Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâÀÕË÷¹¥»÷£¬²¿Ãź½°àÑÓÎó

°ä²¼¹¦·ò 2022-05-27

1¡¢Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâµ½ÀÕË÷¹¥»÷£¬²¿Ãź½°àÑÓÎó


Ó¡¶ÈµÄº½¿Õ¹«Ë¾SpiceJetÔÚ5ÔÂ25ÈÕ֪ͨ¿Í»§£¬ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£Æ¾¾Ý¸Ã¹«Ë¾µÄ²¼¸æ£¬ÆäITÍŶÓÒѳɹ¦×èÖ¹Õâ´Î¹¥»÷£¬Òò¶ø¸´Ô­ÁËÕý³£µÄÔËӪ״̬¡£È»¶ø£¬TwitterºÍFacebookÉϵĶà¸ö¿Í»§ÒÀÈ»·´Ó³´æÔÚµÄÎÊÌ⣬ÀýÈçÁ˺½°àÑÓÎó£¬ÎÞ·¨Í¨¹ýµç»°ÁªÏµ¿Í·þ£¬ÇÒԤԼϵͳ²»³ÉÓ᣽ØÖÁ25ÈÕ£¬SpiceJetµÄÍøÕ¾ÖÐÖ»ÓÐÖ÷Ò³¿É½Ó¼û£¬¶ø´óÎÞÊýµ×²ãϵͳºÍÍøÒ³¶¼ÎÞ·¨¼ÓÔØ£¬º½°à״̬±íÏÔʾËùÓÐÖ÷Õŵصĺ½°à¶¼´æÔÚ´óÁ¿ÑÓÎó¡£SpiceJetÊÇÓ¡¶ÈµÚ¶þ´óº½¿Õ¹«Ë¾£¬Õâ´Î¹¥»÷»áÓ°Ïì´óÁ¿³Ë¿Í£¬²¢Ôì³É¾Þ´óµÄ¾­¼ÃËðʧ¡£


https://www.bitdefender.com/blog/hotforsecurity/airline-passengers-left-stranded-after-ransomware-attack/


2¡¢¹ú¼ÊÐ̾¯×éÖ¯ÒÑ¿ÛÁôBECÍÅ»ïSilver TerrierµÄÍ·×Ó


ƾ¾Ý5ÔÂ25ÈÕ±¨Â·£¬¹ú¼ÊÐ̾¯×éÖ¯¾­¹ý³¤´ïÒ»ÄêµÄ´úºÅΪ¡°Operation Delilah¡±µÄµ÷²éºó£¬¿ÛÁôÁËBECÍÅ»ïSilver TerrierµÄÍ·×Ó¡£Õâ´Î·¨ÂÉÐж¯ÓÚ2021Äê5ÔÂÆðÍ·£¬ÔÚÄáÈÕÀûÑǾ¯·½ºÍGroup-IBµÈ¶à¼ÒÍøÂ簲ȫ¹«Ë¾µÄЭµ÷Ï£¬ÓÚ2022Äê3Ô¿ÛÁôÁËÒ»Ãû37ËêµÄÄáÈÕÀûÑÇÄÐ×Ó¡£¹ú¼ÊÐ̾¯×éÖ¯ÔÚÉêÃ÷ÖгÆ£¬¸ÃÄÐ×Ó±»Ö¸¿ØÔËÓª×ÅÒ»¸ö¿ç¹úÍøÂç·¸×ïÍŻ²¢¶Ô¹«Ë¾ºÍÓ×ÎÒ½øÐÐÁË´ó¹æÄ£´¹µö»î¶¯ºÍBEC¹¥»÷¡£


https://securityaffairs.co/wordpress/131659/cyber-crime/silverterrier-leader-arrested.html


3¡¢°µÍøÊг¡Versus±»±¬´æÔÚÐÅϢй¶·ì϶ºó¾ö¶¨¹Ø¹Ø


¾Ý5ÔÂ25ÈÕ±¨Â·£¬°µÍøÊг¡Versus MarketÔڹعØ¡£ÕâÊÇ×îÊÜÓ­½ÓµÄ°µÍøÊг¡Ö®Ò»£¬ÓÚ3ÄêÇ°ÍÆ³ö¡£ÉÏÖÜ£¬Ä³ºÚ¿ÍÔÚDreadÉϰ䲼ÁËÒ»¸ö¹ØÓÚÈôºÎ½Ó¼û¸ÃÍøÕ¾·þÎñÆ÷ÎļþϵͳµÄPoC¡£ÓÉÓÚ²»°²´æÔÚÑϳÁµÄ·ì϶ÈÝÒ×Ôâµ½ºÚ¿ÍµÄ¹¥»÷£¬ÔËÓªÍŶӽ«VersusÏÂÏß²¢½øÐа²È«É󼯡£µ«±ÉÈËÏߺó£¬Óû§ÆðÍ·²»°²VersusÔÚÍ˳ö¶øFBIÒѾ­ÊÕÊÜÁ˸ÃÍøÕ¾¡£²»¾ÃÖ®ºó£¬¸Ãƽ̨µÄÔËÓªÍŶӳÁгöÏÖ£¬²¢°ä·¢½«¹Ø¹Ø¸ÃÊг¡¡£Ä¿Ç°Éв»Ã÷ÏÔ·¨ÂÉÈËÔ±ÊÇ·ñÒѾ­ÀûÓÃÁË´Ë·ì϶¡£


https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/


4¡¢Â׶ظÛÎñ¾ÖPLAµÄ¹ÙÍøÔâµ½À´×ÔALtahreaµÄDDoS¹¥»÷


Â׶ظÛÎñ¾Ö£¨PLA£©ÓÚ5ÔÂ24ÈÕÈ·ÈÏ£¬Æä¹ÙÍøÔâµ½¹¥»÷±»ÆÈ¹Ø¹Ø¡£PLAÊÇÒ»¸ö¹«¹²ÐÅÈλú¹¹£¬ÒµÎñ¸²¸Ç´ÓÌ©¶¡¶Ùµ½±±º£µÄÌ©ÎîÊ¿ºÓ¡£Check Point°µÊ¾£¬Õâ´ÎÖжÏÔ´ÓÚÒ»¸öÒÁÀÊ×éÖ¯ÌáÒéµÄÉ¢²¼Ê½»Ø¾ø·þÎñ(DDoS)¹¥»÷¡£²»¾Ãºó£¬ºÚ¿ÍÍÅ»ïALtahrea TeamÔÚTelegramÉÏÐû³Æ¶Ô´ËÊÂÕÆ¹Ü¡£ALtahreaÓëÒÁÀÊÓйØ£¬Ôø¹¥»÷¹ýÒÔÉ«ÁиÛÎñ¾Ö¡¢ÒÔÉ«ÁÐ9Ƶ·ºÍÍÁ¶úÆä×ÜͳµÄ¹Ù·½ÍøÕ¾µÈ¡£Ä¿Ç°£¬¸ÃÍøÕ¾ÒѾ­³ÁÐÂÉÏÏß¡£


https://www.hackread.com/pro-iran-altahrea-hit-port-of-london-website-ddos-attack/


5¡¢Red Canary·¢ÏÖеÄä¯ÀÀÆ÷½Ù³Ö¶ñÒâÈí¼þChromeLoader


5ÔÂ25ÈÕ£¬Red Canary°ä²¼Á˹ØÓÚжñÒâÈí¼þChromeLoaderµÄ¼¼Êõ·ÖÎö»ã±¨¡£ChromeLoaderÊÇÒ»ÖÖä¯ÀÀÆ÷½Ù³Ö·¨Ê½£¬Ëü»áÅú¸ÄÖ¸±êµÄä¯ÀÀÆ÷ÉèÖò¢½«Óû§Á÷Á¿³Á¶¨Ïòµ½¸æ°×ÍøÕ¾¡£ÕâÀà½Ù³Ö·¨Ê½Óкö࣬µ«ChromeLoaderÒòÆäÓÆ¾ÃÐÔºÍϰȾõè¾¶µÈ¸öÐÔÍÑÓ±¶ø³ö¡£Ëü¼Ù×°³ÉÆÆ½â°æÓÎÏ·»òóÒ×Èí¼þISO£¬ÔÚ´ò¿ªºó½«±»¹ÒÔØÎªÒ»¸öÐé¹¹µÄCD-ROMÇý¶¯Æ÷¡£×îÖÕ£¬Ëü»áÓÃPowerShell½«×Ô¼º×¢Èëµ½ä¯ÀÀÆ÷ÖУ¬²¢½«¶ñÒâÀ©´óÔö³¤µ½ä¯ÀÀÆ÷ÖУ¬Í¨³£²»»á±»¼ì²âµ½¡£


https://www.bleepingcomputer.com/news/security/new-chromeloader-malware-surge-threatens-browsers-worldwide/


6¡¢QCT¶à¿î·þÎñÆ÷Ò×ÊÜPantsdown·ì϶CVE-2019-6260µÄÓ°Ïì


ýÌå5ÔÂ26Èճƣ¬¹ã´ïÔÆ¼¼Êõ(QCT)·þÎñÆ÷ÈÝÒ×Êܵ½»ù°åÖÎÀí½ÚÔìÆ÷(BMC)·ì϶¡°Pantsdown¡±µÄÓ°Ïì¡£¸Ã·ì϶׷×ÙΪCVE-2019-6260£¨CVSSÆÀ·Ö9.8£©£¬ÓÚ2019Äê1Ô³õ´ÎÆØ¹â£¬Éæ¼°¶ÔBMCÎïÀíµØÖ·¿Õ¼äµÄËÁÒâ¶Áд½Ó¼û£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐС£×êÑÐÈËÔ±³Æ£¬³É¹¦ÀûÓø÷ì϶¿É»ñµÃ·þÎñÆ÷µÄÆëÈ«½ÚÔìȨ£¬´Ó¶øÊ¹ÓöñÒâ´úÂ븲¸ÇBMC¹Ì¼þ¡¢×°ÖöñÒâÈí¼þ¡¢Ð¹Â¶Êý¾Ý£¬ÉõÖÁ·ÛËéϵͳ¡£ÊÜÓ°ÏìµÄQCT·þÎñÆ÷ÐͺÅÔ̺¬D52BQ-2U¡¢D52BQ-2U 3UPIºÍD52BV-2U¡£·ì϶ÓÚ2021Äê10ÔÂ7ÈÕÅû¶֮ºó£¬²¹¶¡ÒÑÓÚ½ñÄê4ÔÂ15ÈÕÌṩ¸ø¿Í»§¡£


https://thehackernews.com/2022/05/critical-pantsdown-bmc-vulnerability.html