Microsoft 365ÔٴβúÉú·þÎñÖжÏÖØÒªÓ°ÏìÅ·ÃÀµØÓò

°ä²¼¹¦·ò 2023-05-24

1¡¢Microsoft 365ÔٴβúÉú·þÎñÖжÏÖØÒªÓ°ÏìÅ·ÃÀµØÓò


¾ÝýÌå5ÔÂ22ÈÕ±¨Â·£¬MicrosoftÔÚµ÷²éÓû§ÎÞ·¨½Ó¼ûÆäMicrosoft 365ÕÊ»§ºÍÒÑ×°ÖÃÀûÓ÷¨Ê½µÄÎÊÌâ¡£ÊÜÓ°ÏìµÄ¿Í»§³ÆÔÚ½Ó¼ûOutlookÓÊÏäʱÓöµ½ÎÊÌ⣬²¢ÇÒÎÞ·¨Ïνӵ½Microsoft 365·þÎñÆ÷¡£¸Ã¹«Ë¾ÔÚ¹«¸æÖаµÊ¾£¬Ö÷Ó°ÏìÁ˱±ÃÀ¡¢²¨À¼ºÍÓ¢¹úµÄÓû§£¬µ«ÆäËüµØÓòµÄÓû§Ò²¿ÉÄÜÊܵ½Ó°Ï졣Ŀǰ£¬ÎÊÌâÒѾ­µÃµ½Ïàʶ¾ö¡£ÉϸöÔ£¬Áíһ·Microsoft 365·þÎñÖжÏÊÂÎñµ¼Ö±±ÃÀÓû§ÎÞ·¨½Ó¼ûExchange Online¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-hit-by-new-outage-causing-connectivity-issues/


2¡¢µÂ¹ú¾üе¹«Ë¾RheinmetallÔâµ½Black BastaµÄ¹¥»÷


¾Ý5ÔÂ23ÈÕ±¨Â·£¬µÂ¹úÆû³µºÍ±øÆ÷Ôì×÷ÉÌRheinmetall AG³Æ£¬ËüÔâµ½ÁËBlackBastaµÄÀÕË÷¹¥»÷£¬ÃñÓÃÒµÎñÊܵ½Ó°Ïì¡£5ÔÂ20ÈÕ£¬BlackBastaÔÚÆäÍøÕ¾°ä²¼ÁË´ÓRheinmetallÇÔÈ¡µÄÊý¾ÝÑù±¾£¬ÆäÖÐÔ̺¬±£ÃܺÍ̸¡¢¼¼ÊõʾÒâͼ¡¢»¤ÕÕɨÃè¼þºÍ²É¹º¶©µ¥µÈ¡£¸Ã¹«Ë¾Ð¹Â©£¬ËûÃÇÔÚ4ÔÂ14ÈÕ·¢ÏÖ¹¥»÷»î¶¯£¬ÓÉÓÚ¼¯ÍÅÄÚ²¿µÄIT»ù´¡ÉèÊ©ÊÇÑϸñ·ÖÀëµÄ£¬Òò¶øÆä¾üÊÂÒµÎñδÊܵ½Õâ´Î¹¥»÷µÄÓ°Ïì¡£


https://therecord.media/rheinmetall-confirms-black-basta-ransomware-group-behind-cyberattack


3¡¢½¡È«±£ÏÕ¹«Ë¾Point32HealthÔâµ½ÀÕË÷¹¥»÷»¼ÕßÐÅϢй¶


ýÌå5ÔÂ23Èճƣ¬½¡È«±£ÏÕ¹«Ë¾Point32HealthÔÚ֪ͨ»¼ÕßËûÃǵÄÐÅÏ¢¿ÉÄÜÒÑй¶¡£Point32HealthÊÇTufts Health PlanºÍHarvard Pilgrim Health Careĸ¹«Ë¾£¬¹¥»÷ÕßÔÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕÆÚ¼ä£¬´ÓHarvard PilgrimµÄϵͳÖи´Ôì²¢ÇÔÈ¡ÁËÊý¾Ý¡£Ä¿Ç°µ÷²éÈÔÔÚ½øÐÐÖУ¬Éв»È·¶¨Óм¸¶àÈËÊܵ½Ó°Ï죬µ«¿ÉÄÜ»áÓ°Ïì´Ó2012Äê3ÔÂ28ÈÕÖÁ½ñ×¢²áµÄÓû§¡£±£ÏÕ¹«Ë¾µÄ½²»°ÈËûÓÐй©ÊÇ·ñ½»ÁËÊê½ð¡£


https://www.databreaches.net/after-ransomware-attack-states-second-largest-health-insurer-says-patient-data-were-stolen/


