SAP°ä²¼°²È«¸üн¨¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸ö·ì϶
°ä²¼¹¦·ò 2023-03-161¡¢SAP°ä²¼°²È«¸üУ¬½¨¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸ö·ì϶
3ÔÂ14ÈÕ£¬Èí¼þ¹©¸øÉÌSAPÒÑÕë¶Ô19¸ö·ì϶°ä²¼Á˰²È«¸üС£Õâ´Î½¨¸´µÄ·ì϶ӰÏìÁ˺ܶà²úÆ·£¬µ«ÑϳÁµÄ·ì϶»áÓ°ÏìSAP Business ObjectsóÒ×ÖÇÄÜÆ½Ì¨(CMC)ºÍSAP NetWeaver¡£Õâ´Î½¨¸´µÄ5¸ö½ÏΪÑϳÁµÄ·ì϶±ðÀëΪ´úÂë×¢Èë·ì϶£¨CVE-2023-25616£©¡¢Ä¿Â¼±éÀú·ì϶£¨CVE-2023-27269ºÍCVE-2023-27500£©¡¢¶ÌȱÉí·ÝÑéÖ¤²é³·ì϶£¨CVE-2023-23857£©ÒÔ¼°ºÅÁîÖ´Ðзì϶£¨CVE-2023-25617£©¡£×êÑÐÈËÔ±½¨ÒéÂíÉÏ×°Öò¹¶¡¡£
https://www.bleepingcomputer.com/news/security/sap-releases-security-updates-fixing-five-critical-vulnerabilities/
2¡¢LockBit³Æ´ÓMaximum Industries»ñÈ¡µ½SpaceXµÄÊý¾Ý
¾ÝýÌå3ÔÂ14Èճƣ¬ÀÕË÷ÍÅ»ïLockBitÐû³ÆÈëÇÖÁ˳ö²ú¹«Ë¾Maximum IndustriesµÄϵͳ²¢»ñÈ¡µ½SpaceXµÄ»úÃÜÊý¾Ý¡£Maximum IndustriesרÃÅ´ÓÊÂË®µ¶ºÍ¼¤¹âÇиîÒÔ¼°CNC¼Ó¹¤·þÎñ£¬ÊÇSpaceXµÄµÚÈý·½³Ð°üÉÌÖ®Ò»¡£¹¥»÷Õß°µÊ¾ÇÔÈ¡ÁËԼĪ3000ÕÅÓÉspace-x¹¤³ÌʦÈÏÖ¤µÄͼֽ£¬²¢´òËãÔÚÒ»ÖÜÄÚÌáÒéÅÄÂô£¬½«ÕâЩͼֽÂô¸øÆäËûÔì×÷ÉÌ¡£Ä¿Ç°£¬×êÑÐÈËÔ±ÒѾÁªÏµÁËSpaceXºÍMaximum Industries£¬µ«ËûÃǶ¼Ã»ÓлØÓ¦¡£
https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html
3¡¢Ò½ÁƱ£½¡ÌṩÉÌILSй©³¬¹ý420Íò»¼ÕßµÄÐÅϢй¶
ýÌå3ÔÂ15Èճƣ¬Ò½ÁƱ£½¡ÌṩÉÌIndependent Living Systems(ILS)°ä²¼Í¨ÖªÐ¹Â©Êý¾Ýй¶ÊÂÎñÓ°ÏìÁË4226508¸ö»¼Õß¡£¸Ã¹«Ë¾·¢ÏÔìäϵͳÓÚ2022Äê7ÔÂ5ÈÕÔâµ½¹¥»÷£¬Ëæºóµ÷²éÏÔʾ¹¥»÷ÕßÔÚ2022Äê6ÔÂ30ÈÕÖÁ7ÔÂ5ÈÕ»ñµÃÁ˲¿ÃÅILSϵͳµÄ½Ó¼ûȨÏÞ¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢ÄÉ˰È˼ø±ðºÅºÍÒ½ÁÆÐÅÏ¢µÈ¡£ILSÔÚ·¢ÏÖÎ¥¹æÐÐΪºóµÄÁù¸öÔºó£¬Ò²¾ÍÊÇ2023Äê1ÔÂ17ÈÕʵÏÖÁËÈ·¶¨ÊÜÓ°ÏìÓ×ÎÒ»òʵÌåµÄÄÚ²¿Éó²é¡£×îºó£¬ILS°µÊ¾½«ÎªÊÜÓ°Ï컼ÕßÌṩΪÆÚÒ»ÄêµÄExperianÉí·Ý±£»¤·þÎñ¡£
