΢ÈíÖÒ¸æºÏ·¨ÎļþÍйܷþÎñ³ÉÍøÂç´¹µöÐÂÇþ·
°ä²¼¹¦·ò 2024-10-091. ΢ÈíÖÒ¸æºÏ·¨ÎļþÍйܷþÎñ³ÉÍøÂç´¹µöÐÂÇþ·
10ÔÂ8ÈÕ£¬Microsoft Threat Intelligence»ã±¨Ö¸³ö£¬ÀûÓÃSharePoint¡¢OneDriveºÍDropboxµÈºÏ·¨ÎļþÍйܷþÎñÌáÒéµÄóÒ×µç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂç´¹µö»î¶¯ÔÚÉÏÉý¡£ÕâЩ»î¶¯×Ô2024Äê4ÔÂÖÐÑ®ÆðÍ·£¬Ñ¡È¡¸´ÔÓ·ÀÓù¶ã±Ü¼¼ÊõÈÆ¹ý°²È«´ëÊ©£¬µ¼ÖÂÉí·ÝµÁÓá¢É豸ʧÇÔ£¬ÉõÖÁÒý·¢¼ÒÎñڲơ¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒÆ¶¯¡£ÎļþÍйܷþÎñËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁË·½±ã£¬µ«Ò²Òò¿í·ºÊ¹Óöø³ÉΪ¹¥»÷ÕßµÄÖ¸±ê¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÀµÕË»§È¨ÏÞ£¬ÀÄÓÃÆ½Ì¨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅÆðÔ´µÄ¶ñÒâÎļþ»òÁ´½Ó£¬±Ü¿ª´«Í³¼ì²â¡£Î¢Èí·¢ÏÖ£¬Ï޶ȽӼûºÍÖ»¶ÁÎļþÕ½Êõ±»¿í·ºÀûÓÃÒÔÌӱܰ²Õûϵͳ¼ì²â£¬Ê¹°²È«É¨ÃèºÍ·ÖÎö¶ñÒâÁ´½Ó±äµÃÄÑÌâ¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÀµ¹©¸øÉÌÕË»§£¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÖ¸±ê×éÖ¯¹²Ïí£¬ÀûÓÃÐÅÀµ¹ØÏµÈƹý°²È«¹ýÂËÆ÷¡£¹¥»÷Õß»¹»á¼ÙÒâITÖ§³Ö»òÖÎÀíÔ±£¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§´ò¿ªÎļþ¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý£¬¾Í»á±»³Á¶¨Ïòµ½¶ñÒâÖÐÑëÈËÍøÂç´¹µöÒ³Ãæ£¬ÒªÇóÌṩÃÜÂëºÍʵÏÖ¶à³É·ÖÉí·ÝÑéÖ¤£¬¹¥»÷Õß´Ó¶ø²¶»ñ»á»°ÁîÅÆ½øÇ°½øÒ»²½ÀûÓá£
https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/
2. GoldenJackal APT×éÖ¯Í»ÆÆÅ·ÖÞµ±¾Ö¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ8ÈÕ£¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×éÖ¯ÀûÓÃÁ½Ì××Ô½ç˵¹¤¾ß³É¹¦ÉøÈëÁËÅ·ÖÞµ±¾ÖµÄ¸ôÀëϵͳ£¬ÇÔÈ¡ÁËÔ̺¬µç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý¡£¾ÝESET»ã±¨£¬¸Ã×éÖ¯ÖÁÉÙÁ½´ÎÖ´ÐдËÀ๥»÷£¬Ò»´ÎÕë¶ÔÄÏÑǹú¶Èפ°×¶íÂÞ˹´óʹ¹Ý£¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞµ±¾Ö×éÖ¯¡£¹¥»÷ʼÓÚϰȾ»¥ÁªÍøÏνÓϵͳ£¬ÀûÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓ㬲¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´Ôì¶ñÒâ×é¼þ¡£Ëæºó£¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢£¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Ê仨Ôʼ»¥ÁªÍøÏνÓϵͳ£¬×îÖÕ·¢Ë͸ø¹¥»÷ÕߵĺÅÁîºÍ½ÚÔì·þÎñÆ÷¡£GoldenHowl×÷Ϊ¶àÖ°ÄÜPythonºóÃÅ£¬ÔÚÏνӻ¥ÁªÍøµÄ»úеÉÏÔËÐУ¬ÊµÏÖÎļþÇÔÈ¡¡¢ÓƾÃÐÔά³Ö¡¢·ì϶ɨÃèºÍC2ͨѶ¡£
