΢Èí°ä²¼9Ô·ÝÖܶþ²¹¶¡£¬×ܼƽ¨¸´63¸ö°²È«·ì϶
°ä²¼¹¦·ò 2022-09-14
9ÔÂ13ÈÕ£¬Î¢Èí°ä²¼ÁË9Ô·ÝÖܶþ²¹¶¡£¬×ܼƽ¨¸´63¸ö°²È«·ì϶¡£Õâ´Î½¨¸´µÄ·ì϶ÀàÐÍΪ18¸öÌáȨ·ì϶¡¢1¸ö°²È«Ö°ÄÜÈÆ¹ý·ì϶¡¢30¸öÔ¶³Ì´úÂëÖ´Ðзì϶¡¢7¸öÐÅϢй¶·ì϶¡¢7¸ö»Ø¾ø·þÎñ·ì϶ºÍ16¸öEdge-Chromium·ì϶¡£Õâ´Î¹²½¨¸´ÁËÁ½¸ö¹«¿ªÅû¶µÄÁãÈÕ·ì϶£¬±ðÀëΪWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½ÖеÄÌáȨ·ì϶£¨CVE-2022-37969£©ºÍCache Speculation Restriction·ì϶£¨CVE-2022-23960£©¡£ÆäÖУ¬CVE-2022-37969ÒÑÔÚ¹¥»÷Öб»»ý¼«ÀûÓá£
https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2022-patch-tuesday-fixes-zero-day-used-in-attacks-63-flaws/
2¡¢ºÚ¿ÍÍÅ»ïGhostSecÐû³ÆÒѾÈëÇÖ55¸öBerghof PLC
¾ÝýÌå9ÔÂ13ÈÕ±¨Â·£¬Óë°ÍÀÕ˹̹ÓйصĺڿÍÍÅ»ïGhostSecÐû³Æ£¬ÒÑÈëÇÖÒÔÉ«ÁеÄ×é֯ʹÓõÄ55¸öBerghof¿É±à³ÌÂß¼½ÚÔìÆ÷(PLC)¡£GhostSec°ä²¼ÁËÒ»¶ÎÊÓÆµ£¬Õ¹Ê¾Á˳ɹ¦µÇ¼PLCÖÎÀíÃæ°åµÄ¹ý³Ì£¬ÒÔ¼°ÏÔʾ¹¥»÷ijЩ½×¶ÎµÄHMIÆÁÄ»½ØÍ¼¡£×êÑÐÈËÔ±ÒÔΪ£¬¹¥»÷Õßͨ¹ýʹÓÃĬÈϺÍͨÓÃÍ´´¦»ñµÃÁ˶ÔPLCÖÎÀíÃæ°åµÄ½Ó¼ûȨÏÞ¡£³ý´ËÖ®±í£¬GhostSec»¹°ä²¼ÁËÆäËüÆÁÄ»½ØÍ¼£¬Ðû³ÆÄܹ»½Ó¼ûÁíÒ»¸ö¿ÉÓÃÓÚÅú¸ÄË®ÖеÄÂȺ¬Á¿ºÍpHÖµµÄ½ÚÔìÃæ°å¡£
https://securityaffairs.co/wordpress/135656/hacktivism/ghostsec-hacked-berghof-plcs-israel.html
3¡¢U-HaulµÄ×âÁÞºÏͬËÑË÷ÃÅ»§Ôâµ½¹¥»÷ºó¿Í»§ÐÅϢй¶
ýÌå9ÔÂ12Èճƣ¬±±ÃÀ×î´óµÄ°áÔ˺Ͳִ¢×âÁÞ¹«Ë¾Ö®Ò»U-HaulµÄ¿Í»§ÐÅϢй¶¡£¸Ã¹«Ë¾ÔÚ7ÔÂ12ÈÕ¶Ô´ËÊ·¢Õ¹µ÷²é£¬ÓÚ8ÔÂ1ÈÕ·¢ÏÖ¹¥»÷ÕßÔÚÈ¥Äê11ÔÂ5ÈÕÖÁ½ñÄê4ÔÂ5ÈÕÆÚ¼ä½Ó¼ûÁ˲¿Ãſͻ§µÄ×âÁÞºÏͬ£¬²¢ÓÚ9ÔÂ7ÈÕÈ·¶¨Ð¹Â¶µÄÐÅÏ¢Ô̺¬¿Í»§µÄÐÕÃû¼°¼ÝÊ»ÅÆÕÕ»òÉí·ÝÖ¤ºÅÂë¡£¾ÝϤ£¬¹¥»÷ÕßÊÇÔÚµÁÓÃÁËÁ½¸ö¡°Î¨Ò»µÄÃÜÂë"ºó½øÈëÁËU-HaulµÄ×âÁÞºÏͬËÑË÷ÃÅ»§£¬µ«¸Ã¹«Ë¾²¢Î´Ú¹ÊÍÆ¾Ö¤ÊÇÈôºÎй¶µÄ¡£
https://www.bleepingcomputer.com/news/security/u-haul-discloses-data-breach-exposing-customer-driver-licenses/
