LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼Ê·¨ÂÉÐж¯¶øÍß½â
°ä²¼¹¦·ò 2024-02-212ÔÂ20ÈÕ£¬À´×Ô 11 ¸ö¹ú¶ÈµÄ·¨ÂÉ»ú¹¹·¢Õ¹µÄ´úºÅΪ¡°¿ËÂÞŵ˹Ðж¯¡±µÄ½áºÏ·¨ÂÉÐж¯£¬Éæ¼°LockBitÀÕË÷ÍŻÆäÍøÕ¾ÒѾ±»½ÚÔì¡£×Ô 2019 Äêµ×³öÏÖÒÔÀ´£¬¸Ã×éÖ¯µÄ¹æÄ£Ô¶Ô¶³¬¹ýÆäËûÀÕË÷Èí¼þÍŻRecorded Future µÄ×êÑÐÈËÔ±½«½ü 2,300 Æð¹¥»÷¹éÒòÓÚ¸Ã×éÖ¯¡£Conti Êǵڶþ»îÔ¾µÄ×éÖ¯£¬½ö¹«¿ªÓë 883 Æð¹¥»÷Óйء£×Ô 2020 Äê 1 ÔÂÒÔÀ´£¬ÀûÓà LockBit µÄ´ÓÊô»ú¹¹Òѽ«Ö¸±êËø¶¨ÔÚ½ðÈÚ·þÎñ¡¢Ê³Æ·ºÍũҵ¡¢½ÌÓý¡¢ÄÜÔ´µÈ¹Ø¼ü»ù´¡ÉèÊ©ÁìÓòµÄ¸÷Àà¹æÄ£µÄ×éÖ¯¡£µ±¾ÖºÍ´¹Î£·þÎñ¡¢Ò½ÁƱ£½¡¡¢Ôì×÷ºÍÔËÊä¡£
https://therecord.media/lockbit-ransomware-disrupted-international-operation
2.Cactus ÀÕË÷Èí¼þÐû³ÆÇÔÈ¡ 1.5TB Ê©ÄÍµÂµçÆøÊý¾Ý
2ÔÂ19ÈÕ£¬Cactus ÀÕË÷Èí¼þÍÅ»ïÐû³Æ£¬ËûÃÇÉϸöÔÂÈëÇÖÊ©ÄÍµÂµçÆøÍøÂçºóÇÔÈ¡ÁË 1.5TB µÄÊý¾Ý¡£²¢ÔÚ°µÍøÐ¹Â¶ÍøÕ¾ÉÏ»¹Ð¹Â¶ÁË 25MB µÄ¾Ý³Æ±»µÁÊý¾Ý£¬×÷ΪÍþвÐÐΪÕßÐû³ÆµÄÖ¤¾Ý£¬´Ë±í»¹ÓÐÏÔʾ¼¸ÃûÃÀ¹ú¹«Ãñ»¤Õպͱ£ÃܺÍ̸ÎļþɨÃèµÄ¿ìÕÕ¡£¸ÃÍÅ»ïĿǰÔÚÀÕË÷¸Ã¹«Ë¾£¬²¢Íþв³Æ£¬ÈôÊDz»Ö§¸¶Êê½ð£¬¾Í»áй¶ËùÓоݳƱ»µÁµÄÊý¾Ý¡£Ä¿Ç°Éв»Ã÷ÏÔ¾ßÌåµÄÊý¾Ý±»µÁ£¬µ«Ê©ÄÍµÂµçÆøµÄ¿É³ÖÐø·¢Õ¹ÒµÎñ²¿ÃÅΪȫÇòºÜ¶à³ÛÃû¹«Ë¾Ìṩ¿ÉÔÙÉúÄÜÔ´ºÍ¼à¹ÜºÏ¹æÕ÷ѯ·þÎñ£¬Ô̺¬ Allegiant Travel Company¡¢Clorox¡¢DHL¡¢¶Å¹ú¡¢Ï£¶û¶Ù¡¢ÀûÃË¡¢°ÙÊ¿ÉÀÖºÍÎÖ¶ûÂê¡£¼øÓÚ´Ë£¬´ÓÆäÖ¸±êϵͳÖÐÇÔÈ¡µÄÊý¾Ý¿ÉÄÜÔ̺¬Óйؿͻ§¹¤Òµ½ÚÔìºÍ×Ô¶¯»¯ÏµÍ³µÄÃô¸ÐÐÅÏ¢ÒÔ¼°Óйػ·¾³ºÍÄÜÔ´ÂÉÀýºÏ¹æÐÔµÄÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/cactus-ransomware-claim-to-steal-15tb-of-schneider-electric-data/
3.Wyze ÉãÏñÍ·¹ÊÕϵ¼Ö³¬¹ý 13000 Óû§ÊÜÓ°Ïì
2ÔÂ19ÈÕ£¬Wyze ·ÖÏíÁËÓ°ÏìÊýǧÃûÓû§µÄ°²È«ÊÂÎñµÄ¸ü¶àϸ½Ú£¬¸Ã¹«Ë¾½«Æä¹é×ïÓÚ×î½üÔö³¤µ½ÆäϵͳÖеĵÚÈý·½»º´æ¿Í»§¶Ë¿â£¬¸Ã¿âÔÚ´¦ÖÃÖÜÎå´óÁìÓòÍ£µçºóͬʱÉÏÏߵĴóÁ¿ÉãÏñ»úʱ³öÏÖÎÊÌâ¡£¡°Õâ´ÎÖжÏÊÇÓÉGA»Æ½ð¼×ºÏ×÷ͬ°é AWS Ôì³ÉµÄ£¬ÖÜÎåÁ賿 Wyze É豸ͣ»úÁ˼¸¸öÓ×ʱ¡£ÈôÊÇÄúÔÚÕâ¶Î¹¦·òÄÚ³¢ÊԲ鿴ʵʱÉãÏñÍ·»ò»î¶¯£¬Äú¿ÉÄÜÎÞ·¨ÅÔ¹Û¡£¶ÔÓÚ¸øÄú´øÀ´µÄ´ì°Ü¸ÐºÍ²ÂÒÉ£¬ÎÒÃÇÉî±íǸÒâÕâµ¼ÖÂÁË¡±¸Ã¹«Ë¾ÔÚ·¢Ë͸øÊÜÓ°ÏìÓû§µÄµç×ÓÓʼþÖаµÊ¾¡£Wyze °µÊ¾£¬³öÏÖÕâÖÖÇé¿öÊÇÓÉÓÚÐèÒªºöÈ»Ôö³¤£¬µ¼ÖÂÉ豸 ID ºÍÓû§ ID Ó³Éä»ìºÏ£¬µ¼ÖÂijЩÊý¾ÝÓë²»ÕýÈ·µÄÓû§ÕÊ»§ÃýÎóÏνӡ£Òò¶ø£¬¿Í»§Äܹ»ÔÚµã»÷ Wyze ÀûÓ÷¨Ê½µÄ¡°ÊÂÎñ¡±Ñ¡ÏÖеÄÏà»úËõÂÔͼºó¿´µ½ÆäËûÈ˵ÄÊÓÆµÔ´ËõÂÔͼ£¬ÔÚijЩÇé¿öÏÂÉõÖÁÄܹ»¿´µ½ÊÓÆµÆ¬¶Î¡£
https://www.bleepingcomputer.com/news/security/wyze-camera-glitch-gave-13-000-users-a-peek-into-other-homes/
4.Linux ÄÚºËȱµã (CVE-2024-0646) Ê¹ÏµÍ³Ãæ¶ÔȨÏÞÌáÉý
2ÔÂ19ÈÕ£¬Linux Äں˴«Êä²ã°²È«ÐÔ (kTLS) Öеķì϶(CVE-2024-0646)¿ÉÄܱ»±¾µØÓû§ÀûÓÃÀ´»ñÈ¡ÌáÉýµÄϵͳȨÏÞ»òÖжÏϵͳ²Ù×÷¡£ÐÒÔ˵ÄÊÇ£¬´Ë¿ÌÒѾÌṩÁËÕë¶Ô´Ë·ì϶µÄ²¹¶¡¡£kTLS ½«¸ù»ùµÄ TLS ¼ÓÃܺÍÉí·ÝÑéÖ¤Ö°ÄÜÖ±½ÓÒýÈë Linux Äںˡ£Õâ¼ò»¯Á˸ù»ù»¥ÁªÍøºÍ̸µÄ°²È«Í¨Ñ¶£¬ÀýÈç HTTPS£¨°²È«ÍøÒ³ä¯ÀÀ£©¡¢µç×ÓÓʼþºÍÆäËû»¥ÁªÍøÏνÓÀûÓ÷¨Ê½¡£¸Ã·ì϶µÄÐÔÖÊÔÚÓÚŲÓÃsplice() ʱÄÚ´æ´¦Öò»µ±¡£KTLS ´úÂëÎÞ·¨ÕýÈ·¸üÐÂÃ÷ÎÄ·ÖÉ¢ÍøÂ绺³åÇø ( struct