Ó¡¶ÈSree SaranÒ½ÁÆÖÐÐij¬¹ý15Íò»¼ÕßµÄÊý¾Ý±»ÏúÊÛ
°ä²¼¹¦·ò 2022-12-06ýÌå12ÔÂ2Èճƣ¬Ä³ºÚ¿ÍÔÚÏúÊÛÓ¡¶ÈÌ©Ã×¶ûÄɵ¹úSree SaranÒ½ÁÆÖÐÐĵϼÕßÊý¾Ý¡£×êÑÐÈËԱй©£¬´ËÊÂÎñÔ´ÓÚ¹©¸øÁ´¹¥»÷£¬Ò½ÔºµÄIT¹©¸øÉÌThree Cube IT LabÊ×ÏÈÔâµ½¹¥»÷¡£¹¥»÷ÕßÀûÓöԹ©¸øÉÌϵͳµÄ½Ó¼ûȨÏÞ£¬ÈëÇÖÒ½ÔºµÄϵͳ²¢ÇÔÈ¡»¼ÕßµÄPIIºÍPHIÐÅÏ¢¡£Ä¿Ç°£¬ÕâЩÊý¾ÝÔÚTelegramÉÏÏúÊÛ¡£Âô¼Ò°ä²¼µÄÑù±¾ÏÔʾÊý¾ÝÀ´×Ô2007-2011Ä꣬ÆäÖÐÔ̺¬15ÍòÌõ»¼ÕßÐÅÏ¢¼Í¼¡£
https://www.databreaches.net/in-hackers-selling-personal-data-of-150000-patients-from-a-tamil-nadu-hospital-in-supply-chain-attack/
2¡¢AMI MegaRAC BMCÖжà¸ö·ì϶ӰÏìAMDºÍ´÷¶ûµÈ³§ÉÌ
¾Ý12ÔÂ5ÈÕ±¨Â·£¬American Megatrends MegaRAC Baseboard Management Controller(BMC)ÖеÄ3¸ö·ì϶ӰÏì¶à¸öÔÆ·þÎñºÍÊý¾ÝÖÐÐÄÌṩÉÌʹÓõķþÎñÆ÷¡£ÆäÖÐ×îÑϳÁµÄÊÇRedfish APIµÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2022-40259£©£¬CVSSÆÀ·ÖΪ9.9£¬µ«±ØÒªÊÂÏÈÖÁÉÙ½Ó¼ûÒ»¸öµÍȨÏÞÕÊ»§ÄÜÁ¦Ö´ÐÐAPI»Øµ÷¡£Æä´ÎΪ¿É»ñµÃÖÎÀíshell½Ó¼ûȨÏ޵ķì϶£¨CVE-2022-40242£©ºÍö¾ÙÓû§Ãû²¢È·¶¨ÕÊ»§ÊÇ·ñ´æÔڵķì϶£¨CVE-2022-2827£©¡£MegaRAC BMC¹Ì¼þ±»ÖÁÉÙ15¼Ò·þÎñÆ÷Ôì×÷ÉÌʹÓã¬Ô̺¬AMD¡¢Asus¡¢ARM¡¢Dell EMC¡¢Huawei¡¢InspurºÍLenovoµÈ¡£
https://www.bleepingcomputer.com/news/security/severe-ami-megarac-flaws-impact-servers-from-amd-arm-hpe-dell-others/
3¡¢°ÍÎ÷×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð
¾ÝýÌå12ÔÂ1ÈÕ±¨Â·£¬×ܲ¿Î»ÓÚ°ÍÎ÷°ü³µÄÒ»¼Ò×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð¡£¸Ã¹«Ë¾ÔÚ°ÍÎ÷µÄÂíÀïÀûÑÇ¡¢°¢¹Å¶à˹ºÍÀï±´ÀÊÆÕÀ×ͼÉèÓÐÁí±í3¸ö´¦Ê´¦¡£SuspectFileµÄ»ã±¨¼Í¼Á˸ù«Ë¾ºÍ¹¥»÷ÕߵĽ»Éæ¹ý³Ì¡£×î³õµÄÊê½ð½ð¶îΪ700000ÃÀÔª£¬¹«Ë¾Ê×ÏÈÌá³ö5ÍòÃÀÔªµÄ±¨¼Û£¬Ôâµ½¶ÏÈ»»Ø¾ø¡£ÁîÈ˾ªÑȵÄÊÇ£¬½ö½ö9·ÖÖӺ󣬸Ã×·Õ®¹«Ë¾¾ÍÔÞ³ÉÖ§¸¶50ÍòÃÀÔª¡£Õâ¼Ò¹«Ë¾°µÊ¾Ëû²»»á֪ͨ·¨Âɲ¿ÃÅ£¬µ«Éв»Ã÷ÏÔÆäÊÇ·ñ»á֪ͨÊÜÓ°ÏìµÄÈË¡£
https://www.suspectfile.com/brazil-debt-collection-company-pays-500000-ransom-to-hacker-group-hive/
