΢ÈíÅû¶CODESYS V3 SDKÖÐÓ°ÏìOTϵͳµÄ¶à¸ö·ì϶
°ä²¼¹¦·ò 2023-08-151¡¢Î¢ÈíÅû¶CODESYS V3 SDKÖÐÓ°ÏìOTϵͳµÄ¶à¸ö·ì϶
΢ÈíÓÚ8ÔÂ10ÈÕ³ÆÆäÔÚCODESYS V3Èí¼þ¿ª·¢Ì×¼þ(SDK)Öз¢ÏÖÁËͳ³ÆÎªCoDe16µÄ¶à¸ö·ì϶¡£¸ÃÌ×¼þ±»ÓÃÓÚPLCµÄÈí¼þ¿ª·¢»·¾³£¬ÕâЩ·ì϶ӰÏìÁË3.5.19.0֮ǰµÄËùÓÐCODESYS V3°æ±¾£¬Ê¹OT»ù´¡ÉèÊ©Ãæ¶ÔÔâµ½RCEºÍDoSµÈ¹¥»÷µÄ·çÏÕ¡£ÕâЩ·ì϶±ðÀëΪCVE-2022-47378¡¢CVE-2022-47379ºÍCVE-2022-47380µÈ¡£Î¢ÈíÓÚ2022Äê9ÔÂÏòCODESYS»ã±¨ÁËÕâЩ·ì϶£¬¹©¸øÉÌÓÚ½ñÄê4Ô½¨¸´ÁËËüÃÇ¡£
https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/
2¡¢Discord.ioÔ¼76ÍòÓû§µÄÊý¾ÝÔÚºÚ¿ÍÂÛ̳±»ÏúÊÛ
¾ÝýÌå8ÔÂ14ÈÕ±¨Â·£¬Discord.ioÔ¼760000Ãû»áÔ±µÄÐÅϢй¶£¬µ¼Ö·þÎñÁÙʱ¹Ø¹Ø¡£Discord.io²»Êǹٷ½DiscordÍøÕ¾¶øÊǵÚÈý·½·þÎñ£¬±»·þÎñÆ÷ËùÓÐÕßÓÃÀ´´´½¨×Ô½ç˵ԼÇë¡£8ÔÂ13ÈÕ£¬ºÚ¿ÍAkhirahÔÚÂÛ̳BreachedÉÏÏúÊÛÁËDiscord.ioµÄÊý¾Ý¿â£¬²¢¹«¿ªÁËÆäÖеÄ4ÌõÓû§¼Í¼×÷Ϊ¹¥»÷Ö¤¾Ý¡£¾Ý¹¥»÷Õ߳ƣ¬¸ÃÊý¾Ý¿âÔ̺¬760000ÃûDiscord.ioÓû§µÄÐÅÏ¢¡£²»¾Ãºó£¬Discord.io֤ʵÁËй¶Êý¾ÝµÄÕæÊµÐÔ£¬²¢¹Ø¹ØÆä·þÎñ£¬È¡µÞËùÓи¶·Ñ»áÔ±µÄ×ʸñ¡£
https://www.bleepingcomputer.com/news/security/discordio-confirms-breach-after-hacker-steals-data-of-760k-users/
3¡¢Sophos·¢ÏÖ¼Ù×°³ÉTripAdvisorͶËßµÄKnight·Ö·¢»î¶¯
¾Ý8ÔÂ12ÈÕ±¨Â·£¬Sophos×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÐµĹ¥»÷»î¶¯£¬¼Ù×°³ÉTripAdvisorͶËߣ¬µ«È´·Ö·¢ÀÕË÷Èí¼þKnight¡£CyclopsÔÚ7Ôµ׸ÄÃûΪKnight£¬»¹¸üÐÂÁ˾«¼ò°æ¼ÓÃÜÆ÷ÒÔÖ§³ÖÅúÁ¿·Ö·¢£¬²¢ÍƳöеÄÐ¹Â¶ÍøÕ¾¡£´¹µöÓʼþÔ̺¬ZIP¸½¼þTripAdvisorComplaint.zip£¬¶øºóÓÕʹָ±êÏÂÔØÍ¨¹ýExcel-DNA´´½¨µÄÒ»¸öXLLÎļþ¡£´ò¿ªXLLʱ½«¼ì²âMoTW±êÖ¾£¬ÈôÊÇûÓУ¬Ôò»áÌáÄܸɱêÆôÓøüÓÔØÏî¡£Õâ»áÔÚеÄexplorer.exe¹ý³ÌÖÐ×¢ÈëKnight Lite¼ÓÃÜ·¨Ê½£¬²¢ÆðÍ·¼ÓÃÜÍÆËã»úÉϵÄÎļþ¡£
https://www.bleepingcomputer.com/news/security/knight-ransomware-distributed-in-fake-tripadvisor-complaint-emails/
