΢ÈíÐû²¼10Ô·ÝÖܶþ²¹¶¡£¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2022-10-12
10ÔÂ11ÈÕ£¬£¬£¬Î¢ÈíÐû²¼ÁË2022Äê10Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬×ܼÆÐÞ¸´ÁË84¸öÎó²î£¨²»°üÀ¨10ÔÂ3ÈÕÔÚMicrosoft EdgeÖÐÐÞ¸´µÄ12¸öÎó²î£©¡£¡£¡£¡£´Ë´Î¹²ÐÞ¸´ÁËÁ½¸ö¹ûÕæµÄ0 day£¬£¬£¬»®·ÖΪWindows COM+ÊÂÎñϵͳЧÀÍÌáȨÎó²î£¨CVE-2022-41033£©£¬£¬£¬¿ÉÓÃÀ´»ñµÃϵͳȨÏÞ£¬£¬£¬¸ÃÎó²îÒѱ»Æð¾¢Ê¹Ó㻣»£»£»£»£»£»ÒÔ¼°Microsoft OfficeÐÅϢй¶Îó²î£¨CVE-2022-41043£©£¬£¬£¬Ê¹ÓôËÎó²î¿É»ñµÃÓû§Éí·ÝÑéÖ¤ÁîÅÆµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬´Ë´Î¸üв»°üÀ¨Ô¤¼ÆÔÚ½ñÌìÐÞ¸´µÄExchange ProxyNotShellÎó²îµÄ²¹¶¡£¬£¬£¬Óû§¿ÉÒÔÓ¦ÓÃ΢ÈíÌṩµÄ»º½â²½·¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2022-patch-tuesday-fixes-zero-day-used-in-attacks-84-flaws/
2¡¢ÃÀ¹ú¶à¸ö»ú³¡µÄÍøÕ¾ÔÚÔâµ½KillNetµÄDDoS¹¥»÷ºóÖÐÖ¹
¾Ý10ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ºÚ¿ÍÍÅ»ïKillNetÉù³Æ¶ÔÃÀ¹ú¶à¸öÖ÷Òª»ú³¡µÄÍøÕ¾¾ÙÐÐÁË´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬Ê¹ÆäÎÞ·¨»á¼û¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÍøÕ¾²»¿ÉÓõĻú³¡°üÀ¨¹þ´Ä·Æ¶ûµÂ-½Ü¿ËÑ·ÑÇÌØÀ¼´ó¹ú¼Ê»ú³¡(ATL)ºÍÂåÉ¼í¶¹ú¼Ê»ú³¡(LAX)µÈ¡£¡£¡£¡£ÆäËû·µ»ØÊý¾Ý¿âÅþÁ¬¹ýʧµÄ»ú³¡°üÀ¨Ö¥¼Ó¸ç°ÂºÚ¶û¹ú¼Ê»ú³¡(ORD)¡¢°ÂÀ¼¶à¹ú¼Ê»ú³¡(MCO)ºÍµ¤·ð¹ú¼Ê»ú³¡(DIA)µÈ¡£¡£¡£¡£KillNetÔÚÔÚÆäTelegramÉÏÁгöÁËÕâЩÓòÃû£¬£¬£¬ËüµÄ³ÉÔ±ºÍ×ÔÔ¸Õß»áÔÚ´Ë´¦»ñÈ¡ÐÂÄ¿µÄ¡£¡£¡£¡£´Ë´Î¹¥»÷²»»áÓ°Ï캽°à£¬£¬£¬µ«»á±¬·¢µ¹ÔËÓ°Ïì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-airports-sites-taken-down-in-ddos-attacks-by-pro-russian-hackers/
3¡¢Armorblox·¢Ã÷ͨ¹ýZoomÇÔÈ¡Exchangeƾ֤µÄ´¹Âڻ
ArmorbloxÔÚ10ÔÂ6ÈÕÅû¶ÁËÐÂÒ»ÂÖµÄZoom´¹Âڻ¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÒ½ÁƱ£½¡¹«Ë¾£¬£¬£¬¿ÉÒÔÇáËÉÈÆ¹ýMicrosoft ExchangeÓʼþÇå¾²»úÖÆ¡£¡£¡£¡£´¹ÂÚÓʼþ³ÆÔÚZoomÉÏÓÐÁ½ÌõÐÂÎÅ£¬£¬£¬ÆäÖл¹°üÀ¨Á½¸ö¶ñÒâÁ´½Ó¡£¡£¡£¡£Óû§ÔÚµã»÷ºó»á±»Öض¨Ïòµ½Ò»¸öαÔìµÄMicrosoftµÇÂ¼Ò³Ãæ£¬£¬£¬²¢±»ÒªÇóÊäÈëMicrosoftƾ֤ÒÔ²éÔÄδ¶ÁZoomÐÂÎÅ¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷ÕßÔÚÊÕ¼þÈ˲¿·ÖʹÓÃÁËÓû§µÄÕæÊµÐÕÃûÀ´ÔöÌí¿ÉÐŶȣ¬£¬£¬²¢Ê¹ÓÃÁËÒ»¸ö±»ÆÀΪ¡°ÖµµÃÐÅÈΡ±µÄÓÐÓÃÓòÃû¡£¡£¡£¡£
