ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2022-08-12
1¡¢Ä³Æû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

      

8ÔÂ10ÈÕ£¬£¬£¬£¬ £¬£¬Sophos͸¶ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»Èý¸öÀÕË÷ÍÅ»ïLockBit¡¢HiveºÍBlackCat¹¥»÷¡£¡£¡£ÕâÈý¸ö¹¥»÷ÍŻﶼʹÓÃÁËÏàͬµÄ¹ýʧÉèÖ㬣¬£¬£¬ £¬£¬¼´ÔÚÖÎÀíЧÀÍÆ÷ÉÏ̻¶ÁËÔ¶³Ì×ÀÃæÐ­ÒéµÄ·À»ðǽ¹æÔò¡£¡£¡£5ÔÂ1ÈÕ£¬£¬£¬£¬ £¬£¬Lockbit½¨ÉèÁËÁ½¸öÅú´¦Öóͷ£¾ç±¾£¨1.batºÍ2.bat£©£¬£¬£¬£¬ £¬£¬Í¨¹ýPsExecÉÏ·Ö·¢ÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ£¬£¬£¬£¬ £¬£¬¼ÓÃÜÁË19̨Ö÷»úÉϵÄÎļþ£»£»£»£»£»£»Á½¸öСʱ֮ºó£¬£¬£¬£¬ £¬£¬HiveʹÓÃÒÑ×°ÖÃÔÚϵͳÉϵĵÄÕýµ±Èí¼þPDQ DeployÀ´·Ö·¢ÆäÀÕË÷Èí¼þ¶þ½øÖÆÎļþ£¬£¬£¬£¬ £¬£¬¼ÓÃÜÁË16̨Ö÷»úµÄÎļþ£»£»£»£»£»£»5ÔÂ15ÈÕ£¬£¬£¬£¬ £¬£¬BlackCatʹÓñ»Ñ¬È¾Óû§µÄƾ֤ÔÚ6̨Ö÷»úÉÏͶ·ÅÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/


2¡¢Cloudflare͸¶¶àÃûÔ±¹¤Ôâµ½ÓëTwilioÀàËÆµÄ´¹ÂÚ¹¥»÷  

      

¾ÝýÌå8ÔÂ10Èճƣ¬£¬£¬£¬ £¬£¬CloudflareÅû¶ÆäÖÁÉÙÓÐ76ÃûÔ±¹¤¼°Æä¾ìÊôÔâµ½ÁËÀàËÆÓÚÕë¶ÔTwilioµÄÖØ´ó´¹ÂÚ¹¥»÷¡£¡£¡£Õâ´Î¹¥»÷ԼĪÓëÕë¶ÔTwilioµÄ¹¥»÷ͬʱ±¬·¢£¬£¬£¬£¬ £¬£¬À´×Ô4¸öÓëT-Mobile¿¯ÐеÄSIM¿¨Ïà¹ØµÄµç»°ºÅÂ룬£¬£¬£¬ £¬£¬ÕâЩ¶ÌÐÅÖ¸ÏòÒ»¸ö¿´ËÆÕýµ±µÄÓò£¬£¬£¬£¬ £¬£¬ÆäÖаüÀ¨Òªº¦×ÖCloudflareºÍOkta£¬£¬£¬£¬ £¬£¬ÊÔͼÓÕʹԱ¹¤½»³öƾ֤¡£¡£¡£CloudflareÌåÏÖ£¬£¬£¬£¬ £¬£¬ÓÐÈýÃûÔ±¹¤ÒÑÊÜÆ­ÊÜÆ­£¬£¬£¬£¬ £¬£¬µ«ÓÉÓÚʹÓûá¼ûÆäÓ¦ÓóÌÐòËùÐèµÄÇкÏFIDO2±ê×¼µÄÎïÀíÇå¾²ÃÜÔ¿£¬£¬£¬£¬ £¬£¬ÆäÄÚ²¿ÏµÍ³²¢Î´±»¹¥ÆÆ¡£¡£¡£


https://thehackernews.com/2022/08/hackers-behind-twilio-breach-also_10.html


3¡¢Volexity³ÆZimbraÖÐÎó²î±»ÓÃÀ´¹¥»÷ÉÏǧ̨ZCSЧÀÍÆ÷

      

VolexityÔÚ8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬ZimbraÉíÖеÄÎó²îÒѱ»Ê¹ÓÃÀ´ÈëÇÖÁè¼Ý1000̨Zimbra Collaboration Suite(ZCS)ÓʼþЧÀÍÆ÷¡£¡£¡£¾ÝϤ£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÔçÔÚ6ÔÂβ¾Í×îÏÈÔÚÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-37042£©µÄ×ÊÖúÏ£¬£¬£¬£¬ £¬£¬À´Ê¹ÓÃZCSÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27925£©¡£¡£¡£VolexityÒÔΪ£¬£¬£¬£¬ £¬£¬¸ÃÎó²îµÄʹÓ÷½·¨Óë2021ÄêÍ··¢Ã÷µÄMicrosoft Exchange 0dayµÄʹÓ÷½·¨Ò»Ö¡£¡£¡£ZimbraÔÚͨ¸æÖв¢Î´Í¸Â¶Îó²îʹÓÃÇéÐΣ¬£¬£¬£¬ £¬£¬ µ«Ò»ÃûÔ±¹¤ÔÚ¹«Ë¾ÂÛ̳ÉϽ¨ÒéÓû§Á¬Ã¦×°Öò¹¶¡£¡£¡£¬£¬£¬£¬ £¬£¬³ÆÎó²îȷʵÒÑÔÚ¹¥»÷Öб»Ê¹Óᣡ£¡£


https://www.bleepingcomputer.com/news/security/zimbra-auth-bypass-bug-exploited-to-breach-over-1-000-servers/


