Ñо¿Ö°Ô±Åû¶ʹÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµµÄ»î¶¯

Ðû²¼Ê±¼ä 2023-11-01

1¡¢Ñо¿Ö°Ô±Åû¶ʹÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµµÄ»î¶¯


¾ÝýÌå10ÔÂ30ÈÕ±¨µÀ£¬ £¬ £¬£¬£¬ £¬Ò»ÖÖÃûΪBiBi-LinuxµÄÐÂÐÍWiper¶ñÒâÈí¼þÕýÔÚ±»ÓÃÓÚÕë¶ÔÒÔÉ«ÁеĹ«Ë¾µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇx64 ELF¿ÉÖ´ÐÐÎļþ£¬ £¬ £¬£¬£¬ £¬Ã»ÓлìÏýµÈ±£»£»£»¤²½·¥£¬ £¬ £¬£¬£¬ £¬ÕâʹÑо¿Ö°Ô±µÄÆÊÎöÀú³Ì±äµÃÔ½·¢ÈÝÒס£¡£¡£¡£¡£¡£Ëü¿ÉÖ¸¶¨Ä¿µÄÎļþ¼Ð£¬ £¬ £¬£¬£¬ £¬ÈôÊÇÒÔrootȨÏÞÔËÐÐÔò¿ÉÄÜ»áÏú»ÙÕû¸öϵͳ¡£¡£¡£¡£¡£¡£BiBi-Linux»¹Ê¹ÓöàÏ̺߳ÍÐÐÁÐϵͳÀ´Ìá¸ßËÙÂʺÍЧÂÊ¡£¡£¡£¡£¡£¡£VirusTotal³Æ£¬ £¬ £¬£¬£¬ £¬ÏÖÔÚ£¬ £¬ £¬£¬£¬ £¬Ö»ÓÐÁ½¼ÒÇå¾²¹©Ó¦É̵ĶñÒâÈí¼þɨÃèÒýÇæ½«BiBi-Linux¼ì²âΪ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-bibi-linux-wiper-malware-targets-israeli-orgs-in-destructive-attacks/ 


2¡¢Unit 42·¢Ã÷ʹÓÃIAMƾ֤µÄ¼ÓÃÜÐ®ÖÆ¹¥»÷EleKtra-Leak


 Unit 42ÔÚ10ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÐµĹ¥»÷»î¶¯EleKtra-Leak£¬ £¬ £¬£¬£¬ £¬¿É×Ô¶¯¶¨Î»¹ûÕæGitHub´æ´¢¿âÖÐ̻¶µÄÉí·ÝºÍ»á¼ûÖÎÀí(IAM)ƾ֤£¬ £¬ £¬£¬£¬ £¬Ö¼ÔÚ¾ÙÐмÓÃÜÇ®±ÒÐ®ÖÆ»î¶¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ×Ô2020Äê12Ô¾ÍÒ»Ö±»îÔ¾£¬ £¬ £¬£¬£¬ £¬²¢ÓÚ½ñÄê8ÔÂ30ÈÕÖÁ10ÔÂ6ÈÕ´Ó¶à´ï474¸öAmazon EC2ʵÀýÖÐÍÚ¾òÃÅÂÞ±Ò¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬ £¬£¬£¬ £¬¹¥»÷ÕßÄܹ»ÔÚIAMƾ֤Ê×´Î̻¶µÄÎå·ÖÖÓÄھͼì²â²¢Ê¹ÓÃËü£¬ £¬ £¬£¬£¬ £¬»¹»á°Ñ¹ûÕæIAMƾ֤µÄAWSÕË»§ÁÐÈëºÚÃûµ¥¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/


3¡¢eSentireÑÝʾ½«Ä¿µÄÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾µÄWiki-Slack¹¥»÷


¾Ý10ÔÂ30ÈÕ±¨µÀ£¬ £¬ £¬£¬£¬ £¬eSentireÑо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖеÄWiki-Slack¹¥»÷£¬ £¬ £¬£¬£¬ £¬¿É½«×¨ÒµÈËÊ¿ÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÑ¡ÔñÒ»¸öWikipediaÖ÷Ì⣬ £¬ £¬£¬£¬ £¬È»ºó½øÈëÌõÄ¿µÄÊ×Ò³²¢±à¼­Ò³Ã棬 £¬ £¬£¬£¬ £¬Ìí¼ÓÒ»¸öÕýµ±µÄ²Î¿¼½Å×¢¡£¡£¡£¡£¡£¡£ÔÚSlackÉÏ·ÖÏíÎÄÕÂʱ£¬ £¬ £¬£¬£¬ £¬Ò»µ©Öª×ãijЩ¸½¼ÓÌõ¼þ£¬ £¬ £¬£¬£¬ £¬Slack½«·ºÆðÔÚԭʼWikipediaÖв»¿É¼ûµÄÁ´½Ó¡£¡£¡£¡£¡£¡£Òò´Ë£¬ £¬ £¬£¬£¬ £¬×¨ÒµÈËÊ¿½«WikipediaÌõÄ¿¸´ÖƵ½Slackʱ¾Í»á·ºÆð¶ñÒâÁ´½Ó£¬ £¬ £¬£¬£¬ £¬ÈôÊÇÁ´½ÓµÄÓï·¨Éè¼ÆµÃ×ã¹»ºÃ£¬ £¬ £¬£¬£¬ £¬SlackÓû§¾Í»á±»ÎüÒý²¢µã»÷Ëü£¬ £¬ £¬£¬£¬ £¬´Ó¶ø±»Öض¨Ïòµ½¶ñÒâÍøÕ¾£¬ £¬ £¬£¬£¬ £¬ÆäÖпÉÄÜÓлùÓÚä¯ÀÀÆ÷µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/153245/hacking/wiki-slack-attack.html


4¡¢WiHDÉèÖùýʧй¶½ü10ÍòtorrentÓû§µÄÏêϸÐÅÏ¢


ýÌå10ÔÂ31Èճƣ¬ £¬ £¬£¬£¬ £¬World-in-HD(WiHD)ÉèÖùýʧ£¬ £¬ £¬£¬£¬ £¬Ð¹Â¶ÁË97327¸öÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£WiHDÊÇÒ»¿îÊ¢ÐеÄ˽ÈËÖÖ×Ó¸ú×Ù³ÌÐò£¬ £¬ £¬£¬£¬ £¬×¢²áÓû§¿ÉÒÔ»á¼û·¨ÓïºÍÓ¢ÓïµÄµçÊӾ硢ӰϷ¡¢¶¯»­µÈÄÚÈÝ¡£¡£¡£¡£¡£¡£¸Ã˽È˸ú×Ù³ÌÐòͨ³£½ö½ÓÊÜÔ¼Ç룬 £¬ £¬£¬£¬ £¬Ò»Ð©ÈËÒÔÁè¼Ý100ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸ÃÍøÕ¾µÄÔ¼Çë¡£¡£¡£¡£¡£¡£Cybernews·¢Ã÷ÁËWiHDµÄÒ»¸ö¹ûÕæµÄElasticsearch£¬ £¬ £¬£¬£¬ £¬Ã»ÓÐÈκÎÃÜÂë±£»£»£»¤£¬ £¬ £¬£¬£¬ £¬Ð¹Â¶ÁËÓû§µç×ÓÓʼþ¡¢IPµØµã¡¢Ð§ÀÍÐÅÏ¢¡¢Óû§ÃûºÍËùÓÐtorrentÓû§µÄÃÜÂë¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/153296/deep-web/wihd-data-leak.html


5¡¢SlashNextÐû²¼2023ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ


10ÔÂ30ÈÕ±¨µÀ³Æ£¬ £¬ £¬£¬£¬ £¬SlashNextÐû²¼ÁË2023ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ¶Ô2022ÄêQ4ÖÁ2023ÄêQ3µÄ12¸öÔÂÄÚͨ¹ýµç×ÓÓʼþ¡¢Òƶ¯×°±¸ºÍä¯ÀÀÆ÷ÊӲ쵽µÄ¹¥»÷»î¶¯¾ÙÐÐÁËÆÊÎö¡£¡£¡£¡£¡£¡£È¥ÄêQ4ÒÔÀ´£¬ £¬ £¬£¬£¬ £¬´¹ÂÚµç×ÓÓʼþ¼¤ÔöÁË1265%£¬ £¬ £¬£¬£¬ £¬Æ¾Ö¤ÍøÂç´¹ÂÚ¹¥»÷ÔöÌíÁË967%¡£¡£¡£¡£¡£¡£×ÔChatGPTÍÆ³öÒÔÀ´£¬ £¬ £¬£¬£¬ £¬µç×ÓÓʼþ´¹ÂÚ´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£ÆäËüÖ÷ÒªµÄ·¢Ã÷°üÀ¨£¬ £¬ £¬£¬£¬ £¬Æ½¾ùÌìÌì31000´Î´¹ÂÚ¹¥»÷£¬ £¬ £¬£¬£¬ £¬ÆäÖÐ68%±»Ê¶±ðΪ»ùÓÚÎı¾µÄBEC¡£¡£¡£¡£¡£¡£77%µÄרҵÈËÊ¿Ôø³ÉΪ´¹ÂÚ¹¥»÷µÄÄ¿µÄ£¬ £¬ £¬£¬£¬ £¬ÆäÖÐ28%µÄ¹¥»÷ÊÇͨ¹ý¶ÌОÙÐеÄ¡£¡£¡£¡£¡£¡£


https://slashnext.com/state-of-phishing-2023/


6¡¢FortinetÐû²¼¹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö±¨¸æ


10ÔÂ30ÈÕ£¬ £¬ £¬£¬£¬ £¬FortinetÐû²¼Á˹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö±¨¸æ¡£¡£¡£¡£¡£¡£KnightÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷ÍŻ £¬ £¬£¬£¬ £¬ÓÚ½ñÄê8Ô·ºÆð¡£¡£¡£¡£¡£¡£KnightµÄǰÉíCyclopsÓµÓÐÊÊÓÃÓÚWindows¡¢LinuxºÍMac OSµÄ¶àϵͳ¹¤¾ß¡£¡£¡£¡£¡£¡£Òò´Ë£¬ £¬ £¬£¬£¬ £¬ËäÈ»Ñо¿Ö°Ô±½ö·¢Ã÷ÁËKnightµÄWindows°æ±¾£¬ £¬ £¬£¬£¬ £¬µ«ÆäËû°æ±¾¿ÉÄÜÕýÔÚ·ºÆð¡£¡£¡£¡£¡£¡£KnightÕë¶Ô¶à¸ö±ÊÖ±ÐÐÒµ£¬ £¬ £¬£¬£¬ £¬ÆäÖÐÁãÊÛÐÐÒµÊÜÓ°Ïì×î´ó¡£¡£¡£¡£¡£¡£°´µØÇø·ÖÀ࣬ £¬ £¬£¬£¬ £¬ÃÀ¹úÔâµ½µÄKnight¹¥»÷×î¶à¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/ransomware-roundup-knight