´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIºÏ×÷Ó¦¶ÔÀÕË÷Èí¼þ¹¥»÷

°ä²¼¹¦·ò 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIºÏ×÷Ó¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ  £¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæ¶ÔÀÕË÷Èí¼þ¹¥»÷µÄÑϸñÌôÕ½  £¬ÒÑ´¹Î£ÒªÇó²¢»ñµÃÁª¹úµ÷²é¾ÖµÄÔöÔ®¡£ºÚ¿ÍÓÚÖÜÈýÔçÉϳɹ¦ÇÖÈëµ±¾Ö·þÎñÆ÷  £¬ÊÔͼ¼ÓÃÜÎļþ  £¬µ«³ÇÊеݲÕûϵͳѸ¿ìÏìÓ¦  £¬ÓÐЧÏÞ¶ÈÁËÇÖº¦ÁìÓò¡£Ä¿Ç°  £¬Êе±¾ÖÕý»ý¼«²ÉÈ¡´ëÊ©  £¬Ô̺¬¹Ø¹ØÄÚ²¿½Ó¼û¡¢¸ü»»É豸¼°´Ó±¸·ÝÖи´Ô­ÐÅÏ¢  £¬ÒÔ¾¡¿ì¸´Ô­ÏµÍ³¡£Ö»¹ÜÄÚ²¿·þÎñÊܵ½¿Ï¶¨ÏÞ¶È  £¬µ«¹Ø¼ü±í²¿·þÎñÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÁÏ´¦ÖõÈÈÔά³ÖÕý³£ÔËÐС£Õâ´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÓòµ±¾ÖÍøÂ簲ȫ¾ÖÊÆµÄÑϸñÐÔ  £¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâ·ê¹¥»÷ºó  £¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄ¾ßÌåÒªÇó  £¬µ«Óйز¿ÃÅÒÑÈ«Á¦¹²Í¬FBI¼°ºÓɽ°²È«Êý·¢Õ¹µ÷²é¡£¹ÙÔ±°µÊ¾  £¬¸´Ô­ÏµÍ³µÄ¾ßÌ幦·òÉÐÎÞ·¨È·¶¨  £¬µ«½«È«Á¦ÒÔ¸°Ï÷¼õ¶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ  £¬´«²¼µÐÊÓÓßÂÛ


9ÔÂ26ÈÕ  £¬Ó¢¹úÕÆ¹Ü»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý´¹Î£´¦ÖÃÒ»Â·Éæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-Fi·þÎñµÄÍøÂ簲ȫÊÂÎñ¡£Õâ´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖØÒª³µÕ¾  £¬Ô̺¬Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ³ÇÊеÄÕ¾µã  £¬Í¨¹ýWi-FiµÇÂ¼Ò³Ãæ½Ó¹Üµ½Ô̺¬µÐÊÓÒÁ˹À¼½ÌÓßÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£Wi-Fi·þÎñÒÑÔÝÍ£  £¬ÒÔ¹²Í¬Ó¢°î½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄµ÷²é¡£¾Ýµ÷²é  £¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiµÇÂ½Ò³ÃæËùÖ  £¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª  £¬²¢Ô⵽ijºÏ·¨ÖÎÀíÔ¹ØË»§µÄ·¸·¨ÈëÇÖ¡£¹ÌÈ»¾ßÌå¼¼Êõϸ½ÚÉÐδ¹«¿ª  £¬µ«ÐÅÏ¢°²È«×¨¼ÒÖ¸³ö  £¬¹«¹²Wi-FiÒòÆäÊ¢¿ªÐÔ³£³ÉÎªÍøÂç·¸×ï·Ö×ӵĹ¥»÷Ö¸±ê  £¬Ç¿µ÷Á˼ÓÇ¿ÕâÀàÍøÂ簲ȫÐԵijÁÒªÐÔ¡£Õâ´ÎÊÂÎñÔÙ´ÎÇÃÏìÁ˹ؼü¹ú¶È»ù´¡ÉèÊ©ÍøÂ簲ȫµÄ¾¯ÖÓ  £¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²·þÎñÖпÉÄÜ´æÔÚµÄÍøÂ簲ȫ·ì϶¡£Ö»¹ÜĿǰÉÐδ·¢ÏÖÓ×ÎÒÊý¾Ýй¶  £¬µ«¹«¼Ò¶ÔÓÚÍøÂ簲ȫµÄÓÇÓôÈÔÔÚÔö³¤¡£Network Rail¼°ºÏ×÷ͬ°éÕýÈ«Á¦ÒÔ¸°  £¬Ö¼ÔÚ¾¡¿ì¸´Ô­·þÎñ²¢Ô¤·ÀÀàËÆÊÂÎñÔٴβúÉú¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹µöÐÂÍþв  £¬Äê´´14Íò´¹µöÍøÕ¾


