Ó¡¶ÈSree SaranÒ½ÁÆÖÐÐÄÁè¼Ý15Íò»¼ÕßµÄÊý¾Ý±»³öÊÛ
Ðû²¼Ê±¼ä 2022-12-06ýÌå12ÔÂ2Èճƣ¬£¬£¬£¬£¬£¬£¬Ä³ºÚ¿ÍÕýÔÚ³öÊÛÓ¡¶ÈÌ©Ã×¶ûÄɵ°îSree SaranÒ½ÁÆÖÐÐĵϼÕßÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¸Â¶£¬£¬£¬£¬£¬£¬£¬´ËÊÂÎñÔ´ÓÚ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ò½ÔºµÄIT¹©Ó¦ÉÌThree Cube IT LabÊ×ÏÈÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓöԹ©Ó¦ÉÌϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬ÈëÇÖÒ½ÔºµÄϵͳ²¢ÇÔÈ¡»¼ÕßµÄPIIºÍPHIÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÔÚTelegramÉϳöÊÛ¡£¡£¡£¡£¡£¡£¡£Âô¼ÒÐû²¼µÄÑù±¾ÏÔʾÊý¾ÝÀ´×Ô2007-2011Ä꣬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨15ÍòÌõ»¼ÕßÐÅÏ¢¼Í¼¡£¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/in-hackers-selling-personal-data-of-150000-patients-from-a-tamil-nadu-hospital-in-supply-chain-attack/
2¡¢AMI MegaRAC BMCÖжà¸öÎó²îÓ°ÏìAMDºÍ´÷¶ûµÈ³§ÉÌ
¾Ý12ÔÂ5ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬American Megatrends MegaRAC Baseboard Management Controller(BMC)ÖеÄ3¸öÎó²îÓ°Ïì¶à¸öÔÆÐ§ÀͺÍÊý¾ÝÖÐÐÄÌṩÉÌʹÓõÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇRedfish APIµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-40259£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9£¬£¬£¬£¬£¬£¬£¬µ«ÐèÒªÊÂÏÈÖÁÉÙ»á¼ûÒ»¸öµÍȨÏÞÕÊ»§²Å»ªÖ´ÐÐAPI»Øµ÷¡£¡£¡£¡£¡£¡£¡£Æä´ÎΪ¿É»ñµÃÖÎÀíshell»á¼ûȨÏÞµÄÎó²î£¨CVE-2022-40242£©ºÍö¾ÙÓû§Ãû²¢È·¶¨ÕÊ»§ÊÇ·ñ±£´æµÄÎó²î£¨CVE-2022-2827£©¡£¡£¡£¡£¡£¡£¡£MegaRAC BMC¹Ì¼þ±»ÖÁÉÙ15¼ÒЧÀÍÆ÷ÖÆÔìÉÌʹÓ㬣¬£¬£¬£¬£¬£¬°üÀ¨AMD¡¢Asus¡¢ARM¡¢Dell EMC¡¢Huawei¡¢InspurºÍLenovoµÈ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/severe-ami-megarac-flaws-impact-servers-from-amd-arm-hpe-dell-others/
3¡¢°ÍÎ÷×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð
¾ÝýÌå12ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ°ÍÎ÷°ü³µÄÒ»¼Ò×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ°ÍÎ÷µÄÂíÀïÀûÑÇ¡¢°¢¹Å¶à˹ºÍÀï±´ÀÊÆÕÀ×ͼÉèÓÐÁíÍâ3¸öЧÀÍ´¦¡£¡£¡£¡£¡£¡£¡£SuspectFileµÄ±¨¸æ¼Í¼Á˸ù«Ë¾ºÍ¹¥»÷ÕßµÄ̸ÅÐÀú³Ì¡£¡£¡£¡£¡£¡£¡£×î³õµÄÊê½ð½ð¶îΪ700000ÃÀÔª£¬£¬£¬£¬£¬£¬£¬¹«Ë¾Ê×ÏÈÌá³ö5ÍòÃÀÔªµÄ±¨¼Û£¬£¬£¬£¬£¬£¬£¬Ôâµ½¶ÏÈ»¾Ü¾ø¡£¡£¡£¡£¡£¡£¡£ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬£¬£¬£¬£¬½ö½ö9·ÖÖӺ󣬣¬£¬£¬£¬£¬£¬¸Ã×·Õ®¹«Ë¾¾ÍÔÞ³ÉÖ§¸¶50ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Õâ¼Ò¹«Ë¾ÌåÏÖËû²»»áִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬µ«Éв»ÇåÎúÆäÊÇ·ñ»á֪ͨÊÜÓ°ÏìµÄÈË¡£¡£¡£¡£¡£¡£¡£
https://www.suspectfile.com/brazil-debt-collection-company-pays-500000-ransom-to-hacker-group-hive/
4¡¢LazarusÍÅ»ïʹÓÃαÔìµÄ¼ÓÃÜÇ®±ÒÓ¦Ó÷ַ¢AppleJeus
12ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬VolexityÊӲ쵽³¯ÏʺڿÍÍÅ»ïLazarusÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ2022Äê6Ô£¬£¬£¬£¬£¬£¬£¬²¢ÖÁÉÙÒ»Á¬µ½2022Äê10Ô¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß×¢²áÁËÓòÃûbloxholder[.]com²¢½¨ÉèÁËÒ»¸öÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÊÇÕýµ±µÄHaasOnline×Ô¶¯¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨µÄ¿Ë¡¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓøÃÍøÕ¾·Ö·¢Î±×°³ÉBloxHolderÓ¦ÓõÄWindows MSI×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬ËüÏÖʵÉÏÊÇÓëQTBitcoinTraderÓ¦ÓÃÀ¦°óÔÚÒ»ÆðµÄ¶ñÒâÈí¼þAppleJeus¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯»¹Í¨¹ýÁ´Ê½DLL²à¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬ÒÔ´ÓÊÜÐÅÈεÄÀú³ÌÖмÓÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÈƹýAVµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/139290/apt/lazarus-apt-bloxholder-campaign.html
5¡¢HP Wolf SecurityÐû²¼2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
HP Wolf SecurityÔÚ12ÔÂ1ÈÕÐû²¼ÁË2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Q3ÓÐ44%µÄ¶ñÒâÈí¼þÊÇͨ¹ý´æµµÎļþ·Ö·¢µÄ£¬£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË11%£¬£¬£¬£¬£¬£¬£¬Ô¶¸ßÓÚͨ¹ýOfficeÎļþ·Ö·¢µÄ32%¡£¡£¡£¡£¡£¡£¡£¸ÃÍŶÓÔÚÕâÒ»¼¾¶È·¢Ã÷Á˼¸¸ö½«´æµµÎļþÓëеÄHTML×ß˽ÊÖÒÕÏàÁ¬ÏµµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬±¨¸æ»¹ÐÎòÁ˹¥»÷ÕßÔõÑùÕë¶ÔÀ¶¡ÃÀÖÞµÄÂùÝÐÐÒµ·Ö·¢Òþ²ØµÄ¶ñÒâÈí¼þOpenDocument£¬£¬£¬£¬£¬£¬£¬²¢¶Ô×î½üµÄMagniberÀÕË÷Èí¼þ»î¶¯¾ÙÐÐÁËÆÊÎö¡£¡£¡£¡£¡£¡£¡£
https://threatresearch.ext.hp.com/wp-content/uploads/2022/11/HP-Wolf-Security-Threat-Insights-Report-Q3-2022.pdf
6¡¢AquaSecÐû²¼¹ØÓÚжñÒâÈí¼þRedigoµÄÆÊÎö±¨¸æ
12ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬AquaSecÐû²¼Á˹ØÓÚÐÂRedisºóÃŶñÒâÈí¼þRedigoµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£RedigoÊÇ»ùÓÚGoµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ö÷Òª¹¥»÷±£´æÎó²î£¨CVE-2022-0543£©µÄRedisЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓëLua¾ç±¾ÒýÇæÖеÄɳÏäÌÓÒÝÓйأ¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬£¬ÓÚ2022Äê2Ô±»·¢Ã÷²¢ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýɨÃè¶Ë¿Ú6379£¬£¬£¬£¬£¬£¬£¬À´¶¨Î»Ì»Â¶µÄRedisЧÀÍÆ÷ÒÔ½¨Éè³õʼ»á¼û£¬£¬£¬£¬£¬£¬£¬È»ºóÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý6379¶Ë¿ÚÄ£ÄâÕý³£µÄRedisͨѶ£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ýÍøÂçÆÊÎö¹¤¾ßµÄ¼ì²â£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÊÔͼÒþ²ØÀ´×ÔRedigoµÄC2ЧÀÍÆ÷µÄÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£
https://blog.aquasec.com/redigo-redis-backdoor-malware