°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚ3TBÊý¾Ýй¶
°ä²¼¹¦·ò 2023-03-091¡¢°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚÔ¼3TBÊý¾Ýй¶
¾ÝýÌå3ÔÂ7ÈÕ±¨Â·£¬°ÍÎ÷µÄ¿ç¹ú¹«Ë¾Andrade GutierrezÔ¼3TBµÄÊý¾Ýй¶¡£ÕâÊÇÀ¶¡ÃÀÖÞ×î´óµÄ¹¤³Ì¹«Ë¾Ö®Ò»£¬ÕƹܸõØÓò»ù´¡ÉèÊ©¡¢ÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»ÆøÒÔ¼°ÔËÊäÁìÓòµÄ³Á´óÏîÄ¿¡£ºÚ¿ÍDark AngelsÐû³ÆÇÔÈ¡ÁË3TBµÄÓʼþºÍ¹«Ë¾Êý¾Ý£¬Éæ¼°Ô±¹¤ÐÕÃû¡¢»¤ÕÕÐÅÏ¢¡¢¸¶¿îÐÅÏ¢ºÍ˰ºÅµÈÓ×ÎÒÐÅÏ¢£¬ÒÔ¼°¼¸¸ö³ÛÃû¹¹ÖþÏîÖ÷ÕÅÀ¶Í¼¡£¾ÝϤ£¬Ð¹Â¶ÊÂÎñ²úÉúÔÚÈ¥Äê9ÔÂÖÁ10Ô¡£
https://www.infosecurity-magazine.com/news/brazilian-conglomerate-3tb-data/
2¡¢Fortinet½¨¸´Ó°ÏìFortiOSºÍFortiProxyµÄ·ì϶
3ÔÂ7ÈÕ£¬Fortinet°ä²¼¸üУ¬½¨¸´ÁËÒ»¸öÓ°ÏìFortiOSºÍFortiProxyµÄ»º³åÇøÒç¶Âí½Å¡£¸Ã·ì϶£¨CVE-2023-25610£©µÄCVSSÆÀ·ÖΪ9.3£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÃÌØÔìÒªÇó£¬À´ÔÚGUIÉÏÖ´ÐÐËÁÒâ´úÂë»ò»Ø¾ø·þÎñ(DoS)¡£Fortinet²¼¸æ³Æ£¬Ä¿Ç°ÉÐδ·¢ÏÖÈκÎÔÚÒ°±íÀûÓõÄÇé¿ö¡£¶ÔÓÚÎÞ·¨ÀûÓøüеÄÓû§£¬Fortinet½¨Òé½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏÞ¶È¿ÉÔ¶³Ì½Ó¼ûµÄIPµØÖ·¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability/
3¡¢Check Point·¢ÏÖSharp Panda¹¥»÷¶«ÄÏÑǵ±¾Ö»ú¹¹µÄ»î¶¯
3ÔÂ7ÈÕ£¬Check Point³ÆÆä·¢ÏÖÁËSharp PandaÕë¶Ô¶«ÄÏÑǵ±¾Ö»ú¹¹µÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯´Ó2022Äêµ×ÆðÍ·²¢³ÖÐøµ½2023Ä꣬ʹÓÃÓã²æÊ½´¹µö¹¥»÷½øÐгõʼÈëÇÖ¡£´¹µöÓʼþµÄ¶ñÒ⸽¼þ×°ÖÃRoyalRoad RTF¹¤¾ß°ü£¬±ýÊÔIJÀûÓ÷ì϶ÔÚÖ÷»úÉÏ·Ö·¢¶ñÒâÈí¼þ¡£¶øºó×°Öò¢Ö´ÐÐÒ»¸öDLL¶ñÒâÈí¼þÏÂÔØ·¨Ê½£¬ËüÓÖ»á´ÓC2·þÎñÆ÷»ñÈ¡²¢Ö´Ðеڶþ¸öDLL£¬¼´SoulSearcher loader£¬×îÖÕ»á¼ÓÔØSoulÄ£¿é»¯¿ò¼Ü¡£
https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/
