KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷

Ðû²¼Ê±¼ä 2023-10-26
1¡¢KasperskyÅû¶Õë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷


KasperskyÔÚ10ÔÂ24ÈÕÅû¶ÁËÕë¶Ô¶íÂÞ˹¹¤¿ØÐÐÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ6ÔÂÊ״μì²âµ½¸Ã»î¶¯£¬£¬£¬£¬£¬¶øÔÚ8ÔÂÖÐÑ®·¢Ã÷ÁËа汾µÄºóÃÅ£¬£¬£¬£¬£¬¸ÃºóÞßÓиüÖØ´óµÄÈÆ¹ý¹¦Ð§£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÕýÔÚ¾ÙÐÐÓÅ»¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö°üÀ¨¶ñÒâARJÎļþµÄÓʼþ£¬£¬£¬£¬£¬ÆäÖÐÓÐÒ»¸öÓÕ¶üPDFÎĵµºÍÒ»¸öNSIS¾ç±¾£¬£¬£¬£¬£¬¸Ã¾ç±¾ÓÃÓÚ»ñÈ¡Ö÷Òªpayload²¢Æô¶¯Ëü¡£¡£¡£¡£¡£Kaspersky³Æ£¬£¬£¬£¬£¬Í³Ò»´¹Âڻ»¹Èö²¥ÁËÁ½¸öÃûΪNetrunnerºÍDmcservµÄºóÃÅ£¬£¬£¬£¬£¬ÕâЩÊǾßÓвî±ðC2ЧÀÍÆ÷ÉèÖõÄÏàͬ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£


https://securelist.ru/ataki-na-industrialnyj-i-gosudarstvennyj-sektory-rf/108229/


2¡¢·¨¹úÖ°ÒµÇò¶ÓASVELÔâµ½NoEscape¹¥»÷32GBÊý¾Ýй¶


¾ÝýÌå10ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬·¨¹úÖ°ÒµÀºÇò¶ÓLDLC ASVEL(ASVEL)Ôâµ½ÁËÀÕË÷ÍÅ»ïNoEscapeµÄ¹¥»÷¡£¡£¡£¡£¡£NoEscapeÔÚ10ÔÂ9ÈÕ½«¸ÃÇò¶Ó¼ÓÈëÆäÍøÕ¾£¬£¬£¬£¬£¬LDLC ASVELÓÚ10ÔÂ12ÈÕͨ¹ýýÌåÊÕµ½Í¨Öª¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁË32GBÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÇòÔ±µÄСÎÒ˽¼Ò×ÊÁÏ¡¢»¤ÕÕºÍÉí·ÝÖ¤£¬£¬£¬£¬£¬Óë²ÆÎñ¡¢Ë°ÎñºÍÖ´·¨ÊÂÎñÏà¹ØµÄÎļþ£¬£¬£¬£¬£¬ÒÔ¼°±£ÃÜЭÒé¡¢ÌõÔ¼ºÍÉñÃØÐżþµÈ¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïÍþвÈôÊDz»½»Êê½ð£¬£¬£¬£¬£¬¾Í»áÔÚ10ÔÂ20ÈÕ֮ǰÐû²¼ÕâЩÊý¾Ý¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ASVELÒѱ»´ÓNoEscapeµÄÍøÕ¾É¾³ý£¬£¬£¬£¬£¬Åú×¢¶þÕß¿ÉÄÜÕýÔÚ¾ÙÐÐ̸ÅС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/asvel-basketball-team-confirms-data-breach-after-ransomware-attack/


3¡¢Redcliffe LabsµÄ7TBÊý¾Ýй¶ӰÏìÔ¼1200Íò»¼Õß


ýÌå10ÔÂ25Èճƣ¬£¬£¬£¬£¬Ó¡¶È±±·½°îŵÒÁ´ïµÄÒ½Áƹ«Ë¾Redcliffe LabsµÄ7TBÒ½ÁÆÊý¾Ýй¶£¬£¬£¬£¬£¬Ó°ÏìÁËÔ¼1200Íò»¼Õß¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö²»ÊÜÃÜÂë± £»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬×ܾÞϸΪ7TB£¬£¬£¬£¬£¬°üÀ¨Ô¼12347297Ìõ¼Í¼£¬£¬£¬£¬£¬¾­ÊÓ²ìÕâЩÊý¾Ý¼¯ÊôÓÚRedcliffe Labs¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬³ýÁËÓдó×Ú»¼ÕßСÎÒ˽¼ÒºÍÒ½ÁÆÊý¾ÝÖ®Í⣬£¬£¬£¬£¬»¹°üÀ¨¸Ã¹«Ë¾Òƶ¯Ó¦ÓóÌÐòµÄ¿ª·¢Îļþ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÒѱ»± £»£»£»¤ÆðÀ´£¬£¬£¬£¬£¬Éв»ÇåÎú¹ûÕæÁ˶à¾Ã¡£¡£¡£¡£¡£


https://www.hackread.com/database-mess-up-7tb-healthcare-data-leak/


4¡¢ÎÚ¿ËÀ¼NCS§³§³³ÆSmokeloader¶ñÒâÈí¼þ¹¥»î¶¯¼¤Ôö 


10ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÇ徲Эµ÷ÖÐÐÄ(NCS§³§³)³Æ£¬£¬£¬£¬£¬Ê¹ÓöñÒâÈí¼þSmokeloaderµÄ¹¥»÷»î¶¯¼¤Ôö¡£¡£¡£¡£¡£NCS§³§³Ñо¿ÏÔʾ£¬£¬£¬£¬£¬×Ô5ÔÂÒÔÀ´£¬£¬£¬£¬£¬¶ñÒâÈí¼þÔËÓªÍÅ»ïÕë¶ÔÎÚ¿ËÀ¼µÄʵÌåÌᳫÁË´ó¹æÄ£´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬Ö¼ÔÚÈëÇÖϵͳ²¢ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£ÔÚ×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃSmokeloader¹¥»÷Õþ¸®»ú¹¹ºÍ½ðÈÚʵÌ壬£¬£¬£¬£¬ÌØÊâÊÇ»á¼ÆÐÐÒµ¡£¡£¡£¡£¡£ËûÃÇͨ¹ý½ðÈÚÖ÷ÌâµÄ´¹ÂÚÓʼþÀ´ÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬È»ºóÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷Õß»¹»áÆÆËð»ã¿îÁ÷³Ì£¬£¬£¬£¬£¬Í¨¹ýÌæ»»Õýµ±ÕÊ»§µÄÏêϸÐÅÏ¢À´½«×ʽðÖØ¶¨Ïòµ½×Ô¼ºµÄÕÊ»§£¬£¬£¬£¬£¬ÕâÍ»ÏÔÁ˹¥»÷Õßһֱת±äµÄÕ½ÂÔ¡£¡£¡£¡£¡£


https://therecord.media/surge-in-smokeloader-malware-attacks-targeting-ukrainian-financial-gov-orgs


5¡¢Salt Security¹ûÕæ¹ØÓÚOAuthЭÒéʵÏÖAPIµÄÎó²î


10ÔÂ24ÈÕ£¬£¬£¬£¬£¬Salt SecurityÐû²¼ÁËеÄÑо¿£¬£¬£¬£¬£¬Õ¹ÏÖÁËGrammarly¡¢VidioºÍBukalapakµÈÔÚÏ߯½Ì¨µÄOAuthЭÒéʵÏÖÖÐAPIµÄÎó²î¡£¡£¡£¡£¡£ÕâЩÎó²îÓпÉÄÜй¶Óû§Æ¾Ö¤²¢µ¼ÖÂÕÊ»§±»ÍêÈ«½ÓÊÜ£¬£¬£¬£¬£¬´Ó¶øÓ°ÏìÊýÊ®ÒÚÓû§£¬£¬£¬£¬£¬ÏÖÒÑ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¸ÃÑо¿ÖÐ×îÍ»³öµÄÒ»µãÊÇ£¬£¬£¬£¬£¬OAuth×÷Ϊsocial-login±³ºóµÄÖ÷ÒªÊÖÒÕ£¬£¬£¬£¬£¬×Åʵ±»Éè¼ÆµÃºÜºÃ£¬£¬£¬£¬£¬Ã»ÓÐÏÔ×ÅÎÊÌâ¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼ÎÊÌâ¶¼ÓëʹÓÃOAuthµÄ¸÷·½ÓÃÀ´ÊµÏÖOAuthµÄ·½·¨ÓйØ¡£¡£¡£¡£¡£


https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts


6¡¢NCC GroupÐû²¼2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


10ÔÂ24ÈÕ£¬£¬£¬£¬£¬NCC GroupÐû²¼ÁË2023Äê9Ô·ÝÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¼Ì8Ô·ݵÄÏà¶ÔÇå¾²ºó£¬£¬£¬£¬£¬9Ô·ݵÄÀÕË÷»î¶¯µÖ´ïÁËØ¨¹ÅδÓеÄˮƽ£¬£¬£¬£¬£¬¶à´ï514¸öÄ¿µÄÔâµ½¹¥»÷£¬£¬£¬£¬£¬½Ï2022Äêͬ±ÈÔöÌí153%¡£¡£¡£¡£¡£Ö÷ÒªµÄ¹¥»÷ÍÅ»ïÊÇLockBit 3.0£¨Ìᳫ79´Î¹¥»÷£©¡¢LostTrust£¨53´Î£©ºÍBlackCat£¨47´Î£©¡£¡£¡£¡£¡£±±ÃÀµØÇøÔâµ½µÄ¹¥»÷×î¶à£¨Õ¼50%£©£¬£¬£¬£¬£¬Æä´ÎÊÇÅ·ÖÞ£¨30%£©ºÍÑÇÖÞ£¨9%£©¡£¡£¡£¡£¡£Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÀÕË÷¹¥»÷´ó·ùÔöÌí£¬£¬£¬£¬£¬½Ï8Ô»·±ÈÔöÌí86%¡£¡£¡£¡£¡£


https://newsroom.nccgroup.com/news/ncc-group-monthly-threat-pulse-september-2023-474190