±£¼ÓÀûÑÇ×Üͳ°ì¹«Êҵȵ±¾Ö»ú¹¹µÄÍøÕ¾Ôâµ½DDoS¹¥»÷
°ä²¼¹¦·ò 2022-10-18
±£¼ÓÀûÑÇ×ܼì²ì³¤°ì¹«ÊÒ10ÔÂ15ÈÕ°µÊ¾£¬±£¼ÓÀûÑǵ±¾Ö»ú¹¹µÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£DDoS¹¥»÷¡£×ܼì²ì³¤³Æ£¬³ýÁË×Üͳ°ì¹«ÊÒ£¬Õâ´ÎDDoS¹¥»÷»¹µ¼Ö¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Ë¾·¨²¿ºÍÏÜ·¨·¨ÔºµÄÍøÕ¾·þÎñÖжϡ£Ëû²¹³ä·£¬Õâ´Î¹¥»÷À´×Ô¶íÂÞ˹³ÇÊÐÂí¸ñÄáÍиç¶û˹¿Ë£¨Magnitogorsk£©¡£±£¼ÓÀûÑǵ±¾ÖÒѶÔÕâÒ»ÊÂÎñ·¢Õ¹µ÷²é£¬²¢ÒѲÉÈ¡´ëÊ©Ï÷¼õ¹¥»÷´øÀ´µÄÓ°Ïì¡£
https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html
2¡¢0patchƽ̨°ä²¼MotWÖÐÒѱ»ÀûÓõķì϶µÄ·Ç¹Ù·½²¹¶¡
¾ÝýÌå10ÔÂ17ÈÕ±¨Â·£¬0patchƽ̨°ä²¼ÁËÒ»¸öÃâ·ÑµÄ·Ç¹Ù·½²¹¶¡£¬ÒÔ½¨¸´Windows Mark of the Web(MotW)°²È«»úÔìÖб»»ý¼«ÀûÓõķì϶¡£¸Ã·ì϶¿É±»¹¥»÷ÕßÓÃÀ´×èÖ¹WindowsÔÚ´ÓInternetÏÂÔØµÄZIP´æµµÖÐÌáÈ¡µÄÎļþÉÏÀûÓÃ(MotW)±êÇ©¡£×êÑÐÈËÔ±ÓÚ7ÔÂÏòMicrosoft»ã±¨Á˸ÃÎÊÌ⣬ËûÊ×ÏÈ·¢ÏÖÁËZIPÎĵµÎ´ÕýÈ·Ôö³¤MoTW±êÖ¾¡£ÔÚ΢Èí°ä²¼¹Ù·½¸üÐÂ֮ǰ£¬0patchΪ¶à¸öÊÜÓ°ÏìµÄ°æ±¾¿ª·¢ÁËÃâ·ÑµÄ²¹¶¡¡£
https://www.bleepingcomputer.com/news/microsoft/windows-mark-of-the-web-bypass-zero-day-gets-unofficial-patch/
3¡¢Woolworths³ÆÆä220ÍòMyDeal¿Í»§µÄÐÅÏ¢ÒѾй¶
¾Ý10ÔÂ15ÈÕ±¨Â·£¬WoolworthsµÄ×Ó¹«Ë¾MyDealÅû¶ÁËһ·ӰÏì220Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£ÉÏÖÜÎ壬MyDeal°µÊ¾ºÚ¿ÍʹÓÃй¶µÄÓû§Í´´¦½Ó¼ûÁ˹«Ë¾µÄ¿Í»§¹ØÏµÖÎÀí(CRM) ϵͳ£¬´Ó¶øÄܹ»²é¿´ºÍµ¼³ö¿Í»§ÐÅÏ¢¡£ÉÏÖÜÈÕ£¬¹¥»÷Õ߯ðÍ·ÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏÒÔ600ÃÀÔªµÄ¼ÛÖµÏúÊÛ±»µÁÊý¾Ý¡£¹¥»÷ÕßÐû³Æ¸ÃÊý¾ÝĿǰÔ̺¬100Íò¸öÌõ¿î£¬µ«µ±ËûÃÇʵÏÖ¶ÔÊý¾Ý¿âµÄ½âÎöʱ£¬Ð¹Â¶µÄ¿Í»§ÊýÁ¿½«»áÔö³¤¡£10ÔÂ17ÈÕ£¬ºÚ¿Í¹«¿ªÁË286¸öMyDeal¿Í»§µÄÐÅÏ¢×÷Ϊ±»µÁÊý¾ÝµÄÑù±¾¡£
https://www.databreaches.net/woolworths-says-2-2m-mydeal-customers-data-hacked/
