CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹Âڻ

Ðû²¼Ê±¼ä 2023-08-18

1¡¢CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹Âڻ


CofenseÔÚ8ÔÂ16ÈÕÅû¶ÁËÒ»³¡Ê¹ÓöþάÂëµÄ´óÐÍ´¹Âڻ£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹úµÄÒ»¼Ò´óÐÍÄÜÔ´¹«Ë¾¡£¡£¡£¡£¸Ã»î¶¯µÄƽ¾ùÔÂÔöÌíÂÊÁè¼Ý270%£¬ £¬£¬£¬£¬×Ô5ÔÂÒÔÀ´ÕûÌå»î¶¯ÔöÌíÁË2400%ÒÔÉÏ¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈ·¢ËÍð³äMicrosoftÇ徲֪ͨµÄÓʼþ£¬ £¬£¬£¬£¬ÆäÖаüÀ¨PNG»òPDF¸½¼þ£¬ £¬£¬£¬£¬ÒªÇóÓû§É¨Ãè¶þάÂ룬 £¬£¬£¬£¬È»ºó½«Ä¿µÄÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾¡£¡£¡£¡£¾Ýͳ¼Æ£¬ £¬£¬£¬£¬¸Ã»î¶¯29%µÄÁ÷Á¿Õë¶ÔµÄÊÇÄÜÔ´¹«Ë¾£¬ £¬£¬£¬£¬ÆäËüÄ¿µÄÐÐÒµ°üÀ¨ÖÆÔìÒµ(15%)¡¢°ü¹ÜÒµ(9%)¡¢ÊÖÒÕ(7%)ºÍ½ðÈÚЧÀÍ£¨6%£©ÐÐÒµ¡£¡£¡£¡£


https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/


2¡¢AT&T·¢Ã÷¹¹½¨°üÀ¨40Íò¸ö½ÚµãµÄ½©Ê¬ÍøÂçµÄ¹¥»÷»î¶¯


8ÔÂ16ÈÕ£¬ £¬£¬£¬£¬AT&T Alien Labs³ÆÆä·¢Ã÷ÁËÒ»Æð´ó¹æÄ£¹¥»÷»î¶¯ÖÁÉÙÏò400000¸öWindowsÅÌËã»ú·Ö·¢ÁËÊðÀíЧÀÍÆ÷Ó¦ÓóÌÐò¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬ÔÚÒ»ÖÜÄھͷ¢Ã÷ÁËһǧ¶à¸öÔÚÒ°Íâ·Ö·¢ÊðÀíÓ¦ÓóÌÐòµÄжñÒâÈí¼þÑù±¾¡£¡£¡£¡£¾ÝÊðÀíÍøÕ¾³Æ£¬ £¬£¬£¬£¬ÊðÀí³ö¿Ú½ÚµãÁè¼Ý40Íò¸ö£¬ £¬£¬£¬£¬Éв»ÇåÎúÆäÖÐÓм¸¶àÊDZ»¶ñÒâ´úÂë×°ÖõÄ¡£¡£¡£¡£Ò»µ©×°Öõ½±»ÈëÇÖµÄϵͳÉÏ£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ¾Í»áÏÂÔØ²¢×°ÖÃÊðÀíÓ¦Óᣡ£¡£¡£¼ÓÔØ³ÌÐòÒþ²ØÔÚÆÆ½âÈí¼þºÍÓÎÏ·ÖУ¬ £¬£¬£¬£¬ÇÒ×°Öò»ÐèÒªÓëÓû§¾ÙÐн»»¥¡£¡£¡£¡£¸ÃÊðÀíÊÇÓÃGo¿ª·¢£¬ £¬£¬£¬£¬ÓÉÓÚËüÒÑÊðÃûÒÔÊǼì²âΪÁã¡£¡£¡£¡£


