΢ÈíÐû²¼9Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´63¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2022-09-14
1¡¢Î¢ÈíÐû²¼9Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´63¸öÇå¾²Îó²î

      

9ÔÂ13ÈÕ£¬£¬£¬£¬£¬ £¬£¬Î¢ÈíÐû²¼ÁË9Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´63¸öÇå¾²Îó²î¡£¡£ ¡£´Ë´ÎÐÞ¸´µÄÎó²îÀàÐÍΪ18¸öÌáȨÎó²î¡¢1¸öÇå¾²¹¦Ð§ÈƹýÎó²î¡¢30¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢7¸öÐÅϢй¶Îó²î¡¢7¸ö¾Ü¾øÐ§ÀÍÎó²îºÍ16¸öEdge-ChromiumÎó²î¡£¡£ ¡£´Ë´Î¹²ÐÞ¸´ÁËÁ½¸ö¹ûÕæÅû¶µÄÁãÈÕÎó²î£¬£¬£¬£¬£¬ £¬£¬»®·ÖΪWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯³ÌÐòÖеÄÌáȨÎó²î£¨CVE-2022-37969£©ºÍCache Speculation RestrictionÎó²î£¨CVE-2022-23960£©¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬£¬ £¬£¬CVE-2022-37969ÒÑÔÚ¹¥»÷Öб»Æð¾¢Ê¹Óᣡ£ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2022-patch-tuesday-fixes-zero-day-used-in-attacks-63-flaws/


2¡¢ºÚ¿ÍÍÅ»ïGhostSecÉù³ÆÒѾ­ÈëÇÖ55¸öBerghof PLC

      

¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬Óë°ÍÀÕ˹̹Ïà¹ØµÄºÚ¿ÍÍÅ»ïGhostSecÉù³Æ£¬£¬£¬£¬£¬ £¬£¬ÒÑÈëÇÖÒÔÉ«ÁеÄ×é֯ʹÓõÄ55¸öBerghof¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)¡£¡£ ¡£GhostSecÐû²¼ÁËÒ»¶ÎÊÓÆµ£¬£¬£¬£¬£¬ £¬£¬Õ¹Ê¾ÁËÀֳɵǼPLCÖÎÀíÃæ°åµÄÀú³Ì£¬£¬£¬£¬£¬ £¬£¬ÒÔ¼°ÏÔʾ¹¥»÷ijЩ½×¶ÎµÄHMIÆÁÄ»½ØÍ¼¡£¡£ ¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýʹÓÃĬÈϺÍͨÓÃÆ¾Ö¤»ñµÃÁ˶ÔPLCÖÎÀíÃæ°åµÄ»á¼ûȨÏÞ¡£¡£ ¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬ £¬£¬GhostSec»¹Ðû²¼ÁËÆäËüÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬ £¬£¬Éù³Æ¿ÉÒÔ»á¼ûÁíÒ»¸ö¿ÉÓÃÓÚÐÞ¸ÄË®ÖеÄÂȺ¬Á¿ºÍpHÖµµÄ¿ØÖÆÃæ°å¡£¡£ ¡£


https://securityaffairs.co/wordpress/135656/hacktivism/ghostsec-hacked-berghof-plcs-israel.html


3¡¢U-HaulµÄ×âÁÞÌõÔ¼ËÑË÷ÃÅ»§Ôâµ½¹¥»÷ºó¿Í»§ÐÅϢй¶

      

ýÌå9ÔÂ12Èճƣ¬£¬£¬£¬£¬ £¬£¬±±ÃÀ×î´óµÄ°áÔ˺Ͳִ¢×âÁÞ¹«Ë¾Ö®Ò»U-HaulµÄ¿Í»§ÐÅϢй¶¡£¡£ ¡£¸Ã¹«Ë¾ÔÚ7ÔÂ12ÈÕ¶Ô´ËÊÂÕö¿ªÊӲ죬£¬£¬£¬£¬ £¬£¬ÓÚ8ÔÂ1ÈÕ·¢Ã÷¹¥»÷ÕßÔÚÈ¥Äê11ÔÂ5ÈÕÖÁ½ñÄê4ÔÂ5ÈÕʱ´ú»á¼ûÁ˲¿·Ö¿Í»§µÄ×âÁÞÌõÔ¼£¬£¬£¬£¬£¬ £¬£¬²¢ÓÚ9ÔÂ7ÈÕÈ·¶¨Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¼°¼ÝʻִÕÕ»òÉí·ÝÖ¤ºÅÂë¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÊÇÔÚµÁÓÃÁËÁ½¸ö¡°Î¨Ò»µÄÃÜÂë"ºó½øÈëÁËU-HaulµÄ×âÁÞÌõÔ¼ËÑË÷ÃÅ»§£¬£¬£¬£¬£¬ £¬£¬µ«¸Ã¹«Ë¾²¢Î´Ú¹ÊÍÆ¾Ö¤ÊÇÔõÑùй¶µÄ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/u-haul-discloses-data-breach-exposing-customer-driver-licenses/


4¡¢LorenzʹÓÃMitel MiVoice VOIPÖÐÎó²îÈëÇÖÆóÒµÍøÂç

      

