ºÚɽµ±¾Ö³ÆÆäÊý×Ö»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷
°ä²¼¹¦·ò 2022-08-30
¾Ý8ÔÂ27ÈÕ±¨Â·£¬ºÚɽµ±¾Öй©ÆäÔâµ½Á˸´ÔÓÇÒ³ÖÐøµÄÍøÂç¹¥»÷£¬Ó°ÏìÁ˹ú¶ÈµÄÊý×Ö»ù´¡ÉèÊ©¡£ÍøÂç¹¥»÷µÄÖ¸±êÔ̺¬µçÁ¦ºÍ¹©Ë®ÏµÍ³¡¢½»Í¨·þÎñ¡¢ÓÃÓÚ¹«Ãñ½Ó¼û¸÷Àà¹ú¶È·þÎñµÄÔÚÏßÃÅ»§ÍøÕ¾µÈµÈ¡£Òò¶ø£¬Ò»Ð©·¢µç³§ÒѾתΪÊÖ¶¯²Ù×÷£¬¹ú¶ÈÖÎÀíµÄIT»ù´¡ÉèÊ©Òѹعأ¬µ«¹«ÃñºÍÉÌÆóÒµµÄÕË»§¼°ÆäÊý¾ÝµÄ°²È«ÐÔ²¢Î´Êܵ½Ó°Ïì¡£¸Ã¹ú¹ú·À²¿³¤½«Õâ´Î¹¥»÷¹é×ïÓÚ¶íÂÞ˹µÄºÚ¿ÍÍŻ
https://securityaffairs.co/wordpress/134900/cyber-warfare-2/montenegro-cyber-attack.html
2¡¢¶íÂÞ˹Á÷ýÌåÆ½Ì¨STARTÊý¾Ýй¶ӰÏì4400ÍòÓû§
ýÌå8ÔÂ29Èճƣ¬¶íÂÞ˹Á÷ýÌåÆ½Ì¨START¿Í»§µÄÓ×ÎÒÐÅÏ¢ÔÚÒ»´Î¹¥»÷ÖÐй¶¡£¸Ã¹«Ë¾Ã»ÓÐй©Óм¸¶àÓû§Êܵ½Ó°Ï죬Information Leaks¹«¿ªµÄ½ØÍ¼ÏÔʾÕâ´Îй¶ÁË4400Íò¿Í»§µÄ72 GBÊý¾Ý¡£ºÚ¿ÍÐû³ÆÕâЩÊý¾ÝÀ´×ÔÒ»¸ö¶³öµÄMongoDBÊý¾Ý¿â£¬ÆäÖÐÔ̺¬ÔÚÈ¥Äê9ÔÂ22ÈÕ֮ǰÔÚ¸ÃÍøÕ¾ÉÏ×¢²áµÄÓû§µÄ¾ßÌåÐÅÏ¢¡£START°µÊ¾ÒѾ½¨¸´·ì϶²¢¹Ø¹ØÁËÊý¾Ý¿â£¬Ä¿Ç°Éв»Ã÷ÏÔÕâ´Î¹¥»÷µÄºÚ¿Í¼°Æä¶¯»ú¡£
https://therecord.media/leading-russian-streaming-platform-suffers-data-leak-allegedly-impacting-44-million-users/
3¡¢MERCURYÀûÓÃSysAidÖеÄLog4Shell¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµ
8ÔÂ25ÈÕ£¬Î¢ÈíÅû¶ÁËÒÁÀÊÍÅ»ïMERCURYÕë¶ÔÒÔÉ«ÁÐÆóÒµµÄ¹¥»÷»î¶¯¡£¹¥»÷²úÉúÔÚ2022Äê7ÔÂ23ÈÕÖÁ25ÈÕ£¬¹¥»÷ÕßÀûÓôæÔÚLog4Shell·ì϶µÄSysAidÀûÓ÷¨Ê½½øÐгõʼ½Ó¼û¡£Ö®ºó£¬MERCURYͨ¹ýÌØÔìµÄÒªÇóÖ´ÐжñÒâPowerShell²¢×°ÖÃWeb shell¡£ÔÚͨ¹ýcmd.exeÍøÂçµ½ËùÐèÐÅÏ¢ºó£¬»áÔö³¤Ò»¸öÓû§²¢½«ÆäȨÏÞÌáÉýΪ±¾µØÖÎÀíÔ±£¬¶øºó½«¹¥»÷¹¤¾ßÔö³¤µ½Æô¶¯Îļþ¼ÐÖУ¬ÒÔ³ÉÁ¢ÓƾÃÐÔ¡£MuddyWater»¹Ê¹ÓÃMimikatzÖ´ÐÐÆ¾Ö¤ÇÔÈ¡£¬Í¨¹ýWMIºÍRemComºáÏòÒÆ¶¯£¬²¢Í¨¹ý¶¨ÔìµÄLigoloËí·¹¤¾ß½«±»µÁÊý¾Ý·¢Ë͵½C2·þÎñÆ÷¡£
https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/
4¡¢Ó¡¶ÈÄáÎ÷ÑÇPT.JASA MARGAÔâµ½DESORDENµÄ¹¥»÷
