ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæ3500ÍòÌõLinkedInÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2023-11-09
1¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæ3500ÍòÌõLinkedInÓû§Êý¾Ý


¾ÝýÌå11ÔÂ7ÈÕ±¨µÀ£¬ºÚ¿ÍUSDoDÔÚBreach ForumsÉÏй¶ÁËÁè¼Ý3500ÍòLinkedInÓû§µÄÐÅÏ¢¡£Ð¹Â¶µÄÊý¾Ý¿â·ÖΪÁ½²¿·Ö£¬Ò»²¿·Ö°üÀ¨500ÍòÌõÓû§¼Í¼£¬µÚ¶þ²¿·Ö°üÀ¨3500ÍòÌõ¼Í¼¡£¸ÃºÚ¿ÍÌåÏÖ£¬×îеÄLinkedInÊý¾Ý¿âÊÇͨ¹ýÍøÂçץȡ»ñµÃµÄ¡£ÆäÖаüÀ¨Óû§ÐÕÃûºÍСÎÒ˽¼Ò×ÊÁϵÈÐÅÏ¢£¬ÉÐÓÐһЩÓʼþµØµãÊôÓÚÃÀ¹úÕþ¸®µÄ¸ß¼¶¹ÙÔ±ºÍ»ú¹¹¡£Í³Ò»ºÚ¿ÍÔÚÈ¥ÄêÔøÈëÇÖÁËFBIÇ徲ƽ̨InfraGard£¬²¢Ð¹Â¶ÁË87000ÃûÓû§µÄÐÅÏ¢¡£


https://www.hackread.com/hacker-leaks-scraped-linkedin-user-records/


2¡¢¶íÂÞ˹µÄ¹úÓд¢±¸ÒøÐÐSberbankÔâµ½DDoS¹¥»÷


¾Ý11ÔÂ8ÈÕ±¨µÀ£¬¶íÂÞ˹Áª°î´¢±¸ÒøÐУ¨Sberbank£©Ôâµ½ÁË´ó¹æÄ£DDoS¹¥»÷¡£SberbankÊÇÒ»¼Ò¹úÓÐÒøÐкͽðÈÚ·þÎñ¹«Ë¾£¬Ò²ÊǶíÂÞ˹×î´óµÄ½ðÈÚ»ú¹¹£¬³ÖÓиùúÔ¼Èý·ÖÖ®Ò»µÄ×ʲú¡£¶íÂÞ˹ýÌåInterfax³Æ£¬¹¥»÷ԼĪÔÚÁ½ÖÜÇ°£¬µÖ´ïÁËÿÃë100Íò¸öÇëÇó(RPS)£¬ÕâԼĪÊǸÃÒøÐÐÆù½ñΪֹÔâµ½µÄ×î´ó¹æÄ£DDoS¹¥»÷µÄËı¶¡£¸Ã»ú¹¹»¹Í¸Â¶ÕâÊÇһЩеĺڿÍ£¬Ò²¾ÍÊÇ˵£¬ÏÖÔÚ·ºÆðÁËһЩÐµĹ¥»÷ÍŻËûÃÇ×îÏÈϵͳÐԵع¥»÷¶íÂÞ˹×î´óµÄÒøÐС£


https://www.bleepingcomputer.com/news/security/russian-state-owned-sberbank-hit-by-1-million-rps-ddos-attack/


3¡¢Ñо¿Ö°Ô±Åû¶BlueNorOffʹÓÃÐÂObjCShellzµÄ¹¥»÷


JamfÔÚ11ÔÂ7ÈÕÅû¶BlueNorOffÍÅ»ïʹÓÃÐÂmacOS¶ñÒâÈí¼þObjCShellzµÄ¹¥»÷Ô˶¯¡£Ñо¿Ö°Ô±Ê×ÏÈ·¢Ã÷ÁËÒ»¸öMach-OͨÓöþ½øÖÆÎļþÓëËûÃÇ֮ǰ¹éÀàΪ¶ñÒâµÄÓò¾ÙÐÐͨѶ£¬±»·¢Ã÷ʱËüÔÚVirusTotalÉϵļì²âÂÊΪÁã¡£ObjCShellzÊÇ»ùÓÚObjective-CµÄ¶ñÒâÈí¼þ£¬³äµ±Ô¶³Ìshell£¬ÓÃÓÚÔÚ±»Ñ¬È¾µÄϵͳÉÏÖ´ÐÐÏÂÁî¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄ³õʼ»á¼ûÔØÌ壬µ«¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ¹¥»÷ºóÆÚÓÃÓÚÔÚÈëÇÖϵͳºóÊÖ¶¯Ö´ÐÐÏÂÁî¡£


