IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-08-16

1¡¢IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶


¾ÝýÌå8ÔÂ14ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖÝÒ½ÁƱ£½¡Õþ²ßÓëÈÚ×ʲ¿(HCPF)ÏòÁè¼Ý400ÍòÈË·¢³ö֪ͨ£¬ £¬£¬£¬£¬£¬³ÆÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËËûÃǵÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£HCPF³ÎÇå˵£¬ £¬£¬£¬£¬£¬ËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬¿ÉÊÇËûÃǵijаüÉÌIBMÔâµ½ÁËÕë¶ÔMOVEitµÄ¹¥»÷¡£¡£¡£¡£¡£¡£6ÔÂ13ÈÕÊӲ췢Ã÷£¬ £¬£¬£¬£¬£¬IBMʹÓõÄMOVEitÓ¦ÓÃÉϵIJ¿·ÖHCPFÎļþÔÚ5ÔÂ28ÈÕ×óÓÒ±»»á¼û£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ä³Ð©Health First ColoradoºÍCHP+»áÔ±ÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£¡£×ܹ²Ó°ÏìÁË4091794ÈË£¬ £¬£¬£¬£¬£¬HPCF½«Í¨¹ýExperianΪÊÜÓ°ÏìÓû§ÌṩÁ½ÄêµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/colorado-warns-4-million-of-data-stolen-in-ibm-moveit-breach/


2¡¢Akamai·¢Ã÷Õë¶ÔÔËÐÐMagento 2µÄµçÉÌÆ½Ì¨µÄXurum»î¶¯


AkamaiÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÔËÐÐMagento 2 CMSµÄµçÉÌÆ½Ì¨µÄ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬£¬²¢½«¸Ã»î¶¯ÃüÃûΪXurum¡£¡£¡£¡£¡£¡£»£»£»£»£»£»î¶¯Ê¼ÓÚ1Ô·Ý£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÁËAdobe CommerceºÍMagento Open SourceÖеÄЧÀÍÆ÷¶ËÄ£°å×¢ÈëÎó²î£¨CVE-2022-24086£©¡£¡£¡£¡£¡£¡£¹¥»÷ÕßËÆºõ¶ÔÄ¿µÄMagentoÊÐËÁÒÑÍù10ÌìÄÚËù϶©µ¥µÄ¸¶¿îͳ¼ÆÊý¾Ý¸ÐÐËȤ¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËwso-ng£¬ £¬£¬£¬£¬£¬ÕâÊÇа汾µÄWSO webshell¡£¡£¡£¡£¡£¡£»£»£»£»£»£»î¶¯»¹Ê¹ÓÃÁ˽ϾɵÄDirty COWÎó²î(CVE-2016-5195)£¬ £¬£¬£¬£¬£¬ÒÔʵÑéÔÚLinuxÖÐÌáȨ¡£¡£¡£¡£¡£¡£ÓÐÖ¤¾ÝÅú×¢¹¥»÷Óë¶íÂÞ˹Óйء£¡£¡£¡£¡£¡£ 


https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell


3¡¢ÀÕË÷Èí¼þMonti¾íÍÁÖØÀ´Ö÷ÒªÕë¶ÔÖ´·¨ºÍÕþ¸®ÁìÓò»ú¹¹


8ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬Trend Micro·¢Ã÷ʱ¸ô2¸öÔºóMonti¾íÍÁÖØÀ´£¬ £¬£¬£¬£¬£¬ÖØµã¹Ø×¢Ö´·¨ºÍÕþ¸®ÁìÓò»ú¹¹¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬ £¬£¬£¬£¬£¬»ùÓÚLinuxƽ̨µÄMontiбäÌåÒ²ÒѸ¡³öË®Ãæ£¬ £¬£¬£¬£¬£¬Óë֮ǰµÄ°æ±¾ÓÐ×ÅÏÔ×Ųî±ð¡£¡£¡£¡£¡£¡£ÒÔǰ°æ±¾ºÜºéÁ÷ƽÉÏ»ùÓÚContiй¶µÄ´úÂ루99%£©£¬ £¬£¬£¬£¬£¬µ«ÐÈÎÃüܳÌÐòµÄÏàËÆ¶È½öΪ29%¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬£¬£¬Í¨¹ý¶Ô´úÂ루ÓÈÆäÊǼÓÃÜËã·¨£©¾ÙÐдó×ÚÐ޸ģ¬ £¬£¬£¬£¬£¬MontiÈÆ¹ý¼ì²âµÄÄÜÁ¦»ñµÃÌá¸ß£¬ £¬£¬£¬£¬£¬ÕâÔöÌíÁ˼ì²â»ººÍ½â´ËÀà¶ñÒâ»î¶¯µÄÄѶȡ£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/monti-ransomware-unleashes-a-new-encryptor-for-linux.html


