΢ÈíÖÒÑÔÕýµ±ÎļþÍйÜЧÀͳÉÍøÂç´¹ÂÚÐÂÇþµÀ

Ðû²¼Ê±¼ä 2024-10-09

1. ΢ÈíÖÒÑÔÕýµ±ÎļþÍйÜЧÀͳÉÍøÂç´¹ÂÚÐÂÇþµÀ


10ÔÂ8ÈÕ£¬£¬£¬£¬ £¬£¬Microsoft Threat Intelligence±¨¸æÖ¸³ö£¬£¬£¬£¬ £¬£¬Ê¹ÓÃSharePoint¡¢OneDriveºÍDropboxµÈÕýµ±ÎļþÍйÜЧÀÍÌᳫµÄÉÌÒµµç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂç´¹ÂڻÕýÔÚÉÏÉý¡£¡£¡£¡£¡£ ¡£ÕâЩ»î¶¯×Ô2024Äê4ÔÂÖÐÑ®×îÏÈ£¬£¬£¬£¬ £¬£¬½ÓÄÉÖØ´ó·ÀÓù¹æ±ÜÊÖÒÕÈÆ¹ýÇå¾²²½·¥£¬£¬£¬£¬ £¬£¬µ¼ÖÂÉí·ÝµÁÓá¢×°±¸Ê§Ôô£¬£¬£¬£¬ £¬£¬ÉõÖÁÒýÅÕþڲƭ¡¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒÆ¶¯¡£¡£¡£¡£¡£ ¡£ÎļþÍйÜЧÀÍËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁ˱㵱£¬£¬£¬£¬ £¬£¬µ«Ò²ÒòÆÕ±éʹÓöø³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£¡£¡£¡£¡£ ¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÈÎÕË»§È¨ÏÞ£¬£¬£¬£¬ £¬£¬ÀÄÓÃÆ½Ì¨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅȪԴµÄ¶ñÒâÎļþ»òÁ´½Ó£¬£¬£¬£¬ £¬£¬±Ü¿ª¹Å°å¼ì²â¡£¡£¡£¡£¡£ ¡£Î¢Èí·¢Ã÷£¬£¬£¬£¬ £¬£¬ÏÞÖÆ»á¼ûºÍÖ»¶ÁÎļþÕ½ÂÔ±»ÆÕ±éÓ¦ÓÃÒÔÌÓ±ÜÇ徲ϵͳ¼ì²â£¬£¬£¬£¬ £¬£¬Ê¹Ç徲ɨÃèºÍÆÊÎö¶ñÒâÁ´½Ó±äµÃÄÑÌâ¡£¡£¡£¡£¡£ ¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÈι©Ó¦ÉÌÕË»§£¬£¬£¬£¬ £¬£¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÄ¿µÄ×éÖ¯¹²Ïí£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÐÅÈιØÏµÈƹýÇå¾²¹ýÂËÆ÷¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹»áð³äITÖ§³Ö»òÖÎÀíÔ±£¬£¬£¬£¬ £¬£¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§·­¿ªÎļþ¡£¡£¡£¡£¡£ ¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý£¬£¬£¬£¬ £¬£¬¾Í»á±»Öض¨Ïòµ½¶ñÒâÖÐÐÄÈËÍøÂç´¹ÂÚÒ³Ãæ£¬£¬£¬£¬ £¬£¬ÒªÇóÌṩÃÜÂëºÍÍê³É¶àÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬ £¬£¬¹¥»÷Õß´Ó¶ø²¶»ñ»á»°ÁîÅÆ¾ÙÐнøÒ»²½Ê¹Óᣡ£¡£¡£¡£ ¡£


