SAPÐû²¼Çå¾²¸üÐÂÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
Ðû²¼Ê±¼ä 2023-03-161¡¢SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
3ÔÂ14ÈÕ£¬£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌSAPÒÑÕë¶Ô19¸öÎó²îÐû²¼ÁËÇå¾²¸üС£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²îÓ°ÏìÁËÐí¶à²úÆ·£¬£¬£¬£¬£¬µ«ÑÏÖØµÄÎó²î»áÓ°ÏìSAP Business ObjectsÉÌÒµÖÇÄÜÆ½Ì¨(CMC)ºÍSAP NetWeaver¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ5¸ö½ÏΪÑÏÖØµÄÎó²î»®·ÖΪ´úÂë×¢ÈëÎó²î£¨CVE-2023-25616£©¡¢Ä¿Â¼±éÀúÎó²î£¨CVE-2023-27269ºÍCVE-2023-27500£©¡¢È±ÉÙÉí·ÝÑéÖ¤¼ì²éÎó²î£¨CVE-2023-23857£©ÒÔ¼°ÏÂÁîÖ´ÐÐÎó²î£¨CVE-2023-25617£©¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÁ¬Ã¦×°Öò¹¶¡¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sap-releases-security-updates-fixing-five-critical-vulnerabilities/
2¡¢LockBit³Æ´ÓMaximum Industries»ñÈ¡µ½SpaceXµÄÊý¾Ý
¾ÝýÌå3ÔÂ14Èճƣ¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÉú²ú¹«Ë¾Maximum IndustriesµÄϵͳ²¢»ñÈ¡µ½SpaceXµÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£Maximum IndustriesרÃÅ´ÓÊÂË®µ¶ºÍ¼¤¹âÇиîÒÔ¼°CNC¼Ó¹¤Ð§ÀÍ£¬£¬£¬£¬£¬ÊÇSpaceXµÄµÚÈý·½³Ð°üÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖÇÔÈ¡ÁËԼĪ3000ÕÅÓÉspace-x¹¤³ÌʦÈÏÖ¤µÄͼֽ£¬£¬£¬£¬£¬²¢ÍýÏëÔÚÒ»ÖÜÄÚÌᳫÅÄÂô£¬£¬£¬£¬£¬½«ÕâЩͼֽÂô¸øÆäËûÖÆÔìÉÌ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾÁªÏµÁËSpaceXºÍMaximum Industries£¬£¬£¬£¬£¬µ«ËûÃǶ¼Ã»ÓлØÓ¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html
3¡¢Ò½ÁƱ£½¡ÌṩÉÌILS͸¶Áè¼Ý420Íò»¼ÕßµÄÐÅϢй¶
ýÌå3ÔÂ15Èճƣ¬£¬£¬£¬£¬Ò½ÁƱ£½¡ÌṩÉÌIndependent Living Systems(ILS)Ðû²¼Í¨ÖªÍ¸Â¶Êý¾Ýй¶ÊÂÎñÓ°ÏìÁË4226508¸ö»¼Õß¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾·¢Ã÷ÆäϵͳÓÚ2022Äê7ÔÂ5ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬ËæºóÊÓ²ìÏÔʾ¹¥»÷ÕßÔÚ2022Äê6ÔÂ30ÈÕÖÁ7ÔÂ5ÈÕ»ñµÃÁ˲¿·ÖILSϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉ˰ÈËʶÓÖÃûºÍÒ½ÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£ILSÔÚ·¢Ã÷Î¥¹æÐÐΪºóµÄÁù¸öÔº󣬣¬£¬£¬£¬Ò²¾ÍÊÇ2023Äê1ÔÂ17ÈÕÍê³ÉÁËÈ·¶¨ÊÜÓ°ÏìСÎÒ˽¼Ò»òʵÌåµÄÄÚ²¿Éó²é¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬ILSÌåÏÖ½«ÎªÊÜÓ°Ï컼ÕßÌṩΪÆÚÒ»ÄêµÄExperianÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/
4¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒÕþ¸®ºÍÄÜÔ´×éÖ¯µÄ¹¥»÷
CiscoÔÚ3ÔÂ14ÈÕÅû¶ÁËÒ»¸öÐµĹ¥»÷ÍÅ»ïYoroTrooper£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÁªºÏÌå(CIS)¹ú¼ÒµÄÕþ¸®ºÍÄÜÔ´×éÖ¯¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬ÒѾÈëÇÖÁËÒ»¸ö´ÓÊÂÒ½ÁƱ£½¡µÄÖ÷ҪŷÃË»ú¹¹¡¢ÌìÏÂ֪ʶ²úȨ×éÖ¯(WIPO)ºÍ¶à¸öÅ·ÖÞ´óʹ¹Ý¡£¡£¡£¡£¡£¡£YoroTrooperµÄ¹¤¾ß°üÀ¨ÉÌÆ·ºÍ×Ô½ç˵ÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂíºÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Ñ¬È¾Á´ÓɶñÒâ¿ì½Ý·½·¨Îļþ(LNK)ºÍ¿ÉÑ¡µÄÓÕ¶üÎļþ×é³É¡£¡£¡£¡£¡£¡£
https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/
5¡¢ESET·¢Ã÷TickÕë¶Ô¶«ÑÇijDLPÈí¼þ¿ª·¢É̵Ĺ¥»÷»î¶¯
3ÔÂ14ÈÕ£¬£¬£¬£¬£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯TickÕë¶Ô¶«ÑÇÒ»¼Ò¿ª·¢Êý¾Ýɥʧ·À»¤(DLP)Èí¼þµÄ¹«Ë¾µÄ»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄÄÚ²¿¸üÐÂЧÀÍÆ÷£¬£¬£¬£¬£¬ÔÚÈí¼þ¿ª·¢É̵ÄϵͳÄÚÈö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬£¬²¢Ä¾Âí»¯¸Ã¹«Ë¾Ê¹ÓõÄÕýµ±¹¤¾ßµÄ×°ÖóÌÐò£¬£¬£¬£¬£¬×îÖÕµ¼ÖÂÔÚ¹«Ë¾¿Í»§µÄÅÌËã»úÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÔÚÈëÇÖÀú³ÌÖУ¬£¬£¬£¬£¬¹¥»÷Õß×°ÖÃÁËÒ»¸öеÄÏÂÔØ³ÌÐòShadowPy£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁ˺óÃÅNetboy£¨ÓÖÃûInvader£©ºÍÏÂÔØ³ÌÐòGhostdown¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
6¡¢Check PointÐû²¼¹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ
Check PointÔÚ3ÔÂ14ÈÕÐû²¼Á˹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£ÕâÖÖ¶ñÒâÈí¼þ¿ÉÒÔαװ³É20¶àÖÖ½ðÈÚÓ¦Ó㬣¬£¬£¬£¬²¢Ä£ÄâÓëÒøÐлò½ðÈÚЧÀÍÔ±¹¤µÄµç»°ÅÊ̸¾ÙÐÐÓïÒô´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£FakeCallsÖ÷ÒªÕë¶Ôº«¹ú£¬£¬£¬£¬£¬¾ßÓÐÈðÊ¿¾üµ¶µÄ¹¦Ð§£¬£¬£¬£¬£¬²»µ«Äܹ»Ö´ÐÐÆäÖ÷ҪʹÃü£¬£¬£¬£¬£¬²¢ÇÒÄܹ»´ÓÄ¿µÄ×°±¸ÖÐÇÔȡСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁË2500¶à¸öFakeCallsÑù±¾£¬£¬£¬£¬£¬ËüÃÇʹÓÃÁËÖÖÖÖÄ£Äâ½ðÈÚ×éÖ¯µÄ×éºÏ²¢ÊµÑéÁË ·´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2023/south-korean-android-banking-menace-fakecalls/


¾©¹«Íø°²±¸11010802024551ºÅ