4¡¢LorenzÀûÓÃMitel MiVoice VOIPÖзì϶ÈëÇÔìóÒµÍøÂç
¾ÝArctic Wolf Labs 9ÔÂ12ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïLorenzÏÖÀûÓÃMitel MiVoice VOIPÉ豸Öеķì϶À´ÈëÇÔìóÒµÍøÂç¡£×î³õµÄ¶ñÒâ»î¶¯Ô´×ÔλÓÚÍøÂç±íΧµÄMitelÉ豸£¬LorenzÀûÓÃÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-29499£©À´»ñÈ¡·´Ïòshell£¬¶øºóʹÓÃChisel×÷ΪËí·¹¤¾ß½øÈëÍøÂç¡£¹¥»÷Õß»áÔÚ»ñµÃ³õʼ½Ó¼ûȨÏÞºóÆÚ´ýÒ»¸öÔ£¬¶øºó½øÐкáÏòÒÆ¶¯£¬»¹ÀûÓÃFileZilla½øÐÐÊý¾Ýй¶£¬²¢ÀûÓÃBitLockerºÍÀÕË÷Èí¼þLorenz¶ÔESXi½øÐмÓÃÜ¡£
https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/
5¡¢Group-IB·¢ÏÖͨ¹ýеÄBitB¹¥»÷ÇÔÈ¡SteamÕÊ»§µÄ»î¶¯
Group-IBÔÚ9ÔÂ13ÈÕÅû¶Á˹¥»÷ÕßÀûÓÃBrowser-in-the-Browser£¨BitB£©´¹µö¹¥»÷ÇÔÈ¡SteamÍ´´¦µÄ»î¶¯¡£BitBÊÇÒ»ÖÖÐµĹ¥»÷²½Ö裬Ôڻ´°¿ÚÖд´½¨¼ÙµÄä¯ÀÀÆ÷´°¿Ú£¬Ê¹ÆäÏÔʾΪָ±êµÇ¼·þÎñµÄµÇ¼µ¯³öÒ³Ãæ¡£¸Ã»î¶¯ÒÔ½õ±êÈüΪµö¶ü£¬Ô¼ÇëÖ¸±ê²ÎÓëÓ¢ÐÛͬÃË¡¢CS¡¢Dota 2»òPUBG½õ±êÈüµÄÍŶӣ¬ËùÀûÓõĴ¹µö¹¤¾ß°üÔÚºÚ¿ÍÂÛ̳»ò°µÍøÖв¢Î´±»¿í·ºÊ¹Óá£ÕâЩ´¹µö¹¥»÷Ö¼ÔÚÏúÊÛ¶ÔÕÊ»§µÄ½Ó¼ûȨÏÞ£¬Ò»Ð©³ÛÃûµÄSteamÕÊ»§µÄ¼ÛÖµÔÚ100000ÃÀÔªµ½300000ÃÀÔªÖ®¼ä¡£
https://blog.group-ib.com/steam
6¡¢Mandiant°ä²¼¹ØÓÚAPT42¹¥»÷»î¶¯µÄ¾ßÌå·ÖÎö»ã±¨
9ÔÂ7ÈÕ£¬Mandiant°ä²¼ÁËÒ»·ÝÈ«ÃæµÄ»ã±¨£¬ÏêÊöÁËAPT42µÄ¹¥»÷»î¶¯¡£APT42£¨ÔUNC788£©ÓëÒÁÀÊÓйأ¬´ú±íÒÁ˹À¼¸ïÃüÎÀ¶Ó(IRGC)µÄµý±¨×éÖ¯(IRGC-IO)ÔË×÷£¬»¹ÓëAPT35ÓÐËù³Áµþ¡£¸ÃÍÅ»ïÖØÒª½øÐиßÕë¶ÔÐÔµÄÓã²æÊ½´¹µö¹¥»÷ºÍÉç»á¹¤³Ì¹¥»÷£¬Æä»î¶¯´óÌå·ÖΪÈýÀà£¬Æ¾Ö¤ÍøÂç¡¢¼à¶½»î¶¯ºÍ¶ñÒâÈí¼þ·Ö·¢¡£×Ô2015ËêÊ×ÒÔÀ´£¬MandiantÒѹ۲쵽³¬¹ý30´ÎÈ·ÈÏÊÇÀ´×ÔAPT42µÄ¹¥»÷»î¶¯¡£ÓëÒÁÀÊµÄÆäËü¹¥»÷ÍÅ»ïÀàËÆ£¬Æä´ó²¿ÃŻ¼¯ÖÐÔÚÖж«µØÓò£¬ÖØÒªÕë¶ÔµÐ¶ÔµÄ×éÖ¯ºÍÓ×ÎÒ¡£
https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises


¾©¹«Íø°²±¸11010802024551ºÅ