·¨¹úÒ½ÔºCHSF±»ÀÕË÷1000ÍòÃÀÔªºó½«»¼Õß×ªÒÆµ½±ð´¦

°ä²¼¹¦·ò 2022-08-25
1¡¢·¨¹úÒ½ÔºCHSF±»ÀÕË÷1000ÍòÃÀÔªºó½«»¼Õß×ªÒÆµ½±ð´¦

      

¾ÝýÌå8ÔÂ23ÈÕ±¨Â·£¬·¨¹ú°ÍÀèµÄÄÏ·¨À¼Î÷ÁÖÖÐÐÄÒ½Ôº(CHSF)Ôâµ½ÍøÂç¹¥»÷ºó£¬½«»¼ÕßתÕïÖÁÆäËü»ú¹¹²¢ÍƳÙÊÖÊõÔ¤Ô¼¡£CHSF°µÊ¾£¬Ò½ÔºµÄÒµÎñÈí¼þ¡¢´æ´¢ÏµÍ³£¨³ö¸ñÊÇҽѧ³ÉÏñ£©ºÍÓ뻼ÕßÓйصÄÐÅϢϵÍÂäÙʱÎÞ·¨½Ó¼û£¬¹¥»÷ÕßÒªÇó10000000ÃÀÔªµÄÊê½ðÀ´»»È¡½âÃÜÃÜÔ¿¡£·¨¹úýÌå·¢ÏÖϰȾLockBit 3.0µÄ¼£Ï󣬵«Ä¿Ç°ÉÐδȷ¶¨¹¥»÷ÕßµÄÉí·Ý¡£ÈôÊÇLockBit 3.0¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬ÄÇôËü¾ÍÎ¥·´ÁËRaaS´òËã²»Èݹ¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¹æ¶¨¡£


https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/


2¡¢³¬¹ý8Íǫ̀º £¿µÍþÊÓÉãÏñÍ·Ò×Êܵ½ºÅÁî×¢Èë·ì϶µÄÓ°Ïì

      

¾Ý8ÔÂ22ÈÕ±¨Â·£¬CYFIRMA×êÑÐÈËÔ±·¢ÏÖ³¬¹ý80000̨º £¿µÍþÊÓÉãÏñÍ·ÈÝÒ×Ôâµ½ºÅÁî×¢Èë·ì϶£¨CVE-2021-36260£©µÄÓ°Ïì¡£¸Ã·ì϶ÒÑͨ¹ý2021Äê9ÔµĹ̼þ¸üн¨¸´¡£2021Äê12Ô£¬MoobotµÄ»ùÓÚMiraiµÄ½©Ê¬ÍøÂçÆðÍ·ÀûÓø÷ì϶´«²¼£¬×êÑÐÈËÔ±»¹ÔÚ°µÍø·¢ÏÖ¶à¸öºÚ¿Íµ«Ô¸ÀûÓø÷ì϶ÈëÇÖÖ¸±êÉ豸¡£¹ÌÈ»·ì϶ÀûÓûĿǰ²¢Î´×ñÑ­ÌØ¶¨Ä£Ê½£¬µ«CYFIRMAÇ¿µ÷£¬APT41ºÍAPT10ÒÔ¼°¶à¸ö¶íÂÞ˹µÄºÚ¿ÍÍŻﶼ¿ÉÄÜ»áÕë¶ÔÒ×±»¹¥»÷µÄÉ豸¡£


https://securityaffairs.co/wordpress/134756/security/hikvision-cameras-vulnerability.html


3¡¢Êý¾Ý¿âÅäÖÃÃýÎóµ¼ÖÂÓ¡¶ÈÁª¹ú¾¯Ô±ºÍÒøÐÐÓйØÐÅϢй¶

      

CybernewsÔÚ8ÔÂ24ÈÕ³ÆÆä·¢ÏÖÁËÒ»¸ö¹«¿ªµÄElasticsearchÊý¾Ý¿â£¬ÆäÖÐÔ̺¬ÊôÓÚÓ¡¶ÈÁª¹ú¾¯Ô±µÄ½ðÈÚڲƭµ÷²é¼Í¼µÈÊý¾Ý¡£¸ÃÊý¾Ý¿âÔ¼24 GB£¬×ܹ²Ô̺¬3350Íò±Ê¼Í¼£¬Éæ¼°ÒøÐÐÕË»§³ÖÓÐÈËÐÕÃû¡¢Óà¶î¡¢Õʺš¢ÂòÂôÀàÐÍ¡¢½ð¶îºÍÓ¡¶ÈÖÐÑëµý±¨¾Ö(CBI)´¦Öõݸ¼þ¡£¸üÔã¸âµÄÊÇ£¬×êÑÐÈËÔ±ÔÚÊý¾Ý¿âÖл¹·¢ÏÖÁË200¶à¼ÒÒøÐеļͼ¡£Ä¿Ç°Éв»Ã÷ÏÔ¸ÃÊý¾Ý¿âµÄ³ÖÓÐÕߣ¬µ«ÆäÖÐÐÅÏ¢µÄÐÔÖÊÅú×¢Ëü¿ÉÄÜÓÉÓ¡¶È·¨Ôº»ò¸öÈ˵Äڲƭµ÷²é»ú¹¹³ÖÓС£


https://cybernews.com/privacy/federal-police-and-banking-records-exposed-by-database-leak-in-india/


