ºÚɽµ±¾Ö³ÆÆäÊý×Ö»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷

°ä²¼¹¦·ò 2022-08-30
1¡¢ºÚɽµ±¾Ö³ÆÆäÊý×Ö»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷

      

¾Ý8ÔÂ27ÈÕ±¨Â·£¬ºÚɽµ±¾Öй©ÆäÔâµ½Á˸´ÔÓÇÒ³ÖÐøµÄÍøÂç¹¥»÷£¬Ó°ÏìÁ˹ú¶ÈµÄÊý×Ö»ù´¡ÉèÊ© ¡£ÍøÂç¹¥»÷µÄÖ¸±êÔ̺¬µçÁ¦ºÍ¹©Ë®ÏµÍ³¡¢½»Í¨·þÎñ¡¢ÓÃÓÚ¹«Ãñ½Ó¼û¸÷Àà¹ú¶È·þÎñµÄÔÚÏßÃÅ»§ÍøÕ¾µÈµÈ ¡£Òò¶ø£¬Ò»Ð©·¢µç³§ÒѾ­×ªÎªÊÖ¶¯²Ù×÷£¬¹ú¶ÈÖÎÀíµÄIT»ù´¡ÉèÊ©ÒѹعØ£¬µ«¹«ÃñºÍÉÌÆóÒµµÄÕË»§¼°ÆäÊý¾ÝµÄ°²È«ÐÔ²¢Î´Êܵ½Ó°Ïì ¡£¸Ã¹ú¹ú·À²¿³¤½«Õâ´Î¹¥»÷¹é×ïÓÚ¶íÂÞ˹µÄºÚ¿ÍÍÅ»ï ¡£


https://securityaffairs.co/wordpress/134900/cyber-warfare-2/montenegro-cyber-attack.html


2¡¢¶íÂÞ˹Á÷ýÌåÆ½Ì¨STARTÊý¾Ýй¶ӰÏì4400ÍòÓû§

      

ýÌå8ÔÂ29Èճƣ¬¶íÂÞ˹Á÷ýÌåÆ½Ì¨START¿Í»§µÄÓ×ÎÒÐÅÏ¢ÔÚÒ»´Î¹¥»÷ÖÐй¶ ¡£¸Ã¹«Ë¾Ã»ÓÐй©Óм¸¶àÓû§Êܵ½Ó°Ï죬Information Leaks¹«¿ªµÄ½ØÍ¼ÏÔʾÕâ´Îй¶ÁË4400Íò¿Í»§µÄ72 GBÊý¾Ý ¡£ºÚ¿ÍÐû³ÆÕâЩÊý¾ÝÀ´×ÔÒ»¸ö¶³öµÄMongoDBÊý¾Ý¿â£¬ÆäÖÐÔ̺¬ÔÚÈ¥Äê9ÔÂ22ÈÕ֮ǰÔÚ¸ÃÍøÕ¾ÉÏ×¢²áµÄÓû§µÄ¾ßÌåÐÅÏ¢ ¡£START°µÊ¾ÒѾ­½¨¸´·ì϶²¢¹Ø¹ØÁËÊý¾Ý¿â£¬Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷µÄºÚ¿Í¼°Æä¶¯»ú ¡£


https://therecord.media/leading-russian-streaming-platform-suffers-data-leak-allegedly-impacting-44-million-users/


3¡¢MERCURYÀûÓÃSysAidÖеÄLog4Shell¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµ

      

8ÔÂ25ÈÕ£¬Î¢ÈíÅû¶ÁËÒÁÀÊÍÅ»ïMERCURYÕë¶ÔÒÔÉ«ÁÐÆóÒµµÄ¹¥»÷»î¶¯ ¡£¹¥»÷²úÉúÔÚ2022Äê7ÔÂ23ÈÕÖÁ25ÈÕ£¬¹¥»÷ÕßÀûÓôæÔÚLog4Shell·ì϶µÄSysAidÀûÓ÷¨Ê½½øÐгõʼ½Ó¼û ¡£Ö®ºó£¬MERCURYͨ¹ýÌØÔìµÄÒªÇóÖ´ÐжñÒâPowerShell²¢×°ÖÃWeb shell ¡£ÔÚͨ¹ýcmd.exeÍøÂçµ½ËùÐèÐÅÏ¢ºó£¬»áÔö³¤Ò»¸öÓû§²¢½«ÆäȨÏÞÌáÉýΪ±¾µØÖÎÀíÔ±£¬¶øºó½«¹¥»÷¹¤¾ßÔö³¤µ½Æô¶¯Îļþ¼ÐÖУ¬ÒÔ³ÉÁ¢ÓƾÃÐÔ ¡£MuddyWater»¹Ê¹ÓÃMimikatzÖ´ÐÐÆ¾Ö¤ÇÔÈ¡£¬Í¨¹ýWMIºÍRemComºáÏòÒÆ¶¯£¬²¢Í¨¹ý¶¨ÔìµÄLigoloËí·¹¤¾ß½«±»µÁÊý¾Ý·¢Ë͵½C2·þÎñÆ÷ ¡£


https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/


4¡¢Ó¡¶ÈÄáÎ÷ÑÇPT.JASA MARGAÔâµ½DESORDENµÄ¹¥»÷

      

