BitSight³Æ½©Ê¬ÍøÂçMyloBotÿÌìϰȾ³¬¹ý50000̨É豸
°ä²¼¹¦·ò 2023-02-231¡¢BitSight³Æ½©Ê¬ÍøÂçMyloBotÿÌìϰȾ³¬¹ý50000̨É豸
¾ÝýÌå2ÔÂ21ÈÕ±¨Â·£¬½©Ê¬ÍøÂçMyloBotÿÌìϰȾ³¬¹ý50000̨É豸£¬ÆäÖдó²¿ÃÅλÓÚÓ¡¶È¡¢ÃÀ¹ú¡¢Ó¡¶ÈÄáÎ÷ÑǺÍÒÁÀÊ¡£ËüÓÚ2017Äê³õ´Î³öÏÖ£¬ÔÚ2020ËêÊ×ÖðÈÕ×î¶àϰȾ250000̨É豸¡£µ±MylobotÊÕµ½À´×ÔC2µÄÖ¸Áîʱ£¬Ëü»á½«±»Ï°È¾µÄÍÆËã»úת»»Îª´úÀí£¬ÕâЩÉ豸½«´¦ÖúܶàÏνӣ¬²¢×ª·¢Í¨¹ýºÅÁîºÍ½ÚÔì·þÎñÆ÷·¢Ë͵ÄÁ÷Á¿¡£´Ë±í£¬¶ÔMyloBot»ù´¡ÉèÊ©µÄ·ÖÎö·¢ÏÖÁËËüÓëÃûΪBHProxiesµÄסլ´úÀí·þÎñµÄÏνӣ¬Åú×¢ºóÕßÔÚʹÓñ»Ï°È¾µÄÉ豸¡£
https://thehackernews.com/2023/02/mylobot-botnet-spreading-rapidly.html
2¡¢×êÑÐÈËÔ±Åû¶macOSºÍiOSÖÐеÄȨÏÞÌáÉý·ì϶µÄϸ½Ú
2ÔÂ21ÈÕ£¬Trellix×êÑÐÈËÔ±Åû¶ÁËmacOSºÍiOSÖз¢ÏÖµÄÒ»¸öеÄȨÏÞÌáÉý·ì϶Àà±ð¡£¸Ã×êÑлùÓڹȸèºÍCitizen LabÔÚ2021ÄêµÄ·¢ÏÖ£¬ÆäʱÅû¶ÁËÒ»¸öÃûΪForcedEntryµÄÁãµã»÷iOSÔ¶³Ì´úÂëÖ´Ðзì϶¡£Õâ´Î·¢ÏÖµÄзì϶¿ÉÈÆ¹ý´úÂëÊðÃûÔÚ¶à¸öƽ̨ÀûÓ÷¨Ê½ÖÐÖ´ÐÐËÁÒâ´úÂ룬µ¼ÖÂmacOSºÍiOSÉϵÄȨÏÞÌáÉýºÍɳÏäÌÓÒÝ£¬CVSSÆÀ·ÖÔÚ5.1µ½7.1Ö®¼ä¡£×êÑÐÈËÔ±³Æ£¬ÕâЩ·ì϶¿É±»ÓÃÀ´»ñÈ¡Óû§ÐÂÎÅ¡¢µØÎ»Êý¾Ý¡¢Í¨»°¼Í¼ºÍÕÕÆ¬µÈÃô¸ÐÐÅÏ¢µÄ½Ó¼ûȨÏÞ¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/trellix-advanced-research-center-discovers-a-new-privilege-escalation-bug-class-on-macos-and-ios.html
3¡¢HydrochasmaÍÅ»ïÖØÒªÕë¶ÔÑÇÖÞµÄÒ½Áƺͺ½ÔËÓйØ×éÖ¯
¾ÝSymantec 2ÔÂ22ÈÕ±¨Â·£¬ÐºڿÍÍÅ»ïHydrochasmaÖØÒªÕë¶ÔÑÇÖÞµÄҽѧ×êÑг¢ÊÔÊҺͺ½Ô˹«Ë¾¡£¸Ã»î¶¯ÖÁÉÙ´Ó2022Äê10ÔÂÆðÍ·¾ÍÒ»ÏòÔÚ½øÐУ¬¹¥»÷Ö¸±êÒÔ¼°Ê¹ÓõÄһЩ¹¤¾ßÅú×¢£¬ºÚ¿ÍµÄÖ¸±êËÆºõÊÇÇÔÈ¡µý±¨¡£¹¥»÷ʼÓÚ´¹µöÓʼþ£¬ÔÚ»ñµÃһ̨É豸µÄ³õʼ½Ó¼ûȨÏ޺󣬹¥»÷Õß×°ÖÃÁ˼±¾ç·´Ïò´úÀí£¨FRP£©£¬¶øºó×°ÖÃMeterpreterºÍGogoµÈ¶à¸ö¹¤¾ß¡£Hydrochasma¹¥»÷µÄÒ»¸öÌØµãÊÇËüÃǽöÒÀÀµ¿ªÔ´¹¤¾ßºÍLotLÕ½Êõ£¬²»»áÁôÏÂÈκκۼ£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/hydrochasma-asia-medical-shipping-intelligence-gathering
4¡¢VMware¸üн¨¸´Carbon Black App ControÖеķì϶
