°Ä´óÀûÑǾü·½µÄͨÐÅÆ½Ì¨ForceNetÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-11-03
¾Ý·͸Éç10ÔÂ31ÈÕ±¨µÀ£¬°Ä´óÀûÑÇForceNetÔâµ½ÁËÀÕË÷¹¥»÷¡£ForceNetÊÇÓɹú·À²¿ÍⲿICT¹©Ó¦ÉÌÔËÓªµÄ£¬ÊǰĴóÀûÑǾüʺ͹ú·ÀÈËԱʹÓõÄͨÐÅÆ½Ì¨¡£¹ú·À²¿ÖúÀí²¿³¤ÌåÏÖ£¬¸Ã·þÎñÔâµ½¹¥»÷£¬µ«µ½Ä¿Ç°ÎªÖ¹Ã»ÓÐÈκÎÊý¾Ýй¶¡£¾Ý°Ä´óÀûÑÇýÌ峯£¬Ò»Ð©¸öÈËÐÅÏ¢£¬Èç¾üÊÂÈËÔ±µÄ³öÉúÈÕÆÚºÍÈëÎéϸ½ÚµÈ¿ÉÄÜÒѱ»µÁ¡£¹ú·À²¿·¢ÑÔÈË͸¶£¬ËûÃÇÕýÔÚ¼ì²éÊÜÓ°ÏìÊý¾Ý¼¯µÄÄÚÈݼ°Æä°üÂ޵ĸöÈËÐÅÏ¢£¬²¢ÒÑ֪ͨËùÓÐÏà¹ØÈËÔ±¡£
https://www.reuters.com/technology/ransomware-hackers-hit-australian-defence-communications-platform-2022-10-31/
2¡¢Ñо¿ÈËÔ±Åû¶Azure Cosmos DBÖеÄRCE©¶´CosMiss
¾Ý11ÔÂ1ÈÕ±¨µÀ£¬Orca SecurityÑо¿ÈËÔ±Åû¶ÁËAzure Cosmos DBÄÚÖõÄJupyter NotebooksÖеÄRCE©¶´CosMiss¡£Èç¹û¹¥»÷ÕßÖªµÀNotebookµÄ'forwardingId'£¬¼´Notebook WorkspaceµÄUUID£¬ËûÃǽ«ÓµÓÐNotebookµÄÍêÕûȨÏÞ¶øÎÞÐè½øÐÐÉí·ÝÑéÖ¤£¬°üÂÞ¶ÁÈ¡ºÍдÈë·ÃÎÊȨÏÞ¡£Ñо¿ÈËÔ±ÓÚ2022Äê10ÔÂ3ÈÕÏòMicrosoft³ÂËßÁ˸é¶´£¬Èí¼þ¹©Ó¦ÉÌÔÚ10ÔÂ5ÈÕÐÞ¸´ÁËËü¡£Microsoft½âÊͳƣ¬²»Ê¹ÓÃJupyter NotebooksµÄ¿Í»§£¨99.8%µÄ¿Í»§£©²»Ò×Êܵ½´Ë©¶´µÄÓ°Ïì ¡£
https://thehackernews.com/2022/11/researchers-disclose-details-of.html
3¡¢DropboxÔâµ½µöÓã¹¥»÷µ¼ÖÂ130¸öGitHub´æ´¢¿âй¶
DropboxÔÚ11ÔÂ1ÈÕ͸¶£¬ºÚ¿ÍʹÓõöÓã¹¥»÷ÖлñµÃµÄÔ±¹¤Æ¾Ö¤·ÃÎÊÆäÒ»¸öGitHubÕÊ»§ºóÇÔÈ¡ÁË130¸ö´úÂë´æ´¢¿â¡£¸Ã¹«Ë¾ÓÚ10ÔÂ14ÈÕ·¢ÏÖ¹¥»÷ÕßÈëÇÖÁ˸ÃÕÊ»§£¬´Ë´Î¹¥»÷Õë¶Ô¶àÃûDropboxÔ±¹¤£¬Í¨¹ýð³äCircleCIµÄÓʼþ½«ËûÃÇÖØ¶¨Ïòµ½µöÓãÒ³Ãæ£¬²¢ÒªÇóËûÃÇÊäÈëGitHubƾ¾Ý¡£¸Ã¹«Ë¾³Æ£¬ÊÜÓ°Ïì´æ´¢¿â°üÂÞÆäΪDropboxʹÓöøÉÔ×÷Ð޸ĵĵÚÈý·½¿â¸±±¾¡¢ÄÚ²¿ÔÐÍÒÔ¼°Äþ¾²ÍŶÓʹÓõÄһЩ¹¤¾ßºÍÅäÖÃÎļþ£¬²¢²»°üÂÞºËÐÄÓ¦Ó÷¨Ê½»ò»ù´¡ÉèÊ©µÄ´úÂë¡£
https://www.bleepingcomputer.com/news/security/dropbox-discloses-breach-after-hacker-stole-130-github-repositories/
