×êÑÐÈËÔ±³ÆÔÚ°µÍø·¢ÏÖÊýÊ®Íò¸öOpenAIƾ֤±»ÏúÊÛ
°ä²¼¹¦·ò 2023-07-211¡¢×êÑÐÈËÔ±³ÆÔÚ°µÍø·¢ÏÖÊýÊ®Íò¸öOpenAIƾ֤±»ÏúÊÛ
¾ÝýÌå7ÔÂ19ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁ˳¬¹ý200000¸öOpenAIƾ֤ÒÔÇÔÈ¡·¨Ê½ÈÕÖ¾µÄ´ó¾ÖÔÚ°µÍøÉÏÏúÊÛ¡£Óë1Ô·ݹÀ¼ÆµÄ1ÒÚ»îÔ¾Óû§µÄÊýÁ¿Ïà±È£¬Õâ¸öÊý×ÖËÆºõ΢²»¼°Â·£¬µ«ËüµÄÈ·Åú×¢¹¥»÷ÕßÔÚÌìÉúʽÈËΪÖÇÄܹ¤¾ßÖп´µ½Á˶ñÒâ¹¥»÷µÄDZÁ¦¡£ºÚ¿Í¶Ô´ËÀ෨ʽµÄÐËÖÂÒѱ»¼¤·¢£¬ÆäÖÐÒ»ÈË¿ª·¢ÁËÃûΪWormGPTµÄChatGPT¿Ë¡°æ£¬²¢¶ÔÆä½øÐÐÁËÒÔ¶ñÒâÈí¼þΪ³ÁµãµÄÊý¾ÝѵÁ·£¬ÓÃÓÚBEC¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/openai-credentials-stolen-by-the-thousands-for-sale-on-the-dark-web/
2¡¢TurlaÀûÓÃCapiBar¹¥»÷ÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¶ÈµÄ¹ú·À×éÖ¯
¾Ý7ÔÂ19ÈÕ±¨Â·£¬Î¢ÈíºÍÎÚ¿ËÀ¼CERTÅû¶ÁËTurlaÕë¶ÔÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¶ÈµÄ¹ú·À×éÖ¯µÄ¹¥»÷»î¶¯¡£¹¥»÷ʼÓÚÔ̺¬¶ñÒâºêµÄExcel XLSM¸½¼þ£¬¼¤»îºó¶ñÒâºê»áÖ´ÐÐPowerShellºÅÁ´´½¨Ò»¸ö¼ÙÒâFirefoxä¯ÀÀÆ÷¸üз¨Ê½µÄ´òË㹤×÷¡£´Ë¹¤×÷»áÏÂÔØCapiBarºóÃÅ£¨Ò²³ÆÎªDeliveryCheck£©£¬¶øºóʹÓÃRclone¹¤¾ßÇÔÈ¡Êý¾Ý¡£CapiBarµÄ·ÖÆçÖ®´¦ÊÇÒ»¸öExchange·þÎñÆ÷¶Ë×é¼þ£¬Ëü¿É½«·þÎñÆ÷Ôì³É¹¥»÷ÕßµÄC2·þÎñÆ÷¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬Turla»¹·Ö·¢ÁËÐÅÏ¢ÇÔÈ¡ºóÃÅKAZUAR¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-turn-exchange-servers-into-malware-control-centers/
3¡¢Tampa GeneralÒ½ÔºÔâµ½¹¥»÷Ó°Ïì120Íò»¼ÕßµÄÐÅÏ¢
ýÌå7ÔÂ19Èճƣ¬ÃÀ¹ú·ðÂÞÀï´ïÖݵÄTampa GeneralÒ½ÔºÔ¼120Íò»¼ÕßµÄÐÅϢй¶¡£¸ÃÒ½Ôº³ÆÆäÔÚ5ÔÂ31ÈÕ·¢ÏÔìäÔâµ½Á˹¥»÷£¬µ«Ã»ÓÐй©¹¥»÷ÕßµÄÃû×Ö¡£ÆäÉêÃ÷ûÓÐÌá¼°ÈκθÉÓÚÊê½ðÒªÇóµÄÎÊÌ⣬²¢Ö¸³öËûÃǵݲȫÊýÃÅ¿ÉÄÜÔ¤·ÀÎļþ±»¼ÓÃÜ¡£Ð¹Â¶Êý¾Ý¿ÉÄÜÔ̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢½¡È«±£ÏÕÐÅÏ¢¡¢Éç»á°²È«ºÅÂëºÍÒ½ÖÎÐÅÏ¢µÈ¡£Snatch TeamÒѽ«¸ÃÒ½ÔºÔö³¤µ½ÆäÍøÕ¾ÖУ¬Ã»ÓÐÌṩÈκÎÀÕË÷Ö¤¾Ý£¬µ«ÊÇÐû³ÆÒÑ´ÓÒ½Ôº»ñÈ¡ÁË4 TBµÄÎļþ¡£