VMwareÔÚ2ÔÂ21ÈÕ°ä²¼°²È«¸üУ¬½¨¸´ÁËCarbon Black App ControlÖеķì϶¡£ÕâÊÇÒ»¸ö×¢Èë·ì϶£¨CVE-2023-20858£©£¬CVSSÆÀ·ÖΪ9.1£¬Õ¼ÓÐApp ControlÖÎÀí½ÚÔį̀½Ó¼ûȨÏ޵Ĺ¥»÷Õß¿Éͨ¹ýÌØÔìµÄÊäÈëÀ´½Ó¼ûµ×²ã·þÎñÆ÷²Ù×÷ϵͳ¡£´Ë±í£¬Õâ´Î¸üл¹½¨¸´ÁËVMware vRealize OrchestratorµÄXML±í²¿ÊµÌå·ì϶£¨CVE-2023-20855£©£¬¹¥»÷Õß¿Éͨ¹ýÌØÔìÊäÈëÀ´ÈƹýXML½âÎöÏÞ¶È£¬´Ó¶øµ¼ÖÂÐÅϢй¶»òȨÏÞÌáÉý¡£
https://thehackernews.com/2023/02/vmware-patches-critical-vulnerability.html
5¡¢ESET°ä²¼2022ÄêÖÐÓ×ÐÍÆóÒµÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨
2ÔÂ21ÈÕ£¬ESET°ä²¼Á˹ØÓÚ2022ÄêÖÐÓ×ÐÍÆóÒµÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£×êÑÐÈËԱȥÄê¶Ô1200¶àÖÐÓ×ÐÍÆóÒµ(SMB)ÍøÂ簲ȫ¾ö²ßÕß½øÐÐÁ˵÷²é£¬ÆäÖÐ69%µÄÈ˰µÊ¾ÔÚ´ÓǰһÄêÄÚÔâµ½¹ý¹¥»÷£¬Èý·ÖÖ®Ò»µÄÈËÉõÖÁ°µÊ¾±»¹¥»÷Á˲»Ö¹Ò»´Î¡£70%µÄÆóÒµ³ÆÔÚIT°²È«·½ÃæµÄͶ×ʸú²»ÉÏÔËӪģʽŤתµÄ´ëÊ©£¬77%µÄSMB°µÊ¾½«³ÖÐøÊ¹ÓÃRDPµÈ¼¼Êõ£¬Ö»¹ÜÆä´æÔÚ°²È«·çÏÕ¡£Ôâµ½¹¥»÷µÄSMBÖУ¬32%°µÊ¾±ØÒª7µ½12ÖÜÀ´µ÷²éºÍ³ÁÐÂÅäÖÃITϵͳ£¬21%°µÊ¾±ØÒª²»µ½Á½ÖÜ¡£
https://www.welivesecurity.com/2023/02/21/eset-smb-digital-security-sentiment-report-damaging-effects-breach/
6¡¢Microsoft°ä²¼2022ÄêDDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨
MicrosoftÓÚ2ÔÂ21ÈÕ°ä²¼ÁË2022ÄêDDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£2022Ä꣬Microsoft¾ùÔÈÿÌì»á×èÖ¹1435´Î¹¥»÷¡£ÔÚ9ÔÂ22Èյĵ¥ÈÕ¹¥»÷´ÎÊý×î¶à£¬Îª2215´Î¡£ÖÁÉÙµÄÊÇ8ÔÂ22ÈÕ£¬Îª680´Î¡£TCP¹¥»÷ÊÇ2022Äê×î³£¼ûµÄDDoS¹¥»÷´ó¾Ö£¬Õ¼ËùÓй¥»÷Á÷Á¿µÄ63%£¬UDPÕ¼22%£¬¶øÊý¾Ý°üÒì³£¹¥»÷Õ¼15%¡£ÔÚ´ÓǰµÄÒ»ÄêÖУ¬³ÖÐø¹¦·ò½Ï¶ÌµÄ¹¥»÷¸üΪ³£¼û£¬89%µÄ¹¥»÷³ÖÐø²»µ½Ò»Ó×ʱ£¬³ÖÐøÒ»µ½Á½·ÖÖӵĹ¥»÷Õ¼26%¡£´óÎÞÊý¹¥»÷Õë¶ÔµÄÊÇÃÀ¹ú£¬Æä´ÎÊÇÓ¡¶È¡¢¶«ÑǺÍÅ·ÖÞ¡£
https://www.microsoft.com/en-us/security/blog/2023/02/21/2022-in-review-ddos-attack-trends-and-insights/


¾©¹«Íø°²±¸11010802024551ºÅ