KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-10-26
1¡¢KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷


KasperskyÔÚ10ÔÂ24ÈÕÅû¶ÁËÕë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£Ñо¿Ö°Ô±ÓÚ6ÔÂÊ״μì²âµ½¸Ã»î¶¯£¬£¬£¬¶øÔÚ8ÔÂÖÐÑ®·¢Ã÷ÁËа汾µÄºóÃÅ£¬£¬£¬¸ÃºóÞßÓиüÖØ´óµÄÈÆ¹ý¹¦Ð§£¬£¬£¬Åú×¢¹¥»÷ÕýÔÚ¾ÙÐÐÓÅ»¯¡£¡£¹¥»÷ʼÓÚÒ»¸ö°üÀ¨¶ñÒâARJÎļþµÄÓʼþ£¬£¬£¬ÆäÖÐÓÐÒ»¸öÓÕ¶üPDFÎĵµºÍÒ»¸öNSIS¾ç±¾£¬£¬£¬¸Ã¾ç±¾ÓÃÓÚ»ñÈ¡Ö÷Òªpayload²¢Æô¶¯Ëü¡£¡£Kaspersky³Æ£¬£¬£¬Í³Ò»´¹Âڻ»¹Èö²¥ÁËÁ½¸öÃûΪNetrunnerºÍDmcservµÄºóÃÅ£¬£¬£¬ÕâЩÊǾßÓвî±ðC2ЧÀÍÆ÷ÉèÖõÄÏàͬ¶ñÒâÈí¼þ¡£¡£


https://securelist.ru/ataki-na-industrialnyj-i-gosudarstvennyj-sektory-rf/108229/


2¡¢·¨¹úÖ°ÒµÇò¶ÓASVELÔâµ½NoEscape¹¥»÷32GBÊý¾Ýй¶


¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬·¨¹úÖ°ÒµÀºÇò¶ÓLDLC ASVEL(ASVEL)Ôâµ½ÁËÀÕË÷ÍÅ»ïNoEscapeµÄ¹¥»÷¡£¡£NoEscapeÔÚ10ÔÂ9ÈÕ½«¸ÃÇò¶Ó¼ÓÈëÆäÍøÕ¾£¬£¬£¬LDLC ASVELÓÚ10ÔÂ12ÈÕͨ¹ýýÌåÊÕµ½Í¨Öª¡£¡£¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁË32GBÊý¾Ý£¬£¬£¬°üÀ¨ÇòÔ±µÄСÎÒ˽¼Ò×ÊÁÏ¡¢»¤ÕÕºÍÉí·ÝÖ¤£¬£¬£¬Óë²ÆÎñ¡¢Ë°ÎñºÍÖ´·¨ÊÂÎñÏà¹ØµÄÎļþ£¬£¬£¬ÒÔ¼°±£ÃÜЭÒé¡¢ÌõÔ¼ºÍÉñÃØÐżþµÈ¡£¡£ÀÕË÷ÍÅ»ïÍþвÈôÊDz»½»Êê½ð£¬£¬£¬¾Í»áÔÚ10ÔÂ20ÈÕ֮ǰÐû²¼ÕâЩÊý¾Ý¡£¡£ÏÖÔÚ£¬£¬£¬ASVELÒѱ»´ÓNoEscapeµÄÍøÕ¾É¾³ý£¬£¬£¬Åú×¢¶þÕß¿ÉÄÜÕýÔÚ¾ÙÐÐ̸ÅС£¡£


https://www.bleepingcomputer.com/news/security/asvel-basketball-team-confirms-data-breach-after-ransomware-attack/


3¡¢Redcliffe LabsµÄ7TBÊý¾Ýй¶ӰÏìÔ¼1200Íò»¼Õß


ýÌå10ÔÂ25Èճƣ¬£¬£¬Ó¡¶È±±·½°îŵÒÁ´ïµÄÒ½Áƹ«Ë¾Redcliffe LabsµÄ7TBÒ½ÁÆÊý¾Ýй¶£¬£¬£¬Ó°ÏìÁËÔ¼1200Íò»¼Õß¡£¡£×î³õ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö²»ÊÜÃÜÂë±£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬×ܾÞϸΪ7TB£¬£¬£¬°üÀ¨Ô¼12347297Ìõ¼Í¼£¬£¬£¬¾­ÊÓ²ìÕâЩÊý¾Ý¼¯ÊôÓÚRedcliffe Labs¡£¡£ÆäÖУ¬£¬£¬³ýÁËÓдó×Ú»¼ÕßСÎÒ˽¼ÒºÍÒ½ÁÆÊý¾ÝÖ®Í⣬£¬£¬»¹°üÀ¨¸Ã¹«Ë¾Òƶ¯Ó¦ÓóÌÐòµÄ¿ª·¢Îļþ¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÊý¾Ý¿âÒѱ»±£»£»£»£»¤ÆðÀ´£¬£¬£¬Éв»ÇåÎú¹ûÕæÁ˶à¾Ã¡£¡£


https://www.hackread.com/database-mess-up-7tb-healthcare-data-leak/


4¡¢ÎÚ¿ËÀ¼NCS§³§³³ÆSmokeloader¶ñÒâÈí¼þ¹¥»î¶¯¼¤Ôö 


10ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÇ徲Эµ÷ÖÐÐÄ(NCS§³§³)³Æ£¬£¬£¬Ê¹ÓöñÒâÈí¼þSmokeloaderµÄ¹¥»÷»î¶¯¼¤Ôö¡£¡£NCS§³§³Ñо¿ÏÔʾ£¬£¬£¬×Ô5ÔÂÒÔÀ´£¬£¬£¬¶ñÒâÈí¼þÔËÓªÍÅ»ïÕë¶ÔÎÚ¿ËÀ¼µÄʵÌåÌᳫÁË´ó¹æÄ£´¹ÂÚ¹¥»÷£¬£¬£¬Ö¼ÔÚÈëÇÖϵͳ²¢ÇÔÊØÐÅÏ¢¡£¡£ÔÚ×î½üµÄ»î¶¯ÖУ¬£¬£¬ºÚ¿ÍʹÓÃSmokeloader¹¥»÷Õþ¸®»ú¹¹ºÍ½ðÈÚʵÌ壬£¬£¬ÌØÊâÊÇ»á¼ÆÐÐÒµ¡£¡£ËûÃÇͨ¹ý½ðÈÚÖ÷ÌâµÄ´¹ÂÚÓʼþÀ´ÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬È»ºóÇÔÊØÐÅÏ¢¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õß»¹»áÆÆËð»ã¿îÁ÷³Ì£¬£¬£¬Í¨¹ýÌæ»»Õýµ±ÕÊ»§µÄÏêϸÐÅÏ¢À´½«×ʽðÖØ¶¨Ïòµ½×Ô¼ºµÄÕÊ»§£¬£¬£¬ÕâÍ»ÏÔÁ˹¥»÷Õßһֱת±äµÄÕ½ÂÔ¡£¡£


https://therecord.media/surge-in-smokeloader-malware-attacks-targeting-ukrainian-financial-gov-orgs


5¡¢Salt Security¹ûÕæ¹ØÓÚOAuthЭÒéʵÏÖAPIµÄÎó²î


10ÔÂ24ÈÕ£¬£¬£¬Salt SecurityÐû²¼ÁËеÄÑо¿£¬£¬£¬Õ¹ÏÖÁËGrammarly¡¢VidioºÍBukalapakµÈÔÚÏ߯½Ì¨µÄOAuthЭÒéʵÏÖÖÐAPIµÄÎó²î¡£¡£ÕâЩÎó²îÓпÉÄÜй¶Óû§Æ¾Ö¤²¢µ¼ÖÂÕÊ»§±»ÍêÈ«½ÓÊÜ£¬£¬£¬´Ó¶øÓ°ÏìÊýÊ®ÒÚÓû§£¬£¬£¬ÏÖÒÑ»ñµÃ½â¾ö¡£¡£¸ÃÑо¿ÖÐ×îÍ»³öµÄÒ»µãÊÇ£¬£¬£¬OAuth×÷Ϊsocial-login±³ºóµÄÖ÷ÒªÊÖÒÕ£¬£¬£¬×Åʵ±»Éè¼ÆµÃºÜºÃ£¬£¬£¬Ã»ÓÐÏÔ×ÅÎÊÌâ¡£¡£²»¹ý£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼ÎÊÌâ¶¼ÓëʹÓÃOAuthµÄ¸÷·½ÓÃÀ´ÊµÏÖOAuthµÄ·½·¨ÓйØ¡£¡£


https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts


6¡¢NCC GroupÐû²¼2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


10ÔÂ24ÈÕ£¬£¬£¬NCC GroupÐû²¼ÁË2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¼Ì8Ô·ݵÄÏà¶ÔÇå¾²ºó£¬£¬£¬9Ô·ݵÄÀÕË÷»î¶¯µÖ´ïÁËØ¨¹ÅδÓеÄˮƽ£¬£¬£¬¶à´ï514¸öÄ¿µÄÔâµ½¹¥»÷£¬£¬£¬½Ï2022Äêͬ±ÈÔöÌí153%¡£¡£Ö÷ÒªµÄ¹¥»÷ÍÅ»ïÊÇLockBit 3.0£¨Ìᳫ79´Î¹¥»÷£©¡¢LostTrust£¨53´Î£©ºÍBlackCat£¨47´Î£©¡£¡£±±ÃÀµØÇøÔâµ½µÄ¹¥»÷×î¶à£¨Õ¼50%£©£¬£¬£¬Æä´ÎÊÇÅ·ÖÞ£¨30%£©ºÍÑÇÖÞ£¨9%£©¡£¡£Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÀÕË÷¹¥»÷´ó·ùÔöÌí£¬£¬£¬½Ï8Ô»·±ÈÔöÌí86%¡£¡£


https://newsroom.nccgroup.com/news/ncc-group-monthly-threat-pulse-september-2023-474190