https://www.databreaches.net/tampa-general-hospital-confirms-cybersecurity-incident-1-2-million-patients-being-notified/
4¡¢Fortinet¼ì²âµ½¶à¸öÀûÓÃZyxel·ì϶µÄ½©Ê¬ÍøÂç·Ö·¢»î¶¯
FortinetÔÚ7ÔÂ19ÈÕй©£¬Æä¼ì²âµ½¶à¸öÀûÓÃZyxel·ì϶£¨CVE-2023-28771£©µÄDDoS½©Ê¬ÍøÂç·Ö·¢»î¶¯¡£ÕâÊÇÒ»¸öºÅÁî×¢Èë·ì϶£¬¿É±»¹¥»÷ÕßÓÃÓÚÏòÖ¸±ê·¢ËÍÌØÔìÊý¾Ý°üÀ´Ö´ÐÐËÁÒâ´úÂë¡£×êÑÐÈËÔ±³Æ£¬´Ó5ÔÂ·ÝÆðÍ·£¬¹¥»÷ÊýÁ¿ÏÔ×ÅÔö³¤¡£Éæ¼°¶à¸ö½©Ê¬ÍøÂ磬ÆäÖÐÔ̺¬»ùÓÚMiraiµÄ±äÌåDark.IoT£¬ÒÔ¼°ÁíÒ»¸öѡȡ¶¨ÔìDDoS¹¥»÷²½ÖèµÄ½©Ê¬ÍøÂç¡£×êÑÐÈËԱͨ¹ý¼ø±ð¹¥»÷ÕßIPµØÖ·£¬È·¶¨¹¥»÷²úÉúÔÚ¶à¸öµØÓò£¬Ô̺¬ÖÐÃÀÖÞ¡¢±±ÃÀ¡¢¶«ÑǺÍÄÏÑǵȡ£
https://www.fortinet.com/blog/threat-research/ddos-botnets-target-zyxel-vulnerability-cve-2023-28771
5¡¢Lookout³ÆWyrmSpyºÍDragonEggÓëAPT41ÓйØ
LookoutÔÚ7ÔÂ19ÈÕÅû¶ÁËAPT41ÀûÓÃAndroid¼äµýÈí¼þWyrmSpyºÍDragonEggµÄ¹¥»÷»î¶¯¡£×êÑÐÈËÔ±ÓÚ2017Äê³õ´Î¼ø±ð³öWyrmSpy£¬ÓÖÓÚ2021ËêÊ×·¢ÏÖÁËDragonEgg£¬×î½üµÄÑù±¾¿É×·Òäµ½2023Äê4Ô¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼¾ßº±¼û¾ÝÍøÂçºÍÉøÈëÖ°ÄÜ£¬WyrmSpy¼Ù×°³ÉĬÈϲÙ×÷ϵͳÀûÓ÷¨Ê½£¬¶øDragonEggÔò¼Ù×°³ÉµÚÈý·½¼üÅÌ»òÐÂÎÅÀûÓ÷¨Ê½¡£ËüÃǵÄAndroidÊðÃûÖ¤ÊéÓгÁµþ£¬Õâ¼ÓÇ¿ÁËËüÃÇÓëͳһ¹¥»÷ÕßµÄÁªÏµ¡£GoogleÈ·ÈÏ£¬Ä¿Ç°ÉÐδÔÚGoogle PlayÉϼì²âµ½Ô̺¬´Ë¶ñÒâÈí¼þµÄÀûÓá£
https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41
6¡¢Unit 42°ä²¼¹ØÓÚÐÂP2PÈ䳿P2PInfectµÄ·ÖÎö»ã±¨
7ÔÂ19ÈÕ£¬Unit 42°ä²¼Á˹ØÓÚÐÂP2PÈ䳿P2PInfectµÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±ÔÚ7ÔÂ11ÈÕ·¢ÏÖÁËP2PInfect£¬ËüÓÉRust¿ª·¢£¬¿ÉÄÜ¿çÆ½Ì¨Ï°È¾£¬Õë¶ÔRedisÊ·ý¡£¸ÃÈ䳿ÀûÓÃLuaɳÏäÌÓÒÝ·ì϶£¨CVE-2022-0543£©À´Ï°È¾Ö¸±ê¡£×êÑÐÈËÔ±³Æ£¬¹ÌÈ»ÔÚ´ÓǰÁ½ÖÜÄÚ·¢ÏÖÁ˳¬¹ý307000¸ö¶³öµÄRedis·þÎñÆ÷£¬µ«Ö»ÓÐ934¸ö¿ÉÄÜÈÝÒ×Ôâµ½´ËÀ๥»÷¡£Unit 42ÒÔΪ£¬Õâ´ÎP2PInfect»î¶¯ÊÇÀûÓÃP2PºÅÁîºÍ½ÚÔì(C2)ÍøÂç½øÐиüÇ¿¹¥»÷µÄµÚÒ»½×¶Î¡£
https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/


¾©¹«Íø°²±¸11010802024551ºÅ