4¡¢Cisco Meraki·À»ðǽÎ󱨵¼ÖÂMicrosoft 365ЧÀÍÖÐÖ¹

      

ýÌå8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬Ò»Á¬µÄÖÐÖ¹Ó°ÏìÁ˶à¸öMicrosoft 365ЧÀÍ£¬£¬£¬£¬ £¬£¬Óû§ÎÞ·¨ÅþÁ¬µ½Exchange Online¡¢Microsoft Teams¡¢Outlook×ÀÃæ¿Í»§¶ËºÍOneDrive for Business¡£¡£¡£ËäȻ΢ÈíÌåÏÖ´ËÊÂÎñ½öÓ°ÏìÁËEMEA£¨Å·ÖÞ¡¢Öж«ºÍ·ÇÖÞ£©µØÇøµÄ¿Í»§£¬£¬£¬£¬ £¬£¬µ«È«ÇòÓû§¶¼ÔÚ±¨¸æÐ§ÀÍÆ÷ÅþÁ¬ºÍµÇ¼ʧ°ÜÎÊÌâ¡£¡£¡£³õ³ÌÐò²é·¢Ã÷£¬£¬£¬£¬ £¬£¬Ò»Á¬ÖÐÖ¹¿ÉÄÜÓëCisco Meraki·À»ðǽÈëÇÖ¼ì²âºÍÔ¤·À(IDR)Îó±¨×èÖ¹Microsoft 365ÅþÁ¬²¢·¢³öMicrosoft Windows IIS¾Ü¾øÐ§ÀÍʵÑ龯±¨ÓйØ¡£¡£¡£Î¢Èí×îÖÕÈ·ÈÏÖÐÖ¹ÊÇSnort¹æÔò1-60381µ¼Öµģ¬£¬£¬£¬ £¬£¬²¢ÌåÏÖCisco MerakiÒѽûÓÃÁËÊÜÓ°ÏìµÄ¹æÔò¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-triggered-by-meraki-firewall-false-positive/


5¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þBlueSkyʹÓöàÏ߳̿ìËÙ¼ÓÃÜ

      

Unit 42ÔÚ8ÔÂ10ÈÕ¹ûÕæÁËÐÂÀÕË÷Èí¼þ¼Ò×åBlueSkyµÄÊÖÒÕϸ½Ú¡£¡£¡£BlueSkyÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔWindowsÖ÷»ú£¬£¬£¬£¬ £¬£¬²¢Ê¹ÓöàÏ̼߳ÓÃÜÖ÷»úÉϵÄÎļþÀ´¼ÓËÙ¼ÓÃÜËÙÂÊ¡£¡£¡£ÆÊÎöÀú³ÌÖÐÑо¿Ö°Ô±´ÓBlueSkyµÄÑù±¾Öз¢Ã÷ÁË¿ÉÒÔÓëContiÁªÏµÆðÀ´µÄ´úÂëÖ¸ÎÆ£¬£¬£¬£¬ £¬£¬ÌØÊâÊÇBlueSkyµÄ¶àÏ̼ܹ߳¹ÓëConti v3µÄ´úÂëÏàËÆ£¬£¬£¬£¬ £¬£¬ÍøÂçËÑË÷Ä£¿£¿éÒ²ÊÇËüµÄÍêÈ«·­°æ¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬ £¬£¬BlueSkyÓëBabuk¸üΪÏàËÆ£¬£¬£¬£¬ £¬£¬Á½Õß¶¼Ê¹ÓÃChaCha20£¬£¬£¬£¬ £¬£¬Í¬Ê±Ê¹ÓÃCurve25519À´ÌìÉúÃÜÔ¿¡£¡£¡£


https://unit42.paloaltonetworks.com/bluesky-ransomware/


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þVileRATµÄÆÊÎö±¨¸æ

      

8ÔÂ10ÈÕ£¬£¬£¬£¬ £¬£¬KasperskyÐû²¼±¨¸æ³ÆDeathStalkerÔÚ2022Äê¼ÌÐøÊ¹ÓÃVileRAT¹¥»÷È«ÇòµÄ¼ÓÃÜÇ®±ÒÉúÒâЧÀÍ¡£¡£¡£VileRATÊÇÒ»¸ö¾­ÓÉ»ìÏýºÍ´ò°üµÄPython3 RAT£¬£¬£¬£¬ £¬£¬¾ßÓÐÖ´ÐÐí§ÒâÔ¶³ÌÏÂÁî¡¢¼üÅ̼ͼºÍ´ÓC2ЧÀÍÆ÷×ÔÎÒ¸üеȹ¦Ð§£¬£¬£¬£¬ £¬£¬ÔÚ2020ÄêQ2Ê״α»·¢Ã÷¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬£¬Æù½ñΪֹ£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÒѾ­È·¶¨ÁËÊý°Ù¸öÓëVileRATѬȾÁ´Ïà¹ØµÄÓò¡£¡£¡£2021Äê8ÔÂÖÁ½ñ£¬£¬£¬£¬ £¬£¬ÔÚ±£¼ÓÀûÑÇ¡¢ÈûÆÖ·˹¡¢µÂ¹ú¡¢¸ñÁÖÄɶ¡Ë¹¡¢¿ÆÍþÌØ¡¢Âí¶úËû¡¢°¢À­²®ÁªºÏÇõ³¤¹úºÍ¶íÂÞ˹Áª°î·¢Ã÷ÁË10¸ö±»Ñ¬È¾Ä¿µÄ¡£¡£¡£


https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/