INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

°ä²¼¹¦·ò 2023-10-09

1¡¢INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

¾Ý10ÔÂ6ÈÕ±¨Â·£¬INC RansomwareÐû³ÆÈëÇÖÁËÃÀ¹úÁª¹úÀͶ¯¹ØÏµ¾Ö£¨FLRA£©¡£INCÔÚ9ÔÂ20ÈÕ½«FLRAÔö³¤µ½ÆäÍøÕ¾ÉÏ£¬²¢ÌṩÁË6ÕÅÎļþͼÏñ×÷Ϊ֤¾Ý¡£×êÑÐÈËÔ±ÔÚ9ÔÂ24ÈÕºÍ10ÔÂ3ÈÕͨ¹ýÓʼþÁªÏµÁËFLRA£¬¾ùδÊÕµ½»ØÓ¦¡£INCûÓгõ´Î½Ó¼ûFLRAµÄ¹¦·ò»ò·½Ê½£¬µ«È·ÈÏ8ÔÂ26ÈÕÊÇÊý¾Ýй¶ÆðÍ·µÄ¹¦·ò£¬ËûÃÇÒÑ»ñÈ¡29 GBÎļþ¡£INC½²»°ÈË»¹³ÆÒÑÁôÁËÊê½ðÌõÒªÇó70ÍòÃÀÔª£¬µ«FLRA´Óδ¶Ô´Ë×ö³öÈκλØÓ¦¡£


https://www.databreaches.net/inc-ransomware-claims-to-have-hit-federal-labor-relations-authority/


2¡¢×êÑÐÈËÔ±·¢ÏÖ´óÁ¿AndroidµçÊÓºÐÖÐÔ̺¬¶ñÒâÈí¼þ


¾ÝýÌå10ÔÂ8ÈÕ±¨Â·£¬´óÁ¿Á®¼ÛAndroidµçÊÓºÐÖÐÔ̺¬ºóÃÅ¡£HUMAN³ÆÆä´ÓÔÚÏßÁãÊÛÉÌ´¦²É°ìµÄÉ豸ÖУ¬80%¶¼Ï°È¾ÁËBADBOX¡£BadboxԤװÔÚAndroidµçÊÓºÐÖУ¬É豸²åÈëºó£¬¶ñÒâÈí¼þ»áÓë¹¥»÷ÕßµÄC2·þÎñÆ÷ÏνÓ¡£Ëü»¹¿ÉÖ´Ðиæ°×ڲƭ¡¢´´½¨ÐéαWhatsAppºÍGmailÕË»§¡¢ÏúÊÛ¼ÒÍ¥ÍøÂç½Ó¼ûȨÏÞÒÔ¼°×°ÖÃÔ¶³Ì´úÂ롣ȫÇòÖÁÉÙÓÐ74000²¿»ùÓÚAndroidµÄÉ豸ϰȾÁËBADBOX¡£×êÑÐÈËÔ±»¹·¢ÏÖÁËÁíÒ»ÖÖ¶ñÒâÈí¼þPEACHPIT£¬ËüÊÇBadboxµÄ¸æ°×ڲƭ×é¼þ£¬Äܹ»ÔÚAndroidºÍiOSÉ豸ºÍÀûÓÃÉÏÆô¶¯ºýŪÐÔÍøÂçÁ÷Á¿¡¢°µ²Ø¸æ°×ºÍ¶ñÒâ¸æ°×¡£


https://www.hackread.com/android-tv-boxes-backdoors-home-networks/


3¡¢Atlassian Confluence½¨¸´±»ÀûÓ÷ì϶CVE-2023-22515


AtlassianÔÚ10ÔÂ4ÈÕ½¨¸´ÁËConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷ÖеĽӼû½ÚÔì·ì϶£¨CVE-2023-22515£©¡£¹¥»÷Õß¿ÉÔ¶³ÌÀûÓø÷ì϶£¬À´´´½¨Î´¾­ÊÚȨµÄConfluenceÖÎÀíÔ¹ØÊ»§²¢½Ó¼û·þÎñÆ÷¡£Ëü²»»áÓ°Ïì8.0.0֮ǰµÄConfluence°æ±¾£¬ÒÔ¼°Í¨¹ýatlassian.netÓò½Ó¼ûµÄConfluenceÍøÕ¾¡£Atlassian³Æ¸Ã·ì϶Òѱ»ÔÚÒ°ÀûÓ㬵«Ã»ÓÐй©¹¥»÷ÐÔÖÊ¡¢¹æÄ£»ò·ì϶µÄµ××ÓÔ­ÒòµÈ½øÒ»²½Ï¸½Ú¡£½¨Òé¿Í»§µ±¼´¸üУ¬ÎÞ·¨ÀûÓøüеĿͻ§Ó¦Ï޶ȶÔÊÜÓ°ÏìÊ·ýµÄ±í²¿½Ó¼û¡£