https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware


3¡¢Citrix ShareFileÎó²îCVE-2023-24489Òѱ»Ê¹ÓÃ


¾ÝýÌå8ÔÂ16ÈÕ±¨µÀ£¬ £¬£¬£¬£¬CISAÌáÐÑCitrix ShareFileÎó²îCVE-2023-24489Òѱ»ÔÚҰʹÓᣡ£¡£¡£Ê¹ÓøÃÎó²î£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ½«Web shellÉÏ´«µ½Ä¿µÄ×°±¸£¬ £¬£¬£¬£¬À´»ñµÃ¶Ô´æ´¢¼°ÆäËùÓÐÎļþµÄÍêÈ«»á¼ûȨÏÞ£¬ £¬£¬£¬£¬ÒÑÓÚ6ÔÂ13ÈÕ±»ÐÞ¸´¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬GreyNoiseÒÑ·¢Ã÷72¸öIPµØµãÊÔͼʹÓûò¼ì²éShareFileЧÀÍÆ÷ÊÇ·ñÈÝÒ×Ôâµ½¹¥»÷£¬ £¬£¬£¬£¬ÆäÖдó´ó¶¼À´×Ôº«¹úÒÔ¼°·ÒÀ¼¡¢Ó¢¹úºÍÃÀ¹úµÈ¹ú¼Ò¡£¡£¡£¡£CISAÒªÇóÕþ¸®»ú¹¹ÔÚ9ÔÂ6ÈÕ֮ǰӦÓò¹¶¡¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/


4¡¢Ñо¿Ö°Ô±ÔÚPowerShell GalleryÖмì²âµ½¶à¸öÎó²î


AquaÔÚ8ÔÂ16ÈÕ͸¶ÔÚPowerShell GalleryÖз¢Ã÷Á˶à¸ö¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷µÄÎó²î¡£¡£¡£¡£PowerShell GalleryÓÉMicrosoftά»¤£¬ £¬£¬£¬£¬ÊÇÒ»¸öÓÃÓÚ¹²ÏíºÍ»ñÈ¡PowerShell´úÂëµÄÖÐÑë´æ´¢¿â¡£¡£¡£¡£µÚÒ»¸öÎó²îÉæ¼°¿íËɵİüÃûÕþ²ß£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÉÏ´«ÓëÏÖÓд洢¿âÃû³ÆÏàËÆµÄ¶ñÒâPowerShellÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£µÚ¶þ¸öÎó²îÉæ¼°Î±ÔìÄ£¿£¿£¿£¿£¿£¿éÔªÊý¾Ý£¬ £¬£¬£¬£¬µ±»á¼ûPowerShellÄ£¿£¿£¿£¿£¿£¿éÉϰ¶Ò³ÃæÊ±£¬ £¬£¬£¬£¬ÏÕЩËùÓÐϸ½Ú¶¼¿ÉÄܱ»Î±Ô죬 £¬£¬£¬£¬°üÀ¨¿ª·¢Õß¡¢°æÈ¨ºÍÐÎò¡£¡£¡£¡£µÚÈý¸öÎó²î¿ÉÓÃÓÚö¾ÙËùÓаüÃû³ÆºÍ°æ±¾£¬ £¬£¬£¬£¬°üÀ¨Î´ÁгöÇÒÒþ²ØÔÚ¹«ÖÚÊÓÒ°Ö®ÍâµÄÈí¼þ°ü¡£¡£¡£¡£AquaÓÚ2022Äê9Ô±¨¸æÁËÕâЩÎó²î£¬ £¬£¬£¬£¬Î¢Èí³ÆÒѽâ¾öÕâЩÎÊÌ⣬ £¬£¬£¬£¬µ«ÏÖÔÚÎó²îÈÔÈ»¿ÉÒÔÖØÏÖ¡£¡£¡£¡£


https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks


5¡¢CubaʹÓÃй¤¾ß¹¥»÷ÃÀ¹ú»ù´¡ÉèÊ©ºÍÀ­¶¡ÃÀÖÞIT¼¯³ÉÉÌ


8ÔÂ17ÈÕ£¬ £¬£¬£¬£¬Blackberry³ÆÀÕË÷ÍÅ»ïCubaʹÓÃй¤¾ß¹¥»÷ÁËÃÀ¹úµÄÒ»¸ö»ù´¡ÉèÊ©»ú¹¹ºÍÀ­¶¡ÃÀÖÞµÄÒ»¼ÒIT¼¯³ÉÉÌ¡£¡£¡£¡£¹¥»÷±¬·¢ÓÚ6Ô£¬ £¬£¬£¬£¬Æä¹¤¾ß¼¯°üÀ¨×Ô½ç˵ÏÂÔØ³ÌÐòBUGHATCH¡¢BURNTCIGAR¡¢MetasploitºÍCobalt Strike¿ò¼Ü£¬ £¬£¬£¬£¬ÒÔ¼°´ó×ÚLOLBINS¡£¡£¡£¡£¹¥»÷»î¶¯»¹Ê¹ÓÃÁËNetLogonÎó²î£¨CVE-2020-1472£©ºÍVeeamÎó²î£¨CVE-2023-27532£©¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬CubaµÄÍøÕ¾ÔÚÒÑÍù¼¸¸öÔÂÀïʱ¶ÏÊ±Ðø£¬ £¬£¬£¬£¬¾ÝÊӲ죬 £¬£¬£¬£¬ÔÚÁгöеı»¹¥»÷Ä¿µÄʱ¸ÃÍøÕ¾¾Í»áÖØÐÂÉÏÏߣ¬ £¬£¬£¬£¬È»ºóÔٴιرÕ¡£¡£¡£¡£


https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america


6¡¢IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ýй¶±¾Ç®µÄÆÊÎö±¨¸æ


8ÔÂ16ÈÕ£¬ £¬£¬£¬£¬IBMÐû²¼ÁË2023ÄêÊý¾Ýй¶±¾Ç®µÄÆÊÎö±¨¸æ£¬ £¬£¬£¬£¬ÆÊÎöÁË2022Äê3ÔÂÖÁ2023Äê3ÔÂÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¸÷ÐÐÒµÊý¾Ýй¶µÄƽ¾ù±¾Ç®Îª445ÍòÃÀÔª£¬ £¬£¬£¬£¬¶øÒ½ÁÆÐÐÒµµÄƽ¾ù±¾Ç®ÊÇ×î¸ßµÄ£¬ £¬£¬£¬£¬Îª1093ÍòÃÀÔª¡£¡£¡£¡£ÒÑÍùÈýÄ꣬ £¬£¬£¬£¬Ò½ÁƱ£½¡µÄ±¾Ç®ÔöÌíÁË53.3%¡£¡£¡£¡£Óë¼òµ¥´æ´¢ÒªÁìÏà±È£¬ £¬£¬£¬£¬¿ç¶à¸öÇéÐδ洢µÄÊý¾Ýй¶±¾Ç®×î¸ß£¬ £¬£¬£¬£¬¼ì²âºÍÓ¦¶ÔµÄƽ¾ùʱ¼äΪ291Ìì¡£¡£¡£¡£´¹Âڻ³ÉΪ×î³£Óõijõʼ¹¥»÷ÔØÌ壬 £¬£¬£¬£¬Õ¼±È16%£¬ £¬£¬£¬£¬Æä´ÎÊÇÆ¾Ö¤Ð¹Â¶ºÍÔÆÉèÖùýʧ¡£¡£¡£¡£Ò½ÁƱ£½¡ÐÐÒµÊý¾Ýй¶ÍùÍù»áÒ»Á¬231Ìì²Å±»·¢Ã÷£¬ £¬£¬£¬£¬¶øÆäËüÐÐÒµÔòΪ204Ìì¡£¡£¡£¡£


https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/