Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑϰȾ³¬¹ý1Íò¸öϵͳ

°ä²¼¹¦·ò 2023-03-14

1¡¢Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑϰȾ³¬¹ý1Íò¸öϵͳ


CiscoÔÚ3ÔÂ9ÈÕ³ÆÆä¼ì²âµ½Ð°汾µÄ½©Ê¬ÍøÂçPrometeiµÄ¹¥»÷»î¶¯¡£PrometeiÓÚ2016Äê³õ´Î³öÏÖ£¬×Ô2022Äê11ÔÂÒÔÀ´£¬¸Ãа汾ÒÑϰȾȫÇòÁìÓòÄÚµÄ10000¶à¸öϵͳ£¬Éæ¼°155¸ö¹ú¶È/µØÓò¡£¸Ã½©Ê¬ÍøÂçµÄÔËÓªÈËÔ±¸üÐÂÁËÖ´ÐÐÁ´µÄijЩ×ÓÄ£¿é£¬ÒÔ×Ô¶¯»¯Á÷³Ì²¢ÌôÈÆ¹ýÖ¤·ÖÎö²½Öè¡£´Ë±í£¬Ëü»¹ÓкܶàеÄÖ°ÄÜ£¬Ô̺¬´úÌæµÄC2ÓòÌìÉúËã·¨(DGA)£¬×ÔÎÒ¸üлúÔ죬ÒÔ¼°Apache WebserverµÄ°ó¸¿°æ±¾ºÍ×°Öõ½Ö¸±êÖ÷»úÉϵÄWeb shell¡£


https://blog.talosintelligence.com/prometei-botnet-improves/


2¡¢ÓÎÏ·¿ª·¢ÉÌGSC Game WorldµÄϵͳ±»ºÚ²¿ÃÅÊý¾Ýй¶


¾Ý3ÔÂ13ÈÕ±¨Â·£¬Ç±ÐÐÕß2£ºÇжûŵ±´ÀûÖ®ÐÄ£¨Stalker 2£©ÓÎÏ·µÄ¿ª·¢ÉÌGSC Game Worldй©ÆäϵͳÒѱ»ÈëÇÖ£¬ºÚ¿ÍÄܹ»ÔÚ¹¥»÷ÆÚ¼äÇÔÈ¡ÓÎÏ·×ʲú¡£¸Ã¹«Ë¾°µÊ¾£¬ÆäÔ±¹¤µÄ¼¯ÌåͼÏñ´¦Öõ±Ó÷¨Ê½ÕÊ»§Ôâµ½¹¥»÷£¬ÕâÖ»ÊÇËüÔÚ´ÓǰһÄêÖÐÔâµ½µÄ¶à¶à¹¥»÷Ö®Ò»¡£ºÚ¿ÍÔÚ¶íÂÞ˹É罻ýÌåÆ½Ì¨VK³ÆÒÑÇÔÈ¡ÁË´óÁ¿STALKER 2ËØ²Ä£¬Ô̺¬Õû¸ö¹Êʼþ½Ú¡¢¹ý³¡¶¯»­ÃèÊö¡¢¸ÅÏëÒÕÊõºÍµØÍ¼µÈ¡£²¢ÍþвÈôÊÇÓÎÏ·¿ª·¢ÉÌÔÚ3ÔÂ15ÈÕ֮ǰ²»Å¤×ªÆä¶Ô¶íÂÞ˹ºÍ°×¶íÂÞË¹Íæ¼ÒµÄ̬¶È£¬ËûÃǽ«Ð¹Â¶ÇÔÈ¡µÄÊýÊ®GBÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/stalker-2-game-developer-hacked-by-russian-hacktivists-data-stolen/


3¡¢BlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷±»·£¿î300ÍòÃÀÔª


ýÌå3ÔÂ10ÈÕ±¨Â·³Æ£¬ÔÆÍÆË㹩¸øÉÌBlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷ÊÂÎñ£¬±»ÃÀ¹ú֤ȯÂòÂôίԱ»á(SEC)·£¿î300ÍòÃÀÔª¡£¸Ã¹«Ë¾ÔÚ2020Äê7Ô°µÊ¾£¬Îôʱ5ÔµÄÀÕË÷¹¥»÷ÎÞ·¨½Ó¼û¾èÔùÕßÒøÐÐÕË»§¾ßÌåÐÅÏ¢»òÉç»á°²È«ºÅÂ롣Ȼ¶øBlackbaud¼¼ÊõÈËÔ±ºÜ¿ìÏàʶµ½¹¥»÷ÕßÒѾ­½Ó¼û²¢ÇÔÈ¡ÁËÕâЩÃô¸ÐÐÅÏ¢¡£ÓÉÓÚ¹«Ë¾²»×ãÊʵ±µÄÅû¶½ÚÔìºÍ·¨Ê½£¬ËûÃÇδÄÜÏòÖÎÀí²ã»ã±¨¡£Õâµ¼ÖÂBlackbaudÌá½»µÄSEC»ã±¨ÖÐûÓÐÔ̺¬ÓйØÎ¥¹æË®Æ½µÄ³ÁÒªÐÅÏ¢¡£ 


https://www.securityweek.com/blackbaud-fined-3m-for-misleading-disclosures-about-2020-ransomware-attack/


