΢ÈíÖÒÑÔÕýµ±ÎļþÍйܷþÎñ³ÉÍøÂç´¹ÂÚÐÂÇþµÀ

Ðû²¼Ê±¼ä 2024-10-09

1. ΢ÈíÖÒÑÔÕýµ±ÎļþÍйܷþÎñ³ÉÍøÂç´¹ÂÚÐÂÇþµÀ


10ÔÂ8ÈÕ £¬Microsoft Threat Intelligence±¨¸æÖ¸³ö £¬Ê¹ÓÃSharePoint¡¢OneDriveºÍDropboxµÈÕýµ±ÎļþÍйܷþÎñÌᳫµÄÉÌÒµµç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂç´¹ÂÚÔ˶¯ÕýÔÚÉÏÉý ¡£ÕâЩÔ˶¯×Ô2024Äê4ÔÂÖÐÑ®×îÏÈ £¬½ÓÄÉÖØ´ó·ÀÓù¹æ±ÜÊÖÒÕÈƹýÇå¾²²½·¥ £¬µ¼ÖÂÉí·ÝµÁÓá¢×°±¸Ê§Ôô £¬ÉõÖÁÒýÅÕþڲƭ¡¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒƶ¯ ¡£ÎļþÍйܷþÎñËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁ˱㵱 £¬µ«Ò²ÒòÆÕ±éʹÓöø³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ ¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÍÐÕË»§È¨ÏÞ £¬ÀÄÓÃƽ̨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅȪԴµÄ¶ñÒâÎļþ»òÁ´½Ó £¬±Ü¿ª¹Å°å¼ì²â ¡£Î¢Èí·¢Ã÷ £¬ÏÞÖÆ»á¼ûºÍÖ»¶ÁÎļþÕ½ÂÔ±»ÆÕ±éÓ¦ÓÃÒÔÌÓ±ÜÇ徲ϵͳ¼ì²â £¬Ê¹Ç徲ɨÃèºÍÆÊÎö¶ñÒâÁ´½Ó±äµÃÄÑÌâ ¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÍй©Ó¦ÉÌÕË»§ £¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÄ¿µÄ×éÖ¯¹²Ïí £¬Ê¹ÓÃÐÅÍйØϵÈƹýÇå¾²¹ýÂËÆ÷ ¡£¹¥»÷Õß»¹»áð³äITÖ§³Ö»òÖÎÀíÔ± £¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§·­¿ªÎļþ ¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý £¬¾Í»á±»Öض¨Ïòµ½¶ñÒâÖÐÐÄÈËÍøÂç´¹ÂÚÒ³Ãæ £¬ÒªÇóÌṩÃÜÂëºÍÍê³É¶àÒòËØÉí·ÝÑéÖ¤ £¬¹¥»÷Õß´Ó¶ø²¶»ñ»á»°ÁîÅƾÙÐнøÒ»²½Ê¹Óà ¡£


https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/


2. GoldenJackal APT×é֯ͻÆÆÅ·ÖÞÕþ¸®¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý


10ÔÂ8ÈÕ £¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×é֯ʹÓÃÁ½Ì××Ô½ç˵¹¤¾ßÀÖ³ÉÉø͸ÁËÅ·ÖÞÕþ¸®µÄ¸ôÀëϵͳ £¬ÇÔÈ¡ÁË°üÀ¨µç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý ¡£¾ÝESET±¨¸æ £¬¸Ã×éÖ¯ÖÁÉÙÁ½´ÎʵÑé´ËÀ๥»÷ £¬Ò»´ÎÕë¶ÔÄÏÑǹú¼Òפ°×¶íÂÞ˹´óʹ¹Ý £¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞÕþ¸®×éÖ¯ ¡£¹¥»÷ʼÓÚѬȾ»¥ÁªÍøÅþÁ¬ÏµÍ³ £¬Ê¹ÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓà £¬²¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´ÖƶñÒâ×é¼þ ¡£Ëæºó £¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢ £¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Êä»Øԭʼ»¥ÁªÍøÅþÁ¬ÏµÍ³ £¬×îÖÕ·¢Ë͸ø¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ ¡£GoldenHowl×÷Ϊ¶à¹¦Ð§PythonºóÃÅ £¬ÔÚÅþÁ¬»¥ÁªÍøµÄ»úеÉÏÔËÐÐ £¬ÊµÏÖÎļþÇÔÈ¡¡¢³¤ÆÚÐÔ¼á³Ö¡¢Îó²îɨÃèºÍC2ͨѶ ¡£