https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/


4¡¢²¿·ÖOutlookÓû§ÔÚ·¢ËÍ°üÀ¨¸½¼þµÄÓʼþʱ»á±¨´í


11ÔÂ7ÈÕ±¨µÀ³Æ£¬Î¢ÈíÌáÐÑOutlook.comÓû§ÔÚ·¢ËÍ°üÀ¨¸½¼þµÄµç×ÓÓʼþʱ¿ÉÄÜ»áÓöµ½ÎÊÌâ¡£ÊܸÃÎÊÌâÓ°ÏìµÄÓû§ÔÚʵÑé·¢Ë͵ç×ÓÓʼþʱ»áÊÕµ½¹ýʧÌáÐÑ"Error code 550 5.7.520 Message blocked"¡£Î¢ÈíÌṩÁËÒ»ÖÖÔÝʱ½â¾öÒªÁ죬ʹÊÜÓ°ÏìµÄÓû§Äܹ»¹²ÏíÎļþ£º½«ÎļþÉÏ´«µ½OneDrive²¢ÓëÊÕ¼þÈ˹²ÏíÁ´½Ó¡£7Ô·Ý£¬Î¢ÈíÔø½â¾öÁËÌáÐÑ401Òì³£¹ýʧ²¢×èÖ¹OutlookÓû§ËÑË÷ÓʼþµÄÎÊÌâ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-some-outlookcom-users-cant-send-emails-with-attachments/


5¡¢SideCopyʹÓÃ×îеÄWinRARÎó²î¹¥»÷Ó¡¶ÈµÄ¾üÕþ»ú¹¹


11ÔÂ6ÈÕ£¬SEQRITE Labs APT-Team³ÆÆä·¢Ã÷ÁËÔÚÒÑÍù¼¸¸öÔÂÕë¶ÔÓ¡¶ÈÕþ¸®ºÍ¹ú·À»ú¹¹µÄ¶à¸öSideCopy¹¥»÷Ô˶¯¡£SideCopyÖÁÉÙ´Ó2019Äê×îÏÈ»îÔ¾£¬±»ÏÓÒÉÊÇTransparent TribeµÄÒ»¸ö×ÓÍŻ¸ÃÍÅ»ïÏÖÔÚÕýÔÚʹÓÃ×îеÄWinRARÎó²î£¨CVE-2023-38831£©À´·Ö·¢AllaKore RAT¡¢DRatºÍÆäËüpayload¡£SEQRITE³ÆÕâÊǶàƽ̨¹¥»÷Ô˶¯£¬Ëü»¹Í¨¹ý¼æÈÝ°æ±¾µÄAres RATÈëÇÖLinuxϵͳ¡£


https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/


6¡¢IBMÐû²¼GootloaderбäÌåGootBotµÄÆÊÎö±¨¸æ


11ÔÂ6ÈÕ£¬IBM X-ForceÐû²¼Á˹ØÓÚGootloaderбäÌåGootBotµÄÆÊÎö±¨¸æ¡£¹¥»÷Õß¿ª·¢ÁËÒ»ÖÖÐÂÐÍC2ºÍºáÏòÒƶ¯¹¤¾ßGootBot£¬ÓÃÓÚÈ¡´úCobaltStrikeµÈÆäËü¹Å°åµÄʹÓÿò¼Ü¡£ÏÖÔÚÊӲ쵽µÄÔ˶¯Ê¹ÓÃSEOÖж¾¾ÙÐзַ¢¡£Ñ¬È¾ºó£¬´ó×ÚGootBotÖ²Èë³ÌÐò»áÔÚÕû¸öÆóÒµÇéÐÎÖÐÈö²¥£¬Ã¿¸öÖ²Èë³ÌÐò¶¼°üÀ¨²î±ðµÄÓ²±àÂëC2·þÎñÆ÷£¬Òò´ËºÜÄѱ»×èÖ¹¡£GootBotÔÚVirusTotalÉϵļì²âÂÊΪÁã¡£Gootloader»¹³äµ±³õʼ»á¼ûÌṩÕߣ¬¿ÉÄÜ»á·Ö·¢ÀÕË÷Èí¼þ¡£


https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/