ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§
Ðû²¼Ê±¼ä 2023-04-141¡¢ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§
¾ÝýÌå4ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÏÖ´úÆû³µÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ó°ÏìÆä·¨¹úºÍÒâ´óÀûµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ֪ͨÖгƣ¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁ˿ͻ§Êý¾Ý¿â£¬£¬£¬£¬£¬£¬ËûÃÇ»¹ÔÚÈ·¶¨ÊÂÎñµÄ¹æÄ£¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢¼ÒÍ¥µØµã¡¢µç»°ºÅÂëºÍ³µÁ¾Ê¶ÓÖÃûµÈ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÈËÊýÉв»ÇåÎú¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Òѽ«ÊÜÓ°ÏìµÄϵͳÏÂÏß¡£¡£¡£¡£¡£¡£¡£½ñÄê2Ô·ݣ¬£¬£¬£¬£¬£¬ÏÖ´úÔøÐû²¼½ôÆÈ¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¿Éͨ¹ýUSBÊý¾ÝÏßµÁ³µµÄÎó²î¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/144732/data-breach/hyundai-suffered-data-breach.html
2¡¢¾©´ÉÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÎó²îCVE-2023-25954
ýÌå4ÔÂ12Èճƣ¬£¬£¬£¬£¬£¬¾©´É£¨Kyocera£©ÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÈö²¥¶ñÒâÈí¼þµÄÎó²î£¨CVE-2023-25954£©¡£¡£¡£¡£¡£¡£¡£Îó²îÓ°ÏìÁËKYOCERA Mobile Print¡¢UTAX/TA Mobile PrintºÍOlivetti Mobile Print¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩӦÓõÄÐû²¼Õß²î±ð£¬£¬£¬£¬£¬£¬µ«ËüÃÇ»ùÓÚÏàͬµÄ´úÂ룬£¬£¬£¬£¬£¬Òò´Ë¶¼»áÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòÔÊÐí´Ó¶ñÒâµÚÈý·½Òƶ¯Ó¦Óô«ÊäÊý¾Ý£¬£¬£¬£¬£¬£¬¿ÉÏÂÔØ¶ñÒâpayload¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓþ©´ÉÒÆ¶¯´òÓ¡Ó¦ÓõÄä¯ÀÀÆ÷¹¦Ð§£¬£¬£¬£¬£¬£¬¿É»á¼û¶ñÒâÍøÕ¾²¢ÏÂÔØºÍÖ´ÐжñÒâÎļþ£¬£¬£¬£¬£¬£¬µ¼ÖÂÒÆ¶¯×°±¸ÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¾©´ÉÒÑÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬¼´½«ÍƳöµÄAndroid 14Ò²ÓÐÍû¼õÇá´ËÀàΣº¦¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kyocera-android-app-with-1m-installs-can-be-abused-to-drop-malware/
3¡¢NorthOne BankÊý¾Ý¿âÉèÖùýʧй¶100ÍòÌõ²ÆÎñ¼Í¼
¾Ý4ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬½ðÈڿƼ¼¹«Ë¾NorthOne BankÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý100ÍòÌõ²ÆÎñ¼Í¼¡£¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖйûÕæµÄPDFÎļþ°üÀ¨Ê¹ÓÃÓ¦ÓóÌÐòÖ§¸¶²úÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÆóÒµµÄ·¢Æ±¡£¡£¡£¡£¡£¡£¡£Éæ¼°ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈ£¬£¬£¬£¬£¬£¬»¹°üÀ¨Óйظ¶¿îÓÃ;¡¢×ܽð¶îºÍµ½ÆÚÈÕµÄ×¢ÊÍ£¬£¬£¬£¬£¬£¬ÓÐЩÉõÖÁ°üÀ¨Ë°ºÅµÈ˰ÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ1ÔÂ19ÈÕÊ״α¨¸æÁËÕâÒ»·¢Ã÷£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÔÚ1ÔÂ31ÈÕ±»±£»£»£»£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÕâЩ¼Í¼ÒÑ̻¶¶à³¤Ê±¼ä¡£¡£¡£¡£¡£¡£¡£