¾ÝýÌå8ÔÂ25ÈÕ±¨Â·£¬Ó¡¶ÈÄáÎ÷ÑǵÄÊշѹ«Â·ÔËÓªÉÌPT JASAMARGA TOLLROAD OPERATORÔâµ½À´×ÔDESORDENµÄ¹¥»÷ ¡£DESORDEN°µÊ¾£¬ÒÑÇÔÈ¡252 GBµÄÊý¾Ý¡¢±àÂëºÍÎĵµ£¬É¢²¼ÔÚ5̨·þÎñÆ÷ÉÏ£¬Éæ¼°¸Ã¹«Ë¾µÄÓû§¡¢¿Í»§¡¢Ô±¹¤¹«Ë¾ºÍ²ÆÕþµÄÐÅÏ¢ ¡£¸Ã¹«Ë¾×÷³ö»ØÓ¦£¬³ÆÐ¹Â¶µÄÊý¾ÝÖ»ÊÇÄÚ²¿Êý¾ÝºÍ¹«Ë¾ÓйØÐÅÏ¢£¬¶ø²»Éæ¼°¿Í»§Êý¾Ý£¬ËûÃÇÒѹعØÊÜÓ°ÏìµÄ·þÎñÆ÷£¬Ä¿Ç°ÔÚ¸´Ô­Êý¾Ý²¢½«ÏµÍ³Òƶ¯µ½¸ü°²È«µÄ·þÎñÆ÷ÉÏ ¡£


https://www.databreaches.net/major-indonesia-tollroad-operator-hacked-by-desorden/


5¡¢¼ÙµÄP2E Cthulhu World·Ö·¢¶à¸öÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ

      

ýÌå8ÔÂ27ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öеĶñÒâÈí¼þ·Ö·¢»î¶¯ ¡£ºÚ¿Í´´½¨ÁËÒ»¸ö¼ÙµÄplay-to-earnƽ̨Cthulhu World£¬ÆäÖÐÔ̺¬ÍøÕ¾¡¢Discord Groups¡¢Éç½»ÕË»§ºÍÒ»¸öMedium¿ª·¢ÕßÍøÕ¾£¬Ö¼ÔÚ·Ö·¢ÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRaccoon Stealer¡¢AsyncRATºÍRedLine ¡£ÆäÍøÕ¾ËÆºõ¿Ë¡Á˺Ϸ¨µÄAlchemic WorldÏîÄ¿ ¡£Ä¿Ç°£¬Cthulhu WorldµÄÍøÕ¾ÒѹعØ£¬µ«ËûÃǵÄDiscordÒÀÈ»»îÔ¾ ¡£


https://www.bleepingcomputer.com/news/security/fake-cthulhu-world-p2e-project-used-to-push-info-stealing-malware/


6¡¢Unit42°ä²¼¹ØÓÚÀÕË÷Èí¼þBlack BastaµÄ·ÖÎö»ã±¨

      

8ÔÂ25ÈÕ£¬Unit42°ä²¼Á˹ØÓÚÀÕË÷Èí¼þBlack BastaµÄ·ÖÎö»ã±¨ ¡£Black BastaÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´·þÎñ(RaaS)£¬ÓÚ2022Äê4Ô³õ´Î³öÏÖ£¬ÒÑÈëÇÖÁ˳¬¹ý75¸ö×éÖ¯£¬ÖØÒªÕë¶ÔλÓÚ°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢Ó¢¹úºÍÃÀ¹úµÄ×éÖ¯ ¡£2022Äê6Ô£¬×êÑÐÈËÔ±·¢ÏÖËüµÄVMware ESXi±äÌåÕë¶ÔÔÚÆóÒµLinux·þÎñÆ÷ÉÏÔËÐеÄÐé¹¹»ú ¡£¸ÃÀÕË÷Èí¼þÊÔͼ¼ì²â´úÂë·ÂÕæ»òɳºÐÀ´ÈƹýÄæÏò·ÖÎö£»ÌìÉúÒ»¸ö´øÓÐdsajdhas.0×Ö·û´®µÄ»¥³âËø£¬ÒÔÈ·±£Ã¿´ÎÖ»ÓÐÒ»¸ö¶ñÒâÈí¼þµÄÊ·ýÔÚÔËÐУ»Í¨¹ýChaCha20ºÍRSA-4096µÄ×éºÏ¶ÔÓû§Êý¾Ý½øÐмÓÃÜ ¡£


https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/