9ÔÂ26ÈÕ  £¬Palo Alto Networks µÄÍøÂ簲ȫÍŶӸ淢ÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹µö¼´·þÎñ£¨PhaaS£©Æ½Ì¨  £¬¸Ãƽ̨ÔÚ´ÓǰһÄêÖÐÒѴٳɳ¬¹ý 14 Íò¸öÍøÂç´¹µöÍøÕ¾µÄ´´½¨  £¬¶ÔÈ«ÇòÓû§×é³ÉÑϳÁÍþв¡£Sniper Dz רһÓÚÀûÓÃÉ罻ýÌåºÍÔÚÏß·þÎñ×÷Ϊ¹¥»÷Ö¸±ê  £¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å  £¬ÈÃÍøÂç´¹µöÕßÄÜÇáËÉÌìÉúÕë¶Ô³ÛÃûÆ·ÅÆµÄ´¹µöÒ³Ãæ  £¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓзþÎñÆ÷ÉÏ¡£Æä¹ÖÒìÖ®´¦ÔÚÓÚ  £¬Sniper Dz ²»Ö±½Ó¹Ü·Ñ  £¬¶øÊÇ´Ó±»µÁÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖлñÀû  £¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý  £¬¼ÓÇ¿ÆäÔÚÍøÂç´¹µöÁìÓòµÄְλ¡£¸Ãƽ̨»¹ÀûÓù«¹²´úÀí·þÎñÆ÷ºÍºÏ·¨ SaaS ƽ̨£¨Èç Blogspot£©°µ²ØÐÐ×Ù  £¬Ôö³¤¹¥»÷Òñ±ÎÐԺͳɹ¦ÂÊ¡£Sniper Dz ÔÚ Telegram ÉÏÕ¼ÓÐÖØ´óµÄ×·ËæÕßȺÌå  £¬ÆäÒ×ÓÃÐÔºÍÃâ·Ñ¸öÐÔÎüÒýÁË´óÁ¿ÍøÂç·¸×ï·Ö×Ó¡£¼øÓÚÆä׳´óµÄ¶ã±Ü¼¼ÊõºÍ¿í·ºµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦  £¬Sniper Dz Ô¤¼Æ½«³ÖÐøÍÆ¶¯È«ÇòÍøÂç´¹µö»î¶¯µÄÔö³¤  £¬Òò¶ø  £¬Óû§ºÍ×éÖ¯Ðè¸ß¶È¾¯Ìè  £¬²ÉÈ¡ÓÐЧ°²È«´ëÊ©ÒÔÕмܴËÀàÐÂÐËÍþв¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ¼ÙðÀûÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


