·¨¹úÒ½ÔºCHSF±»ÀÕË÷1000ÍòÃÀÔªºó½«»¼Õß×ªÒÆµ½±ð´¦
Ðû²¼Ê±¼ä 2022-08-25
¾ÝýÌå8ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬·¨¹ú°ÍÀèµÄÄÏ·¨À¼Î÷ÁÖÖÐÐÄÒ½Ôº(CHSF)Ôâµ½ÍøÂç¹¥»÷ºó£¬£¬£¬£¬£¬£¬½«»¼ÕßתÕïÖÁÆäËü»ú¹¹²¢ÍƳÙÊÖÊõÔ¤Ô¼¡£¡£¡£¡£¡£¡£CHSFÌåÏÖ£¬£¬£¬£¬£¬£¬Ò½ÔºµÄÓªÒµÈí¼þ¡¢´æ´¢ÏµÍ³£¨ÌØÊâÊÇҽѧ³ÉÏñ£©ºÍÓ뻼ÕßÏà¹ØµÄÐÅϢϵͳÔÝʱÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒªÇó10000000ÃÀÔªµÄÊê½ðÀ´»»È¡½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£·¨¹úýÌå·¢Ã÷ѬȾLockBit 3.0µÄ¼£Ï󣬣¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐδȷ¶¨¹¥»÷ÕßµÄÉí·Ý¡£¡£¡£¡£¡£¡£ÈôÊÇLockBit 3.0¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬ÄÇôËü¾ÍÎ¥·´ÁËRaaSÍýÏëեȡ¹¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¹æÔò¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/
2¡¢Áè¼Ý8Íǫ̀º£¿£¿£¿µÍþÊÓÉãÏñÍ·Ò×Êܵ½ÏÂÁî×¢ÈëÎó²îµÄÓ°Ïì
¾Ý8ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬CYFIRMAÑо¿Ö°Ô±·¢Ã÷Áè¼Ý80000̨º£¿£¿£¿µÍþÊÓÉãÏñÍ·ÈÝÒ×Ôâµ½ÏÂÁî×¢ÈëÎó²î£¨CVE-2021-36260£©µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¸ÃÎó²îÒÑͨ¹ý2021Äê9ÔµĹ̼þ¸üÐÂÐÞ¸´¡£¡£¡£¡£¡£¡£2021Äê12Ô£¬£¬£¬£¬£¬£¬MoobotµÄ»ùÓÚMiraiµÄ½©Ê¬ÍøÂç×îÏÈʹÓøÃÎó²îÈö²¥£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÔÚ°µÍø·¢Ã÷¶à¸öºÚ¿ÍÏ£ÍûʹÓøÃÎó²îÈëÇÖÄ¿µÄ×°±¸¡£¡£¡£¡£¡£¡£ËäÈ»Îó²îʹÓûÏÖÔÚ²¢Î´×ñÕÕÌØ¶¨Ä£Ê½£¬£¬£¬£¬£¬£¬µ«CYFIRMAÇ¿µ÷£¬£¬£¬£¬£¬£¬APT41ºÍAPT10ÒÔ¼°¶à¸ö¶íÂÞ˹µÄºÚ¿ÍÍŻﶼ¿ÉÄÜ»áÕë¶ÔÒ×±»¹¥»÷µÄ×°±¸¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/134756/security/hikvision-cameras-vulnerability.html
3¡¢Êý¾Ý¿âÉèÖùýʧµ¼ÖÂÓ¡¶ÈÁª°î¾¯Ô±ºÍÒøÐÐÏà¹ØÐÅϢй¶
CybernewsÔÚ8ÔÂ24ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö¹ûÕæµÄElasticsearchÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÊôÓÚÓ¡¶ÈÁª°î¾¯Ô±µÄ½ðÈÚÚ²ÆÊÓ²ì¼Í¼µÈÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÔ¼24 GB£¬£¬£¬£¬£¬£¬×ܹ²°üÀ¨3350ÍòÌõ¼Í¼£¬£¬£¬£¬£¬£¬Éæ¼°ÒøÐÐÕË»§³ÖÓÐÈËÐÕÃû¡¢Óà¶î¡¢Õʺš¢ÉúÒâÀàÐÍ¡¢½ð¶îºÍÓ¡¶ÈÖÐÑëÇ鱨¾Ö(CBI)´¦Öóͷ£µÄ°¸¼þ¡£¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÊý¾Ý¿âÖл¹·¢Ã÷ÁË200¶à¼ÒÒøÐеļͼ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊý¾Ý¿âµÄ³ÖÓÐÕߣ¬£¬£¬£¬£¬£¬µ«ÆäÖÐÐÅÏ¢µÄÐÔ×ÓÅú×¢Ëü¿ÉÄÜÓÉÓ¡¶È·¨Ôº»ò˽È˵ÄÚ²ÆÊÓ²ì»ú¹¹³ÖÓС£¡£¡£¡£¡£¡£
https://cybernews.com/privacy/federal-police-and-banking-records-exposed-by-database-leak-in-india/
