Ó¢¹ú¾üÊÂÊý¾Ýй¶ÌáÐѹú·À²¿·Ö±£´æµÚÈý·½Î£º¦
Ðû²¼Ê±¼ä 2024-05-105ÔÂ9ÈÕ£¬£¬£¬£¬´Ë´Îй¶ÊÂÎñ̻¶ÁËÁè¼Ý 225,000 ÃûÓ¢¹ú¾üÊÂÖ°Ô±µÄÊý¾Ý£¬£¬£¬£¬Í¹ÏÔÁËÓë¹ú·ÀʵÌåÍⲿ³Ð°üÉÌÏà¹ØµÄÈ«ÇòÇ徲Σº¦¡£¡£¡£´Ë´ÎÆØ¹âÓÚ±¾ÖÜÆØ¹â£¬£¬£¬£¬Ô´ÓÚÒ»ÃûÍþвÐÐΪÕß´ÓÒ»¼Ò¹«Ë¾»ñÈ¡ÁËÓ¢¹ú½¾ü¡¢Ë®Ê¦ºÍ»Ê¼Ò¿Õ¾üÏÖÈΡ¢Ç°ÈκÍ×¼±¸ÒÛ³ÉÔ±µÄÐÕÃû¡¢ÒøÐÐÕË»§ÏêϸÐÅÏ¢ºÍÆäËûÐÅϢΪӢ¹ú¹ú·À²¿ (MoD) ´¦Öóͷ£Ð½×ÊЧÀÍ¡£¡£¡£BBCºÍÆäËûÓ¢¹úýÌåÈ·ÈÏÍⲿ³Ð°üÉÌΪ Shared Services Connected Ltd£¬£¬£¬£¬²¢ÌåÏÖ±»ÈëÇÖµÄн×Êϵͳ°üÀ¨¶àÄêǰµÄ¾üÊÂÖ°Ô±ÐÅÏ¢¡£¡£¡£Ó¢¹ú¹ú·À´ó³¼¸ñÀ¼ÌØ¡¤É³ÆÕ˹ÔÚÏòÒé¾Û»áÔ±½ÒÏþµÄ̸ÂÛÖÐÖ¸³ö£¬£¬£¬£¬Õâ´ÎÏ®»÷ÊÇ¡°¶ñÒâÐÐΪÕß¡±ËùΪ£¬£¬£¬£¬ºÜ¿ÉÄÜ»ñµÃÁËÃñ×å¹ú¼ÒµÄÖ§³Ö¡£¡£¡£Ö»¹ÜһЩ¸ß¼¶Õþ¸®¹ÙÔ±Ö¸³öÖйúÊÇ×îÓпÉÄܵÄÏÓÒÉÈË£¬£¬£¬£¬µ«É³ÆÕ˹×Ô¼º²¢Ã»Óн«Õâ´ÎÏ®»÷¹é×ïÓÚÈκÎÈ˵ÄÃû×Ö¡£¡£¡£´ËÀàÎ¥¹æÐÐΪ͹ÏÔÁËÍⲿ³Ð°üÉÌÏòÏëÒªÕë¶Ô¾üʺ͹ú·ÀÊý¾ÝºÍϵͳµÄ¹¥»÷ÕßÌá³öµÄųÈõÈõµã¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/breach-of-uk-military-personnel-data-a-reminder-of-third-party-risk-in-defense-sector
2. LOCKBIT ÍÅ»ïÉù³Æ¶ÔÍþÆæÍÐÊÐÏ®»÷ÊÂÎñÈÏÕæ
5ÔÂ8ÈÕ£¬£¬£¬£¬LockBit ÀÕË÷Èí¼þ×éÖ¯Òѽ«ÍþÆæÍÐÊÐÌí¼Óµ½Æä Tor й¶վµã£¬£¬£¬£¬²¢ÍþвҪÐû²¼±»µÁÊý¾Ý¡£¡£¡£ÍþÆæÍÐÊÇÃÀ¹ú¿°ÈøË¹ÖÝÉú³Ý×î¶àµÄ¶¼»á£¬£¬£¬£¬Ò²ÊÇÈûÆæÍþ¿ËÏØµÄÏØ³Ç¡£¡£¡£×èÖ¹2020ÄêÉú³ÝÆÕ²é£¬£¬£¬£¬¸ÃÊÐÉú³ÝΪ397,532ÈË¡£¡£¡£Çå¾²Îó²î±¬·¢ÓÚ 2024 Äê 5 Ô 5 ÈÕ£¬£¬£¬£¬ÊÐÕþ¸®Á¬Ã¦Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬£¬£¬£¬ÒÔ±ÜÃâÍþвÉìÕÅ¡£¡£¡£¸ÃÊÐÕýÔÚµÚÈý·½Ç徲ר¼ÒÒÔ¼°Áª°îºÍµØ·½Ö´·¨»ú¹¹µÄ×ÊÖúÏÂÊӲ첢×èÖ¹ÕâÒ»ÊÂÎñ¡£¡£¡£¡°³öÓÚ²Ù×÷Çå¾²µÄÄ¿µÄ£¬£¬£¬£¬Õâ¸ö[Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæµÄ×éÖ¯µÄÃû³Æ²»»á±»¹²Ïí¡£¡£¡£¡±±¨¸æÖ¸³ö¡£¡£¡£È»¶ø£¬£¬£¬£¬LockBit ÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶ÔÍþÆæÍÐÊеÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£Ö§¸¶Êê½ðµÄ×èÖ¹ÈÕÆÚÊÇ 2024 Äê 5 Ô 15 ÈÕ¡£¡£¡£
https://securityaffairs.com/162910/cyber-crime/city-of-wichita-lockbit-ransomware.html
3. ´ÓÀ¬»øÓʼþµ½ AsyncRAT£¬£¬£¬£¬¸ú×Ù·ÇPEÍøÂçÍþвµÄ¼¤Ôö
5ÔÂ8ÈÕ£¬£¬£¬£¬AsyncRAT£¬£¬£¬£¬Ò²³ÆÎª¡°Òì²½Ô¶³Ì»á¼ûľÂí¡±£¬£¬£¬£¬ÊÇÒ»Öָ߶ÈÖØ´óµÄ¶ñÒâÈí¼þ±äÌ壬£¬£¬£¬¾ÓÉÈ«ÐÄÉè¼Æ£¬£¬£¬£¬Ö¼ÔÚÆÆËðÅÌËã»úϵͳÇå¾²²¢ÇÔÈ¡ÉñÃØÊý¾Ý¡£¡£¡£Âõ¿Ë·ÆÊµÑéÊÒ×î½ü·¢Ã÷ÁËÒ»ÖÖÐÂÐÍѬȾÁ´£¬£¬£¬£¬Õ¹ÏÖÁËÆäǿʢµÄɱÉËÁ¦¼°Æä½ÓÄɵÄÖÖÖÖÇå¾²ÅÔ·»úÖÆ¡£¡£¡£ËüʹÓöàÖÖÎļþÀàÐÍ£¬£¬£¬£¬ÀýÈç PowerShell¡¢Windows ¾ç±¾Îļþ (WSF)¡¢VBScript (VBS) ÒÔ¼°¶ñÒâ HTML ÎļþÖÐµÄÆäËûÎļþÀàÐÍ¡£¡£¡£ÕâÖÖ¶à·½ÃæµÄÒªÁìÖ¼ÔÚ¹æ±Ü·À²¡¶¾¼ì²âÒªÁì²¢Ôö½øÑ¬È¾µÄÈö²¥¡£¡£¡£Ñ¬È¾ÊÇͨ¹ý°üÀ¨ HTML Ò³Ãæ¸½¼þµÄÀ¬»øÓʼþÆô¶¯µÄ¡£¡£¡£ÔÚÎÞÒâÖз¿ª HTML Ò³ÃæÊ±£¬£¬£¬£¬»á×Ô¶¯ÏÂÔØ Windows ¾ç±¾Îļþ (WSF)¡£¡£¡£¸Ã WSF ÎļþµÄÃüÃû·½·¨¾ÓÐÄÌåÏÖ¶©µ¥ ID£¬£¬£¬£¬´Ó¶øÓªÔìÕýµ±ÐԵļÙÏó²¢ÓÕʹÓû§Ö´ÐÐËü¡£¡£¡£Ö´ÐÐ WSF Îļþºó£¬£¬£¬£¬Ñ¬È¾»á×Ô¶¯¾ÙÐУ¬£¬£¬£¬ÎÞÐè½øÒ»²½µÄÓû§¸ÉÔ¤¡£¡£¡£Ñ¬È¾Á´µÄºóÐø½×¶Î°üÀ¨ Visual Basic ¾ç±¾ (VBS)¡¢JavaScript (JS)¡¢Åú´¦Öóͷ£ (BAT)¡¢Îı¾ (TXT) ºÍ PowerShell (PS1) ÎļþµÄ°²ÅÅ¡£¡£¡£×îÖÕ£¬£¬£¬£¬¸ÃÁ´×îÖÕµ¼ÖÂÕë¶Ô aspnet_compiler.exe µÄÀú³Ì×¢Èë¡£¡£¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats/
