´ïÀ˹½¼ÇøÀí²éÉÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2024-09-291. ´ïÀ˹½¼ÇøÀí²éÉÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷
9ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬´ïÀ˹½¼ÇøÀí²éÉÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½£¬£¬£¬£¬£¬£¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£¡£¡£¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬ÊÔͼ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥£¬£¬£¬£¬£¬£¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£¡£¡£¡£Ö»¹ÜÄÚ²¿Ð§ÀÍÊܵ½Ò»¶¨ÏÞÖÆ£¬£¬£¬£¬£¬£¬µ«Òªº¦ÍⲿЧÀÍÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ˹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ£¬£¬£¬£¬£¬£¬¼ÌÈ¥Äê´ïÀ˹Êм°½ñÄê´ïÀË¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó£¬£¬£¬£¬£¬£¬Àí²éÉÊгÉΪ×îÐÂÊܺ¦Õß¡£¡£¡£¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇ󣬣¬£¬£¬£¬£¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣¡£¡£¡£¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨£¬£¬£¬£¬£¬£¬µ«½«½ß¾¡È«Á¦ïÔ̶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£¡£¡£¡£
https://therecord.media/richardson-texas-cyberattack-city-government
2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬Èö²¥³ðÊÓÑÔÂÛ
9ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-FiЧÀ͵ÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾£¬£¬£¬£¬£¬£¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã£¬£¬£¬£¬£¬£¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£¡£¡£¡£Wi-FiЧÀÍÒÑÔÝÍ££¬£¬£¬£¬£¬£¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ£¬£¬£¬£¬£¬£¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª£¬£¬£¬£¬£¬£¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£¡£¡£¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ£¬£¬£¬£¬£¬£¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ£¬£¬£¬£¬£¬£¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²Ð§ÀÍÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶£¬£¬£¬£¬£¬£¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£¡£¡£¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸°£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¾¡¿ì»Ö¸´Ð§ÀͲ¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£¡£
https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/
3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв£¬£¬£¬£¬£¬£¬Äê´´14Íò´¹ÂÚÍøÕ¾
9ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬£¬£¬£¬£¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨É裬£¬£¬£¬£¬£¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£¡£¡£¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏßЧÀÍ×÷Ϊ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å£¬£¬£¬£¬£¬£¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬£¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓÐЧÀÍÆ÷ÉÏ¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ£¬£¬£¬£¬£¬£¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ£¬£¬£¬£¬£¬£¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ£¬£¬£¬£¬£¬£¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£¡£¡£¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀíЧÀÍÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù£¬£¬£¬£¬£¬£¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£¡£¡£¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌ壬£¬£¬£¬£¬£¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦£¬£¬£¬£¬£¬£¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂڻµÄÔöÌí£¬£¬£¬£¬£¬£¬Òò´Ë£¬£¬£¬£¬£¬£¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬£¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£¡£¡£¡£
https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/
4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò
9ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©ÆÊֶΣ¬£¬£¬£¬£¬£¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ÐÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ£¬£¬£¬£¬£¬£¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬£¬×ÜËðʧ³¬7ÍòÃÀÔª¡£¡£¡£¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈΣ¬£¬£¬£¬£¬£¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£¡£¡£¡£Õ©ÆÕßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ£¬£¬£¬£¬£¬£¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Ó㬣¬£¬£¬£¬£¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆÓû§Ç©ÊðÚ²ÆÉúÒ⣬£¬£¬£¬£¬£¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢£¬£¬£¬£¬£¬£¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣡£¡£¡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é£¬£¬£¬£¬£¬£¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ£¬£¬£¬£¬£¬£¬´Ó¶øºã¾ÃDZÔÚ¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂ磬£¬£¬£¬£¬£¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ö»¹ÜÊܺ¦ÕßÖڶ࣬£¬£¬£¬£¬£¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ£¬£¬£¬£¬£¬£¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©ÆÊֶεÄÈÏ֪ȱ·¦£¬£¬£¬£¬£¬£¬ÒÔ¼°Õ©ÆÕßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£¡£¡£¡£
https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/
5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¶à¼ÒҽԺϵͳ̱»¾
9ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾£¬£¬£¬£¬£¬£¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£¡£¡£¡£ÖÜÈý£¬£¬£¬£¬£¬£¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐУ¬£¬£¬£¬£¬£¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£¡£¡£¡£ÊÖÒÕÍŶÓѸËÙ½éÈ룬£¬£¬£¬£¬£¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏ룬£¬£¬£¬£¬£¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£¡£¡£¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏߣ¬£¬£¬£¬£¬£¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£¡£¡£¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲ⣬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÎÀÉú²¿Ç¿µ÷£¬£¬£¬£¬£¬£¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´£¬£¬£¬£¬£¬£¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬£¬£¬ÒÔ°ü¹Ü¹«¹²ÎÀÉúЧÀ͵ÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£¡£¡£¡£
https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html
6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷
9ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Î¢Èí·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ£¬£¬£¬£¬£¬£¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐΣ¬£¬£¬£¬£¬£¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£¡£¡£¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´£¬£¬£¬£¬£¬£¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Ò»Ö±½ø»¯£¬£¬£¬£¬£¬£¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬ËûÃÇÌØÊâ»îÔ¾£¬£¬£¬£¬£¬£¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£¡£¡£¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂ磬£¬£¬£¬£¬£¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖᣡ£¡£¡£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë£¬£¬£¬£¬£¬£¬ÆÆËðͬ²½ÕË»§£¬£¬£¬£¬£¬£¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂ룬£¬£¬£¬£¬£¬Èƹý±£»£»£»£»¤¡£¡£¡£¡£µ½Êֺ󣬣¬£¬£¬£¬£¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ£¬£¬£¬£¬£¬£¬Î±×°³ÉÕýµ±Óû§Éí·Ý£¬£¬£¬£¬£¬£¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷£¬£¬£¬£¬£¬£¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óᣡ£¡£¡£
https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/


¾©¹«Íø°²±¸11010802024551ºÅ