´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ£¬£¬£¬£¬ £¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½£¬£¬£¬£¬ £¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£¡£¡£¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®Ð§ÀÍÆ÷£¬£¬£¬£¬ £¬ÊÔͼ¼ÓÃÜÎļþ£¬£¬£¬£¬ £¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦£¬£¬£¬£¬ £¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥£¬£¬£¬£¬ £¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢£¬£¬£¬£¬ £¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£¡£¡£¡£Ö»¹ÜÄÚ²¿Ð§ÀÍÊܵ½Ò»¶¨ÏÞÖÆ£¬£¬£¬£¬ £¬µ«Òªº¦ÍⲿЧÀÍÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ£¬£¬£¬£¬ £¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó£¬£¬£¬£¬ £¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß¡£¡£¡£¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇ󣬣¬£¬£¬ £¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣¡£¡£¡£¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬ £¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨£¬£¬£¬£¬ £¬µ«½«½ß¾¡È«Á¦ïÔÌ­¶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£¡£¡£¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ £¬Èö²¥³ðÊÓÑÔÂÛ


9ÔÂ26ÈÕ£¬£¬£¬£¬ £¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-FiЧÀ͵ÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾£¬£¬£¬£¬ £¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã£¬£¬£¬£¬ £¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£¡£¡£¡£Wi-FiЧÀÍÒÑÔÝÍ££¬£¬£¬£¬ £¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬ £¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ£¬£¬£¬£¬ £¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª£¬£¬£¬£¬ £¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£¡£¡£¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ£¬£¬£¬£¬ £¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬ £¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ£¬£¬£¬£¬ £¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ£¬£¬£¬£¬ £¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²Ð§ÀÍÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶£¬£¬£¬£¬ £¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£¡£¡£¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸°£¬£¬£¬£¬ £¬Ö¼ÔÚ¾¡¿ì»Ö¸´Ð§ÀͲ¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв£¬£¬£¬£¬ £¬Äê´´14Íò´¹ÂÚÍøÕ¾


9ÔÂ26ÈÕ£¬£¬£¬£¬ £¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬£¬£¬ £¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨É裬£¬£¬£¬ £¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£¡£¡£¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏßЧÀÍ×÷Ϊ¹¥»÷Ä¿µÄ£¬£¬£¬£¬ £¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å£¬£¬£¬£¬ £¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬ £¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓÐЧÀÍÆ÷ÉÏ¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ£¬£¬£¬£¬ £¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ£¬£¬£¬£¬ £¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ£¬£¬£¬£¬ £¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý£¬£¬£¬£¬ £¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£¡£¡£¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀíЧÀÍÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù£¬£¬£¬£¬ £¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£¡£¡£¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌ壬£¬£¬£¬ £¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦£¬£¬£¬£¬ £¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂڻµÄÔöÌí£¬£¬£¬£¬ £¬Òò´Ë£¬£¬£¬£¬ £¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ£¬£¬£¬£¬ £¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£¡£¡£¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


9ÔÂ28ÈÕ£¬£¬£¬£¬ £¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©Æ­ÊֶΣ¬£¬£¬£¬ £¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ЭÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ£¬£¬£¬£¬ £¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò£¬£¬£¬£¬ £¬×ÜËðʧ³¬7ÍòÃÀÔª¡£¡£¡£¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈΣ¬£¬£¬£¬ £¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£¡£¡£¡£Õ©Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ£¬£¬£¬£¬ £¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Ó㬣¬£¬£¬ £¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðڲƭÉúÒ⣬£¬£¬£¬ £¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢£¬£¬£¬£¬ £¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣡£¡£¡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é£¬£¬£¬£¬ £¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ£¬£¬£¬£¬ £¬´Ó¶øºã¾ÃDZÔÚ¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬ £¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂ磬£¬£¬£¬ £¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬Ö»¹ÜÊܺ¦ÕßÖڶ࣬£¬£¬£¬ £¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ£¬£¬£¬£¬ £¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©Æ­ÊֶεÄÈÏ֪ȱ·¦£¬£¬£¬£¬ £¬ÒÔ¼°Õ©Æ­Õßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£¡£¡£¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬ £¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ£¬£¬£¬£¬ £¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬ £¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾£¬£¬£¬£¬ £¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£¡£¡£¡£ÖÜÈý£¬£¬£¬£¬ £¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐУ¬£¬£¬£¬ £¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£¡£¡£¡£ÊÖÒÕÍŶÓѸËÙ½éÈ룬£¬£¬£¬ £¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏ룬£¬£¬£¬ £¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£¡£¡£¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â£¬£¬£¬£¬ £¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏߣ¬£¬£¬£¬ £¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£¡£¡£¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú£¬£¬£¬£¬ £¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲ⣬£¬£¬£¬ £¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÎÀÉú²¿Ç¿µ÷£¬£¬£¬£¬ £¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´£¬£¬£¬£¬ £¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬ £¬ÒÔ°ü¹Ü¹«¹²ÎÀÉúЧÀ͵ÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£¡£¡£¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷


9ÔÂ27ÈÕ£¬£¬£¬£¬ £¬Î¢Èí·¢³öÖÒÑÔ£¬£¬£¬£¬ £¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ£¬£¬£¬£¬ £¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐΣ¬£¬£¬£¬ £¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£¡£¡£¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´£¬£¬£¬£¬ £¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö£¬£¬£¬£¬ £¬Ò»Ö±½ø»¯£¬£¬£¬£¬ £¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬ £¬ËûÃÇÌØÊâ»îÔ¾£¬£¬£¬£¬ £¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£¡£¡£¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂ磬£¬£¬£¬ £¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯£¬£¬£¬£¬ £¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖᣡ£¡£¡£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤£¬£¬£¬£¬ £¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë£¬£¬£¬£¬ £¬ÆÆËðͬ²½ÕË»§£¬£¬£¬£¬ £¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂ룬£¬£¬£¬ £¬Èƹý±£»£»£»£»£» £»¤¡£¡£¡£¡£µ½Êֺ󣬣¬£¬£¬ £¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ£¬£¬£¬£¬ £¬Î±×°³ÉÕýµ±Óû§Éí·Ý£¬£¬£¬£¬ £¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ£¬£¬£¬£¬ £¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷£¬£¬£¬£¬ £¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óᣡ£¡£¡£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/