EmbyÔ¶³Ì¹Ø¹Ø²¿ÃÅÔâµ½¹¥»÷µÄÓû§Ã½Ìå·þÎñÆ÷Ê·ý
°ä²¼¹¦·ò 2023-05-291¡¢EmbyÔ¶³Ì¹Ø¹Ø²¿ÃÅÔâµ½¹¥»÷µÄÓû§Ã½Ìå·þÎñÆ÷Ê·ý
¾ÝýÌå5ÔÂ26ÈÕ±¨Â·£¬EmbyÔ¶³Ì¹Ø¹ØÁ˲¿ÃÅÔâµ½¹¥»÷µÄÓû§ÍйÜýÌå·þÎñÆ÷Ê·ý¡£¹¥»÷»î¶¯Ê¼ÓÚ5ÔÂÖÐÑ®£¬Æäʱ¹¥»÷ÕßÕë¶Ô¶³öµÄ¸öÈËEmby·þÎñÆ÷£¬²¢ÈëÇÖÄÇЩÅäÖÃΪÔÊÐíÖÎÀíÔ±ÔÚ±¾µØÍøÂçÉÏÎÞÃÜÂëµÇ¼µÄ·þÎñÆ÷¡£ÎªÁË»ñµÃ½Ó¼ûȨÏÞ£¬¹¥»÷Õß»¹ÀûÓÃÁËÒ»¸ö´úÀí±êÍ··ì϶£¬¸Ã·ì϶×î½üÔÚ²âÊÔ°æÆµÂ·Öб»½¨¸´¡£¹¥»÷Õß×°ÖÃÁËÒ»¸ö¶ñÒâ²å¼þÀ´ÀûÓýӼûȨÏÞ£¬ÔÚ±»Ï°È¾µÄEmbyÊ·ý²¿ÊðºóÃÅ£¬¸Ã²å¼þ¿ÉÍøÂçÓû§Í´´¦¡£Embyδй©±»¹¥»÷·þÎñÆÚÊýÁ¿£¬µ«´òË㾡¿ì°ä²¼Emby Server 4.7.12°²È«¸üÐÂÀ´½â¾ö¸ÃÎÊÌâ¡£
https://www.bleepingcomputer.com/news/security/emby-shuts-down-user-media-servers-hacked-in-recent-attack/
2¡¢OneMainÒòÍøÂ簲ȫÎÊÌⱻŦԼDFS·£¿î425ÍòÃÀÔª
¾Ý5ÔÂ26ÈÕ±¨Â·£¬OneMain Financial Group±»Å¦Ô¼½ðÈÚ·þÎñ²¿(DFS)·£¿î425ÍòÃÀÔª¡£DFSÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬OneMainδÄÜÓÐЧµØÖÎÀíµÚÈý·½·þÎñÌṩÉ̵ķçÏÕ¡¢ÖÎÀí½Ó¼ûȨÏÞÒÔ¼°Ê¹ÓÃÕýʽµÄÀûÓð²È«¿ª·¢²½Ö裬Õâ´ó´óÔö³¤Á˸ù«Ë¾Ãæ¶ÔÍøÂ簲ȫÊÂÎñµÄ´àÈõÐÔ¡£ÀýÈ磬OneMainʹÓÃÁËÆäÄÚ²¿¿ª·¢µÄ·ÇÕý¹æÏîÄ¿ÖÎÀí¿ò¼ÜµÈ¡£¸Ã¹«Ë¾°µÊ¾£¬ËüÔç¾Í½â¾öÁ˵÷²éÖз¢ÏÖµÄÎÊÌ⣬Õâ´Îµ÷²éËùÉó²éµÄÊÇÆä2017ÄêÖÁ2020ËêÊ×µÄÕþ²ß¡£
https://therecord.media/one-main-fined-ny-for-cybersecurity-lapses
3¡¢×êÑÐÍŶӳÆMagalenhaÐж¯¹¥»÷30¶à¼ÒÆÏÌÑÑÀ½ðÈÚ»ú¹¹
5ÔÂ25ÈÕ£¬SentinelLabs³ÆÆä¹Û²ìµ½ÃûΪMagalenhaÐж¯µÄ¹¥»÷»î¶¯£¬×Ô2021ÄêÒÔÀ´Ò»Ö¹Øë¶Ô30¶à¼ÒÆÏÌÑÑÀ½ðÈÚ»ú¹¹ÇÔÊØÐÅÏ¢¡£¸Ã»î¶¯¿ÉÄÜÓë°ÍÎ÷µÄ¹¥»÷ÍÅ»ïÓйأ¬Ê¼ÓÚ»ìºÏµÄVB¾ç±¾£¬¿É»ñÈ¡²¢Ö´ÐжñÒâÈí¼þ¼ÓÔØ·¨Ê½£¬²¢ÔÚÎåÃëÖÓµÄÑÓ³¤ºó£¬½«ºóÃÅPeepingTitleµÄÁ½¸ö±äÌå¼ÓÔØµ½Ö¸±êϵͳÖС£PeepingTitleÊÇÒ»¸öDelphi¿ª·¢µÄ¶ñÒâÈí¼þ£¬±àÒëÈÕÆÚΪ4Ô·ݡ£¹¥»÷Õß·Ö·¢Á½¸ö±äÌåµÄÔÒòÊÇ£¬Ò»¸öÓÃÓÚ²¶»ñÆÁÄ»£¬ÁíÒ»¸öÓÃÓڼල´°¿ÚÒÔ¼°Óû§ÓëÕâЩ±äÌåµÄ½»»¥¡£
https://www.sentinelone.com/labs/operation-magalenha-long-running-campaign-pursues-portuguese-credentials-and-pii/
4¡¢BlackByteÐû³Æ¶ÔÃÀ¹ú°Â¹Å˹ËþÊÐÔâµ½µÄ¹¥»÷ÕÆ¹Ü
5ÔÂ26ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïBlackByteÐû³Æ¶ÔÃÀ¹ú×ôÖÎÑÇÖݰ¹Å˹ËþÊÐÔâµ½µÄ¹¥»÷ÕÆ¹Ü¡£¸ÃÊÐÔÚÆäÍøÕ¾ÉÏÚ¹ÊÍ˵£¬Ëü´Ó5ÔÂ21ÈÕÆðÍ·Óöµ½¼¼ÊõÄÑÌ⣬µ¼Ö²¿ÃÅϵͳÖжϡ£»¹³ÎÇåµ½£¬ÕâÆðÊÂÎñÓë֮ǰ²úÉúµÄITϵͳÖжÏÎ޹ء£BlackByteÔÚÆäÍøÕ¾Éϳƣ¬ÒѴӰ¹Å˹ËþµÄÍÆËã»úÉÏÇÔÈ¡ÁË´óÁ¿Êý¾Ý£¬²¢¹«¿ªÁË8.1 GBµÄÑù±¾Êý¾Ý×÷Ϊ֤¾Ý¡£¸ÃÍÅ»ïÀÕË÷40ÍòÃÀÔªÀ´É¾³ýÊý¾Ý£¬²¢Ìá³öÒÔ30ÍòÃÀÔªµÄ¼ÛÖµ½«Êý¾ÝÏúÊÛ¸ø¸ÐÐËÖµĵÚÈý·½¡£
https://securityaffairs.com/146717/hacking/city-of-augusta-cyberattack.html
5¡¢Mandiant·¢ÏÖÀûÓÃICSºÍ̸¹¥»÷µçÍøµÄCOSMICENERGY
MandiantÔÚ5ÔÂ26ÈÕй©£¬Æä·¢ÏÖÁËеĶñÒâÈí¼þCOSMICENERGY£¬ÀûÓÃICSºÍ̸À´·ÛËéµçÍø¡£ËüÊÇÓɶíÂÞ˹µÄ¹¥»÷ÕßÓÚ2021Äê12ÔÂÉÏ´«µ½VirusTotalµÄ£¬Ä¿Ç°Ã»ÓÐÔÚÒ°±í±»ÀûÓá£Mandiant°µÊ¾£¬Õâ¿ÉÄÜÊǶíÂÞ˹µçÐŹ«Ë¾Rostelecom-Solar¿ª·¢µÄÒ»ÖÖºì¶Ó¹¤¾ß£¬ÓÃÓÚ·ÂÕÕ2021Äê10ÔµĵçÁ¦ÖжϺÍÓ¦¼±ÏìÓ¦ÑÝϰ¡£COSMICENERGYµÄÖ°ÄÜÄܹ»ÓëIndustroyerÏàæÇÃÀ£¬ÓÉÓÚËü¿ÉÄÜÀûÓù¤ÒµÍ¨Ñ¶ºÍ̸IEC-104ÏòRTU·¢³öÖ¸Áî¡£ÀûÓÃÕâÖÖ½Ó¼ûȨÏÞ£¬¹¥»÷ÕßÄܹ»·¢ËÍÔ¶³ÌºÅÁîÀ´Ó°ÏìµçÁ¦Ïß¿ª¹ØºÍ¶Ï·Æ÷µÄÆô¶¯£¬´Ó¶øµ¼ÖµçÁ¦Öжϡ£
https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response
6¡¢×êÑÐÈËÔ±·¢ÏÖÀûÓÃWin10д×Ö°åDLL½Ù³Ö·ì϶µÄQBot»î¶¯
ýÌå5ÔÂ27ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÐÂÒ»ÂÖQBot¹¥»÷»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËWindows 10д×Ö°åÖеÄDLL½Ù³Ö·ìÏ¶Ï°È¾ÍÆËã»ú£¬²¢ÀûÓúϷ¨·¨Ê½Èƹý°²È«Èí¼þµÄ¼ì²â¡£Ö¸±êµã»÷´¹µöÓʼþÖеÄÁ´½Óʱ£¬»áÏÂÔØÒ»¸öËæ»ú¶¨ÃûµÄZIP´æµµ£¬ÆäÖÐÔ̺¬Win10д×Ö°å¿ÉÖ´ÐÐÎļþdocument.exeºÍDLLÎļþedputil.dll¡£¼ÓÔØ¶ñÒâ°æ±¾µÄedputil.dllºó£¬»á´ÓÔ¶³ÌÖ÷»úÏÂÔØ¼Ù×°³ÉPNGµÄDLL£¬¶øºóʹÓÃrundll32.exeÖ´ÐдËPNG¡£Õâʱ£¬QBot½«ÔÚºó¶Ü°²¾²µØÔËÐС£
https://www.bleepingcomputer.com/news/security/qbot-malware-abuses-windows-wordpad-exe-to-infect-devices/


¾©¹«Íø°²±¸11010802024551ºÅ