΢Èí¾¯¸æºÏ·¨ÎļþÍйܷþÎñ³ÉÍøÂçµöÓãÐÂÇþµÀ
Ðû²¼Ê±¼ä 2024-10-091. ΢Èí¾¯¸æºÏ·¨ÎļþÍйܷþÎñ³ÉÍøÂçµöÓãÐÂÇþµÀ
10ÔÂ8ÈÕ£¬Microsoft Threat Intelligence³ÂËßÖ¸³ö£¬ÀûÓÃSharePoint¡¢OneDriveºÍDropboxµÈºÏ·¨ÎļþÍйܷþÎñÌᳫµÄÉÌÒµµç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂçµöÓã»î¶¯ÕýÔÚÉÏÉý¡£ÕâЩ»î¶¯×Ô2024Äê4ÔÂÖÐÑ®¿ªÊ¼£¬½ÓÄÉÅÓ´ó·ÀÓù¹æ±Ü¼¼ÊõÈƹýÄþ¾²´ëÊ©£¬µ¼ÖÂÉí·ÝµÁÓá¢É豸ʧÇÔ£¬ÉõÖÁÒý·¢´ïÕþÆÛÕ©¡¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒƶ¯¡£ÎļþÍйܷþÎñËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁ˱ãÀû£¬µ«Ò²Òò¹ã·ºÊ¹Óöø³ÉΪ¹¥»÷ÕßµÄÄ¿±ê¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÈÎÕË»§È¨ÏÞ£¬ÀÄÓÃƽ̨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅÀ´Ô´µÄ¶ñÒâÎļþ»òÁ´½Ó£¬±Ü¿ª´«Í³¼ì²â¡£Î¢Èí·¢ÏÖ£¬ÏÞÖÆ·ÃÎʺÍÖ»¶ÁÎļþ¼Æı±»¹ã·ºÓ¦ÓÃÒÔÌÓ±ÜÄþ¾²ÏµÍ³¼ì²â£¬Ê¹Äþ¾²É¨ÃèºÍ·ÖÎö¶ñÒâÁ´½Ó±äµÃÀ§ÄÑ¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÈι©Ó¦ÉÌÕË»§£¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÄ¿±ê×éÖ¯¹²Ïí£¬ÀûÓÃÐÅÈιØϵÈƹýÄþ¾²¹ýÂËÆ÷¡£¹¥»÷Õß»¹»áð³äITÖ§³Ö»ò¹ÜÀíÔ±£¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§´ò¿ªÎļþ¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý£¬¾Í»á±»Öض¨Ïòµ½¶ñÒâÖмäÈËÍøÂçµöÓãÒ³Ã棬ҪÇóÌṩÃÜÂëºÍÍê³É¶àÒòËØÉí·ÝÑéÖ¤£¬¹¥»÷Õß´Ó¶ø²¶×½»á»°ÁîÅƽøÐнøÒ»²½ÀûÓá£
https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/
2. GoldenJackal APT×é֯ͻÆÆÅ·ÖÞÕþ¸®¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ8ÈÕ£¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×éÖ¯ÀûÓÃÁ½Ì××Ô½ç˵¹¤¾ßÀÖ³ÉÉø͸ÁËÅ·ÖÞÕþ¸®µÄ¸ôÀëϵͳ£¬ÇÔÈ¡ÁË°üÂÞµç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý¡£¾ÝESET³ÂËߣ¬¸Ã×éÖ¯ÖÁÉÙÁ½´Îʵʩ´ËÀ๥»÷£¬Ò»´ÎÕë¶ÔÄÏÑǹú¼Òפ°×¶íÂÞ˹´óʹ¹Ý£¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞÕþ¸®×éÖ¯¡£¹¥»÷ʼÓÚѬȾ»¥ÁªÍøÁ¬½Óϵͳ£¬ÀûÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓ㬲¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´ÖƶñÒâ×é¼þ¡£Ëæºó£¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢£¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Êä»ØÔʼ»¥ÁªÍøÁ¬½Óϵͳ£¬×îÖÕ·¢Ë͸ø¹¥»÷ÕßµÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷¡£GoldenHowl×÷Ϊ¶à¹¦Ð§PythonºóÃÅ£¬ÔÚÁ¬½Ó»¥ÁªÍøµÄ»úÆ÷ÉÏÔËÐУ¬ÊµÏÖÎļþÇÔÈ¡¡¢³Ö¾ÃÐÔ±£³Ö¡¢Â©¶´É¨ÃèºÍC2ͨÐÅ¡£
