±£¼ÓÀûÑÇ×Üͳ°ì¹«ÊÒµÈÕþ¸®»ú¹¹µÄÍøÕ¾Ôâµ½DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-10-18
±£¼ÓÀûÑÇ×ÜÉó²é³¤°ì¹«ÊÒ10ÔÂ15ÈÕÌåÏÖ£¬£¬£¬£¬±£¼ÓÀûÑÇÕþ¸®»ú¹¹µÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£×ÜÉó²é³¤³Æ£¬£¬£¬£¬³ýÁË×Üͳ°ì¹«ÊÒ£¬£¬£¬£¬´Ë´ÎDDoS¹¥»÷»¹µ¼Ö¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Ë¾·¨²¿ºÍÏÜ·¨·¨ÔºµÄÍøÕ¾Ð§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ËûÔö²¹µÀ£¬£¬£¬£¬´Ë´Î¹¥»÷À´×Ô¶íÂÞ˹¶¼»áÂí¸ñÄáÍиç¶û˹¿Ë£¨Magnitogorsk£©¡£¡£¡£¡£¡£¡£¡£±£¼ÓÀûÑÇÕþ¸®ÒѶÔÕâÒ»ÊÂÎñÕö¿ªÊӲ죬£¬£¬£¬²¢ÒѽÓÄɲ½·¥ïÔ̹¥»÷´øÀ´µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html
2¡¢0patchƽ̨Ðû²¼MotWÖÐÒѱ»Ê¹ÓõÄÎó²îµÄ·Ç¹Ù·½²¹¶¡
¾ÝýÌå10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬0patchƽ̨Ðû²¼ÁËÒ»¸öÃâ·ÑµÄ·Ç¹Ù·½²¹¶¡£¬£¬£¬£¬ÒÔÐÞ¸´Windows Mark of the Web(MotW)Çå¾²»úÖÆÖб»Æð¾¢Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´×èÖ¹WindowsÔÚ´ÓInternetÏÂÔØµÄZIP´æµµÖÐÌáÈ¡µÄÎļþÉÏÓ¦ÓÃ(MotW)±êÇ©¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ7ÔÂÏòMicrosoft±¨¸æÁ˸ÃÎÊÌ⣬£¬£¬£¬ËûÊ×ÏÈ·¢Ã÷ÁËZIPÎĵµÎ´×¼È·Ìí¼ÓMoTW±ê¼Ç¡£¡£¡£¡£¡£¡£¡£ÔÚ΢ÈíÐû²¼¹Ù·½¸üÐÂ֮ǰ£¬£¬£¬£¬0patchΪ¶à¸öÊÜÓ°ÏìµÄ°æ±¾¿ª·¢ÁËÃâ·ÑµÄ²¹¶¡¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-mark-of-the-web-bypass-zero-day-gets-unofficial-patch/
3¡¢Woolworths³ÆÆä220ÍòMyDeal¿Í»§µÄÐÅÏ¢ÒѾй¶
¾Ý10ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬WoolworthsµÄ×Ó¹«Ë¾MyDealÅû¶ÁËÒ»ÆðÓ°Ïì220Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÎ壬£¬£¬£¬MyDealÌåÏÖºÚ¿ÍʹÓÃй¶µÄÓû§Æ¾Ö¤»á¼ûÁ˹«Ë¾µÄ¿Í»§¹ØÏµÖÎÀí(CRM) ϵͳ£¬£¬£¬£¬´Ó¶ø¿ÉÒÔÉó²éºÍµ¼³ö¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÈÕ£¬£¬£¬£¬¹¥»÷Õß×îÏÈÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏÒÔ600ÃÀÔªµÄ¼ÛÇ®³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ¸ÃÊý¾ÝÏÖÔÚ°üÀ¨100Íò¸öÌõÄ¿£¬£¬£¬£¬µ«µ±ËûÃÇÍê³É¶ÔÊý¾Ý¿âµÄÆÊÎöʱ£¬£¬£¬£¬Ð¹Â¶µÄ¿Í»§ÊýÄ¿½«»áÔöÌí¡£¡£¡£¡£¡£¡£¡£10ÔÂ17ÈÕ£¬£¬£¬£¬ºÚ¿Í¹ûÕæÁË286¸öMyDeal¿Í»§µÄÐÅÏ¢×÷Ϊ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/woolworths-says-2-2m-mydeal-customers-data-hacked/
4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÁªºÏÐж¯¾Ð²¶Black AxeÍÅ»ïµÄ75ÈË