https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/
3. Red BarrelsÔâ³Á´óÍøÂç¹¥»÷£¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì
10ÔÂ4ÈÕ£¬¹ãÊÜºÃÆÀµÄ¿Ö²ÀÓÎϷϵÁÓ×¶Outlast¡·µÄÔì×÷¹«Ë¾Red Barrels°ä·¢£¬ÆäÔâ·êÁËÒ»´Î³Á´óÍøÂç¹¥»÷£¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬¿ª·¢¹¦·ò±í±»´òÂÒ¡£Ö»¹Ü¹«Ë¾Î´Ð¹Â©ÈëÇֵľßÌåϸ½Ú£¬µ«ÓÐÐÂÎųƹ¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Í¼¼°¹«Ë¾ÐÅÓþ¿¨¾ßÌåÐÅÏ¢µÈ´óÁ¿ÓмÛÖµµÄÐÅÏ¢¡£Red BarrelsѸ¿ì²ÉÈ¡Ðж¯£¬ÀñÆ¸ÍøÂ簲ȫר¼Òµ÷²éÊÂÎñ²¢Í¨ÖªÓйØÀûÒæ·½ºÍµ±¾Ö£¬Í¬Ê±²ÉÈ¡´ëʩȷ±£ÏµÍ³°²È«¡£È»¶ø£¬Õâ´Î¹¥»÷¶Ô¹¤×÷ÊÒµÄÔËÓª²úÉúÁ˾޴óÓ°Ï죬µ¼ÖÂÔì×÷¹¦·ò±íÊܵ½³Á´óÓ°Ï죬²¿ÃÅÏîÄ¿²»µÃ²»ÍƳ١£Õâ¶ÔµÈ´ý¡¶ÌÓÉúÊÔÁ¶¡·°ä²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö½ø¹¥¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂ簲ȫµÄ³Ðŵ£¬²¢°µÊ¾½«³ÖÐøÖ´ÐÐ×î¼Ñʵ¼Ê´ëÊ©£¬È·±£ÎªÔ±¹¤Ìṩ°²È«»·¾³¡£¾Ý±¨Â·£¬µ÷²éÒÑʵÏÖ£¬ÊÂÎñÒѵõ½½ÚÔ죬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»á³ÖÐøÒ»¶Î¹¦·ò¡£
https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/
4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank£¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì
10ÔÂ6ÈÕ£¬¿µ¿¨Ë¹ÌØÓÐÏßͨѶ¹«Ë¾ (Comcast) ºÍ Truist Bank ½üÈÕÅû¶£¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶ÊÂÎñµÄÓ°Ï죬ÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹£¬½ñÄê4Ô´«µÝÁËһ·²úÉúÔÚ2ÔÂÖÁ2ÔÂÆÚ¼äµÄÊý¾Ýй¶ÊÂÎñ£¬ÍþвÐÐΪÕßÈëÇÔìäÍøÂç²¢ÇÔÈ¡ÁË´óÁ¿Ó×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝÊ»ÅÆÕÕºÅÂë»òÉí·ÝÖ¤µÈ¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË£¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË¡£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò»£¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ï죬¶øTruistµÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδ°ä²¼¡£FBCSµÄ²ÆÕþÇé¿ö¶ñ»¯£¬ÊÜÊÂÎñ¼ä½ÓÓ°ÏìµÄʵÌåÐè×Ôǰ½øÐÐ֪ͨºÍ²¹¾È·¨Ê½¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤·þÎñ¡£È¥Äê6Ô£¬Truist BankÒ²ÔøÖ¤ÊµÒ»Â·µ¥¶ÀµÄÎ¥¹æÐÐΪ£¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/
5. È«ÇòÒôÀÖ¼¯ÍÅ680ÃûÓ×ÎÒÐÅÏ¢Ôâй¶£¬Ìṩ24¸öÔÂÐÅÓþ¼à¿Ø·þÎñ
