´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ£¬£¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½£¬£¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®Ð§ÀÍÆ÷£¬£¬ÊÔͼ¼ÓÃÜÎļþ£¬£¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦£¬£¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£¡£ÏÖÔÚ£¬£¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥£¬£¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢£¬£¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£¡£Ö»¹ÜÄÚ²¿Ð§ÀÍÊܵ½Ò»¶¨ÏÞÖÆ£¬£¬µ«Òªº¦ÍⲿЧÀÍÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£¡£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ£¬£¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó£¬£¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß¡£¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇ󣬣¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣¡£¹ÙÔ±ÌåÏÖ£¬£¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨£¬£¬µ«½«½ß¾¡È«Á¦ïÔÌ­¶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ£¬£¬Èö²¥³ðÊÓÑÔÂÛ


9ÔÂ26ÈÕ£¬£¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-FiЧÀ͵ÄÍøÂçÇå¾²ÊÂÎñ¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾£¬£¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã£¬£¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£¡£Wi-FiЧÀÍÒÑÔÝÍ££¬£¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣¡£¾ÝÊӲ죬£¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ£¬£¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª£¬£¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ£¬£¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö£¬£¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ£¬£¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ£¬£¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²Ð§ÀÍÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶£¬£¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸°£¬£¬Ö¼ÔÚ¾¡¿ì»Ö¸´Ð§ÀͲ¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв£¬£¬Äê´´14Íò´¹ÂÚÍøÕ¾


9ÔÂ26ÈÕ£¬£¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨É裬£¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏßЧÀÍ×÷Ϊ¹¥»÷Ä¿µÄ£¬£¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å£¬£¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ£¬£¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓÐЧÀÍÆ÷ÉÏ¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ£¬£¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ£¬£¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ£¬£¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý£¬£¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀíЧÀÍÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù£¬£¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌ壬£¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦£¬£¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂڻµÄÔöÌí£¬£¬Òò´Ë£¬£¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ£¬£¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


9ÔÂ28ÈÕ£¬£¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©Æ­ÊֶΣ¬£¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ЭÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ£¬£¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò£¬£¬×ÜËðʧ³¬7ÍòÃÀÔª¡£¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈΣ¬£¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£¡£Õ©Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ£¬£¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Ó㬣¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðڲƭÉúÒ⣬£¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢£¬£¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é£¬£¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ£¬£¬´Ó¶øºã¾ÃDZÔÚ¡£¡£ÆÊÎöÏÔʾ£¬£¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂ磬£¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬Ö»¹ÜÊܺ¦ÕßÖڶ࣬£¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ£¬£¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©Æ­ÊֶεÄÈÏ֪ȱ·¦£¬£¬ÒÔ¼°Õ©Æ­Õßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷£¬£¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ£¬£¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾£¬£¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£¡£ÖÜÈý£¬£¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐУ¬£¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£¡£ÊÖÒÕÍŶÓѸËÙ½éÈ룬£¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏ룬£¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â£¬£¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏߣ¬£¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú£¬£¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲ⣬£¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£¡£×èÖ¹ÏÖÔÚ£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£¡£ÎÀÉú²¿Ç¿µ÷£¬£¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´£¬£¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬ÒÔ°ü¹Ü¹«¹²ÎÀÉúЧÀ͵ÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷


9ÔÂ27ÈÕ£¬£¬Î¢Èí·¢³öÖÒÑÔ£¬£¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ£¬£¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐΣ¬£¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´£¬£¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö£¬£¬Ò»Ö±½ø»¯£¬£¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£¡£½üÆÚ£¬£¬ËûÃÇÌØÊâ»îÔ¾£¬£¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂ磬£¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯£¬£¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖᣡ£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤£¬£¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë£¬£¬ÆÆËðͬ²½ÕË»§£¬£¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂ룬£¬Èƹý±£»£»£»¤¡£¡£µ½Êֺ󣬣¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ£¬£¬Î±×°³ÉÕýµ±Óû§Éí·Ý£¬£¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ£¬£¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷£¬£¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óᣡ£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/