ÃÀ¹úPurFoodsÔâµ½ÀÕË÷¹¥»÷Ô¼120ÍòÓû§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-08-30

1¡¢ÃÀ¹úPurFoodsÔâµ½ÀÕË÷¹¥»÷Ô¼120ÍòÓû§µÄÐÅϢй¶


¾ÝýÌå8ÔÂ28ÈÕ±¨µÀ £¬£¬ £¬ÃÀ¹ú²ÍÒû¹«Ë¾PurFoods¶ÁËÒ»ÆðÓ°ÏìÁè¼Ý120ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ £¬£¬ £¬ËüÓÚ2ÔÂ22ÈÕ·¢Ã÷ÆäÍøÂçÉϵĿÉÒɻ¡£¡£¡£¡£¡£¡£ÊÓ²ìÈ·¶¨ £¬£¬ £¬¹¥»÷±¬·¢ÓÚ1ÔÂ16ÈÕÖÁ2ÔÂ22ÈÕ £¬£¬ £¬µ¼Ö²¿·ÖÎļþ±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£ÉîÈëÊÓ²ìÓÚ7ÔÂ10ÈÕ¿¢Ê £¬£¬ £¬·¢Ã÷ºÚ¿Í»á¼ûÁ˼ÝÕÕ¡¢Éí·ÝÖ¤ºÅ¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢ºÍÖÎÁÆÐÅÏ¢µÈÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ӰÏìÁ˿ͻ§¡¢Ô±¹¤ÒÔ¼°×ÔÁ¦³Ð°üÉÌ £¬£¬ £¬Éæ¼°1237681ÈË £¬£¬ £¬PurFoods½«Í¨¹ýKrollΪËûÃÇÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£


https://therecord.media/purfoods-delivery-service-reports-data-breach


2¡¢¶à¹úÁªºÏÖ´·¨Ðж¯Duck Huntµ·»Ù½©Ê¬ÍøÂçQakbot 


SymantecÔÚ8ÔÂ30ÈÕ³Æ £¬£¬ £¬Ö´·¨Ðж¯Duck HuntÀֳɵ·»ÙÁ˽©Ê¬ÍøÂçQakbot¡£¡£¡£¡£¡£¡£¸ÃÐж¯ÓÉÃÀ¹úÁª°îÊÓ²ì¾ÖºÍ˾·¨²¿Ç£Í· £¬£¬ £¬ÒÔ¼°·¨¹ú¡¢µÂ¹ú¡¢ºÉÀ¼¡¢Ó¢¹ú¡¢ÂÞÂíÄáÑǺÍÀ­ÍÑάÑǵȹú¼ÓÈë¡£¡£¡£¡£¡£¡£Ö´·¨Ö°Ô±ÒÑ´ÓÁè¼Ý70Íǫ̀±»Ñ¬È¾µÄÅÌËã»úÖÐɾ³ýÁËQakbot¶ñÒâÈí¼þ £¬£¬ £¬²¢²é»ñÁ˼ÛÖµ860ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£QakbotÊÇÔËÐÐʱ¼ä×µÄ½©Ê¬ÍøÂçÖ®Ò» £¬£¬ £¬ÓÚ2007ÄêÊ״ηºÆð £¬£¬ £¬½öÔÚÒÑÍù18¸öÔ¾ÍÒÑÔì³ÉÁËÁè¼Ý5800ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/qakbot-takedown-disruption


3¡¢¿ÕÖн»Í¨¹ÜÖÆÏµÍ³å´»úµ¼ÖÂÓ¢¹úº½°à´óÃæ»ý×÷·ÏºÍÑÓÎó


¾Ý8ÔÂ28ÈÕ±¨µÀ £¬£¬ £¬Ó¢¹ú¿ÕÖн»Í¨¹ÜÖÆÏµÍ³å´»ú £¬£¬ £¬ÊýÊ®ÍòÓο͵ÄÐгÌÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¹ú¼Ò¿ÕÖн»Í¨¹ÜÖÆÌṩÉÌNATS³ÆËüÓöµ½ÁË¡°ÊÖÒÕÎÊÌ⡱ £¬£¬ £¬²¢ÊµÑéÁ˽»Í¨Á÷Á¿ÏÞÖÆÒÔά»¤Çå¾²¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâµ¼ÖÂÓ¢¹ú¸÷µØº½°à´óÃæ»ýÑÓÎóºÍ×÷·Ï £¬£¬ £¬»¹¶ÔÕû¸öÅ·Ö޵ĺ½°à±¬·¢ÁËÁ¬Ëø·´Ó¦ £¬£¬ £¬Ò»Ð©º½¿Õ¹«Ë¾×÷·ÏÁËÍù·µÓ¢¹úµÄº½°à¡£¡£¡£¡£¡£¡£NATSÒѾʹ˴ÎÖÐÖ¹ÊÂÎñÖÂǸ £¬£¬ £¬²¢ÌåÏÖÕýÔÚÆð¾¢ÒÔ¾¡¿ì½â¾öÎÊÌâ¡£¡£¡£¡£¡£¡£