https://www.armorblox.com/blog/zoom-credential-phishing-email-attack/
4¡¢MandiantÅû¶ÐµÄPhaaSƽ̨CaffeineµÄÏêϸÐÅÏ¢
10ÔÂ10ÈÕ£¬£¬£¬Mandiant¹ûÕæÁËÐÂÍøÂç´¹ÂÚ¼´Ð§ÀÍ(PhaaS)ƽ̨CaffeineµÄÏêϸÐÅÏ¢¡£¡£¡£¡£Óë´ó´ó¶¼PhaaSƽ̨²î±ð£¬£¬£¬Caffeine¾ßÓпª·ÅµÄ×¢²áÀú³Ì£¬£¬£¬²»ÐèÒªÔ¼Çë»òÍÆ¼ö£¬£¬£¬Ò²²»ÐèÒª»ñµÃTelegram»òºÚ¿ÍÂÛ̳ÖÎÀíÔ±µÄÅú×¼£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔ¼ÓÈë²¢×îÏÈ´¹Âڻ¡£¡£¡£¡£CaffeineÌṩÁ˶àÖÖ´¹ÂÚÄ£°åÑ¡Ï£¬£¬°üÀ¨Microsoft 365ÒÔ¼°Õë¶ÔÖÐÎĺͶíÎÄÆ½Ì¨µÄÖÖÖÖÓÕ¶ü£¬£¬£¬ÈçÍøÒס£¡£¡£¡£¸Ãƽ̨»¹ÔÊÐíÓû§Ê¹ÓÃ×Ô¼ºµÄÓʼþÖÎÀí³ÌÐò·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬´Ó¶øïÔ̶ÔÍⲿ¹¤¾ßµÄÐèÇ󡣡£¡£¡£
https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform
5¡¢CymruÐû²¼¶ñÒâÈí¼þIcedID½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
CymruÔÚ10ÔÂ8Èճƣ¬£¬£¬IcedIDÔÚ½üÆÚµÄ¹¥»÷»î¶¯ÖÐʹÓÃÁ˲î±ðµÄѬȾ;¾¶¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚ9ÔÂ13ÈÕÖÁ21ÈÕ£¬£¬£¬IcedIDµÄÖ÷Òª·Ö·¢·½·¨°üÀ¨£ºZIP->ISO->LNK->JS->[CMD»òBAT]->DLL¡¢ZIP->ISO->CHM->DLL¡¢ZIP->ISO->LNK->BAT->DLL¡¢´øÓкêµÄ¶ñÒâWord»òExcelÎĵµÒÔ¼°Í¨¹ýPrivateLoader°´×°Öø¶·ÑЧÀÍÖ±½Ó·Ö·¢¡£¡£¡£¡£ÕâЩ»î¶¯ÒªÃ´Ê¹ÓÃÒâ´óÀûÓ£¬£¬ÒªÃ´Ê¹ÓÃÓ¢Ó£¬£¬Ç°ÕßµÄÀÖ³ÉÂʵÍÓÚºóÕß¡£¡£¡£¡£ÆäÖУ¬£¬£¬Ê¹ÓÃISO->LNKѬȾÁ´µÄ»î¶¯×îÀֳɣ¬£¬£¬Æä´ÎÊÇʹÓÃÓÎÏ·ÆÆ½âÓÕ¶üµÄPrivateLoader»î¶¯¡£¡£¡£¡£
https://www.team-cymru.com/post/a-visualizza-into-recent-icedid-campaigns
6¡¢VMwareÐû²¼¹ØÓÚEmotet¶ñÒâÈí¼þ¹©Ó¦Á´µÄÆÊÎö±¨¸æ
10ÔÂ10ÈÕ£¬£¬£¬VMwareÐû²¼Á˹ØÓÚEmotet¶ñÒâÈí¼þ¹©Ó¦Á´µÄÆÊÎö±¨¸æ¡£¡£¡£¡£EmotetÔÚ2021ÄêÍ·±»µ·»Ù£¬£¬£¬VMwareÔÚ2022Äê1ÔÂÊ״η¢Ã÷×îÐÂÒ»²¨Emotet¹¥»÷¡£¡£¡£¡£×Ô´ÓÖØÐ·ºÆðÒÔÀ´£¬£¬£¬EmotetÒѾÉú³¤³ÉΪȫÇò×îÏȽøµÄMaaS»ù´¡Éèʩ֮һ¡£¡£¡£¡£¸Ã±¨¸æÕ¹ÏÖÁËÓйضñÒâÈí¼þʹÓÃÁ´ºÍÄÚ²¿ÔË×÷µÄÒªº¦·¢Ã÷£ºEmotetµÄ¹¥»÷ģʽÔÚÒ»Ö±Ñݱ䡢Ëü¿ÉÒÔЧÀÍÓÚ¶à¸ö¹¥»÷Ä¿µÄ¡¢¿ª·¢ÕßÒþ²ØÁËËûÃǵÄC2»ù´¡ÉèÊ©ÒÔ¼°EmotetµÄ»ù´¡¼Ü¹¹ÔÚһֱת±ä¡£¡£¡£¡£
https://news.vmware.com/security/vmware-report-exposes-emotet-malware