Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈ·þÎñÔݲ»³ÉÓÃ

°ä²¼¹¦·ò 2023-09-13

1¡¢Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈ·þÎñÔݲ»³ÉÓÃ


¾ÝýÌå9ÔÂ12ÈÕ±¨Â· £¬Ã׸ß÷¹ú¼Ê¾Æµê¼¯ÍÅ(MGM Resorts International)й©ÆäÔÚ´¦ÖÃÓ°Ï첿ÃÅϵͳµÄÍøÂ簲ȫÎÊÌâ¡£¶È¼Ù´åµÄϵͳ×ÔÉÏÖÜÈÕÍíÉÏÆðÍ·¹Ø¹Ø £¬ËùÓÐʹÓÃÓëÖ÷ÍøÕ¾Ò»ÑùÓòÃû£¨¼´mgmresorts.com£©µÄÍøÕ¾ÒÑÖжÏ £¬MGM RewardsÀûÓ÷¨Ê½ÎÞ·¨ÔËÐС£ÀÏ»¢»ú¡¢ATM»úºÍÐÅÓþ¿¨É豸¶¼Êܵ½ÁËÓ°Ïì £¬Ò»Ð©¿ÍÈË»¹³Æ·¿¼äÔ¿³×ÎÞ·¨Ê¹Óá£´Ë±í £¬Ã׸ß÷ÆìϾƵ꣨Ô̺¬Bellagio Hotel£©µÄϵͳҲ³öÏÖ¹ÊÕÏ¡£Õâ´Î°²È«ÊÂÎñµÄÐÔÖÊÉÐδ¹«¿ª £¬¹¥»÷ÕßµÄÖ÷ÕÅÈÔ²»Ã÷È·¡£


https://therecord.media/mgm-resorts-offline-after-cyberattack


2¡¢Î¢Èí°ä²¼9Ô·ݰ²È«¸üн¨¸´Á½¸öÒѱ»ÀûÓõķì϶


΢ÈíÔÚ9ÔÂ12ÈÕ°ä²¼Á˱¾ÔµÄÖܶþ²¹¶¡ £¬×ܼƽ¨¸´ÁË59¸ö·ì϶ £¬ÆäÖÐÔ̺¬Á½¸öÒѱ»ÀûÓõķì϶¡£±»ÀûÓ÷ì϶±ðÀëÊÇMicrosoftÁ÷·þÎñ´úÀíÌáȨ·ì϶£¨CVE-2023-36802£©ºÍMicrosoft WordÐÅϢй¶·ì϶£¨CVE-2023-36761£©¡£Õâ´Î½¨¸´µÄÆäËü½ÏΪÑϳÁµÄ·ì϶ÊÇVisual StudioÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-36796¡¢CVE-2023-36792ºÍCVE-2023-36793£©¡¢Microsoft Azure Kubernetes·þÎñÌáȨ·ì϶£¨CVE-2023-29332£©ºÍInternetÏνӹ²Ïí(ICS)Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-38148£©¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2023-patch-tuesday-fixes-2-zero-days-59-flaws/


3¡¢ÀÕË÷ÍÅ»ïSnatch¹«¿ª¼ÓÄôó»¤Ê¿Ð­»áµÄ37 GBÊý¾Ý


¾Ý9ÔÂ12ÈÕ±¨Â· £¬¼ÓÄôó»¤Ê¿Ð­»á(CNA)й©ÆäÔâµ½ºÚ¿Í¹¥»÷µ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¸ÃЭ»á´ú±íÁ˼ÓÄôó½ü50ÍòÃû»¤Ê¿ £¬Æä½²»°È˳Ƹûú¹¹ÔÚ4ÔÂ3ÈÕÔâµ½¹¥»÷ £¬²¢Î´Ó°ÏìÆäÔËÓª £¬Ö»ÊÇÓ°ÏìÁ˲¿ÃÅϵͳ¡£Á½¸ö·ÖÆçµÄÀÕË÷ÍÅ»ïSnatchºÍNokoyawaÐû³Æ¶Ô5Ô·ݵĹ¥»÷ÕÆ¹Ü £¬µ«ÔÚ9ÔÂ1ÈÕ £¬Snatchй¶ÁËÀ´×ÔCNAµÄ37 GBÊý¾Ý¡£Snatch×î½ü»¹Ðû³Æ¹¥»÷ÁËÄϷǹú·À²¿²¢ÇÔÈ¡ÁË1.6 TBÊý¾Ý £¬µ«¶à¼ÒýÌå֤ʵ £¬Snatchй¶µÄÊý¾ÝÖÐÖÁÉÙÓÐÒ»²¿ÃÅÊǺϷ¨µÄ¡£


https://therecord.media/cna-confirms-data-incident


4¡¢Charming KittenÀûÓúóÃÅSponsor¹¥»÷ÖÁÉÙ34¼Ò¹«Ë¾


9ÔÂ11ÈÕ £¬ESETÅû¶ÁËCharming KittenÀûÓÃкóÃÅSponsorµÄ¹¥»÷»î¶¯Sponsoring Access¡£¸Ã»î¶¯µÄ³ÖÐø¹¦·òΪ2021Äê3ÔÂÖÁ2022Äê6Ô £¬Õë¶Ôµ±¾ÖºÍÒ½ÁƱ£½¡»ú¹¹ £¬ÒÔ¼°½ðÈÚ·þÎñ¡¢¹¤³Ì¡¢Ôì×÷¡¢¼¼Êõ¡¢Ë¾·¨ºÍµçÐŵÈÁìÓòµÄ¹«Ë¾ £¬Ä¿Ç°Òѹ¥»÷°ÍÎ÷¡¢ÒÔÉ«ÁкͰ¢À­²®½áºÏÇõ³¤¹úµÄÖÁÉÙ34¼Ò¹«Ë¾¡£¹¥»÷ÕßÀûÓÃMicrosoft Exchange RCE·ì϶£¨CVE-2021-26855£©»ñµÃ³õʼ½Ó¼ûȨÏÞ¡£SponsorÊÇÒ»¸öC++ºóÃÅ £¬ÓÃÓÚÍøÂçÖ÷»úÐÅÏ¢ £¬´¦Öýӹܵ½µÄÖ¸Áî²¢½«Á˾ַ¢ËͻطþÎñÆ÷¡£


https://www.welivesecurity.com/en/eset-research/sponsor-batch-filed-whiskers-ballistic-bobcats-scan-strike-backdoor/


5¡¢×êÑÐÈËÔ±·¢ÏÖ¿Éͨ¹ýWiFiÇÔÈ¡Êý×ÖÃÜÂëµÄWiKI-Eve¹¥»÷


ýÌå9ÔÂ11ÈÕ³Æ £¬Ò»ÖÖÃûΪWiKI-EveµÄÐÂÐ͹¥»÷Äܹ»À¹½ØÏνӵ½WiFi·ÓÉÆ÷µÄÖÇÄÜÊÖ»úµÄÃ÷ÎÄ´«Êä £¬²¢ÒԸߴï90%µÄÕýÈ·ÂÊ´§¶È³öµ¥¸öÊý×Ö»÷¼ü £¬À´ÇÔÈ¡Êý×ÖÃÜÂë¡£ÔÚ¹¥»÷µÄÖØÒª½×¶Î £¬¹¥»÷ÕßʹÓÃWiresharkµÈÁ÷Á¿¼à¿Ø¹¤¾ß²¶»ñÖ¸±êÊäÈëÃÜÂëÆÚ¼äµÄBFI£¨²¨Êø³ÉÐη´À¡ÐÅÏ¢£©¹¦·òÐòÁС£Ã¿´ÎÖ¸±ê°´Ï°´¼üʱ £¬³ÇÊÐÌìÉú¹ÖÒìµÄWiFiÐźÅ¡£¼Í¼µÄBFIÐòÁпÉÄÜ»áÍÌÍ»÷¼üÖ®¼äµÄ½çÏÞ £¬Òò¶ø×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖËã·¨ £¬ÓÃÓÚ½âÎöºÍ¸´Ô­¿ÉÓÃÊý¾Ý¡£³¢ÊÔÅú×¢ £¬ÔÚʹÓÃÏ¡ÉÙ¸´Ô­Ëã·¨ºÍÓò×ÔÊÊÓ¦µÄÇé¿öÏ £¬WiKI-EveµÄ»÷¼ü·ÖÀàµÄÕýÈ·Âʲ»±äÔÚ88.9%¡£


https://www.bleepingcomputer.com/news/security/new-wiki-eve-attack-can-steal-numerical-passwords-over-wifi/


6¡¢Kaspersky°ä²¼¹ØÓÚCubaÍŻﺹÇ༰TTPsµÄ·ÖÎö»ã±¨


9ÔÂ11ÈÕ £¬Kaspersky°ä²¼¹ØÓÚCubaÍŻﺹÇ༰TTPsµÄ·ÖÎö»ã±¨¡£CubaÓÚ2020Äêµ×³õ´ÎÒýÆð×êÑÐÈËԱȷ°ÑÎÈ £¬ÖØÒªÕë¶ÔÃÀ¹ú¡¢¼ÓÄôóºÍÅ·ÖÞ¡£¸ÃÍÅ»ïʹÓõĶñÒâÈí¼þÔ̺¬Bughatch¡¢Burntcigar¡¢Cobeacon¡¢Hancitor (Chanitor)¡¢Termite¡¢SystemBC¡¢Veeamp¡¢WedgecutºÍRomCOM RAT £¬¹¤¾ßÔ̺¬Mimikatz¡¢PowerShell¡¢PsExecºÍRemote Desktop Protocol £¬ÀûÓõķì϶Ô̺¬ProxyShell¡¢ProxyLogon¡¢Veeam·ì϶ºÍZeroLogon¡£´Ë±í £¬¸Ã»ã±¨»¹Ô̺¬ÁËCubaÓйØÊÂÎñµÄµ÷²é¼°¶ñÒâÈí¼þµÄ·ÖÎö¡£


https://securelist.com/cuba-ransomware/110533/