ŦԼ½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-09-201¡¢Å¦Ô¼½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå9ÔÂ17ÈÕ±¨µÀ£¬£¬Î»ÓÚŦԼµÄ½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÌṩÉÌEmpress EMS£¨½ôÆÈÒ½ÁÆÐ§ÀÍ£©Åû¶ÁËÒ»Æð¿Í»§ÐÅϢй¶ÊÂÎñ¡£¡£Æ¾Ö¤Í¨Öª£¬£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ»á¼ûȨÏÞ£¬£¬ÔÚÔ¼Ò»¸ö°ëÔº󣬣¬¼´7ÔÂ13ÈÕÇÔÈ¡ÁËһС²¿·ÖÎļþ¡£¡£Empress EMSÕýÔÚ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬²¢ÎªÇкÏÌõ¼þµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£Ö»¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬£¬µ«Ðí¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£¡£
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ
ýÌå9ÔÂ19Èճƣ¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬²¢»ñµÃÁËСÎÒ˽¼ÒÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬£¬Ö®ºóÁ¬Ã¦±£»£»¤ÁËÊÊÓõÄÓʼþÕÊ»§£¬£¬²¢Ô¼ÇëÁ˵ÚÈý·½Ç徲ȡ֤¹«Ë¾¾ÙÐÐÊӲ죬£¬ÒÔÈ·¶¨ÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£¡£¸Ãº½¿Õ¹«Ë¾¾Ü¾øÍ¸Â¶ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÄ¿£¬£¬µ«ÌåÏÖÕâÊÇÒ»¸öºÜÊÇСµÄÊý×Ö£¬£¬ÇÒûÓÐÊý¾Ý±»ÀÄÓ㬣¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£¡£
https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/
3¡¢CISAºÍNSAÐû²¼¿ª·ÅÎÞÏßµç½ÓÈëÍøÂçÇå¾²µÄ×¢ÖØÊÂÏî
9ÔÂ16ÈÕ£¬£¬CISAºÍNSAÐû²¼ÁË¿ª·ÅÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©Çå¾²µÄ×¢ÖØÊÂÏî¡£¡£Open RANÊǹŰåRAN¼Ü¹¹ÑݱäΪ¿ª·Å»¥²Ù×÷½Ó¿Ú¡¢ÐéÄ⻯¡¢´óÊý¾ÝºÍÖ§³ÖÈ˹¤ÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓ£¬Open RAN¼Ü¹¹·¿ªÁËÔÆºÍÐéÄ⻯µÄ´óÃÅ£¬£¬Í¬Ê±Í¨¹ý½¨Éè¶à¹©Ó¦ÉÌÉú̬ϵͳÀ´Ôö½ø¾ºÕù¼Ó¾ç¡¢¹©Ó¦É̶àÑùÐÔºÍÁ¢Òì¡£¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëʵÑ鿪·ÅRAN¼Ü¹¹Ïà¹ØµÄÀûÒæºÍÇå¾²×¢ÖØÊÂÏ£¬CISAÃãÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©Ó¦É̺ÍÀûÒæÏà¹ØÕßÉó²éÕâÐ©×¢ÖØÊÂÏî¡£¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security
4¡¢ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÈÏÕæ
¾Ý9ÔÂ15ÈÕ±¨µÀ£¬£¬ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾BellÊÖÒÕ½â¾ö¼Æ»®(BTS)ϵͳµÄ¹¥»÷ÈÏÕæ¡£¡£BTSÊÇÒ»¼ÒÓµÓÐ4500¶àÃûÔ±¹¤µÄ×ÔÁ¦×Ó¹«Ë¾£¬£¬×¨ÃÅΪ°²¼òªʡºÍ¿ý±±¿ËÊ¡µÄסլºÍСÐÍÆóÒµ¿Í»§×°ÖÃBellЧÀÍ¡£¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐ͸¶¹¥»÷±¬·¢µÄʱ¼ä£¬£¬µ«HiveÔÚÆäÍøÕ¾ÖÐÌåÏÖÔÚÔ¼Ò»¸öÔÂǰ£¬£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£¡£BTSµÄÍøÕ¾ÏÖÔÚÈÔÎÞ·¨»á¼û£¬£¬²¿·Ö¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ÐÅϢй¶¡£¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒÈö²¥
KasperskyÔÚ9ÔÂ15ÈÕ͸¶£¬£¬Ò»¸öеĶñÒâÈí¼þ°üʹÓñ»¹¥»÷µÄYouTubeƵµÀÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒÈö²¥¡£¡£ÕâЩÊÓÆµÍ¨³£°üÀ¨ÏÂÔØ¼ÙµÄÆÆ½âºÍ×÷±×Èí¼þµÄÁ´½Ó£¬£¬ÏÖʵÉÏ»á×°ÖÃ×ÔÎÒÈö²¥µÄ¶ñÒâÈí¼þ°ü£¬£¬Ö÷ÒªÕë¶ÔFIFA¡¢×îÖÕÀíÏë¡¢¼«ÏÞ¾ºËÙµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÈÓÎÏ·µÄ·ÛË¿¡£¡£Ôʼ°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬£¬ÆäÖаüÀ¨Ðí¶à¶ñÒâÎļþ¡£¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬£¬»®·ÖΪRedLineÇÔÈ¡³ÌÐò¡¢¿ó¹¤ºÍÅú´¦Öóͷ£Îļþ¡£¡£
https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
6¡¢AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
9ÔÂ15ÈÕ£¬£¬AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£×Ô9Ô³õÒÔÀ´£¬£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢Ã÷ÁËTeamTNT»î¶¯µÄ¼£Ï󣬣¬²¢ÏàПúڿÍ×éÖ¯ÓÖ×îÏÈÐж¯ÁË¡£¡£Ñо¿Ö°Ô±ÔÚTeamTNTÐÂÒ»ÂֵĻÖÐÊӲ쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬£¬Ê¹Óñ»Ð®ÖÆÐ§ÀÍÆ÷µÄÅÌËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»£»Cronb¹¥»÷£¬£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈÊÖÒÕ£»£»What Will Be¹¥»÷£¬£¬Õë¶ÔDockerÊØ»¤Àú³Ì£¬£¬Ê¹ÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬£¬Ê¹ÓÃÎó²î´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£¡£
https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt


¾©¹«Íø°²±¸11010802024551ºÅ