https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/


2. GoldenJackal APT×éÖ¯Í»ÆÆÅ·ÖÞÕþ¸®¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý


10ÔÂ8ÈÕ£¬£¬£¬£¬ £¬£¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×é֯ʹÓÃÁ½Ì××Ô½ç˵¹¤¾ßÀÖ³ÉÉøÍ¸ÁËÅ·ÖÞÕþ¸®µÄ¸ôÀëϵͳ£¬£¬£¬£¬ £¬£¬ÇÔÈ¡Á˰üÀ¨µç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£ ¡£¾ÝESET±¨¸æ£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯ÖÁÉÙÁ½´ÎʵÑé´ËÀ๥»÷£¬£¬£¬£¬ £¬£¬Ò»´ÎÕë¶ÔÄÏÑǹú¼Òפ°×¶íÂÞ˹´óʹ¹Ý£¬£¬£¬£¬ £¬£¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞÕþ¸®×éÖ¯¡£¡£¡£¡£¡£ ¡£¹¥»÷ʼÓÚѬȾ»¥ÁªÍøÅþÁ¬ÏµÍ³£¬£¬£¬£¬ £¬£¬Ê¹ÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓ㬣¬£¬£¬ £¬£¬²¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´ÖƶñÒâ×é¼þ¡£¡£¡£¡£¡£ ¡£Ëæºó£¬£¬£¬£¬ £¬£¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Êä»ØÔ­Ê¼»¥ÁªÍøÅþÁ¬ÏµÍ³£¬£¬£¬£¬ £¬£¬×îÖÕ·¢Ë͸ø¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£ ¡£GoldenHowl×÷Ϊ¶à¹¦Ð§PythonºóÃÅ£¬£¬£¬£¬ £¬£¬ÔÚÅþÁ¬»¥ÁªÍøµÄ»úеÉÏÔËÐУ¬£¬£¬£¬ £¬£¬ÊµÏÖÎļþÇÔÈ¡¡¢³¤ÆÚÐÔ¼á³Ö¡¢Îó²îɨÃèºÍC2ͨѶ¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/


3. Red BarrelsÔâÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì


10ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬¹ãÊÜºÃÆÀµÄ¿Ö²ÀÓÎϷϵÁС¶Outlast¡·µÄÖÆ×÷¹«Ë¾Red BarrelsÐû²¼£¬£¬£¬£¬ £¬£¬ÆäÔâÊÜÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬ £¬£¬¿ª·¢Ê±¼ä±í±»´òÂÒ¡£¡£¡£¡£¡£ ¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶ÈëÇÖµÄÏêϸϸ½Ú£¬£¬£¬£¬ £¬£¬µ«ÓÐÐÂÎųƹ¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Í¼¼°¹«Ë¾ÐÅÓÿ¨ÏêϸÐÅÏ¢µÈ´ó×ÚÓмÛÖµµÄÐÅÏ¢¡£¡£¡£¡£¡£ ¡£Red BarrelsѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬ £¬£¬Ô¼ÇëÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ²¢Í¨ÖªÏà¹ØÀûÒæ·½ºÍÕþ¸®£¬£¬£¬£¬ £¬£¬Í¬Ê±½ÓÄɲ½·¥È·±£ÏµÍ³Çå¾²¡£¡£¡£¡£¡£ ¡£È»¶ø£¬£¬£¬£¬ £¬£¬´Ë´Î¹¥»÷¶ÔÊÂÇéÊÒµÄÔËÓª±¬·¢ÁËÖØ´óÓ°Ï죬£¬£¬£¬ £¬£¬µ¼ÖÂÖÆ×÷ʱ¼ä±íÊܵ½ÖØ´óÓ°Ï죬£¬£¬£¬ £¬£¬²¿·ÖÏîÄ¿²»µÃ²»ÍƳÙ¡£¡£¡£¡£¡£ ¡£Õâ¶ÔÆÚ´ý¡¶ÌÓÉúÊÔÁ¶¡·Ðû²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö¹¥»÷¡£¡£¡£¡£¡£ ¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂçÇå¾²µÄÔÊÐí£¬£¬£¬£¬ £¬£¬²¢ÌåÏÖ½«¼ÌÐøÊµÑé×î¼Ñʵ¼ù²½·¥£¬£¬£¬£¬ £¬£¬È·±£ÎªÔ±¹¤ÌṩÇå¾²ÇéÐΡ£¡£¡£¡£¡£ ¡£¾Ý±¨µÀ£¬£¬£¬£¬ £¬£¬ÊÓ²ìÒÑÍê³É£¬£¬£¬£¬ £¬£¬ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬ £¬£¬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»áÒ»Á¬Ò»¶Îʱ¼ä¡£¡£¡£¡£¡£ ¡£


https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/


4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank£¬£¬£¬£¬ £¬£¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì


10ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬¿µ¿¨Ë¹ÌØÓÐÏßͨѶ¹«Ë¾ (Comcast) ºÍ Truist Bank ¿ËÈÕÅû¶£¬£¬£¬£¬ £¬£¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶ÊÂÎñµÄÓ°Ï죬£¬£¬£¬ £¬£¬ÕýÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶¡£¡£¡£¡£¡£ ¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹£¬£¬£¬£¬ £¬£¬½ñÄê4ÔÂת´ïÁËÒ»Æð±¬·¢ÔÚ2ÔÂÖÁ2ÔÂʱ´úµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬ÍþвÐÐΪÕßÈëÇÖÆäÍøÂç²¢ÇÔÈ¡ÁË´ó×ÚСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝʻִÕÕºÅÂë»òÉí·ÝÖ¤µÈ¡£¡£¡£¡£¡£ ¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË£¬£¬£¬£¬ £¬£¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË¡£¡£¡£¡£¡£ ¡£¿£¿£¿£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò»£¬£¬£¬£¬ £¬£¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ï죬£¬£¬£¬ £¬£¬¶øTruistµÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÐû²¼¡£¡£¡£¡£¡£ ¡£FBCSµÄ²ÆÎñ״̬¶ñ»¯£¬£¬£¬£¬ £¬£¬ÊÜÊÂÎñ¼ä½ÓÓ°ÏìµÄʵÌåÐè×ÔÐоÙÐÐ֪ͨºÍµ÷½â³ÌÐò¡£¡£¡£¡£¡£ ¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£ ¡£È¥Äê6Ô£¬£¬£¬£¬ £¬£¬Truist BankÒ²ÔøÖ¤ÊµÒ»Æðµ¥¶ÀµÄÎ¥¹æÐÐΪ£¬£¬£¬£¬ £¬£¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/


5. »·ÇòÒôÀÖ¼¯ÍÅ680ÃûСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬£¬£¬£¬ £¬£¬Ìṩ24¸öÔÂÐÅÓÃ¼à¿ØÐ§ÀÍ


10ÔÂ7ÈÕ£¬£¬£¬£¬ £¬£¬»·ÇòÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬µ¼ÖÂ680ÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ £¬£¬°üÀ¨Éç»áÇå¾²ºÅÂëµÈ£¬£¬£¬£¬ £¬£¬±»²»·¨»ñÈ¡¡£¡£¡£¡£¡£ ¡£¸ÃÊÂÎñÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢Ã÷¡£¡£¡£¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬ £¬£¬»·ÇòÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿Ó¦ÓóÌÐòÖмà²âµ½Î´¾­ÊÚȨµÄ»î¶¯£¬£¬£¬£¬ £¬£¬Ëæ¼´Æô¶¯½ôÆÈÏìÓ¦»úÖÆ£¬£¬£¬£¬ £¬£¬Ô¼ÇëµÚÈý·½×¨¼ÒÕö¿ªÖÜÈ«ÊÓ²ìÓëµ÷½â²½·¥¡£¡£¡£¡£¡£ ¡£¾­ÓÉһϵÁÐÉó²é£¬£¬£¬£¬ £¬£¬¹«Ë¾È·ÈÏСÎÒ˽¼ÒÐÅÏ¢Òѱ»Î´¾­ÊÚȨµÄµÚÈý·½»ñÈ¡£¬£¬£¬£¬ £¬£¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²éЧ¹ûºó£¬£¬£¬£¬ £¬£¬ÒÀ¾ÝÖ´·¨ÒªÇ󣬣¬£¬£¬ £¬£¬ÏòÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢³öÁËÊý¾Ýй¶֪ͨ¡£¡£¡£¡£¡£ ¡£ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼°£¬£¬£¬£¬ £¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¼°Éç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬»·ÇòÒôÀÖ¼¯ÍÅÉÐδ·¢Ã÷Êý¾Ý±»µÁÓõÄÇéÐΣ¬£¬£¬£¬ £¬£¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸öÌåµÄ²ÆÎñÇå¾²£¬£¬£¬£¬ £¬£¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£ ¡£ÖÁÓÚ´Ë´ÎÇå¾²Îó²îµÄÏêϸÊÖÒÕϸ½Ú£¬£¬£¬£¬ £¬£¬»·ÇòÒôÀÖ¼¯ÍÅδÓè͸¶£¬£¬£¬£¬ £¬£¬Í¬Ê±£¬£¬£¬£¬ £¬£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬ £¬£¬Ç×½ü¹Ø×¢ÈκÎÒì³£½ðÈڻ¼£Ï󡣡£¡£¡£¡£ ¡£