4¡¢ZscaleÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT


ZscaleÔÚ8ÔÂ10ÈÕÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøµÄ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT¡£¡£¡£¡£¡£¡£×èÖ¹6Ô·Ý£¬ £¬£¬£¬£¬£¬JanelaRATÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøÒøÐкͽðÈÚ»ú¹¹£¬ £¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈںͼÓÃÜÇ®±ÒÏà¹ØÊý¾Ý£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓÃÀ´×ÔÕýµ±ÈªÔ´£¨ÈçVMWareºÍMicrosoft£©µÄDLL²à¼ÓÔØÊÖÒÕÀ´Èƹý¼ì²â¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬JanelaRAT¾ßÓд°¿ÚÎÊÌâ¸ÐÖª»úÖÆ£¬ £¬£¬£¬£¬£¬²¢½ÓÄɶ¯Ì¬Ì×½ÖÉ×ÓèÖÃϵͳ¡£¡£¡£¡£¡£¡£JanelaRATµÄ¿ª·¢Õß¿ÉÄÜ´ÓBX RATµÄ´úÂëÖлñµÃÁËÁé¸Ð£¬ £¬£¬£¬£¬£¬µ«Ëü½ö¾ß±¸BX RATÌṩµÄ²¿·Ö¹¦Ð§£¬ £¬£¬£¬£¬£¬Ã»Óе¼ÈëshellÏÂÁîÖ´Ðеȹ¦Ð§¡£¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/janelarat-repurposed-bx-rat-variant-targeting-latam-fintech


5¡¢Kaspersky³Æ´ó×Ú±»ºÚµÄWPÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷


¾Ý8ÔÂ14ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬Kaspersky·¢Ã÷´ó×Ú±»ºÚµÄWordPressÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£5ÔÂ15ÈÕµ½7ÔÂ31ÈÕ£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË22400¸öWordPressÍøÕ¾±»ºÚ¿Í¹¥»÷ÒÔ½¨Éè´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£Í³Ò»Ê±ÆÚÄÚ£¬ £¬£¬£¬£¬£¬Óû§×ܹ²ÊµÑé»á¼û±»Ñ¬È¾ÍøÕ¾ÉÏÍйܵÄÐéÎ±Ò³Ãæ200213´Î¡£¡£¡£¡£¡£¡£×î³£±»´¹ÂÚ¹¥»÷µÄЧÀÍºÍÆóÒµ°üÀ¨Netflix¡¢Å·ÖÞµÄÒøÐкͳ£¼ûµÄ¿ìµÝЧÀÍ¡£¡£¡£¡£¡£¡£Kaspersky»¹ÏêÊöÁËÄÄÐ©ÍøÕ¾×îÈÝÒ×Ôâµ½ºÚ¿Í¹¥»÷¡¢ÔõÑùÈëÇÖWordPressÍøÕ¾ÒÔ¼°WordPressÍøÕ¾±»ºÚµÄ¼£ÏóµÈ¡£¡£¡£¡£¡£¡£


https://securelist.com/phishing-with-hacked-sites/110334/


6¡¢UptycsÐû²¼¹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ


8ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬UptycsÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ8ÔÂÉÏÑ®·¢Ã÷Á˸öñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬Ëüͨ¹ýTelegramºÍDiscordƽ̨¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£Ã¿Öܶ©ÔÄ·ÑΪ150¬²¼£¬ £¬£¬£¬£¬£¬µ«Ò²ÓÐÓÐÏÞµÄÃâ·Ñ°æ±¾¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬠£¬£¬£¬£¬£¬RAT¾Í»áÉñÃØÍøÂçÊý¾Ý£¬ £¬£¬£¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄTelegram bot¡£¡£¡£¡£¡£¡£ÎªÁËÈÆ¹ýɱ¶¾Èí¼þµÄ¼ì²â£¬ £¬£¬£¬£¬£¬RATͨ¹ýTelegram bot¾ÙÐÐC2¡£¡£¡£¡£¡£¡£³ýÁËÇÔÈ¡Êý¾ÝÖ®Í⣬ £¬£¬£¬£¬£¬QwixxRAT»¹ÓµÓÐǿʢµÄÔ¶³ÌÖÎÀí¹¤¾ß£¬ £¬£¬£¬£¬£¬¿É¿ØÖÆÄ¿µÄ×°±¸ºÍÆô¶¯ÏÂÁî¡£¡£¡£¡£¡£¡£


https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram