ºÚ¿ÍUSDoDÔÚ°µÍø¹«¿ª3500ÍòÌõLinkedInÓû§Êý¾Ý
°ä²¼¹¦·ò 2023-11-09¾ÝýÌå11ÔÂ7ÈÕ±¨Â·£¬ºÚ¿ÍUSDoDÔÚBreach ForumsÉÏй¶Á˳¬¹ý3500ÍòLinkedInÓû§µÄÐÅÏ¢¡£Ð¹Â¶µÄÊý¾Ý¿â·ÖΪÁ½²¿ÃÅ£¬Ò»²¿ÃÅÔ̺¬500ÍòÌõÓû§¼Í¼£¬µÚ¶þ²¿ÃÅÔ̺¬3500Íò±Ê¼Í¼¡£¸ÃºÚ¿Í°µÊ¾£¬×îеÄLinkedInÊý¾Ý¿âÊÇͨ¹ýÍøÂçץȡ»ñµÃµÄ¡£ÆäÖÐÔ̺¬Óû§ÐÕÃûºÍÓ×ÎÒ×ÊÁϵÈÐÅÏ¢£¬»¹ÓÐһЩÓʼþµØÖ·ÊôÓÚÃÀ¹úµ±¾ÖµÄ¸ß¼¶¹ÙÔ±ºÍ»ú¹¹¡£Í³Ò»ºÚ¿ÍÔÚÈ¥ÄêÔøÈëÇÖÁËFBI°²È«Æ½Ì¨InfraGard£¬²¢Ð¹Â¶ÁË87000ÃûÓû§µÄÐÅÏ¢¡£
https://www.hackread.com/hacker-leaks-scraped-linkedin-user-records/
2¡¢¶íÂÞ˹µÄ¹úÓд¢ÐîÒøÐÐSberbankÔâµ½DDoS¹¥»÷
¾Ý11ÔÂ8ÈÕ±¨Â·£¬¶íÂÞ˹Áª¹ú´¢ÐîÒøÐУ¨Sberbank£©Ôâµ½ÁË´ó¹æÄ£DDoS¹¥»÷¡£SberbankÊÇÒ»¼Ò¹úÓÐÒøÐкͽðÈÚ·þÎñ¹«Ë¾£¬Ò²ÊǶíÂÞ˹×î´óµÄ½ðÈÚ»ú¹¹£¬³ÖÓиùúÔ¼Èý·ÖÖ®Ò»µÄ×ʲú¡£¶íÂÞ˹ýÌåInterfax³Æ£¬¹¥»÷ԼĪÔÚÁ½ÖÜǰ£¬´ïµ½ÁËÿÃë100Íò¸öÒªÇó(RPS)£¬ÕâԼĪÊǸÃÒøÐÐÆù½ñΪֹÔâµ½µÄ×î´ó¹æÄ£DDoS¹¥»÷µÄËı¶¡£¸Ã»ú¹¹»¹Ð¹Â©ÕâÊÇһЩеĺڿͣ¬Ò²¾ÍÊÇ˵£¬Ä¿Ç°³öÏÖÁËһЩÐµĹ¥»÷ÍŻËûÃÇÆðͷϵͳÐԵع¥»÷¶íÂÞ˹×î´óµÄÒøÐС£
https://www.bleepingcomputer.com/news/security/russian-state-owned-sberbank-hit-by-1-million-rps-ddos-attack/
3¡¢×êÑÐÈËÔ±Åû¶BlueNorOffÀûÓÃÐÂObjCShellzµÄ¹¥»÷
JamfÔÚ11ÔÂ7ÈÕÅû¶BlueNorOffÍÅ»ïÀûÓÃÐÂmacOS¶ñÒâÈí¼þObjCShellzµÄ¹¥»÷»î¶¯¡£×êÑÐÈËÔ±Ê×ÏÈ·¢ÏÖÁËÒ»¸öMach-OͨÓöþ½øÔìÎļþÓëËûÃÇ֮ǰ¹éÀàΪ¶ñÒâµÄÓò½øÐÐͨѶ£¬±»·¢ÏÖʱËüÔÚVirusTotalÉϵļì²âÂÊΪÁã¡£ObjCShellzÊÇ»ùÓÚObjective-CµÄ¶ñÒâÈí¼þ£¬³äÈÎÔ¶³Ìshell£¬ÓÃÓÚÔÚ±»Ï°È¾µÄϵͳÉÏÖ´ÐкÅÁĿǰÉв»Ã÷ÏÔ¹¥»÷µÄ³õʼ½Ó¼ûÔØÌ壬µ«¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ¹¥»÷ºóÆÚÓÃÓÚÔÚÈëÇÖϵͳºóÊÖ¶¯Ö´ÐкÅÁî¡£
