ÃÀ¹úDish NetworkÒÉËÆÔâµ½¹¥»÷ÍøÕ¾ºÍÓ¦ÓÃÎÞ·¨»á¼û
Ðû²¼Ê±¼ä 2023-02-271¡¢ÃÀ¹úDish NetworkÒÉËÆÔâµ½¹¥»÷ÍøÕ¾ºÍÓ¦ÓÃÎÞ·¨»á¼û
¾ÝýÌå2ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹úµçÊÓºÍÎÀÐǹ㲥ÌṩÉÌDish NetworkЧÀÍÖÐÖ¹¡£¡£¡£´Ë´ÎÖÐÖ¹Ó°ÏìÁËDish NetworkÍøÕ¾ºÍÓ¦ÓóÌÐò£¬£¬£¬£¬°üÀ¨Dish.com¡¢DishWireless.comºÍDish AnywhereµÈ£¬£¬£¬£¬¿Í»§Ò²ÎÞ·¨»á¼ûËûÃǵÄÕË»§»òÔÚÏß²¥·ÅµçÊÓ¡£¡£¡£±ðµÄ£¬£¬£¬£¬Dish NetworkµÄÔ¶³ÌÔ±¹¤ÌåÏÖÎÞ·¨»á¼ûÊÂÇéϵͳ¡£¡£¡£¾ÝDish NetworkµÄÒ»ÃûÔ±¹¤Í¸Â¶£¬£¬£¬£¬¸Ã¹«Ë¾È·ÊµÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬µ«²¢²»È·¶¨¹¥»÷ÕßÊÇÔõÑù»ñµÃ»á¼ûȨÏ޵ġ£¡£¡£
https://www.bleepingcomputer.com/news/security/dish-network-goes-offline-after-likely-cyberattack-employees-cut-off/
2¡¢Symantec·¢Ã÷ÐÂÍÅ»ïClasiopaÕë¶ÔÑÇÖÞij×éÖ¯µÄ¹¥»÷
SymantecÔÚ2ÔÂ23ÈÕ³ÆÆä·¢Ã÷кڿÍÍÅ»ïClasiopaÕë¶ÔÑÇÖÞij×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£Clasiopa»òÐíÓëÓ¡¶ÈÓйأ¬£¬£¬£¬ÆäÌØµãÊǾßÓÐÆæÒìµÄ¹¤¾ß¼¯£¬£¬£¬£¬°üÀ¨Ò»¸ö×Ô½ç˵¶ñÒâÈí¼þ(Backdoor.Atharvan)¡£¡£¡£¸ÃÍÅ»ïʹÓõÄѬȾǰÑÔÈÎȻδ֪£¬£¬£¬£¬µ«Ò»Ð©Ö¤¾ÝÅú×¢¹¥»÷Õßͨ¹ýÆËÃæÏò¹«ÖÚµÄЧÀÍÆ÷¾ÙÐб©Á¦¹¥»÷À´»ñµÃ»á¼ûȨÏÞ¡£¡£¡£ÈëÇÖʱËü»áɨ³ýϵͳ¼àÊÓÆ÷(Sysmon)ºÍÊÂÎñÈÕÖ¾£¬£¬£¬£¬²¢×°Ööà¸öºóÃÅ£¬£¬£¬£¬ÈçAtharvanºÍ¿ªÔ´Lilith RATµÄÐ޸İ汾£¬£¬£¬£¬À´ÍøÂçºÍй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research
3¡¢¼ÓÄôóµçÐŹ«Ë¾TelusÊÓ²ìÔ´´úÂëºÍÔ±¹¤Êý¾Ýй¶ÊÂÎñ
ýÌå2ÔÂ23Èճƣ¬£¬£¬£¬¼ÓÄôóµÚ¶þ´óµçÐŹ«Ë¾TelusÕýÔÚÊÓ²ìÆäÔ´´úÂëºÍÔ±¹¤Êý¾Ýй¶ÊÂÎñ¡£¡£¡£2ÔÂ17ÈÕ£¬£¬£¬£¬ºÚ¿ÍÔÚÂÛ̳ÉϳöÊ۾ݳÆÊÇTelusÔ±¹¤Ãûµ¥µÄÊý¾Ý£¬£¬£¬£¬Ñù±¾°üÀ¨TelusÔ±¹¤£¨ÓÈÆäÊÇÈí¼þ¿ª·¢Ö°Ô±ºÍÊÖÒÕÖ°Ô±£©µÄÐÕÃûºÍÓʼþµØµã¡£¡£¡£2ÔÂ21ÈÕ£¬£¬£¬£¬Í³Ò»ºÚ¿Í½¨ÉèÁËÁíÒ»¸öÂÛ̳Ìû×Ó£¬£¬£¬£¬Òª³öÊÛTelusµÄ˽ÈËGitHub´æ´¢¿â¡¢Ô´´úÂëÒÔ¼°¹«Ë¾µÄÈËΪµ¥¼Í¼¡£¡£¡£Telus½²»°È˳ƣ¬£¬£¬£¬ËûÃÇÕýÔÚÊÓ²ì´Îй¶ÊÂÎñ£¬£¬£¬£¬²¢È·Èϵ½ÏÖÔÚΪֹ£¬£¬£¬£¬ÉÐδ·¢Ã÷Èκι«Ë¾»òÁãÊÛ¿Í»§µÄÊý¾Ýй¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/telus-investigating-leak-of-stolen-source-code-employee-data/
4¡¢ÎÚ¿ËÀ¼CERT͸¶UAC-0056ÈëÇÖÆä¶à¸öÕþ¸®Ïà¹ØÍøÕ¾
ÎÚ¿ËÀ¼CERTÔÚ2ÔÂ23ÈÕ͸¶£¬£¬£¬£¬UAC-0056ÍÅ»ïÔÚÉÏÖÜÈëÇÖÁËÆä¶à¸öÕþ¸®Ïà¹ØÍøÕ¾¡£¡£¡£Ñо¿Ö°Ô±ÔÚÎÚ¿ËÀ¼ÖÐÑëºÍµØ·½Õþ¸®µÄ¶à¸öÍøÕ¾Éϼì²âµ½¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆä²¿·ÖÍøÒ³µÄÄÚÈݱ»¸Ä¶¯¡£¡£¡£¹¥»÷ÕßʹÓÃSSHºóÃÅCredPump£¨PAMÄ£¿£¿£¿£¿é£©ÊµÏÖÔ¶³ÌSSH»á¼û£¨Ê¹Óþ²Ì¬ÃÜÂëÖµ£©£¬£¬£¬£¬²¢ÔÚSSHÅþÁ¬Ê±´ú¼Í¼µÇ¼ºÍÃÜÂë¡£¡£¡£»£»£»£»£»£»¹Ê¹ÓÃÁËHoaxPenºÍHoaxApeºóÃÅ£¬£¬£¬£¬¶ñÒâ´úÂëÒÔApacheWebЧÀÍÆ÷Ä£¿£¿£¿£¿éµÄÐÎʽ·ºÆð£¬£¬£¬£¬²¢ÓÚ2022Äê2ÔÂ×°Öᣡ£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬webshellµÄ½¨Éèʱ¼ä²»ÍíÓÚ2021Äê12ÔÂ23ÈÕ¡£¡£¡£
https://securityaffairs.com/142678/cyber-warfare-2/cert-of-ukraine-russia-backdoors.html
5¡¢Ë¹Ì¹¸£´óѧÉèÖùýʧµ¼Ö²¿·Ö²©Ê¿ÉêÇëÕßµÄÐÅϢй¶
¾Ý2ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹ú˹̹¸£´óѧ¾¼Ãѧ²©Ê¿ÉêÇëÕßµÄÐÅϢй¶¡£¡£¡£¸ÃУÌåÏÖ£¬£¬£¬£¬1ÔÂ24ÈÕÆäÊÕµ½Í¨Öª£¬£¬£¬£¬ÓÉÓÚÎļþ¼ÐÉèÖÃÉèÖùýʧ£¬£¬£¬£¬¹«ÖÚ¿ÉÒÔͨ¹ýÍøÕ¾»á¼û°üÀ¨2022-23Äê˹̹¸£´óѧ¾¼Ãϵ²©Ê¿ÏîÄ¿ÈëѧÉêÇëÎļþµÄÎļþ¼Ð¡£¡£¡£ÔÚ¶Ô´ËʾÙÐÐÊÓ²ìºó£¬£¬£¬£¬·¢Ã÷ÎÞÏÞÖÆµÄ»á¼ûÊÇ´Ó2022Äê12ÔÂ5ÈÕ×îÏȵ쬣¬£¬£¬²¢ÇÒÔÚ2022Äê12ÔÂ5ÈÕÖÁ2023Äê1ÔÂ24ÈÕÖ®¼äÓйýÁ½´ÎÏÂÔØ¡£¡£¡£Ë¹Ì¹¸£´óѧÔÚ·¢Ã÷й¶ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹Á˶ÔÕâЩÎļþµÄ»á¼û¡£¡£¡£
https://www.bleepingcomputer.com/news/security/stanford-university-discloses-data-breach-affecting-phd-applicants/
6¡¢Ñо¿Ö°Ô±Åû¶ʹÓÃPureCrypter¹¥»÷Õþ¸®»ú¹¹µÄ»î¶¯
2ÔÂ23ÈÕ£¬£¬£¬£¬Menlo LabsÅû¶ÁËʹÓöñÒâÈí¼þÏÂÔØ³ÌÐòPureCrypter¹¥»÷Õþ¸®»ú¹¹µÄ»î¶¯¡£¡£¡£¹¥»÷ÕßʹÓÃDiscordÀ´Íйܳõʼpayload£¬£¬£¬£¬²¢ÈëÇÖÁËÒ»¸ö·ÇÓªÀû×éÖ¯À´´æ´¢»î¶¯ÖÐʹÓÃµÄÆäËüÖ÷»ú¡£¡£¡£¸Ã»î¶¯Èö²¥Á˶àÖÖÀàÐ͵ĶñÒâÈí¼þ£¬£¬£¬£¬°üÀ¨Redline Stealer¡¢AgentTesla¡¢Eternity¡¢BlackmoonºÍPhiladelphia Ransomware¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ÊӲ쵽µÄPureCrypter»î¶¯Ö÷ÒªÕë¶ÔÑÇÌ«µØÇøºÍ±±ÃÀµØÇøµÄ¶à¸öÕþ¸®»ú¹¹¡£¡£¡£
https://www.menlosecurity.com/blog/purecrypter-targets-government-entities-through-discord/


¾©¹«Íø°²±¸11010802024551ºÅ