Clearview AIÒò·¸·¨ÍøÂçÊý¾Ý±»·¨¹ú·£¿î2000ÍòÅ·Ôª
°ä²¼¹¦·ò 2022-10-24
10ÔÂ21ÈÕ±¨Â·£¬·¨¹úÊý¾Ý±£»¤»ú¹¹(CNIL)Òò·¸·¨ÍøÂçºÍ´¦Ö÷¨¹ú¹«ÃñµÄÉúÎïÌØµãÊý¾Ý¶ø¶ÔClearview AI´¦ÒÔ2000ÍòÅ·ÔªµÄ·£¿î¡£CNIL»¹ºÅÁîÕâ¼Ò¹«Ë¾ÖÕ³¡ËùÓеÄÊý¾ÝÍøÂç»î¶¯£¬²¢ÔÚÁ½¸öÔÂÄÚɾ³ýÒÑ¾ÍøÂçµÄËùº±¼û¾Ý¡£ÈôÊÇClearview AIÔÚÁ½¸öÔºóδÄÜ×ñÊØºÅÁCNIL½«¶Ô¸Ã¹«Ë¾´¦ÒÔÿÌì100000Å·ÔªµÄ·£¿î¡£CNIL²¼¸æÖгƣ¬¸Ã»ú¹¹ÔÚ2021Äê5ÔÂÔø¾ÍÎ¥¹æÐÐΪÏòClearview AI·¢³öÁËÖҸ棬²¢ÔÚ2021Äê12Ô·¢³öÁË×îºóÖҸ棬µ«ºóÕßδ×ñÊØºÅÁî¡£
https://www.bleepingcomputer.com/news/security/clearview-ai-gets-third-20-million-fine-for-illegal-data-collection/
2¡¢Black RewardÍÅ»ïÐû³ÆÒÑÇÔÈ¡ÒÁÀÊÔ×ÓÄÜ»ú¹¹µÄÊý¾Ý
¾Ý10ÔÂ23ÈÕ±¨Â·£¬×Ô³ÆÎªBlack RewardµÄºÚ¿ÍÍÅ»ïÔÚTelegramÉÏÐû³Æ¹¥»÷ÁËÒÁÀÊÔ×ÓÄÜ×éÖ¯£¬´Ë±í£¬ËûÃÇ»¹°ä²¼ÁËÓйز¼Ê²¶û¹¤³§µÄºÏͬ¡¢½¨Éè´òËãºÍÉ豸ϸ½ÚµÄÓйØÎļþ£¬×÷ΪÈëÇÖµÄÖ¤¾Ý¡£¸Ã×éÖ¯³ÆÒÑÇÔÈ¡50 GBµÄÎļþ£¬Ä¿Ç°Éв»Ã÷ÏÔÕâЩÊý¾ÝÖÐÊÇ·ñ»¹Ô̺¬»úÃÜÐÅÏ¢¡£ÒÁÀÊÔ×ÓÄÜ»ú¹¹ÔÚÉÏÖÜÈÕй©£¬¹¥»÷ÕßÈëÇÖÁËÒ»¼ÒÔÚ²¼Ê²¶ûÔËÓª¸Ã¹úΨһºËµçÕ¾µÄ¹«Ë¾ËùʹÓõĵç×ÓÓʼþϵͳ£¬²¢½«¹¥»÷¹é×ïÓÚ¡°±í¹ú¡±£¬µ«Ã»ÓоßÌå×¢Ã÷¡£
https://securityaffairs.co/wordpress/137513/hacking/hackers-stole-sensitive-data-from-irans-atomic-energy-agency.html
3¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹AAHй©Լ300Íò»¼ÕßµÄÓ×ÎÒÐÅϢй¶
ýÌå10ÔÂ20ÈÕ±¨Â·£¬ÔÚÍþ˹¿µÐÇÖݺÍÒÁÀûŵÒÁÖÝÕ¼ÓÐ26¼ÒÒ½ÔºµÄAdvocate Aurora Health(AAH)ÔÚÏòÆä»¼Õß·¢Ë͹ØÓÚ½üÆÚÊý¾Ýй¶ÊÂÎñµÄ֪ͨ¡£¸ÃÊÂÎñÊÇÓÉÓÚÔÚAAHÍøÕ¾É϶ÔMeta PixelµÄʹÓò»µ±Ôì³ÉµÄ£¬¿ÉÄÜй¶»¼ÕßµÄÓ×ÎÒºÍÒ½ÁÆÐÅÏ¢¡£AAHÏòÃÀ¹úÎÀÉú²¿µÄ»ã±¨³Æ£¬¸ÃÊÂÎñÓ°ÏìÁËÔ¼300ÍòÈË¡£ÃÀ¹úºÜ¶àÒ½Ôº¶¼Ê¹ÓÃMeta Pixel£¬Òò¶øÕâÒ»ÒþÖÔй¶ÎÊÌâÔڸùúÏÆÆðÁËÒ»³¡·çÀË£¬µ¼ÖÂÊý°ÙÍòÈËÐÅϢ¶³ö¸øµÚÈý·½£¬²¢Òý·¢Á˶ÔÔðÈλú¹¹µÄ¼¯ÌåËßËÏ¡£
https://www.securityweek.com/data-3-million-advocate-aurora-health-patients-exposed-malformed-pixel
