ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì

Ðû²¼Ê±¼ä 2023-10-13

1¡¢ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì


¾Ý10ÔÂ12ÈÕ±¨µÀ£¬ÐÁÆÕÉ­ÖÆÔ칫˾£¨Simpson Manufacturing£©Ôâµ½¹¥»÷£¬µ¼ÖÂÔËÓªÊܵ½Ó°Ïì¡£ÕâÊÇÃÀ¹úµÄÒ»¼ÒÐÞ½¨ºÍ½á¹¹ÖÊÁÏÉú²úÉÌ£¬2022Äê¾»ÏúÊÛ¶îΪ21.2ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÌåÏÖ£¬10ÔÂ10ÈÕ£¬ËûÃǵÄIT»ù´¡ÉèÊ©ºÍÓ¦ÓóÌÐòÒòÍøÂçÇå¾²ÊÂÎñÖÐÖ¹¡£·¢Ã÷¶ñÒâÔ˶¯ºó£¬ÖÆÔìÉ̹رÕÁ˲¿·ÖϵͳÒÔ×èÖ¹½øÒ»²½µÄ¹¥»÷¡£ÓÉÓÚµ÷½âÐèҪʱ¼ä£¬Òò´ËÔËÓªµÄÔÝÍ  £»¹½«Ò»Á¬Ò»¶Îʱ¼ä¡£Ö»¹ÜÐÁÆÕɭû͸¶¹¥»÷ÀàÐÍ£¬µ«¹Ø±Õϵͳͨ³£ÊǶÔÀÕË÷¹¥»÷µÄÏìÓ¦¡£


https://www.securityweek.com/simpson-manufacturing-takes-systems-offline-following-cyberattack/


2¡¢ÔÆÌṩÉÌShadow PCÁè¼Ý50Íò¿Í»§µÄÐÅÏ¢±»³öÊÛÔÚ°µÍø


¾ÝýÌå10ÔÂ12ÈÕ±¨µÀ£¬ºÚ¿ÍÉù³Æ³öÊ۸߶ËÔÆÅÌËã·þÎñÌṩÉÌShadow PCÁè¼Ý500000Ãû¿Í»§µÄÊý¾Ý¡£Shadow͸¶£¬ËûÃǵÄÒ»ÃûÔ±¹¤ÔÚ9ÔÂβÔâµ½ÁËÉ繤¹¥»÷¡£¹¥»÷ʼÓÚDiscordƽ̨£¬ÒÔSteamƽ̨ÉϵÄÒ»¿îÓÎϷΪ»Ï×ÓÏÂÔØÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÀÖ³ÉÇÔÈ¡ÁËÉí·ÝÑéÖ¤cookie£¬Ê¹ºÚ¿ÍÄܹ»µÇ¼¸Ã¹«Ë¾µÄSaaSÌṩÉ̵ÄÖÎÀí½çÃ棬²¢Ê¹Óô˻á¼ûȨÏÞÇÔÈ¡¿Í»§ÐÅÏ¢¡£Ä³ºÚ¿Í³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕ棬²¢³öÊÛ533624ÃûÓû§µÄÊý¾Ý£¬ÌåÏÖ³ýÁËShadowÒѾ­È·ÈϵÄÊý¾ÝÍ⣬ËûÃÇ»¹»ñµÃÁËIPÅþÁ¬ÈÕÖ¾¡£


https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/


3¡¢BianLianÉù³ÆÒÑÇÔÈ¡¼ÓÄô󺽿չ«Ë¾Ô¼210GBµÄÊý¾Ý


ýÌå10ÔÂ11Èճƣ¬BianLian¶Ô¼ÓÄô󺽿չ«Ë¾Ôâµ½µÄ¹¥»÷ÈÏÕ棬²¢ÌåÏÖÒÑÍøÂçÔ¼210GBµÄÊý¾Ý¡£¸Ã¹«Ë¾ÔÚ9ÔµÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬Ö»Óв¿·ÖÔ±¹¤ÓÐÏÞµÄСÎÒ˽¼ÒÐÅϢй¶¡£µ«BianLianÉù³ÆÇÔÈ¡ÁË´Ó2008Äêµ½2023ÄêµÄÊÖÒÕºÍÔËÓªÊý¾Ý£¬°üÀ¨¹«Ë¾ÊÖÒÕºÍÇå¾²µÄÏêϸÐÅÏ¢¡¢SQL±¸·Ý¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹©Ó¦É̺͹©Ó¦É̵ÄÊý¾Ý¡¢ÉñÃØÎļþÒÔ¼°¹«Ë¾Êý¾Ý¿âµÄµµ°¸£¬²¢ÌṩÁ˽Øͼ×÷Ϊ֤¾Ý¡£¼ÓÄô󺽿ÕÌåÏÖ£¬ËûÃÇÖªµÀBianLianµÄÍþв£¬µ«Ã»ÓÐ֤ʵ¸ÃÍÅ»ï¾ÍÊÇ´Ë´ÎÊÂÎñµÄÄ»ºóºÚÊÖ¡£


https://www.bleepingcomputer.com/news/security/bianlian-extortion-group-claims-recent-air-canada-breach/


4¡¢Cofense³ÆʹÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´¹ÂÚÔ˶¯¼¤Ôö


CofenseÔÚ10ÔÂ11Èճƣ¬Æä·¢Ã÷ÀÄÓÃLinkedInÖÇÄÜÁ´½ÓÀ´Èƹý¼ì²âµÄ´¹ÂÚ¹¥»÷¼¤Ôö£¬Ö¼ÔÚÇÔÈ¡MicrosoftÕÊ»§Æ¾Ö¤¡£ÐÂÒ»ÂÖ¹¥»÷±¬·¢ÔÚ7ÔÂÖÁ8ÔÂʱ´ú£¬°üÀ¨800¶à·âÓʼþºÍ80¸öÆæÒìµÄÖÇÄÜÁ´½Ó£¬Ô´×Ôн¨Éè»ò±»ÈëÇÖµÄLinkedInÆóÒµÕÊ»§¡£Êý¾ÝÏÔʾ£¬´Ë´ÎÔ˶¯Ö÷ÒªÕë¶ÔµÄÊǽðÈÚ¡¢ÖÆÔì¡¢ÄÜÔ´¡¢ÐÞ½¨ºÍÒ½ÁƱ£½¡ÁìÓò¡£ÖÇÄÜÁ´½ÓÊÇLinkedIn Sales Navigator·þÎñµÄÒ»²¿·Ö£¬ÓÃÓÚÓªÏúºÍ¸ú×Ù£¬CofenseÔçÔÚ2021Äê¾Í·¢Ã÷¹ýʹÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷¡£


https://cofense2022stg.wpengine.com/blog/linkedin-smart-links-credential-phishing-campaign/


5¡¢ProofpointÐû²¼2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ


10ÔÂ11ÈÕ£¬ProofpointÓëPonemonÏàÖú£¬Ðû²¼ÁË2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬88%µÄÊÜ·ÃʵÌåÔÚÒÑÍù12¸öÔÂÄÚƽ¾ùÂÄÀúÁË40´Î¹¥»÷£¬Ò½ÁÆ»ú¹¹Ôâµ½¹¥»÷µÄƽ¾ù×ܱ¾Ç®Îª499ÍòÃÀÔª£¬±ÈÉÏÄêÔöÌí13%¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÒ½ÁÆ»ú¹¹Ê¼ÖÕ±£´æµÄÍþв£¬54%µÄÊÜ·ÃÕß³ÆÔâµ½ÁËÀÕË÷¹¥»÷£¬¸ßÓÚ2022ÄêµÄ41%¡£ËùÓÐÊܷûú¹¹ÔÚÒÑÍùÁ½ÄêÄÚÖÁÉÙ±¬·¢¹ýÒ»´ÎÉæ¼°Ãô¸ÐºÍÉñÃØÒ½ÁÆÊý¾ÝµÄɥʧ»òй¶ÊÂÎñ¡£BEC¹¥»÷¸üÊܹØ×¢£¬µ£ÐÄ´ËÀ๥»÷µÄÈË´ÓÈ¥ÄêµÄ46%Ô¾ÉýÖÁ62%¡£


https://www.proofpoint.com/us/newsroom/press-releases/second-annual-ponemon-institute-report-finds-two-thirds-healthcare


6¡¢Critical StartÐû²¼2023Ï°ëÄêÍþв̬ÊÆÆÊÎö±¨¸æ


10ÔÂ11ÈÕ±¨µÀ³Æ£¬Critical StartÐû²¼ÁË2023Ï°ëÄêÍþв̬ÊƵÄÆÊÎö±¨¸æ¡£±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÊ¹ÓÃQRÂëµÄ´¹ÂÚ¹¥»÷³ÊÉÏÉýÇ÷ÊÆ£¬¹¥»÷Õß½«QRÂëǶÈëPNG»òPDFÖУ¬Î±×°³ÉMicrosoft Ç徲֪ͨ  £»½ÌÓýÊÇ×îÒ×Ôâµ½¹¥»÷µÄÐÐÒµÖ®Ò»£¬2023ÄêÎó²îʹÓÃÕ¼K-12ѧУÍøÂçÊÂÎñµÄ29%£¬¶ø´¹ÂÚ¹¥»÷Õ¼30%  £»ÀÕË÷Èí¼þÕûÌåµÄÏàÖú±È֮ǰÏëÏóµÄ¸üÆձ飬¸üÏêϸµØ·ÖÏíTTP  £»Microsoft TeamsÔÊÐíÍⲿÕÊ»§Ö±½ÓÏòÔ±¹¤·¢ËÍÓк¦Îļþ£¬´Ó¶øÈƹýÇå¾²¼ì²â£¬ÕâÔöÌíÁ˹¥»÷ÀֳɵÄΣº¦¡£


https://www.criticalstart.com/resources/h2-2023-cyber-threat-intelligence-threat-report/