CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹Âڻ

Ðû²¼Ê±¼ä 2023-08-18

1¡¢CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹Âڻ


CofenseÔÚ8ÔÂ16ÈÕÅû¶ÁËÒ»³¡Ê¹ÓöþάÂëµÄ´óÐÍ´¹Âڻ£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÃÀ¹úµÄÒ»¼Ò´óÐÍÄÜÔ´¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã»î¶¯µÄƽ¾ùÔÂÔöÌíÂÊÁè¼Ý270%£¬£¬ £¬£¬×Ô5ÔÂÒÔÀ´ÕûÌå»î¶¯ÔöÌíÁË2400%ÒÔÉÏ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈ·¢ËÍð³äMicrosoftÇ徲֪ͨµÄÓʼþ£¬£¬ £¬£¬ÆäÖаüÀ¨PNG»òPDF¸½¼þ£¬£¬ £¬£¬ÒªÇóÓû§É¨Ãè¶þάÂ룬£¬ £¬£¬È»ºó½«Ä¿µÄÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬ £¬£¬¸Ã»î¶¯29%µÄÁ÷Á¿Õë¶ÔµÄÊÇÄÜÔ´¹«Ë¾£¬£¬ £¬£¬ÆäËüÄ¿µÄÐÐÒµ°üÀ¨ÖÆÔìÒµ(15%)¡¢°ü¹ÜÒµ(9%)¡¢ÊÖÒÕ(7%)ºÍ½ðÈÚЧÀÍ£¨6%£©ÐÐÒµ¡£¡£¡£¡£¡£¡£


https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/


2¡¢AT&T·¢Ã÷¹¹½¨°üÀ¨40Íò¸ö½ÚµãµÄ½©Ê¬ÍøÂçµÄ¹¥»÷»î¶¯


8ÔÂ16ÈÕ£¬£¬ £¬£¬AT&T Alien Labs³ÆÆä·¢Ã÷ÁËÒ»Æð´ó¹æÄ£¹¥»÷»î¶¯ÖÁÉÙÏò400000¸öWindowsÅÌËã»ú·Ö·¢ÁËÊðÀíЧÀÍÆ÷Ó¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬ÔÚÒ»ÖÜÄھͷ¢Ã÷ÁËһǧ¶à¸öÔÚÒ°Íâ·Ö·¢ÊðÀíÓ¦ÓóÌÐòµÄжñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£¡£¾ÝÊðÀíÍøÕ¾³Æ£¬£¬ £¬£¬ÊðÀí³ö¿Ú½ÚµãÁè¼Ý40Íò¸ö£¬£¬ £¬£¬Éв»ÇåÎúÆäÖÐÓм¸¶àÊDZ»¶ñÒâ´úÂë×°ÖõÄ¡£¡£¡£¡£¡£¡£Ò»µ©×°Öõ½±»ÈëÇÖµÄϵͳÉÏ£¬£¬ £¬£¬¶ñÒâÈí¼þ¾Í»áÏÂÔØ²¢×°ÖÃÊðÀíÓ¦Óᣡ£¡£¡£¡£¡£¼ÓÔØ³ÌÐòÒþ²ØÔÚÆÆ½âÈí¼þºÍÓÎÏ·ÖУ¬£¬ £¬£¬ÇÒ×°Öò»ÐèÒªÓëÓû§¾ÙÐн»»¥¡£¡£¡£¡£¡£¡£¸ÃÊðÀíÊÇÓÃGo¿ª·¢£¬£¬ £¬£¬ÓÉÓÚËüÒÑÊðÃûÒÔÊǼì²âΪÁã¡£¡£¡£¡£¡£¡£


https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware


3¡¢Citrix ShareFileÎó²îCVE-2023-24489Òѱ»Ê¹ÓÃ


¾ÝýÌå8ÔÂ16ÈÕ±¨µÀ£¬£¬ £¬£¬CISAÌáÐÑCitrix ShareFileÎó²îCVE-2023-24489Òѱ»ÔÚҰʹÓᣡ£¡£¡£¡£¡£Ê¹ÓøÃÎó²î£¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔ½«Web shellÉÏ´«µ½Ä¿µÄ×°±¸£¬£¬ £¬£¬À´»ñµÃ¶Ô´æ´¢¼°ÆäËùÓÐÎļþµÄÍêÈ«»á¼ûȨÏÞ£¬£¬ £¬£¬ÒÑÓÚ6ÔÂ13ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬GreyNoiseÒÑ·¢Ã÷72¸öIPµØµãÊÔͼʹÓûò¼ì²éShareFileЧÀÍÆ÷ÊÇ·ñÈÝÒ×Ôâµ½¹¥»÷£¬£¬ £¬£¬ÆäÖдó´ó¶¼À´×Ôº«¹úÒÔ¼°·ÒÀ¼¡¢Ó¢¹úºÍÃÀ¹úµÈ¹ú¼Ò¡£¡£¡£¡£¡£¡£CISAÒªÇóÕþ¸®»ú¹¹ÔÚ9ÔÂ6ÈÕ֮ǰӦÓò¹¶¡¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/