10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶Á˺ڿÍÍÅ»ïBlack AxµÄ75ÈË£¬£¬£¬£¬ÆäÖÐÁ½ÈËÔÚÉϸöÔÂβ²ß»®Á˶àÖÖڲƻ²¢×¬Ç®180ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ÕâЩÏÓÒÉÈËÊÇÔÚ2022Äê9ÔÂ26ÈÕÖÁ30ÈÕʱ´úÔÚÄϷǾÙÐеĹú¼ÊÁªºÏÖ´·¨Ðж¯Operation JackalÖб»²¶µÄ¡£¡£¡£¡£¡£¡£¡£Black AxeÓÚ1977ÄêÔÚÄáÈÕÀûÑǽ¨É裬£¬£¬£¬±»ÒÔΪÊÇÌìÏÂÉÏÓ°Ïì×îÉîÔ¶¡¢×îΣÏյ폷¨ÍÅ»ïÖ®Ò»£¬£¬£¬£¬ÓÚ2015ÄêÊ×´ÎÉæ×ãÍøÂç·¸·¨¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨Ðж¯¾ÙÐÐÁË49´Î¹¤ÒµËѲ飬£¬£¬£¬²é»ñÁË12000ÕÅSIM¿¨ºÍ´ó×򵀮äËü×ʲú¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html
5¡¢WIP19ÍÅ»ïÖ÷ÒªÕë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍITЧÀÍÌṩÉÌ
ýÌå10ÔÂ14ÈÕ͸¶£¬£¬£¬£¬SentinelOne³ÆÆä·¢Ã÷ÁËÐµĹ¥»÷ÍÅ»ïWIP19Ò»Ö±Õë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍITЧÀÍÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïʹÓÃÓɺ«¹ú¹«Ë¾DEEPSoft½ÒÏþµÄÕýµ±µÄ±»µÁÊý×ÖÖ¤ÊéÀ´Ç©ÊðÔÚѬȾÁ´ÖÐ×°ÖõĶñÒ⹤¼þ£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¡£Ëü»¹ÓëOperation Shadow ForceÓÐËùÖØµþ£¬£¬£¬£¬µ«Ê¹ÓÃÁËеĶñÒâÈí¼þºÍ²î±ðµÄÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷ÕßÔڻÖÐʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬£¬°üÀ¨Æ¾Ö¤×ª´¢³ÌÐò¡¢ÍøÂçɨÃ蹤¾ß¡¢ä¯ÀÀÆ÷ÇÔÈ¡³ÌÐò¡¢¼üÅ̼ͼ¹¤¾ßºÍÆÁÄ»¼Í¼¹¤¾ß¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/10/new-chinese-cyberespionage-group.html
6¡¢HP³ÆMagniberͨ¹ýJavaScriptÎļþѬȾWindowsÓû§
HPÔÚ10ÔÂ13ÈÕÐû²¼±¨¸æÕ¹ÏÖÁËÀÕË÷Èí¼þMagniberÐÂÒ»Âֵķַ¢»î¶¯¡£¡£¡£¡£¡£¡£¡£ÔÚ֮ǰµÄ»î¶¯ÖУ¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËMSIºÍEXEÎļþ£¬£¬£¬£¬¶ø×î½ü£¬£¬£¬£¬ËüÇл»µ½ÁËJavaScriptÎļþ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎļþ¾ÓÉ»ìÏý´¦Öóͷ££¬£¬£¬£¬²¢Ê¹ÓÃDotNetToJScriptÊÖÒյıäÌåÔÚϵͳÄÚ´æÖÐÖ´ÐÐ.NETÎļþ¡£¡£¡£¡£¡£¡£¡£.NETÎļþ¶Ôshellcode¾ÙÐнâÂë²¢½«Æä×¢ÈëÐÂÀú³Ì¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬Magniber¶ÔÖ÷»úÉϵÄÎļþ¾ÙÐмÓÃÜ£¬£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼¡£¡£¡£¡£¡£¡£¡£HPÖ¸³ö£¬£¬£¬£¬¸ÃÍÅ»ï»áÒªÇó¼ÒÍ¥Óû§Ö§¸¶¸ß´ï2500ÃÀÔªµÄÓöÈÀ´»Ö¸´Îļþ¡£¡£¡£¡£¡£¡£¡£
https://threatresearch.ext.hp.com/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates/


¾©¹«Íø°²±¸11010802024551ºÅ