´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIºÏ×÷Ó¦¶ÔÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIºÏ×÷Ó¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ £¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑϾþÌôÕ½ £¬Òѽô¼±ÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú ¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®·þÎñÆ÷ £¬ÊÔͼ¼ÓÃÜÎļþ £¬µ«¶¼ÊеÄÄþ¾²ÏµÍ³Ñ¸ËÙÏìÓ¦ £¬ÓÐЧÏÞÖÆÁËË𺦷¶Î§ ¡£Ä¿Ç° £¬ÊÐÕþ¸®Õý»ý¼«½ÓÄÉ´ëÊ© £¬°üÂ޹رÕÄÚ²¿·ÃÎÊ¡¢¸ü»»É豸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢ £¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³ ¡£¾¡¹ÜÄÚ²¿·þÎñÊܵ½Ò»¶¨ÏÞÖÆ £¬µ«Òªº¦Íⲿ·þÎñÈç911¡¢¾¯²ì¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦ÖõÈÈÔ±£³ÖÕý³£ÔËÐÐ ¡£´Ë´ÎʼþÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÓòÕþ¸®ÍøÂçÄþ¾²ÐÎÊƵÄÑϾþÐÔ £¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó £¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß ¡£¾¡¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄ¾ßÌåÒªÇó £¬µ«Ïà¹Ø²¿ÃÅÒÑÈ«Á¦ÅäºÏFBI¼°¹úÍÁÄþ¾²²¿Õ¹¿ªÊÓ²ì ¡£¹ÙÔ±ÌåÏÖ £¬»Ö¸´ÏµÍ³µÄ¾ßÌåʱ¼äÉÐÎÞ·¨È·¶¨ £¬µ«½«½ß¾¡È«Á¦¼õÉÙ¶ÔÊÐÃñÉú»îµÄÓ°Ïì ¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌú·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ £¬Á÷´«µÐÊÓÑÔÂÛ


9ÔÂ26ÈÕ £¬Ó¢¹úÂôÁ¦»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ô¼±´¦ÖÃÒ»ÆðÉæ¼°Æä¹ÜÀíµÄÃâ·ÑWi-Fi·þÎñµÄÍøÂçÄþ¾²Ê¼þ ¡£´Ë´Îʼþµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾ £¬°üÂÞÂ׶ء¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼ÊеÄÕ¾µã £¬Í¨¹ýWi-FiµÇ¼ҳÃæ½ÓÊÕµ½°üÂÞµÐÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢ ¡£Wi-Fi·þÎñÒÑÔÝÍ£ £¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯²ìºÍͨÐŹ«Ë¾TelentµÄÊÓ²ì ¡£¾ÝÊÓ²ì £¬¸ÃʼþÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷Telent¹ÜÀíµÄWi-FiµÇ½ҳÃæËùÖ £¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª £¬²¢Ô⵽ijºÏ·¨¹ÜÀíÔ±ÕË»§µÄ·Ç·¨ÈëÇÖ ¡£ËäÈ»¾ßÌå¼¼Êõϸ½ÚÉÐδ¹ûÈ» £¬µ«ÐÅÏ¢Äþ¾²×¨¼ÒÖ¸³ö £¬¹«¹²Wi-FiÒòÆ俪·ÅÐÔ³£³ÉΪÍøÂç·¸×ï·Ö×ӵĹ¥»÷Ä¿±ê £¬Ç¿µ÷Á˼ÓÇ¿ÕâÀàÍøÂçÄþ¾²ÐÔµÄÖØÒªÐÔ ¡£´Ë´ÎʼþÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÄþ¾²µÄ¾¯ÖÓ £¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²·þÎñÖпÉÄÜ´æÔÚµÄÍøÂçÄþ¾²Â©¶´ ¡£¾¡¹ÜÄ¿Ç°ÉÐδ·¢ÏÖ¸öÈËÊý¾Ýй¶ £¬µ«¹«ÖÚ¶ÔÓÚÍøÂçÄþ¾²µÄµ£ÓÇÈÔÔÚÔö¼Ó ¡£Network Rail¼°ºÏ×÷»ï°éÕýÈ«Á¦ÒÔ¸° £¬Ö¼ÔÚ¾¡¿ì»Ö¸´·þÎñ²¢·ÀÖ¹ÀàËÆʼþÔٴη¢Éú ¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂçµöÓãÐÂÍþв £¬Äê´´14ÍòµöÓãÍøÕ¾