4¡¢Ñо¿Ö°Ô±ÔÚPowerShell GalleryÖмì²âµ½¶à¸öÎó²î


AquaÔÚ8ÔÂ16ÈÕ͸¶ÔÚPowerShell GalleryÖз¢Ã÷Á˶à¸ö¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷µÄÎó²î¡£¡£¡£¡£¡£¡£PowerShell GalleryÓÉMicrosoftά»¤£¬£¬ £¬£¬ÊÇÒ»¸öÓÃÓÚ¹²ÏíºÍ»ñÈ¡PowerShell´úÂëµÄÖÐÑë´æ´¢¿â¡£¡£¡£¡£¡£¡£µÚÒ»¸öÎó²îÉæ¼°¿íËɵİüÃûÕþ²ß£¬£¬ £¬£¬¹¥»÷Õß¿ÉÉÏ´«ÓëÏÖÓд洢¿âÃû³ÆÏàËÆµÄ¶ñÒâPowerShellÄ£¿£¿ £¿é¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²îÉæ¼°Î±ÔìÄ£¿£¿ £¿éÔªÊý¾Ý£¬£¬ £¬£¬µ±»á¼ûPowerShellÄ£¿£¿ £¿éÉϰ¶Ò³ÃæÊ±£¬£¬ £¬£¬ÏÕЩËùÓÐϸ½Ú¶¼¿ÉÄܱ»Î±Ô죬£¬ £¬£¬°üÀ¨¿ª·¢Õß¡¢°æÈ¨ºÍÐÎò¡£¡£¡£¡£¡£¡£µÚÈý¸öÎó²î¿ÉÓÃÓÚö¾ÙËùÓаüÃû³ÆºÍ°æ±¾£¬£¬ £¬£¬°üÀ¨Î´ÁгöÇÒÒþ²ØÔÚ¹«ÖÚÊÓÒ°Ö®ÍâµÄÈí¼þ°ü¡£¡£¡£¡£¡£¡£AquaÓÚ2022Äê9Ô±¨¸æÁËÕâЩÎó²î£¬£¬ £¬£¬Î¢Èí³ÆÒѽâ¾öÕâЩÎÊÌ⣬£¬ £¬£¬µ«ÏÖÔÚÎó²îÈÔÈ»¿ÉÒÔÖØÏÖ¡£¡£¡£¡£¡£¡£


https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks


5¡¢CubaʹÓÃй¤¾ß¹¥»÷ÃÀ¹ú»ù´¡ÉèÊ©ºÍÀ­¶¡ÃÀÖÞIT¼¯³ÉÉÌ


8ÔÂ17ÈÕ£¬£¬ £¬£¬Blackberry³ÆÀÕË÷ÍÅ»ïCubaʹÓÃй¤¾ß¹¥»÷ÁËÃÀ¹úµÄÒ»¸ö»ù´¡ÉèÊ©»ú¹¹ºÍÀ­¶¡ÃÀÖÞµÄÒ»¼ÒIT¼¯³ÉÉÌ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÓÚ6Ô£¬£¬ £¬£¬Æä¹¤¾ß¼¯°üÀ¨×Ô½ç˵ÏÂÔØ³ÌÐòBUGHATCH¡¢BURNTCIGAR¡¢MetasploitºÍCobalt Strike¿ò¼Ü£¬£¬ £¬£¬ÒÔ¼°´ó×ÚLOLBINS¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯»¹Ê¹ÓÃÁËNetLogonÎó²î£¨CVE-2020-1472£©ºÍVeeamÎó²î£¨CVE-2023-27532£©¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬CubaµÄÍøÕ¾ÔÚÒÑÍù¼¸¸öÔÂÀïʱ¶ÏÊ±Ðø£¬£¬ £¬£¬¾ÝÊӲ죬£¬ £¬£¬ÔÚÁгöеı»¹¥»÷Ä¿µÄʱ¸ÃÍøÕ¾¾Í»áÖØÐÂÉÏÏߣ¬£¬ £¬£¬È»ºóÔٴιرÕ¡£¡£¡£¡£¡£¡£


https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america


6¡¢IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ýй¶±¾Ç®µÄÆÊÎö±¨¸æ


8ÔÂ16ÈÕ£¬£¬ £¬£¬IBMÐû²¼ÁË2023ÄêÊý¾Ýй¶±¾Ç®µÄÆÊÎö±¨¸æ£¬£¬ £¬£¬ÆÊÎöÁË2022Äê3ÔÂÖÁ2023Äê3ÔÂÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¸÷ÐÐÒµÊý¾Ýй¶µÄƽ¾ù±¾Ç®Îª445ÍòÃÀÔª£¬£¬ £¬£¬¶øÒ½ÁÆÐÐÒµµÄƽ¾ù±¾Ç®ÊÇ×î¸ßµÄ£¬£¬ £¬£¬Îª1093ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ÒÑÍùÈýÄ꣬£¬ £¬£¬Ò½ÁƱ£½¡µÄ±¾Ç®ÔöÌíÁË53.3%¡£¡£¡£¡£¡£¡£Óë¼òµ¥´æ´¢ÒªÁìÏà±È£¬£¬ £¬£¬¿ç¶à¸öÇéÐδ洢µÄÊý¾Ýй¶±¾Ç®×î¸ß£¬£¬ £¬£¬¼ì²âºÍÓ¦¶ÔµÄƽ¾ùʱ¼äΪ291Ìì¡£¡£¡£¡£¡£¡£´¹Âڻ³ÉΪ×î³£Óõijõʼ¹¥»÷ÔØÌ壬£¬ £¬£¬Õ¼±È16%£¬£¬ £¬£¬Æä´ÎÊÇÆ¾Ö¤Ð¹Â¶ºÍÔÆÉèÖùýʧ¡£¡£¡£¡£¡£¡£Ò½ÁƱ£½¡ÐÐÒµÊý¾Ýй¶ÍùÍù»áÒ»Á¬231Ìì²Å±»·¢Ã÷£¬£¬ £¬£¬¶øÆäËüÐÐÒµÔòΪ204Ìì¡£¡£¡£¡£¡£¡£


https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/