΢ÈíÖÒÑÔÕýµ±ÎļþÍйܷþÎñ³ÉÍøÂç´¹ÂÚÐÂÇþµÀ
Ðû²¼Ê±¼ä 2024-10-091. ΢ÈíÖÒÑÔÕýµ±ÎļþÍйܷþÎñ³ÉÍøÂç´¹ÂÚÐÂÇþµÀ
10ÔÂ8ÈÕ£¬Microsoft Threat Intelligence±¨¸æÖ¸³ö£¬Ê¹ÓÃSharePoint¡¢OneDriveºÍDropboxµÈÕýµ±ÎļþÍйܷþÎñÌᳫµÄÉÌÒµµç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂç´¹ÂÚÔ˶¯ÕýÔÚÉÏÉý¡£ÕâЩÔ˶¯×Ô2024Äê4ÔÂÖÐÑ®×îÏÈ£¬½ÓÄÉÖØ´ó·ÀÓù¹æ±ÜÊÖÒÕÈƹýÇå¾²²½·¥£¬µ¼ÖÂÉí·ÝµÁÓá¢×°±¸Ê§Ôô£¬ÉõÖÁÒýÅÕþڲơ¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒƶ¯¡£ÎļþÍйܷþÎñËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁ˱㵱£¬µ«Ò²ÒòÆÕ±éʹÓöø³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÍÐÕË»§È¨ÏÞ£¬ÀÄÓÃƽ̨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅȪԴµÄ¶ñÒâÎļþ»òÁ´½Ó£¬±Ü¿ª¹Å°å¼ì²â¡£Î¢Èí·¢Ã÷£¬ÏÞÖÆ»á¼ûºÍÖ»¶ÁÎļþÕ½ÂÔ±»ÆÕ±éÓ¦ÓÃÒÔÌÓ±ÜÇ徲ϵͳ¼ì²â£¬Ê¹Ç徲ɨÃèºÍÆÊÎö¶ñÒâÁ´½Ó±äµÃÄÑÌâ¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÍй©Ó¦ÉÌÕË»§£¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÄ¿µÄ×éÖ¯¹²Ïí£¬Ê¹ÓÃÐÅÍйØϵÈƹýÇå¾²¹ýÂËÆ÷¡£¹¥»÷Õß»¹»áð³äITÖ§³Ö»òÖÎÀíÔ±£¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§·¿ªÎļþ¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý£¬¾Í»á±»Öض¨Ïòµ½¶ñÒâÖÐÐÄÈËÍøÂç´¹ÂÚÒ³Ã棬ҪÇóÌṩÃÜÂëºÍÍê³É¶àÒòËØÉí·ÝÑéÖ¤£¬¹¥»÷Õß´Ó¶ø²¶»ñ»á»°ÁîÅƾÙÐнøÒ»²½Ê¹Óá£
https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/
2. GoldenJackal APT×é֯ͻÆÆÅ·ÖÞÕþ¸®¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ8ÈÕ£¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×é֯ʹÓÃÁ½Ì××Ô½ç˵¹¤¾ßÀÖ³ÉÉø͸ÁËÅ·ÖÞÕþ¸®µÄ¸ôÀëϵͳ£¬ÇÔÈ¡ÁË°üÀ¨µç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý¡£¾ÝESET±¨¸æ£¬¸Ã×éÖ¯ÖÁÉÙÁ½´ÎʵÑé´ËÀ๥»÷£¬Ò»´ÎÕë¶ÔÄÏÑǹú¼Òפ°×¶íÂÞ˹´óʹ¹Ý£¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞÕþ¸®×éÖ¯¡£¹¥»÷ʼÓÚѬȾ»¥ÁªÍøÅþÁ¬ÏµÍ³£¬Ê¹ÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓ㬲¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´ÖƶñÒâ×é¼þ¡£Ëæºó£¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢£¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Êä»ØÔʼ»¥ÁªÍøÅþÁ¬ÏµÍ³£¬×îÖÕ·¢Ë͸ø¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¡£GoldenHowl×÷Ϊ¶à¹¦Ð§PythonºóÃÅ£¬ÔÚÅþÁ¬»¥ÁªÍøµÄ»úеÉÏÔËÐУ¬ÊµÏÖÎļþÇÔÈ¡¡¢³¤ÆÚÐÔ¼á³Ö¡¢Îó²îɨÃèºÍC2ͨѶ¡£
