·áÌï½ðÈÚЧÀ͹«Ë¾Ôâµ½Medusa¹¥»÷²¢±»ÀÕË÷800ÍòÃÀÔª

Ðû²¼Ê±¼ä 2023-11-20
1¡¢·áÌï½ðÈÚЧÀ͹«Ë¾Ôâµ½Medusa¹¥»÷²¢±»ÀÕË÷800ÍòÃÀÔª


¾ÝýÌå11ÔÂ16ÈÕ±¨µÀ£¬ £¬ £¬ £¬·áÌï½ðÈÚЧÀ͹«Ë¾(TFS)Ôâµ½¹¥»÷£¬ £¬ £¬ £¬ÆäÔÚÅ·Ö޺ͷÇÖÞµÄϵͳÉϼì²âµ½Î´¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïMedusaÒѽ«TFSÁÐÈëÆäÍøÕ¾£¬ £¬ £¬ £¬²¢ÀÕË÷800ÍòÃÀÔªÒÔɾ³ýÊý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹¸øÁË·áÌï10ÌìµÄʱ¼ä×ö³ö»ØÓ¦£¬ £¬ £¬ £¬²¢¿ÉÒÔÑ¡ÔñÑÓºã¾ÃÏÞ£¬ £¬ £¬ £¬Ö»ÒªÌìÌìÖ§¸¶10000ÃÀÔª¡£¡£¡£¡£¡£¡£ÎªÁË֤ʵÈëÇÖ£¬ £¬ £¬ £¬ºÚ¿ÍMedusaÐû²¼Á˰üÀ¨²ÆÎñÎļþ¡¢µç×Ó±í¸ñºÍ¹ºÖ÷¢Æ±µÈÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£´ó´ó¶¼Îļþ¶¼ÊǵÂÓ £¬ £¬ £¬Åú×¢ºÚ¿ÍÀֳɻá¼ûÁË·áÌïÖÐÅ·ÓªÒµµÄϵͳ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¸Â¶£¬ £¬ £¬ £¬´Ë´Î¹¥»÷¿ÉÄÜÓëCitrix GatewayµÄÎó²îÓйء£¡£¡£¡£¡£¡£


https://securityaffairs.com/154319/data-breach/toyota-financial-services-medusa-ransomware.html


2¡¢ÑÅÂí¹þ·ÆÂɱö·Ö¹«Ë¾±»INC¹¥»÷Ô¼37GBµÄÊý¾Ýй¶


¾Ý11ÔÂ17ÈÕ±¨µÀ£¬ £¬ £¬ £¬ÑÅÂí¹þÆû³µ·ÆÂɱöĦÍгµÖÆÔì·Ö¹«Ë¾(YMPH)Ôâµ½¹¥»÷£¬ £¬ £¬ £¬²¿·ÖÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¡£¡£YMPHÓÚ10ÔÂ25ÈÕÊ״η¢Ã÷ÎÊÌ⣬ £¬ £¬ £¬Æäһ̨ЧÀÍÆ÷Ô⵽δ¾­ÊÚȨµÄ»á¼û£¬ £¬ £¬ £¬ÏÖÔÚÕýÔÚÆÀ¹À´Ë´Î¹¥»÷Ó°ÏìµÄ¹æÄ£¡£¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïINCÉù³Æ¶Ô´ËÊÂÈÏÕæ£¬ £¬ £¬ £¬ÓÚ11ÔÂ15ÈÕ½«¸Ã¹«Ë¾Ìí¼Óµ½ÆäÍøÕ¾¡£¡£¡£¡£¡£¡£ÒÔºóÐû²¼Á˶à¸öÎļþ£¬ £¬ £¬ £¬ÆäÖаüÀ¨Ô¼Äª37GBµÄÊý¾Ý£¬ £¬ £¬ £¬Éæ¼°Ô±¹¤IDÐÅÏ¢¡¢±¸·ÝÎļþÒÔ¼°¹«Ë¾ºÍÏúÊÛÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/yamaha-motor-confirms-ransomware-attack-on-philippines-subsidiary/ 


3¡¢BGRSºÍSIRVAÔâ¹¥»÷µ¼Ö¼ÓÄôóÊÐÕþ»ú¹¹´ó×ÚÔ±¹¤ÐÅϢй¶


¼ÓÄôóÕþ¸®ÔÚ11ÔÂ19ÈÕÅû¶Á˽üÆÚµÄÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬ £¬ £¬ £¬Ó°ÏìÁËÏÖÈκÍǰÈι«¹²Ð§ÀͲ¿·ÖÔ±¹¤ÒÔ¼°¼ÓÄôó»Ê¼ÒÆï¾¯ºÍ¼ÓÄôóÎä×°²½¶Ó³ÉÔ±¡£¡£¡£¡£¡£¡£ÏÖÔÚÈ·¶¨£¬ £¬ £¬ £¬ÎªÔ±¹¤Ìṩ°á¼ÒЧÀ͵ÄBrookfield Global Relocation Services(BGRS)ºÍSIRVA Worldwide Relocation & Moving ServicesÊÇ´Ë´ÎÊý¾Ýй¶ÊÂÎñµÄÔ´Í·¡£¡£¡£¡£¡£¡£¾ÝϤ£¬ £¬ £¬ £¬Ô±¹¤×Ô1999ÄêÒÔÀ´ÏòÕâЩ¹«Ë¾ÌṩµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£10ÔÂ6ÈÕ£¬ £¬ £¬ £¬LockBit3.0½«SIRVAÌí¼Óµ½ÁËÆäÍøÕ¾£¬ £¬ £¬ £¬²¢ÓÚ11ÔÂ19ÈÕ¹ûÕæÁ˱»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£BGRSÍøÕ¾×Ô9ÔÂ29ÈÕÆðÒ»Ö±´¦ÓÚÀëÏß״̬¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/canadian-government-announces-data-breach-urges-public-service-employees-to-take-action/


4¡¢Google³ÆZimbraÎó²îCVE-2023-37580±»4¸öÍÅ»ïʹÓÃ


11ÔÂ16ÈÕ£¬ £¬ £¬ £¬Google TAGÅû¶ÁË4ÆðʹÓÃZimbraÖеÄXSSÎó²î£¨CVE-2023-37580£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£µÚÒ»´Î»î¶¯±¬·¢ÓÚ6ÔÂ⣬ £¬ £¬ £¬Õë¶ÔµÄÊÇÏ£À°Ä³Õþ¸®»ú¹¹£¬ £¬ £¬ £¬·¢Ã÷Îó²îºóZimbraÔÚGitHubÉÏÍÆËÍÁËÒ»¸ö½ôÆÈÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£Winter VivernÓÚ7ÔÂ11ÈÕʹÓøÃÎó²î¹¥»÷ÁËĦ¶û¶àÍߺÍÍ»Äá˹µÄÕþ¸®»ú¹¹£¬ £¬ £¬ £¬ZimbraÔÚ7ÔÂ13ÈÕÐû²¼Ç徲ͨ¸æ½¨ÒéÓû§½ÓÄÉ»º½â²½·¥¡£¡£¡£¡£¡£¡£7ÔÂ20ÈÕ£¬ £¬ £¬ £¬Î´ÖªºÚ¿Í¹¥»÷ÁËÔ½ÄÏijÕþ¸®»ú¹¹£¬ £¬ £¬ £¬ÎåÌìºóZimbraÐû²¼Á˸ÃÎó²îµÄ¹Ù·½²¹¶¡¡£¡£¡£¡£¡£¡£8ÔÂ25£¬ £¬ £¬ £¬TAG·¢Ã÷Á˵Ú4´ÎʹÓøÃÎó²îµÄ¹¥»÷»î¶¯£¬ £¬ £¬ £¬Õë¶Ô°Í»ù˹̹Õþ¸®»ú¹¹¡£¡£¡£¡£¡£¡£