https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html


6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜÇ®±ÒÆ­×Ó¶ÌÔÝÈëÇÖ£¬£¬£¬£¬ £¬£¬Íƹã¼ÙÀָߴú±Ò


10ÔÂ7ÈÕ£¬£¬£¬£¬ £¬£¬ÀÖ¸ßÍøÕ¾ÔâÓöÁ˼ÓÃÜÇ®±ÒÆ­×ӵĶÌÔÝÈëÇÖ¡£¡£¡£¡£¡£ ¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ùÌæ»»ÎªÐû´«¼ÙÀָߴú±ÒµÄͼƬ£¬£¬£¬£¬ £¬£¬Éù³Æ¿ÉÓÃÒÔÌ«·»¹ºÖò¢½âËøÉñÃØ½±Àø¡£¡£¡£¡£¡£ ¡£´Ë´ÎÈëÇÖ±¬·¢ÔÚÃÀ¹ú¶«²¿Ê±¼ä10ÔÂ5ÈÕÍíÉÏ9µã£¬£¬£¬£¬ £¬£¬Ò»Á¬Ô¼75·ÖÖÓ£¬£¬£¬£¬ £¬£¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å»Ö¸´¡£¡£¡£¡£¡£ ¡£Óë³£¼ûµÄ¼ÓÃÜÇ®±ÒȦÌײî±ð£¬£¬£¬£¬ £¬£¬¸ÃȦÌײ¢Î´Ö¸µ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú£¬£¬£¬£¬ £¬£¬¶øÊǽ«»á¼ûÕß´øµ½Uniswapƽ̨¹ºÖÃȦÌ×´ú±Ò¡£¡£¡£¡£¡£ ¡£ÀÖ¸ß֤ʵÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬ £¬£¬µ«Î´Í¸Â¶ÈëÇÖϸ½Ú£¬£¬£¬£¬ £¬£¬ÌåÏÖûÓÐÓû§ÕË»§±»µÁ£¬£¬£¬£¬ £¬£¬¿Í»§¿ÉÕý³£¹ºÎ£¬£¬£¬ £¬£¬²¢ÒѽÓÄɲ½·¥±ÜÃâÔٴα¬·¢¡£¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷×ÜÌåʧ°Ü£¬£¬£¬£¬ £¬£¬½öÉÙÊýÈ˹ºÖÃÁËÀָߴú±Ò¡£¡£¡£¡£¡£ ¡£ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬£¬ £¬£¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜȦÌ×£¬£¬£¬£¬ £¬£¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½·¨¡£¡£¡£¡£¡£ ¡£Í¨³££¬£¬£¬£¬ £¬£¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript£¬£¬£¬£¬ £¬£¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬ £¬£¬ÓÃÓÚÀÕË÷¡¢³öÊÛ»òÔÚÏßڲƭ¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/