Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶

Ðû²¼Ê±¼ä 2023-09-15

1¡¢Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬ £¬£¬Èí¼þBug¸ú×Ù¹«Ë¾RollbarµÄϵͳÔâµ½ÈëÇÖ£¬£¬ £¬£¬µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£RollbarÓÚ9ÔÂ6ÈÕÔÚÉó²éÊý¾Ý¿âÈÕ־ʱ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬£¬ £¬£¬¸ÃÈÕÖ¾ÏÔʾЧÀÍÕÊ»§±»ÓÃÀ´µÇ¼»ùÓÚÔÆµÄBug¼à¿ØÆ½Ì¨¡£¡£ºóÐøÊӲ췢Ã÷£¬£¬ £¬£¬¹¥»÷ÕßÔÚ8ÔÂ9ÈÕÖÁ8ÔÂ11ÈÕ»á¼ûÁËÆäϵͳ£¬£¬ £¬£¬Éæ¼°Ãô¸ÐµÄ¿Í»§ÐÅÏ¢£¬£¬ £¬£¬ÀýÈçÓû§Ãû¡¢ÓʼþµØµã¡¢ÕÊ»§ÃûºÍÏîÄ¿ÐÅÏ¢µÈ¡£¡£¸üÖ÷ÒªµÄÊÇ£¬£¬ £¬£¬¹¥»÷Õß»¹¼ìË÷Á˿ͻ§ÓëRollbarÏîÄ¿½»»¥µÄÏîÄ¿»á¼ûÁîÅÆ¡£¡£


https://www.bleepingcomputer.com/news/security/rollbar-discloses-data-breach-after-hackers-stole-access-tokens/


2¡¢Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯¾Ö(GMP)͸¶²¿·ÖÔ±¹¤µÄÐÅϢй¶


ýÌå9ÔÂ14Èճƣ¬£¬ £¬£¬Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯Ô±¾Ö(GMP)²¿·ÖÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬ £¬£¬Ôµ¹ÊÔ­ÓÉÊǵÚÈý·½¹©Ó¦ÉÌÔâµ½ÀÕË÷¹¥»÷¡£¡£Ðû²¼µÄÉùÃ÷ÖÐδÌá¼°±»¹¥»÷¹«Ë¾µÄÃû³Æ£¬£¬ £¬£¬µ«ËüÊÇGMPµÈÓ¢¹úÆäËü»ú¹¹µÄЧÀ͹©Ó¦ÉÌ¡£¡£GMP³ÆÔ±¹¤µÄ²ÆÎñÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£Ô¼Ò»¸öÔÂǰ£¬£¬ £¬£¬±±°®¶ûÀ¼¾¯¾Ö(PSNI)Ò²±¬·¢ÁËÒ»ÆðÀàËÆµÄÊÂÎñ£¬£¬ £¬£¬Ð¹Â¶ÁË10000¶àÃû¾¯Ô±µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡¢¾üÏκÍλÖᣡ£


https://securityaffairs.com/150828/data-breach/greater-manchester-police-gmp-data-breach.html


3¡¢SymantecÔÚ×°ÖÃLockBitʧ°ÜµÄ¹¥»÷Öз¢Ã÷еÄ3AM


9ÔÂ13ÈÕ£¬£¬ £¬£¬Symantec³ÆÆä·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þ3AM¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬Ê¹ÓÃ3AMµÄ¹¥»÷»î¶¯ºÜÉÙ¼û£¬£¬ £¬£¬Æù½ñΪֹ½öÔÚ¹¥»÷ÕßδÄÜ×°ÖÃLockBitµÄÒ»´Î¹¥»÷»î¶¯Öз¢Ã÷¹ý¸Ã¶ñÒâÈí¼þµÄ·Ö·¢¡£¡£3AMÓÉRust¿ª·¢£¬£¬ £¬£¬ÔÚ×îÏȼÓÃÜ֮ǰ£¬£¬ £¬£¬Ëü»áʵÑé×èÖ¹¶à¸öЧÀÍ£¬£¬ £¬£¬Íê³É¼ÓÃܺó»áɾ³ý¾íÓ°(VSS)¸±±¾¡£¡£ÆäΪ¼ÓÃÜÎļþ¸½¼ÓµÄÀ©Õ¹ÃûÊÇ.Threeamtime£¬£¬ £¬£¬Ñо¿Ö°Ô±ÉÐδȷ¶¨3AM±³ºóµÄ¹¥»÷ÕßÊÇ·ñÓëÒÑÖªµÄ¹¥»÷ÍÅ»ïÓйØÁª¡£¡£ 


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit


4¡¢TrendMicroÏêÊöRedLineºÍVidarÊÇÔõÑùʹÓÃEVÖ¤Êé


TrendMicroÔÚ9ÔÂ13ÈÕÏêÊöÁËRedLineºÍVidarµÄ¹¥»÷ÕßÔõÑùʹÓôøÓÐÀ©Õ¹ÑéÖ¤(EV)´úÂëÊðÃûµÄÖ¤Êé¡£¡£×îÐÂÊÓ²ìÏÔʾ£¬£¬ £¬£¬RedLineºÍVidar±³ºóµÄ¹¥»÷Õß×îÏÈʹÓÃÓëÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐòÏàͬµÄ·½·¨À´·Ö·¢ÀÕË÷Èí¼þpayload¡£¡£ÔÚÕâÒ»ÌØÊâ°¸ÀýÖУ¬£¬ £¬£¬Ä¿µÄ×î³õÊÕµ½µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´øÓÐÀ©Õ¹ÑéÖ¤£¨EV£©´úÂëÊðÃûÖ¤Ê飬£¬ £¬£¬²»¾ÃºóËûÃÇ×îÏÈͨ¹ýͬÑùµÄ;¾¶ÊÕµ½ÁËÀÕË÷Èí¼þpayload¡£¡£Ö»¹ÜCABFʵÑéÁ˸üÑÏ¿áµÄÇå¾²²½·¥£¬£¬ £¬£¬µ«¹¥»÷ÕßÈÔÄÜÈö²¥Ê¹ÓÃEVÖ¤Êé¾ÙÐÐÊðÃûµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£


https://www.trendmicro.com/en_us/research/23/i/redline-vidar-first-abuses-ev-certificates.html 


5¡¢Î¢ÈíÌáÐÑStorm-0324½üÆÚʹÓÃMS TeamsµÄ´¹ÂÚ¹¥»÷


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬ £¬£¬Î¢ÈíÌáÐÑÖ÷ÒªÓëÀÕË÷ÍÅ»ïÏàÖúµÄStorm-0324×î½üת¶øÊ¹ÓÃMicrosoft Teams´¹ÂÚ¹¥»÷À´ÈëÇÖÆóÒµÍøÂç¡£¡£´Ó7Ô·Ý×îÏÈ£¬£¬ £¬£¬Storm-0324±»·¢Ã÷ʹÓÃTeams·¢ËÍ´¹ÂÚÓÕ¶ü£¬£¬ £¬£¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâSharePointÍйÜÎļþµÄÁ´½Ó¡£¡£¹ØÓڴ˻£¬£¬ £¬£¬¸ÃÍÅ»ï×îÓпÉÄÜÒÀÀµÓÚÃûΪTeamsPhisherµÄ¿ªÔ´¹¤¾ß¡£¡£¸Ã¹¤¾ßÄܹ»Èƹý¶ÔÀ´×ÔÍⲿÓû§µÄ´«ÈëÎļþµÄÏÞÖÆ£¬£¬ £¬£¬²¢ÏòTeamsÓû§·¢ËÍ´¹ÂÚ¸½¼þ¡£¡£Î¢ÈíÌåÏÖºÜÊÇÖØÊÓÕâЩ´¹Âڻ£¬£¬ £¬£¬²¢ÍƳöÁ˶àÏîˢв½·¥£¬£¬ £¬£¬ÒÔ¸üºÃµØ·ÀÓùÕâЩ¹¥»÷¡£¡£ 


https://thehackernews.com/2023/09/microsoft-warns-of-new-phishing.html


6¡¢KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄ±¨¸æ


9ÔÂ13ÈÕ£¬£¬ £¬£¬KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄͳ¼Æ±¨¸æ¡£¡£2023ÄêÉϰëÄ꣬£¬ £¬£¬±»×èµ²¶ñÒ⹤¾ßµÄICSÅÌËã»ú±ÈÀý½Ï2022ÄêϰëÄêϽµÁË0.3¸ö°Ù·Öµã£¬£¬ £¬£¬½µÖÁ34%¡£¡£´ÓµØÀíλÖÃÀ´¿´£¬£¬ £¬£¬·ÇÖÞÔâµ½¹¥»÷µÄICSÅÌËã»ú×î¶à£¨Õ¼±È40.3%£©£¬£¬ £¬£¬¶ø±±Å·×îÉÙ£¨14.7%£©¡£¡£¹¤³ÌºÍICS¼¯³É£¨ÔöÌí2%£©¡¢ÖÆÔ죨ÔöÌí1.9%£©ºÍÄÜÔ´£¨ÔöÌí1.5%£©ÁìÓòÔâµ½¹¥»÷µÄICSÅÌËã»úÓÐËùÔöÌí¡£¡£» £»£»¥ÁªÍø¡¢µç×ÓÓʼþ¿Í»§¶ËºÍ¿ÉÒÆ¶¯×°±¸ÈÔÈ»ÊÇ×éÖ¯ÔËÓªÊÖÒÕ»ù´¡ÉèÊ©ÖÐÅÌËã»úµÄÖ÷ÒªÍþвȪԴ¡£¡£


https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/110605/