ShuckwormÍÅ»ïͨ¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃÅPterodo
Ðû²¼Ê±¼ä 2023-06-201¡¢ShuckwormÍÅ»ïͨ¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃÅPterodo
6ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬SymantecÅû¶Á˶íÂÞ˹Ïà¹ØºÚ¿ÍÍÅ»ïShuckworm¸üÐµĹ¤¾ß¼¯ºÍѬȾսÂÔ¡£¡£¡£¡£¡£Shuckworm¼ÌÐø¶ÔÎÚ¿ËÀ¼ÌᳫÁ˶à´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬×î½üµÄÄ¿µÄ°üÀ¨Çå¾²²¿·Ö¡¢¾ü¶ÓºÍÕþ¸®×éÖ¯¡£¡£¡£¡£¡£ShuckwormʹÓõç×ÓÓʼþ×÷Ϊ³õÊ¼Ñ¬È¾ÔØÌåÀ´·Ö·¢¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬È»ºóʹÓÃÁËÒ»¸öеÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃŶñÒâÈí¼þPterodo¡£¡£¡£¡£¡£ÔÚ×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬¸ÃÍŻﻹʹÓÃÕýµ±Ð§Àͳ䵱C&CЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨Telegram£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°TelegramµÄ΢²©Æ½Ì¨£¬£¬£¬£¬£¬£¬£¬¼´Telegraph£¬£¬£¬£¬£¬£¬£¬À´´æ´¢C&CµØµã¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-russia-ukraine-military
2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖݺͶíÀÕ¸ÔÖÝÊý°ÙÍòסÃñµÄÐÅϢй¶
6ÔÂ16ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Â·Ò×˹°²ÄÇÖݺͶíÀÕ¸ÔÖݵÄMOVEit TransferÇå¾²Îļþ´«ÊäϵͳÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êý°ÙÍòסÃñµÄÐÅϢй¶¡£¡£¡£¡£¡£Â·Ò×˹°²ÄÇÖÝÎÞа³µÁ¾°ì¹«ÊÒ(OMV)͸¶£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜËùÓÐÓµÓиÃÖÝÕþ¸®½ÒÏþµÄ¼ÝʻִÕÕ¡¢Éí·ÝÖ¤»òÆû³µ¹ÒºÅÖ¤µÄסÃñ¶¼Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¶íÀÕ¸ÔDMVÒ²Ðû²¼ÁËÀàËÆµÄÉùÃ÷£¬£¬£¬£¬£¬£¬£¬³Æ´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËԼĪ3500000Ãû¶íÀÕ¸ÔÈË¡£¡£¡£¡£¡£¶íÀÕ¸ÔÖÝÕþ¸®ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÎÞ·¨È·¶¨ÏêϸµÄÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬Òò´Ë½¨ÒéËùÓй«Ãñ½ÓÄÉÔ¤·À²½·¥¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/millions-of-oregon-louisiana-state-ids-stolen-in-moveit-breach/
3¡¢»ªË¶Ðû²¼½ôÆÈ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î·ÓÉÆ÷ÖеÄÎó²î
ýÌå6ÔÂ19Èճƣ¬£¬£¬£¬£¬£¬£¬»ªË¶Ðû²¼Á˽ôÆÈ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¸ö·ÓÉÆ÷ÐͺÅÖеÄ9¸öÎó²î¡£¡£¡£¡£¡£ÆäÖаüÀ¨Á½¸öCVSSÆÀ·ÖΪ9.8µÄÎó²î£¬£¬£¬£¬£¬£¬£¬»®·ÖÊÇNetatalk 3.1.12֮ǰµÄÔ½½çдÈëÎó²î£¨CVE-2018-1160£©£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£ÒÔ¼°Asuswrt¹Ì¼þÖеÄÄÚ´æËð»µÎó²î£¨CVE-2022-26376£©£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ״̬»òí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¸Ã¹«Ë¾½¨ÒéÊÜÓ°Ïì·ÓÉÆ÷ÐͺŵÄÓû§¾¡¿ì½«×°±¸¸üе½×îй̼þ£¬£¬£¬£¬£¬£¬£¬²¢ÎªÎÞÏßÍøÂçºÍ·ÓÉÆ÷ÖÎÀíÒ³ÃæÉèÖõ¥¶ÀµÄÖØ´óµÄÃÜÂë¡£¡£¡£¡£¡£