https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/


5¡¢8BaseÍÅ»ïͨ¹ýSmokeLoader·Ö·¢ÐµÄPhobos±äÌå


CiscoÔÚ11ÔÂ18Èճƣ¬ £¬ £¬ £¬8Base½üÆÚµÄ»î¶¯ÓÐËùÔöÌí£¬ £¬ £¬ £¬ËüʹÓÃÀÕË÷Èí¼þPhobosµÄ±äÌåºÍÆäËü¹ûÕæ¿ÉÓõŤ¾ßÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï´ó´ó¶¼Phobos±äÌå¶¼ÊÇÓɺóÃÅSmokeLoader·Ö·¢µÄ¡£¡£¡£¡£¡£¡£ÔÚ8Base»î¶¯ÖУ¬ £¬ £¬ £¬ËüÔÚ¼ÓÃܵÄpayloadÖÐǶÈëÁËÀÕË÷Èí¼þ×é¼þ£¬ £¬ £¬ £¬È»ºó½«Æä½âÃܲ¢¼ÓÔØµ½SmokeLoaderÀú³ÌµÄÄÚ´æÖС£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬ £¬ £¬Phobos¶Ô1.5MBÒÔϵÄÎļþÍêÈ«¼ÓÃÜ£¬ £¬ £¬ £¬¶ÔÁè¼ÝãÐÖµµÄÎļþ²¿·Ö¼ÓÃÜ£¬ £¬ £¬ £¬ÒÔÌá¸ßËÙÂÊ¡£¡£¡£¡£¡£¡£


https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/


6¡¢AvastÐû²¼2023ÄêµÚÈý¼¾¶ÈµÄÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


11ÔÂ16ÈÕ£¬ £¬ £¬ £¬AvastÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈµÄÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£µÚÈý¼¾¶È£¬ £¬ £¬ £¬Avastƽ¾ùÿÔÂ×èµ²µÄ¶ñÒâÈí¼þ¹¥»÷Áè¼Ý10ÒڴΣ¬ £¬ £¬ £¬ÍøÂçÍþв£¨ÓÈÆäÊÇÉ繤¹¥»÷ºÍ¶ñÒâ¹ã¸æ£©µÄ´ó·ùÔöÌíÍÆ¶¯ÁËÕâÒ»ÔöÌí¡£¡£¡£¡£¡£¡£¹¥»÷Õß¶ÔÈ˹¤ÖÇÄܵÄʹÓÃÕýÔÚ¼ÓËÙ£¬ £¬ £¬ £¬ÓÈÆäÊÇÔÚÉî¶ÈαÔì½ðÈÚÕ©Æ­»î¶¯ÖС£¡£¡£¡£¡£¡£¹ã¸æÈí¼þÏÔÖøÉý¼¶£¬ £¬ £¬ £¬ÌØÊâÊÇÄÏÃÀ¡¢·ÇÖÞ¡¢¶«ÄÏÅ·ºÍ¶«ÑǵØÇø¡£¡£¡£¡£¡£¡£ÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÍþвÔöÌí£¬ £¬ £¬ £¬ÆäÖÐÎÚ¿ËÀ¼£¨44%£©¡¢ÃÀ¹ú£¨21%£©ºÍÓ¡¶È£¨16%£©µÄÔö·ù×îÏÔ×Å¡£¡£¡£¡£¡£¡£RAT¼ÌÐø³ÊÔöÌíÇ÷ÊÆ£¬ £¬ £¬ £¬ÆÏÌÑÑÀ£¨148%£©¡¢²¨À¼£¨55%£©ºÍ˹Âå·¥¿Ë£¨43%£©µÈ¹úµÄÔö·ù×îÏÔ×Å¡£¡£¡£¡£¡£¡£


https://decoded.avast.io/threatresearch/avast-q3-2023-threat-report/