ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2022-08-12
1¡¢Ä³Æû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»HiveµÈÈý¸öÀÕË÷ÍŻ﹥»÷

      

8ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬£¬Sophos͸¶ijÆû³µ¹©Ó¦É̵ÄϵͳÔÚÁ½ÖÜÄÚ±»Èý¸öÀÕË÷ÍÅ»ïLockBit¡¢HiveºÍBlackCat¹¥»÷¡£¡£¡£¡£¡£ÕâÈý¸ö¹¥»÷ÍŻﶼʹÓÃÁËÏàͬµÄ¹ýʧÉèÖ㬣¬£¬ £¬£¬£¬£¬¼´ÔÚÖÎÀíЧÀÍÆ÷ÉÏ̻¶ÁËÔ¶³Ì×ÀÃæÐ­ÒéµÄ·À»ðǽ¹æÔò¡£¡£¡£¡£¡£5ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬Lockbit½¨ÉèÁËÁ½¸öÅú´¦Öóͷ£¾ç±¾£¨1.batºÍ2.bat£©£¬£¬£¬ £¬£¬£¬£¬Í¨¹ýPsExecÉÏ·Ö·¢ÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ£¬£¬£¬ £¬£¬£¬£¬¼ÓÃÜÁË19̨Ö÷»úÉϵÄÎļþ£» £»£»£»Á½¸öСʱ֮ºó£¬£¬£¬ £¬£¬£¬£¬HiveʹÓÃÒÑ×°ÖÃÔÚϵͳÉϵĵÄÕýµ±Èí¼þPDQ DeployÀ´·Ö·¢ÆäÀÕË÷Èí¼þ¶þ½øÖÆÎļþ£¬£¬£¬ £¬£¬£¬£¬¼ÓÃÜÁË16̨Ö÷»úµÄÎļþ£» £»£»£»5ÔÂ15ÈÕ£¬£¬£¬ £¬£¬£¬£¬BlackCatʹÓñ»Ñ¬È¾Óû§µÄƾ֤ÔÚ6̨Ö÷»úÉÏͶ·ÅÁËÁ½¸öÀÕË÷Èí¼þµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/


2¡¢Cloudflare͸¶¶àÃûÔ±¹¤Ôâµ½ÓëTwilioÀàËÆµÄ´¹ÂÚ¹¥»÷  

      

¾ÝýÌå8ÔÂ10Èճƣ¬£¬£¬ £¬£¬£¬£¬CloudflareÅû¶ÆäÖÁÉÙÓÐ76ÃûÔ±¹¤¼°Æä¾ìÊôÔâµ½ÁËÀàËÆÓÚÕë¶ÔTwilioµÄÖØ´ó´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£Õâ´Î¹¥»÷ԼĪÓëÕë¶ÔTwilioµÄ¹¥»÷ͬʱ±¬·¢£¬£¬£¬ £¬£¬£¬£¬À´×Ô4¸öÓëT-Mobile¿¯ÐеÄSIM¿¨Ïà¹ØµÄµç»°ºÅÂ룬£¬£¬ £¬£¬£¬£¬ÕâЩ¶ÌÐÅÖ¸ÏòÒ»¸ö¿´ËÆÕýµ±µÄÓò£¬£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨Òªº¦×ÖCloudflareºÍOkta£¬£¬£¬ £¬£¬£¬£¬ÊÔͼÓÕʹԱ¹¤½»³öƾ֤¡£¡£¡£¡£¡£CloudflareÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ÓÐÈýÃûÔ±¹¤ÒÑÊÜÆ­ÊÜÆ­£¬£¬£¬ £¬£¬£¬£¬µ«ÓÉÓÚʹÓûá¼ûÆäÓ¦ÓóÌÐòËùÐèµÄÇкÏFIDO2±ê×¼µÄÎïÀíÇå¾²ÃÜÔ¿£¬£¬£¬ £¬£¬£¬£¬ÆäÄÚ²¿ÏµÍ³²¢Î´±»¹¥ÆÆ¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/hackers-behind-twilio-breach-also_10.html


3¡¢Volexity³ÆZimbraÖÐÎó²î±»ÓÃÀ´¹¥»÷ÉÏǧ̨ZCSЧÀÍÆ÷

      

VolexityÔÚ8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬ZimbraÉíÖеÄÎó²îÒѱ»Ê¹ÓÃÀ´ÈëÇÖÁè¼Ý1000̨Zimbra Collaboration Suite(ZCS)ÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßÔçÔÚ6ÔÂβ¾Í×îÏÈÔÚÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-37042£©µÄ×ÊÖúÏ£¬£¬£¬ £¬£¬£¬£¬À´Ê¹ÓÃZCSÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27925£©¡£¡£¡£¡£¡£VolexityÒÔΪ£¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²îµÄʹÓ÷½·¨Óë2021ÄêÍ··¢Ã÷µÄMicrosoft Exchange 0dayµÄʹÓ÷½·¨Ò»Ö¡£¡£¡£¡£¡£ZimbraÔÚͨ¸æÖв¢Î´Í¸Â¶Îó²îʹÓÃÇéÐΣ¬£¬£¬ £¬£¬£¬£¬ µ«Ò»ÃûÔ±¹¤ÔÚ¹«Ë¾ÂÛ̳ÉϽ¨ÒéÓû§Á¬Ã¦×°Öò¹¶¡£¡£¡£¡£¡£¬£¬£¬ £¬£¬£¬£¬³ÆÎó²îȷʵÒÑÔÚ¹¥»÷Öб»Ê¹Óᣡ£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/zimbra-auth-bypass-bug-exploited-to-breach-over-1-000-servers/