sk_msg_sg ) µÄÄÚ²¿¼ÇÕÊ ( curr/copybreak ) £¬´Ó¶øµ¼ÖÂÔ½½çÄÚ´æÐ´Èëȱµã¡£ÄÚ´æÖÎÀíÖеÄÕâÖÖʧÎó¿ÉÄÜ»áÔÊÐíºóÐø¶ÔÌ×½Ó×ÖµÄдÈ븲¸ÇÆ´½ÓÒ³ÃæµÄÄÚÈÝ£¬´Ó¶øÎ£ÏÕµØÔ̺¬Å²ÓÃÕß²»Ó¦ÓµÓÐд½Ó¼ûȨÏÞµÄÎļþÖеÄÒ³Ãæ¡£¹¥»÷Õß¿ÉÄÜ»áÀûÓô˷ì϶ÒÔ·ÇÔ¤ÆÚµÄϵͳȨÏÞµ¼Ö´úÂëÒâ±íÖ´ÐС£
https://securityonline.info/linux-kernel-flaw-cve-2024-0646-exposes-systems-to-privilege-escalation/
5.Android ÒøÐÐľÂí Anatsa ¾íÍÁ³ÁÀ´ÐÂÔö˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË
2ÔÂ19ÈÕ£¬ThreatFabric µÄ×êÑÐÈËÔ±¹Û²ìµ½AnatsaÒøÐÐľÂí£¨±ðÃû TeaBot ºÍ Toddler£©¾íÍÁ³ÁÀ´¡£11 ÔÂÖÁ 2 ÔÂÆÚ¼ä£¬×¨¼ÒÃǹ۲쵽ÁËÎ岨·ÖÆçµÄ¹¥»÷£¬Ã¿Ò»²¨¶¼¼¯ÖÐÔÚ·ÖÆçµÄµØÓò¡£¸Ã¶ñÒâÈí¼þ´ËÇ°ÖØÒªÕë¶ÔÓ¢¹ú¡¢µÂ¹úºÍÎ÷°àÑÀ½øÐл£¬µ«×îеĻÕë¶ÔµÄÊÇ˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿˣ¬ÕâÅú×¢ÆäÔËÓªÕ½Êõ²úÉúÁËת±ä¡£×êÑÐÈËÔ±½« Anatsa µÄ»î¶¯¹éÀàΪ¡°ÓÐÕë¶ÔÐÔ¡±£¬¹Û²ìµ½ÍþвÐÐΪÕßÒ»´Î¼¯ÖÐÓÚ 3-5 ¸öÇøÓò¡£¾Ý ThreatFabric ³Æ£¬Í¶·ÅÆ÷ÀûÓ÷¨Ê½ÒÑÉÏ´«µ½Ö¸±êÇøÓòµÄ Google Play ÉÏ¡£¹¥»÷Õß°ÑÎȵ½ÕâЩÀûÓ÷¨Ê½Ê±Ê±½øÈë¡°ÈȵãÐÂÃâ·Ñ¡±Àà±ðÖеÄǰÈýÃû£¬ÊÔͼºýŪÓû§ÏàПÃÀûÓ÷¨Ê½ÊǺϷ¨µÄ²¢ÓдóÁ¿Óû§ÏÂÔØ¡£
https://securityaffairs.com/159344/malware/anatsa-banking-trojan-resurgence.html
6.³¬¹ý 28500 ̨ Exchange ·þÎñÆ÷Ò×ÊÜ×Ô¶¯ÀûÓõķì϶¹¥»÷
https://www.bleepingcomputer.com/news/security/over-28-500-exchange-servers-vulnerable-to-actively-exploited-bug/


¾©¹«Íø°²±¸11010802024551ºÅ