4¡¢×êÑÐÈËÔ±Åû¶DJIÎÞÈË»úÖÐ16¸ö°²È«·ì϶µÄ¾ßÌåÐÅÏ¢
ýÌå3ÔÂ7Èճƣ¬×êÑÐÈËÔ±·¢ÏÖÁËDJIÎÞÈË»úÖеÄ16¸ö°²È«·ì϶¡£ÕâЩ·ì϶µÄÓ°ÏìÁìÓòºÜ¹ã£¬´Ó»Ø¾ø·þÎñµ½ËÁÒâ´úÂëÖ´ÐС£ÖµÍ×ÌùÐĵÄÊÇ£¬ÆäÖÐÓÐ14¸ö·ì϶Äܹ»Í¨¹ýÖÇÄÜÊÖ»úÔ¶³Ì´¥·¢£¬¿ÉÄܵ¼ÖÂÎÞÈË»úÔÚ·ÉÐÐ;ÖÐ×¹»Ù¡£¹¥»÷Õß»¹Äܹ»¸ü¸ÄÈÕÖ¾Êý¾Ý»òÐòÁкÅÀ´¼Ù×°Éí·Ý£¬»òÕßÈÆ¹ý¶Ô¿ìÂʺ͸߶ȷ½ÃæµÄÏÞ¶È£¬ÒÔ¼°Í¨¹ýµØÀíΧÀ¸ºÍÐé¹¹Ììǵ¶Ô½û·ÉÇøÓòµÄÏÞ¶È¡£Ä¿Ç°£¬DJIÒѽ¨¸´ÕâЩ·ì϶¡£
https://www.hackread.com/dji-drones-flaw-crash-drones-mid-flight/
5¡¢TrendMicro°ä²¼2022Äê¶ÈÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨
3ÔÂ7ÈÕ£¬Trend Micro°ä²¼ÁË2022Äê¶ÈÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£2022Ä꣬Trend Micro¼ì²âµ½ÁË1464ÒÚ´ÎÍþв£¬±ÈÉÏÒ»ÄêÔö³¤ÁË55.3%¡£¹¥»÷Õß×î³£ÓõÄATT&CK¼¼ÊõΪԶ³Ì·þÎñ¡¢ÓÐЧÕÊ»§ºÍ²Ù×÷ϵͳʹ´¦×ª´¢¡£2022Ä꣬Microsoft×èÖ¹ÁËOfficeÎĵµÖк귨ʽµÄÖ´ÐУ¬´Ë¾Ùµ¼ÖÂOfficeºêµÄʹÓýµÂ䣬µ«¹¥»÷Õ߯ðͷѰÕÒ´úÌæ¹æ»®£¬ÀýÈçHTML×ß˽µÈÕ½Êõ¡£¹¥»÷ÕßÕë¶ÔÔÆ·þÎñ£¬Ô̺¬ÎÞ·þÎñÆ÷ƽ̨ÉϵĹ©¸øÁ´¹¥»÷£¬ÒÔ¼°ÔÚLinuxϵͳÉÏÌáÒé¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¡£
https://www.trendmicro.com/en_us/research/23/c/expanding-attack-blueprints-2022-annual-cybersecurity-report-.html
6¡¢Morphisec°ä²¼¶ñÒâÈí¼þSYS01ÇÔÊØÐÅÏ¢µÄ·ÖÎö»ã±¨
3ÔÂ7ÈÕ£¬Morphisec°ä²¼Á˹ØÓÚ¶ñÒâÈí¼þSYS01µÄ·ÖÎö»ã±¨¡£×Ô2022Äê11ÔÂÒÔÀ´£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚÕë¶Ô¹Ø¼üµ±¾Ö»ù´¡ÉèÊ©¡¢Ôì×÷¹«Ë¾ºÍÆäËüÐÐÒµµÄ¹¥»÷¡£¹¥»÷Õßͨ¹ýʹÓÃ¹È¸è¸æ°×ºÍÐéαµÄFacebookÓ×ÎÒ×ÊÁÏÀ´Õë¶ÔFacebookóÒ×ÕË»§£¬ÓÕʹָ±êÏÂÔØ¶ñÒâÎļþ¡£¸Ã¹¥»÷Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬Ô̺¬µÇ¼Êý¾Ý¡¢cookieÒÔ¼° Facebook¸æ°×ºÍÆóÒµÕÊ»§ÐÅÏ¢¡£
https://blog.morphisec.com/sys01stealer-facebook-info-stealer


¾©¹«Íø°²±¸11010802024551ºÅ