KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-10-26
1¡¢KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷


KasperskyÔÚ10ÔÂ24ÈÕÅû¶ÁËÕë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ6ÔÂÊ״μì²âµ½¸Ã»î¶¯£¬£¬£¬£¬¶øÔÚ8ÔÂÖÐÑ®·¢Ã÷ÁËа汾µÄºóÃÅ£¬£¬£¬£¬¸ÃºóÞßÓиüÖØ´óµÄÈÆ¹ý¹¦Ð§£¬£¬£¬£¬Åú×¢¹¥»÷ÕýÔÚ¾ÙÐÐÓÅ»¯¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö°üÀ¨¶ñÒâARJÎļþµÄÓʼþ£¬£¬£¬£¬ÆäÖÐÓÐÒ»¸öÓÕ¶üPDFÎĵµºÍÒ»¸öNSIS¾ç±¾£¬£¬£¬£¬¸Ã¾ç±¾ÓÃÓÚ»ñÈ¡Ö÷Òªpayload²¢Æô¶¯Ëü¡£¡£¡£¡£¡£¡£Kaspersky³Æ£¬£¬£¬£¬Í³Ò»´¹Âڻ»¹Èö²¥ÁËÁ½¸öÃûΪNetrunnerºÍDmcservµÄºóÃÅ£¬£¬£¬£¬ÕâЩÊǾßÓвî±ðC2ЧÀÍÆ÷ÉèÖõÄÏàͬ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://securelist.ru/ataki-na-industrialnyj-i-gosudarstvennyj-sektory-rf/108229/


2¡¢·¨¹úÖ°ÒµÇò¶ÓASVELÔâµ½NoEscape¹¥»÷32GBÊý¾Ýй¶


¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬·¨¹úÖ°ÒµÀºÇò¶ÓLDLC ASVEL(ASVEL)Ôâµ½ÁËÀÕË÷ÍÅ»ïNoEscapeµÄ¹¥»÷¡£¡£¡£¡£¡£¡£NoEscapeÔÚ10ÔÂ9ÈÕ½«¸ÃÇò¶Ó¼ÓÈëÆäÍøÕ¾£¬£¬£¬£¬LDLC ASVELÓÚ10ÔÂ12ÈÕͨ¹ýýÌåÊÕµ½Í¨Öª¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁË32GBÊý¾Ý£¬£¬£¬£¬°üÀ¨ÇòÔ±µÄСÎÒ˽¼Ò×ÊÁÏ¡¢»¤ÕÕºÍÉí·ÝÖ¤£¬£¬£¬£¬Óë²ÆÎñ¡¢Ë°ÎñºÍÖ´·¨ÊÂÎñÏà¹ØµÄÎļþ£¬£¬£¬£¬ÒÔ¼°±£ÃÜЭÒé¡¢ÌõÔ¼ºÍÉñÃØÐżþµÈ¡£¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïÍþвÈôÊDz»½»Êê½ð£¬£¬£¬£¬¾Í»áÔÚ10ÔÂ20ÈÕ֮ǰÐû²¼ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ASVELÒѱ»´ÓNoEscapeµÄÍøÕ¾É¾³ý£¬£¬£¬£¬Åú×¢¶þÕß¿ÉÄÜÕýÔÚ¾ÙÐÐ̸ÅС£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/asvel-basketball-team-confirms-data-breach-after-ransomware-attack/


3¡¢Redcliffe LabsµÄ7TBÊý¾Ýй¶ӰÏìÔ¼1200Íò»¼Õß


ýÌå10ÔÂ25Èճƣ¬£¬£¬£¬Ó¡¶È±±·½°îŵÒÁ´ïµÄÒ½Áƹ«Ë¾Redcliffe LabsµÄ7TBÒ½ÁÆÊý¾Ýй¶£¬£¬£¬£¬Ó°ÏìÁËÔ¼1200Íò»¼Õß¡£¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö²»ÊÜÃÜÂë±£»£»£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬×ܾÞϸΪ7TB£¬£¬£¬£¬°üÀ¨Ô¼12347297Ìõ¼Í¼£¬£¬£¬£¬¾­ÊÓ²ìÕâЩÊý¾Ý¼¯ÊôÓÚRedcliffe Labs¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬³ýÁËÓдó×Ú»¼ÕßСÎÒ˽¼ÒºÍÒ½ÁÆÊý¾ÝÖ®Í⣬£¬£¬£¬»¹°üÀ¨¸Ã¹«Ë¾Òƶ¯Ó¦ÓóÌÐòµÄ¿ª·¢Îļþ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÊý¾Ý¿âÒѱ»±£»£»£»£»£»£»¤ÆðÀ´£¬£¬£¬£¬Éв»ÇåÎú¹ûÕæÁ˶à¾Ã¡£¡£¡£¡£¡£¡£


