CofenseÅûÂ¶ÖØÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹µö»î¶¯
°ä²¼¹¦·ò 2023-08-181¡¢CofenseÅûÂ¶ÖØÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹µö»î¶¯
CofenseÔÚ8ÔÂ16ÈÕÅû¶ÁËÒ»³¡ÀûÓöþάÂëµÄ´óÐÍ´¹µö»î¶¯£¬ÖØÒªÕë¶ÔÃÀ¹úµÄÒ»¼Ò´óÐÍÄÜÔ´¹«Ë¾¡£¸Ã»î¶¯µÄ¾ùÔÈÔÂÔö³¤Âʳ¬¹ý270%£¬×Ô5ÔÂÒÔÀ´ÕûÌå»î¶¯Ôö³¤ÁË2400%ÒÔÉÏ¡£¹¥»÷ÕßÊ×ÏÈ·¢ËͼÙÒâMicrosoft°²È«Í¨ÖªµÄÓʼþ£¬ÆäÖÐÔ̺¬PNG»òPDF¸½¼þ£¬ÒªÇóÓû§É¨Ãè¶þάÂ룬¶øºó½«Ö¸±ê³Á¶¨Ïòµ½´¹µöÍøÕ¾¡£¾Ýͳ¼Æ£¬¸Ã»î¶¯29%µÄÁ÷Á¿Õë¶ÔµÄÊÇÄÜÔ´¹«Ë¾£¬ÆäËüÖ¸±êÐÐÒµÔ̺¬Ôì×÷Òµ(15%)¡¢±£ÏÕÒµ(9%)¡¢¼¼Êõ(7%)ºÍ½ðÈÚ·þÎñ£¨6%£©ÐÐÒµ¡£
https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/
2¡¢AT&T·¢ÏÖ¹¹½¨Ô̺¬40Íò¸ö½ÚµãµÄ½©Ê¬ÍøÂçµÄ¹¥»÷»î¶¯
8ÔÂ16ÈÕ£¬AT&T Alien Labs³ÆÆä·¢ÏÖÁËһ·´ó¹æÄ£¹¥»÷»î¶¯ÖÁÉÙÏò400000¸öWindowsÍÆËã»ú·Ö·¢ÁË´úÀí·þÎñÆ÷ÀûÓ÷¨Ê½¡£×êÑÐÈËÔ±³Æ£¬ÔÚÒ»ÖÜÄھͷ¢ÏÖÁËһǧ¶à¸öÔÚÒ°±í·Ö·¢´úÀíµ±Ó÷¨Ê½µÄжñÒâÈí¼þÑù±¾¡£¾Ý´úÀíÍøÕ¾³Æ£¬´úÀí³ö¿Ú½Úµã³¬¹ý40Íò¸ö£¬Éв»Ã÷ÏÔÆäÖÐÓм¸¶àÊDZ»¶ñÒâ´úÂë×°Öõġ£Ò»µ©×°Öõ½±»ÈëÇÖµÄϵͳÉÏ£¬¶ñÒâÈí¼þ¾Í»áÏÂÔØ²¢×°ÖôúÀíµ±Ó᣼ÓÔØ·¨Ê½°µ²ØÔÚÆÆ½âÈí¼þºÍÓÎÏ·ÖУ¬ÇÒ×°Öò»±ØÒªÓëÓû§½øÐн»»¥¡£¸Ã´úÀíÊÇÓÃGo¿ª·¢£¬ÓÉÓÚËüÒÑÊðÃûËùÒÔ¼ì²âΪÁã¡£
https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware
3¡¢Citrix ShareFile·ì϶CVE-2023-24489Òѱ»ÀûÓÃ
¾ÝýÌå8ÔÂ16ÈÕ±¨Â·£¬CISAÌáÐÑCitrix ShareFile·ì϶CVE-2023-24489Òѱ»ÔÚÒ°ÀûÓá£ÀûÓø÷ì϶£¬¹¥»÷ÕßÄܹ»½«Web shellÉÏ´«µ½Ö¸±êÉ豸£¬À´»ñµÃ¶Ô´æ´¢¼°ÆäËùÓÐÎļþµÄÆëÈ«½Ó¼ûȨÏÞ£¬ÒÑÓÚ6ÔÂ13ÈÕ±»½¨¸´¡£Ä¿Ç°£¬GreyNoiseÒÑ·¢ÏÖ72¸öIPµØÖ·ÊÔIJÀûÓûò²é³ShareFile·þÎñÆ÷ÊÇ·ñÈÝÒ×Ôâµ½¹¥»÷£¬ÆäÖдóÎÞÊýÀ´×Ôº«¹úÒÔ¼°·ÒÀ¼¡¢Ó¢¹úºÍÃÀ¹úµÈ¹ú¶È¡£CISAÒªÇóµ±¾Ö»ú¹¹ÔÚ9ÔÂ6ÈÕ֮ǰÀûÓò¹¶¡¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/
4¡¢×êÑÐÈËÔ±ÔÚPowerShell GalleryÖмì²âµ½¶à¸ö·ì϶
AquaÔÚ8ÔÂ16ÈÕй©ÔÚPowerShell GalleryÖз¢ÏÖÁ˶à¸ö¿ÉÄܵ¼Ö¹©¸øÁ´¹¥»÷µÄ·ì϶¡£PowerShell GalleryÓÉMicrosoftÊØ»¤£¬ÊÇÒ»¸öÓÃÓÚ¹²ÏíºÍ»ñÈ¡PowerShell´úÂëµÄÖÐÑë´æ´¢¿â¡£µÚÒ»¸ö·ìÏ¶Éæ¼°¿íËɵİüÃûÕþ²ß£¬¹¥»÷Õß¿ÉÉÏ´«ÓëÏÖÓд洢¿âÃû³ÆÀàËÆµÄ¶ñÒâPowerShellÄ£¿é¡£µÚ¶þ¸ö·ìÏ¶Éæ¼°Î±ÔìÄ£¿éÔªÊý¾Ý£¬µ±½Ó¼ûPowerShellÄ£¿éµÇÂ½Ò³ÃæÊ±£¬ÏÕЩËùÓÐϸ½Ú¶¼¿ÉÄܱ»Î±Ô죬Ô̺¬¿ª·¢Õß¡¢°æÈ¨ºÍÃèÊö¡£µÚÈý¸ö·ì϶¿ÉÓÃÓÚö¾ÙËùÓаüÃû³ÆºÍ°æ±¾£¬Ô̺¬Î´ÁгöÇÒ°µ²ØÔÚ¹«¼ÒÊÓÒ°Ö®±íµÄÈí¼þ°ü¡£AquaÓÚ2022Äê9Ô»㱨ÁËÕâЩ·ì϶£¬Î¢Èí³ÆÒѽâ¾öÕâЩÎÊÌ⣬µ«´Ë¿Ì·ì϶ÒÀÈ»Äܹ»³ÁÏÖ¡£
https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks
5¡¢CubaÀûÓÃй¤¾ß¹¥»÷ÃÀ¹ú»ù´¡ÉèÊ©ºÍÀ¶¡ÃÀÖÞIT¼¯³ÉÉÌ
8ÔÂ17ÈÕ£¬Blackberry³ÆÀÕË÷ÍÅ»ïCubaÀûÓÃй¤¾ß¹¥»÷ÁËÃÀ¹úµÄÒ»¸ö»ù´¡ÉèÊ©»ú¹¹ºÍÀ¶¡ÃÀÖÞµÄÒ»¼ÒIT¼¯³ÉÉÌ¡£¹¥»÷²úÉúÓÚ6Ô£¬Æä¹¤¾ß¼¯Ô̺¬×Ô½ç˵ÏÂÔØ·¨Ê½BUGHATCH¡¢BURNTCIGAR¡¢MetasploitºÍCobalt Strike¿ò¼Ü£¬ÒÔ¼°´óÁ¿LOLBINS¡£¹¥»÷»î¶¯»¹ÀûÓÃÁËNetLogon·ì϶£¨CVE-2020-1472£©ºÍVeeam·ì϶£¨CVE-2023-27532£©¡£ÖµÍ×ÌùÐĵÄÊÇ£¬CubaµÄÍøÕ¾ÔÚ´Óǰ¼¸¸öÔÂÀïʱ¶ÏÊ±Ðø£¬¾Ý¹Û²ì£¬ÔÚÁгöеı»¹¥»÷Ö¸±êʱ¸ÃÍøÕ¾¾Í»á³ÁÐÂÉÏÏߣ¬¶øºóÔٴιعء£
https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america
6¡¢IBM°ä²¼¹ØÓÚ2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö»ã±¨
8ÔÂ16ÈÕ£¬IBM°ä²¼ÁË2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö»ã±¨£¬·ÖÎöÁË2022Äê3ÔÂÖÁ2023Äê3ÔÂÍøÂçµÄÊý¾Ý¡£¸÷ÐÐÒµÊý¾Ýй¶µÄ¾ùÔȳɱ¾Îª445ÍòÃÀÔª£¬¶øÒ½ÁÆÐÐÒµµÄ¾ùÔȳɱ¾ÊÇ×î¸ßµÄ£¬Îª1093ÍòÃÀÔª¡£´ÓǰÈýÄ꣬ҽÁƱ£½¡µÄ³É±¾Ôö³¤ÁË53.3%¡£Óëµ¥Ò»´æ´¢²½ÖèÏà±È£¬¿ç¶à¸ö»·¾³´æ´¢µÄÊý¾Ýй¶³É±¾×î¸ß£¬¼ì²âºÍÓ¦¶ÔµÄ¾ùÔȹ¦·òΪ291Ìì¡£´¹µö»î¶¯³ÉΪ×î³£Óõijõʼ¹¥»÷ÔØÌ壬ռ±È16%£¬Æä´ÎÊÇÆ¾Ö¤Ð¹Â¶ºÍÔÆÅäÖÃÃýÎó¡£Ò½ÁƱ£½¡ÐÐÒµÊý¾Ýй¶ÍùÍù»á³ÖÐø231Ìì²Å±»·¢ÏÖ£¬¶øÆäËüÐÐÒµÔòΪ204Ìì¡£
https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/


¾©¹«Íø°²±¸11010802024551ºÅ