°Ä½ðÈÚ¹«Ë¾Latitude Finance 1400ÍòÌõ¿Í»§¼Í¼й¶

°ä²¼¹¦·ò 2023-03-27

1¡¢°Ä½ðÈÚ¹«Ë¾Latitude Finance 1400ÍòÌõ¿Í»§¼Í¼й¶


¾ÝýÌå3ÔÂ27ÈÕ±¨Â·£¬°Ä½ðÈÚ¹«Ë¾Latitude Finance¸üÐÂÁËÊý¾Ýй¶֪ͨ£¬Ð¹Â©ÊܸÃÊÂÎñÓ°ÏìµÄÈËÊýÔö³¤µ½ÁË1400ÍòÈË¡£3ÔÂ16ÈÕ£¬¸Ã¹«Ë¾Åû¶ÁËһ·¹¥»÷ÊÂÎñ£¬³ÆºÚ¿ÍÁËÈëÇÖÁËÆäÁ½¼Ò·þÎñÌṩÉ̵Äϵͳ²¢½Ó¼ûÁËÔ¼328000Ìõ¿Í»§¼Í¼¡£Ëæ×ŽøÒ»´ëÊ©²é£¬·¢ÏÖ¸ÃÊÂÎñµÄÓ°ÏìÒª´óµÃ¶à¡£Ô¼790Íò¸ö°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄ¼ÝÕÕºÅÂëй¶£¬ÆäÖÐ40%ÊÇÔÚ´Óǰ10ÄêÄÚÌá½»¸ø¸Ã¹«Ë¾µÄ¡£×·ÒäÖÁ2005ÄêµÄÁí±í610Íò±Ê¼Í¼ҲÒÑй¶£¬ÆäÖÐ94%ÊÇÔÚ2013Äê֮ǰÌá½»µÄ¡£


https://www.infosecurity-magazine.com/news/latitude-financial-admits-breach/


2¡¢IEEE 802.11 WiFi³ß¶ÈÖпÉÓÃÀ´½Ù³ÖÍøÂçÁ÷Á¿µÄ·ì϶


¾Ý3ÔÂ28ÈÕ±¨Â·£¬×êÑÐÈËÔ±ÔÚIEEE 802.11 WiFiºÍ̸³ß¶ÈµÄÉè¼ÆÖз¢ÏÖÁËÒ»¸ö·ì϶£¬¿É±»ÓÃÀ´½Ù³ÖÍøÂçÁ÷Á¿¡£¸Ã³ß¶ÈÔ̺¬Ê¡µç»úÔ죬µ±¿Í»§¶ËÕ¾½øÈë˯Ãßģʽʱ»áÏò½ÓÈëµã·¢ËÍÒ»¸öÔ̺¬½ÚÄÜλµÄÖ¡£¬Ö®ºóËùÓз¢ÍùËüµÄÖ¡³ÇÊÐÁжÓ¡£ÊµÏÖÐÝÃߺó½ÓÈëµã¾Í»á½«»º³åµÄÖ¡È¡³ö£¬ÀûÓüÓÃÜ£¬²¢½«ËüÃÇ´«Êäµ½Ö÷ÕŵØ¡£¹¥»÷ÕßÄܹ»ºýŪÉ豸µÄMACµØÖ·Ïò½ÓÈëµã·¢½ÚÄÜÖ¡£¬¶øºó·¢ËÍ»½ÐÑÖ¡À´¼ìË÷Ö¡²Ö¿â¡£×êÑÐÈËÔ±¿ª·¢ÁË×Ô½ç˵¹¤¾ßMacStealer£¬¿É²âÊÔWiFiÍøÂçµÄ¿Í»§¶Ë¸ôÀëÈÆ¹ý£¬²¢ÔÚMAC²ãÀ¹½Ø·¢ÍùÆäËû¿Í»§¶ËµÄÁ÷Á¿¡£CiscoÈÏ¿ÉÆä²úÆ·Êܸ÷ì϶µÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic/


3¡¢×êÑÐÈËÔ±½üÆÚ·¢ÏÖÁ½¸öIcedIDбäÌåLiteºÍForked


ýÌå3ÔÂ27Èճƣ¬IcedIDбäÌåûÓг£¼ûµÄÍøÉÏÒøÐÐڲƭְÄÜ£¬¶øÊÇרһÓÚÔÚÖ¸±êϵͳÉÏ×°Öøü¶à¶ñÒâÈí¼þ¡£ProofpointÒÑ·¢ÏÖÁËIcedIDµÄÁ½¸öбäÌ壬¼´Lite£¨³õ´Î³öÏÖÓÚ2022Äê11Ô£©ºÍForked£¨³õ´Î³öÏÖÓÚ2023Äê2Ô£©¡£ForkedÓëStandard°æ±¾ÀàËÆ£¬µ«ÆäʹÓÃ·ÖÆçµÄÎļþÀàÐÍ£¨COM Server£©£¬²¢ÓµÓжî±íµÄÓòºÍ×Ö·û´®½âÃÜ´úÂë¡£LiteÖ»ÓÐ20KB£¬²¢ÇÒ²»»á½«Ö÷»úÐÅÏ¢´«Êäµ½C2£¬ÓÉÓÚËüÊÇÓëEmotetһ··Ö·¢µÄ£¬¶øEmotetÒѾ­¶Ô±»ÈëÇÖµÄϵͳ½øÐÐÁË·ÖÎö¡£


https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/


4¡¢ÃÀ¹úÂÉËùHPMBÒòй¶³¬¹ý11ÍòÈËÐÅÏ¢±»· £¿î20ÍòÃÀÔª


3ÔÂ28ÈÕ±¨Â·³Æ£¬ÃÀ¹úÂÉËùHeidell,Pittoni,Murphy & Bach(HPMB)ÒòδÄܱ £»¤¹«ÃñµÄÓ×ÎÒºÍÒ½ÁÆÐÅÏ¢£¬±»Å¦Ô¼µ±¾Ö· £¿î20ÍòÃÀÔª¡£¾ÝϤ£¬2021Äê11Ô¹¥»÷ÕßÀûÓÃHPMBµÄExchange·þÎñÆ÷Öеķì϶½Ó¼ûÁËÆäϵͳ£¬´Ëǰ΢ÈíÒѰ䲼Õë¶Ô¸Ã·ì϶µÄ²¹¶¡µ«HPMBδÀûÓá£2021Äê12Ô£¬¹¥»÷Õß×°ÖÃÁËÀÕË÷Èí¼þLockBit²¢ÇÔÈ¡ÁË114979È˵ÄÐÅÏ¢¡£2022Äê5Ô£¬HPMBÆðͷ֪ͨÊÜÓ°Ïì¿Í»§¡£Å¦Ô¼µ±¾ÖÒÔΪ¸Ã¹«Ë¾Î¥·´ÁË¡¶½¡È«±£ÏÕÁ÷ͨÓëÔðÈη¨°¸¡·(HIPAA)»®¶¨µÄÊý¾Ý± £»¤³ß¶È£¬³ýÁË20ÍòÃÀÔª· £¿î±í»¹Ðè¼ÓÇ¿ÆäÍøÂ簲ȫ´ëÊ©¡£


https://therecord.media/new-york-law-firm-hpmb-fined-data-breach-ransomware


5¡¢Check PointÅû¶ÇÔÈ¡·¨Ê½RhadamanthysµÄ¼¼Êõϸ½Ú


Check PointÓÚ3ÔÂ27ÈÕÅû¶Á˶ñÒâÈí¼þRhadamanthysµÄ¼¼Êõϸ½Ú¡£RhadamanthysÊÇÒ»Öָ߼¶µÄÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÓÚÈ¥Äê9Ô³õ´ÎÔÚ°µÍøÉϳöÏÖ¡£¸Ã¶ñÒâÈí¼þÔ̺¬Á˾¡¿ÉÄܶàµÄÖ°ÄÜ£¬ÀýÈçÇÔȡָ±êϵͳÐÅÏ¢¡¢FTP¿Í»§¶Ëƾ֤¡¢Óʼþ¿Í»§¶Ë¡¢2FAÀûÓúÍÃÜÂëÖÎÀíÆ÷Í´´¦¡¢VPN·þÎñÍ´´¦ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°üµÈ¡£Ä¬ÈÏÇé¿öÏ£¬²»Õë¶ÔÌØ¶¨¹ú¶ÈºÍµØÓò£¬Ö»Óв»Éæ¼°CIS¹ú¶È¡£´Ë±í£¬×êÑÐÈËÔ±ÖØÒª·ÖÎöÁËÆä³õ²½Ö´ÐÐÁ÷³Ì¡¢ÏÖʵµÄÇÔÈ¡Âß¼­ÒÔ¼°ÇÔÈ¡ChromeÐÅÏ¢µÄÖ°ÄÜ¡£


https://research.checkpoint.com/2023/rhadamanthys-the-everything-bagel-infostealer/


6¡¢Cyble°ä²¼Õë¶Ôº½ÌìºÍº½¿ÕÐÐÒµ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


3ÔÂ27ÈÕ£¬Cyble°ä²¼ÁËÕë¶Ôº½ÌìºÍº½¿ÕÐÐÒµ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±·¢ÏÖ£¬½üÆÚÕë¶ÔÖ±½ÓºÍ¼ä½ÓÓ뺽ÌìºÍº½¿ÕÐÐÒµ´ò½»Â·µÄ×éÖ¯µÄÀÕË÷¹¥»÷ÔÚÔö³¤¡£3ÔÂ14ÈÕ£¬GhostSec°ä²¼ÁËÆä¹¥»÷È«Çòµ¼º½ÎÀÐÇϵͳ(GNSS)½Ó¹ÜÆ÷µÄÓйØÍÆÎÄ¡£Ëæºó£¬Cybleµ÷²é·¢ÏÖ¶à¸ö¹©¸øÉÌÌṩµÄGNSS½Ó¹ÜÆ÷¶³öÔÚ»¥ÁªÍøÉÏ£¬ÇÒGNSSϵͳ´æÔÚ¶à¸ö·ì϶¡£´Ë±í£¬ÀÕË÷Èí¼þ¶Ôº½ÌìÐÐÒµµÄÍþвԽÀ´Ô½´ó£¬LockbitÔø¹¥»÷Á˶à¸öÓë¸ÃÐÐÒµÓйصÄ×éÖ¯¡£


https://blog.cyble.com/2023/03/27/ghostsec-targeting-satellite-receivers/