4¡¢º½¿Õ¼¼ÊõºÍ·þÎñÌṩÉÌAccelyaÔâµ½Black CatµÄ¹¥»÷

      

ýÌå8ÔÂ23ÈÕ±¨Â·³Æ£¬º½¿Õ¼¼ÊõºÍ·þÎñÌṩÉÌAccelyaÔâµ½ÁËBlack CatµÄÀÕË÷¹¥»÷¡£AccelyaΪ´ïÃÀº½¿Õ¡¢Ó¢¹úº½¿Õ¹«Ë¾¡¢Î¬Õä´óÎ÷Ñ󺽿չ«Ë¾ºÍÃÀ¹úº½¿Õ¹«Ë¾µÈÌṩ·þÎñºÍ¼¼Êõ¡£ÉÏÖÜËÄ£¬Black Cat¹«¿ªÁ˾ݳƴÓAccelyaÇÔÈ¡µÄÊý¾Ý£¬Ô̺¬µç×ÓÓʼþºÍ¹¤È˺ÏÒ»Ö¡£¸Ã¹«Ë¾µÄ½²»°È˳Æ£¬ËûÃÇÔÚ·¢ÏÖ¹¥»÷ºóµ±¼´¸ôÀëÁËÀÕË÷Èí¼þ£¬Ã»ÓÐʹÆä´Ó±»Ï°È¾ÏµÍ³ºáÏòÒÆ¶¯µ½¿Í»§µÄϵͳÖС£Ä¿Ç°£¬AccelyaÔÚÉó²éй¶µÄÊý¾Ý£¬²¢Í¨ÖªÊÜÓ°Ïì¿Í»§¡£


https://therecord.media/major-airline-technology-provider-accelya-attacked-by-ransomware-group/


5¡¢ÒÁÀʺڿÍÍÅ»ïÀûÓÃй¤¾ßHyperscraperÇÔȡָ±êÓʼþ

      

8ÔÂ23ÈÕ£¬Google¹«¿ªÁËÒÁÀʺڿÍÍÅ»ïCharming KittenÀûÓÃй¤¾ßHyperscraperÇÔȡָ±êÓʼþµÄ»î¶¯¡£¸Ã¹¤¾ßÓÚ2021Äê12Ô³õ´Î±»·¢ÏÖ£¬ÓÃ.NET±àд£¬¿ÉÇÔÈ¡Gmail¡¢Yahoo!ºÍMicrosoft OutlookÕÊ»§ÖеÄÓû§Êý¾Ý¡£³ýÁËÏÂÔØºÍÇÔȡָ±êÊÕ¼þÏäÖеÄÄÚÈÝÖ®±í£¬Ëü»¹Äܹ»Í¨¹ýɾ³ý¹È¸è·¢Ë͵ݲȫÓʼþÀ´¸²¸ÇÆä×ÙÓ°¡£ÈôÊÇÓʼþÕý±¾ÊÇδ¶ÁµÄ£¬¸Ã¹¤¾ß»áÔÚ´ò¿ª²¢ÏÂÔØÓʼþΪ".eml "ÎļþºóÔÙ½«ÆäÏóÕ÷Ϊδ¶Á¡£


https://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/


6¡¢Unit 42³ÆÀÄÓúϷ¨SaaSƽ̨µÄ´¹µö¹¥»÷¼¤Ôö1100%

      

8ÔÂ23ÈÕ£¬Unit 42°ä²¼Á˹ØÓÚÀÄÓÃÈí¼þ¼´·þÎñ(SaaS)ƽ̨µÄÇ÷ÏòµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬´Ó2021Äê6Ôµ½2022Äê6Ô£¬Ð¼ì²âµ½ÍйÜÔںϷ¨SaaSƽ̨ÉϵÄÍøÂç´¹µöURLµÄ±ÈÂÊÔö³¤Á˳¬¹ý1100%¡£Unit 42½«±»ÀÄÓÃµÄÆ½Ì¨·ÖΪÁùÀࣺÎļþ¹²ÏíºÍÍйÜÍøÕ¾¡¢±í¸ñºÍµ÷²é¹¹½¨¹¤¾ß¡¢ÍøÕ¾¹¹½¨¹¤¾ß¡¢±Ê¼ÇºÍÎĵµ±àдƽ̨ÒÔ¼°Ó×ÎÒÎļþ¿Õ¼ä£¬Ã¿ÖÔì½Ì¨µÄ´¹µö»î¶¯ÔÚ2021ÄêϰëÄê¶¼ÓÐËùÔö³¤£¬ÆäÖÐ×îÏÔÖøµÄÔö³¤²úÉúÔÚ2021Äê9ÔÂÖÁ10Ô¡£


https://unit42.paloaltonetworks.com/platform-abuse-phishing/