4. еÄÓÄÁéʽ̽·Õß¹¥»÷Õë¶ÔÓ¢ÌØ¶û CPU
5ÔÂ8ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖÕë¶Ô¸ßÐÔÄÜÓ¢ÌØ¶û CPU µÄÐÂÓ±¹¥»÷ÒªÁ죬£¬£¬£¬¿ÉʹÓÃÕâЩҪÁì¶Ô¸ß¼¶¼ÓÃܱê×¼ (AES) Ëã·¨ÌᳫÃÜÔ¿»Ö¸´¹¥»÷¡£¡£¡£ÕâЩÊÖÒÕ±»À´×Ô¼ÓÖÝ´óѧʥµØÑǸç·ÖУ¡¢ÆÕ¶É´óѧ¡¢±±¿¨ÂÞÀ´ÄÉ´óѧ½ÌÌÃɽ·ÖУ¡¢×ôÖÎÑÇÀí¹¤Ñ§ÔººÍ¹È¸èµÄÒ»×éѧÕßͳ³ÆÎªÌ½Â·Õß¡£¡£¡£Spectre ÊÇÒ»Àà²àͨµÀ¹¥»÷µÄÃû³Æ£¬£¬£¬£¬ÕâЩ¹¥»÷ʹÓÃÏÖ´ú CPU ÉϵķÖÖ§Õ¹ÍûºÍÍÆ²âÖ´ÐÐÀ´¶ÁÈ¡ÄÚ´æÖеÄÌØÈ¨Êý¾Ý£¬£¬£¬£¬´Ó¶øÈƹýÓ¦ÓóÌÐòÖ®¼äµÄ¸ôÀë±£»£»£»£»¤¡£¡£¡£×îÐµĹ¥»÷ÒªÁìÕë¶ÔµÄÊÇ·ÖÖ§Õ¹ÍûÆ÷ÖгÆÎªÂ·¾¶ÀúÊ·¼Ä´æÆ÷ ( PHR ) µÄ¹¦Ð§£¨¸Ã¹¦Ð§±£´æ×îºó½ÓÄɵķÖÖ§µÄ¼Í¼£©£¬£¬£¬£¬ÒÔÓÕ·¢·ÖÖ§¹ýʧչÍû²¢µ¼ÖÂÊܺ¦Õß³ÌÐòÖ´ÐзÇÔ¤ÆÚµÄ´úÂë·¾¶£¬£¬£¬£¬´Ó¶øÎÞÒâÖÐ̻¶ÆäÉñÃØÊý¾Ý¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬ËüÒýÈëÁËеÄÔÓ£¬£¬£¬¿ÉÒÔʹÓà PHR ÒÔ¼°Ìõ¼þ·ÖÖ§Õ¹ÍûÆ÷ (CBR) ÄÚµÄÕ¹ÍûÀúÊ·±í (PHT)£¬£¬£¬£¬ÒÔ×ß©ÀúÊ·Ö´ÐÐÊý¾Ý²¢×îÖÕ´¥·¢ Spectre ʽÎó²î¡£¡£¡£ÔÚÑо¿ÖиÅÊöµÄÒ»×éÑÝʾÖУ¬£¬£¬£¬ÎÒÃÇ·¢Ã÷¸ÃÒªÁì¿ÉÒÔÓÐÓõØÌáÈ¡ÉñÃØ AES ¼ÓÃÜÃÜÔ¿ÒÔ¼°ÔÚÆÕ±éʹÓÃµÄ libjpeg ͼÏñ¿â´¦Öóͷ£Àú³ÌÖÐй¶ÉñÃØÍ¼Ïñ¡£¡£¡£
https://thehackernews.com/2024/05/new-spectre-style-pathfinder-attack.html
5. ¡¶×îÖÕÀíÏë¡·ÓÎϷЧÀÍÆ÷ÔâÊܶà´Î DDoS ¹¥»÷
5ÔÂ8ÈÕ£¬£¬£¬£¬ÓÉÓÚһϵÁÐÒ»Á¬µÄ DDoS ¹¥»÷£¬£¬£¬£¬´ó×ÚÀ¬»øÁ÷Á¿ÑÍûÁËÈÈÃÅÊÓÆµÓÎϷϵÁС¶×îÖÕÀíÏë¡·µÄЧÀÍÆ÷£¬£¬£¬£¬±¾ÖÜÍæ¼ÒµÇ¼ʱÓöµ½ÁËÎÊÌâ¡£¡£¡£¡¶×îÖÕÀíÏë 14¡·µÄÊ״ι¥»÷´ÓÖÜÒ»×îÏÈ£¬£¬£¬£¬Ò»Á¬ÁËÁè¼Ý 24 