4¡¢Cisco Meraki·À»ðǽÎ󱨵¼ÖÂMicrosoft 365ЧÀÍÖÐÖ¹

      

ýÌå8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬Ò»Á¬µÄÖÐÖ¹Ó°ÏìÁ˶à¸öMicrosoft 365ЧÀÍ£¬£¬£¬ £¬£¬£¬£¬Óû§ÎÞ·¨ÅþÁ¬µ½Exchange Online¡¢Microsoft Teams¡¢Outlook×ÀÃæ¿Í»§¶ËºÍOneDrive for Business¡£¡£¡£¡£¡£ËäȻ΢ÈíÌåÏÖ´ËÊÂÎñ½öÓ°ÏìÁËEMEA£¨Å·ÖÞ¡¢Öж«ºÍ·ÇÖÞ£©µØÇøµÄ¿Í»§£¬£¬£¬ £¬£¬£¬£¬µ«È«ÇòÓû§¶¼ÔÚ±¨¸æÐ§ÀÍÆ÷ÅþÁ¬ºÍµÇ¼ʧ°ÜÎÊÌâ¡£¡£¡£¡£¡£³õ³ÌÐò²é·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬Ò»Á¬ÖÐÖ¹¿ÉÄÜÓëCisco Meraki·À»ðǽÈëÇÖ¼ì²âºÍÔ¤·À(IDR)Îó±¨×èÖ¹Microsoft 365ÅþÁ¬²¢·¢³öMicrosoft Windows IIS¾Ü¾øÐ§ÀÍʵÑ龯±¨ÓйØ¡£¡£¡£¡£¡£Î¢Èí×îÖÕÈ·ÈÏÖÐÖ¹ÊÇSnort¹æÔò1-60381µ¼Öµģ¬£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖCisco MerakiÒѽûÓÃÁËÊÜÓ°ÏìµÄ¹æÔò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-triggered-by-meraki-firewall-false-positive/


5¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þBlueSkyʹÓöàÏ߳̿ìËÙ¼ÓÃÜ

      

Unit 42ÔÚ8ÔÂ10ÈÕ¹ûÕæÁËÐÂÀÕË÷Èí¼þ¼Ò×åBlueSkyµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£BlueSkyÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔWindowsÖ÷»ú£¬£¬£¬ £¬£¬£¬£¬²¢Ê¹ÓöàÏ̼߳ÓÃÜÖ÷»úÉϵÄÎļþÀ´¼ÓËÙ¼ÓÃÜËÙÂÊ¡£¡£¡£¡£¡£ÆÊÎöÀú³ÌÖÐÑо¿Ö°Ô±´ÓBlueSkyµÄÑù±¾Öз¢Ã÷ÁË¿ÉÒÔÓëContiÁªÏµÆðÀ´µÄ´úÂëÖ¸ÎÆ£¬£¬£¬ £¬£¬£¬£¬ÌØÊâÊÇBlueSkyµÄ¶àÏ̼ܹ߳¹ÓëConti v3µÄ´úÂëÏàËÆ£¬£¬£¬ £¬£¬£¬£¬ÍøÂçËÑË÷Ä£¿£¿£¿éÒ²ÊÇËüµÄÍêÈ«·­°æ¡£¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬ £¬£¬£¬£¬BlueSkyÓëBabuk¸üΪÏàËÆ£¬£¬£¬ £¬£¬£¬£¬Á½Õß¶¼Ê¹ÓÃChaCha20£¬£¬£¬ £¬£¬£¬£¬Í¬Ê±Ê¹ÓÃCurve25519À´ÌìÉúÃÜÔ¿¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/bluesky-ransomware/


6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þVileRATµÄÆÊÎö±¨¸æ

      

8ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬£¬KasperskyÐû²¼±¨¸æ³ÆDeathStalkerÔÚ2022Äê¼ÌÐøÊ¹ÓÃVileRAT¹¥»÷È«ÇòµÄ¼ÓÃÜÇ®±ÒÉúÒâЧÀÍ¡£¡£¡£¡£¡£VileRATÊÇÒ»¸ö¾­ÓÉ»ìÏýºÍ´ò°üµÄPython3 RAT£¬£¬£¬ £¬£¬£¬£¬¾ßÓÐÖ´ÐÐí§ÒâÔ¶³ÌÏÂÁî¡¢¼üÅ̼ͼºÍ´ÓC2ЧÀÍÆ÷×ÔÎÒ¸üеȹ¦Ð§£¬£¬£¬ £¬£¬£¬£¬ÔÚ2020ÄêQ2Ê״α»·¢Ã÷¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬Æù½ñΪֹ£¬£¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­È·¶¨ÁËÊý°Ù¸öÓëVileRATѬȾÁ´Ïà¹ØµÄÓò¡£¡£¡£¡£¡£2021Äê8ÔÂÖÁ½ñ£¬£¬£¬ £¬£¬£¬£¬ÔÚ±£¼ÓÀûÑÇ¡¢ÈûÆÖ·˹¡¢µÂ¹ú¡¢¸ñÁÖÄɶ¡Ë¹¡¢¿ÆÍþÌØ¡¢Âí¶úËû¡¢°¢À­²®ÁªºÏÇõ³¤¹úºÍ¶íÂÞ˹Áª°î·¢Ã÷ÁË10¸ö±»Ñ¬È¾Ä¿µÄ¡£¡£¡£¡£¡£


https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/