https://www.hackread.com/uk-air-traffic-control-system-collapses-travel-chaos/


4¡¢Sophos³ÆÊ¹ÓÃÎó²îCVE-2023-3519µÄ¹¥»÷ÓëFIN8ÓйØ


8ÔÂ28ÈÕ±¨µÀ £¬£¬ £¬ÓëFIN8Ïà¹ØµÄ¹¥»÷ÕßʹÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-3519£©¹¥»÷Citrix NetScaler¡£¡£¡£¡£¡£¡£8ÔÂ2ÈÕ £¬£¬ £¬Óб¨¸æ³ÆÔÚCitrixЧÀÍÆ÷Öз¢Ã÷ÁË640¸öWebshell £¬£¬ £¬Á½ÖÜºó £¬£¬ £¬ÕâÒ»Êý×ÖÔöÌíµ½1952¸ö¡£¡£¡£¡£¡£¡£Sophos³Æ £¬£¬ £¬STAC4663ÕýÔÚʹÓøÃÎó²î £¬£¬ £¬²¢ÒÔΪÕâÊDZ¾ÔÂÔçЩʱ¼ä±¨µÀµÄͳһ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£SophosÍÆ¶Ï £¬£¬ £¬¸Ã»î¶¯ÓëFIN8ÓÐÒ»¶¨¹ØÁª £¬£¬ £¬ÕâÒ»ÍÆ¶Ï»ùÓÚÓòÃûµÄÕì̽¡¢plink¡¢BlueVPSÍйܡ¢²»Ñ°³£µÄPowerShell¾ç±¾ºÍPuTTYÇå¾²¸´ÖÆ¡£¡£¡£¡£¡£¡£

  

https://www.bleepingcomputer.com/news/security/attacks-on-citrix-netscaler-systems-linked-to-ransomware-actor/


5¡¢Ñо¿Ö°Ô±·¢Ã÷¿ÉÒÔͨ¹ýSkypeÓ¦ÓÃÈ·¶¨Ä¿µÄµÄIPµØµã


ýÌå8ÔÂ28ÈÕ³Æ £¬£¬ £¬Ñо¿Ö°Ô±Yossi·¢Ã÷¿ÉÒÔͨ¹ýSkypeÒÆ¶¯Ó¦Ó÷¢ËÍÁ´½ÓÀ´»ñȡĿµÄµÄIPµØµã¡£¡£¡£¡£¡£¡£¹¥»÷Ö»ÐèҪĿµÄ·­¿ªÐÂÎż´¿É £¬£¬ £¬²»ÐèÒªµã»÷Á´½Ó»òÒÔÆäËü·½·¨Óë¹¥»÷Õß½»»¥¡£¡£¡£¡£¡£¡£YossiÓÚ±¾Ô³õÏò΢Èí±¨¸æÁ˸ÃÎó²î £¬£¬ £¬µ«Î¢Èí×î³õµ­»¯Á˸ÃÎÊÌâ £¬£¬ £¬²¢Ã»ÓÐÌåÏÖ½«ÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£Çå¾²¼ÇÕß²âÊÔ·¢Ã÷ £¬£¬ £¬µ±Ê¹ÓÃVPNÅþÁ¬µ½Skypeʱ £¬£¬ £¬ÒÔ¼°ÔÚ²»Ê¹ÓÃVPNµÄÇéÐÎÏÂÅþÁ¬µ½¹«¹²Wi-FiÍøÂçʱ £¬£¬ £¬¸ÃÊÖÒÕ¶¼ÓÐÓᣡ£¡£¡£¡£¡£ÔÙ´ÎÁªÏµÎ¢Èíºó £¬£¬ £¬¸Ã¹«Ë¾ÌåÏÖÍýÏëÔÚ¼´½«Ðû²¼µÄ¸üÐÂÖнâ¾ö¸ÃÎÊÌâ


https://securityaffairs.com/150000/hacking/grabbing-ip-addr-via-skype-mobile-app.html


6¡¢Trend MicroÐû²¼ÐÂAndroid¶ñÒâÈí¼þMMRatµÄÆÊÎö±¨¸æ


8ÔÂ29ÈÕ £¬£¬ £¬Trend MicroÐû²¼Á˹ØÓÚеÄAndroid¶ñÒâÈí¼þMMRatµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£MMRatÓÚ6ÔÂÏÂÑ®Ê״α»·¢Ã÷ £¬£¬ £¬Ö÷ÒªÕë¶Ô¶«ÄÏÑǵØÇø £¬£¬ £¬²¢ÇÒÔÚVirusTotalµÈɱ¶¾É¨ÃèЧÀÍÖÐÈÔδ±»·¢Ã÷¡£¡£¡£¡£¡£¡£Ëü¿ÉÒÔÇÔÈ¡Óû§ÊäÈëºÍÆÁÄ»ÄÚÈÝ £¬£¬ £¬»¹¿ÉÒÔͨ¹ýÖÖÖÖÊÖÒÕÔ¶³Ì¿ØÖÆÄ¿µÄ×°±¸ £¬£¬ £¬²¢Ö´ÐÐÒøÐÐڲƭ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬¸Ã¶ñÒâÈí¼þʹÓÃÁË»ùÓÚЭÒ黺³åÇø£¨ÓÖÃûProtobuf£©µÄÌØÊâϵ½ç˵C&CЭÒé £¬£¬ £¬¿ÉÌá¸ßÆäÔÚ´«Êä´ó×ÚÊý¾ÝʱµÄÐÔÄÜ¡£¡£¡£¡£¡£¡£Éв»È·¶¨¶ñÒâÈí¼þ×î³õÊÇÔõÑùÈö²¥µÄ £¬£¬ £¬µ«ËüÊÇͨ¹ýαװ³É¹Ù·½Ó¦ÓÃÊÐËÁµÄÍøÕ¾·Ö·¢µÄ¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/mmrat-carries-out-bank-fraud-via-fake-app-stores.html