9ÔÂ28ÈÕ  £¬Check Point Research (CPR) ×î½ü¸æ·¢ÁËÒ»ÖÖ¸´ÔӵļÓÃÜÇ®±ÒÚ¿Æ­¼¿Á©  £¬¸ÃȦÌ×ͨ¹ýÒ»¿î¼Ù×°³ÉÈȵãWeb3ºÍ̸WalletConnectµÄÐéαÀûÓÃÔÚGoogle PlayÉÏÂñ·üÊýÔ  £¬³É¹¦µÁÈ¡Á˳¬¹ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò  £¬×ÜËðʧ³¬7ÍòÃÀÔª¡£´Ë¶ñÒâÀûÓÃÀûÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÀµ  £¬ºóÕß±¾ÊÇÏνÓÈ¥ÖÐÐÄ»¯ÀûÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄ°²È«ÇÅÁº¡£Ú¿Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐéαÆÀÂÛÓÕµ¼Óû§ÏÂÔØ  £¬Ò»µ©Óû§³¢ÊÔÏνÓÇ®°üÖÁWeb3ÀûÓà  £¬¼ÙðÀûÓñã·ÂÕÕÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðڲƭÂòÂô  £¬°ÂÃØÏò¹¥»÷Õß½ÚÔìµÄ·þÎñÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢  £¬ÀûÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣸ÃÀûÓû¹Ñ¡È¡·´¼ì²â¼¼Êõ¶ã±Ü°²È«¹¤¾ßÉó²é  £¬¶ÔÉóºËÈËԹعʾÎÞº¦ÄÚÈÝ  £¬´Ó¶ø³Ö¾ÃÂñ·ü¡£·ÖÎöÏÔʾ  £¬±»µÁ×ʽð±é¼°¶à¸öÒÔÌ«·»Ðé¹¹»úÍøÂç  £¬ÇÒ´ó²¿ÃÅÉÐδ׷»Ø¡£ÖµÍ×ÌùÐĵÄÊÇ  £¬Ö»¹ÜÊܺ¦Õß¶à¶à  £¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ  £¬·´Ó³³ö¹«¼Ò¶Ô´ËÀàÚ¿Æ­¼¿Á©µÄÈÏÖª²»¼°  £¬ÒÔ¼°Ú¿Æ­Õßͨ¹ýÐéαºÃÆÀ¸²¸Ç×ï×´µÄÕ½Êõ¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷  £¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ  £¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕý»ý¼«Ó¦¶Ôһ·ÑϳÁµÄÍøÂç¹¥»÷ÊÂÎñ  £¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾  £¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡ÀûÓ÷¨Ê½¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£ÖÜÈý  £¬ÎÀÉú²¿°ä·¢ÒѸ´Ô­²¿ÃŹؼüÖ°ÄܵÄÔËÐÐ  £¬Ô̺¬°©Ö¢½ÚÔìÖÐÐÄ¡¢½¡È«±£ÏÕ¼°±í¼®ÈËÊ¿Ìå¼ìµÈ³ÁҪϵͳ¡£¼¼ÊõÍŶÓѸ¿ìȾָ  £¬×·×Ù²¢¸æ·¢ÁËÈëÇÔìóͼ  £¬Í¬Ê±ÔÚµ±¾Ö°²È«»ú¹¹µÄÖ§³ÖϽÚÔìÁËÊÂ̬·¢Õ¹¡£ÎªÔ¤·À¹¥»÷½øÒ»²½À©É¢ÖÁÖ÷ÌâÊý¾Ý¿â  £¬ÎÀÉú²¿¹û¶Ï½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏß  £¬²¢²ÉÈ¡ÁËһϵÁмÓÇ¿»ù´¡ÉèÊ©°²È«µÄ´ëÊ©¡£Ö»¹Üδй©¾ßÌå¹¥»÷ϸ½Ú  £¬µ«Æ¾¾ÝÓ¦¶Ô´ëÊ©´§Ä¦  £¬Õâ´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£½ØÖÁĿǰ  £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹«¿ªÐû³Æ¶Ô´ËÕÆ¹Ü¡£ÎÀÉú²¿Ç¿µ÷  £¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÈ«Ãæ¸´Ô­  £¬²¢³Ðŵ½«³ÖÐø¼ÓÇ¿ÍøÂ簲ȫ·À»¤  £¬ÒÔ±£ÏÕ¹«¹²ÎÀÉú·þÎñµÄ²»±äÔËÐкͻ¼ÕßÊý¾ÝµÄ°²È«¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìºÏÔÆ¹¥»÷


9ÔÂ27ÈÕ  £¬Î¢Èí·¢³öÖÒ¸æ  £¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷ÕûÕ½Êõ  £¬½«¹¥»÷³ÁÐÄתÏò»ìºÏÔÆ»·¾³  £¬²¢Ì°Í¼ÇÖº¦Êܺ¦ÕßµÄÈ«Êý×ʲú¡£×Ô2021Äê³õ´ÎÏÖÉíÒÔÀ´  £¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿ÃÅ  £¬²»Ðݽø»¯  £¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£½üÆÚ  £¬ËûÃdzö¸ñ»îÔ¾  £¬Ñ¡È¡EmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢µ±¾Ö¡¢Ôì×÷¡¢ÔËÊä¼°·¨ÂÉ»ú¹¹·¢Æð¹¥»÷¡£Storm-0501ÀûÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖª·ì϶£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÈëÍøÂç  £¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯  £¬ÇÔÈ¡Êý¾Ý²¢½ûÓð²È«ÉèÖá£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Í´´¦  £¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´Ó±¾µØÇ¨áãµ½ÔÆ¶Ë  £¬·ÛËéͬ²½ÕË»§  £¬½Ù³Ö»á»°ÒÔά³Ö½Ó¼ûȨÏÞ¡£ËûÃÇ»¹¿ÉÄÜÀûÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂë  £¬Èƹý±£»¤¡£µÃÊÖºó  £¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²ÈëÓÆ¾ÃºóÃÅ  £¬¼Ù×°³ÉºÏ·¨Óû§Éí·Ý  £¬×îÖÕÔÚÄÚ²¿²¿ÊðºÍÔÆ»·¾³Öв¿ÊðEmbargoÀÕË÷Èí¼þ  £¬»òͨ¹ý´òË㹤×÷ÓëGPO¼ÓÃÜÎļþ¡£ÖµÍ×ÌùÐĵÄÊÇ  £¬¸ÃÍŻﲢ·Ç×ÜÊǵ±¼´Ö´ÐÐÀÕË÷  £¬ÓÐʱ½ö±£ÁôºóÃÅÒÔ×÷ºóÐøÖ®Óá£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/