https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/
3. Red BarrelsÔâÖØ´óÍøÂç¹¥»÷£¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì
10ÔÂ4ÈÕ£¬¹ãÊܺÃÆÀµÄ¿Ö²ÀÓÎϷϵÁС¶Outlast¡·µÄÖÆ×÷¹«Ë¾Red BarrelsÐû²¼£¬ÆäÔâÊÜÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬¿ª·¢Ê±¼ä±í±»´òÂÒ¡£¾¡¹Ü¹«Ë¾Î´Í¸Â¶ÈëÇֵľßÌåϸ½Ú£¬µ«ÓÐÏûÏ¢³Æ¹¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Ç¼¼°¹«Ë¾ÐÅÓÿ¨ÏêϸÐÅÏ¢µÈ´óÁ¿ÓмÛÖµµÄÐÅÏ¢¡£Red BarrelsѸËÙ½ÓÄÉÐж¯£¬Æ¸ÇëÍøÂçÄþ¾²×¨¼ÒÊÓ²ìʼþ²¢Í¨ÖªÏà¹ØÀûÒæ·½ºÍÕþ¸®£¬Í¬Ê±½ÓÄÉ´ëÊ©È·±£ÏµÍ³Äþ¾²¡£È»¶ø£¬´Ë´Î¹¥»÷¶ÔÊÂÇéÊÒµÄÔËÓª·¢ÉúÁ˾޴óÓ°Ï죬µ¼ÖÂÖÆ×÷ʱ¼ä±íÊܵ½ÖØ´óÓ°Ï죬²¿ÃÅÏîÄ¿²»µÃ²»ÍƳ١£Õâ¶ÔÆÚ´ý¡¶ÌÓÉúÊÔÁ¶¡·Ðû²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö¹¥»÷¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂçÄþ¾²µÄÔÊÐí£¬²¢ÌåÏÖ½«¼ÌÐøʵʩ×î¼Ñʵ¼ù´ëÊ©£¬È·±£ÎªÔ±¹¤ÌṩÄþ¾²»·¾³¡£¾Ý±¨µÀ£¬ÊÓ²ìÒÑÍê³É£¬Ê¼þÒѵõ½¿ØÖÆ£¬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»áÁ¬ÐøÒ»¶Îʱ¼ä¡£
https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/
4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank£¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì
10ÔÂ6ÈÕ£¬¿µ¿¨Ë¹ÌØÓÐÏßͨÐŹ«Ë¾ (Comcast) ºÍ Truist Bank ½üÈÕÅû¶£¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶Ê¼þµÄÓ°Ï죬ÕýÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹£¬½ñÄê4ÔÂͨ±¨ÁËÒ»Æð·¢ÉúÔÚ2ÔÂÖÁ2ÔÂÆÚ¼äµÄÊý¾Ýй¶Ê¼þ£¬ÍþвÐÐΪÕßÈëÇÖÆäÍøÂç²¢ÇÔÈ¡ÁË´óÁ¿¸öÈËÐÅÏ¢£¬°üÂÞÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝʻִÕÕºÅÂë»òÉí·ÝÖ¤µÈ¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË£¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË¡£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò»£¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ï죬¶øTruistµÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδÐû²¼¡£FBCSµÄ²ÆÕþ×´¿ö¶ñ»¯£¬ÊÜʼþ¼ä½ÓÓ°ÏìµÄʵÌåÐè×ÔÐнøÐÐ֪ͨºÍµ÷Í£·¨Ê½¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤·þÎñ¡£È¥Äê6Ô£¬Truist BankÒ²Ôø֤ʵһÆ𵥶ÀµÄÎ¥¹æÐÐΪ£¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/
5. »·ÇòÒôÀÖ¼¯ÍÅ680Ãû¸öÈËÐÅÏ¢Ôâй¶£¬Ìṩ24¸öÔÂÐÅÓüà¿Ø·þÎñ
10ÔÂ7ÈÕ£¬»·ÇòÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâÓöÁËÊý¾Ýй¶Ê¼þ£¬µ¼ÖÂ680Ãû¸öÈ˵ÄÃô¸ÐÐÅÏ¢£¬°üÂÞÉç»áÄþ¾²ºÅÂëµÈ£¬±»·Ç·¨»ñÈ¡¡£¸ÃʼþÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢ÏÖ¡£¾ÝϤ£¬»·ÇòÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿Ó¦Ó÷¨Ê½Öмà²âµ½Î´¾ÊÚȨµÄ»î¶¯£¬Ëæ¼´Æô¶¯½ô¼±ÏìÓ¦»úÖÆ£¬Æ¸ÇëµÚÈý·½×¨¼ÒÕ¹¿ªÈ«ÃæÊÓ²ìÓëµ÷Í£´ëÊ©¡£¾¹ýһϵÁÐÉó²é£¬¹«Ë¾È·ÈϸöÈËÐÅÏ¢Òѱ»Î´¾ÊÚȨµÄµÚÈý·½»ñÈ¡£¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²é½á¹ûºó£¬ÒÀ¾ÝÖ´·¨ÒªÇó£¬ÏòÊÜÓ°ÏìµÄ¸öÈË·¢³öÁËÊý¾Ýй¶֪ͨ¡£ÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼°£¬Ð¹Â¶ÐÅÏ¢°üÂÞÐÕÃû¼°Éç»áÄþ¾²ºÅÂëµÈ¡£Ä¿Ç°£¬»·ÇòÒôÀÖ¼¯ÍÅÉÐδ·¢ÏÖÊý¾Ý±»µÁÓõÄÇé¿ö£¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸öÌåµÄ²ÆÕþÄþ¾²£¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£ÖÁÓÚ´Ë´ÎÄþ¾²Â©¶´µÄ¾ßÌå¼¼Êõϸ½Ú£¬»·ÇòÒôÀÖ¼¯ÍÅδÓè͸¶£¬Í¬Ê±£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§±£³Ö¸ß¶È¾¯Ì裬ÃÜÇйØ×¢ÈκÎÒì³£½ðÈڻ¼£Ïó¡£
https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html
6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜ»õ±ÒÆ×Ó¶ÌÔÝÈëÇÖ£¬Íƹã¼ÙÀָߴú±Ò
10ÔÂ7ÈÕ£¬ÀÖ¸ßÍøÕ¾ÔâÓöÁ˼ÓÃÜ»õ±ÒÆ×ӵĶÌÔÝÈëÇÖ¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ùÌ滻ΪÐû´«¼ÙÀָߴú±ÒµÄͼƬ£¬Éù³Æ¿ÉÓÃÒÔÌ«·»¹ºÖò¢½âËøÃØÃܽ±Àø¡£´Ë´ÎÈëÇÖ·¢ÉúÔÚÃÀ¹ú¶«²¿Ê±¼ä10ÔÂ5ÈÕÍíÉÏ9µã£¬Á¬ÐøÔ¼75·ÖÖÓ£¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å»Ö¸´¡£Óë³£¼ûµÄ¼ÓÃÜ»õ±ÒƾֲîÒ죬¸Ãƾֲ¢Î´Òýµ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú£¬¶øÊǽ«·ÃÎÊÕß´øµ½Uniswapƽ̨¹ºÖÃƾִú±Ò¡£ÀÖ¸ß֤ʵÁË´Ë´Îʼþ£¬µ«Î´Í¸Â¶ÈëÇÖϸ½Ú£¬ÌåÏÖûÓÐÓû§ÕË»§±»µÁ£¬¿Í»§¿ÉÕý³£¹ºÎ²¢ÒѽÓÄÉ´ëÊ©·ÀÖ¹Ôٴη¢Éú¡£´Ë´Î¹¥»÷×ÜÌåʧ°Ü£¬½öÉÙÊýÈ˹ºÖÃÁËÀָߴú±Ò¡£ÁîÈ˾ªÑȵÄÊÇ£¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜƾ֣¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½Ê½¡£Í¨³££¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript£¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý£¬ÓÃÓÚÀÕË÷¡¢³öÊÛ»òÔÚÏßÆÛÕ©¡£
https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/