Сʱ£¬£¬£¬£¬Ó°ÏìÁËÌìϸ÷µØµÄÍæ¼Ò¡£¡£¡£Æäʱ£¬£¬£¬£¬¸ÃÓÎÏ·µÄ¿¯ÐÐÉÌ¡¢ÈÕ±¾Ê·¿ËÍþ¶û°¬Äá¿Ë˹¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ÕýÔÚ¡°ÊÓ²ì´Ë´Î¹¥»÷²¢½ÓÄɶԲߡ±¡£¡£¡£È»¶ø£¬£¬£¬£¬ÖܶþµÄ¹¥»÷Ôٴα¬·¢£¬£¬£¬£¬ÖÜÈýÈÔÔÚÒ»Á¬£¬£¬£¬£¬µ¼ÖÂÍæ¼ÒµÇ¼ÄÑÌ⣬£¬£¬£¬²¿·ÖÅ·ÖÞ¡¢±±ÃÀºÍ´óÑóÖÞµÄÊý¾ÝÖÐÐÄÎÞ·¨»á¼û¡£¡£¡£Square Enix ÉÐ佫´Ë´Î¹¥»÷¹é×ïÓÚÈκκڿÍ×éÖ¯¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£º¡°Ëæ×ÅÇéÐεÄÉú³¤£¬£¬£¬£¬½«Ìṩ¸ü¶àÐÅÏ¢¡£¡£¡£¡±µ±ÓÎϷЧÀÍÆ÷·ºÆðÅþÁ¬ÎÊÌâ»ò×ÌÈÅʱ£¬£¬£¬£¬Í¨³£»£»£»£»á·ºÆð90002 ¹ýʧ¡£¡£¡£
https://therecord.media/final-fantasy-game-ddos-incident-square-enix
6. ºÚ¿ÍÀÄÓÃGoogleËÑË÷¹ã¸æÈö²¥MSI´ò°üµÄ¶ñÒâÈí¼þ
5ÔÂ8ÈÕ£¬£¬£¬£¬ÈËÃÇ·¢Ã÷ºÚ¿ÍʹÓÃGoogle ËÑË÷¹ã¸æÍ¨¹ý MSI£¨Î¢Èí×°ÖóÌÐò£©°üÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¸Ã»î¶¯Éæ¼°ÃûΪ FakeBat µÄ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐò£¬£¬£¬£¬Í¨¹ýαװ³ÉÕýµ±Èí¼þÏÂÔØÀ´Ãé×¼ºÁÎÞ½äÐĵÄÓû§¡£¡£¡£¹¥»÷´Ó¿´ËÆÕýµ±µÄ¹È¸èËÑË÷¹ã¸æ×îÏÈ£¬£¬£¬£¬Ê¹ÓÃÁË Notion µÈÊ¢ÐÐÈí¼þµÄÕæÊµÍøÕ¾µØµã¡£¡£¡£È»¶ø£¬£¬£¬£¬ÕâÔò¹ã¸æÖ»ÊÇÒ»¸ö»Ï×Ó£¬£¬£¬£¬ÊÇÓÉһֱʹÓÃÓë¹þÈø¿Ë˹̹Ïà¹ØµÄÉí·ÝµÄÍþвÐÐΪÕß¹ºÖõġ£¡£¡£¾ÝThreatDown±¨µÀ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓà Google ËÑË÷¹ã¸æÀ´Èö²¥´øÓÐ MSI µÄ¶ñÒâÈí¼þ¡£¡£¡£µã»÷¹ã¸æ»á½øÈëÒ»¸öÒÔÓÕÆÐÔ URL ÍйܵÄÍøÂç´¹ÂÚÍøÕ¾£¬£¬£¬£¬ÓëÕæÊµÍøÕ¾ÀàËÆ¡£¡£¡£¸ÃÍøÕ¾ÌáÐÑÓû§ÏÂÔØMSIX ÃûÌõıê×¼Èí¼þ×°ÖóÌÐò£¬£¬£¬£¬²¢ÒÔ¿´ËÆ¿ÉÐŵÄÃû³Æ¡°Forth View Designs Ltd¡±ÊðÃû¡£¡£¡£¸Ã»î¶¯Ê¹Óõã»÷¸ú×ÙЧÀÍÀ´ÖÎÀí¹ã¸æµÄÓÐÓÃÐÔ²¢¹ýÂ˵ô²»ÐèÒªµÄÁ÷Á¿¡£¡£¡£
https://gbhackers.com/abuse-google-search-ads/#google_vignette


¾©¹«Íø°²±¸11010802024551ºÅ