4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄ½áºÏÐж¯¿ÛÁôBlack AxeÍÅ»ïµÄ75ÈË
10ÔÂ17ÈÕ±¨Â·£¬¹ú¼ÊÐ̾¯×éÖ¯°ä·¢¿ÛÁôÁ˺ڿÍÍÅ»ïBlack AxµÄ75ÈË£¬ÆäÖÐÁ½ÈËÔÚÉϸöÔµײ߶¯Á˶àÖÔìÛÕ©»î¶¯²¢»ñÀû180ÍòÃÀÔª¡£ÕâЩÏÓÒÉÈËÊÇÔÚ2022Äê9ÔÂ26ÈÕÖÁ30ÈÕÆÚ¼äÔÚÄϷǽøÐеĹú¼Ê½áºÏ·¨ÂÉÐж¯Operation JackalÖб»²¶µÄ¡£Black AxeÓÚ1977ÄêÔÚÄáÈÕÀûÑdzÉÁ¢£¬±»ÒÔΪÊÇÊÀ½çÉÏÓ°Ïì×îÉîÔ¶¡¢×îΣÏյķ¸×ïÍÅ»ïÖ®Ò»£¬ÓÚ2015Äê³õ´ÎÉæ×ãÍøÂç·¸×ï¡£Õâ´Î·¨ÂÉÐж¯½øÐÐÁË49´Î²Æ¸»ËѲ飬²é»ñÁË12000ÕÅSIM¿¨ºÍ´óÁ¿µÄÆäËü×ʲú¡£
https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html
5¡¢WIP19ÍÅ»ïÖØÒªÕë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ
ýÌå10ÔÂ14ÈÕй©£¬SentinelOne³ÆÆä·¢ÏÖÁËÐµĹ¥»÷ÍÅ»ïWIP19Ò»Ö¹Øë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ¡£¸ÃÍÅ»ïʹÓÃÓɺ«¹ú¹«Ë¾DEEPSoftÐû¸æµÄºÏ·¨µÄ±»µÁÊý×ÖÖ¤ÊéÀ´Ç©ÊðÔÚϰȾÁ´ÖÐ×°ÖõĶñÒ⹤¼þ£¬ÒÔÈÆ¹ý¼ì²â¡£Ëü»¹ÓëOperation Shadow ForceÓÐËù³Áµþ£¬µ«Ê¹ÓÃÁËеĶñÒâÈí¼þºÍ·ÖÆçµÄ¼¼Êõ¡£´Ë±í£¬¹¥»÷ÕßÔڻÖÐʹÓÃÁ˶àÖÖ¹¤¾ß£¬Ô̺¬Æ¾Ö¤×ª´¢·¨Ê½¡¢ÍøÂçɨÃ蹤¾ß¡¢ä¯ÀÀÆ÷ÇÔÈ¡·¨Ê½¡¢¼üÅ̼ͼ¹¤¾ßºÍÆÁÄ»¼Í¼¹¤¾ß¡£
https://thehackernews.com/2022/10/new-chinese-cyberespionage-group.html
6¡¢HP³ÆMagniberͨ¹ýJavaScriptÎļþϰȾWindowsÓû§
HPÔÚ10ÔÂ13ÈÕ°ä²¼»ã±¨½ÒʾÁËÀÕË÷Èí¼þMagniberÐÂÒ»Âֵķַ¢»î¶¯¡£ÔÚ֮ǰµÄ»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁËMSIºÍEXEÎļþ£¬¶ø×î½ü£¬ËüÇл»µ½ÁËJavaScriptÎļþ¡£ÕâЩÎļþ¾¹ý»ìºÏ´¦Ö㬲¢Ê¹ÓÃDotNetToJScript¼¼ÊõµÄ±äÌåÔÚϵͳÄÚ´æÖÐÖ´ÐÐ.NETÎļþ¡£.NETÎļþ¶Ôshellcode½øÐнâÂë²¢½«Æä×¢Èëйý³Ì¡£×îÖÕ£¬Magniber¶ÔÖ÷»úÉϵÄÎļþ½øÐмÓÃÜ£¬²¢ÁôÏÂÊê½ð¼Í¼¡£HPÖ¸³ö£¬¸ÃÍÅ»ï»áÒªÇó¼ÒÍ¥Óû§Ö§¸¶¸ß´ï2500ÃÀÔªµÄÓöÈÀ´¸´ÔÎļþ¡£
https://threatresearch.ext.hp.com/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates/


¾©¹«Íø°²±¸11010802024551ºÅ