4¡¢Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»°²×°Áè¼Ý100Íò´Î
¾ÝMalwarebytes 11ÔÂ1ÈÕ±¨µÀ£¬Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»°²×°Áè¼Ý100Íò´Î¡£ÕâЩӦÓÃÈÔÈ»´æÔÚÓÚ¿ª·¢ÕßÕË»§Mobile apps Group֮ϣ¬·Ö±ðΪBluetooth Auto Connect¡¢Bluetooth App Sender¡¢Driver: Bluetooth, Wi-Fi, USBºÍMobile transfer: smart switch¡£ËüÃǿɽ«Óû§ÒýÏòÇÔÈ¡ÐÅÏ¢»òΪÔËÓªÍŶӵÞÔì"pay-per-click"ÊÕÈëµÄÍøÕ¾¡£ÆäÖÐÒ»Ð©ÍøÕ¾ÓÕʹĿ±êÏÂÔØÎ±ÔìµÄÄþ¾²¹¤¾ß»ò¸üУ¬ÒÔºåÆÆäÊÖ¶¯°²×°¶ñÒâÎļþ¡£
https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
5¡¢Emotet¶ÌÔÝͣЪ5¸öÔÂºó»Ø¹é£¬·Ö·¢¶ñÒâExcel¸½¼þ
ýÌå11ÔÂ2Èճƣ¬ÔÚ¾ÀúÁ˽ü5¸öÔµġ°¼ÙÆÚ¡±Ö®ºó£¬EmotetÔٴοªÊ¼¹¥»÷»î¶¯¡£CryptolaemusÑо¿ÈËÔ±³ÂËß˵£¬ÔÚÃÀ¹ú¶«²¿Ê±¼ä11ÔÂ2ÈÕÁ賿4:00×óÓÒ£¬EmotetͻȻÔٴλîÔ¾ÆðÀ´£¬ÏòÈ«ÇòµÄÓʼþµØÖ··¢ËÍÀ¬»øÓʼþ¡£¸Ã»î¶¯Ê¹Óñ»µÁµÄµç×ÓÓʼþ»Ø¸´Á´½ÓÀ´·Ö·¢¶ñÒâExcel¸½¼þ£¬ÒÔÖÖÖÖÓïÑÔºÍÎļþÃûÕë¶ÔÈ«ÇòÓû§£¬Î±×°³É·¢Æ±¡¢É¨Ãè¼þ¡¢µç×Ó±í¸ñµÈÓÕ¶ü¡£´ËÍ⣬»î¶¯»¹ÒýÈëÁËÒ»¸öеÄExcel¸½¼þÄ£°å£¬ÆäÖаüÂÞÈÆ¹ýMicrosoftÊܱ£»¤ÊÓͼµÄ˵Ã÷¡£
https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-5-month-break/
6¡¢KasperskyÐû²¼2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄ·ÖÎö³ÂËß
KasperskyÔÚ11ÔÂ1ÈÕÐû²¼ÁË2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄ·ÖÎö³ÂËß¡£¸Ã¼¾¶ÈµÄÖ÷ÒªÇ÷ÊÆ°üÂÞ£ºAPT»î¶¯ÂþÑܷdz£¹ã·º£¬±¾¼¾¶ÈµÄ¹¥»÷·¶Î§À©´óµ½Å·ÖÞ¡¢ÃÀ¹ú¡¢º«¹ú¡¢°ÍÎ÷¡¢Öж«ºÍÑÇÖÞ¸÷µØ£»APT¹¥»÷ÍÅ»ïÑ¡ÔñµÄÄ¿±ê¶àÑù»¯£¬°üÂÞÕþ¸®ºÍÍâ½»»ú¹¹¡¢¹ú·À³Ð°üÉÌ¡¢½ðÈÚÐÐÒµ¡¢¿Æ¼¼Ó²¼þºÍ°ëµ¼ÌåÐÐÒµ£¬ÒÔ¼°ITÕÐÆ¸µÈ£»µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÖ÷ÒªÇý¶¯Á¦£¬¼äµý»î¶¯ÊÇAPT»î¶¯µÄÖ÷ҪĿ±ê¡£´ËÍ⣬³ÂËß»¹½éÉÜÁËÓë¶íÂÞ˹¡¢Öж«¡¢¶«ÄÏÑǺͳ¯Ïʰ뵺µÈµØÓòÏà¹ØµÄAPT»î¶¯¡£
https://securelist.com/apt-trends-report-q3-2022/107787/