https://www.hackread.com/database-mess-up-7tb-healthcare-data-leak/


4¡¢ÎÚ¿ËÀ¼NCS§³§³³ÆSmokeloader¶ñÒâÈí¼þ¹¥»î¶¯¼¤Ôö 


10ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÇ徲Эµ÷ÖÐÐÄ(NCS§³§³)³Æ£¬£¬£¬£¬Ê¹ÓöñÒâÈí¼þSmokeloaderµÄ¹¥»÷»î¶¯¼¤Ôö¡£¡£¡£¡£¡£¡£NCS§³§³Ñо¿ÏÔʾ£¬£¬£¬£¬×Ô5ÔÂÒÔÀ´£¬£¬£¬£¬¶ñÒâÈí¼þÔËÓªÍÅ»ïÕë¶ÔÎÚ¿ËÀ¼µÄʵÌåÌᳫÁË´ó¹æÄ£´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ö¼ÔÚÈëÇÖϵͳ²¢ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£ÔÚ×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬ºÚ¿ÍʹÓÃSmokeloader¹¥»÷Õþ¸®»ú¹¹ºÍ½ðÈÚʵÌ壬£¬£¬£¬ÌØÊâÊÇ»á¼ÆÐÐÒµ¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý½ðÈÚÖ÷ÌâµÄ´¹ÂÚÓʼþÀ´ÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬È»ºóÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷Õß»¹»áÆÆËð»ã¿îÁ÷³Ì£¬£¬£¬£¬Í¨¹ýÌæ»»Õýµ±ÕÊ»§µÄÏêϸÐÅÏ¢À´½«×ʽðÖØ¶¨Ïòµ½×Ô¼ºµÄÕÊ»§£¬£¬£¬£¬ÕâÍ»ÏÔÁ˹¥»÷Õßһֱת±äµÄÕ½ÂÔ¡£¡£¡£¡£¡£¡£


https://therecord.media/surge-in-smokeloader-malware-attacks-targeting-ukrainian-financial-gov-orgs


5¡¢Salt Security¹ûÕæ¹ØÓÚOAuthЭÒéʵÏÖAPIµÄÎó²î


10ÔÂ24ÈÕ£¬£¬£¬£¬Salt SecurityÐû²¼ÁËеÄÑо¿£¬£¬£¬£¬Õ¹ÏÖÁËGrammarly¡¢VidioºÍBukalapakµÈÔÚÏ߯½Ì¨µÄOAuthЭÒéʵÏÖÖÐAPIµÄÎó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓпÉÄÜй¶Óû§Æ¾Ö¤²¢µ¼ÖÂÕÊ»§±»ÍêÈ«½ÓÊÜ£¬£¬£¬£¬´Ó¶øÓ°ÏìÊýÊ®ÒÚÓû§£¬£¬£¬£¬ÏÖÒÑ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¸ÃÑо¿ÖÐ×îÍ»³öµÄÒ»µãÊÇ£¬£¬£¬£¬OAuth×÷Ϊsocial-login±³ºóµÄÖ÷ÒªÊÖÒÕ£¬£¬£¬£¬×Åʵ±»Éè¼ÆµÃºÜºÃ£¬£¬£¬£¬Ã»ÓÐÏÔ×ÅÎÊÌâ¡£¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼ÎÊÌâ¶¼ÓëʹÓÃOAuthµÄ¸÷·½ÓÃÀ´ÊµÏÖOAuthµÄ·½·¨Óйء£¡£¡£¡£¡£¡£


https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts


6¡¢NCC GroupÐû²¼2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


10ÔÂ24ÈÕ£¬£¬£¬£¬NCC GroupÐû²¼ÁË2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¼Ì8Ô·ݵÄÏà¶ÔÇå¾²ºó£¬£¬£¬£¬9Ô·ݵÄÀÕË÷»î¶¯µÖ´ïÁËØ¨¹ÅδÓеÄˮƽ£¬£¬£¬£¬¶à´ï514¸öÄ¿µÄÔâµ½¹¥»÷£¬£¬£¬£¬½Ï2022Äêͬ±ÈÔöÌí153%¡£¡£¡£¡£¡£¡£Ö÷ÒªµÄ¹¥»÷ÍÅ»ïÊÇLockBit 3.0£¨Ìᳫ79´Î¹¥»÷£©¡¢LostTrust£¨53´Î£©ºÍBlackCat£¨47´Î£©¡£¡£¡£¡£¡£¡£±±ÃÀµØÇøÔâµ½µÄ¹¥»÷×î¶à£¨Õ¼50%£©£¬£¬£¬£¬Æä´ÎÊÇÅ·ÖÞ£¨30%£©ºÍÑÇÖÞ£¨9%£©¡£¡£¡£¡£¡£¡£Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÀÕË÷¹¥»÷´ó·ùÔöÌí£¬£¬£¬£¬½Ï8Ô»·±ÈÔöÌí86%¡£¡£¡£¡£¡£¡£


https://newsroom.nccgroup.com/news/ncc-group-monthly-threat-pulse-september-2023-474190