Ñо¿Ö°Ô±Åû¶ʹÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁеÄÆóÒµµÄÔ˶¯
Ðû²¼Ê±¼ä 2023-11-011¡¢Ñо¿Ö°Ô±Åû¶ʹÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁеÄÆóÒµµÄÔ˶¯
¾ÝýÌå10ÔÂ30ÈÕ±¨µÀ£¬Ò»ÖÖÃûΪBiBi-LinuxµÄÐÂÐÍWiper¶ñÒâÈí¼þÕýÔÚ±»ÓÃÓÚÕë¶ÔÒÔÉ«ÁеĹ«Ë¾µÄ¹¥»÷Ô˶¯¡£¸Ã¶ñÒâÈí¼þÊÇx64 ELF¿ÉÖ´ÐÐÎļþ£¬Ã»ÓлìÏýµÈ±£»¤²½·¥£¬ÕâʹÑо¿Ö°Ô±µÄÆÊÎöÀú³Ì±äµÃÔ½·¢ÈÝÒס£Ëü¿ÉÖ¸¶¨Ä¿µÄÎļþ¼Ð£¬ÈôÊÇÒÔrootȨÏÞÔËÐÐÔò¿ÉÄÜ»áÏú»ÙÕû¸öϵͳ¡£BiBi-Linux»¹Ê¹ÓöàÏ̺߳ÍÐÐÁÐϵͳÀ´Ìá¸ßËÙÂʺÍЧÂÊ¡£VirusTotal³Æ£¬ÏÖÔÚ£¬Ö»ÓÐÁ½¼ÒÇå¾²¹©Ó¦É̵ĶñÒâÈí¼þɨÃèÒýÇ潫BiBi-Linux¼ì²âΪ¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/new-bibi-linux-wiper-malware-targets-israeli-orgs-in-destructive-attacks/
2¡¢Unit 42·¢Ã÷ʹÓÃIAMƾ֤µÄ¼ÓÃÜЮÖƹ¥»÷EleKtra-Leak
Unit 42ÔÚ10ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÐµĹ¥»÷Ô˶¯EleKtra-Leak£¬¿É×Ô¶¯¶¨Î»¹ûÕæGitHub´æ´¢¿âÖÐ̻¶µÄÉí·ÝºÍ»á¼ûÖÎÀí(IAM)ƾ֤£¬Ö¼ÔÚ¾ÙÐмÓÃÜÇ®±ÒЮÖÆÔ˶¯¡£¸ÃÔ˶¯ÖÁÉÙ×Ô2020Äê12Ô¾ÍÒ»Ö±»îÔ¾£¬²¢ÓÚ½ñÄê8ÔÂ30ÈÕÖÁ10ÔÂ6ÈÕ´Ó¶à´ï474¸öAmazon EC2ʵÀýÖÐÍÚ¾òÃÅÂÞ±Ò¡£±ðµÄ£¬¹¥»÷ÕßÄܹ»ÔÚIAMƾ֤Ê×´Î̻¶µÄÎå·ÖÖÓÄھͼì²â²¢Ê¹ÓÃËü£¬»¹»á°Ñ¹ûÕæIAMƾ֤µÄAWSÕË»§ÁÐÈëºÚÃûµ¥¡£
https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/
3¡¢eSentireÑÝʾ½«Ä¿µÄÖض¨Ïòµ½¶ñÒâÍøÕ¾µÄWiki-Slack¹¥»÷
¾Ý10ÔÂ30ÈÕ±¨µÀ£¬eSentireÑо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖеÄWiki-Slack¹¥»÷£¬¿É½«×¨ÒµÈËÊ¿Öض¨Ïòµ½¶ñÒâÍøÕ¾¡£¹¥»÷ÕßÊ×ÏÈÑ¡ÔñÒ»¸öWikipediaÖ÷Ì⣬Ȼºó½øÈëÌõÄ¿µÄÊ×Ò³²¢±à¼Ò³Ã棬Ìí¼ÓÒ»¸öÕýµ±µÄ²Î¿¼½Å×¢¡£ÔÚSlackÉÏ·ÖÏíÎÄÕÂʱ£¬Ò»µ©Öª×ãijЩ¸½¼ÓÌõ¼þ£¬Slack½«·ºÆðÔÚÔʼWikipediaÖв»¿É¼ûµÄÁ´½Ó¡£Òò´Ë£¬×¨ÒµÈËÊ¿½«WikipediaÌõÄ¿¸´ÖƵ½Slackʱ¾Í»á·ºÆð¶ñÒâÁ´½Ó£¬ÈôÊÇÁ´½ÓµÄÓï·¨Éè¼ÆµÃ×ã¹»ºÃ£¬SlackÓû§¾Í»á±»ÎüÒý²¢µã»÷Ëü£¬´Ó¶ø±»Öض¨Ïòµ½¶ñÒâÍøÕ¾£¬ÆäÖпÉÄÜÓлùÓÚä¯ÀÀÆ÷µÄ¶ñÒâÈí¼þ¡£
https://securityaffairs.com/153245/hacking/wiki-slack-attack.html
4¡¢WiHDÉèÖùýʧй¶½ü10ÍòtorrentÓû§µÄÏêϸÐÅÏ¢
ýÌå10ÔÂ31Èճƣ¬World-in-HD(WiHD)ÉèÖùýʧ£¬Ð¹Â¶ÁË97327¸öÓû§µÄÏêϸÐÅÏ¢¡£WiHDÊÇÒ»¿îÊ¢ÐеÄ˽ÈËÖÖ×Ó¸ú×Ù³ÌÐò£¬×¢²áÓû§¿ÉÒÔ»á¼û·¨ÓïºÍÓ¢ÓïµÄµçÊӾ硢ӰϷ¡¢¶¯»µÈÄÚÈÝ¡£¸Ã˽È˸ú×Ù³ÌÐòͨ³£½ö½ÓÊÜÔ¼Ç룬һЩÈËÒÔÁè¼Ý100ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸ÃÍøÕ¾µÄÔ¼Çë¡£Cybernews·¢Ã÷ÁËWiHDµÄÒ»¸ö¹ûÕæµÄElasticsearch£¬Ã»ÓÐÈκÎÃÜÂë±£»¤£¬Ð¹Â¶ÁËÓû§µç×ÓÓʼþ¡¢IPµØµã¡¢·þÎñÐÅÏ¢¡¢Óû§ÃûºÍËùÓÐtorrentÓû§µÄÃÜÂë¡£
https://securityaffairs.com/153296/deep-web/wihd-data-leak.html
5¡¢SlashNextÐû²¼2023ÄêÍøÂç´¹ÂÚ̬ÊƵÄÆÊÎö±¨¸æ
10ÔÂ30ÈÕ±¨µÀ³Æ£¬SlashNextÐû²¼ÁË2023ÄêÍøÂç´¹ÂÚ̬ÊƵÄÆÊÎö±¨¸æ¡£¸Ã±¨¸æ¶Ô2022ÄêQ4ÖÁ2023ÄêQ3µÄ12¸öÔÂÄÚͨ¹ýµç×ÓÓʼþ¡¢Òƶ¯×°±¸ºÍä¯ÀÀÆ÷ÊӲ쵽µÄ¹¥»÷Ô˶¯¾ÙÐÐÁËÆÊÎö¡£È¥ÄêQ4ÒÔÀ´£¬´¹ÂÚµç×ÓÓʼþ¼¤ÔöÁË1265%£¬Æ¾Ö¤ÍøÂç´¹ÂÚ¹¥»÷ÔöÌíÁË967%¡£×ÔChatGPTÍƳöÒÔÀ´£¬µç×ÓÓʼþ´¹ÂÚ´ó·ùÔöÌí¡£ÆäËüÖ÷ÒªµÄ·¢Ã÷°üÀ¨£¬Æ½¾ùÌìÌì31000´Î´¹ÂÚ¹¥»÷£¬ÆäÖÐ68%±»Ê¶±ðΪ»ùÓÚÎı¾µÄBEC¡£77%µÄרҵÈËÊ¿Ôø³ÉΪ´¹ÂÚ¹¥»÷µÄÄ¿µÄ£¬ÆäÖÐ28%µÄ¹¥»÷ÊÇͨ¹ý¶ÌОÙÐеġ£
https://slashnext.com/state-of-phishing-2023/
6¡¢FortinetÐû²¼¹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö±¨¸æ
10ÔÂ30ÈÕ£¬FortinetÐû²¼Á˹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö±¨¸æ¡£KnightÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷ÍŻÓÚ½ñÄê8Ô·ºÆð¡£KnightµÄÇ°ÉíCyclopsÓµÓÐÊÊÓÃÓÚWindows¡¢LinuxºÍMac OSµÄ¶àϵͳ¹¤¾ß¡£Òò´Ë£¬ËäÈ»Ñо¿Ö°Ô±½ö·¢Ã÷ÁËKnightµÄWindows°æ±¾£¬µ«ÆäËû°æ±¾¿ÉÄÜÕýÔÚ·ºÆð¡£KnightÕë¶Ô¶à¸ö±ÊÖ±ÐÐÒµ£¬ÆäÖÐÁãÊÛÐÐÒµÊÜÓ°Ïì×î´ó¡£°´µØÇø·ÖÀ࣬ÃÀ¹úÔâµ½µÄKnight¹¥»÷×î¶à¡£
https://www.fortinet.com/blog/threat-research/ransomware-roundup-knight