10ÔÂ7ÈÕ£¬È«ÇòÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâ·êÁËÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂ680ÃûÓ×ÎÒµÄÃô¸ÐÐÅÏ¢£¬Ô̺¬Éç»á°²È«ºÅÂëµÈ£¬±»·¸·¨»ñÈ¡¡£¸ÃÊÂÎñÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢ÏÖ¡£¾ÝϤ£¬È«ÇòÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿ÀûÓ÷¨Ê½Öмà²âµ½Î´¾ÊÚȨµÄ»î¶¯£¬Ëæ¼´Æô¶¯´¹Î£ÏìÓ¦»úÔ죬ÀñƸµÚÈý·½×¨¼Ò·¢Õ¹È«Ãæµ÷²éÓë²¹¾È´ëÊ©¡£¾¹ýһϵÁÐÉó²é£¬¹«Ë¾È·ÈÏÓ×ÎÒÐÅÏ¢Òѱ»Î´¾ÊÚȨµÄµÚÈý·½»ñÈ¡£¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²éÁË¾Öºó£¬Æ¾¾Ý˾·¨ÒªÇó£¬ÏòÊÜÓ°ÏìµÄÓ×ÎÒ·¢³öÁËÊý¾Ýй¶֪ͨ¡£ÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼°£¬Ð¹Â¶ÐÅÏ¢Ô̺¬ÐÕÃû¼°Éç»á°²È«ºÅÂëµÈ¡£Ä¿Ç°£¬È«ÇòÒôÀÖ¼¯ÍÅÉÐδ·¢ÏÖÊý¾Ý±»µÁÓõÄÇé¿ö£¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸ö±ðµÄ²ÆÕþ°²È«£¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£ÖÁÓÚÕâ´Î°²È«·ì϶µÄ¾ßÌå¼¼Êõϸ½Ú£¬È«ÇòÒôÀÖ¼¯ÍÅδÓèй©£¬Í¬Ê±£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§Î¬³Ö¸ß¶È¾¯Ì裬Ç×êǹØ×¢ÈκÎÒì³£½ðÈڻ¼£Ïó¡£
https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html
6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜÇ®±ÒÆ×Ó¶ÌÔÝÈëÇÖ£¬Íƹã¼ÙÀָߴú±Ò
10ÔÂ7ÈÕ£¬ÀÖ¸ßÍøÕ¾Ôâ·êÁ˼ÓÃÜÇ®±ÒÆ×ӵĶÌÔÝÈëÇÖ¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ù´úÌæÎªÐû´«¼ÙÀָߴú±ÒµÄͼƬ£¬Ðû³Æ¿ÉÓÃÒÔÌ«·»²É°ì²¢½âËø°ÂÃØ¼Î½±¡£Õâ´ÎÈëÇÖ²úÉúÔÚÃÀ¹ú¶«²¿¹¦·ò10ÔÂ5ÈÕÍíÉÏ9µã£¬³ÖÐøÔ¼75·ÖÖÓ£¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å¸´Ô¡£Óë³£¼ûµÄ¼ÓÃÜÇ®±ÒȦÌ×·ÖÆç£¬¸ÃȦÌײ¢Î´Êèµ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú£¬¶øÊǽ«½Ó¼ûÕß´øµ½Uniswapƽ̨²É°ìȦÌ×´ú±Ò¡£ÀÖ¸ß֤ʵÁËÕâ´ÎÊÂÎñ£¬µ«Î´Ð¹Â©ÈëÇÖϸ½Ú£¬°µÊ¾Ã»ÓÐЧ»§ÕË»§±»µÁ£¬¿Í»§¿ÉÕý³£¹ºÎ²¢ÒѲÉÈ¡´ëʩԤ·ÀÔٴβúÉú¡£Õâ´Î¹¥»÷×ÜÌåʧ°Ü£¬½öÉÙÊýÈ˲ɰìÁËÀָߴú±Ò¡£ÁîÈ˾ªÑȵÄÊÇ£¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜȦÌ×£¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½Ê½¡£Í¨³££¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript£¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓþ¿¨Êý¾Ý£¬ÓÃÓÚÀÕË÷¡¢ÏúÊÛ»òÔÚÏßڲơ£
https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/


¾©¹«Íø°²±¸11010802024551ºÅ