NBAй©ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿ÃÅÇòÃÔÐÅϢй¶
°ä²¼¹¦·ò 2023-03-201¡¢NBAй©ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿ÃÅÇòÃÔÐÅϢй¶
¾ÝýÌå3ÔÂ17ÈÕ±¨Â·£¬NBA£¨ÃÀ¹ú¹ú¶ÈÀºÇòлᣩй©ÆäµÚÈý·½Ê±ÊÂͨÅå·þÎñ³ÖÓеIJ¿ÃÅÇòÃÔÓ×ÎÒÐÅϢй¶¡£NBA°µÊ¾Æäϵͳ²¢Î´Ôâµ½¹¥»÷£¬¸ÃÊÂÎñÓ°ÏìÁËÊýÁ¿²»ÏêµÄÓ×ÎÒ¡£¾Ý¸ÃÐ»á³Æ£¬Î´¾ÊÚȨµÄµÚÈý·½½Ó¼û²¢´´½¨Á˲¿ÃÅÇòÃÔµÄÐÕÃûºÍÓʼþµØÖ·µÄ¸±±¾£¬Óû§Ãû¡¢ÃÜÂëºÍÆäËüÐÅÏ¢²¢Î´Ð¹Â¶¡£NBA»¹ÌáÐÑ·£¬ÓÉÓÚËùÉæ¼°Êý¾ÝµÄÃô¸ÐÐÔ£¬ÊÜÓ°ÏìµÄÓ×ÎÒ¿ÉÄÜÔâµ½´¹µö¹¥»÷ºÍ¸÷Ààڿƻ£¬½¨ÒéÔÚ´ò¿ª¿ÉÒÉÓʼþ»òͨѶʱά³Ö¾¯Ìè¡£
https://www.bleepingcomputer.com/news/security/nba-alerts-fans-of-a-data-breach-exposing-personal-information/
2¡¢Emotet»Ø¹é²¢ÀûÓÃMicrosoft OneNoteÎļþÈÆ¹ý¼ì²â
¾Ý3ÔÂ18ÈÕ±¨Â·£¬Emotet´Ë¿Ìͨ¹ýMicrosoft OneNoteÓʼþ¸½¼þ½øÐзַ¢£¬Ö¼ÔÚÈÆ¹ýMicrosoft°²È«Ï޶Ȳ¢Ï°È¾¸ü¶àÖ¸±ê¡£EmotetÔÚ´ÓǰµÄÒ»ÄêÀïʱ¶ÏÊ±Ðø£¬×îÖÕÔÚ2022Äêµ×ǰÖÕ³¡»î¶¯¡£ÔÚÐÝÕûÈý¸öÔºó£¬Emotet¾íÍÁ³ÁÀ´£¬ÓÚ±¾ÔÂÔçЩʱ³½·¢ËͶñÒâÓʼþ¡£Õâ¸ö»î¶¯×î³õ´æÔÚȱµã£¬ËüÒÀȻʹÓôøÓкêµÄWordºÍExcelÎĵµ£¬ÓÉÓÚMicrosoftµÄ°²È«ÏÞ¶ÈËüÖ»ÄÜϰȾÉÙÊýÈË¡£¹¥»÷Õß´Ë¿ÌʹÓöñÒâOneNote¸½¼þ·Ö·¢Emotet£¬ÕâЩ¸½¼þÔÚ¼ÙÒâÖ¸ÄÏ¡¢²Ù×÷Ö¸ÄÏ¡¢·¢Æ±¡¢¹¤×÷²Î¿¼µÈ»Ø¸´Á´µç×ÓÓʼþÖС£
https://www.bleepingcomputer.com/news/security/emotet-malware-now-distributed-in-microsoft-onenote-files-to-evade-defenses/
3¡¢ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÈËÔ±ÔÚÃÀ¹úŦԼ±»²¶
ýÌå3ÔÂ18Èճƣ¬ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÈËÔ±PompompurinÓÚÉÏÖÜÈýÔÚŦԼ±»²¶¡£2022ÄêRaidForums±»²é·âºó£¬Pompourin´´½¨ÁËÒ»¸öÃûΪBreachForumsµÄÐÂÂÛ̳À´Ìí²¹¿Õȱ¡£ËüÒѳÉΪͬÀàÖÐ×î´óµÄÊý¾Ýй¶ÂÛ̳£¬³£±»ºÚ¿ÍºÍÀÕË÷ÍÅ»ïÓÃÀ´Ð¹Â¶Êý¾Ý¡£Æ¾¾Ý·¨Í¥Îļþ£¬ÏÓÒÉÈ˱»Ö¸¿Ø·¸Ò»ÏɱִÐнӼûÉ豸ڲƵÄ×ïÃû¡£PompourinÒÔ300000ÃÀÔªµÄ±£Êͽð»ñÊÍ£¬²¢½«ÓÚ3ÔÂ24ÈÕÔÚ¸¥¼ªÄáÑǶ«Çø´¦Ëù·¨Ôº³öÍ¥¡£¾ÝϤ£¬½ØÖÁĿǰÂÛ̳ÒÀÈ»Äܹ»½Ó¼û¡£
https://www.hackread.com/breach-forums-owner-pompompurin-arrested-new-york/
