°Ä´óÀûÑǾü·½µÄͨѶƽ̨ForceNetÔâµ½ÀÕË÷¹¥»÷
°ä²¼¹¦·ò 2022-11-03
¾Ý·͸Éç10ÔÂ31ÈÕ±¨Â·£¬°Ä´óÀûÑÇForceNetÔâµ½ÁËÀÕË÷¹¥»÷¡£ForceNetÊÇÓɹú·À²¿±í²¿ICT¹©¸øÉÌÔËÓªµÄ£¬ÊǰĴóÀûÑǾüʺ͹ú·ÀÈËԱʹÓõÄͨѶƽ̨¡£¹ú·À²¿ÖúÀí²¿³¤°µÊ¾£¬¸Ã·þÎñÔâµ½¹¥»÷£¬µ«µ½Ä¿Ç°ÎªÖ¹Ã»ÓÐÈκÎÊý¾Ýй¶¡£¾Ý°Ä´óÀûÑÇýÌ峯£¬Ò»Ð©Ó×ÎÒÐÅÏ¢£¬Èç¾üÊÂÈËÔ±µÄµ®ÉúÈÕÆÚºÍÈëÎéϸ½ÚµÈ¿ÉÄÜÒѱ»µÁ¡£¹ú·À²¿½²»°ÈËй©£¬ËûÃÇÔÚ²é³ÊÜÓ°ÏìÊý¾Ý¼¯µÄÄÚÈݼ°ÆäÔ̺¬µÄÓ×ÎÒÐÅÏ¢£¬²¢ÒÑ֪ͨËùÓÐÓйØÈËÔ±¡£
https://www.reuters.com/technology/ransomware-hackers-hit-australian-defence-communications-platform-2022-10-31/
2¡¢×êÑÐÈËÔ±Åû¶Azure Cosmos DBÖеÄRCE·ì϶CosMiss
¾Ý11ÔÂ1ÈÕ±¨Â·£¬Orca Security×êÑÐÈËÔ±Åû¶ÁËAzure Cosmos DBÄÚÖõÄJupyter NotebooksÖеÄRCE·ì϶CosMiss¡£ÈôÊǹ¥»÷Õß֪·NotebookµÄ'forwardingId'£¬¼´Notebook WorkspaceµÄUUID£¬ËûÃǽ«Õ¼ÓÐNotebookµÄÆëȫȨÏÞ¶øÎÞÐè½øÐÐÉí·ÝÑéÖ¤£¬Ô̺¬¶ÁÈ¡ºÍдÈë½Ó¼ûȨÏÞ¡£×êÑÐÈËÔ±ÓÚ2022Äê10ÔÂ3ÈÕÏòMicrosoft»ã±¨Á˸÷ì϶£¬Èí¼þ¹©¸øÉÌÔÚ10ÔÂ5ÈÕ½¨¸´ÁËËü¡£MicrosoftÚ¹Êͳƣ¬²»Ê¹ÓÃJupyter NotebooksµÄ¿Í»§£¨99.8%µÄ¿Í»§£©²»Ò×Êܵ½´Ë·ì϶µÄÓ°Ïì ¡£
https://thehackernews.com/2022/11/researchers-disclose-details-of.html
3¡¢DropboxÔâµ½´¹µö¹¥»÷µ¼ÖÂ130¸öGitHub´æ´¢¿âй¶
DropboxÔÚ11ÔÂ1ÈÕй©£¬ºÚ¿ÍʹÓô¹µö¹¥»÷ÖлñµÃµÄÔ±¹¤Æ¾Ö¤½Ó¼ûÆäÒ»¸öGitHubÕÊ»§ºóÇÔÈ¡ÁË130¸ö´úÂë´æ´¢¿â¡£¸Ã¹«Ë¾ÓÚ10ÔÂ14ÈÕ·¢ÏÖ¹¥»÷ÕßÈëÇÖÁ˸ÃÕÊ»§£¬Õâ´Î¹¥»÷Õë¶Ô¶àÃûDropboxÔ±¹¤£¬Í¨¹ý¼ÙÒâCircleCIµÄÓʼþ½«ËûÃdzÁ¶¨Ïòµ½´¹µöÒ³Ãæ£¬²¢ÒªÇóËûÃÇÊäÈëGitHubÍ´´¦¡£¸Ã¹«Ë¾³Æ£¬ÊÜÓ°Ïì´æ´¢¿âÔ̺¬ÆäΪDropboxʹÓöøÉÔ×÷Åú¸ÄµÄµÚÈý·½¿â¸±±¾¡¢ÄÚ²¿ÔÐÍÒÔ¼°°²È«ÍŶÓʹÓõÄһЩ¹¤¾ßºÍÅäÖÃÎļþ£¬²¢²»Ô̺¬Ö÷ÌâÀûÓ÷¨Ê½»ò»ù´¡ÉèÊ©µÄ´úÂë¡£
https://www.bleepingcomputer.com/news/security/dropbox-discloses-breach-after-hacker-stole-130-github-repositories/
4¡¢Google PlayÉϵÄ4¸ö¶ñÒâÀûÓÃÒѱ»×°Öó¬¹ý100Íò´Î
¾ÝMalwarebytes 11ÔÂ1ÈÕ±¨Â·£¬Google PlayÉϵÄ4¸ö¶ñÒâÀûÓÃÒѱ»×°Öó¬¹ý100Íò´Î¡£ÕâЩÀûÓÃÒÀÈ»´æÔÚÓÚ¿ª·¢ÕßÕË»§Mobile apps Group֮ϣ¬±ðÀëΪBluetooth Auto Connect¡¢Bluetooth App Sender¡¢Driver: Bluetooth, Wi-Fi, USBºÍMobile transfer: smart switch¡£ËüÃǿɽ«Óû§ÒýÏòÇÔÊØÐÅÏ¢»òΪÔËÓªÍŶӴ´Ôì"pay-per-click"ÊÕÈëµÄÍøÕ¾¡£ÆäÖÐÒ»Ð©ÍøÕ¾ÓÕʹָ±êÏÂÔØÎ±ÔìµÄ°²È«¹¤¾ß»ò¸üУ¬ÒÔºåÆÆäÊÖ¶¯×°ÖöñÒâÎļþ¡£
https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
5¡¢Emotet¶ÌÔÝͣϢ5¸öÔÂºó»Ø¹é£¬·Ö·¢¶ñÒâExcel¸½¼þ
ýÌå11ÔÂ2Èճƣ¬ÔÚ¾ÀúÁ˽ü5¸öÔµġ°¼ÙÆÚ¡±Ö®ºó£¬EmotetÔÙ´ÎÆðÍ·¹¥»÷»î¶¯¡£Cryptolaemus×êÑÐÈËÔ±»ã±¨Ëµ£¬ÔÚÃÀ¹ú¶«²¿¹¦·ò11ÔÂ2ÈÕÁ賿4:00×óÓÒ£¬EmotetºöÈ»ÔٴλîÔ¾ÆðÀ´£¬ÏòÈ«ÇòµÄÓʼþµØÖ··¢ËÍÀ¬»øÓʼþ¡£¸Ã»î¶¯Ê¹Óñ»µÁµÄµç×ÓÓʼþ»Ø¸´Á´½ÓÀ´·Ö·¢¶ñÒâExcel¸½¼þ£¬ÒÔ¸÷Àà˵»°ºÍÎļþÃûÕë¶ÔÈ«ÇòÓû§£¬¼Ù×°³É·¢Æ±¡¢É¨Ãè¼þ¡¢µç×Ó±í¸ñµÅ×Õ¶ü¡£´Ë±í£¬»î¶¯»¹ÒýÈëÁËÒ»¸öеÄExcel¸½¼þÄ£°å£¬ÆäÖÐÔ̺¬ÈƹýMicrosoftÊܱ£»¤ÊÓͼµÄ×¢Ã÷¡£
https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-5-month-break/
6¡¢Kaspersky°ä²¼2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄ·ÖÎö»ã±¨
KasperskyÔÚ11ÔÂ1ÈÕ°ä²¼ÁË2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£¸Ã¼¾¶ÈµÄÖØÒªÇ÷ÏòÔ̺¬£ºAPT»î¶¯É¢²¼¼«¶È¿í·º£¬±¾¼¾¶ÈµÄ¹¥»÷ÁìÓòÀ©´óµ½Å·ÖÞ¡¢ÃÀ¹ú¡¢º«¹ú¡¢°ÍÎ÷¡¢Öж«ºÍÑÇÖÞ¸÷µØ£»APT¹¥»÷ÍÅ»ïÑ¡ÔñµÄÖ¸±ê¶àÑù»¯£¬Ô̺¬µ±¾ÖºÍ±í½»»ú¹¹¡¢¹ú·À³Ð°üÉÌ¡¢½ðÈÚÐÐÒµ¡¢¿Æ¼¼Ó²¼þºÍ°ëµ¼ÌåÐÐÒµ£¬ÒÔ¼°ITÕÐÆ¸µÈ£»µØÔµÕþÖÎÒÀÈ»ÊÇAPT·¢Õ¹µÄÖØÒªÇý¶¯Á¦£¬¼äµý»î¶¯ÊÇAPT»î¶¯µÄÖØÒªÖ¸±ê¡£´Ë±í£¬»ã±¨»¹½éÉÜÁËÓë¶íÂÞ˹¡¢Öж«¡¢¶«ÄÏÑǺͳ¯Ïʰ뵺µÈµØÓòÓйصÄAPT»î¶¯¡£
https://securelist.com/apt-trends-report-q3-2022/107787/


¾©¹«Íø°²±¸11010802024551ºÅ