ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬×ʽ𱻵Á²¢²¿·Ö×·»Ø
Ðû²¼Ê±¼ä 2024-12-031. ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬×ʽ𱻵Á²¢²¿·Ö×·»Ø
12ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬ÎڸɴïÕþ¸®¹ÙԱ֤ʵ£¬£¬£¬£¬£¬£¬¹ú¼ÒÖÐÑëÒøÐÐϵͳÔâÊÜÁËÒÔ¾¼ÃΪĿµÄµÄºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£²ÆÎñ²¿¸ß¼¶¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬Ö»¹Üȷʵ±¬·¢Á˺ڿÍÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬£¬µ«ÇéÐβ¢Î´È籨µÀ°ãÑÏÖØ£¬£¬£¬£¬£¬£¬ÏÖÔÚÉó¼ÆºÍÊÓ²ìÊÂÇéÒѽøÈëβÉù¡£¡£¡£¡£¡£¾ÝÎڸɴïÒøÐÐ͸¶£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚÅäºÏ¾¯·½¶ÔÒ»ÆðÉæÏÓ¾³ÍâºÚ¿ÍÇÔÈ¡620ÒÚÏÈÁԼ1680ÍòÃÀÔª£©µÄ°¸¼þ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬Ò»¸ö×Գơ°Waste¡±µÄ¶«ÄÏÑǺڿÍ×éÖ¯¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ11Ô³õÈëÇÖÁËÎڸɴïÒøÐÐϵͳ²¢×ªÒÆÁË×ʽ𣬣¬£¬£¬£¬£¬ÆäÖв¿·Ö×ʽð±»×ªÖÁÈÕ±¾ÕË»§¡£¡£¡£¡£¡£ÎڸɴïÖÐÑëÒøÐÐÒÑ×·»ØÒ»°ëÒÔÉϱ»µÁ×ʽ𣬣¬£¬£¬£¬£¬µ«ÈÔÓв¿·Ö×ʽð±»ÌáÈ¡»ò×ªÒÆÖÁÆäËû¹ú¼Ò£¬£¬£¬£¬£¬£¬ÈçÓ¢¹úµÄÕË»§±»¶³½áÁË700ÍòÃÀÔª£¬£¬£¬£¬£¬£¬¶ø¸Ã×éÖ¯ÔÚÈÕ±¾ÔòÊÕµ½ÁË600ÍòÃÀÔª¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒýÆðÁË×èµ²µ³ÒéÔ±µÄÕ𾪺͹Ø×¢£¬£¬£¬£¬£¬£¬ËûÃǺôÓõÕþ¸®Ìṩ¸ü¶àÐÅÏ¢ÒÔ×ÊÖú¹«ÖÚÏàʶÊÂÎñÕæÏà¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Ïà¹Ø²¿·ÖÈÔÔÚ¼ÌÐøÊÓ²ì´Ë´ÎºÚ¿Í¹¥»÷µÄÏêϸϸ½ÚºÍËðʧÇéÐΡ£¡£¡£¡£¡£
https://securityaffairs.com/171562/security/financially-motivated-threat-actors-hacked-ugandas-central-bank.html
2. ÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷ʹÓÃË𻵵ÄWordÎĵµÈƹýÇå¾²¼ì²â
12ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÓ±µÄÍøÂç´¹ÂÚ¹¥»÷·½·¨Ê¹ÓÃÁËMicrosoft