°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚ3TBÊý¾Ýй¶
Ðû²¼Ê±¼ä 2023-03-091¡¢°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚÔ¼3TBÊý¾Ýй¶
¾ÝýÌå3ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬°ÍÎ÷µÄ¿ç¹ú¹«Ë¾Andrade GutierrezÔ¼3TBµÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ÕâÊÇÀ¶¡ÃÀÖÞ×î´óµÄ¹¤³Ì¹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬ÈÏÕæ¸ÃµØÇø»ù´¡ÉèÊ©¡¢ÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»ÆøÒÔ¼°ÔËÊäÁìÓòµÄÖØ´óÏîÄ¿¡£¡£¡£¡£¡£¡£ºÚ¿ÍDark AngelsÉù³ÆÇÔÈ¡ÁË3TBµÄÓʼþºÍ¹«Ë¾Êý¾Ý£¬£¬£¬£¬£¬£¬Éæ¼°Ô±¹¤ÐÕÃû¡¢»¤ÕÕÐÅÏ¢¡¢¸¶¿îÐÅÏ¢ºÍ˰ºÅµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°¼¸¸ö×ÅÃûÐÞ½¨ÏîÄ¿µÄÀ¶Í¼¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÊÂÎñ±¬·¢ÔÚÈ¥Äê9ÔÂÖÁ10Ô¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/brazilian-conglomerate-3tb-data/
2¡¢FortinetÐÞ¸´Ó°ÏìFortiOSºÍFortiProxyµÄÎó²î
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬FortinetÐû²¼¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸öÓ°ÏìFortiOSºÍFortiProxyµÄ»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2023-25610£©µÄCVSSÆÀ·ÖΪ9.3£¬£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÃÌØÖÆÇëÇ󣬣¬£¬£¬£¬£¬À´ÔÚGUIÉÏÖ´ÐÐí§Òâ´úÂë»ò¾Ü¾øÐ§ÀÍ(DoS)¡£¡£¡£¡£¡£¡£Fortinetͨ¸æ³Æ£¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐδ·¢Ã÷ÈκÎÔÚÒ°ÍâʹÓõÄÇéÐΡ£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Ó¦ÓøüеÄÓû§£¬£¬£¬£¬£¬£¬Fortinet½¨Òé½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏÞÖÆ¿ÉÔ¶³Ì»á¼ûµÄIPµØµã¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability/
3¡¢Check Point·¢Ã÷Sharp Panda¹¥»÷¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ»î¶¯
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬Check Point³ÆÆä·¢Ã÷ÁËSharp PandaÕë¶Ô¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯´Ó2022Äêµ××îÏȲ¢Ò»Á¬µ½2023Ä꣬£¬£¬£¬£¬£¬Ê¹ÓÃÓã²æÊ½´¹ÂÚ¹¥»÷¾ÙÐгõʼÈëÇÖ¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþµÄ¶ñÒ⸽¼þ×°ÖÃRoyalRoad RTF¹¤¾ß°ü£¬£¬£¬£¬£¬£¬±ýÊÔͼʹÓÃÎó²îÔÚÖ÷»úÉÏ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£È»ºó×°Öò¢Ö´ÐÐÒ»¸öDLL¶ñÒâÈí¼þÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬£¬ËüÓÖ»á´ÓC2ЧÀÍÆ÷»ñÈ¡²¢Ö´Ðеڶþ¸öDLL£¬£¬£¬£¬£¬£¬¼´SoulSearcher loader£¬£¬£¬£¬£¬£¬×îÖÕ»á¼ÓÔØSoulÄ£¿£¿£¿é»¯¿ò¼Ü¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/
4¡¢Ñо¿Ö°Ô±Åû¶DJIÎÞÈË»úÖÐ16¸öÇå¾²Îó²îµÄÏêϸÐÅÏ¢
ýÌå3ÔÂ7Èճƣ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËDJIÎÞÈË»úÖеÄ16¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îµÄÓ°Ïì¹æÄ£ºÜ¹ã£¬£¬£¬£¬£¬£¬´Ó¾Ü¾øÐ§À͵½í§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬ÆäÖÐÓÐ14¸öÎó²î¿ÉÒÔͨ¹ýÖÇÄÜÊÖ»úÔ¶³Ì´¥·¢£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÎÞÈË»úÔÚº½ÐÐ;ÖÐ×¹»Ù¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹¿ÉÒÔ¸üËûÈÕÖ¾Êý¾Ý»òÐòÁкÅÀ´Î±×°Éí·Ý£¬£¬£¬£¬£¬£¬»òÕßÈÆ¹ý¶ÔËÙÂʺ͸߶ȷ½ÃæµÄÏÞÖÆ£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýµØÀíΧÀ¸ºÍÐéÄâ½çÏß¶Ô½û·ÉÇøÓòµÄÏÞÖÆ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬DJIÒÑÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£¡£
https://www.hackread.com/dji-drones-flaw-crash-drones-mid-flight/
5¡¢TrendMicroÐû²¼2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬Trend MicroÐû²¼ÁË2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬£¬Trend Micro¼ì²âµ½ÁË1464ÒÚ´ÎÍþв£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË55.3%¡£¡£¡£¡£¡£¡£¹¥»÷Õß×î³£ÓõÄATT&CKÊÖÒÕΪԶ³ÌЧÀÍ¡¢ÓÐÓÃÕÊ»§ºÍ²Ù×÷ϵͳƾ֤ת´¢¡£¡£¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬£¬Microsoft×èÖ¹ÁËOfficeÎĵµÖкê³ÌÐòµÄÖ´ÐУ¬£¬£¬£¬£¬£¬´Ë¾Ùµ¼ÖÂOfficeºêµÄʹÓÃϽµ£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß×îÏÈѰÕÒÌæ»»¼Æ»®£¬£¬£¬£¬£¬£¬ÀýÈçHTML×ß˽µÈÕ½ÂÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶ÔÔÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨ÎÞЧÀÍÆ÷ƽ̨ÉϵũӦÁ´¹¥»÷£¬£¬£¬£¬£¬£¬ÒÔ¼°ÔÚLinuxϵͳÉÏÌᳫ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/c/expanding-attack-blueprints-2022-annual-cybersecurity-report-.html
6¡¢MorphisecÐû²¼¶ñÒâÈí¼þSYS01ÇÔÊØÐÅÏ¢µÄÆÊÎö±¨¸æ
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬MorphisecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þSYS01µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£×Ô2022Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚÕë¶ÔÒªº¦Õþ¸®»ù´¡ÉèÊ©¡¢ÖÆÔ칫˾ºÍÆäËüÐÐÒµµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓùȸè¹ã¸æºÍÐéαµÄFacebookСÎÒ˽¼Ò×ÊÁÏÀ´Õë¶ÔFacebookÉÌÒµÕË»§£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄÏÂÔØ¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨µÇ¼Êý¾Ý¡¢cookieÒÔ¼° Facebook¹ã¸æºÍÆóÒµÕÊ»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://blog.morphisec.com/sys01stealer-facebook-info-stealer