¾ÝArctic Wolf Labs 9ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷ÍÅ»ïLorenzÏÖʹÓÃMitel MiVoice VOIP×°±¸ÖеÄÎó²îÀ´ÈëÇÖÆóÒµÍøÂç¡£¡£ ¡£×î³õµÄ¶ñÒâ»î¶¯Ô´×ÔλÓÚÍøÂçÍâΧµÄMitel×°±¸£¬£¬£¬£¬£¬ £¬£¬LorenzʹÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-29499£©À´»ñÈ¡·´Ïòshell£¬£¬£¬£¬£¬ £¬£¬È»ºóʹÓÃChisel×÷ΪËíµÀ¹¤¾ß½øÈëÍøÂç¡£¡£ ¡£¹¥»÷Õß»áÔÚ»ñµÃ³õʼ»á¼ûȨÏÞºóÆÚ´ýÒ»¸öÔ£¬£¬£¬£¬£¬ £¬£¬È»ºó¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬ £¬£¬»¹Ê¹ÓÃFileZilla¾ÙÐÐÊý¾Ýй¶£¬£¬£¬£¬£¬ £¬£¬²¢Ê¹ÓÃBitLockerºÍÀÕË÷Èí¼þLorenz¶ÔESXi¾ÙÐмÓÃÜ¡£¡£ ¡£


https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/


5¡¢Group-IB·¢Ã÷ͨ¹ýеÄBitB¹¥»÷ÇÔÈ¡SteamÕÊ»§µÄ»î¶¯

      

Group-IBÔÚ9ÔÂ13ÈÕÅû¶Á˹¥»÷ÕßʹÓÃBrowser-in-the-Browser£¨BitB£©´¹ÂÚ¹¥»÷ÇÔÈ¡Steamƾ֤µÄ»î¶¯¡£¡£ ¡£BitBÊÇÒ»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬£¬£¬ £¬£¬Ôڻ´°¿ÚÖн¨Éè¼ÙµÄä¯ÀÀÆ÷´°¿Ú£¬£¬£¬£¬£¬ £¬£¬Ê¹ÆäÏÔʾΪĿµÄµÇ¼ЧÀ͵ĵǼµ¯³öÒ³Ãæ¡£¡£ ¡£¸Ã»î¶¯ÒÔ½õ±êÈüΪÓÕ¶ü£¬£¬£¬£¬£¬ £¬£¬Ô¼ÇëÄ¿µÄ¼ÓÈëÓ¢ÐÛͬÃË¡¢CS¡¢Dota 2»òPUBG½õ±êÈüµÄÍŶÓ£¬£¬£¬£¬£¬ £¬£¬ËùʹÓõĴ¹ÂÚ¹¤¾ß°üÔÚºÚ¿ÍÂÛ̳»ò°µÍøÖв¢Î´±»ÆÕ±éʹÓᣡ£ ¡£ÕâЩ´¹ÂÚ¹¥»÷Ö¼ÔÚ³öÊÛ¶ÔÕÊ»§µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬£¬Ò»Ð©ÖøÃûµÄSteamÕÊ»§µÄ¼ÛÖµÔÚ100000ÃÀÔªµ½300000ÃÀÔªÖ®¼ä¡£¡£ ¡£


https://blog.group-ib.com/steam


6¡¢MandiantÐû²¼¹ØÓÚAPT42¹¥»÷»î¶¯µÄÏêϸÆÊÎö±¨¸æ

      

9ÔÂ7ÈÕ£¬£¬£¬£¬£¬ £¬£¬MandiantÐû²¼ÁËÒ»·ÝÖÜÈ«µÄ±¨¸æ£¬£¬£¬£¬£¬ £¬£¬ÏêÊöÁËAPT42µÄ¹¥»÷»î¶¯¡£¡£ ¡£APT42£¨Ô­UNC788£©ÓëÒÁÀÊÓйØ£¬£¬£¬£¬£¬ £¬£¬´ú±íÒÁ˹À¼¸ïÃüÎÀ¶Ó(IRGC)µÄÇ鱨×éÖ¯(IRGC-IO)ÔË×÷£¬£¬£¬£¬£¬ £¬£¬»¹ÓëAPT35ÓÐËùÖØµþ¡£¡£ ¡£¸ÃÍÅ»ïÖ÷Òª¾ÙÐиßÕë¶ÔÐÔµÄÓã²æÊ½´¹ÂÚ¹¥»÷ºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬ £¬£¬Æä»î¶¯´óÖ·ÖΪÈýÀ࣬£¬£¬£¬£¬ £¬£¬Æ¾Ö¤ÍøÂç¡¢¼àÊӻºÍ¶ñÒâÈí¼þ·Ö·¢¡£¡£ ¡£×Ô2015ÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬MandiantÒÑÊӲ쵽Áè¼Ý30´ÎÈ·ÈÏÊÇÀ´×ÔAPT42µÄ¹¥»÷»î¶¯¡£¡£ ¡£ÓëÒÁÀÊµÄÆäËü¹¥»÷ÍÅ»ïÏàËÆ£¬£¬£¬£¬£¬ £¬£¬Æä´ó²¿·Ö»î¶¯¼¯ÖÐÔÚÖж«µØÇø£¬£¬£¬£¬£¬ £¬£¬Ö÷ÒªÕë¶Ô³ðÊÓµÄ×éÖ¯ºÍСÎÒ˽¼Ò¡£¡£ ¡£


https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises