Ó¢¹ú¾üÊÂÊý¾Ýй¶ÌáÐѹú·À²¿·Ö±£´æµÚÈý·½Î£º¦

Ðû²¼Ê±¼ä 2024-05-10
1. Ó¢¹ú¾üÊÂÊý¾Ýй¶ÌáÐѹú·À²¿·Ö±£´æµÚÈý·½Î£º¦


5ÔÂ9ÈÕ £¬£¬£¬ £¬´Ë´Îй¶ÊÂÎñ̻¶ÁËÁè¼Ý 225,000 ÃûÓ¢¹ú¾üÊÂÖ°Ô±µÄÊý¾Ý £¬£¬£¬ £¬Í¹ÏÔÁËÓë¹ú·ÀʵÌåÍⲿ³Ð°üÉÌÏà¹ØµÄÈ«ÇòÇ徲Σº¦¡£¡£¡£¡£´Ë´ÎÆØ¹âÓÚ±¾ÖÜÆØ¹â £¬£¬£¬ £¬Ô´ÓÚÒ»ÃûÍþвÐÐΪÕß´ÓÒ»¼Ò¹«Ë¾»ñÈ¡ÁËÓ¢¹ú½¾ü¡¢Ë®Ê¦ºÍ»Ê¼Ò¿Õ¾üÏÖÈΡ¢Ç°ÈκÍ×¼±¸ÒÛ³ÉÔ±µÄÐÕÃû¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢ºÍÆäËûÐÅϢΪӢ¹ú¹ú·À²¿ (MoD) ´¦Öóͷ£Ð½×ÊЧÀÍ¡£¡£¡£¡£BBCºÍÆäËûÓ¢¹úýÌåÈ·ÈÏÍⲿ³Ð°üÉÌΪ Shared Services Connected Ltd £¬£¬£¬ £¬²¢ÌåÏÖ±»ÈëÇÖµÄн×Êϵͳ°üÀ¨¶àÄêǰµÄ¾üÊÂÖ°Ô±ÐÅÏ¢¡£¡£¡£¡£Ó¢¹ú¹ú·À´ó³¼¸ñÀ¼ÌØ¡¤É³ÆÕ˹ÔÚÏòÒé¾Û»áÔ±½ÒÏþµÄ̸ÂÛÖÐÖ¸³ö £¬£¬£¬ £¬Õâ´ÎÏ®»÷ÊÇ¡°¶ñÒâÐÐΪÕß¡±ËùΪ £¬£¬£¬ £¬ºÜ¿ÉÄÜ»ñµÃÁËÃñ×å¹ú¼ÒµÄÖ§³Ö¡£¡£¡£¡£Ö»¹ÜһЩ¸ß¼¶Õþ¸®¹ÙÔ±Ö¸³öÖйúÊÇ×îÓпÉÄܵÄÏÓÒÉÈË £¬£¬£¬ £¬µ«É³ÆÕ˹×Ô¼º²¢Ã»Óн«Õâ´ÎÏ®»÷¹é×ïÓÚÈκÎÈ˵ÄÃû×Ö¡£¡£¡£¡£´ËÀàÎ¥¹æÐÐΪ͹ÏÔÁËÍⲿ³Ð°üÉÌÏòÏëÒªÕë¶Ô¾üʺ͹ú·ÀÊý¾ÝºÍϵͳµÄ¹¥»÷ÕßÌá³öµÄųÈõÈõµã¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/breach-of-uk-military-personnel-data-a-reminder-of-third-party-risk-in-defense-sector


2. LOCKBIT ÍÅ»ïÉù³Æ¶ÔÍþÆæÍÐÊÐÏ®»÷ÊÂÎñÈÏÕæ


5ÔÂ8ÈÕ £¬£¬£¬ £¬LockBit ÀÕË÷Èí¼þ×éÖ¯Òѽ«ÍþÆæÍÐÊÐÌí¼Óµ½Æä Tor й¶վµã £¬£¬£¬ £¬²¢ÍþвҪÐû²¼±»µÁÊý¾Ý¡£¡£¡£¡£ÍþÆæÍÐÊÇÃÀ¹ú¿°ÈøË¹ÖÝÉú³Ý×î¶àµÄ¶¼»á £¬£¬£¬ £¬Ò²ÊÇÈûÆæÍþ¿ËÏØµÄÏØ³Ç¡£¡£¡£¡£×èÖ¹2020ÄêÉú³ÝÆÕ²é £¬£¬£¬ £¬¸ÃÊÐÉú³ÝΪ397,532ÈË¡£¡£¡£¡£Çå¾²Îó²î±¬·¢ÓÚ 2024 Äê 5 Ô 5 ÈÕ £¬£¬£¬ £¬ÊÐÕþ¸®Á¬Ã¦Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò £¬£¬£¬ £¬ÒÔ±ÜÃâÍþвÉìÕÅ¡£¡£¡£¡£¸ÃÊÐÕýÔÚµÚÈý·½Ç徲ר¼ÒÒÔ¼°Áª°îºÍµØ·½Ö´·¨»ú¹¹µÄ×ÊÖúÏÂÊӲ첢×èÖ¹ÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡°³öÓÚ²Ù×÷Çå¾²µÄÄ¿µÄ £¬£¬£¬ £¬Õâ¸ö[Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæµÄ×éÖ¯µÄÃû³Æ²»»á±»¹²Ïí¡£¡£¡£¡£¡±±¨¸æÖ¸³ö¡£¡£¡£¡£È»¶ø £¬£¬£¬ £¬LockBit ÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶ÔÍþÆæÍÐÊеÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£Ö§¸¶Êê½ðµÄ×èÖ¹ÈÕÆÚÊÇ 2024 Äê 5 Ô 15 ÈÕ¡£¡£¡£¡£


https://securityaffairs.com/162910/cyber-crime/city-of-wichita-lockbit-ransomware.html


3. ´ÓÀ¬»øÓʼþµ½ AsyncRAT £¬£¬£¬ £¬¸ú×Ù·ÇPEÍøÂçÍþвµÄ¼¤Ôö


5ÔÂ8ÈÕ £¬£¬£¬ £¬AsyncRAT £¬£¬£¬ £¬Ò²³ÆÎª¡°Òì²½Ô¶³Ì»á¼ûľÂí¡± £¬£¬£¬ £¬ÊÇÒ»Öָ߶ÈÖØ´óµÄ¶ñÒâÈí¼þ±äÌå £¬£¬£¬ £¬¾­ÓÉÈ«ÐÄÉè¼Æ £¬£¬£¬ £¬Ö¼ÔÚÆÆËðÅÌËã»úϵͳÇå¾²²¢ÇÔÈ¡ÉñÃØÊý¾Ý¡£¡£¡£¡£Âõ¿Ë·ÆÊµÑéÊÒ×î½ü·¢Ã÷ÁËÒ»ÖÖÐÂÐÍѬȾÁ´ £¬£¬£¬ £¬Õ¹ÏÖÁËÆäǿʢµÄɱÉËÁ¦¼°Æä½ÓÄɵÄÖÖÖÖÇå¾²ÅÔ·»úÖÆ¡£¡£¡£¡£ËüʹÓöàÖÖÎļþÀàÐÍ £¬£¬£¬ £¬ÀýÈç PowerShell¡¢Windows ¾ç±¾Îļþ (WSF)¡¢VBScript (VBS) ÒÔ¼°¶ñÒâ HTML ÎļþÖÐµÄÆäËûÎļþÀàÐÍ¡£¡£¡£¡£ÕâÖÖ¶à·½ÃæµÄÒªÁìÖ¼ÔÚ¹æ±Ü·À²¡¶¾¼ì²âÒªÁì²¢Ôö½øÑ¬È¾µÄÈö²¥¡£¡£¡£¡£Ñ¬È¾ÊÇͨ¹ý°üÀ¨ HTML Ò³Ãæ¸½¼þµÄÀ¬»øÓʼþÆô¶¯µÄ¡£¡£¡£¡£ÔÚÎÞÒâÖз­¿ª HTML Ò³ÃæÊ± £¬£¬£¬ £¬»á×Ô¶¯ÏÂÔØ Windows ¾ç±¾Îļþ (WSF)¡£¡£¡£¡£¸Ã WSF ÎļþµÄÃüÃû·½·¨¾ÓÐÄÌåÏÖ¶©µ¥ ID £¬£¬£¬ £¬´Ó¶øÓªÔìÕýµ±ÐԵļÙÏó²¢ÓÕʹÓû§Ö´ÐÐËü¡£¡£¡£¡£Ö´ÐÐ WSF Îļþºó £¬£¬£¬ £¬Ñ¬È¾»á×Ô¶¯¾ÙÐÐ £¬£¬£¬ £¬ÎÞÐè½øÒ»²½µÄÓû§¸ÉÔ¤¡£¡£¡£¡£Ñ¬È¾Á´µÄºóÐø½×¶Î°üÀ¨ Visual Basic ¾ç±¾ (VBS)¡¢JavaScript (JS)¡¢Åú´¦Öóͷ£ (BAT)¡¢Îı¾ (TXT) ºÍ PowerShell (PS1) ÎļþµÄ°²ÅÅ¡£¡£¡£¡£×îÖÕ £¬£¬£¬ £¬¸ÃÁ´×îÖÕµ¼ÖÂÕë¶Ô aspnet_compiler.exe µÄÀú³Ì×¢Èë¡£¡£¡£¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats/


4. еÄÓÄÁéʽ̽·Õß¹¥»÷Õë¶ÔÓ¢ÌØ¶û CPU


5ÔÂ8ÈÕ £¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖÕë¶Ô¸ßÐÔÄÜÓ¢ÌØ¶û CPU µÄÐÂÓ±¹¥»÷ÒªÁì £¬£¬£¬ £¬¿ÉʹÓÃÕâЩҪÁì¶Ô¸ß¼¶¼ÓÃܱê×¼ (AES) Ëã·¨ÌᳫÃÜÔ¿»Ö¸´¹¥»÷¡£¡£¡£¡£ÕâЩÊÖÒÕ±»À´×Ô¼ÓÖÝ´óѧʥµØÑǸç·ÖУ¡¢ÆÕ¶É´óѧ¡¢±±¿¨ÂÞÀ´ÄÉ´óѧ½ÌÌÃɽ·ÖУ¡¢×ôÖÎÑÇÀí¹¤Ñ§ÔººÍ¹È¸èµÄÒ»×éѧÕßͳ³ÆÎªÌ½Â·Õß¡£¡£¡£¡£Spectre ÊÇÒ»Àà²àͨµÀ¹¥»÷µÄÃû³Æ £¬£¬£¬ £¬ÕâЩ¹¥»÷ʹÓÃÏÖ´ú CPU ÉϵķÖÖ§Õ¹ÍûºÍÍÆ²âÖ´ÐÐÀ´¶ÁÈ¡ÄÚ´æÖеÄÌØÈ¨Êý¾Ý £¬£¬£¬ £¬´Ó¶øÈƹýÓ¦ÓóÌÐòÖ®¼äµÄ¸ôÀë±£»£»£»£»£»¤¡£¡£¡£¡£×îÐµĹ¥»÷ÒªÁìÕë¶ÔµÄÊÇ·ÖÖ§Õ¹ÍûÆ÷ÖгÆÎªÂ·¾¶ÀúÊ·¼Ä´æÆ÷ ( PHR ) µÄ¹¦Ð§£¨¸Ã¹¦Ð§±£´æ×îºó½ÓÄɵķÖÖ§µÄ¼Í¼£© £¬£¬£¬ £¬ÒÔÓÕ·¢·ÖÖ§¹ýʧչÍû²¢µ¼ÖÂÊܺ¦Õß³ÌÐòÖ´ÐзÇÔ¤ÆÚµÄ´úÂë·¾¶ £¬£¬£¬ £¬´Ó¶øÎÞÒâÖÐ̻¶ÆäÉñÃØÊý¾Ý¡£¡£¡£¡£ÏêϸÀ´Ëµ £¬£¬£¬ £¬ËüÒýÈëÁËеÄÔ­Óï £¬£¬£¬ £¬¿ÉÒÔʹÓà PHR ÒÔ¼°Ìõ¼þ·ÖÖ§Õ¹ÍûÆ÷ (CBR) ÄÚµÄÕ¹ÍûÀúÊ·±í (PHT) £¬£¬£¬ £¬ÒÔ×ß©ÀúÊ·Ö´ÐÐÊý¾Ý²¢×îÖÕ´¥·¢ Spectre ʽÎó²î¡£¡£¡£¡£ÔÚÑо¿ÖиÅÊöµÄÒ»×éÑÝʾÖÐ £¬£¬£¬ £¬ÎÒÃÇ·¢Ã÷¸ÃÒªÁì¿ÉÒÔÓÐÓõØÌáÈ¡ÉñÃØ AES ¼ÓÃÜÃÜÔ¿ÒÔ¼°ÔÚÆÕ±éʹÓÃµÄ libjpeg ͼÏñ¿â´¦Öóͷ£Àú³ÌÖÐй¶ÉñÃØÍ¼Ïñ¡£¡£¡£¡£


https://thehackernews.com/2024/05/new-spectre-style-pathfinder-attack.html


5. ¡¶×îÖÕÀíÏë¡·ÓÎϷЧÀÍÆ÷ÔâÊܶà´Î DDoS ¹¥»÷


5ÔÂ8ÈÕ £¬£¬£¬ £¬ÓÉÓÚһϵÁÐÒ»Á¬µÄ DDoS ¹¥»÷ £¬£¬£¬ £¬´ó×ÚÀ¬»øÁ÷Á¿ÑÍûÁËÈÈÃÅÊÓÆµÓÎϷϵÁС¶×îÖÕÀíÏë¡·µÄЧÀÍÆ÷ £¬£¬£¬ £¬±¾ÖÜÍæ¼ÒµÇ¼ʱÓöµ½ÁËÎÊÌâ¡£¡£¡£¡£¡¶×îÖÕÀíÏë 14¡·µÄÊ״ι¥»÷´ÓÖÜÒ»×îÏÈ £¬£¬£¬ £¬Ò»Á¬ÁËÁè¼Ý 24 Сʱ £¬£¬£¬ £¬Ó°ÏìÁËÌìϸ÷µØµÄÍæ¼Ò¡£¡£¡£¡£Æäʱ £¬£¬£¬ £¬¸ÃÓÎÏ·µÄ¿¯ÐÐÉÌ¡¢ÈÕ±¾Ê·¿ËÍþ¶û°¬Äá¿Ë˹¹«Ë¾ÌåÏÖ £¬£¬£¬ £¬ÕýÔÚ¡°ÊÓ²ì´Ë´Î¹¥»÷²¢½ÓÄɶԲߡ±¡£¡£¡£¡£È»¶ø £¬£¬£¬ £¬ÖܶþµÄ¹¥»÷Ôٴα¬·¢ £¬£¬£¬ £¬ÖÜÈýÈÔÔÚÒ»Á¬ £¬£¬£¬ £¬µ¼ÖÂÍæ¼ÒµÇ¼ÄÑÌâ £¬£¬£¬ £¬²¿·ÖÅ·ÖÞ¡¢±±ÃÀºÍ´óÑóÖÞµÄÊý¾ÝÖÐÐÄÎÞ·¨»á¼û¡£¡£¡£¡£Square Enix ÉÐ佫´Ë´Î¹¥»÷¹é×ïÓÚÈκκڿÍ×éÖ¯¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£º¡°Ëæ×ÅÇéÐεÄÉú³¤ £¬£¬£¬ £¬½«Ìṩ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡±µ±ÓÎϷЧÀÍÆ÷·ºÆðÅþÁ¬ÎÊÌâ»ò×ÌÈÅʱ £¬£¬£¬ £¬Í¨³£»£»£»£»£»á·ºÆð90002 ¹ýʧ¡£¡£¡£¡£


https://therecord.media/final-fantasy-game-ddos-incident-square-enix


6. ºÚ¿ÍÀÄÓÃGoogleËÑË÷¹ã¸æÈö²¥MSI´ò°üµÄ¶ñÒâÈí¼þ


5ÔÂ8ÈÕ £¬£¬£¬ £¬ÈËÃÇ·¢Ã÷ºÚ¿ÍʹÓÃGoogle ËÑË÷¹ã¸æÍ¨¹ý MSI£¨Î¢Èí×°ÖóÌÐò£©°üÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¸Ã»î¶¯Éæ¼°ÃûΪ FakeBat µÄ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐò £¬£¬£¬ £¬Í¨¹ýαװ³ÉÕýµ±Èí¼þÏÂÔØÀ´Ãé×¼ºÁÎÞ½äÐĵÄÓû§¡£¡£¡£¡£¹¥»÷´Ó¿´ËÆÕýµ±µÄ¹È¸èËÑË÷¹ã¸æ×îÏÈ £¬£¬£¬ £¬Ê¹ÓÃÁË Notion µÈÊ¢ÐÐÈí¼þµÄÕæÊµÍøÕ¾µØµã¡£¡£¡£¡£È»¶ø £¬£¬£¬ £¬ÕâÔò¹ã¸æÖ»ÊÇÒ»¸ö»Ï×Ó £¬£¬£¬ £¬ÊÇÓÉһֱʹÓÃÓë¹þÈø¿Ë˹̹Ïà¹ØµÄÉí·ÝµÄÍþвÐÐΪÕß¹ºÖõÄ¡£¡£¡£¡£¾ÝThreatDown±¨µÀ £¬£¬£¬ £¬ºÚ¿ÍÕýÔÚʹÓà Google ËÑË÷¹ã¸æÀ´Èö²¥´øÓÐ MSI µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£µã»÷¹ã¸æ»á½øÈëÒ»¸öÒÔÓÕÆ­ÐÔ URL ÍйܵÄÍøÂç´¹ÂÚÍøÕ¾ £¬£¬£¬ £¬ÓëÕæÊµÍøÕ¾ÀàËÆ¡£¡£¡£¡£¸ÃÍøÕ¾ÌáÐÑÓû§ÏÂÔØMSIX ÃûÌõıê×¼Èí¼þ×°ÖóÌÐò £¬£¬£¬ £¬²¢ÒÔ¿´ËÆ¿ÉÐŵÄÃû³Æ¡°Forth View Designs Ltd¡±ÊðÃû¡£¡£¡£¡£¸Ã»î¶¯Ê¹Óõã»÷¸ú×ÙЧÀÍÀ´ÖÎÀí¹ã¸æµÄÓÐÓÃÐÔ²¢¹ýÂ˵ô²»ÐèÒªµÄÁ÷Á¿¡£¡£¡£¡£


https://gbhackers.com/abuse-google-search-ads/#google_vignette