ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2022-08-12
1¡¢Ä³Æû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

      

8ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Sophos͸¶ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»Èý¸öÀÕË÷ÍÅ»ïLockBit¡¢HiveºÍBlackCat¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£ÕâÈý¸ö¹¥»÷ÍŻﶼʹÓÃÁËÏàͬµÄ¹ýʧÉèÖ㬣¬£¬£¬£¬£¬¼´ÔÚÖÎÀíЧÀÍÆ÷ÉÏ̻¶ÁËÔ¶³Ì×ÀÃæÐ­ÒéµÄ·À»ðǽ¹æÔò¡£¡£¡£ ¡£¡£¡£¡£5ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬Lockbit½¨ÉèÁËÁ½¸öÅú´¦Öóͷ£¾ç±¾£¨1.batºÍ2.bat£©£¬£¬£¬£¬£¬£¬Í¨¹ýPsExecÉÏ·Ö·¢ÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬¼ÓÃÜÁË19̨Ö÷»úÉϵÄÎļþ£»£»£»£»£»£»£»£»Á½¸öСʱ֮ºó£¬£¬£¬£¬£¬£¬HiveʹÓÃÒÑ×°ÖÃÔÚϵͳÉϵĵÄÕýµ±Èí¼þPDQ DeployÀ´·Ö·¢ÆäÀÕË÷Èí¼þ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬¼ÓÃÜÁË16̨Ö÷»úµÄÎļþ£»£»£»£»£»£»£»£»5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬BlackCatʹÓñ»Ñ¬È¾Óû§µÄƾ֤ÔÚ6̨Ö÷»úÉÏͶ·ÅÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/


2¡¢Cloudflare͸¶¶àÃûÔ±¹¤Ôâµ½ÓëTwilioÀàËÆµÄ´¹ÂÚ¹¥»÷  

      

¾ÝýÌå8ÔÂ10Èճƣ¬£¬£¬£¬£¬£¬CloudflareÅû¶ÆäÖÁÉÙÓÐ76ÃûÔ±¹¤¼°Æä¾ìÊôÔâµ½ÁËÀàËÆÓÚÕë¶ÔTwilioµÄÖØ´ó´¹ÂÚ¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£Õâ´Î¹¥»÷ԼĪÓëÕë¶ÔTwilioµÄ¹¥»÷ͬʱ±¬·¢£¬£¬£¬£¬£¬£¬À´×Ô4¸öÓëT-Mobile¿¯ÐеÄSIM¿¨Ïà¹ØµÄµç»°ºÅÂ룬£¬£¬£¬£¬£¬ÕâЩ¶ÌÐÅÖ¸ÏòÒ»¸ö¿´ËÆÕýµ±µÄÓò£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Òªº¦×ÖCloudflareºÍOkta£¬£¬£¬£¬£¬£¬ÊÔͼÓÕʹԱ¹¤½»³öƾ֤¡£¡£¡£ ¡£¡£¡£¡£CloudflareÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐÈýÃûÔ±¹¤ÒÑÊÜÆ­ÊÜÆ­£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚʹÓûá¼ûÆäÓ¦ÓóÌÐòËùÐèµÄÇкÏFIDO2±ê×¼µÄÎïÀíÇå¾²ÃÜÔ¿£¬£¬£¬£¬£¬£¬ÆäÄÚ²¿ÏµÍ³²¢Î´±»¹¥ÆÆ¡£¡£¡£ ¡£¡£¡£¡£


https://thehackernews.com/2022/08/hackers-behind-twilio-breach-also_10.html


3¡¢Volexity³ÆZimbraÖÐÎó²î±»ÓÃÀ´¹¥»÷ÉÏǧ̨ZCSЧÀÍÆ÷

      

VolexityÔÚ8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ZimbraÉíÖеÄÎó²îÒѱ»Ê¹ÓÃÀ´ÈëÇÖÁè¼Ý1000̨Zimbra Collaboration Suite(ZCS)ÓʼþЧÀÍÆ÷¡£¡£¡£ ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔçÔÚ6ÔÂβ¾Í×îÏÈÔÚÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-37042£©µÄ×ÊÖúÏ£¬£¬£¬£¬£¬£¬À´Ê¹ÓÃZCSÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27925£©¡£¡£¡£ ¡£¡£¡£¡£VolexityÒÔΪ£¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄʹÓ÷½·¨Óë2021ÄêÍ··¢Ã÷µÄMicrosoft Exchange 0dayµÄʹÓ÷½·¨Ò»Ö¡£¡£¡£ ¡£¡£¡£¡£ZimbraÔÚͨ¸æÖв¢Î´Í¸Â¶Îó²îʹÓÃÇéÐΣ¬£¬£¬£¬£¬£¬ µ«Ò»ÃûÔ±¹¤ÔÚ¹«Ë¾ÂÛ̳ÉϽ¨ÒéÓû§Á¬Ã¦×°Öò¹¶¡£¬£¬£¬£¬£¬£¬³ÆÎó²îȷʵÒÑÔÚ¹¥»÷Öб»Ê¹Óᣡ£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/zimbra-auth-bypass-bug-exploited-to-breach-over-1-000-servers/


4¡¢Cisco Meraki·À»ðǽÎ󱨵¼ÖÂMicrosoft 365ЧÀÍÖÐÖ¹

      

ýÌå8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ò»Á¬µÄÖÐÖ¹Ó°ÏìÁ˶à¸öMicrosoft 365ЧÀÍ£¬£¬£¬£¬£¬£¬Óû§ÎÞ·¨ÅþÁ¬µ½Exchange Online¡¢Microsoft Teams¡¢Outlook×ÀÃæ¿Í»§¶ËºÍOneDrive for Business¡£¡£¡£ ¡£¡£¡£¡£ËäȻ΢ÈíÌåÏÖ´ËÊÂÎñ½öÓ°ÏìÁËEMEA£¨Å·ÖÞ¡¢Öж«ºÍ·ÇÖÞ£©µØÇøµÄ¿Í»§£¬£¬£¬£¬£¬£¬µ«È«ÇòÓû§¶¼ÔÚ±¨¸æÐ§ÀÍÆ÷ÅþÁ¬ºÍµÇ¼ʧ°ÜÎÊÌâ¡£¡£¡£ ¡£¡£¡£¡£³õ³ÌÐò²é·¢Ã÷£¬£¬£¬£¬£¬£¬Ò»Á¬ÖÐÖ¹¿ÉÄÜÓëCisco Meraki·À»ðǽÈëÇÖ¼ì²âºÍÔ¤·À(IDR)Îó±¨×èÖ¹Microsoft 365ÅþÁ¬²¢·¢³öMicrosoft Windows IIS¾Ü¾øÐ§ÀÍʵÑ龯±¨Óйء£¡£¡£ ¡£¡£¡£¡£Î¢Èí×îÖÕÈ·ÈÏÖÐÖ¹ÊÇSnort¹æÔò1-60381µ¼ÖµÄ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖCisco MerakiÒѽûÓÃÁËÊÜÓ°ÏìµÄ¹æÔò¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-triggered-by-meraki-firewall-false-positive/


5¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þBlueSkyʹÓöàÏ߳̿ìËÙ¼ÓÃÜ

      

Unit 42ÔÚ8ÔÂ10ÈÕ¹ûÕæÁËÐÂÀÕË÷Èí¼þ¼Ò×åBlueSkyµÄÊÖÒÕϸ½Ú¡£¡£¡£ ¡£¡£¡£¡£BlueSkyÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔWindowsÖ÷»ú£¬£¬£¬£¬£¬£¬²¢Ê¹ÓöàÏ̼߳ÓÃÜÖ÷»úÉϵÄÎļþÀ´¼ÓËÙ¼ÓÃÜËÙÂÊ¡£¡£¡£ ¡£¡£¡£¡£ÆÊÎöÀú³ÌÖÐÑо¿Ö°Ô±´ÓBlueSkyµÄÑù±¾Öз¢Ã÷ÁË¿ÉÒÔÓëContiÁªÏµÆðÀ´µÄ´úÂëÖ¸ÎÆ£¬£¬£¬£¬£¬£¬ÌØÊâÊÇBlueSkyµÄ¶àÏ̼ܹ߳¹ÓëConti v3µÄ´úÂëÏàËÆ£¬£¬£¬£¬£¬£¬ÍøÂçËÑË÷Ä£¿£¿£¿éÒ²ÊÇËüµÄÍêÈ«·­°æ¡£¡£¡£ ¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬£¬£¬BlueSkyÓëBabuk¸üΪÏàËÆ£¬£¬£¬£¬£¬£¬Á½Õß¶¼Ê¹ÓÃChaCha20£¬£¬£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃCurve25519À´ÌìÉúÃÜÔ¿¡£¡£¡£ ¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/bluesky-ransomware/


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þVileRATµÄÆÊÎö±¨¸æ

      

8ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼±¨¸æ³ÆDeathStalkerÔÚ2022Äê¼ÌÐøÊ¹ÓÃVileRAT¹¥»÷È«ÇòµÄ¼ÓÃÜÇ®±ÒÉúÒâЧÀÍ¡£¡£¡£ ¡£¡£¡£¡£VileRATÊÇÒ»¸ö¾­ÓÉ»ìÏýºÍ´ò°üµÄPython3 RAT£¬£¬£¬£¬£¬£¬¾ßÓÐÖ´ÐÐí§ÒâÔ¶³ÌÏÂÁî¡¢¼üÅ̼ͼºÍ´ÓC2ЧÀÍÆ÷×ÔÎÒ¸üеȹ¦Ð§£¬£¬£¬£¬£¬£¬ÔÚ2020ÄêQ2Ê״α»·¢Ã÷¡£¡£¡£ ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Æù½ñΪֹ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­È·¶¨ÁËÊý°Ù¸öÓëVileRATѬȾÁ´Ïà¹ØµÄÓò¡£¡£¡£ ¡£¡£¡£¡£2021Äê8ÔÂÖÁ½ñ£¬£¬£¬£¬£¬£¬ÔÚ±£¼ÓÀûÑÇ¡¢ÈûÆÖ·˹¡¢µÂ¹ú¡¢¸ñÁÖÄɶ¡Ë¹¡¢¿ÆÍþÌØ¡¢Âí¶úËû¡¢°¢À­²®ÁªºÏÇõ³¤¹úºÍ¶íÂÞ˹Áª°î·¢Ã÷ÁË10¸ö±»Ñ¬È¾Ä¿µÄ¡£¡£¡£ ¡£¡£¡£¡£


https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/