Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈЧÀÍÔݲ»¿ÉÓÃ

Ðû²¼Ê±¼ä 2023-09-13

1¡¢Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈЧÀÍÔݲ»¿ÉÓÃ


¾ÝýÌå9ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ã׸ß÷¹ú¼ÊÂùݼ¯ÍÅ(MGM Resorts International)͸¶ÆäÕýÔÚ´¦Öóͷ£Ó°Ï첿·ÖϵͳµÄÍøÂçÇå¾²ÎÊÌâ¡£¡£¶È¼Ù´åµÄϵͳ×ÔÉÏÖÜÈÕÍíÉÏ×îÏȹرÕ£¬£¬£¬£¬£¬£¬ËùÓÐʹÓÃÓëÖ÷ÍøÕ¾ÏàͬÓòÃû£¨¼´mgmresorts.com£©µÄÍøÕ¾ÒÑÖÐÖ¹£¬£¬£¬£¬£¬£¬MGM RewardsÓ¦ÓóÌÐòÎÞ·¨ÔËÐС£¡£ÀÏ»¢»ú¡¢ATM»úºÍÐÅÓÿ¨×°±¸¶¼Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬Ò»Ð©¿ÍÈË»¹³Æ·¿¼äÔ¿³×ÎÞ·¨Ê¹Óᣡ£±ðµÄ£¬£¬£¬£¬£¬£¬Ã׸ß÷ÆìÏÂÂùݣ¨°üÀ¨Bellagio Hotel£©µÄϵͳҲ·ºÆð¹ÊÕÏ¡£¡£´Ë´ÎÇå¾²ÊÂÎñµÄÐÔ×ÓÉÐδ¹ûÕæ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄÈÔ²»Ã÷È·¡£¡£


https://therecord.media/mgm-resorts-offline-after-cyberattack


2¡¢Î¢ÈíÐû²¼9Ô·ÝÇå¾²¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓõÄÎó²î


΢ÈíÔÚ9ÔÂ12ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË59¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Á½¸öÒѱ»Ê¹ÓõÄÎó²î¡£¡£±»Ê¹ÓÃÎó²î»®·ÖÊÇMicrosoftÁ÷ЧÀÍÊðÀíÌáȨÎó²î£¨CVE-2023-36802£©ºÍMicrosoft WordÐÅϢй¶Îó²î£¨CVE-2023-36761£©¡£¡£´Ë´ÎÐÞ¸´µÄÆäËü½ÏΪÑÏÖØµÄÎó²îÊÇVisual StudioÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-36796¡¢CVE-2023-36792ºÍCVE-2023-36793£©¡¢Microsoft Azure KubernetesЧÀÍÌáȨÎó²î£¨CVE-2023-29332£©ºÍInternetÅþÁ¬¹²Ïí(ICS)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-38148£©¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2023-patch-tuesday-fixes-2-zero-days-59-flaws/


3¡¢ÀÕË÷ÍÅ»ïSnatch¹ûÕæ¼ÓÄôó»¤Ê¿Ð­»áµÄ37 GBÊý¾Ý


¾Ý9ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¼ÓÄôó»¤Ê¿Ð­»á(CNA)͸¶ÆäÔâµ½ºÚ¿Í¹¥»÷µ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¸ÃЭ»á´ú±íÁ˼ÓÄôó½ü50ÍòÃû»¤Ê¿£¬£¬£¬£¬£¬£¬Æä½²»°È˳Ƹûú¹¹ÔÚ4ÔÂ3ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬²¢Î´Ó°ÏìÆäÔËÓª£¬£¬£¬£¬£¬£¬Ö»ÊÇÓ°ÏìÁ˲¿·Öϵͳ¡£¡£Á½¸ö²î±ðµÄÀÕË÷ÍÅ»ïSnatchºÍNokoyawaÉù³Æ¶Ô5Ô·ݵĹ¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬µ«ÔÚ9ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬Snatchй¶ÁËÀ´×ÔCNAµÄ37 GBÊý¾Ý¡£¡£Snatch×î½ü»¹Éù³Æ¹¥»÷ÁËÄϷǹú·À²¿²¢ÇÔÈ¡ÁË1.6 TBÊý¾Ý£¬£¬£¬£¬£¬£¬µ«¶à¼ÒýÌå֤ʵ£¬£¬£¬£¬£¬£¬Snatchй¶µÄÊý¾ÝÖÐÖÁÉÙÓÐÒ»²¿·ÖÊÇÕýµ±µÄ¡£¡£


