ŦԼ´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷

°ä²¼¹¦·ò 2022-09-20

1¡¢Å¦Ô¼´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷

      

¾ÝýÌå9ÔÂ17ÈÕ±¨Â·£¬Î»ÓÚŦԼµÄ´¹Î£ÏìÓ¦ºÍ¾È»¤³µ·þÎñÌṩÉÌEmpress EMS£¨´¹Î£Ò½ÁÆ·þÎñ£©Åû¶ÁËһ·¿Í»§ÐÅϢй¶ÊÂÎñ¡£Æ¾¾Ý֪ͨ£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ½Ó¼ûȨÏÞ£¬ÔÚÔ¼Ò»¸ö°ëԺ󣬼´7ÔÂ13ÈÕÇÔÈ¡ÁËÒ»Óײ¿ÃÅÎļþ¡£Empress EMSÔÚ֪ͨÊÜÓ°ÏìµÄÓ×ÎÒ£¬²¢ÎªÇкÏǰÌáµÄÓ×ÎÒÌṩÐÅÓþ¼à¿Ø·þÎñ¡£Ö»¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬µ«ºÃ¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£


https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/


2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ

      

ýÌå9ÔÂ19Èճƣ¬¹¥»÷Õßͨ¹ý´¹µö¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬²¢»ñµÃÁËÓ×ÎÒÐÅÏ¢µÄ½Ó¼ûȨÏÞ¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢ÏÖÁËÕâÒ»ÎÊÌ⣬֮ºóÂíÉϱ£»¤Á˺ÏÓõÄÓʼþÕÊ»§£¬²¢ÀñƸÁ˵ÚÈý·½°²È«È¡Ö¤¹«Ë¾½øÐе÷²é£¬ÒÔÈ·¶¨ÊÂÎñµÄÐÔÖʺÍÁìÓò¡£¸Ãº½¿Õ¹«Ë¾»Ø¾øÐ¹Â©ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÁ¿£¬µ«°µÊ¾ÕâÊÇÒ»¸ö¼«¶ÈÓ×µÄÊý×Ö£¬ÇÒûº±¼û¾Ý±»ÀÄÓã¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£


https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/


3¡¢CISAºÍNSA°ä²¼Ê¢¿ªÎÞÏßµç½ÓÈëÍøÂ簲ȫȷµ±¿àÖÔÏî

      

9ÔÂ16ÈÕ£¬CISAºÍNSA°ä²¼ÁËÊ¢¿ªÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©°²È«È·µ±¿àÖÔÏî¡£Open RANÊÇ´«Í³RAN¼Ü¹¹ÑݱäΪʢ¿ª»¥²Ù×÷½Ó¿Ú¡¢Ðé¹¹»¯¡¢´óÊý¾ÝºÍÖ§³ÖÈËΪÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓOpen RAN¼Ü¹¹´ò¿ªÁËÔÆºÍÐé¹¹»¯µÄ´óÃÅ£¬Í¬Ê±Í¨¹ý´´½¨¶à¹©¸øÉÌÉú̬ϵͳÀ´Íƽø¾ºÕù¼Ó¾ç¡¢¹©¸øÉ̶àÑùÐԺʹ´Ð¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëÖ´ÐÐÊ¢¿ªRAN¼Ü¹¹ÓйصÄÒæ´¦ºÍ°²È«µ±¿àÖÔÏCISA¼¤ÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©¸øÉ̺ÍÀûÒæÓйØÕ߲鿴ÕâЩµ±¿àÖÔÏî¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security


4¡¢ÀÕË÷ÍÅ»ïHiveÐû³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÕÆ¹Ü

      

¾Ý9ÔÂ15ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïHiveÐû³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾Bell¼¼Êõ½â¾ö¹æ»®(BTS)ϵͳµÄ¹¥»÷ÕÆ¹Ü¡£BTSÊÇÒ»¼ÒÕ¼ÓÐ4500¶àÃûÔ±¹¤µÄ¶ÀÁ¢×Ó¹«Ë¾£¬×¨ÃÅΪ°²´ÖÂÔÊ¡ºÍ¿ý±±¿ËÊ¡µÄסլºÍÓ×ÐÍÆóÒµ¿Í»§×°ÖÃBell·þÎñ¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐй©¹¥»÷²úÉúµÄ¹¦·ò£¬µ«HiveÔÚÆäÍøÕ¾ÖаµÊ¾ÔÚÔ¼Ò»¸öÔÂǰ£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£BTSµÄÍøÕ¾Ä¿Ç°ÈÔÎÞ·¨½Ó¼û£¬²¿Ãſͻ§µÄÐÕÃû¡¢µØÖ·ºÍµç»°ÐÅϢй¶¡£


https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/   


5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒ´«²¼

      

KasperskyÔÚ9ÔÂ15ÈÕй©£¬Ò»¸öеĶñÒâÈí¼þ°üÀûÓñ»¹¥»÷µÄYouTubeƵ·ÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒ´«²¼¡£ÕâЩÊÓÆµÍ¨³£Ô̺¬ÏÂÔØ¼ÙµÄÆÆ½âºÍÎè±×Èí¼þµÄÁ´½Ó£¬ÏÖʵÉÏ»á×°ÖÃ×ÔÎÒ´«²¼µÄ¶ñÒâÈí¼þ°ü£¬ÖØÒªÕë¶ÔFIFA¡¢×îÖÕ¿ÕÏë¡¢¼«ÏÞ¾º¿ìµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÅ×ÎÏ·µÄ·ÛË¿¡£Ô­Ê¼°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬ÆäÖÐÔ̺¬ºÜ¶à¶ñÒâÎļþ¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬±ðÀëΪRedLineÇÔÈ¡·¨Ê½¡¢¿ó¹¤ºÍÅú´¦ÖÃÎļþ¡£


https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/


6¡¢AquaSec°ä²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ 

      

9ÔÂ15ÈÕ£¬AquaSec°ä²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×Ô9Ô³õÒÔÀ´£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢ÏÖÁËTeamTNT»î¶¯µÄ¼£Ï󣬲¢ÏàПúڿÍ×éÖ¯ÓÔìðÍ·Ðж¯ÁË¡£×êÑÐÈËÔ±ÔÚTeamTNTÐÂÒ»ÂֵĻÖй۲쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬ÀûÓñ»½Ù³Ö·þÎñÆ÷µÄÍÆËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»Cronb¹¥»÷£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈ¼¼Êõ£»What Will Be¹¥»÷£¬Õë¶ÔDockerÊØ»¤¹ý³Ì£¬ÀûÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬ÀûÓ÷ì϶´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£


https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt