IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-08-16

1¡¢IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶


¾ÝýÌå8ÔÂ14ÈÕ±¨µÀ£¬ £¬£¬ £¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖÝÒ½ÁƱ£½¡Õþ²ßÓëÈÚ×ʲ¿(HCPF)ÏòÁè¼Ý400ÍòÈË·¢³ö֪ͨ£¬ £¬£¬ £¬³ÆÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËËûÃǵÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£HCPF³ÎÇå˵£¬ £¬£¬ £¬ËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷£¬ £¬£¬ £¬¿ÉÊÇËûÃǵijаüÉÌIBMÔâµ½ÁËÕë¶ÔMOVEitµÄ¹¥»÷¡£¡£¡£¡£6ÔÂ13ÈÕÊӲ췢Ã÷£¬ £¬£¬ £¬IBMʹÓõÄMOVEitÓ¦ÓÃÉϵIJ¿·ÖHCPFÎļþÔÚ5ÔÂ28ÈÕ×óÓÒ±»»á¼û£¬ £¬£¬ £¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ä³Ð©Health First ColoradoºÍCHP+»áÔ±ÐÅÏ¢µÄÎļþ¡£¡£¡£¡£×ܹ²Ó°ÏìÁË4091794ÈË£¬ £¬£¬ £¬HPCF½«Í¨¹ýExperianΪÊÜÓ°ÏìÓû§ÌṩÁ½ÄêµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/colorado-warns-4-million-of-data-stolen-in-ibm-moveit-breach/


2¡¢Akamai·¢Ã÷Õë¶ÔÔËÐÐMagento 2µÄµçÉÌÆ½Ì¨µÄXurum»î¶¯


AkamaiÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÔËÐÐMagento 2 CMSµÄµçÉÌÆ½Ì¨µÄ¹¥»÷»î¶¯£¬ £¬£¬ £¬²¢½«¸Ã»î¶¯ÃüÃûΪXurum¡£¡£¡£¡£»£»£»î¶¯Ê¼ÓÚ1Ô·ݣ¬ £¬£¬ £¬Ê¹ÓÃÁËAdobe CommerceºÍMagento Open SourceÖеÄЧÀÍÆ÷¶ËÄ£°å×¢ÈëÎó²î£¨CVE-2022-24086£©¡£¡£¡£¡£¹¥»÷ÕßËÆºõ¶ÔÄ¿µÄMagentoÊÐËÁÒÑÍù10ÌìÄÚËù϶©µ¥µÄ¸¶¿îͳ¼ÆÊý¾Ý¸ÐÐËȤ¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËwso-ng£¬ £¬£¬ £¬ÕâÊÇа汾µÄWSO webshell¡£¡£¡£¡£»£»£»î¶¯»¹Ê¹ÓÃÁ˽ϾɵÄDirty COWÎó²î(CVE-2016-5195)£¬ £¬£¬ £¬ÒÔʵÑéÔÚLinuxÖÐÌáȨ¡£¡£¡£¡£ÓÐÖ¤¾ÝÅú×¢¹¥»÷Óë¶íÂÞ˹Óйء£¡£¡£¡£ 


https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell


3¡¢ÀÕË÷Èí¼þMonti¾íÍÁÖØÀ´Ö÷ÒªÕë¶ÔÖ´·¨ºÍÕþ¸®ÁìÓò»ú¹¹


8ÔÂ14ÈÕ£¬ £¬£¬ £¬Trend Micro·¢Ã÷ʱ¸ô2¸öÔºóMonti¾íÍÁÖØÀ´£¬ £¬£¬ £¬ÖØµã¹Ø×¢Ö´·¨ºÍÕþ¸®ÁìÓò»ú¹¹¡£¡£¡£¡£Óë´Ëͬʱ£¬ £¬£¬ £¬»ùÓÚLinuxƽ̨µÄMontiбäÌåÒ²ÒѸ¡³öË®Ãæ£¬ £¬£¬ £¬Óë֮ǰµÄ°æ±¾ÓÐ×ÅÏÔ×Ųî±ð¡£¡£¡£¡£ÒÔǰ°æ±¾ºÜºéÁ÷ƽÉÏ»ùÓÚContiй¶µÄ´úÂ루99%£©£¬ £¬£¬ £¬µ«ÐÈÎÃüܳÌÐòµÄÏàËÆ¶È½öΪ29%¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬ £¬Í¨¹ý¶Ô´úÂ루ÓÈÆäÊǼÓÃÜËã·¨£©¾ÙÐдó×ÚÐ޸ģ¬ £¬£¬ £¬MontiÈÆ¹ý¼ì²âµÄÄÜÁ¦»ñµÃÌá¸ß£¬ £¬£¬ £¬ÕâÔöÌíÁ˼ì²â»ººÍ½â´ËÀà¶ñÒâ»î¶¯µÄÄѶȡ£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/monti-ransomware-unleashes-a-new-encryptor-for-linux.html


4¡¢ZscaleÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT


ZscaleÔÚ8ÔÂ10ÈÕÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøµÄ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT¡£¡£¡£¡£×èÖ¹6Ô·ݣ¬ £¬£¬ £¬JanelaRATÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøÒøÐкͽðÈÚ»ú¹¹£¬ £¬£¬ £¬Ö¼ÔÚÇÔÈ¡½ðÈںͼÓÃÜÇ®±ÒÏà¹ØÊý¾Ý£¬ £¬£¬ £¬²¢Ê¹ÓÃÀ´×ÔÕýµ±ÈªÔ´£¨ÈçVMWareºÍMicrosoft£©µÄDLL²à¼ÓÔØÊÖÒÕÀ´Èƹý¼ì²â¡£¡£¡£¡£±ðµÄ£¬ £¬£¬ £¬JanelaRAT¾ßÓд°¿ÚÎÊÌâ¸ÐÖª»úÖÆ£¬ £¬£¬ £¬²¢½ÓÄɶ¯Ì¬Ì×½ÖÉ×ÓèÖÃϵͳ¡£¡£¡£¡£JanelaRATµÄ¿ª·¢Õß¿ÉÄÜ´ÓBX RATµÄ´úÂëÖлñµÃÁËÁé¸Ð£¬ £¬£¬ £¬µ«Ëü½ö¾ß±¸BX RATÌṩµÄ²¿·Ö¹¦Ð§£¬ £¬£¬ £¬Ã»Óе¼ÈëshellÏÂÁîÖ´Ðеȹ¦Ð§¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/janelarat-repurposed-bx-rat-variant-targeting-latam-fintech


5¡¢Kaspersky³Æ´ó×Ú±»ºÚµÄWPÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷


¾Ý8ÔÂ14ÈÕ±¨µÀ£¬ £¬£¬ £¬Kaspersky·¢Ã÷´ó×Ú±»ºÚµÄWordPressÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷¡£¡£¡£¡£5ÔÂ15ÈÕµ½7ÔÂ31ÈÕ£¬ £¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁË22400¸öWordPressÍøÕ¾±»ºÚ¿Í¹¥»÷ÒÔ½¨Éè´¹ÂÚÒ³Ãæ¡£¡£¡£¡£Í³Ò»Ê±ÆÚÄÚ£¬ £¬£¬ £¬Óû§×ܹ²ÊµÑé»á¼û±»Ñ¬È¾ÍøÕ¾ÉÏÍйܵÄÐéÎ±Ò³Ãæ200213´Î¡£¡£¡£¡£×î³£±»´¹ÂÚ¹¥»÷µÄЧÀÍºÍÆóÒµ°üÀ¨Netflix¡¢Å·ÖÞµÄÒøÐкͳ£¼ûµÄ¿ìµÝЧÀÍ¡£¡£¡£¡£Kaspersky»¹ÏêÊöÁËÄÄÐ©ÍøÕ¾×îÈÝÒ×Ôâµ½ºÚ¿Í¹¥»÷¡¢ÔõÑùÈëÇÖWordPressÍøÕ¾ÒÔ¼°WordPressÍøÕ¾±»ºÚµÄ¼£ÏóµÈ¡£¡£¡£¡£


https://securelist.com/phishing-with-hacked-sites/110334/


6¡¢UptycsÐû²¼¹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ


8ÔÂ14ÈÕ£¬ £¬£¬ £¬UptycsÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ8ÔÂÉÏÑ®·¢Ã÷Á˸öñÒâÈí¼þ£¬ £¬£¬ £¬Ëüͨ¹ýTelegramºÍDiscordƽ̨¾ÙÐÐÈö²¥¡£¡£¡£¡£Ã¿Öܶ©ÔÄ·ÑΪ150¬²¼£¬ £¬£¬ £¬µ«Ò²ÓÐÓÐÏÞµÄÃâ·Ñ°æ±¾¡£¡£¡£¡£Ò»µ©×°Ö㬠£¬£¬ £¬RAT¾Í»áÉñÃØÍøÂçÊý¾Ý£¬ £¬£¬ £¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄTelegram bot¡£¡£¡£¡£ÎªÁËÈÆ¹ýɱ¶¾Èí¼þµÄ¼ì²â£¬ £¬£¬ £¬RATͨ¹ýTelegram bot¾ÙÐÐC2¡£¡£¡£¡£³ýÁËÇÔÈ¡Êý¾ÝÖ®Í⣬ £¬£¬ £¬QwixxRAT»¹ÓµÓÐǿʢµÄÔ¶³ÌÖÎÀí¹¤¾ß£¬ £¬£¬ £¬¿É¿ØÖÆÄ¿µÄ×°±¸ºÍÆô¶¯ÏÂÁî¡£¡£¡£¡£


https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram