÓõÄ˵»° £¬¿ÉÓÃÓÚ¹©¸øÁ´¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.trojansource.codes/



Ö鱦ÉÌGraffÔâµ½ContiÀÕË÷¹¥»÷ £¬ÌØÀÊÆÕµÈÈËÐÅϢй¶


Ö鱦ÉÌGraffÔâµ½ContiÀÕË÷¹¥»÷£¬ÌØÀÊÆÕµÈÈËÐÅϢй¶.png


10ÔÂ31ÈÕ £¬ÖðÈÕÓʱ¨±¨Â·ÀÕË÷ÍÅ»ïConti¹¥»÷ÁËÖ鱦ÉÌGraff²¢ÇÔÈ¡´óÁ¿Êý¾Ý¡£Ä¿Ç° £¬¹¥»÷ÕßÒÑÔÚ°µÍøÉϹ«¿ªÁËÉæ¼°ÌÆÄɵ¡¤ÌØÀÊÆÕ¡¢°ÂÆÕÀ­¡¤Î¸¥ÈðºÍ´óÎÀ¡¤±´¿ËººÄ·µÄ69000·Ý»úÃÜÎļþ £¬×÷ΪÑù±¾Êý¾Ý¡£²¢Ðû³ÆÄ¿Ç°¹«¿ªµÄÐÅÏ¢Éæ¼°Á˸ù«Ë¾Ô¼11000¸ö¿Í»§ £¬½öÕ¼ÆäÇÔÈ¡µÄÈ«ÊýÊý¾ÝµÄ1%¡£ContiµÄÊê½ð¼«¶È¸ß £¬Ô¼Õ¼Êܺ¦ÕßÄêÊÕÈëµÄ10% £¬¶øGraffÔÚ2019ÄêµÄÊÕÈëΪ4.5ÒÚÓ¢°÷¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123980/cyber-crime/conti-ransomware-graff-jeweller.html



ÃÀ¹úÒ½ÁƱ£½¡·þÎñ¹«Ë¾PHMÈ·ÈÏÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷


ÃÀ¹úÒ½ÁƱ£½¡·þÎñ¹«Ë¾PHMÈ·ÈÏÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷.png


ÃÀ¹úÒ½ÁƱ£½¡·þÎñ¹«Ë¾Professional Healthcare Management(PHM)ÔÚ10ÔÂ31ÈÕÈ·ÈÏÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¹¥»÷²úÉúÔÚ9ÔÂ14ÈÕ £¬Ð¹Â¶Á˿ͻ§µÄÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢½¡È«±£ÏÕÐÅÏ¢¡¢´¦·½Ãû³ÆºÍÕï¶Ï´úÂëµÈÐÅÏ¢¡£PHM³Æ·¢ÏÖ¹¥»÷ºóµ±¼´²ÉÈ¡´ëÊ©±£»¤Æäϵͳ²¢¸´Ô­ÔËÓª £¬Ä¿Ç°ÔÚ֪ͨÄÇЩ¿ÉÄÜÊÜ´ËÓ°ÏìµÄ¿Í»§ £¬²¢½«ÎªÆäÌṩÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»¤·þÎñ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/tn-professional-healthcare-management-discloses-ransomware-incident/