https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/
3. Red BarrelsÔâÖØ´óÍøÂç¹¥»÷£¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì
10ÔÂ4ÈÕ£¬¹ãÊܺÃÆÀµÄ¿Ö²ÀÓÎϷϵÁС¶Outlast¡·µÄÖÆ×÷¹«Ë¾Red BarrelsÐû²¼£¬ÆäÔâÊÜÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬¿ª·¢Ê±¼ä±í±»´òÂÒ¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶ÈëÇÖµÄÏêϸϸ½Ú£¬µ«ÓÐÐÂÎųƹ¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Í¼¼°¹«Ë¾ÐÅÓÿ¨ÏêϸÐÅÏ¢µÈ´ó×ÚÓмÛÖµµÄÐÅÏ¢¡£Red BarrelsѸËÙ½ÓÄÉÐж¯£¬Ô¼ÇëÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ²¢Í¨ÖªÏà¹ØÀûÒæ·½ºÍÕþ¸®£¬Í¬Ê±½ÓÄɲ½·¥È·±£ÏµÍ³Çå¾²¡£È»¶ø£¬´Ë´Î¹¥»÷¶ÔÊÂÇéÊÒµÄÔËÓª±¬·¢ÁËÖØ´óÓ°Ï죬µ¼ÖÂÖÆ×÷ʱ¼ä±íÊܵ½ÖØ´óÓ°Ï죬²¿·ÖÏîÄ¿²»µÃ²»ÍƳ١£Õâ¶ÔÆÚ´ý¡¶ÌÓÉúÊÔÁ¶¡·Ðû²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö¹¥»÷¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂçÇå¾²µÄÔÊÐí£¬²¢ÌåÏÖ½«¼ÌÐøʵÑé×î¼Ñʵ¼ù²½·¥£¬È·±£ÎªÔ±¹¤ÌṩÇå¾²ÇéÐΡ£¾Ý±¨µÀ£¬ÊÓ²ìÒÑÍê³É£¬ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»áÒ»Á¬Ò»¶Îʱ¼ä¡£
https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/
4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank£¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì
10ÔÂ6ÈÕ£¬¿µ¿¨Ë¹ÌØÓÐÏßͨѶ¹«Ë¾ (Comcast) ºÍ Truist Bank ¿ËÈÕÅû¶£¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶ÊÂÎñµÄÓ°Ï죬ÕýÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹£¬½ñÄê4ÔÂת´ïÁËÒ»Æ𱬷¢ÔÚ2ÔÂÖÁ2ÔÂʱ´úµÄÊý¾Ýй¶ÊÂÎñ£¬ÍþвÐÐΪÕßÈëÇÖÆäÍøÂç²¢ÇÔÈ¡ÁË´ó×ÚСÎÒ˽¼ÒÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝʻִÕÕºÅÂë»òÉí·ÝÖ¤µÈ¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË£¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË¡£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò»£¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ï죬¶øTruistµÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÐû²¼¡£FBCSµÄ²ÆÎñ״̬¶ñ»¯£¬ÊÜÊÂÎñ¼ä½ÓÓ°ÏìµÄʵÌåÐè×ÔÐоÙÐÐ֪ͨºÍµ÷½â³ÌÐò¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤·þÎñ¡£È¥Äê6Ô£¬Truist BankÒ²Ôø֤ʵһÆ𵥶ÀµÄÎ¥¹æÐÐΪ£¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/
5. ¾ÙÊÀÒôÀÖ¼¯ÍÅ680ÃûСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬Ìṩ24¸öÔÂÐÅÓüà¿Ø·þÎñ
