S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼»áµÄϵͳ崻ú

Ðû²¼Ê±¼ä 2023-11-03

1¡¢S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼»áµÄϵͳ崻ú


¾ÝýÌå11ÔÂ1ÈÕ±¨µÀ£¬·þÎñÌṩÉÌS¨¹dwestfalen ITÔâµ½ÀÕË÷¹¥»÷£¬µ¼Öµ¹ú70¶à¸ö¶¼»áµÄÊÐÕþϵͳ崻ú¡£±¾ÖÜÒ»£¬¸Ã·þÎñÌṩÉ̵Äϵͳ±»¼ÓÃÜ¡£ÎªÁ˱ÜÃâ¶ñÒâÈí¼þÈö²¥£¬¸Ã¹«Ë¾ÖÐÖ¹ÁË70¶à¸ö¶¼»á¶ÔÆä»ù´¡ÉèÊ©µÄ»á¼û£¬Ö÷ÒªÓ°ÏìÁ˵¹úÎ÷²¿µÄ±±À³Òð-Íþ˹ÌØ·¨Â×ÖÝ¡£¹¥»÷µ±Ì죬µÂ¹úÎý¸ùÊÐÕþ¸®×÷·ÏÁ˹«ÃñµÄÔ¤Ô¼£¬×èÖ¹±¾Öܶþ£¬¸ÃÊÐÕþ¸®µÄ´ó²¿·ÖÔÚÏß·þÎñÈÔÎÞ·¨Ê¹Óá£Î¤Ã·¶û˹»ùÐ˺Ͳ¼¶ûɳÒÁµÂÊÐÕþ¸®µÄÍøÕ¾Ò²ÔÚÖÜÈý¹Ø±Õ¡£µÂ¹ú¾¯·½ºÍÇå¾²»ú¹¹ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬²¢Æð¾¢»Ö¸´¶¼»áÖÎÀí²¿·ÖµÄ·þÎñ¡£


https://therecord.media/massive-cyberattack-hinders-services-in-germany


2¡¢Êý¾ÝÖÐÐÄÍ£µçµ¼ÖÂCloudflare¶à¸ö²úÆ·ÔÝʱÎÞ·¨Ê¹ÓÃ


¾Ý11ÔÂ2ÈÕ±¨µÀ£¬CloudflareÖÐÖ¹µ¼ÖÂÆäÐí¶à²úÆ·ÎÞ·¨Ê¹Óá£CloudflareÌåÏÖ£¬Õâ¸öÎÊÌâÓ°ÏìÁËËùÓÐÒÀÀµÆäAPI»ù´¡ÉèÊ©µÄ·þÎñ£¬°üÀ¨¿ØÖÆÃæ°å¡¢Cloudflare API¡¢LogpushºÍAlert Notification SystemµÈ¡£¿Í»§ÔÚʵÑéµÇ¼ÕÊ»§²¢»á¼ûCloudflare¿ØÖÆÃæ°åʱ£¬»á¿´µ½¡°Code:10000¡±Éí·ÝÑéÖ¤¹ýʧºÍÄÚ²¿·þÎñÆ÷¹ýʧ¡£ÖÐÖ¹Á½Ð¡Ê±ºó£¬¸Ã¹«Ë¾Í¸Â¶£¬ÕâÊǶà¸öÊý¾ÝÖÐÐÄÍ£µçµ¼ÖµÄ¡£»ù´¡Ôµ¹ÊÔ­ÓÉÊÇ·¢µç»ú¹ÊÕϵ¼ÖµÄÇøÓòÐÔµçÁ¦ÎÊÌ⣬Ôì³É×°±¸ÍÑ»ú¡£ÏÖÔÚ£¬´ó²¿·Ö·þÎñ¶¼Òѻָ´¡£


https://www.bleepingcomputer.com/news/security/cloudflare-dashboard-and-apis-down-after-data-center-power-outage/


3¡¢Advarra¹«Ë¾Ôâµ½AlphVÀÕË÷¹¥»÷Áè¼Ý120 GBÊý¾Ýй¶


ýÌå11ÔÂ1Èճƣ¬Ò½ÁÆ×ۺϽâ¾ö¼Æ»®¹«Ë¾AdvarraÔâµ½ÁËÀÕË÷¹¥»÷¡£¾ÝϤ£¬¹¥»÷±¬·¢ÓÚ10ÔÂ25ÈÕ×óÓÒ£¬¹«Ë¾ÖÎÀíÖ°Ô±ÌåÏ־ܾø½»Êê½ð£¬Ò²²»Óë¹¥»÷Õß̸ÅС£10ÔÂ31ÈÕ£¬¹¥»÷ÕßÔÚAlphVÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾£¬Éù³ÆÒÑÇÔÈ¡ÁËÁè¼Ý120GBÊý¾Ý£¬Éæ¼°¿Í»§¡¢»¼ÕßÒÔ¼°Ô±¹¤¡£AdvarraÌåÏÖ£¬¹¥»÷Ô´ÓÚÒ»ÃûÔ±¹¤µÄµç»°ºÅÂë±»µÁ£¬¹¥»÷Õß½è´Ë»á¼ûÁ˸ÃÔ±¹¤µÄһЩÕË»§£¬°üÀ¨LinkedInºÍÊÂÇéÕË»§¡£


https://www.databreaches.net/exclusive-advarra-hacked-threat-actors-threatening-to-leak-data/