https://www.websiteplanet.com/news/northone-leak-report/
4¡¢APT36ʹÓöñÒâÈí¼þCrimson RAT¹¥»÷Ó¡¶ÈµÄ½ÌÓýÐÐÒµ
SentinelLabsÔÚ4ÔÂ13ÈÕÅû¶ÁËAPT36(Transparent Tribe)Õë¶ÔÓ¡¶È½ÌÓýÐÐÒµµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÎäÆ÷»¯µÄMicrosoft OfficeÎĵµ£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâºê»òOLEǶÈëÊÖÒÕÀ´·Ö·¢Crimson RAT¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ÖÖÖÖCrimson RAT .NETµÄʵÏÖ£¬£¬£¬£¬£¬£¬±àÒëʱ¼äÔÚ2022Äê7ÔÂÖÁ9ÔÂÖ®¼ä¡£¡£¡£¡£¡£¡£¡£Æä¹¦Ð§°üÀ¨ÇÔȡϵͳÐÅÏ¢¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢Æô¶¯ºÍ×èÖ¹Àú³ÌÒÔ¼°Ã¶¾ÙÎļþºÍÇý¶¯Æ÷¡£¡£¡£¡£¡£¡£¡£Crimson RAT±äÌåʵÏÖÁ˲î±ðÇ¿¶ÈµÄ»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬¼òÆÓµÄº¯ÊýÃû³Æ»û±äºÍ¶¯Ì¬×Ö·û´®ÆÊÎö¡£¡£¡£¡£¡£¡£¡£
https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/
5¡¢KasperskyÐû²¼LazarusµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ
4ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚLazarus GroupµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±×Ô2019ÄêÒÔÀ´Ò»Ö±ÔÚ¸ú×ٸû£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷Ä¿µÄÔÚ2020Äê4Ô±¬·¢ÁËÖØ´óת±ä£¬£¬£¬£¬£¬£¬Í¬Ê±»¹¸üÐÂÁËÑ¬È¾ÔØÌå¡£¡£¡£¡£¡£¡£¡£DeathNote¼¯Èº±»ÓÃÓÚÕë¶Ô¶«Å·µÄÆû³µºÍѧÊõÐÐÒµ£¬£¬£¬£¬£¬£¬ËüÃǶ¼Óë¹ú·À¹¤ÒµÓйء£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹½«ËùÓÐÓÕ¶üÎļþת»»ÎªÓë¹ú·À³Ð°üÉ̺ÍÍ⽻ЧÀÍÏà¹ØµÄְλÐÎò¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ñ¬È¾Á´Ò²»ñµÃÁËˢУ¬£¬£¬£¬£¬£¬²»µ«ÒÀÀµÓÚÎäÆ÷»¯ÎĵµÖеÄÔ¶³ÌÄ£°å×¢ÈëÊÖÒÕ£¬£¬£¬£¬£¬£¬»¹ÒÀÀµÓÚľÂí»¯µÄ¿ªÔ´PDFÉó²é¹¤¾ß¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/the-lazarus-group-deathnote-campaign/109490/
6¡¢CloudflareÐû²¼2023ÄêQ1 DDoSÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬CloudflareÐû²¼ÁË2023ÄêµÚÒ»¼¾¶ÈDDoSÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬³¬ÈÝÁ¿DDoS¹¥»÷ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬×î´óµÄÒ»´ÎµÖ´ïÿÃë7100Íò´ÎÇëÇó(rps)ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£ÐÂÒ»´ú½©Ê¬ÍøÂçÖð½¥·ÅÆúÁËʹÓôó×ÚÎïÁªÍø×°±¸µÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃÒ×±»¹¥»÷ºÍÉèÖùýʧµÄVPSЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÆäÇ¿¶È±È»ùÓÚÎïÁªÍøµÄ½©Ê¬ÍøÂçºá¿ç5000±¶¡£¡£¡£¡£¡£¡£¡£ÀÕË÷DDoS¹¥»÷ͬ±ÈÔöÌí60%£¬£¬£¬£¬£¬£¬Õ¼ËùÓÐDDoS¹¥»÷µÄ16%¡£¡£¡£¡£¡£¡£¡£DDoS¹¥»÷Ö÷ÒªÕë¶ÔµÄ¹ú¼ÒÊÇÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬Æä´ÎÊÇÃÀ¹ú¡¢¼ÓÄôóºÍÍÁ¶úÆä¡£¡£¡£¡£¡£¡£¡£
https://blog.cloudflare.com/ddos-threat-report-2023-q1/


¾©¹«Íø°²±¸11010802024551ºÅ