https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/
4¡¢²¿ÃÅOutlookÓû§ÔÚ·¢ËÍÔ̺¬¸½¼þµÄÓʼþʱ»á±¨´í
11ÔÂ7ÈÕ±¨Â·³Æ£¬Î¢ÈíÌáÐÑOutlook.comÓû§ÔÚ·¢ËÍÔ̺¬¸½¼þµÄµç×ÓÓʼþʱ¿ÉÄÜ»áÓöµ½ÎÊÌâ¡£ÊܸÃÎÊÌâÓ°ÏìµÄÓû§ÔÚ³¢ÊÔ·¢Ë͵ç×ÓÓʼþʱ»áÊÕµ½ÃýÎóÌáÐÑ"Error code 550 5.7.520 Message blocked"¡£Î¢ÈíÌṩÁËÒ»ÖÖһʱ½â¾ö²½Ö裬ʹÊÜÓ°ÏìµÄÓû§¿ÉÄܹ²ÏíÎļþ£º½«ÎļþÉÏ´«µ½OneDrive²¢ÓëÊÕ¼þÈ˹²ÏíÁ´½Ó¡£7Ô·ݣ¬Î¢ÈíÔø½â¾öÁËÌáÐÑ401Òì³£ÃýÎó²¢×èÖ¹OutlookÓû§ËÑË÷ÓʼþµÄÎÊÌâ¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-some-outlookcom-users-cant-send-emails-with-attachments/
5¡¢SideCopyÀûÓÃ×îеÄWinRAR·ì϶¹¥»÷Ó¡¶ÈµÄ¾üÕþ»ú¹¹
11ÔÂ6ÈÕ£¬SEQRITE Labs APT-Team³ÆÆä·¢ÏÖÁËÔÚ´Óǰ¼¸¸öÔÂÕë¶ÔÓ¡¶Èµ±¾ÖºÍ¹ú·À»ú¹¹µÄ¶à¸öSideCopy¹¥»÷»î¶¯¡£SideCopyÖÁÉÙ´Ó2019ÄêÆðÍ·»îÔ¾£¬±»ÒÉ»óÊÇTransparent TribeµÄÒ»¸ö×ÓÍŻ¸ÃÍÅ»ïĿǰÔÚÀûÓÃ×îеÄWinRAR·ì϶£¨CVE-2023-38831£©À´·Ö·¢AllaKore RAT¡¢DRatºÍÆäËüpayload¡£SEQRITE³ÆÕâÊÇ¶àÆ½Ì¨¹¥»÷»î¶¯£¬Ëü»¹Í¨¹ý¼æÈݰ汾µÄAres RATÈëÇÖLinuxϵͳ¡£
https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/
6¡¢IBM°ä²¼GootloaderбäÌåGootBotµÄ·ÖÎö»ã±¨
11ÔÂ6ÈÕ£¬IBM X-Force°ä²¼Á˹ØÓÚGootloaderбäÌåGootBotµÄ·ÖÎö»ã±¨¡£¹¥»÷Õß¿ª·¢ÁËÒ»ÖÖÐÂÐÍC2ºÍºáÏòÒÆ¶¯¹¤¾ßGootBot£¬ÓÃÓÚ°ü°ìCobaltStrikeµÈÆäËü´«Í³µÄÀûÓÿò¼Ü¡£Ä¿Ç°¹Û²ìµ½µÄ»î¶¯ÀûÓÃSEOÖж¾½øÐзַ¢¡£Ï°È¾ºó£¬´óÁ¿GootBotÖ²È뷨ʽ»áÔÚÕû¸öÆóÒµ»·¾³Öд«²¼£¬Ã¿¸öÖ²È뷨ʽ¶¼Ô̺¬·ÖÆçµÄÓ²±àÂëC2·þÎñÆ÷£¬Òò¶øºÜÄѱ»×èÖ¹¡£GootBotÔÚVirusTotalÉϵļì²âÂÊΪÁã¡£Gootloader»¹³äÈγõʼ½Ó¼ûÌṩÕߣ¬¿ÉÄÜ»á·Ö·¢ÀÕË÷Èí¼þ¡£
https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/


¾©¹«Íø°²±¸11010802024551ºÅ