4¡¢Google PlayÖеÄ16¸ö¶ñÒâÀûÓÃÒѱ»ÏÂÔØ³¬¹ý2000Íò´Î
McAfeeÓÚ10ÔÂ19ÈÕÅû¶ÁËGoogle PlayÉÏ16¸öϰȾÁËClicker¶ñÒâÈí¼þµÄÀûÓã¬×Ü×°ÖÃÁ¿¸ß´ï2000Íò´Î¡£ClickerÊÇÒ»ÖÖÌØÊâµÄ¸æ°×Èí¼þ£¬ËüÔÚ²»Ë½¼ûµÄ¿ò¼Ü»ò²¼¾°ÖмÓÔØ¸æ°×²¢µã»÷ËüÃÇΪÆäÔËÓªÍŻﴴÊÕ¡£¶ÔÉ豸µÄÓ°Ïì¿ÉÄÜÊǵ¼Ö»úÄܽµÂä¡¢¹ýÈÈ¡¢µç³ØÊ¹ÓÃÁ¿Ôö³¤ÒÔ¼°Òƶ¯Êý¾ÝÊշѹý¸ß¡£Ä¿Ç°£¬ÕâЩ¶ñÒâÀûÓÃÒѱ»É¾³ý£¬ÆäÖÐDxCleanÔÚ±»É¾³ý֮ǰÒÑ×°ÖÃÁË500Íò´Î¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-malicious-clicker-found-in-apps-installed-by-20m-users/
5¡¢CISAµÈ»ú¹¹½áºÏ°ä²¼¹ØÓÚDaixin TeamµÄ°²È«Õ÷ѯ
10ÔÂ21ÈÕ£¬CISA¡¢FBIºÍHHS½áºÏ°ä²¼Á˹ØÓÚDaixin TeamµÄ°²È«Õ÷ѯ¡£¸ÃÍÅ»ï×Ô2022Äê6ÔÂÆðÍ·¾ÍÕë¶ÔÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)²¿ÃÅ£¬¶ÔÓÃÓÚÒ½ÁÆ·þÎñµÄϵͳ½øÐмÓÃÜ£¬²¢ÇÔÈ¡»¼ÕߵĽ¡È«ÐÅÏ¢(PHI)ºÍÓ×ÎÒÉí·ÝÐÅÏ¢(PII)¡£¹¥»÷Õßͨ¹ýÀûÓÃ×éÖ¯VPN·þÎñÆ÷Öеķì϶£¬»òʹÓÃÏÈǰ±»·ÛËéµÄÍ´´¦½Ó¼ûδÆôÓÃMFAµÄµÄ¾É°æVPN·þÎñÆ÷£¬À´»ñµÃ¶ÔÖ¸±êÍøÂçµÄ½Ó¼ûȨÏÞ¡£Ò»µ©³É¹¦£¬ËûÃǾͻáʹÓÃRDPºÍSSHÔÚÖ¸±êÍøÂçÖкáÏòÒÆ¶¯¡£¸ÃÕ÷ѯ»¹¹«¿ªÁËIOCºÍTTP£¬ÒÔÔ®ÊÖ°²È«ÈËÔ±¼ì²âºÍ×èÖ¹´ËÀ๥»÷¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/21/stopransomware-daixin-team
6¡¢Mandiant°ä²¼¹ØÓÚURSNIFбäÌåµÄ¼¼Êõ·ÖÎö»ã±¨
10ÔÂ19ÈÕ£¬Mandiant°ä²¼Á˹ØÓÚ¶ñÒâÈí¼þURSNIFбäÌåµÄ¼¼Êõ·ÖÎö»ã±¨¡£Ð±äÌåÔÚ6Ô³õ´Î±»·¢ÏÖ£¬Óë֮ǰµÄµü´ú°æ±¾·ÖÆç£¬Õâ¸ö±»³ÆÎªLDR4µÄбäÌå²»ÊÇÒøÐÐľÂí£¬¶øÊÇÒ»¸öͨ³£µÄºóÃÅ£¨ÀàËÆÓÚSAIGON±äÌ壩¡£ÓëLDR4ÓйصĹ¥»÷Á´Ê¼ÓÚÕÐÆ¸ÓйصÄÀ¬»øÓʼþ»î¶¯£¬ÓʼþÔ̺¬Ö¸Ïò±»Ï°È¾ÍøÕ¾µÄÁ´½Ó£¬Á´½Ó³Á¶¨Ïòµ½¼Ù×°³ÉºÏ·¨¹«Ë¾µÄÓò¡£»áÏÂÔØÔ̺¬ÓëÓʼþµö¶üÓйصÄExcelÎĵµ£¬´ò¿ªºó½«ÏÂÔØ²¢Ö´ÐÐLDR4 payload¡£¶Ô×îбäÌå´úÂëµÄ·ÖÎöÅú×¢£¬¿ª·¢ÈËÔ±ÒѾÆëȫɾ³ýÁËÒøÐÐÓйØÖ°ÄÜ¡£
https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud


¾©¹«Íø°²±¸11010802024551ºÅ