4¡¢LazarusÍÅ»ïʹÓÃαÔìµÄ¼ÓÃÜÇ®±ÒÀûÓ÷ַ¢AppleJeus
12ÔÂ3ÈÕ±¨Â·³Æ£¬Volexity¹Û²ìµ½³¯ÏʺڿÍÍÅ»ïLazarusÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¸Ã»î¶¯Ê¼ÓÚ2022Äê6Ô£¬²¢ÖÁÉÙ³ÖÐøµ½2022Äê10Ô¡£¹¥»÷Õß×¢²áÁËÓòÃûbloxholder[.]com²¢³ÉÁ¢ÁËÒ»¸öÍøÕ¾£¬¸ÃÍøÕ¾ÊǺϷ¨µÄHaasOnline×Ô¶¯¼ÓÃÜÇ®±ÒÂòÂôƽ̨µÄ¿Ë¡¡£¹¥»÷ÕßʹÓøÃÍøÕ¾·Ö·¢¼Ù×°³ÉBloxHolderÀûÓõÄWindows MSI×°Ö÷¨Ê½£¬ËüÏÖʵÉÏÊÇÓëQTBitcoinTraderÀûÓðó¸¿ÔÚһ·µÄ¶ñÒâÈí¼þAppleJeus¡£¸Ã»î¶¯»¹Í¨¹ýÁ´Ê½DLL²à¼ÓÔØ£¬ÒÔ´ÓÊÜÐÅÀµµÄ¹ý³ÌÖмÓÔØ¶ñÒâÈí¼þ£¬´Ó¶øÈƹýAVµÄ¼ì²â¡£
https://securityaffairs.co/wordpress/139290/apt/lazarus-apt-bloxholder-campaign.html
5¡¢HP Wolf Security°ä²¼2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨
HP Wolf SecurityÔÚ12ÔÂ1ÈÕ°ä²¼ÁË2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬Q3ÓÐ44%µÄ¶ñÒâÈí¼þÊÇͨ¹ý´æµµÎļþ·Ö·¢µÄ£¬±ÈÉÏÒ»¼¾¶ÈÔö³¤ÁË11%£¬Ô¶¸ßÓÚͨ¹ýOfficeÎļþ·Ö·¢µÄ32%¡£¸ÃÍŶÓÔÚÕâÒ»¼¾¶È·¢ÏÖÁ˼¸¸ö½«´æµµÎļþÓëеÄHTML×ß˽¼¼ÊõÏà½áºÏµÄ¹¥»÷»î¶¯¡£´Ë±í£¬»ã±¨»¹ÃèÊöÁ˹¥»÷ÕßÈôºÎÕë¶ÔÀ¶¡ÃÀÖ޵ľƵêÐÐÒµ·Ö·¢Òñ±ÎµÄ¶ñÒâÈí¼þOpenDocument£¬²¢¶Ô×î½üµÄMagniberÀÕË÷Èí¼þ»î¶¯½øÐÐÁË·ÖÎö¡£
https://threatresearch.ext.hp.com/wp-content/uploads/2022/11/HP-Wolf-Security-Threat-Insights-Report-Q3-2022.pdf
6¡¢AquaSec°ä²¼¹ØÓÚжñÒâÈí¼þRedigoµÄ·ÖÎö»ã±¨
12ÔÂ1ÈÕ£¬AquaSec°ä²¼Á˹ØÓÚÐÂRedisºóÃŶñÒâÈí¼þRedigoµÄ·ÖÎö»ã±¨¡£RedigoÊÇ»ùÓÚGoµÄ¶ñÒâÈí¼þ£¬ÖØÒª¹¥»÷´æÔÚ·ì϶£¨CVE-2022-0543£©µÄRedis·þÎñÆ÷¡£¸Ã·ì϶ÓëLua¾ç±¾ÒýÇæÖеÄɳÏäÌÓÒÝÓйأ¬¿ÉÓÃÓÚÔ¶³ÌÖ´ÐдúÂ룬ÓÚ2022Äê2Ô±»·¢ÏÖ²¢½¨¸´¡£¹¥»÷Õßͨ¹ýɨÃè¶Ë¿Ú6379£¬À´¶¨Î»Â¶³öµÄRedis·þÎñÆ÷ÒÔ³ÉÁ¢³õʼ½Ó¼û£¬¶øºóÖ´ÐкÅÁî¡£¶ñÒâÈí¼þͨ¹ý6379¶Ë¿Ú·ÂÕÕÕý³£µÄRedisͨѶ£¬ÒÔÈÆ¹ýÍøÂç·ÖÎö¹¤¾ßµÄ¼ì²â£¬Í¬Ê±ÊÔͼ°µ²ØÀ´×ÔRedigoµÄC2·þÎñÆ÷µÄÁ÷Á¿¡£
https://blog.aquasec.com/redigo-redis-backdoor-malware


¾©¹«Íø°²±¸11010802024551ºÅ