4¡¢Ö¥¼Ó¸ç±´¶ûÌØÌú·¹«Ë¾Ôâµ½AkiraµÄ¹¥»÷85GBÊý¾Ýй¶
ýÌå8ÔÂ12Èճƣ¬Ö¥¼Ó¸ç±´¶ûÌØÌú·¹«Ë¾³ÆÆäÔÚµ÷²éÀÕË÷¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾ÓÉÃÀ¹úºÍ¼ÓÄôóµÄÁù¼ÒÌú·¹«Ë¾¹²Í¬Õ¼ÓУ¬Ã¿¼ÒÌú·¹«Ë¾¶¼Ê¹Óøù«Ë¾µÄתÔ˺ͻ»³ËÉèÊ©£¬ÊÇÃÀ¹ú×î´óµÄÖÐÑë»»³ËÖÕµãÕ¾Ìú·¡£8ÔÂ10ÈÕ£¬Akira½«¸Ã¹«Ë¾Ôö³¤µ½ÆäÍøÕ¾£¬²¢°µÊ¾ÒÑ»ñÈ¡85 GBÊý¾Ý¡£½²»°È˳ƣ¬Õâ´ÎÊÂÎñ²¢Î´Ó°Ï칫˾µÄÔËÓª¡£È¥Ä꣬¶à¼ÒÌú·¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷£¬ÃÀ¹úTSAÊÔͼ¶ÔÌú·µÈ³ÁÒª»ù´¡ÉèÊ©²ÉÈ¡¸üǿӲµÄ´ëÊ©¡£
https://therecord.media/belt-railway-chicago-ransomware-data-theft-akira
5¡¢×êÑÐÈËÔ±¹«¿ªÕë¶ÔBarracuda ESGµÄкóÃÅWhirlpool
8ÔÂ10ÈÕ±¨Â·³Æ£¬CISAÔÚÕë¶ÔBarracuda ESGÉ豸µÄ¹¥»÷»î¶¯Öз¢ÏÖÁËÒ»¸öÃûΪWhirlpoolµÄкóÃÅ¡£ÕâÊÇÒ»¸ö32λELFÎļþ£¬´ÓÄ£¿éÖлñÈ¡Á½¸ö²ÎÊý£¨C2 IPºÍ¶Ë±êÓÀ´³ÉÁ¢´«Êä²ã°²È«(TLS)·´Ïòshell¡£WhirlpoolÊÇÔÚÕë¶ÔBarracuda ESGµÄ¹¥»÷»î¶¯Öз¢ÏֵĵÚ3¸öºóÃÅ£¬Áí±íÁ½¸öÊÇSeaSpyºÍSubmarine¡£¹¥»÷»î¶¯ÀûÓÃÁ˺ÅÁî×¢Èë·ì϶(CVE-2023-2868)£¬¸Ã¹«Ë¾Í¨¹ý¸ü»»É豸À´½¨¸´ËüÃÇ¡£
https://securityaffairs.com/149392/hacking/whirlpool-backdoor-barracuda-esg-attacks.html
6¡¢Zscaler°ä²¼Ð¶ñÒâÈí¼þStatc StealerµÄ·ÖÎö»ã±¨
8ÔÂ8ÈÕ£¬Zscaler°ä²¼Á˹ØÓÚ¶ñÒâÈí¼þStatc StealerµÄ·ÖÎö»ã±¨¡£ÕâÊÇÒ»ÖÖÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Äܹ»´ÓWindowsÉ豸ÇÔÊØÐÅÏ¢¡£ËüÊÇÓÉC++¿ª·¢µÄ£¬Ö§³ÖÎļþÃû²î¾à²é³ÒÔÈÆ¹ýɳÏäºÍÄæÏò¹¤³ÌµÄ·ÖÎö¡£Ï°È¾Á´Ê¼ÓÚαÔìµÄ¹È¸è¸æ°×£¬»áÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤ºÍÃÜÂ룬ÉõÖÁÔ̺¬TelegramµÈÐÂÎÅÀûÓ÷¨Ê½µÄÊý¾Ý¡£×îºó£¬Ê¹ÓÃHTTPSºÍ̸½«ÇÔÈ¡µÄ¼ÓÃÜÊý¾Ý·¢Ë͵½C2·þÎñÆ÷¡£
https://www.zscaler.com/blogs/security-research/statc-stealer-decoding-elusive-malware-threat


¾©¹«Íø°²±¸11010802024551ºÅ