9ÔÂ26ÈÕ £¬Palo Alto Networks µÄÍøÂçÄþ¾²ÍŶӽÒ¶ÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂçµöÓã¼´·þÎñ£¨PhaaS£©Æ½Ì¨ £¬¸Ãƽ̨ÔÚ¹ýÈ¥Ò»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂçµöÓãÍøÕ¾µÄ´´½¨ £¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв ¡£Sniper Dz רעÓÚÀûÓÃÉ罻ýÌåºÍÔÚÏß·þÎñ×÷Ϊ¹¥»÷Ä¿±ê £¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏß¹ÜÀíÃæ°å £¬ÈÃÍøÂçµöÓãÕßÄÜÇáËÉÉú³ÉÕë¶ÔÖªÃûÆ·ÅƵĵöÓãÒ³Ãæ £¬²¢¿ÉÑ¡ÔñÍйÜÔÚƽ̨»ò×ÔÓзþÎñÆ÷ÉÏ ¡£ÆäÆæÌØÖ®´¦ÔÚÓÚ £¬Sniper Dz ²»Ö±½ÓÊÕ·Ñ £¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õßƾ֤ÖлñÀû £¬Í¨¹ýÄÚÖúóÃÅÊÕ¼¯Êý¾Ý £¬ÔöÇ¿ÆäÔÚÍøÂçµöÓãÁìÓòµÄְλ ¡£¸Ãƽ̨»¹ÀûÓù«¹²ÊðÀí·þÎñÆ÷ºÍºÏ·¨ SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù £¬Ôö¼Ó¹¥»÷Òþ±ÎÐÔºÍÀÖ³ÉÂÊ ¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÅÓ´óµÄ×·ËæÕßȺÌå £¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÐÔÎüÒýÁË´óÁ¿ÍøÂç·¸×ï·Ö×Ó ¡£¼øÓÚÆäÇ¿´óµÄ¹æ±Ü¼¼ÊõºÍ¹ã·ºµÄÊܺ¦Õßƾ֤»ñÈ¡ÄÜÁ¦ £¬Sniper Dz Ô¤¼Æ½«Á¬ÐøÍƶ¯È«ÇòÍøÂçµöÓã»î¶¯µÄÔö³¤ £¬Òò´Ë £¬Óû§ºÍ×éÖ¯Ðè¸ß¶È¾¯Ìè £¬½ÓÄÉÓÐЧÄþ¾²´ëÊ©ÒÔµÖÓù´ËÀàÐÂÐËÍþв ¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ¼ÙðӦÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜ»õ±Ò


9ÔÂ28ÈÕ £¬Check Point Research (CPR) ×î½ü½Ò¶ÁËÒ»ÖÖÅÓ´óµÄ¼ÓÃÜ»õ±ÒÕ©Æ­ÊֶΠ£¬¸ÃÆ­¾Öͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ЭÒéWalletConnectµÄÐé¼ÙÓ¦ÓÃÔÚGoogle PlayÉÏDZ·üÊýÔ £¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜ»õ±Ò £¬×ÜËðʧ³¬7ÍòÃÀÔª ¡£´Ë¶ñÒâÓ¦ÓÃÀûÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈÎ £¬ºóÕß±¾ÊÇÁ¬½ÓÈ¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜ»õ±ÒÇ®°üµÄÄþ¾²ÇÅÁº ¡£Õ©Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐé¼ÙÆÀÂÛÓÕµ¼Óû§ÏÂÔØ £¬Ò»µ©Óû§ÊµÑéÁ¬½ÓÇ®°üÖÁWeb3Ó¦Óà £¬¼ÙðӦÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðÆÛÕ©½»Ò× £¬ÃØÃÜÏò¹¥»÷Õß¿ØÖƵķþÎñÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢ £¬ÀûÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØתÒÆ×ʽð ¡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²â¼¼Êõ¶ã±ÜÄþ¾²¹¤¾ßÉó²é £¬¶ÔÉóºËÈËԱչʾÎÞº¦ÄÚÈÝ £¬´Ó¶øºã¾ÃDZ·ü ¡£·ÖÎöÏÔʾ £¬±»µÁ×ʽð±é¼°¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂç £¬ÇÒ´ó²¿ÃÅÉÐδ׷»Ø ¡£ÖµµÃ×¢ÒâµÄÊÇ £¬¾¡¹ÜÊܺ¦ÕßÖÚ¶à £¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ £¬·´Ó³³ö¹«ÖÚ¶Ô´ËÀàÕ©Æ­ÊֶεÄÈÏÖª²»×ã £¬ÒÔ¼°Õ©Æ­Õßͨ¹ýÐé¼ÙºÃÆÀÑڸǶñÐеļÆı ¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷ £¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ £¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕý»ý¼«Ó¦¶ÔÒ»ÆðÑÏÖصÄÍøÂç¹¥»÷ʼþ £¬¸Ãʼþµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾ £¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦Ó÷¨Ê½¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐÐ ¡£ÖÜÈý £¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿ÃÅÒªº¦¹¦Ð§µÄÔËÐÐ £¬°üÂÞ°©Ö¢¿ØÖÆÖÐÐÄ¡¢½¡¿µ±£ÏÕ¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖØҪϵͳ ¡£¼¼ÊõÍŶÓѸËÙ½éÈë £¬×·×Ù²¢½Ò¶ÁËÈëÇÖÆóͼ £¬Í¬Ê±ÔÚÕþ¸®Äþ¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤ ¡£Îª·ÀÖ¹¹¥»÷½øÒ»²½À©É¢ÖÁºËÐÄÊý¾Ý¿â £¬ÎÀÉú²¿¹û¶Ï½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏß £¬²¢½ÓÄÉÁËһϵÁмÓÇ¿»ù´¡ÉèÊ©Äþ¾²µÄ´ëÊ© ¡£¾¡¹Üδ͸¶¾ßÌå¹¥»÷ϸ½Ú £¬µ«Æ¾¾ÝÓ¦¶Ô´ëÊ©ÍƲâ £¬´Ë´ÎʼþºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷ ¡£½ØÖÁÄ¿Ç° £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÈ»Ðû³Æ¶Ô´ËÂôÁ¦ ¡£ÎÀÉú²¿Ç¿µ÷ £¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÈ«Ãæ»Ö¸´ £¬²¢ÔÊÐí½«Á¬Ðø¼ÓÇ¿ÍøÂçÄþ¾²·À»¤ £¬ÒÔ±£ÕϹ«¹²ÎÀÉú·þÎñµÄÎȶ¨ÔËÐкͻ¼ÕßÊý¾ÝµÄÄþ¾² ¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìºÏÔƹ¥»÷


9ÔÂ27ÈÕ £¬Î¢Èí·¢³ö¾¯¸æ £¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷Õû¼Æı £¬½«¹¥»÷ÖØÐÄתÏò»ìºÏÔÆ»·¾³ £¬²¢ÆóͼÇÖº¦Êܺ¦ÕßµÄÈ«²¿×ʲú ¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´ £¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿ÃÅ £¬²»Í£½ø»¯ £¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ ¡£½üÆÚ £¬ËûÃÇÌرð»îÔ¾ £¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷ ¡£Storm-0501ÀûÓÃÈõÃÜÂë¡¢ÌØȨÕË»§»òÒÑ֪©¶´£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©Éø͸ÍøÂç £¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒƶ¯ £¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÄþ¾²ÉèÖà ¡£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾¾Ý £¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´Óµ±µØǨÒƵ½ÔÆ¶Ë £¬ÆÆ»µÍ¬²½ÕË»§ £¬½Ù³Ö»á»°ÒÔά³Ö·ÃÎÊȨÏÞ ¡£ËûÃÇ»¹¿ÉÄÜÀûÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂë £¬Èƹý±£»¤ ¡£µÃÊÖºó £¬Storm-0501ÔÚMicrosoft Entra×⻧ÄÚÖ²Èë³Ö¾ÃºóÃÅ £¬Î±×°³ÉºÏ·¨Óû§Éí·Ý £¬×îÖÕÔÚÄÚ²¿²¿ÊðºÍÔÆ»·¾³Öв¿ÊðEmbargoÀÕË÷Èí¼þ £¬»òͨ¹ý¼Æ»®ÈÎÎñÓëGPO¼ÓÃÜÎļþ ¡£ÖµµÃ×¢ÒâµÄÊÇ £¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¢¼´ÊµÊ©ÀÕË÷ £¬ÓÐʱ½ö±£ÁôºóÃÅÒÔ×÷ºóÐøÖ®Óà ¡£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/