ConnectWiseÐÞ¸´¿ÉÓ°ÏìÊýǧ̨ЧÀÍÆ÷µÄRCEÎó²î

Ðû²¼Ê±¼ä 2022-11-01

1¡¢ConnectWiseÐÞ¸´¿ÉÓ°ÏìÊýǧ̨ЧÀÍÆ÷µÄRCEÎó²î

      

ýÌå10ÔÂ28Èճƣ¬£¬£¬£¬ £¬ConnectWiseÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬ £¬ÐÞ¸´ÁËConnectWise RecoverºÍR1Soft Server Backup Manager(SBM)Çå¾²±¸·Ý½â¾ö¼Æ»®ÖеÄÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÏÂÓÎ×é¼þʹÓõÄÊä³öÖÐÌØÊâÔªËØµÄÖкͲ»µ±ÎÊÌ⣬£¬£¬£¬ £¬¿É±»¹¥»÷ÕßÓÃÀ´»á¼ûÉñÃØÊý¾Ý»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ShodanɨÃ裬£¬£¬£¬ £¬Áè¼Ý4800̨R1SoftЧÀÍÆ÷¿ÉÄÜ»áÔâµ½´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»±ê¼ÇΪ¸ßÓÅÏȼ¶£¬£¬£¬£¬ £¬¼´ÔÚ¹¥»÷Öб»Ê¹ÓõÄΣº¦ºÜ¸ß¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄConnectWise Recover sbmÒÑ×Ô¶¯¸üе½×îа汾(v2.9.9)¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/connectwise-fixes-rce-bug-exposing-thousands-of-servers-to-attacks/


2¡¢Ó¢¹úǰÔ׺âLiz TrussµÄÊÖ»ú¾Ý³Æ±»ÍøÂçÌØ¹¤ÈëÇÖ

      

¾ÝÓ¢¹ú¡¶ÖðÈÕÓʱ¨¡·10ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬ £¬Ó¢¹úǰÔ׺âÀû×È¡¤ÌØÀ­Ë¹£¨Liz Truss£©µÄ˽ÈËÊÖ»úÔâµ½ÒÉËÆÀ´×Ô¶íÂÞ˹µÄÈëÇÖ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬ £¬¹¥»÷ÕßÒѾ­»ñµÃÁËÓëÖ÷Òª¹ú¼ÊÏàÖúͬ°éµÄ¾øÃܽ»Á÷£¬£¬£¬£¬ £¬ÒÔ¼°ÓëËýµÄÖ÷ÒªÕþÖÎÃËÓÑ¿äÎ÷¡¤¿ËÎÖëøµÄ˽ÈË̸»°¡£¡£¡£¡£¡£¡£¡£ÓÐÐÂÎųÆ£¬£¬£¬£¬ £¬¸ÃÊÖ»úÒѱ»ÑÏÖØË𻵣¬£¬£¬£¬ £¬ÏÖÔÚ°²ÅÅÔÚÕþ¸®Çå¾²µãµÄÒ»¸ö°ü¹ÜÏäÖС£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÏÄÈÕÊØ¾Éµ³Ïòµ¼¾ºÑ¡Ê±´úÈëÇÖÁËÌØÀ­Ë¹µÄÊÖ»ú£¬£¬£¬£¬ £¬ÆäʱµÄÔ׺ⱫÀï˹¡¤Ô¼º²Ñ·ºÍÄÚ¸óÃØÊéÎ÷ÃÉ¡¤¿­Ë¹¾öÒéÖÜÈ«·â±Õ¸ÃÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡¶ÐÇÆÚÈÕÓʱ¨¡·Í¸Â¶£¬£¬£¬£¬ £¬ÌØÀ­Ë¹¼°25λÄڸ󲿳¤µÄÊÖ»úºÅÂëÒ»ÆðÔÚÍøÉϳöÊÛ£¬£¬£¬£¬ £¬ÊÛ¼Û½öΪ6.49Ó¢°÷¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/137826/intelligence/liz-truss-phone-hacked.html


3¡¢AndroidľÂíDrinikбäÌå¹¥»÷Ó¡¶ÈµÄ18¼Ò½ðÈÚ»ú¹¹

      

CybleÔÚ10ÔÂ27ÈÕ³ÆÆä·¢Ã÷DrinikµÄбäÌåÕë¶ÔÓ¡¶ÈµÄ18¼Ò½ðÈÚ»ú¹¹¡£¡£¡£¡£¡£¡£¡£2016Ä꣬£¬£¬£¬ £¬Drinik¶ñÒâÈí¼þµÄÔçÆÚ±äÖÖÊ״α»·¢Ã÷ÊÇSMSÇÔÈ¡³ÌÐò£¬£¬£¬£¬ £¬Ô¼ÄªÔÚ2021Äê8ÔÂÆäÔٴλîÔ¾£¬£¬£¬£¬ £¬ÕâÒ»´ÎÑݱäΪAndroidÒøÐÐľÂí¡£¡£¡£¡£¡£¡£¡£×îа汾µÄ¶ñÒâÈí¼þαװ³ÉÃûΪiAssistµÄAPK£¬£¬£¬£¬ £¬Éù³ÆÊÇÓ¡¶È˰Îñ²¿·ÖµÄ¹Ù·½Ë°ÎñÖÎÀí¹¤¾ß¡£¡£¡£¡£¡£¡£¡£×îÖջὫĿµÄÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾£¬£¬£¬£¬ £¬²¢ÓÕʹËûÃÇÊäÈë²ÆÎñÐÅÏ¢£¬£¬£¬£¬ £¬ÈçÕʺš¢ÐÅÓÿ¨ºÅ¡¢CVVºÍPINµÈ¡£¡£¡£¡£¡£¡£¡£


https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/


4¡¢BlackByteÉù³ÆÒѹ¥»÷Asahi Group²¢ÀÕË÷60ÍòÃÀÔª

      