4¡¢º½¿ÕÊÖÒÕºÍЧÀÍÌṩÉÌAccelyaÔâµ½Black CatµÄ¹¥»÷
ýÌå8ÔÂ23ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬º½¿ÕÊÖÒÕºÍЧÀÍÌṩÉÌAccelyaÔâµ½ÁËBlack CatµÄÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£AccelyaΪ´ïÃÀº½¿Õ¡¢Ó¢¹úº½¿Õ¹«Ë¾¡¢Î¬Õä´óÎ÷Ñ󺽿չ«Ë¾ºÍÃÀ¹úº½¿Õ¹«Ë¾µÈÌṩЧÀͺÍÊÖÒÕ¡£¡£¡£¡£¡£¡£ÉÏÖÜËÄ£¬£¬£¬£¬£¬£¬Black Cat¹ûÕæÁ˾ݳƴÓAccelyaÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþºÍ¹¤ÈËÌõÔ¼µÈ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄ½²»°È˳ƣ¬£¬£¬£¬£¬£¬ËûÃÇÔÚ·¢Ã÷¹¥»÷ºóÁ¬Ã¦¸ôÀëÁËÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Ã»ÓÐʹÆä´Ó±»Ñ¬È¾ÏµÍ³ºáÏòÒÆ¶¯µ½¿Í»§µÄϵͳÖС£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬AccelyaÕýÔÚÉó²éй¶µÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£¡£¡£
https://therecord.media/major-airline-technology-provider-accelya-attacked-by-ransomware-group/
5¡¢ÒÁÀʺڿÍÍÅ»ïʹÓÃй¤¾ßHyperscraperÇÔȡĿµÄÓʼþ
8ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Google¹ûÕæÁËÒÁÀʺڿÍÍÅ»ïCharming KittenʹÓÃй¤¾ßHyperscraperÇÔȡĿµÄÓʼþµÄ»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßÓÚ2021Äê12ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÃ.NET±àд£¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡Gmail¡¢Yahoo!ºÍMicrosoft OutlookÕÊ»§ÖеÄÓû§Êý¾Ý¡£¡£¡£¡£¡£¡£³ýÁËÏÂÔØºÍÇÔȡĿµÄÊÕ¼þÏäÖеÄÄÚÈÝÖ®Í⣬£¬£¬£¬£¬£¬Ëü»¹¿ÉÒÔͨ¹ýɾ³ý¹È¸è·¢Ë͵ÄÇå¾²ÓʼþÀ´ÑÚÊÎÆä×Ù¼£¡£¡£¡£¡£¡£¡£ÈôÊÇÓʼþÔ±¾ÊÇδ¶ÁµÄ£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß»áÔÚ·¿ª²¢ÏÂÔØÓʼþΪ".eml "ÎļþºóÔÙ½«Æä±ê¼ÇΪδ¶Á¡£¡£¡£¡£¡£¡£
https://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/
6¡¢Unit 42³ÆÀÄÓÃÕýµ±SaaSƽ̨µÄ´¹ÂÚ¹¥»÷¼¤Ôö1100%
8ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Unit 42Ðû²¼Á˹ØÓÚÀÄÓÃÈí¼þ¼´Ð§ÀÍ(SaaS)ƽ̨µÄÇ÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬´Ó2021Äê6Ôµ½2022Äê6Ô£¬£¬£¬£¬£¬£¬Ð¼ì²âµ½ÍйÜÔÚÕýµ±SaaSƽ̨ÉϵÄÍøÂç´¹ÂÚURLµÄ±ÈÂÊÔöÌíÁËÁè¼Ý1100%¡£¡£¡£¡£¡£¡£Unit 42½«±»ÀÄÓÃµÄÆ½Ì¨·ÖΪÁùÀࣺÎļþ¹²ÏíºÍÍйÜÍøÕ¾¡¢±í¸ñºÍÊӲ칹½¨¹¤¾ß¡¢ÍøÕ¾¹¹½¨¹¤¾ß¡¢Ìõ¼ÇºÍÎĵµ±àдƽ̨ÒÔ¼°Ð¡ÎÒ˽¼ÒÎļþ¿Õ¼ä£¬£¬£¬£¬£¬£¬Ã¿ÖÖÆ½Ì¨µÄ´¹ÂڻÔÚ2021ÄêϰëÄê¶¼ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬ÆäÖÐ×îÏÔ×ŵÄÔöÌí±¬·¢ÔÚ2021Äê9ÔÂÖÁ10Ô¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/platform-abuse-phishing/