ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2022-08-12
1¡¢Ä³Æû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

      

8ÔÂ10ÈÕ£¬£¬£¬ £¬Sophos͸¶ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»Èý¸öÀÕË÷ÍÅ»ïLockBit¡¢HiveºÍBlackCat¹¥»÷¡£¡£¡£¡£¡£¡£ÕâÈý¸ö¹¥»÷ÍŻﶼʹÓÃÁËÏàͬµÄ¹ýʧÉèÖ㬣¬£¬ £¬¼´ÔÚÖÎÀíЧÀÍÆ÷ÉÏ̻¶ÁËÔ¶³Ì×ÀÃæÐ­ÒéµÄ·À»ðǽ¹æÔò¡£¡£¡£¡£¡£¡£5ÔÂ1ÈÕ£¬£¬£¬ £¬Lockbit½¨ÉèÁËÁ½¸öÅú´¦Öóͷ£¾ç±¾£¨1.batºÍ2.bat£©£¬£¬£¬ £¬Í¨¹ýPsExecÉÏ·Ö·¢ÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ£¬£¬£¬ £¬¼ÓÃÜÁË19̨Ö÷»úÉϵÄÎļþ£»£»£»£»£»£»Á½¸öСʱ֮ºó£¬£¬£¬ £¬HiveʹÓÃÒÑ×°ÖÃÔÚϵͳÉϵĵÄÕýµ±Èí¼þPDQ DeployÀ´·Ö·¢ÆäÀÕË÷Èí¼þ¶þ½øÖÆÎļþ£¬£¬£¬ £¬¼ÓÃÜÁË16̨Ö÷»úµÄÎļþ£»£»£»£»£»£»5ÔÂ15ÈÕ£¬£¬£¬ £¬BlackCatʹÓñ»Ñ¬È¾Óû§µÄƾ֤ÔÚ6̨Ö÷»úÉÏͶ·ÅÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/


2¡¢Cloudflare͸¶¶àÃûÔ±¹¤Ôâµ½ÓëTwilioÀàËÆµÄ´¹ÂÚ¹¥»÷  

      

¾ÝýÌå8ÔÂ10Èճƣ¬£¬£¬ £¬CloudflareÅû¶ÆäÖÁÉÙÓÐ76ÃûÔ±¹¤¼°Æä¾ìÊôÔâµ½ÁËÀàËÆÓÚÕë¶ÔTwilioµÄÖØ´ó´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Õâ´Î¹¥»÷ԼĪÓëÕë¶ÔTwilioµÄ¹¥»÷ͬʱ±¬·¢£¬£¬£¬ £¬À´×Ô4¸öÓëT-Mobile¿¯ÐеÄSIM¿¨Ïà¹ØµÄµç»°ºÅÂ룬£¬£¬ £¬ÕâЩ¶ÌÐÅÖ¸ÏòÒ»¸ö¿´ËÆÕýµ±µÄÓò£¬£¬£¬ £¬ÆäÖаüÀ¨Òªº¦×ÖCloudflareºÍOkta£¬£¬£¬ £¬ÊÔͼÓÕʹԱ¹¤½»³öƾ֤¡£¡£¡£¡£¡£¡£CloudflareÌåÏÖ£¬£¬£¬ £¬ÓÐÈýÃûÔ±¹¤ÒÑÊÜÆ­ÊÜÆ­£¬£¬£¬ £¬µ«ÓÉÓÚʹÓûá¼ûÆäÓ¦ÓóÌÐòËùÐèµÄÇкÏFIDO2±ê×¼µÄÎïÀíÇå¾²ÃÜÔ¿£¬£¬£¬ £¬ÆäÄÚ²¿ÏµÍ³²¢Î´±»¹¥ÆÆ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/hackers-behind-twilio-breach-also_10.html


3¡¢Volexity³ÆZimbraÖÐÎó²î±»ÓÃÀ´¹¥»÷ÉÏǧ̨ZCSЧÀÍÆ÷

      

VolexityÔÚ8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ £¬ZimbraÉíÖеÄÎó²îÒѱ»Ê¹ÓÃÀ´ÈëÇÖÁè¼Ý1000̨Zimbra Collaboration Suite(ZCS)ÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬¹¥»÷ÕßÔçÔÚ6ÔÂβ¾Í×îÏÈÔÚÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-37042£©µÄ×ÊÖúÏ£¬£¬£¬ £¬À´Ê¹ÓÃZCSÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27925£©¡£¡£¡£¡£¡£¡£VolexityÒÔΪ£¬£¬£¬ £¬¸ÃÎó²îµÄʹÓ÷½·¨Óë2021ÄêÍ··¢Ã÷µÄMicrosoft Exchange 0dayµÄʹÓ÷½·¨Ò»Ö¡£¡£¡£¡£¡£¡£ZimbraÔÚͨ¸æÖв¢Î´Í¸Â¶Îó²îʹÓÃÇéÐΣ¬£¬£¬ £¬ µ«Ò»ÃûÔ±¹¤ÔÚ¹«Ë¾ÂÛ̳ÉϽ¨ÒéÓû§Á¬Ã¦×°Öò¹¶¡£¬£¬£¬ £¬³ÆÎó²îȷʵÒÑÔÚ¹¥»÷Öб»Ê¹Óᣡ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/zimbra-auth-bypass-bug-exploited-to-breach-over-1-000-servers/


4¡¢Cisco Meraki·À»ðǽÎ󱨵¼ÖÂMicrosoft 365ЧÀÍÖÐÖ¹

      

ýÌå8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ £¬Ò»Á¬µÄÖÐÖ¹Ó°ÏìÁ˶à¸öMicrosoft 365ЧÀÍ£¬£¬£¬ £¬Óû§ÎÞ·¨ÅþÁ¬µ½Exchange Online¡¢Microsoft Teams¡¢Outlook×ÀÃæ¿Í»§¶ËºÍOneDrive for Business¡£¡£¡£¡£¡£¡£ËäȻ΢ÈíÌåÏÖ´ËÊÂÎñ½öÓ°ÏìÁËEMEA£¨Å·ÖÞ¡¢Öж«ºÍ·ÇÖÞ£©µØÇøµÄ¿Í»§£¬£¬£¬ £¬µ«È«ÇòÓû§¶¼ÔÚ±¨¸æÐ§ÀÍÆ÷ÅþÁ¬ºÍµÇ¼ʧ°ÜÎÊÌâ¡£¡£¡£¡£¡£¡£³õ³ÌÐò²é·¢Ã÷£¬£¬£¬ £¬Ò»Á¬ÖÐÖ¹¿ÉÄÜÓëCisco Meraki·À»ðǽÈëÇÖ¼ì²âºÍÔ¤·À(IDR)Îó±¨×èÖ¹Microsoft 365ÅþÁ¬²¢·¢³öMicrosoft Windows IIS¾Ü¾øÐ§ÀÍʵÑ龯±¨ÓйØ¡£¡£¡£¡£¡£¡£Î¢Èí×îÖÕÈ·ÈÏÖÐÖ¹ÊÇSnort¹æÔò1-60381µ¼ÖµÄ£¬£¬£¬ £¬²¢ÌåÏÖCisco MerakiÒѽûÓÃÁËÊÜÓ°ÏìµÄ¹æÔò¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-triggered-by-meraki-firewall-false-positive/


5¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þBlueSkyʹÓöàÏ߳̿ìËÙ¼ÓÃÜ

      

Unit 42ÔÚ8ÔÂ10ÈÕ¹ûÕæÁËÐÂÀÕË÷Èí¼þ¼Ò×åBlueSkyµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£BlueSkyÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔWindowsÖ÷»ú£¬£¬£¬ £¬²¢Ê¹ÓöàÏ̼߳ÓÃÜÖ÷»úÉϵÄÎļþÀ´¼ÓËÙ¼ÓÃÜËÙÂÊ¡£¡£¡£¡£¡£¡£ÆÊÎöÀú³ÌÖÐÑо¿Ö°Ô±´ÓBlueSkyµÄÑù±¾Öз¢Ã÷ÁË¿ÉÒÔÓëContiÁªÏµÆðÀ´µÄ´úÂëÖ¸ÎÆ£¬£¬£¬ £¬ÌØÊâÊÇBlueSkyµÄ¶àÏ̼ܹ߳¹ÓëConti v3µÄ´úÂëÏàËÆ£¬£¬£¬ £¬ÍøÂçËÑË÷Ä£¿£¿£¿£¿éÒ²ÊÇËüµÄÍêÈ«·­°æ¡£¡£¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬ £¬BlueSkyÓëBabuk¸üΪÏàËÆ£¬£¬£¬ £¬Á½Õß¶¼Ê¹ÓÃChaCha20£¬£¬£¬ £¬Í¬Ê±Ê¹ÓÃCurve25519À´ÌìÉúÃÜÔ¿¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/bluesky-ransomware/


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þVileRATµÄÆÊÎö±¨¸æ

      

8ÔÂ10ÈÕ£¬£¬£¬ £¬KasperskyÐû²¼±¨¸æ³ÆDeathStalkerÔÚ2022Äê¼ÌÐøÊ¹ÓÃVileRAT¹¥»÷È«ÇòµÄ¼ÓÃÜÇ®±ÒÉúÒâЧÀÍ¡£¡£¡£¡£¡£¡£VileRATÊÇÒ»¸ö¾­ÓÉ»ìÏýºÍ´ò°üµÄPython3 RAT£¬£¬£¬ £¬¾ßÓÐÖ´ÐÐí§ÒâÔ¶³ÌÏÂÁî¡¢¼üÅ̼ͼºÍ´ÓC2ЧÀÍÆ÷×ÔÎÒ¸üеȹ¦Ð§£¬£¬£¬ £¬ÔÚ2020ÄêQ2Ê״α»·¢Ã÷¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬Æù½ñΪֹ£¬£¬£¬ £¬Ñо¿Ö°Ô±ÒѾ­È·¶¨ÁËÊý°Ù¸öÓëVileRATѬȾÁ´Ïà¹ØµÄÓò¡£¡£¡£¡£¡£¡£2021Äê8ÔÂÖÁ½ñ£¬£¬£¬ £¬ÔÚ±£¼ÓÀûÑÇ¡¢ÈûÆÖ·˹¡¢µÂ¹ú¡¢¸ñÁÖÄɶ¡Ë¹¡¢¿ÆÍþÌØ¡¢Âí¶úËû¡¢°¢À­²®ÁªºÏÇõ³¤¹úºÍ¶íÂÞ˹Áª°î·¢Ã÷ÁË10¸ö±»Ñ¬È¾Ä¿µÄ¡£¡£¡£¡£¡£¡£


https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/