https://thehackernews.com/2023/10/atlassian-confluence-hit-by-newly.html


4¡¢ÒòÊê½ð½»Éæ·ÖÁÑLockBit´òË㹫¿ªIT¹«Ë¾CDWµÄÊý¾Ý


ýÌå10ÔÂ6Èճƣ¬ÒòÊê½ð½»Éæ·ÖÁÑ£¬ÀÕË÷ÍÅ»ïLockBit´òË㹫¿ª´ÓIT¹«Ë¾CDWÇÔÈ¡µÄÊý¾Ý¡£ÃûΪLockBitSuppµÄ½²»°È˰µÊ¾£¬ÔÚ½»ÉæÆÚ¼äCDW¸ø³öµÄ½ð¶îÌ«µÍ£¬ÏÕЩÊÇ¶ÔÆ­×ÓµÄÎêÈè¡£ËûÃǻؾøÁËÕâ¸ö¹Öµ®µÄ½ð¶î£¬²¢¾ö¶¨¹«¿ªÎļþ¡£Æ¾¾ÝLockBitÍøÕ¾Éϵĵ¹¼ÆÊ±£¬CDWµÄÎļþ½«ÓÚ10ÔÂ11ÈÕÁ賿°ä²¼¡£ÕâÒ»ÊÂÎñÆðÍ·ÓÚ9ÔÂ3ÈÕ£¬Æäʱ¸Ã¹«Ë¾³õ´Î±»Ôö³¤µ½LockBitµÄÍøÕ¾ÉÏ£¬¶øCDWÈÔδ¶ÔÕâÒ»ÊÂÎñ°ä·¢ÆÀÂÛ¡£


https://www.theregister.com/2023/10/06/cdw_lockbit_negotiations/


5¡¢TrendMicroÅû¶ÔÚÀûÓúʹúÂë¿âÖ²Èë¶ñÒâ´úÂëµÄ²½Öè


10ÔÂ5ÈÕ£¬Trend Micro°ä²¼»ã±¨£¬Éî¿Ì×êÑÐÁ˹¥»÷ÕßÔÚ¿´ËƺϷ¨µÄÀûÓ÷¨Ê½ºÍ´úÂë¿âÖÐÖ²Èë¶ñÒâpayloadµÄ¸´ÔÓ²½Öè¡£¹©¸øÁ´¹¥»÷µÄ¹ÄÆð³ÉÎªÍøÂ簲ȫÁìÓòµÄÒ»¸ö¹Ø¼üÎÊÌâ¡£¿ª·¢ÈËÔ±ÒÀ¸½µÚÈý·½×é¼þÀ´¼ò»¯¿ª·¢Á÷³Ì£¬¹¥»÷ÕßÒ²Äܹ»Í¨¹ýÕë¶Ô¹©¸øÁ´Öа²È«ÐԽϵ͵ÄÔªËØÀ´¼ä½ÓÈëÇÖϵͳ¡£×êÑÐÈËÔ±·ÖÎöÁ˹¥»÷Õ߿ˡºÏ·¨GitHub´æ´¢¿â£¨ÈçBinance-trading-bot¡¢crypto-clipperºÍÆäËüÓÃPython3¿ª·¢µÄ·¨Ê½£©£¬¶øºóÓöñÒâ´úÂë¶ÔÆä½øÐÐľÂí»¯ºÍϰȾµÄ°¸Àý×êÑС£


https://www.trendmicro.com/en_us/research/23/j/infection-techniques-across-supply-chains-and-codebases.html


6¡¢Microsoft°ä²¼¹ØÓÚ2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö»ã±¨


10ÔÂ5ÈÕ±¨Â·³Æ£¬Microsoft°ä²¼ÁË2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö»ã±¨£¬·ÖÎöÁË2022Äê7ÔÂÖÁ2023Äê6ÔÂÆÚ¼äµÄ°²È«Ç÷Ïò¡£×Ô2022Äê9ÔÂÒÔÀ´£¬ÊÖ¶¯Ö´ÐеÄÀÕË÷¹¥»÷Ôö³¤ÁË200%ÒÔÉÏ¡£×Ô2022Äê11ÔÂÒÔÀ´£¬Éæ¼°Êý¾Ýй¶µÄ¹¥»÷ÊýÁ¿Ôö³¤ÁËÒ»±¶¡£´óÎÞÊýÀÕË÷¹¥»÷²¢Î´³É¹¦¼ÓÃÜÈκÎÄÚÈÝ£¬Ö»ÓÐ2%µÄ¹¥»÷³É¹¦²¿ÊðÁËÀÕË÷Èí¼þ¡£´óÎÞÊý¹¥»÷Äܹ»×·Òäµ½3¸öµã£º·ÛËé±í²¿Ô¶³Ì·þÎñ¡¢ÀûÓÃÓÐЧÕÊ»§ºÍÈëÇÖÃæÏò¹«¼ÒµÄÀûÓ÷¨Ê½¡£½üÈý·ÖÖ®¶þµÄ¹¥»÷¿É×·Òäµ½4¸öÀÕË÷ÍŻMagniber¡¢LockBit¡¢HiveºÍBlackCat¡£


https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023