ÃÀ¹úDish NetworkÒÉËÆÔâµ½¹¥»÷ÍøÕ¾ºÍÓ¦ÓÃÎÞ·¨»á¼û

Ðû²¼Ê±¼ä 2023-02-27

1¡¢ÃÀ¹úDish NetworkÒÉËÆÔâµ½¹¥»÷ÍøÕ¾ºÍÓ¦ÓÃÎÞ·¨»á¼û


¾ÝýÌå2ÔÂ25ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÃÀ¹úµçÊÓºÍÎÀÐǹ㲥ÌṩÉÌDish NetworkЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹Ó°ÏìÁËDish NetworkÍøÕ¾ºÍÓ¦ÓóÌÐò £¬£¬£¬£¬£¬£¬°üÀ¨Dish.com¡¢DishWireless.comºÍDish AnywhereµÈ £¬£¬£¬£¬£¬£¬¿Í»§Ò²ÎÞ·¨»á¼ûËûÃǵÄÕË»§»òÔÚÏß²¥·ÅµçÊÓ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬Dish NetworkµÄÔ¶³ÌÔ±¹¤ÌåÏÖÎÞ·¨»á¼ûÊÂÇéϵͳ¡£¡£¡£¡£¡£¡£¾ÝDish NetworkµÄÒ»ÃûÔ±¹¤Í¸Â¶ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È·ÊµÔâµ½ÁËÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬µ«²¢²»È·¶¨¹¥»÷ÕßÊÇÔõÑù»ñµÃ»á¼ûȨÏ޵ġ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dish-network-goes-offline-after-likely-cyberattack-employees-cut-off/


2¡¢Symantec·¢Ã÷ÐÂÍÅ»ïClasiopaÕë¶ÔÑÇÖÞij×éÖ¯µÄ¹¥»÷


SymantecÔÚ2ÔÂ23ÈÕ³ÆÆä·¢Ã÷кڿÍÍÅ»ïClasiopaÕë¶ÔÑÇÖÞij×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Clasiopa»òÐíÓëÓ¡¶ÈÓÐ¹Ø £¬£¬£¬£¬£¬£¬ÆäÌØµãÊǾßÓÐÆæÒìµÄ¹¤¾ß¼¯ £¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸ö×Ô½ç˵¶ñÒâÈí¼þ(Backdoor.Atharvan)¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïʹÓõÄѬȾǰÑÔÈÎȻδ֪ £¬£¬£¬£¬£¬£¬µ«Ò»Ð©Ö¤¾ÝÅú×¢¹¥»÷Õßͨ¹ýÆËÃæÏò¹«ÖÚµÄЧÀÍÆ÷¾ÙÐб©Á¦¹¥»÷À´»ñµÃ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£ÈëÇÖʱËü»áɨ³ýϵͳ¼àÊÓÆ÷(Sysmon)ºÍÊÂÎñÈÕÖ¾ £¬£¬£¬£¬£¬£¬²¢×°Ööà¸öºóÃÅ £¬£¬£¬£¬£¬£¬ÈçAtharvanºÍ¿ªÔ´Lilith RATµÄÐ޸İ汾 £¬£¬£¬£¬£¬£¬À´ÍøÂçºÍй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research


3¡¢¼ÓÄôóµçÐŹ«Ë¾TelusÊÓ²ìÔ´´úÂëºÍÔ±¹¤Êý¾Ýй¶ÊÂÎñ


ýÌå2ÔÂ23ÈÕ³Æ £¬£¬£¬£¬£¬£¬¼ÓÄôóµÚ¶þ´óµçÐŹ«Ë¾TelusÕýÔÚÊÓ²ìÆäÔ´´úÂëºÍÔ±¹¤Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£2ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚÂÛ̳ÉϳöÊ۾ݳÆÊÇTelusÔ±¹¤Ãûµ¥µÄÊý¾Ý £¬£¬£¬£¬£¬£¬Ñù±¾°üÀ¨TelusÔ±¹¤£¨ÓÈÆäÊÇÈí¼þ¿ª·¢Ö°Ô±ºÍÊÖÒÕÖ°Ô±£©µÄÐÕÃûºÍÓʼþµØµã¡£¡£¡£¡£¡£¡£2ÔÂ21ÈÕ £¬£¬£¬£¬£¬£¬Í³Ò»ºÚ¿Í½¨ÉèÁËÁíÒ»¸öÂÛ̳Ìû×Ó £¬£¬£¬£¬£¬£¬Òª³öÊÛTelusµÄ˽ÈËGitHub´æ´¢¿â¡¢Ô´´úÂëÒÔ¼°¹«Ë¾µÄÈËΪµ¥¼Í¼¡£¡£¡£¡£¡£¡£Telus½²»°ÈË³Æ £¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚÊÓ²ì´Îй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬²¢È·Èϵ½ÏÖÔÚΪֹ £¬£¬£¬£¬£¬£¬ÉÐδ·¢Ã÷Èκι«Ë¾»òÁãÊÛ¿Í»§µÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telus-investigating-leak-of-stolen-source-code-employee-data/