4¡¢Trend MicroÅû¶BlackCat½üÆÚ¹¥»÷ÖÐÈÆ¹ý¼ì²âµÄ²½Öè


5ÔÂ22ÈÕ£¬Trend MicroÅû¶ÁËBlackCatÔÚ½üÆÚµÄ¹¥»÷ÖÐʹÓÃÊðÃûµÄWindowsÄÚºËÇý¶¯·¨Ê½À´Èƹý¼ì²âµÄ²½Öè¡£¸ÃÇý¶¯·¨Ê½ÊÇÈ¥ÄêÄêµ×Åû¶µÄ¶ñÒâÈí¼þPOORTRYµÄ¸Ä½ø°æ±¾¡£¹¥»÷ÕßÊ×ÏÈÊÔͼʹÓÃMicrosoft ÊðÃûµÄPOORTRYÇý¶¯·¨Ê½£¬µ«ÆäÊðÃû±»³·Ïúºó¼ì²âÂʺܸß¡£Òò¶ø£¬¹¥»÷ÕßʹÓÃÁËÒ»¸öPOORTRYÄÚºËÇý¶¯µÄ¸Ä½ø°æ±¾£¬²¢Ê¹Óñ»µÁ»òй¶µÄ½»²æÊðÃûÖ¤Êé½øÐÐÊðÃû¡£´Ë±í£¬¸ÃÇý¶¯·¨Ê½Ê¹ÓÃSafengine Protector v2.4.0.0¹¤¾ß½øÐлìºÏÒÔÈÆ¹ý¾²Ì¬·ÖÎö¡£


https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html


5¡¢Fortinet·¢ÏÖÕë¶ÔÖж«µÄÐÂÄÚºËÇý¶¯·¨Ê½WINTAPIX


FortinetÔÚ5ÔÂ22ÈÕ³ÆÆä·¢ÏÖÁËÕë¶ÔÖж«¹ú¶ÈµÄÐÂÄÚºËÇý¶¯·¨Ê½WINTAPIX(WinTapix.sys)¡£Ò£²âÊý¾ÝÅú×¢£¬¸Ã»î¶¯ÖØÒªÕë¶ÔÉ³ÌØ°¢À­²®¡¢Ô¼µ©¡¢¿¨Ëþ¶ûºÍ°¢À­²®½áºÏÇõ³¤¹ú¡£WinTapix.sysÐÔÖÊÉÏÊÇÒ»¸ö¼ÓÔØ·¨Ê½£¬ÖØÒªÖ÷ÕÅÊÇÌìÉúºÍÖ´ÐÐÏÂÒ»½×¶ÎµÄ¹¥»÷¡£Ò»µ©±»¼ÓÔØµ½ÄÚºËÖУ¬WinTapix.sys¾Í»á½«Ç¶Èëʽshellcode×¢Èëµ½Êʵ±µÄÓû§Ä£Ê½¹ý³ÌÖУ¬¶ø¸Ã¹ý³ÌÓÖ»áÖ´ÐмÓÃܵÄ.NET payload¡£.NET¶ñÒâÈí¼þÓµÓкóÃźʹúÀíÖ°ÄÜ£¬Äܹ»Ö´ÐкÅÁϺÍÉÏ´«Îļþ£¬ÒÔ¼°³äÈδúÀíÔÚÁ½¸öͨѶ¶ËµãÖ®¼ä´«µÝÊý¾Ý¡£


https://www.fortinet.com/blog/threat-research/wintapix-kernal-driver-middle-east-countries


6¡¢×êÑÐÍŶӳÆGUI-vilÍÅ»ïÀûÓÃAWS EC2Ê·ýÀ´ÍÚ¿ó


5ÔÂ22ÈÕ£¬Permiso P0 Labs³ÆÓ¡¶ÈÄáÎ÷ÑǺڿÍÍÅ»ïGUI-vilÀûÓÃAWS EC2Ê·ýÀ´Íڿ󡣸Ã×éÖ¯ÓÚ2021Äê11Ô³õ´Î±»¼ì²âµ½£¬×î½üÒ»´ÎµÄ»î¶¯²úÉúÔÚ½ñÄê4Ô·Ý¡£¸ÃÍÅ»ïÆ«ºÃʹÓÃͼÐÎÓû§½çÃæ(GUI) ¹¤¾ß£¬³ö¸ñÊǽϾɰ汾µÄS3ä¯ÀÀÆ÷¡£GUI-vilÊ×ÏÈËÑË÷¶³öµÄAWSÃÜÔ¿ºÍɨÃè´æÔÚ·ì϶£¨ÈçCVE-2021-22205£©µÄGitLabÊ·ý£¬À´»ñµÃ³õʼ½Ó¼ûȨÏÞ¡£³É¹¦ÈëÇÖºóÊÇȨÏÞÌáÉýºÍÄÚ²¿¿úËÅ£¬ÆäÖØÒª¹¤×÷ÊÇ´´½¨EC2Ê·ý£¬ÒÔ½øÐмÓÃÜÇ®±ÒÍÚ¿ó»î¶¯¡£


https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/