ÂíÀ´Î÷ÑǵçÐŹ«Ë¾RedOneÔâµ½DESORDENÍÅ»ïµÄ¹¥»÷
°ä²¼¹¦·ò 2022-09-29
¾ÝýÌå9ÔÂ27ÈÕ±¨Â·£¬ÂíÀ´Î÷ÑǵçÐŹ«Ë¾RedOneÔâµ½ÁËDESORDENµÄ¹¥»÷¡£9ÔÂ19ÈÕ£¬DESORDENÐû³ÆÒѾÈëÇָõçÐŹ«Ë¾¡£ÔÚredONEûÓлØÓ¦DESORDENµÄÒªÇóºó£¬DESORDENÓÚ9ÔÂ21ÈÕ×óÓÒÓÖ½øÐÐÁ˵ڶþ´Î¹¥»÷£¬ÈëÇÖÁËËûÃǵÄredCARDºÍredCARE·¨Ê½¡£Ð¹Â¶µÄÐÅÏ¢Éæ¼°redONEÊý¾Ý¿âºÍÔ´´úÂ룬Ô̺¬¿Í»§ÐÕÃû¡¢NRIC£¨¹úÃñÉí·ÝÖ¤ºÅÂ룩¡¢µØÖ·¡¢µç»°ºÍµç×ÓÓʼþµÈ¡£Ä¿Ç°£¬redONEÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£
https://www.databreaches.net/malaysian-telecom-redone-hit-by-desorden/
2¡¢Okta×Ó¹«Ë¾Auth0й©Æä²¿ÃÅÔ´´úÂë´æ´¢¿âÒѾй¶
ýÌå9ÔÂ28Èճƣ¬Okta×Ó¹«Ë¾Éí·ÝÑéÖ¤·þÎñÌṩÉÌAuth0³ÆÆä²¿ÃÅÔ´´úÂë´æ´¢¿âÒѾй¶¡£Auth0µÄÈÏ֤ƽ̨ÿÌìÓÃÓÚÈÏÖ¤30¸ö¹ú¶ÈµÄ2000¶à¼ÒÆóÒµ¿Í»§µÄ4200¶àÍò´ÎµÇ¼£¬ÆäÖÐÔ̺¬AMD¡¢Î÷ÃÅ×Ó¡¢»ÔÈð¡¢Âí×Ô´ïºÍ˹°Í³µÈ¹«Ë¾¡£8Ôµף¬Ä³µÚÈý·½Í¨ÖªOkta£¬ËûÃÇÕ¼ÓÐ2020Äê10Ô¼°¸üÔçµÄAuth0´úÂë¿âµÄ¸±±¾¡£Ö®ºó£¬¸Ã¹«Ë¾µ±¼´µ÷²éÊý¾ÝÊÇÈôºÎ±»Ð¹Â¶µÄ£¬µ«Ö±µ½´Ë¿Ì£¬»¹Ã»ÓÐÕÒµ½ÈκÎÎ¥¹æµÄÖ¤¾Ý¡£Auth0»¹°µÊ¾£¬´ËÊÂÎñδ¶Ô¿Í»§Ôì³ÉÓ°Ï죬Òò¶øËûÃÇÎÞÐè²ÉÈ¡ÈκÎÐж¯¡£
https://www.bleepingcomputer.com/news/security/auth0-warns-that-some-source-code-repos-may-have-been-stolen/
3¡¢LazarusÒÔCrypto.com¹¤×÷»úÓöΪµö¶ü·Ö·¢¶ñÒâÈí¼þ
SentinelOneÔÚ9ÔÂ26ÈÕÅû¶Á˳¯ÏÊLazarusÍÅ»ïÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£ÓëÆ½·²Ò»Ñù£¬¹¥»÷Õßͨ³£ÀûÓÃLinkedIn¿¿½üÖ¸±ê£¬·¢ËÍÒ»¸ö¼Ù×°³ÉPDFµÄmacOS¶þ½øÔìÎļþ£¬ÆäÖÐÔ̺¬Crypto.comµÄÕÐÆ¸Ö°Î»¡£ÔÚºó¶Ü£¬Mach-O¶þ½øÔìÎļþ»áÔÚÓû§µÄ¿âĿ¼Öд´½¨Ò»¸öÎļþ¼Ð²¢·Ö·¢µÚ¶þ½×¶ÎºÍµÚÈý½×¶ÎµÄÎļþ¡£ÓÉÓÚC2ÔÚµ÷²éʱһÏò´¦ÓÚÀëÏß״̬£¬×êÑÐÈËÔ±ÎÞ·¨¼ìË÷×îÖÕpayload²¢½øÐзÖÎö¡£
https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
4¡¢Unit 42¹Û²ìµ½ÀûÓöà˵»°CHMÎļþÎļþ´«²¼IcedIDµÄ»î¶¯
9ÔÂ27ÈÕ£¬Unit 42³ÆÆäÔÚ½üÆÚ¹Û²ìµ½Ò»¸ö¶à˵»°Microsoft±àÒëHTMLÔ®ÊÖ(CHM)Îļþ±»ÓÃÓÚ·Ö·¢ÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þIcedID¡£×êÑÐÈËÔ±ÔÚ2022Äê8ÔÂÉÏÑ®·¢ÏÖÁËÕâ¸öÌØÊâµÄ¹¥»÷Á´£¬¸Ã¼¼ÊõÄܹ»Ô¤·ÀʹÓó¤ÐдúÂ룬Õâʹ¶ñÒâÎļþ¸üÈÝÒ×ÈÆ¹ý°²È«²úÆ·µÄ¼ì²â¡£¹¥»÷ÕßÄܹ»ÀûÓöà˵»°ÎļþÀ´ÈƹýÒÀÀµÎļþÌåʽʶ´ËÍâ·´¶ñÒâÈí¼þϵͳ¡£´Ë±í£¬¸Ã¼¼ÊõÔÚϰȾ¹ý³ÌÖлá¶Ôͳһ¸öCHMÎļþÖ´ÐÐÁ½´Î£¬µÚÒ»´ÎÖ´Ðп´ÆðÀ´ÊǺϷ¨»î¶¯£¬¶øµÚ¶þ´ÎÖ´ÐÐÔòÒñ±ÎµØ½øÐжñÒâ»î¶¯¡£
https://unit42.paloaltonetworks.com/polyglot-file-icedid-payload/
5¡¢ProofpointÅû¶ÀûÓÃMicrosoft SwayµÄ´¹µö»î¶¯µÄϸ½Ú
9ÔÂ26ÈÕ£¬ProofpointÅû¶Á˽üÆÚÀûÓÃMicrosoft Sway·¢Õ¹µÄ´¹µö»î¶¯¡£SwayÊÇMicrosoft 365Ì×¼þÖв»Ì«³£Óõķ¨Ê½Ö®Ò»£¬±»ÓÃÓÚ½«Îı¾ºÍýÌå½áºÏÆðÀ´´´½¨Ò»¸öÃÀ¹ÛµÄÍøÕ¾¡£Microsoft½öÔÊÐíÔÚSwayÒ³ÃæÖÐÉÏ´«Ã½ÌåÎļþ£¬²¢»á×Ô¶¯×èÖ¹ÉÏ´«¿ÉÖ´ÐÐÎļþ¡£µ«ÊÇ£¬¹¥»÷ÕßÒÀÈ»Äܹ»Í¨¹ý½«ÍйܶñÒâÈí¼þǶÈëSwayÖÐÀ´Ê¹ÓÃSway·Ö·¢¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£ÎªÁ˽µµÍ·çÏÕ£¬Proofpoint½¨ÒéÓû§ÔÚ±ØÒªÊ±ÏÞ¶ÈSwayÔÚÔÆ»·¾³ÖеÄʹÓá£
https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables
6¡¢NETSCOUT°ä²¼2022Äê1H DDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨
¾Ý9ÔÂ27ÈÕ±¨Â·£¬NETSCOUT°ä²¼ÁË2022Äê1H DDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬2022Äê1HµÄ¹¥»÷×ÜÊýΪ6019888£¬±È2021Äê2HÏ÷¼õÁË2%£»×î´ó´ø¿íΪ957.9 Gbps£¬±È2021Äê2HÔö³¤ÁË57%£»×î´óÍÌÍÂÁ¿Îª284.4 Mpps£¬½Ï2021Äê2HÏ÷¼õÁË37%¡£´Ë±í£¬¹¥»÷ÕßÔÚ²»ÐÝ´´ÐºÍË÷Çóеġ¢¸ü׳´óµÄDDoS¹¥»÷ý½é£»½©Ê¬ÍøÂçÈÔÔÚ³ÖÐøÒÔ¾ªÈ˵ĿìÂÊÀ©É¢£»ÓµÓÐÕ½Õù¡¢×ڽ̺ÍÕþÖγɷֵÄDDoS¹¥»÷»î¶¯Ôö¶à¡£
https://www.netscout.com/threatreport


¾©¹«Íø°²±¸11010802024551ºÅ