ŦԼ´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
°ä²¼¹¦·ò 2022-09-201¡¢Å¦Ô¼´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå9ÔÂ17ÈÕ±¨Â·£¬Î»ÓÚŦԼµÄ´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÌṩÉÌEmpress EMS£¨´¹Î£Ò½ÁÆ·þÎñ£©Åû¶ÁËһ·¿Í»§ÐÅϢй¶ÊÂÎñ¡£Æ¾¾Ý֪ͨ£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ½Ó¼ûȨÏÞ£¬ÔÚÔ¼Ò»¸ö°ëÔº󣬼´7ÔÂ13ÈÕÇÔÈ¡ÁËÒ»Óײ¿ÃÅÎļþ¡£Empress EMSÔÚ֪ͨÊÜÓ°ÏìµÄÓ×ÎÒ£¬²¢ÎªÇкÏǰÌáµÄÓ×ÎÒÌṩÐÅÓþ¼à¿Ø·þÎñ¡£Ö»¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬µ«ºÃ¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ
ýÌå9ÔÂ19Èճƣ¬¹¥»÷Õßͨ¹ý´¹µö¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬²¢»ñµÃÁËÓ×ÎÒÐÅÏ¢µÄ½Ó¼ûȨÏÞ¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢ÏÖÁËÕâÒ»ÎÊÌ⣬֮ºóÂíÉϱ£»¤Á˺ÏÓõÄÓʼþÕÊ»§£¬²¢ÀñƸÁ˵ÚÈý·½°²È«È¡Ö¤¹«Ë¾½øÐе÷²é£¬ÒÔÈ·¶¨ÊÂÎñµÄÐÔÖʺÍÁìÓò¡£¸Ãº½¿Õ¹«Ë¾»Ø¾øÐ¹Â©ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÁ¿£¬µ«°µÊ¾ÕâÊÇÒ»¸ö¼«¶ÈÓ×µÄÊý×Ö£¬ÇÒûº±¼û¾Ý±»ÀÄÓã¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£
https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/
3¡¢CISAºÍNSA°ä²¼Ê¢¿ªÎÞÏßµç½ÓÈëÍøÂ簲ȫȷµ±¿àÖÔÏî
9ÔÂ16ÈÕ£¬CISAºÍNSA°ä²¼ÁËÊ¢¿ªÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©°²È«È·µ±¿àÖÔÏî¡£Open RANÊÇ´«Í³RAN¼Ü¹¹ÑݱäΪʢ¿ª»¥²Ù×÷½Ó¿Ú¡¢Ðé¹¹»¯¡¢´óÊý¾ÝºÍÖ§³ÖÈËΪÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓOpen RAN¼Ü¹¹´ò¿ªÁËÔÆºÍÐé¹¹»¯µÄ´óÃÅ£¬Í¬Ê±Í¨¹ý´´½¨¶à¹©¸øÉÌÉú̬ϵͳÀ´Íƽø¾ºÕù¼Ó¾ç¡¢¹©¸øÉ̶àÑùÐԺʹ´Ð¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëÖ´ÐÐÊ¢¿ªRAN¼Ü¹¹ÓйصÄÒæ´¦ºÍ°²È«µ±¿àÖÔÏCISA¼¤ÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©¸øÉ̺ÍÀûÒæÓйØÕ߲鿴ÕâЩµ±¿àÖÔÏî¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security
4¡¢ÀÕË÷ÍÅ»ïHiveÐû³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÕÆ¹Ü
¾Ý9ÔÂ15ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïHiveÐû³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾Bell¼¼Êõ½â¾ö¹æ»®(BTS)ϵͳµÄ¹¥»÷ÕÆ¹Ü¡£BTSÊÇÒ»¼ÒÕ¼ÓÐ4500¶àÃûÔ±¹¤µÄ¶ÀÁ¢×Ó¹«Ë¾£¬×¨ÃÅΪ°²´ÖÂÔÊ¡ºÍ¿ý±±¿ËÊ¡µÄסլºÍÓ×ÐÍÆóÒµ¿Í»§×°ÖÃBell·þÎñ¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐй©¹¥»÷²úÉúµÄ¹¦·ò£¬µ«HiveÔÚÆäÍøÕ¾ÖаµÊ¾ÔÚÔ¼Ò»¸öÔÂǰ£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£BTSµÄÍøÕ¾Ä¿Ç°ÈÔÎÞ·¨½Ó¼û£¬²¿Ãſͻ§µÄÐÕÃû¡¢µØÖ·ºÍµç»°ÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒ´«²¼
KasperskyÔÚ9ÔÂ15ÈÕй©£¬Ò»¸öеĶñÒâÈí¼þ°üÀûÓñ»¹¥»÷µÄYouTubeƵ·ÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒ´«²¼¡£ÕâЩÊÓÆµÍ¨³£Ô̺¬ÏÂÔØ¼ÙµÄÆÆ½âºÍÎè±×Èí¼þµÄÁ´½Ó£¬ÏÖʵÉÏ»á×°ÖÃ×ÔÎÒ´«²¼µÄ¶ñÒâÈí¼þ°ü£¬ÖØÒªÕë¶ÔFIFA¡¢×îÖÕ¿ÕÏë¡¢¼«ÏÞ¾º¿ìµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÅ×ÎÏ·µÄ·ÛË¿¡£Ôʼ°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬ÆäÖÐÔ̺¬ºÜ¶à¶ñÒâÎļþ¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬±ðÀëΪRedLineÇÔÈ¡·¨Ê½¡¢¿ó¹¤ºÍÅú´¦ÖÃÎļþ¡£
https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
6¡¢AquaSec°ä²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
9ÔÂ15ÈÕ£¬AquaSec°ä²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×Ô9Ô³õÒÔÀ´£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢ÏÖÁËTeamTNT»î¶¯µÄ¼£Ï󣬲¢ÏàПúڿÍ×éÖ¯ÓÔìðÍ·Ðж¯ÁË¡£×êÑÐÈËÔ±ÔÚTeamTNTÐÂÒ»ÂֵĻÖй۲쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬ÀûÓñ»½Ù³Ö·þÎñÆ÷µÄÍÆËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»Cronb¹¥»÷£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈ¼¼Êõ£»What Will Be¹¥»÷£¬Õë¶ÔDockerÊØ»¤¹ý³Ì£¬ÀûÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬ÀûÓ÷ì϶´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£
https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt


¾©¹«Íø°²±¸11010802024551ºÅ