4¡¢ÎÚ¿ËÀ¼CERT͸¶UAC-0056ÈëÇÖÆä¶à¸öÕþ¸®Ïà¹ØÍøÕ¾


ÎÚ¿ËÀ¼CERTÔÚ2ÔÂ23ÈÕ͸¶ £¬£¬£¬£¬£¬£¬UAC-0056ÍÅ»ïÔÚÉÏÖÜÈëÇÖÁËÆä¶à¸öÕþ¸®Ïà¹ØÍøÕ¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÎÚ¿ËÀ¼ÖÐÑëºÍµØ·½Õþ¸®µÄ¶à¸öÍøÕ¾Éϼì²âµ½¹¥»÷ £¬£¬£¬£¬£¬£¬µ¼ÖÂÆä²¿·ÖÍøÒ³µÄÄÚÈݱ»¸Ä¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃSSHºóÃÅCredPump£¨PAMÄ£¿£¿£¿£¿£¿£¿é£©ÊµÏÖÔ¶³ÌSSH»á¼û£¨Ê¹Óþ²Ì¬ÃÜÂëÖµ£© £¬£¬£¬£¬£¬£¬²¢ÔÚSSHÅþÁ¬Ê±´ú¼Í¼µÇ¼ºÍÃÜÂë¡£¡£¡£¡£¡£¡£»£»£»£»£»¹Ê¹ÓÃÁËHoaxPenºÍHoaxApeºóÃÅ £¬£¬£¬£¬£¬£¬¶ñÒâ´úÂëÒÔApacheWebЧÀÍÆ÷Ä£¿£¿£¿£¿£¿£¿éµÄÐÎʽ·ºÆð £¬£¬£¬£¬£¬£¬²¢ÓÚ2022Äê2ÔÂ×°Öᣡ£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬£¬webshellµÄ½¨Éèʱ¼ä²»ÍíÓÚ2021Äê12ÔÂ23ÈÕ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/142678/cyber-warfare-2/cert-of-ukraine-russia-backdoors.html


5¡¢Ë¹Ì¹¸£´óѧÉèÖùýʧµ¼Ö²¿·Ö²©Ê¿ÉêÇëÕßµÄÐÅϢй¶


¾Ý2ÔÂ24ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÃÀ¹ú˹̹¸£´óѧ¾­¼Ãѧ²©Ê¿ÉêÇëÕßµÄÐÅϢй¶¡£¡£¡£¡£¡£¡£¸ÃУÌåÏÖ £¬£¬£¬£¬£¬£¬1ÔÂ24ÈÕÆäÊÕµ½Í¨Öª £¬£¬£¬£¬£¬£¬ÓÉÓÚÎļþ¼ÐÉèÖÃÉèÖùýʧ £¬£¬£¬£¬£¬£¬¹«ÖÚ¿ÉÒÔͨ¹ýÍøÕ¾»á¼û°üÀ¨2022-23Äê˹̹¸£´óѧ¾­¼Ãϵ²©Ê¿ÏîÄ¿ÈëѧÉêÇëÎļþµÄÎļþ¼Ð¡£¡£¡£¡£¡£¡£ÔÚ¶Ô´ËʾÙÐÐÊÓ²ìºó £¬£¬£¬£¬£¬£¬·¢Ã÷ÎÞÏÞÖÆµÄ»á¼ûÊÇ´Ó2022Äê12ÔÂ5ÈÕ×îÏ鵀 £¬£¬£¬£¬£¬£¬²¢ÇÒÔÚ2022Äê12ÔÂ5ÈÕÖÁ2023Äê1ÔÂ24ÈÕÖ®¼äÓйýÁ½´ÎÏÂÔØ¡£¡£¡£¡£¡£¡£Ë¹Ì¹¸£´óѧÔÚ·¢Ã÷й¶ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹Á˶ÔÕâЩÎļþµÄ»á¼û¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/stanford-university-discloses-data-breach-affecting-phd-applicants/


6¡¢Ñо¿Ö°Ô±Åû¶ʹÓÃPureCrypter¹¥»÷Õþ¸®»ú¹¹µÄ»î¶¯


2ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬Menlo LabsÅû¶ÁËʹÓöñÒâÈí¼þÏÂÔØ³ÌÐòPureCrypter¹¥»÷Õþ¸®»ú¹¹µÄ»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃDiscordÀ´Íйܳõʼpayload £¬£¬£¬£¬£¬£¬²¢ÈëÇÖÁËÒ»¸ö·ÇÓªÀû×éÖ¯À´´æ´¢»î¶¯ÖÐʹÓÃµÄÆäËüÖ÷»ú¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Èö²¥Á˶àÖÖÀàÐ͵ĶñÒâÈí¼þ £¬£¬£¬£¬£¬£¬°üÀ¨Redline Stealer¡¢AgentTesla¡¢Eternity¡¢BlackmoonºÍPhiladelphia Ransomware¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬ÊӲ쵽µÄPureCrypter»î¶¯Ö÷ÒªÕë¶ÔÑÇÌ«µØÇøºÍ±±ÃÀµØÇøµÄ¶à¸öÕþ¸®»ú¹¹¡£¡£¡£¡£¡£¡£


https://www.menlosecurity.com/blog/purecrypter-targets-government-entities-through-discord/