https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/
4¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¶Èµ±¾ÖºÍÄÜÔ´×éÖ¯µÄ¹¥»÷
CiscoÔÚ3ÔÂ14ÈÕÅû¶ÁËÒ»¸öÐµĹ¥»÷ÍÅ»ïYoroTrooper£¬ÖØÒªÕë¶Ô¶ÀÁ¢¹ú¶È½áºÏÌå(CIS)¹ú¶ÈÈ·µ±¾ÖºÍÄÜÔ´×éÖ¯¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê6ÔÂÆðÍ·»îÔ¾£¬ÒѾÈëÇÖÁËÒ»¸ö´ÓÊÂÒ½ÁƱ£½¡µÄ³ÁҪŷÃË»ú¹¹¡¢ÊÀ½ç֪ʶ²úȨ×éÖ¯(WIPO)ºÍ¶à¸öÅ·ÖÞ´óʹ¹Ý¡£YoroTrooperµÄ¹¤¾ßÔ̺¬ÉÌÆ·ºÍ×Ô½ç˵ÐÅÏ¢ÇÔÈ¡·¨Ê½¡¢Ô¶³Ì½Ó¼ûľÂíºÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þ£¬Ï°È¾Á´ÓɶñÒâ¿ì½Ý·½Ê½Îļþ(LNK)ºÍ¿ÉÑ¡µÄµö¶üÎļþ×é³É¡£
https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/
5¡¢ESET·¢ÏÖTickÕë¶Ô¶«ÑÇijDLPÈí¼þ¿ª·¢É̵Ĺ¥»÷»î¶¯
3ÔÂ14ÈÕ£¬ESET³ÆÆä·¢ÏÖÁËAPT×éÖ¯TickÕë¶Ô¶«ÑÇÒ»¼Ò¿ª·¢Êý¾ÝÃÔʧ·À»¤(DLP)Èí¼þµÄ¹«Ë¾µÄ»î¶¯¡£¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄÄÚ²¿¸üзþÎñÆ÷£¬ÔÚÈí¼þ¿ª·¢É̵ÄϵͳÄÚ´«²¼¶ñÒâÈí¼þ£¬²¢Ä¾Âí»¯¸Ã¹«Ë¾Ê¹ÓõĺϷ¨¹¤¾ßµÄ×°Ö÷¨Ê½£¬×îÖÕµ¼ÖÂÔÚ¹«Ë¾¿Í»§µÄÍÆËã»úÉÏÖ´ÐжñÒâÈí¼þ¡£ÔÚÈëÇÖ¹ý³ÌÖУ¬¹¥»÷Õß×°ÖÃÁËÒ»¸öеÄÏÂÔØ·¨Ê½ShadowPy£¬»¹ÀûÓÃÁ˺óÃÅNetboy£¨±ðÃûInvader£©ºÍÏÂÔØ·¨Ê½Ghostdown¡£
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
6¡¢Check Point°ä²¼¹ØÓÚAndroidľÂíFakeCallsµÄ·ÖÎö»ã±¨
Check PointÔÚ3ÔÂ14ÈÕ°ä²¼Á˹ØÓÚAndroidľÂíFakeCallsµÄ·ÖÎö»ã±¨¡£ÕâÖÖ¶ñÒâÈí¼þÄܹ»¼Ù×°³É20¶àÖÖ½ðÈÚÀûÓ㬲¢·ÂÕÕÓëÒøÐлò½ðÈÚ·þÎñÔ±¹¤µÄµç»°½»Ì¸½øÐÐÓïÒô´¹µö¹¥»÷¡£FakeCallsÖØÒªÕë¶Ôº«¹ú£¬ÓµÓÐÈðÊ¿¾üµ¶µÄÖ°ÄÜ£¬²»½ö¿ÉÄÜÖ´ÐÐÆäÖØÒª¹¤×÷£¬²¢ÇÒ¿ÉÄÜ´ÓÖ¸±êÉ豸ÖÐÇÔÈ¡Ó×ÎÒÊý¾Ý¡£×êÑÐÈËÔ±³ÆÆä·¢ÏÖÁË2500¶à¸öFakeCallsÑù±¾£¬ËüÃÇʹÓÃÁ˸÷Àà·ÂÕÕ½ðÈÚ×éÖ¯µÄ×é¹é²¢Ö´ÐÐÁË ·´·ÖÎö¼¼Êõ¡£
https://research.checkpoint.com/2023/south-korean-android-banking-menace-fakecalls/


¾©¹«Íø°²±¸11010802024551ºÅ