¾ÝýÌå8ÔÂ25ÈÕ±¨Â·£¬Ó¡¶ÈÄáÎ÷ÑǵÄÊշѹ«Â·ÔËÓªÉÌPT JASAMARGA TOLLROAD OPERATORÔâµ½À´×ÔDESORDENµÄ¹¥»÷¡£DESORDEN°µÊ¾£¬ÒÑÇÔÈ¡252 GBµÄÊý¾Ý¡¢±àÂëºÍÎĵµ£¬É¢²¼ÔÚ5̨·þÎñÆ÷ÉÏ£¬Éæ¼°¸Ã¹«Ë¾µÄÓû§¡¢¿Í»§¡¢Ô±¹¤¹«Ë¾ºÍ²ÆÕþµÄÐÅÏ¢¡£¸Ã¹«Ë¾×÷³ö»ØÓ¦£¬³ÆÐ¹Â¶µÄÊý¾ÝÖ»ÊÇÄÚ²¿Êý¾ÝºÍ¹«Ë¾ÓйØÐÅÏ¢£¬¶ø²»Éæ¼°¿Í»§Êý¾Ý£¬ËûÃÇÒѹعØÊÜÓ°ÏìµÄ·þÎñÆ÷£¬Ä¿Ç°ÔÚ¸´ÔÊý¾Ý²¢½«ÏµÍ³Òƶ¯µ½¸ü°²È«µÄ·þÎñÆ÷ÉÏ¡£
https://www.databreaches.net/major-indonesia-tollroad-operator-hacked-by-desorden/
5¡¢¼ÙµÄP2E Cthulhu World·Ö·¢¶à¸öÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ
ýÌå8ÔÂ27ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öеĶñÒâÈí¼þ·Ö·¢»î¶¯¡£ºÚ¿Í´´½¨ÁËÒ»¸ö¼ÙµÄplay-to-earnƽ̨Cthulhu World£¬ÆäÖÐÔ̺¬ÍøÕ¾¡¢Discord Groups¡¢Éç½»ÕË»§ºÍÒ»¸öMedium¿ª·¢ÕßÍøÕ¾£¬Ö¼ÔÚ·Ö·¢ÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRaccoon Stealer¡¢AsyncRATºÍRedLine¡£ÆäÍøÕ¾ËÆºõ¿Ë¡Á˺Ϸ¨µÄAlchemic WorldÏîÄ¿¡£Ä¿Ç°£¬Cthulhu WorldµÄÍøÕ¾Òѹعأ¬µ«ËûÃǵÄDiscordÒÀÈ»»îÔ¾¡£
https://www.bleepingcomputer.com/news/security/fake-cthulhu-world-p2e-project-used-to-push-info-stealing-malware/
6¡¢Unit42°ä²¼¹ØÓÚÀÕË÷Èí¼þBlack BastaµÄ·ÖÎö»ã±¨
8ÔÂ25ÈÕ£¬Unit42°ä²¼Á˹ØÓÚÀÕË÷Èí¼þBlack BastaµÄ·ÖÎö»ã±¨¡£Black BastaÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´·þÎñ(RaaS)£¬ÓÚ2022Äê4Ô³õ´Î³öÏÖ£¬ÒÑÈëÇÖÁ˳¬¹ý75¸ö×éÖ¯£¬ÖØÒªÕë¶ÔλÓÚ°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢Ó¢¹úºÍÃÀ¹úµÄ×éÖ¯¡£2022Äê6Ô£¬×êÑÐÈËÔ±·¢ÏÖËüµÄVMware ESXi±äÌåÕë¶ÔÔÚÆóÒµLinux·þÎñÆ÷ÉÏÔËÐеÄÐé¹¹»ú¡£¸ÃÀÕË÷Èí¼þÊÔͼ¼ì²â´úÂë·ÂÕæ»òɳºÐÀ´ÈƹýÄæÏò·ÖÎö£»ÌìÉúÒ»¸ö´øÓÐdsajdhas.0×Ö·û´®µÄ»¥³âËø£¬ÒÔÈ·±£Ã¿´ÎÖ»ÓÐÒ»¸ö¶ñÒâÈí¼þµÄÊ·ýÔÚÔËÐУ»Í¨¹ýChaCha20ºÍRSA-4096µÄ×éºÏ¶ÔÓû§Êý¾Ý½øÐмÓÃÜ¡£
https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