https://www.securityweek.com/asus-patches-highly-critical-wifi-router-flaws/
4¡¢FTCÖ¸¿Ø»ùÒò¼ì²â¹«Ë¾1health.ioй¶Óû§µÄ¿µ½¡ÐÅÏ¢
ýÌå6ÔÂ16Èճƣ¬£¬£¬£¬£¬£¬£¬ÃÀ¹úFTCÖ¸¿Ø»ùÒò¿µ½¡¼ì²â¹«Ë¾1health.ioδÄܱ£»£»£»£»£»£»£»¤Ãô¸ÐµÄ»ùÒòºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£FTC³Æ£¬£¬£¬£¬£¬£¬£¬1healthÒÔǰ³ÆÎªVitagene£¬£¬£¬£¬£¬£¬£¬ÔÚÆäÒþ˽Õþ²ß·½ÃæÓÕÆÁ˿ͻ§£¬£¬£¬£¬£¬£¬£¬×·ËÝÐԵظü¸ÄÁ˸ÃÕþ²ß£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆäɾ³ýÊý¾ÝµÄÀú³ÌÖÐÎóµ¼Á˿ͻ§¡£¡£¡£¡£¡£¸Ã¹«Ë¾±»ÒªÇóÏòFTCÖ§¸¶75000ÃÀÔªÓÃÓÚÏûºÄÕßÍ˿£¬£¬£¬£¬£¬£¬²¢±»Õ¥È¡ÔÚδ»ñµÃ¿Í»§Ã÷È·Ô޳ɵÄÇéÐÎÏÂÓëµÚÈý·½¹²Ïí¿µ½¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬»¹±ØÐèʵÑéеÄÇå¾²ÍýÏë¡£¡£¡£¡£¡£1healthµÄÊ×ϯִÐйٳÆFTCµÄÊÓ²ìÊÇ¡°Õþ¸®Ì«¹ý¸ÉÔ¤µÄ°¸Àý¡±¡£¡£¡£¡£¡£
https://cyberscoop.com/ftc-1healthio-health-data-privacy/
5¡¢Ñо¿Ö°Ô±ÑÝʾÐÂÐͲàÐŵÀ¹¥»÷·½·¨Freaky Leaky SMS
¾Ý6ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ò»×éÑо¿Ö°Ô±Éè¼ÆÁËÃûΪFreaky Leaky SMSµÄÐÂÐͲàÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬ËüÒÀÀµÓÚSMS·¢Ëͱ¨¸æµÄʱ¼äÀ´ÍƶÏÊÕ¼þÈ˵ÄλÖᣡ£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÐèÒªÍøÂçһЩÕÉÁ¿Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚSMS·¢Ëͱ¨¸æºÍÄ¿µÄµÄλÖÃÖ®¼ä½¨ÉèÏêϸµÄ¹ØÁª¡£¡£¡£¡£¡£¹¥»÷ÕßÕÆÎÕµÄÄ¿µÄÐÐ×ÙÊý¾ÝԽ׼ȷ£¬£¬£¬£¬£¬£¬£¬¹¥»÷½×¶ÎMLÄ£×ÓÕ¹ÍûÖеÄλÖ÷ÖÀàЧ¹û¾ÍԽ׼ȷ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Í³Ò»×éÑо¿Ö°Ô±ÔÚÈ¥Ä꿪·¢ÁËÀàËÆµÄ׼ʱ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÐÂÎÅÎüÊÕ±¨¸æ´óÖ¶¨Î»Signal¡¢ThreemaºÍWhatsAppµÈ¼´Ê±Í¨Ñ¶¹¤¾ßµÄÓû§¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sms-delivery-reports-can-be-used-to-infer-recipients-location/
6¡¢MandiantÅû¶UNC4841ʹÓÃBarracuda ESGÎó²îµÄ¹¥»÷ÏêÇé
MandiantÔÚ6ÔÂ15ÈÕÅû¶ÁËUNC4841ʹÓÃBarracuda ESGÎó²îµÄ¹¥»÷ÏêÇé¡£¡£¡£¡£¡£Ô¼Äª´Ó2022Äê10ÔÂ10ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬£¬UNC4841×îÏÈʹÓÃÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2023-2868£©¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒ⸽¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬µ±Barracuda ESGʵÑéɨÃèÎļþʱ£¬£¬£¬£¬£¬£¬£¬¸½¼þ»áʹÓøÃÎó²îÔÚ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£Ò»µ©»ñÈ¡»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬¾Í»áʹÓöñÒâÈí¼þϵÁÐSaltwater¡¢SeaspyºÍSeasideѬȾËü£¬£¬£¬£¬£¬£¬£¬À´´Ó×°±¸ÖÐÇÔÈ¡µç×ÓÓʼþÊý¾Ý¡£¡£¡£¡£¡£Mandiant»¹³ÆBarracudaÉÏÖÜÒªÇóÓû§Ìæ»»×°±¸ÊdzöÓÚÉóÉ÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÎÞ·¨È·±£ÒÑÍêȫɾ³ý¶ñÒâÈí¼þ¡£¡£¡£¡£¡£
https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally


¾©¹«Íø°²±¸11010802024551ºÅ