https://therecord.media/cna-confirms-data-incident


4¡¢Charming KittenʹÓúóÃÅSponsor¹¥»÷ÖÁÉÙ34¼Ò¹«Ë¾


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ESETÅû¶ÁËCharming KittenʹÓÃкóÃÅSponsorµÄ¹¥»÷»î¶¯Sponsoring Access¡£¡£¸Ã»î¶¯µÄÒ»Á¬Ê±¼äΪ2021Äê3ÔÂÖÁ2022Äê6Ô£¬£¬£¬£¬£¬£¬Õë¶ÔÕþ¸®ºÍÒ½ÁƱ£½¡»ú¹¹£¬£¬£¬£¬£¬£¬ÒÔ¼°½ðÈÚЧÀÍ¡¢¹¤³Ì¡¢ÖÆÔì¡¢ÊÖÒÕ¡¢Ö´·¨ºÍµçÐŵÈÁìÓòµÄ¹«Ë¾£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѹ¥»÷°ÍÎ÷¡¢ÒÔÉ«ÁкͰ¢À­²®ÁªºÏÇõ³¤¹úµÄÖÁÉÙ34¼Ò¹«Ë¾¡£¡£¹¥»÷ÕßʹÓÃMicrosoft Exchange RCEÎó²î£¨CVE-2021-26855£©»ñµÃ³õʼ»á¼ûȨÏÞ¡£¡£SponsorÊÇÒ»¸öC++ºóÃÅ£¬£¬£¬£¬£¬£¬ÓÃÓÚÍøÂçÖ÷»úÐÅÏ¢£¬£¬£¬£¬£¬£¬´¦Öóͷ£ÎüÊÕµ½µÄÖ¸Áî²¢½«Ð§¹û·¢ËÍ»ØÐ§ÀÍÆ÷¡£¡£


https://www.welivesecurity.com/en/eset-research/sponsor-batch-filed-whiskers-ballistic-bobcats-scan-strike-backdoor/


5¡¢Ñо¿Ö°Ô±·¢Ã÷¿Éͨ¹ýWiFiÇÔÈ¡Êý×ÖÃÜÂëµÄWiKI-Eve¹¥»÷


ýÌå9ÔÂ11Èճƣ¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪWiKI-EveµÄÐÂÐ͹¥»÷¿ÉÒÔ×èµ²ÅþÁ¬µ½WiFi·ÓÉÆ÷µÄÖÇÄÜÊÖ»úµÄÃ÷ÎÄ´«Ê䣬£¬£¬£¬£¬£¬²¢ÒԸߴï90%µÄ׼ȷÂÊÍÆ¶Ï³öµ¥¸öÊý×Ö»÷¼ü£¬£¬£¬£¬£¬£¬À´ÇÔÈ¡Êý×ÖÃÜÂë¡£¡£ÔÚ¹¥»÷µÄÖ÷Òª½×¶Î£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃWiresharkµÈÁ÷Á¿¼à¿Ø¹¤¾ß²¶»ñÄ¿µÄÊäÈëÃÜÂëʱ´úµÄBFI£¨²¨Êø³ÉÐη´ÏìÐÅÏ¢£©Ê±¼äÐòÁС£¡£Ã¿´ÎÄ¿µÄ°´Ï°´¼üʱ£¬£¬£¬£¬£¬£¬¶¼»áÌìÉúÆæÒìµÄWiFiÐźÅ¡£¡£¼Í¼µÄBFIÐòÁпÉÄÜ»áÄ£ºý»÷¼üÖ®¼äµÄ½çÏߣ¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖËã·¨£¬£¬£¬£¬£¬£¬ÓÃÓÚÆÊÎöºÍ»Ö¸´¿ÉÓÃÊý¾Ý¡£¡£ÊµÑéÅú×¢£¬£¬£¬£¬£¬£¬ÔÚʹÓÃÏ£º±»Ö¸´Ëã·¨ºÍÓò×Ô˳ӦµÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬WiKI-EveµÄ»÷¼ü·ÖÀàµÄ׼ȷÂÊÎȹÌÔÚ88.9%¡£¡£


https://www.bleepingcomputer.com/news/security/new-wiki-eve-attack-can-steal-numerical-passwords-over-wifi/


6¡¢KasperskyÐû²¼¹ØÓÚCubaÍÅ»ïÀúÊ·¼°TTPsµÄÆÊÎö±¨¸æ


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼¹ØÓÚCubaÍÅ»ïÀúÊ·¼°TTPsµÄÆÊÎö±¨¸æ¡£¡£CubaÓÚ2020Äêµ×Ê×´ÎÒýÆðÑо¿Ö°Ô±µÄ×¢ÖØ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢¼ÓÄôóºÍÅ·ÖÞ¡£¡£¸ÃÍÅ»ïʹÓõĶñÒâÈí¼þ°üÀ¨Bughatch¡¢Burntcigar¡¢Cobeacon¡¢Hancitor (Chanitor)¡¢Termite¡¢SystemBC¡¢Veeamp¡¢WedgecutºÍRomCOM RAT£¬£¬£¬£¬£¬£¬¹¤¾ß°üÀ¨Mimikatz¡¢PowerShell¡¢PsExecºÍRemote Desktop Protocol£¬£¬£¬£¬£¬£¬Ê¹ÓõÄÎó²î°üÀ¨ProxyShell¡¢ProxyLogon¡¢VeeamÎó²îºÍZeroLogon¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹°üÀ¨ÁËCubaÏà¹ØÊÂÎñµÄÊӲ켰¶ñÒâÈí¼þµÄÆÊÎö¡£¡£


https://securelist.com/cuba-ransomware/110533/