΢ÈíÐû²¼3Ô¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓÃÎó²îÔÚÄÚµÄ83¸öÎó²î

Ðû²¼Ê±¼ä 2023-03-15

1¡¢Î¢ÈíÐû²¼3Ô¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓÃÎó²îÔÚÄÚµÄ83¸öÎó²î


3ÔÂ14ÈÕ£¬£¬£¬Î¢ÈíÐû²¼2023Äê3ÔµÄÖܶþ²¹¶¡£¬£¬£¬ÐÞ¸´Á˰üÀ¨Á½¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ83¸öÎó²î£¬£¬£¬´Ë¼ÆÊý²»°üÀ¨21¸öMicrosoft EdgeÎó²î ¡£¡£¡£¡£¡£Òѱ»Ê¹ÓõÄÎó²î»®·ÖΪMicrosoft OutlookȨÏÞÌáÉýÎó²î£¨CVE-2023-23397£©ºÍWindows SmartScreenÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-24880£© ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬½ÏΪÑÏÖØµÄÎó²î°üÀ¨»¥ÁªÍø¿ØÖÆÐÂÎÅЭÒé(ICMP)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-23415£©ºÍWindows Hyper-V¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2023-23411£©µÈ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws/


2¡¢Euler FinanceÔâµ½ÉÁµç´û¹¥»÷Ëðʧ¸ß´ï1.96ÒÚÃÀÔª


¾ÝýÌå3ÔÂ13ÈÕ±¨µÀ£¬£¬£¬Euler FinanceÔâµ½ÉÁµç´û¹¥»÷£¬£¬£¬ËðʧÁ˼ÛÖµ1.97ÒÚÃÀÔªµÄ¶àÖÖÊý×Ö×ʲú ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÉÁ´æ´û¿î´ÓDe-FiЭÒéAaveºÍBalancerÆò´û£¬£¬£¬²¢½«Ç®´æÈëEuler ¡£¡£¡£¡£¡£È»ºó£¬£¬£¬¹¥»÷Õß½èÁËÊ®±¶ÓÚÆä´æÈëEulerµÄ½ð¶î ¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÖÇÄܺÏÔ¼²¢±£´æÆò´û¼òÖ±ÇÐÊֶλòÎó²î²¢²»ÇåÎú£¬£¬£¬Ò²²»ÇåÎú¹¥»÷ÊÇ·ñÒѾ­¿¢Ê ¡£¡£¡£¡£¡£Elliptic±¨¸æ³Æ£¬£¬£¬¹¥»÷ÕßÒѾ­ÔÚͨ¹ýTornado CashÏ´Ç® ¡£¡£¡£¡£¡£Õâ´Î¹¥»÷µ¼ÖÂEuler(EUL)´ú±Ò¼ÛÖµÒ»Ò¹Ö®¼äϵøÁË44.2%£¬£¬£¬´Ó6.56ÃÀÔªµøÖÁ3.37ÃÀÔª ¡£¡£¡£¡£¡£


https://www.securityweek.com/euler-loses-nearly-200-million-to-flash-loan-attack/


3¡¢Î¢Èí¹ûÕæ¹ØÓÚDEV-1101¼°ÆäÏà¹ØAiTM»î¶¯µÄÏêϸÐÅÏ¢


΢ÈíÔÚ3ÔÂ13ÈÕ¹ûÕæÁ˹ØÓÚDEV-1101¼°ÆäÏà¹ØAiTM»î¶¯µÄÏêϸÐÅÏ¢ ¡£¡£¡£¡£¡£DEV-1101ÊÇ΢Èí¸ú×ٵĹ¥»÷Õߣ¬£¬£¬ÈÏÕæ¿ª·¢¡¢Ö§³ÖºÍÐû´«¶à¸öAiTMÍøÂç´¹ÂÚ¹¤¾ß°ü ¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2022Äê×îÏÈÌṩËûÃǵÄAiTM´¹ÂÚ¹¤¾ß°ü£¬£¬£¬ÒÔºó¶ÔÆä¹¤¾ß°ü¾ÙÐÐÁ˶àÏîˢУ¬£¬£¬ÀýÈç´ÓÒÆ¶¯×°±¸ÖÎÀí»î¶¯µÄÄÜÁ¦£¬£¬£¬ÒÔ¼°CAPTCHAÒ³ÃæµÈÈÆ¹ý¹¦Ð§ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ËäÈ»AiTM´¹ÂÚÊÔÍ¼ÈÆ¹ýMFA£¬£¬£¬µ«MFAÈÔÈ»ÊÇÉí·ÝÇå¾²µÄÖ÷ÒªÖ§Öù£¬£¬£¬²¢ÇÒÔÚ×èÖ¹ÖÖÖÖÍþв·½ÃæºÜÊÇÓÐÓà ¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/03/13/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit/


4¡¢ÂåÉ¼í¶ºâÓîÖÎÀí¾ÖÅû¶LockBit¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ


¾Ý3ÔÂ13ÈÕ±¨µÀ£¬£¬£¬ÂåÉ¼í¶ºâÓîÖÎÀí¾Ö£¨HACLA£©Åû¶ÁËLockBitÀÕË÷¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ ¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬2022Äê12ÔÂ31ÈÕ£¬£¬£¬HACLA·¢Ã÷ÆäϵͳÒѱ»¼ÓÃÜ£¬£¬£¬ÆÈʹ¸Ã»ú¹¹µÄITÍŶӹرÕËùÓÐЧÀÍÆ÷²¢Õö¿ªÊÓ²ì ¡£¡£¡£¡£¡£ÊÓ²ìÓÚ2023Äê2ÔÂ13ÈÕÍê³É£¬£¬£¬ÏÔʾºÚ¿ÍÔÚ2022Äê1ÔÂ15ÈÕÖÁ12ÔÂ31ÈÕδ¾­ÊÚȨ»á¼ûÁËϵͳ ¡£¡£¡£¡£¡£LockBit 3.0ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢ÍþвҪÔÚ2023Äê1ÔÂ27ÈÕÐû²¼ËùÓÐÎļþ ¡£¡£¡£¡£¡£ÕâÅúע̸ÅÐʧ°Ü£¬£¬£¬¸Ã»ú¹¹¾Ü¾øÁ˺ڿ͵ÄÒªÇó ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬LockBitÍøÕ¾ÉϵÄÏÂÔØÁ´½ÓÒÑʧЧ£¬£¬£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉϼõÇáÁËÓ°Ïì ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/la-housing-authority-discloses-data-breach-after-ransomware-attack/


5¡¢Dark PinkÕë¶Ô¶«ÄÏÑǵÄ×éÖ¯·Ö·¢¶ñÒâÈí¼þKamiKakaBot


3ÔÂ10ÈÕ£¬£¬£¬EclecticIQ³ÆÆä·¢Ã÷Á˶à¸ö¶ñÒâÈí¼þKamiKakaBotÑù±¾£¬£¬£¬±»Dark Pink£¨ÓÖÃûSaaiwc£©ÓÃÀ´¹¥»÷¶«ÄÏÑǹú¼ÒµÄÕþ¸®»ú¹¹ ¡£¡£¡£¡£¡£×î½üµÄ¹¥»÷±¬·¢ÔÚ2023Äê2Ô£¬£¬£¬Group-IBÓÚ1Ô·ÝÊ×´ÎÏêϸÏÈÈÝÁ˸ÃÍÅ»ïµÄ»î¶¯£¬£¬£¬Á½´Î»î¶¯µÄÇø±ðÊǹ¥»÷ÕßË¢ÐÂÁ˶ñÒâÈí¼þµÄ»ìÏý³ÌÐòÒÔ×èÖ¹±»·¢Ã÷ ¡£¡£¡£¡£¡£KamiKakaBotͨ¹ý°üÀ¨¶ñÒâISOÎļþµÄ´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬£¬£¬Ëü¿ÉÒÔÇÔÈ¡´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬»¹Ö§³Ö¸üлúÖÆ£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë ¡£¡£¡£¡£¡£


https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries


6¡¢Ñо¿Ö°Ô±·¢Ã÷Akuvox E11ÖÇÄܶԽ²»úÖеÄÊ®¶à¸öÎó²î


ýÌå3ÔÂ13ÈÕ±¨µÀ³Æ£¬£¬£¬ ClarotyÑо¿Ö°Ô±·¢Ã÷Akuvox E11ÖÇÄܶԽ²»úÖеÄÊ®¶à¸öÎó²î ¡£¡£¡£¡£¡£ÕâЩÎó²îÉæ¼°Èõ¼ÓÃÜ¡¢Ê¹ÓÃÓ²±àÂëÃÜÔ¿¡¢Ãô¸ÐÐÅϢ̻¶¡¢²»Çå¾²µÄÃÜÂë»Ö¸´»úÖÆºÍÏÂÁî×¢ÈëÎó²îµÈ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÔ¶³ÌÖ´ÐдúÂ룬£¬£¬Ô¶³Ì¼¤»î×°±¸µÄÂó¿Ë·çºÍÉãÏñÍ·²¢½«Êý¾Ý´«Êäµ½Ô¶³ÌЧÀÍÆ÷£¬£¬£¬²¢»ñÈ¡´æ´¢µÄͼÏñºÍ×°±¸²¶»ñµÄÊý¾Ý ¡£¡£¡£¡£¡£AkuvoxÌåÏÖÍýÏëÐû²¼¹Ì¼þ¸üУ¬£¬£¬ÒÔÔÚ2023Äê3ÔÂ20ÈÕ֮ǰÐÞ¸´ÕâЩÎó²î ¡£¡£¡£¡£¡£


https://thehackernews.com/2023/03/researchers-uncover-over-dozen-security.html