4¡¢VMware·¢Ã÷ÊýÊ®¸öÄÚºËÇý¶¯³ÌÐòÈÝÒ×Ôâµ½ÍøÂç¹¥»÷


VMware Carbon Black TAUÔÚ10ÔÂ31ÈÕ³ÆÆä·¢Ã÷ÁË34¸öÒ×±»¹¥»÷µÄÄÚºËÇý¶¯³ÌÐò£¨30¸öWDMºÍ4¸öWDF£©¡£ÆäÖÐ6¸ö¿ÉÒÔÓÃÀ´»á¼ûÄÚºËÄڴ棬ËùÓÐÇý¶¯³ÌÐò¶¼¿É±»¾ßÓзÇϵͳȨÏ޵Ĺ¥»÷ÕßÓÃÓÚÍêÈ«¿ØÖÆ×°±¸¡£Í¨¹ýʹÓÃÕâЩÇý¶¯³ÌÐò£¬¹¥»÷Õß¿ÉÒÔ²Á³ý»ò¸ü¸Ä¹Ì¼þ£¬ÒÔ¼°ÌáÉýȨÏÞ¡£ÕâЩÇý¶¯µÄ¿ª·¢Ö°Ô±ÒÑÓÚ2023Äê´º¼¾ÊÕµ½Í¨Öª£¬µ«Ö»ÓÐÁ½¼Ò¹«Ë¾ÐÞ¸´ÁËÎó²î¡£VMwareÕë¶Ô¶à¸öÇý¶¯³ÌÐò¿ª·¢ÁËPoCÎó²î£¬ÒÔÑÝʾÔõÑùʹÓÃËüÃÇÀ´²Á³ý¹Ì¼þ»òÌáÉýȨÏÞ¡£


https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html


5¡¢Unit 42Ðû²¼¹ØÓÚTurlaµÄºóÃÅKazuarбäÌåµÄ±¨¸æ


10ÔÂ31ÈÕ£¬Unit 42Ðû²¼Á˹ØÓÚTurlaºóÃÅKazuarµÄбäÌåµÄÆÊÎö±¨¸æ¡£KazuarÊÇÒ»¸ö.NETºóÃÅ£¬×÷ΪTurlaµÄµÚ¶þ½×¶ÎpayloadÓëÆäËü³£Óù¤¾ßÒ»ÆðʹÓá£ÔÚа汾ÖУ¬¹¥»÷ÕßʹÓÃÁËÖÖÖÖÖØ´óµÄ·´ÆÊÎöÊÖÒÕ£¬²¢Í¨¹ýÓÐÓõļÓÃܺͻìÏýÀ´±£»¤¶ñÒâÈí¼þ´úÂë¡£KazuarµÄй¦Ð§°üÀ¨£º¸üÖÜÈ«µÄϵͳÆÊÎö£¬ÇÔÈ¡ÔÆÓ¦ÓóÌÐòºÍÐźÅÐÂÎÅÓ¦ÓóÌÐò£¬Ö§³Ö45¸öÏÂÁ¹¥»÷Õß¿É¿ªÆô/¹Ø±ÕһϵÁÐ×Ô¶¯»¯Ê¹Ãü£¬ÊµÏÖ²î±ðµÄ¼ÓÃÜËã·¨ºÍ¼Æ»®£¬ÒÔ¼°¾ßÓжàÖÖ×¢Èëģʽ¡£


https://unit42.paloaltonetworks.com/pensive-ursa-uses-upgraded-kazuar-backdoor/


6¡¢HPÐû²¼2023ÄêµÚÈý¼¾¶ÈÍøÂçÇ徲̬ÊƵÄÆÊÎö±¨¸æ


10ÔÂ31ÈÕ£¬HPÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈÍøÂçÇ徲̬ÊƵÄÆÊÎö±¨¸æ¡£¹¥»÷ÕßÔÚQ3¼ÌÐøʹÓÃliving-off-the-land¹¥»÷Õ½ÂÔ£¬Í¨¹ýWindowsÄÚÖõŤ¾ßÖ´Ðй¥»÷¡£Ê¹ÓÃExcel²å¼þ(XLL)ÎļþµÄÔ˶¯¼¤Ôö£¬ÔÚ¹¥»÷Õß×î³£ÓõÄÎļþÀ©Õ¹ÃûÖУ¬ÆôÓúêµÄExcel²å¼þ¶ñÒâÈí¼þ´ÓQ2µÄµÚ46λÉÏÉýµ½µÚ7λ¡£HP»¹·¢Ã÷ÁËÒ»¸öÕë¶ÔÀ­¶¡ÃÀÖÞÂùݵĹ¥»÷Ô˶¯£¬Ê¹ÓÃÁËÆôÓúêµÄPowerPoint²å¼þ¡£¹¥»÷Õß»¹ÔÚGitHubÉÏÍйÜαÔìµÄRAT£¬ÊÔͼÓÕƭȱ·¦ÂÄÀúµÄºÚ¿ÍѬȾËûÃÇ×Ô¼ºµÄPC¡£


https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q3-2023/