10ÔÂ7ÈÕ£¬¾ÙÊÀÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂ680ÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢£¬°üÀ¨Éç»áÇå¾²ºÅÂëµÈ£¬±»²»·¨»ñÈ¡¡£¸ÃÊÂÎñÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢Ã÷¡£¾ÝϤ£¬¾ÙÊÀÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿Ó¦ÓóÌÐòÖмà²âµ½Î´¾ÊÚȨµÄÔ˶¯£¬Ëæ¼´Æô¶¯½ôÆÈÏìÓ¦»úÖÆ£¬Ô¼ÇëµÚÈý·½×¨¼ÒÕö¿ªÖÜÈ«ÊÓ²ìÓëµ÷½â²½·¥¡£¾ÓÉһϵÁÐÉó²é£¬¹«Ë¾È·ÈÏСÎÒ˽¼ÒÐÅÏ¢Òѱ»Î´¾ÊÚȨµÄµÚÈý·½»ñÈ¡£¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²éЧ¹ûºó£¬ÒÀ¾ÝÖ´·¨ÒªÇó£¬ÏòÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢³öÁËÊý¾Ýй¶֪ͨ¡£ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼°£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¼°Éç»áÇå¾²ºÅÂëµÈ¡£ÏÖÔÚ£¬¾ÙÊÀÒôÀÖ¼¯ÍÅÉÐδ·¢Ã÷Êý¾Ý±»µÁÓõÄÇéÐΣ¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸öÌåµÄ²ÆÎñÇå¾²£¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£ÖÁÓÚ´Ë´ÎÇå¾²Îó²îµÄÏêϸÊÖÒÕϸ½Ú£¬¾ÙÊÀÒôÀÖ¼¯ÍÅδÓè͸¶£¬Í¬Ê±£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§¼á³Ö¸ß¶ÈСÐÄ£¬Ç×½ü¹Ø×¢ÈκÎÒì³£½ðÈÚÔ˶¯¼£Ïó¡£
https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html
6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜÇ®±ÒÆ×Ó¶ÌÔÝÈëÇÖ£¬Íƹã¼ÙÀָߴú±Ò
10ÔÂ7ÈÕ£¬ÀÖ¸ßÍøÕ¾ÔâÓöÁ˼ÓÃÜÇ®±ÒÆ×ӵĶÌÔÝÈëÇÖ¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ùÌ滻ΪÐû´«¼ÙÀָߴú±ÒµÄͼƬ£¬Éù³Æ¿ÉÓÃÒÔÌ«·»¹ºÖò¢½âËøÉñÃؽ±Àø¡£´Ë´ÎÈëÇÖ±¬·¢ÔÚÃÀ¹ú¶«²¿Ê±¼ä10ÔÂ5ÈÕÍíÉÏ9µã£¬Ò»Á¬Ô¼75·ÖÖÓ£¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å»Ö¸´¡£Óë³£¼ûµÄ¼ÓÃÜÇ®±ÒȦÌײî±ð£¬¸ÃȦÌײ¢Î´Ö¸µ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú£¬¶øÊǽ«»á¼ûÕß´øµ½Uniswapƽ̨¹ºÖÃȦÌ×´ú±Ò¡£ÀÖ¸ß֤ʵÁË´Ë´ÎÊÂÎñ£¬µ«Î´Í¸Â¶ÈëÇÖϸ½Ú£¬ÌåÏÖûÓÐÓû§ÕË»§±»µÁ£¬¿Í»§¿ÉÕý³£¹ºÎ²¢ÒѽÓÄɲ½·¥±ÜÃâÔٴα¬·¢¡£´Ë´Î¹¥»÷×ÜÌåʧ°Ü£¬½öÉÙÊýÈ˹ºÖÃÁËÀָߴú±Ò¡£ÁîÈ˾ªÑȵÄÊÇ£¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜȦÌ×£¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½·¨¡£Í¨³££¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript£¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý£¬ÓÃÓÚÀÕË÷¡¢³öÊÛ»òÔÚÏßڲơ£
https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/