https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/


3. Red BarrelsÔâÖØ´óÍøÂç¹¥»÷ £¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì


10ÔÂ4ÈÕ £¬¹ãÊܺÃÆÀµÄ¿Ö²ÀÓÎϷϵÁС¶Outlast¡·µÄÖÆ×÷¹«Ë¾Red BarrelsÐû²¼ £¬ÆäÔâÊÜÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷ £¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶ £¬¿ª·¢Ê±¼ä±í±»´òÂÒ ¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶ÈëÇÖµÄÏêϸϸ½Ú £¬µ«ÓÐÐÂÎųƹ¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Í¼¼°¹«Ë¾ÐÅÓÿ¨ÏêϸÐÅÏ¢µÈ´ó×ÚÓмÛÖµµÄÐÅÏ¢ ¡£Red BarrelsѸËÙ½ÓÄÉÐж¯ £¬Ô¼ÇëÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ²¢Í¨ÖªÏà¹ØÀûÒæ·½ºÍÕþ¸® £¬Í¬Ê±½ÓÄɲ½·¥È·±£ÏµÍ³Çå¾² ¡£È»¶ø £¬´Ë´Î¹¥»÷¶ÔÊÂÇéÊÒµÄÔËÓª±¬·¢ÁËÖØ´óÓ°Ïì £¬µ¼ÖÂÖÆ×÷ʱ¼ä±íÊܵ½ÖØ´óÓ°Ïì £¬²¿·ÖÏîÄ¿²»µÃ²»ÍƳ٠¡£Õâ¶ÔÆÚ´ý¡¶ÌÓÉúÊÔÁ¶¡·Ðû²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö¹¥»÷ ¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂçÇå¾²µÄÔÊÐí £¬²¢ÌåÏÖ½«¼ÌÐøʵÑé×î¼Ñʵ¼ù²½·¥ £¬È·±£ÎªÔ±¹¤ÌṩÇå¾²ÇéÐÎ ¡£¾Ý±¨µÀ £¬ÊÓ²ìÒÑÍê³É £¬ÊÂÎñÒÑ»ñµÃ¿ØÖÆ £¬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»áÒ»Á¬Ò»¶Îʱ¼ä ¡£


https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/


4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank £¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì


10ÔÂ6ÈÕ £¬¿µ¿¨Ë¹ÌØÓÐÏßͨѶ¹«Ë¾ (Comcast) ºÍ Truist Bank ¿ËÈÕÅû¶ £¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶ÊÂÎñµÄÓ°Ïì £¬ÕýÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶ ¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹ £¬½ñÄê4ÔÂת´ïÁËÒ»Æ𱬷¢ÔÚ2ÔÂÖÁ2ÔÂʱ´úµÄÊý¾Ýй¶ÊÂÎñ £¬ÍþвÐÐΪÕßÈëÇÖÆäÍøÂç²¢ÇÔÈ¡ÁË´ó×ÚСÎÒ˽¼ÒÐÅÏ¢ £¬°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝʻִÕÕºÅÂë»òÉí·ÝÖ¤µÈ ¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË £¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË ¡£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò» £¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ïì £¬¶øTruistµÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÐû²¼ ¡£FBCSµÄ²ÆÎñ״̬¶ñ»¯ £¬ÊÜÊÂÎñ¼ä½ÓÓ°ÏìµÄʵÌåÐè×ÔÐоÙÐÐ֪ͨºÍµ÷½â³ÌÐò ¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ± £»¤·þÎñ ¡£È¥Äê6Ô £¬Truist BankÒ²Ôø֤ʵһÆ𵥶ÀµÄÎ¥¹æÐÐΪ £¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý ¡£


https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/


5. ¾ÙÊÀÒôÀÖ¼¯ÍÅ680ÃûСÎÒ˽¼ÒÐÅÏ¢Ôâй¶ £¬Ìṩ24¸öÔÂÐÅÓüà¿Ø·þÎñ


10ÔÂ7ÈÕ £¬¾ÙÊÀÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâÓöÁËÊý¾Ýй¶ÊÂÎñ £¬µ¼ÖÂ680ÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢ £¬°üÀ¨Éç»áÇå¾²ºÅÂëµÈ £¬±»²»·¨»ñÈ¡ ¡£¸ÃÊÂÎñÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢Ã÷ ¡£¾ÝϤ £¬¾ÙÊÀÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿Ó¦ÓóÌÐòÖмà²âµ½Î´¾­ÊÚȨµÄÔ˶¯ £¬Ëæ¼´Æô¶¯½ôÆÈÏìÓ¦»úÖÆ £¬Ô¼ÇëµÚÈý·½×¨¼ÒÕö¿ªÖÜÈ«ÊÓ²ìÓëµ÷½â²½·¥ ¡£¾­ÓÉһϵÁÐÉó²é £¬¹«Ë¾È·ÈÏСÎÒ˽¼ÒÐÅÏ¢Òѱ»Î´¾­ÊÚȨµÄµÚÈý·½»ñÈ¡ £¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²éЧ¹ûºó £¬ÒÀ¾ÝÖ´·¨ÒªÇó £¬ÏòÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢³öÁËÊý¾Ýй¶֪ͨ ¡£ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼° £¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¼°Éç»áÇå¾²ºÅÂëµÈ ¡£ÏÖÔÚ £¬¾ÙÊÀÒôÀÖ¼¯ÍÅÉÐδ·¢Ã÷Êý¾Ý±»µÁÓõÄÇéÐÎ £¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸öÌåµÄ²ÆÎñÇå¾² £¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ± £»¤·þÎñ ¡£ÖÁÓÚ´Ë´ÎÇå¾²Îó²îµÄÏêϸÊÖÒÕϸ½Ú £¬¾ÙÊÀÒôÀÖ¼¯ÍÅδÓè͸¶ £¬Í¬Ê± £¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ ¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§¼á³Ö¸ß¶ÈСÐÄ £¬Ç×½ü¹Ø×¢ÈκÎÒì³£½ðÈÚÔ˶¯¼£Ïó ¡£


https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html


6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜÇ®±ÒÆ­×Ó¶ÌÔÝÈëÇÖ £¬Íƹã¼ÙÀָߴú±Ò


10ÔÂ7ÈÕ £¬ÀÖ¸ßÍøÕ¾ÔâÓöÁ˼ÓÃÜÇ®±ÒÆ­×ӵĶÌÔÝÈëÇÖ ¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ùÌ滻ΪÐû´«¼ÙÀָߴú±ÒµÄͼƬ £¬Éù³Æ¿ÉÓÃÒÔÌ«·»¹ºÖò¢½âËøÉñÃؽ±Àø ¡£´Ë´ÎÈëÇÖ±¬·¢ÔÚÃÀ¹ú¶«²¿Ê±¼ä10ÔÂ5ÈÕÍíÉÏ9µã £¬Ò»Á¬Ô¼75·ÖÖÓ £¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å»Ö¸´ ¡£Óë³£¼ûµÄ¼ÓÃÜÇ®±ÒȦÌײî±ð £¬¸ÃȦÌײ¢Î´Ö¸µ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú £¬¶øÊǽ«»á¼ûÕß´øµ½Uniswapƽ̨¹ºÖÃȦÌ×´ú±Ò ¡£ÀÖ¸ß֤ʵÁË´Ë´ÎÊÂÎñ £¬µ«Î´Í¸Â¶ÈëÇÖϸ½Ú £¬ÌåÏÖûÓÐÓû§ÕË»§±»µÁ £¬¿Í»§¿ÉÕý³£¹ºÎï £¬²¢ÒѽÓÄɲ½·¥±ÜÃâÔٴα¬·¢ ¡£´Ë´Î¹¥»÷×ÜÌåʧ°Ü £¬½öÉÙÊýÈ˹ºÖÃÁËÀָߴú±Ò ¡£ÁîÈ˾ªÑȵÄÊÇ £¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜȦÌ× £¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½·¨ ¡£Í¨³£ £¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript £¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý £¬ÓÃÓÚÀÕË÷¡¢³öÊÛ»òÔÚÏßڲƭ ¡£


https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/