LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼ÊÖ´·¨Ðж¯¶øÍß½â

Ðû²¼Ê±¼ä 2024-02-21
1. LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼ÊÖ´·¨Ðж¯¶øÍß½â


2ÔÂ20ÈÕ£¬À´×Ô 11 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹¿ªÕ¹µÄ´úºÅΪ¡°¿ËÂÞŵ˹Ðж¯¡±µÄÁªºÏÖ´·¨Ðж¯£¬Éæ¼°LockBitÀÕË÷ÍŻÆäÍøÕ¾ÒѾ­±»¿ØÖÆ¡£×Ô 2019 Äêµ×·ºÆðÒÔÀ´£¬¸Ã×éÖ¯µÄ¹æÄ£Ô¶Ô¶Áè¼ÝÆäËûÀÕË÷Èí¼þÍŻRecorded Future µÄÑо¿ÈËÔ±½«½ü 2,300 Æð¹¥»÷¹éÒòÓÚ¸Ã×éÖ¯¡£Conti Êǵڶþ»îÔ¾µÄ×éÖ¯£¬½ö¹ûÈ»Óë 883 Æð¹¥»÷ÓйØ¡£×Ô 2020 Äê 1 ÔÂÒÔÀ´£¬ÀûÓà LockBit µÄÁ¥Êô»ú¹¹Òѽ«Ä¿±êËø¶¨ÔÚ½ðÈÚ·þÎñ¡¢Ê³Æ·ºÍÅ©Òµ¡¢½ÌÓý¡¢ÄÜÔ´µÈÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄÖÖÖÖ¹æÄ£µÄ×éÖ¯¡£Õþ¸®ºÍ½ô¼±·þÎñ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìºÍÔËÊä¡£


https://therecord.media/lockbit-ransomware-disrupted-international-operation


2.Cactus ÀÕË÷Èí¼þÉù³ÆÇÔÈ¡ 1.5TB Ê©Ä͵µçÆøÊý¾Ý


2ÔÂ19ÈÕ£¬Cactus ÀÕË÷Èí¼þÍÅ»ïÉù³Æ£¬ËûÃÇÉϸöÔÂÈëÇÖÊ©Ä͵µçÆøÍøÂçºóÇÔÈ¡ÁË 1.5TB µÄÊý¾Ý¡£²¢ÔÚ°µÍøй¶ÍøÕ¾ÉÏ»¹Ð¹Â¶ÁË 25MB µÄ¾Ý³Æ±»µÁÊý¾Ý£¬×÷ΪÍþвÐÐΪÕßÉù³ÆµÄÖ¤¾Ý£¬´ËÍ⻹ÓÐÏÔʾ¼¸ÃûÃÀ¹ú¹«Ãñ»¤Õպͱ£ÃÜЭÒéÎļþɨÃèµÄ¿ìÕÕ¡£¸ÃÍÅ»ïÄ¿Ç°ÕýÔÚÀÕË÷¸Ã¹«Ë¾£¬²¢Íþв³Æ£¬Èç¹û²»Ö§¸¶Êê½ð£¬¾Í»áй¶ËùÓоݳƱ»µÁµÄÊý¾Ý¡£Ä¿Ç°Éв»Çå³þ¾ßÌåµÄÊý¾Ý±»µÁ£¬µ«Ê©Ä͵µçÆøµÄ¿ÉÁ¬ÐøÉú³¤ÒµÎñ²¿ÃÅΪȫÇòÐí¶àÖªÃû¹«Ë¾Ìṩ¿ÉÔÙÉúÄÜÔ´ºÍ¼à¹ÜºÏ¹æ×Éѯ·þÎñ£¬°üÂÞ Allegiant Travel Company¡¢Clorox¡¢DHL¡¢¶Å°î¡¢Ï£¶û¶Ù¡¢ÀûÃË¡¢°ÙÊ¿ÉÀÖºÍÎÖ¶ûÂê¡£¼øÓÚ´Ë£¬´ÓÆäÄ¿±êϵͳÖÐÇÔÈ¡µÄÊý¾Ý¿ÉÄÜ°üÂÞÓйؿͻ§¹¤Òµ¿ØÖƺÍ×Ô¶¯»¯ÏµÍ³µÄÃô¸ÐÐÅÏ¢ÒÔ¼°Óйػ·¾³ºÍÄÜÔ´¹æÔòºÏ¹æÐÔµÄÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/cactus-ransomware-claim-to-steal-15tb-of-schneider-electric-data/