¾Ý10ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬ £¬ÀÕË÷ÍÅ»ïBlackByteÉù³ÆÒÑÈëÇÖÁËϸÃܽðÊôÖÆÔìºÍ½ðÊô½â¾ö¼Æ»®ÌṩÉÌAsahi Group Holdings¡£¡£¡£¡£¡£¡£¡£BlackByteÌåÏÖÒѴӸù«Ë¾ÇÔÈ¡ÁËÊýǧÕ××Ö½ÚµÄÎļþ£¬£¬£¬£¬ £¬°üÀ¨²ÆÎñºÍÏúÊÛ±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒªÇó50ÍòÃÀÔª¹ºÖÃÊý¾Ý£¬£¬£¬£¬ £¬²¢ÒªÇó60ÍòÃÀԪɾ³ý±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£BlackByte×Ô2021Äê9ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬ £¬FBIÔÚ2Ô·Ý͸¶¸ÃÍÅ»ïÒÑÈëÇÖÁËÃÀ¹úÖÁÉÙ3¸öÉæ¼°Òªº¦»ù´¡ÉèÊ©ÁìÓòµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/137803/cyber-crime/blackbyte-ransomware-asahi-group-holdings.html


5¡¢Î¢ÈíÐû²¼¹ØÓÚRaspberry RobinÈ䳿µÄÆÊÎö±¨¸æ

      

΢ÈíÔÚ10ÔÂ27ÈÕÐû²¼Á˹ØÓÚRaspberry RobinÈ䳿µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬ £¬±»×·×ÙΪDEV-0950µÄ×é֯ʹÓÃClopÀÕË÷Èí¼þÀ´¼ÓÃÜÏÈǰѬȾÁËRaspberry RobinÈ䳿µÄÍøÂ磬£¬£¬£¬ £¬DEV-0950µÄ»î¶¯ÓëFIN11ºÍTA505ÍÅ»ïÖØµþ¡£¡£¡£¡£¡£¡£¡£³ýÁËÀÕË÷Èí¼þ£¬£¬£¬£¬ £¬Raspberry Robin»¹±»ÓÃÓÚ½«×°ÖÃÆäËüµÚ¶þ½×¶Îpayload£¬£¬£¬£¬ £¬°üÀ¨IcedID¡¢BumblebeeºÍTruebot¡£¡£¡£¡£¡£¡£¡£Î¢Èí»¹Ö¸³ö£¬£¬£¬£¬ £¬Ô¼1000¸ö×éÖ¯µÄ½ü3000̨װ±¸ÔÚÒÑÍù30ÌìÄÚ·ºÆðÁËÖÁÉÙÒ»´ÎÓëRaspberry Robin payloadÏà¹ØµÄ¾¯±¨¡£¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/


6¡¢NSAµÈ»ú¹¹Ðû²¼Èí¼þ¹©Ó¦ÉÌÔõÑù±£»£»£»£»¤¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ

      

¾ÝýÌå10ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬ £¬NSA¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)Ðû²¼¹ØÓÚÈí¼þ¹©Ó¦ÉÌÔõÑù±£»£»£»£»¤¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ£¬£¬£¬£¬ £¬°üÀ¨Çå¾²ÐèÇóÍýÏëºÍÈí¼þÇ徲ά»¤¡£¡£¡£¡£¡£¡£¡£Èí¼þ¹©Ó¦ÉÌÈÏÕæÁªÏµ¿Í»§ºÍÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬ £¬Í¨¿ÉÒÔͨ¹ýÌõԼЭÒé¡¢Èí¼þÐû²¼ºÍ¸üС¢Í¨ÖªºÍÎó²î»º½âµÈ·½·¨Ó¦ÓÃÌØÁíÍâÇå¾²¹¦Ð§¡£¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÊÇÔÚ×î½ü¶à´Î±¸ÊÜÖõÄ¿µÄÍøÂç¹¥»÷Ö®ºóÐû²¼µÄ£¬£¬£¬£¬ £¬ÕâЩ¹¥»÷͹ÏÔÁ˹ú¼ÒÖ§³ÖµÄ¹¥»÷Õß¿ÉÒÔÇáËɵØÊ¹ÓÃÈí¼þ¹©Ó¦Á´ÖеÄÎó²î¡£¡£¡£¡£¡£¡£¡£


https://media.defense.gov/2022/Oct/31/2003105368/-1/-1/0/SECURING_THE_SOFTWARE_SUPPLY_CHAIN_SUPPLIERS.PDF