Kaspersky·¢ÏÖÀûÓÃÆäAmazon SESÁîÅÆµÄ´¹µö»î¶¯


Kaspersky·¢ÏÖÀûÓÃÆäAmazon SESÁîÅÆµÄ´¹µö»î¶¯.png


°²È«¹«Ë¾KasperskyÔÚ±¾ÖÜÒ»°ä²¼ÁËÒ»·Ý²¼¸æ £¬³ÆÓд¹µö»î¶¯ÀûÓÃÆäAmazon SESÁîÅÆ¡£Õâ´Î»î¶¯ÀûÓÃÁËKasperskyµÄnoreply@sm.kaspersky.comµÈºÏ·¨µØÖ· £¬²¢Ê¹ÓÃÁË´¹µö¹¤¾ß°üMIRCBOOT £¬Ö¼ÔÚÇÔȡָ±êµÄOffice 365Í´´¦¡£×êÑÐÈËԱȷ¶¨ £¬²¿ÃÅÓʼþÊÇʹÓúϷ¨µÄÑÇÂíÑ·SESÁîÅÆ·¢Ë͵Ä £¬´Ë½Ó¼ûÁîÅÆÊÇÔÚ²âÊÔ2050.earthÍøÕ¾µÄÆÚ¼äÐû¸æ¸øµÚÈý·½³Ð°üÉ̵Ä £¬¸ÃÍøÕ¾Ä¿Ç°Ò²ÍйÜÔÚÑÇÂíÑ·ÉÏ £¬·¢ÏÖ¹¥»÷»î¶¯ºóµ±¼´³·ÏúÁË´ËSESÁîÅÆ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/office-365-phishing-campaign-kasperskys-amazon-ses-token/175915/



Cisco Talos°ä²¼2021ÄêQ3Ó¦¼±ÏìÓ¦ÊÂÎñµÄ·ÖÎö»ã±¨


Cisco Talos°ä²¼2021ÄêQ3Ó¦¼±ÏìÓ¦ÊÂÎñµÄ·ÖÎö»ã±¨.png


Cisco TalosÔÚ10ÔÂ28ÈÕ°ä²¼ÁË2021ÄêQ3Ó¦¼±ÏìÓ¦ÊÂÎñµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö £¬ÔÚ2021Äê7ÔÂÖÁ10ÔÂÆÚ¼ä £¬ÀÕË÷Èí¼þÒÀÈ»ÊDZ¾¼¾¶È×îÖØÒªµÄÍþв £¬Ô¼Õ¼ËùÓÐÍþвµÄ38% £¬»¹³öÏÖÁ˺ܶàеÄÀÕË÷Èí¼þ¼Ò×åVice Society¡¢Hive¡¢Karma¡¢Grief¡¢CryptBDºÍThanos¡£µç×ÓÓʼþÊÇ×î³£¼ûµÄ³õʼϰȾý½é £¬¶ø²»×ã¶à³É·ÖÉí·ÝÑéÖ¤(MFA)³ÉΪÆóÒµ°²È«µÄ×î´ó×è°­Ö®Ò»¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/10/quarterly-report-incident-response.html



Å·ÖÞÍøÂ簲ȫ¾ÖENISA°ä²¼2021ÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨


Å·ÖÞÍøÂ簲ȫ¾ÖENISA°ä²¼2021ÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨.png


Å·ÖÞÍøÂ簲ȫ¾ÖENISAÔÚ10ÔÂ27ÈÕ°ä²¼ÁË2021ÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨¡£»ã±¨È·¶¨ÁËÖØÒªÍþв¡¢¹¥»÷¼¼Êõ¡¢ÖµÍ×ÌùÐĵÄÊÂÎñºÍÓйØÇ÷Ïò £¬»¹ÌṩÁ˽µµÍ·çÏյĽ¨Òé¡£±¾»ã±¨ÖØÒª»áÉÌÁË9ÖÖÍøÂ簲ȫÍþвÀà±ð£ºÀÕË÷Èí¼þ¡¢¶ñÒâÈí¼þ¡¢¼ÓÃܽٳ֡¢µç×ÓÓʼþÓйØÍþв¡¢¶ÔÊý¾ÝµÄÍþв¡¢¶Ô¿ÉÓÃÐÔºÍÆëÈ«ÐÔµÄÍþв¡¢ÐéαÐÅÏ¢£¨ÃýÎóÐÅÏ¢£©¡¢·Ç¶ñÒâÍþв¡¢ºÍ¹©¸øÁ´¹¥»÷¡£´Ë±í £¬»ã±¨Ö¸³ö £¬ÀÕË÷Èí¼þ¹¥»÷ÒѳÉÎªÖØÒªÍþв¡£


Ô­ÎÄÁ´½Ó£º

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021