4¡¢·¨Âɲ¿ÃŲé·âNetwire RATµÄ»ù´¡ÉèÊ©²¢¿ÛÁôÆäÔËÓªÈËÔ±


¾ÝýÌå3ÔÂ9ÈÕ±¨Â·£¬Ò»Ïî¹ú¼Ê·¨ÂÉÐж¯²é·âÁËNetwire RATµÄ»ù´¡ÉèÊ©£¬²¢¿ÛÁôÆäÔËÓªÈËÔ±¡£NetWireÊÇÒ»ÖÖÔ¶³Ì½Ó¼ûľÂí£¬×Ô2014ÄêÒÔÀ´Ò»ÏòÊǸ÷Àà¶ñÒâ¹¥»÷»î¶¯µÄÊ×Ñ¡¹¤¾ß¡£×÷ΪÕâ´ÎÐж¯µÄÒ»²¿ÃÅ£¬FBI²é·âÁËÓÃÓÚÍÆ¹ã¸Ã·þÎñµÄworldwiredlabs.comÓò£¬ÈðÊ¿¾¯·½²é·âÁËÍйܸÃÍøÕ¾µÄ·þÎñÆ÷¡£Ò»ÃûÒÉËÆÊÇNetWireÍøÕ¾ÖÎÀíÔ±µÄ¿ËÂÞµØÑǹúÃñÔÚ¿ËÂÞµØÑDZ»²¶£¬²¢½«±»´¦Ëùµ±¾Ö¸®¸æ×´¡£


https://www.bleepingcomputer.com/news/security/police-seize-netwire-rat-malware-infrastructure-arrest-admin/


5¡¢ZOLL MedicalÔâµ½¹¥»÷³¬¹ý100Íò»¼ÕßµÄPHIÐÅϢй¶


ýÌå3ÔÂ11Èճƣ¬ZOLL MedicalÔÚ֪ͨ1004443¸ö»¼Õߣ¬ËûÃǵÄPHIÐÅÏ¢¿ÉÄÜÔÚ×î½üµÄÒ»´Î°²È«ÊÂÎñÖÐй¶¡£Æ¾¾ÝZOLLµÄ֪ͨ£¬¸Ã¹«Ë¾µÄ°²È«ÍŶÓÔÚ1ÔÂ28ÈÕ³õ´ÎÔÚÆäÄÚÍøÉϼì²âµ½Òì³£»î¶¯¡£ËûÃÇѸ¿ì×ö³ö·´Ó³£¬»º½â²¢µ÷²éÁËÕâÒ»ÊÂÎñ¡£µ÷²éÅú×¢£¬PHI¿ÉÄÜÔÚ2023Äê2ÔÂ2ÈÕǰºóÊܵ½Ó°Ï졣й¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢µØÖ·ºÍÉç»á°²È«ºÅÂëµÈ¡£ZOLL½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩ24¸öÔµÄExperian IdentityWorksSMʹÓÃȨÏÞ¡£


https://www.databreaches.net/zoll-medical-notifying-1004443-patients-of-data-breach-hipaa/


6¡¢SentinelLabs°ä²¼ÀÕË÷Èí¼þIceFireµÄLinux°æ±¾µÄ»ã±¨


3ÔÂ9ÈÕ£¬SentinelLabs°ä²¼Á˹ØÓÚÀÕË÷Èí¼þIceFireµÄ·ÖÎö»ã±¨¡£×î½ü¼¸ÖÜ£¬SentinelLabs·¢ÏÖеÄLinux°æ±¾IceFire±»ÓÃÓÚÕë¶Ô¶à¸öýÌåºÍÓéÀÖÐÐÒµµÄ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¹¥»÷ÕßÀûÓÃÁËIBM Aspera FaspexÎļþ¹²ÏíÈí¼þÖеķ´ÐòÁл¯·ì϶£¨CVE-2022-47986£©À´×°ÖÃÀÕË÷Èí¼þ¡£Ö´ÐÐʱ£¬IceFire»á¼ÓÃÜÎļþ£¬½«À©´óÃû.ifire¸½¼Óµ½ÎļþÃû£¬¶øºóͨ¹ýɾ³ý×ÔÉíºÍ¶þ½øÔìÎļþÀ´¸²¸ÇÆä×ÙÓ°¡£


https://www.sentinelone.com/labs/icefire-ransomware-returns-now-targeting-linux-enterprise-networks/