ÒÔÉ«Áжà¼ÒÎïÁ÷¹«Ë¾Ô¼50 GBÓ×ÎÒºÍÔËÊä¼Í¼ÔÚ°µÍøÏúÊÛ
°ä²¼¹¦·ò 2022-12-07¾ÝýÌå12ÔÂ5ÈÕ±¨Â·£¬Ô¼50 GBµÄÊý¾Ý¿âÔÚ°µÍøÉÏÏúÊÛ£¬Êý¾Ý°ä²¼¹¦·òΪ2022Äê11ÔÂ26ÈÕºÍ27ÈÕ¡£µ÷²éÏÔʾ£¬ÕâЩÊý¾ÝÊôÓÚ29¼ÒÒÔÉ«ÁеÄÔËÊä¡¢ÎïÁ÷ºÍ»õÔ˹«Ë¾¡£×êÑÐÈËÔ±ÒÔΪ£¬ºÚ¿Íͨ¹ýÈí¼þ¹©¸øÉ̵ĵ¥µã¹ÊÕÏ£¬Î´¾ÊÚȨ½øÈëÕâЩÎïÁ÷¹«Ë¾µÄ¹©¸øÁ´£¬²¢ÇÔÈ¡ÁË´óÁ¿Ó×ÎÒÊý¾ÝºÍÔËÊä¼Í¼¡£Ã¿¸öÊý¾Ý¿âµÄÊÛ¼ÛΪ1 BTC£¬Ï൱ÓÚ17000ÃÀÔª¡£¹¥»÷Õß×ܹ²ÁгöÁË110Íò±Ê¼Í¼£¬Éв»Ã÷ÏÔ»áÓ°Ï켸¶àÈË¡£
https://www.hackread.com/israel-logistics-employees-data/
2¡¢¶íÂÞ˹µÚ¶þ´óÒøÐÐVTBµÄÍøÕ¾Ôâµ½´ó¹æÄ£DDoS¹¥»÷
¾Ý12ÔÂ6ÈÕ±¨Â·£¬¶íÂÞ˹µÚ¶þ´ó½ðÈÚ»ú¹¹VTBÒøÐаµÊ¾£¬ÓÉÓÚ³ÖÐøµÄDDoS¹¥»÷£¬ÆäÍøÕ¾ºÍÒÆ¶¯ÀûÓÃÁÙʱÎÞ·¨½Ó¼û¡£VTB½²»°È˳ƣ¬Õâ²»½öÊǽñÄê×î´ó¹æÄ£µÄ¹¥»÷£¬Ò²ÊǸÃÒøÐÐÕû¸öº¹ÇàÉÏ×î´óµÄÍøÂç¹¥»÷¡£ÏÖÒÑÈ·¶¨´óÎÞÊý¶ñÒâDDoSÒªÇó¶¼À´×Ô¹ú±í£¬µ«ÊÇÒ²Éæ¼°¶à¸ö¶íÂÞ˹µÄIPµØÖ·¡£ºÚ¿ÍÍÅ»ïIT Army of UkraineÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÓÚ11Ôµ×ÔÚTelegramÉϰ䷢ÁËÕâ´Î»î¶¯¡£Ä¿Ç°£¬VTBµÄÃÅ»§ÍøÕ¾´¦ÓÚÀëÏß״̬£¬µ«ËùÓÐÖ÷Ìâ·þÎñ¶¼ÔÚÕý³£ÔËÐУ¬¿Í»§Êý¾ÝҲδÊÜÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/massive-ddos-attack-takes-russia-s-second-largest-bank-vtb-offline/
3¡¢MT BangladeshÐû³ÆÒÑÈëÇÖÓ¡¶ÈCBHE²¢ÇÔÈ¡Ó×ÎÒÐÅÏ¢
ýÌå12ÔÂ5ÈÕй©£¬ÃûΪTeamMysteriousBangladesh£¨MTBangladesh£©µÄÍÅ»ïÐû³ÆÒÑÈëÇÖÓ¡¶ÈÖÐÑë¸ßµµ½ÌÓýίԱ»á(CBHE)µÄϵͳ¡£¸ÃÍŻﰵʾÇÔÈ¡ÁË2004ÄêÖÁ2022ÄêµÄѧÉúÐÅÏ¢£¬²¢°ä²¼ÁËÑù±¾¡£CloudSEKÚ¹ÊÍ˵£¬½Ó¼ûCBHEDelhiƽ̨ÖÎÀíÃæ°åµÄÈκÎÈ˶¼Äܹ»²é¿´2004ÄêÖÁ2022ÄêËùÓÐѧÉúµÄ³É¾Í£¬ÉõÖÁÄܹ»É¾³ý»òÔö³¤¡£Òò¶ø£¬¹¥»÷Õß¿ÉÄÜ»ñµÃÁËÖÎÀíÃæ°åµÄ½Ó¼ûȨÏÞ£¬¶øºó·ÛËéÁËCBHEµÄÊý¾Ý¡£
https://cloudsek.com/threatintelligence/indian-central-board-of-higher-education-compromised-by-team-mysterious-bangladesh/
4¡¢Sysdig·¢ÏÖÀûÓÿªÔ´¹¤¾ßPRoot¹¥»÷LinuxϵͳµÄ»î¶¯
SysdigÔÚ12ÔÂ5ÈÕ³ÆÆä·¢ÏÖºÚ¿ÍÔÚBYOF£¨×Ô´øÎļþϵͳ£©¹¥»÷ÖÐÀÄÓÿªÔ´¹¤¾ßPRoot£¬Ö¼ÔÚ½«¹¥»÷ÁìÓòÀ©´óµ½¶à¸öLinux¿¯Ðа沢¼ò»¯±ØÒªµÄ¹¤×÷¡£PRoot²¢·Ç³öÓÚ¶ñÒ⿪·¢µÄ£¬Ëü¿ÉÔÚLinuxÖÐÉèÖÃÒ»¸ö¶ÀÁ¢µÄ¸ùÎļþϵͳ¡£¸Ã»î¶¯Ê¹ÓÃPRootÔÚÒѱ»ÈëÇÖµÄϵͳÉÏ×°ÖöñÒâÎļþϵͳ£¬ÆäÖÐÔ̺¬masscan¡¢nmap¡¢XMRig cryptominer¼°ÆäÅäÖÃÎļþ¡£ÎļþϵͳÔ̺¬¹¥»÷ËùÐèµÄËùÓУ¬ÕûÆëµØ´ò°üÔÚÒ»¸öGzipѹËõµÄtarÎļþÖС£ÀûÓÃPRoot£¬¹¥»÷ÕßÏÕЩ²»ÓÃ˼¿¼Ö¸±êµÄ¼Ü¹¹»òÉ¢²¼£¬¹¥»÷õè¾¶Ò²µÃµ½Á˼ò»¯£¬ÕâÖÖÐÂÏʵĹ¥»÷¼¼Êõ¼«¶È׳´ó¡£
https://sysdig.com/blog/proot-post-explotation-cryptomining/
5¡¢ResecurityÅû¶ÐµÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳
ýÌå12ÔÂ5Èճƣ¬Resecurity·¢ÏÖÁËеÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳In The Box¡£InTheBoxÓÚ2020Äê1ÔÂ×óÓÒ³õ´Î±»·¢ÏÖ£¬Ëü¿ÉÌṩWebinjects¿ª·¢·þÎñ£¬ÔÚ»ñµÃ×ã¹»µÄŵÑÔºó£¬ÔËÓªÈËÔ±½«ÆäÀ©´óΪһ¸öÆëÈ«²úÆ·»¯µÄ×Ô¶¯»¯Êг¡¡£¸ÃÊг¡ÊÇÉæ¼°Òƶ¯É豸µÄÒøÐÐ͵ÇÔºÍڲƵÄ×î´óºÍ×î³ÁÒªµÄ´ß»¯¼Á£¬ÌṩÁ˳¬¹ý1849¸ö¶ñÒâ¹æ»®¹©£¬ÕâЩ¹æ»®ÊÇרΪÃÀ¹ú¡¢Ó¢¹úºÍ¼ÓÄôóµÈ³¬¹ý45¸ö¹ú¶ÈµÄÖØÒª½ðÈÚ»ú¹¹¡¢µç×ÓÉÌÎñ¡¢Ö§¸¶ÏµÍ³¡¢ÔÚÏßÁãÊÛÉ̺ÍÉ罻ýÌ幫˾Éè¼ÆµÄ¡£ÔÚ2022Äê11ÔÂÆÚ¼ä£¬ÔËÓªÈËÔ±½øÐÐÁ˳Á´ó¸üУ¬²¢¸ÄÉÆÁËÊÓ¾õÉè¼Æ¡£
6¡¢Kaspersky°ä²¼¹ØÓÚ¶ñÒâÈí¼þ·¢Õ¹Ç÷ÏòµÄ·ÖÎö»ã±¨
12ÔÂ5ÈÕ£¬Kaspersky°ä²¼¹ØÓÚ½üÆÚ¶ñÒâÈí¼þ·¢Õ¹Ç÷ÏòµÄ·ÖÎö»ã±¨¡£2022Äêǰ10¸öÔ£¬Ôâµ½Õë¶ÔÐÔÀÕË÷Èí¼þÓ°ÏìµÄÓû§Õ¼ËùÓÐÊܸ÷Àà¶ñÒâÈí¼þÓ°ÏìµÄÓû§µÄ±ÈÀýÏÕЩͬ±È·ÁËÒ»·¬£¬´ïµ½0.26%¡£LockBitÊǵ±Ç°×îÊÜÓ½Ó¡¢×î¾ß´´ÐÂÐԺͷ¢Õ¹×î¿ìµÄÀÕË÷Èí¼þ¼Ò×åÖ®Ò»£¬³ýÁËPsExecÖ®±í£¬Ëü´Ë¿Ì»¹Ö§³Ö×ÔÎÒ´«²¼¡£PlayÊÇ×î½üÓöµ½µÄÒ»ÖÖÐÂÀÕË÷Èí¼þ±äÌ壬һµ©·¢ÏÖSMB×ÊÔ´¾Í»á³ÉÁ¢ÏνӲ¢ÊÔÍ¼×°ÔØËü£¬ÔÚÔ¶³ÌϵͳÖд«²¼ºÍÖ´ÐÐ×ÔÉí¡£´Ë±í£¬Çý¶¯·¨Ê½¿ÉÄÜÔ̺¬¹¥»÷Õß¿ÉÄÜÀûÓõķì϶¡£
https://securelist.com/crimeware-report-ransomware-tactics-vulnerable-drivers/108197/


¾©¹«Íø°²±¸11010802024551ºÅ