4¡¢Unit 42·¢ÏÖÐÂÀÕË÷Èí¼þTrigonaÕë¶ÔÅ·ÃÀµÈµØµÄ»î¶¯
Unit 42ÓÚ3ÔÂ16ÈÕÅû¶ÁËÀÕË÷Èí¼þTrigonaÕë¶ÔÅ·ÃÀµÈµØµÄ»î¶¯¡£TrigonaÓÚ2022Äê10ÔÂÏÂÑ®³õ´Î±»·¢ÏÖ£¬ÔÚ12Ô·dz£»îÔ¾£¬Ó°ÏìÁËÖÁÉÙ15¸ö×éÖ¯£¬Éæ¼°Ôì×÷¡¢½ðÈÚ¡¢¹¹Öþ¡¢Å©Òµ¡¢ÓªÏúºÍ¸ß¿Æ¼¼ÐÐÒµ¡£¸ÃÀÕË÷Èí¼þ»áʹÓÃÔ̺¬JavaScript´úÂëµÄ.htaÊê½ð¼Í¼ÏòÖ¸±êÏÔʾ¸¶¿î×¢Ã÷¡£×êÑÐÈËÔ±ÔÚTrigona¹¥»÷Öй۲쵽µÄһЩ¹¤¾ßºÍ¼¼ÊõÔ̺¬£¬NetScan¡¢Start.batÅú´¦Öþ籾¡¢Turnoff.bat¡¢Newuser.bat¡¢Mimikatz¡¢DC4.exeºÍAdvanced Port Scanner¡£
https://unit42.paloaltonetworks.com/trigona-ransomware-update/
5¡¢Î¢Èí¸ÅÊöKillNet½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷
΢ÈíÔÚ3ÔÂ17ÈÕ°ä²¼»ã±¨£¬¸ÅÊöÁË´ÓǰÈý¸öÔÂKillNet¼°Æä´ÓÊô×éÖ¯½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷¡£×êÑÐÈËÔ±ÕÉÁ¿ÁË2022Äê11ÔÂ18ÈÕÖÁ2023Äê2ÔÂ17ÈÕÿÌìÕë¶ÔAzureÖÐÒ½ÁÆ»ú¹¹µÄ¹¥»÷´ÎÊý£¬·¢ÏÖÁË´ÓÿÌì10-20´Î¹¥»÷µ½40-60´Î¹¥»÷µÄÇ÷Ïò¡£Óм¸´Î¹¥»÷´ïµ½Ã¿Ãë5MÊý¾Ý°ü(pps)£¬µ«´óÎÞÊý¹¥»÷¶¼µÍÓÚ2M pps¡£»ã±¨»¹ÏêÊöÁËKillNetµÄ¼¸´Î¹¥»÷»î¶¯£¬ÀýÈçÕë¶ÔijҽÁƱ£½¡ÌṩÉ̵ÄDDoS¹¥»÷£¬·åֵΪ1.3M pps£¬¹¥»÷ÔØÌåΪTCP SYN¡¢TCP ACKºÍÊý¾Ý°üÒì³££¬³ÖÐøÁ˲»µ½12Ó×ʱ¡£
https://www.microsoft.com/en-us/security/blog/2023/03/17/killnet-and-affiliate-hacktivist-groups-targeting-healthcare-with-ddos-attacks/
6¡¢SentinelLabs°ä²¼Winter Vivern¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
3ÔÂ16ÈÕ£¬SentinelLabs°ä²¼Á˹ØÓÚAPTÍÅ»ïWinter Vivern¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£½üÆÚ»î¶¯ÖУ¬¸ÃÍÅ»ïÖØÒªÕë¶Ô²¨À¼µ±¾Ö»ú¹¹¡¢ÎÚ¿ËÀ¼±í½»²¿¡¢Òâ´óÀû±í½»²¿ºÍÓ¡¶Èµ±¾ÖÄÚ²¿µÄÓ×ÎÒ£¬ÒÔ¼°µçÐŹ«Ë¾¡£¸ÃÍÅ»ïʹÓÃÁËÒ»ÖÖеĵö¶ü¼¼Êõ£¬Éæ¼°·ÂÕÕµ±¾ÖÓòÀ´·Ö·¢¶ñÒâÈí¼þ¡£ÔÚÒ»¸ö°¸ÀýÖУ¬¹¥»÷ÕßʹÓÃWindowsÅú´¦ÖÃÎļþÀ´¼ÙÒâɱ¶¾É¨Ã跨ʽ£¬¶øÏÖʵÉÏÊDZÉÈËÔØ¶ñÒâpayload¡£´Ë±í£¬Winter VivernʹÓõÄÒ»ÖÖÐÂpayloadÔÚÖ°ÄÜÉÏËÆºõÓëAperefitÀàËÆ£¬µ«Éè¼Æ²¢²»ÆëÈ«£¬Åú×¢ËüÈÔÔÚ½øÐÐÖС£
https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/


¾©¹«Íø°²±¸11010802024551ºÅ