WordµÄÎļþ»Ö¸´¹¦Ð§£¬£¬£¬£¬£¬£¬Í¨¹ý·¢ËÍË𻵵ÄWordÎĵµ×÷Ϊµç×ÓÓʼþ¸½¼þÀ´ÈƹýÇå¾²Èí¼þµÄ¼ì²â¡£¡£¡£¡£¡£ÕâЩ¸½¼þαװ³ÉÀ´×ÔÈËΪºÍÈËÁ¦×ÊÔ´²¿·ÖµÄÔ±¹¤¸£ÀûºÍ½±½ð֪ͨ£¬£¬£¬£¬£¬£¬ÎļþÃûÖаüÀ¨base64±àÂëµÄ×Ö·û´®£¬£¬£¬£¬£¬£¬½âÂëºóΪһ´®Ëæ»úÎı¾¡£¡£¡£¡£¡£µ±ÎüÊÕÕßʵÑé·¿ªÕâЩË𻵵ÄÎĵµÊ±£¬£¬£¬£¬£¬£¬Word»áÌáÐѻָ´Îļþ£¬£¬£¬£¬£¬£¬¶ø»Ö¸´ºóµÄÎĵµ»áÏÔʾһ¸öÓÕµ¼Óû§É¨Ãè¶þάÂëÒÔ¼ìË÷ÎĵµµÄÌáÐÑ£¬£¬£¬£¬£¬£¬¶þάÂëÁ´½Óµ½µÄÔòÊÇÒ»¸öαװ³ÉMicrosoftµÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£¡£¡£ÓÉÓÚÕâЩÎļþÔÚ²Ù×÷ϵͳÄÚÀÖ³ÉÔËÐе«Î´ÄÜÕë¶ÔÆäÎļþÀàÐÍÓ¦ÓÃÊʵ±µÄ³ÌÐò£¬£¬£¬£¬£¬£¬´ó´ó¶¼Çå¾²½â¾ö¼Æ»®¶¼Î´Äܼì²âµ½ËüÃÇ¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨Ï൱Àֳɣ¬£¬£¬£¬£¬£¬ÓÉÓÚÏÕЩËùÓи½¼þÔÚVirusTotalÉ϶¼Î´±»¼ì²âµ½£¬£¬£¬£¬£¬£¬Ö»ÓÐÉÙÊýÇå¾²¹©Ó¦ÉÌÓÐËù²ì¾õ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜÊÇÓÉÓÚÎĵµ×Ô¼º²¢Î´°üÀ¨¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬Ö»ÊÇÓÕµ¼Óû§É¨Ãè¶þάÂë¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬Óû§Ó¦Ìá¸ßСÐÄ£¬£¬£¬£¬£¬£¬¹ØÓÚÀ´×Ôδ֪·¢¼þÈ˵ĵç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÓÈÆäÊǰüÀ¨¸½¼þµÄ£¬£¬£¬£¬£¬£¬Ó¦Á¬Ã¦É¾³ý»òÔÚ·¿ªÖ®Ç°ÓëÍøÂçÖÎÀíԱȷÈÏ£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤×Ô¼ºÃâÊÜ´ËÀàÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/
3. º«¹ú¾¯·½¾Ð²¶ÁùÈË£¬£¬£¬£¬£¬£¬ÉæÏÓÖÆÔ캬DDoS¹¥»÷¹¦Ð§ÎÀÐÇÎüÊÕÆ÷
12ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬º«¹ú¾¯·½¾Ð²¶ÁËÒ»ÃûÊ×ϯִÐйٺÍÎåÃûÔ±¹¤£¬£¬£¬£¬£¬£¬ËûÃÇÉæÏÓÖÆÔìÁè¼Ý24Íǫ̀¶ñÒâÎÀÐÇÎüÊÕÆ÷£¬£¬£¬£¬£¬£¬ÕâЩװ±¸±»Ô¤×°»òØÊºó¸üÐÂÒÔ°üÀ¨DDoS¹¥»÷¹¦Ð§¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷¹¦Ð§ÊÇΪÁ˵ÖÓù¾ºÕùʵÌåµÄ¹¥»÷£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊDz»·¨µÄ£¬£¬£¬£¬£¬£¬ÇÒµ¼ÖÂ×°±¸Óû§ÔÚ·Ç×ÔÔ¸µÄÇéÐÎϼÓÈëÁ˹¥»÷£¬£¬£¬£¬£¬£¬¿ÉÄÜ»áÓöµ½ÐÔÄÜϽµµÄÇéÐΡ£¡£¡£¡£¡£´Ó2019Äê1Ôµ½2024Äê9Ô£¬£¬£¬£¬£¬£¬¹²³ö»õÁË24Íǫ̀װ±¸£¬£¬£¬£¬£¬£¬ÆäÖÐ98,000̨ԤװÁËDDoSÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬ÆäÓàͨ¹ý¹Ì¼þ¸üлñµÃ¸Ã¹¦Ð§¡£¡£¡£¡£¡£º«¹ú¾¯·½ÔÚÊÕµ½¹ú¼ÊÐ̾¯×éÖ¯µÄÇ鱨ºó·¢Ã÷ÁËÕâÒ»¶ñÒâÍýÏ룬£¬£¬£¬£¬£¬²¢¾Ð²¶ÁËÉæ°¸ÁùÈË£¬£¬£¬£¬£¬£¬ËûÃÇÃæÁÙÎ¥·´ÐÅÏ¢Í¨Ñ¶ÍøÂçÖ´·¨µÄÖ¸¿Ø¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬·¨Ôº»¹Åú×¼¿ÛѺ¸Ã¹«Ë¾µÄ×ʲú£¬£¬£¬£¬£¬£¬²¢Ã»ÊÕÔ¼435ÍòÃÀÔª£¬£¬£¬£¬£¬£¬Ô¤¼ÆÕâÊǹ«Ë¾Í¨¹ý³öÊÛ¶ñÒâ×°±¸Ëù׬ȡµÄ½ð¶î¡£¡£¡£¡£¡£¶ø¹ºÖøÃ×°±¸µÄ¹«Ë¾²Ù×÷Ô±ÏÖÔÚÈÔåÐÒ£·¨Í⣬£¬£¬£¬£¬£¬º«¹ú¾¯ÆÓÖ±ÔÚ×·Çó¹ú¼ÊÏàÖúÒÔ×·×ٺ;в¶ËûÃÇ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/
4. Bootkit¶ñÒâÈí¼þʹÓÃLogoFAILÎó²îѬȾLinuxϵͳ
https://www.bleepingcomputer.com/news/security/bootkitty-uefi-malware-exploits-logofail-to-infect-linux-systems/
5. SignzyÈ·Èϱ¬·¢Çå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬Éæ¼°¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¿Í»§Êý¾Ý
12ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬SignzyÊÇÒ»¼ÒΪ¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¡¢ÉÌÒµÒøÐкͽðÈڿƼ¼¹«Ë¾ÌṩÔÚÏßÉí·ÝÑéÖ¤ºÍ¿Í»§ÈëְЧÀ͵Ä×ÅÃû¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È·Èϱ¬·¢ÁËÒ»ÆðÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ°à¼ÓÂÞ¶ûµÄÊ×´´¹«Ë¾ÉÏÖÜÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ö»¹ÜËü¾Ü¾øÍ¸Â¶ÏêÇ飬£¬£¬£¬£¬£¬µ«ÐÂÎÅÈËʿ͸¶£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°¿Í»§Êý¾ÝµÄй¶£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÔøÔÚÍøÂç·¸·¨ÂÛ̳µÄÌû×ÓÖжÌÔÝ·ºÆð¡£¡£¡£¡£¡£SignzyΪȫÇò600¶à¼Ò½ðÈÚ»ú¹¹ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨Ó¡¶ÈËÄ´óÒøÐС£¡£¡£¡£¡£Ó¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×éCERT-InÒÑ×¢ÖØµ½ÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ½ÓÄÉÊʵ±Ðж¯¡£¡£¡£¡£¡£ÆäËû¿Í»§£¬£¬£¬£¬£¬£¬ÈçPayU£¬£¬£¬£¬£¬£¬ÌåÏÖËûÃÇδÊܴ˴ι¥»÷Ó°Ï죬£¬£¬£¬£¬£¬²¢¼á³Æ×Ô¼ºµÄÊý¾ÝÈÔÈ»Çå¾²¡£¡£¡£¡£¡£SignzyÔÚÒ»·ÝÉùÃ÷Öоܾø¾Í¿Í»§Êý¾ÝÊÇ·ñ±»Ð¹Â¶½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÒÑÔ¼Çëרҵ»ú¹¹¾ÙÐÐÇå¾²ÊÂÎñÊӲ졣¡£¡£¡£¡£¸Ã¹«Ë¾»ñµÃÁËÍòÊ´│µÈ¶à¼ÒͶ×ÊÕßµÄÖ§³Ö£¬£¬£¬£¬£¬£¬²¢Òѽ«´ËÊÂÎñ¼û¸æÆä¿Í»§¡¢î¿Ïµ»ú¹¹ºÍÀûÒæÏà¹ØÕß¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬µ±±»Îʼ°ÊÇ·ñÓëÓ¡¶ÈÑëÐÐÓйý½Ó´¥Ê±£¬£¬£¬£¬£¬£¬SignzyÌåÏÖûÓÐÏàͬ£¬£¬£¬£¬£¬£¬¶øÓ¡¶ÈÑëÐÐҲδ»ØÓ¦ÖÃÆÀÇëÇ󡣡£¡£¡£¡£
https://techcrunch.com/2024/12/02/indian-online-id-verification-firm-signzy-confirms-security-incident/
6. È«ÇòÖ´·¨Ðж¯¡°HAECHI-V¡±¾Ð²¶5500¶àÈË£¬£¬£¬£¬£¬£¬½É»ñ4ÒÚÃÀÔª×ʲú
12ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬¹ú¼ÊÖ´·¨Ðж¯¡°HAECHI-V¡±ÔÚ2024Äê7ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Éæ¼°40¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬Àֳɾв¶ÁË5500¶àÃûÏÓÒÉÈË£¬£¬£¬£¬£¬£¬²¢²é»ñÁË4ÒÚ¶àÃÀÔª×ʲú¡£¡£¡£¡£¡£´Ë´ÎÐж¯Ö÷ÒªÕë¶ÔÍøÂç´¹ÂÚ¡¢Áµ°®È¦Ìס¢ÐÔÀÕË÷¡¢Í¶×Êڲơ¢ÔÚÏ߶IJ©µÈ¶àÖÖÍøÂçÚ²ÆÐÐΪ¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬º«¹úºÍÖйúÕþ¸®µ·»ÙÁËÒ»¸öÔì³É11ÒÚÃÀÔªËðʧµÄÓïÒô´¹ÂÚ¼¯ÍÅ£¬£¬£¬£¬£¬£¬¾Ð²¶27È˲¢ÆðËß19ÈË¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯»¹Ðû²¼ÁË×Ïɫͨ¸æ£¬£¬£¬£¬£¬£¬ÖÒÑÔÉæ¼°¼ÓÃÜÇ®±ÒµÄÐÂÐËڲƻ£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ¡°USDT´ú±ÒÅú׼ȦÌס±¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÓëÀ´×Ô80¶à¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹ÔöÇ¿ÁË×èµ²±»µÁ×ʽ𹤾ßI-GRIPµÄʹÓ㬣¬£¬£¬£¬£¬ÐÂ¼ÓÆÂ¾¯·½Ê¹Óøù¤¾ßÀÖ³É×èÖ¹ÁËÒ»±Ê3930ÍòÃÀÔªµÄתÕË¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯»¹ÔÚ·ÇÖÞ19¸ö¹ú¼Ò¿ªÕ¹ÁË¡°ÈûÂ׸ǵÙÐж¯¡±£¬£¬£¬£¬£¬£¬¾Ð²¶1006ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬£¬µ·»Ù¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç134089¸ö¡£¡£¡£¡£¡£ÔÚ¡°Ðͬ¶þºÅÐж¯¡±ÖУ¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯Óë˽Ӫ²¿·ÖÏàÖúͬ°éºÍ95¸ö¹ú¼ÒÅäºÏ²ð³ýÁË22000¶ą̀ÓëÍøÂç·¸·¨»î¶¯ÓйصĶñÒâЧÀÍÆ÷¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤ÌåÏÖ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨µÄÎÞ¹ú½çÐÔÒâζ׏ú¼Ê¾¯Ô±ÏàÖúÖÁ¹ØÖ÷Òª£¬£¬£¬£¬£¬£¬Ö»ÓÐͨ¹ýÅäºÏÆð¾¢£¬£¬£¬£¬£¬£¬²Å»ªÈÃÏÖʵÌìϺÍÊý×ÖÌìÏÂÔ½·¢Çå¾²¡£¡£¡£¡£¡£
https://securityaffairs.com/171593/cyber-crime/operation-haechi-v-5500-arrests.html