3.Wyze ÉãÏñÍ·¹ÊÕϵ¼ÖÂÁè¼Ý 13000 Óû§ÊÜÓ°Ïì


2ÔÂ19ÈÕ£¬Wyze ·ÖÏíÁËÓ°ÏìÊýǧÃûÓû§µÄÄþ¾²Ê¼þµÄ¸ü¶àϸ½Ú£¬¸Ã¹«Ë¾½«Æä¹é¾ÌÓÚ×î½üÌí¼Óµ½ÆäϵͳÖеĵÚÈý·½»º´æ¿Í»§¶Ë¿â£¬¸Ã¿âÔÚ´¦ÖÃÖÜÎå´ó·¶Î§Í£µçºóͬʱÉÏÏߵĴóÁ¿ÉãÏñ»úʱ·ºÆðÎÊÌâ¡£¡°Õâ´ÎÖжÏÊÇÓÉÎÒÃǵĺÏ×÷»ï°é AWS Ôì³ÉµÄ£¬ÖÜÎåÁ賿 Wyze É豸Í£»úÁ˼¸¸öСʱ¡£Èç¹ûÄúÔÚÕâ¶Îʱ¼äÄÚʵÑé¼ì²ìʵʱÉãÏñÍ·»ò»î¶¯£¬Äú¿ÉÄÜÎÞ·¨Ô¢Ä¿¡£¶ÔÓÚ¸øÄú´øÀ´µÄ´ì°Ü¸ÐºÍÀ§»ó£¬ÎÒÃÇÉî±íǸÒâÕâµ¼ÖÂÁË¡±¸Ã¹«Ë¾ÔÚ·¢Ë͸øÊÜÓ°ÏìÓû§µÄµç×ÓÓʼþÖÐÌåÏÖ¡£Wyze ÌåÏÖ£¬·ºÆðÕâÖÖÇé¿öÊÇÒòΪÐèÇóͻȻÔö¼Ó£¬µ¼ÖÂÉ豸 ID ºÍÓû§ ID Ó³Éä»ìºÏ£¬µ¼ÖÂijЩÊý¾ÝÓë²»ÕýÈ·µÄÓû§ÕÊ»§´íÎóÁ¬½Ó¡£Òò´Ë£¬¿Í»§¿ÉÒÔÔÚµã»÷ Wyze Ó¦Ó÷¨Ê½µÄ¡°Ê¼þ¡±Ñ¡ÏÖеÄÏà»úËõÂÔͼºó¿´µ½ÆäËûÈ˵ÄÊÓƵԴËõÂÔͼ£¬ÔÚijЩÇé¿öÏÂÉõÖÁ¿ÉÒÔ¿´µ½ÊÓƵƬ¶Î¡£


https://www.bleepingcomputer.com/news/security/wyze-camera-glitch-gave-13-000-users-a-peek-into-other-homes/


4.Linux ÄÚºËȱÏÝ (CVE-2024-0646) ʹϵͳÃæÁÙȨÏÞÌáÉý


2ÔÂ19ÈÕ£¬Linux Äں˴«Êä²ãÄþ¾²ÐÔ (kTLS) ÖеÄ©¶´(CVE-2024-0646)¿ÉÄܱ»µ±µØÓû§ÀûÓÃÀ´»ñÈ¡ÌáÉýµÄϵͳȨÏÞ»òÖжÏϵͳ²Ù×÷¡£ÐÒÔ˵ÄÊÇ£¬ÏÖÔÚÒѾ­ÌṩÁËÕë¶Ô´Ë©¶´µÄ²¹¶¡¡£kTLS ½«»ù±¾µÄ TLS ¼ÓÃܺÍÉí·ÝÑéÖ¤¹¦Ð§Ö±½ÓÒýÈë Linux Äںˡ£Õâ¼ò»¯ÁË»ù±¾»¥ÁªÍøЭÒéµÄÄþ¾²Í¨ÐÅ£¬ÀýÈç HTTPS£¨Äþ¾²ÍøÒ³ä¯ÀÀ£©¡¢µç×ÓÓʼþºÍÆäËû»¥ÁªÍøÁ¬½ÓÓ¦Ó÷¨Ê½¡£¸Ã©¶´µÄ±¾ÖÊÔÚÓÚµ÷ÓÃsplice() ʱÄÚ´æ´¦Öò»Íס£KTLS ´úÂëÎÞ·¨ÕýÈ·¸üÐÂÃ÷ÎÄÊèÉ¢ÊÕ¼¯»º³åÇø ( struct sk_msg_sg ) µÄÄÚ²¿¼ÇÕÊ ( curr/copybreak ) £¬´Ó¶øµ¼ÖÂÔ½½çÄÚ´æдÈëȱÏÝ¡£ÄÚ´æ¹ÜÀíÖеÄÕâÖÖʧÎó¿ÉÄÜ»áÔÊÐíºóÐø¶ÔÌ×½Ó×ÖµÄдÈëÁýÕÖÆ´½ÓÒ³ÃæµÄÄÚÈÝ£¬´Ó¶øΣÏյذüÂÞµ÷ÓÃÕß²»Ó¦¾ßÓÐд·ÃÎÊȨÏÞµÄÎļþÖеÄÒ³Ãæ¡£¹¥»÷Õß¿ÉÄÜ»áÀûÓôË©¶´ÒÔ·ÇÔ¤ÆÚµÄϵͳȨÏÞµ¼Ö´úÂëÒâÍâÖ´ÐС£


https://securityonline.info/linux-kernel-flaw-cve-2024-0646-exposes-systems-to-privilege-escalation/


5.Android ÒøÐÐľÂí Anatsa ¾íÍÁÖØÀ´ÐÂÔö˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË


2ÔÂ19ÈÕ£¬ThreatFabric µÄÑо¿ÈËÔ±ÊӲ쵽AnatsaÒøÐÐľÂí£¨ÓÖÃû TeaBot ºÍ Toddler£©¾íÍÁÖØÀ´¡£11 ÔÂÖÁ 2 ÔÂÆڼ䣬ר¼ÒÃÇÊӲ쵽ÁËÎ岨²îÒìµÄ¹¥»÷£¬Ã¿Ò»²¨¶¼¼¯ÖÐÔÚ²îÒìµÄµØÓò¡£¸Ã¶ñÒâÈí¼þ´ËÇ°Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢µÂ¹úºÍÎ÷°àÑÀ½øÐл£¬µ«×îеĻÕë¶ÔµÄÊÇ˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË£¬Õâ±íÃ÷ÆäÔËÓª¼Æı·¢ÉúÁËת±ä¡£Ñо¿ÈËÔ±½« Anatsa µÄ»î¶¯¹éÀàΪ¡°ÓÐÕë¶ÔÐÔ¡±£¬ÊӲ쵽ÍþвÐÐΪÕßÒ»´Î¼¯ÖÐÓÚ 3-5 ¸öÇøÓò¡£¾Ý ThreatFabric ³Æ£¬Í¶·ÅÆ÷Ó¦Ó÷¨Ê½ÒÑÉÏ´«µ½Ä¿±êÇøÓòµÄ Google Play ÉÏ¡£¹¥»÷Õß×¢Òâµ½ÕâЩӦÓ÷¨Ê½¾­³£½øÈë¡°ÈÈÃÅÐÂÃâ·Ñ¡±Àà±ðÖеÄÇ°ÈýÃû£¬ÊÔͼÆÛÆ­Óû§ÏàПÃÓ¦Ó÷¨Ê½ÊǺϷ¨µÄ²¢ÓдóÁ¿Óû§ÏÂÔØ¡£


https://securityaffairs.com/159344/malware/anatsa-banking-trojan-resurgence.html


6.Áè¼Ý 28500 ̨ Exchange ·þÎñÆ÷Ò×ÊÜÖ÷¶¯ÀûÓõÄ©¶´¹¥»÷


2ÔÂ19ÈÕ£¬Microsoft Exchange ·þÎñÆ÷¿ÉÄÜÈÝÒ×Êܵ½ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓõÄÑÏÖØÐÔȨÏÞÉý¼¶Â©¶´£¨¸ú×ÙΪ CVE-2024-21410£©µÄÓ°Ï졣΢ÈíÓÚ 2 Ô 13 ÈÕ½â¾öÁ˸ÃÎÊÌ⣬Æäʱ¸ÃÎÊÌâÒѱ»ÓÃ×÷ÁãÈÕ©¶´¡£Ä¿Ç°£¬ÒÑÓÐ 28500 ̨·þÎñÆ÷±»È·¶¨´æÔÚ©¶´¡£Exchange Server ¹ã·ºÓ¦ÓÃÓÚÉÌÒµ»·¾³ÖУ¬ÒÔ´Ù½øÓû§Ö®¼äµÄͨÐźÍЭ×÷£¬Ìṩµç×ÓÓʼþ¡¢ÈÕÀú¡¢ÁªÏµÈ˹ÜÀíºÍÈÎÎñ¹ÜÀí·þÎñ¡£¸ÃÄþ¾²ÎÊÌâÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¶Ô Microsoft Exchange Server Ö´ÐÐ NTLM Öм̹¥»÷²¢ÌáÉýÆäÔÚϵͳÉϵÄȨÏÞ¡£Ä¿Ç°£¬CVE-2024-21410 »¹Ã»ÓйûÈ»µÄ¿´·¨ÑéÖ¤ (PoC) ©¶´£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉÏÏÞÖÆÁËÀûÓøÃȱÏݽøÐй¥»÷µÄ¹¥»÷ÕßÊýÁ¿¡£


https://www.bleepingcomputer.com/news/security/over-28-500-exchange-servers-vulnerable-to-actively-exploited-bug/