ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø
°ä²¼¹¦·ò 2024-12-031. ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø
12ÔÂ1ÈÕ£¬Îڸɴﵱ¾Ö¹ÙԱ֤ʵ£¬¹ú¶ÈÖÐÑëÒøÐÐϵͳÔâ·êÁËÒÔ¾¼ÃΪÖ÷Õŵĺڿ͹¥»÷¡£²ÆÕþ²¿¸ß¼¶¹ÙÔ±°µÊ¾£¬Ö»¹ÜµÄÈ·²úÉúÁ˺ڿÍÈëÇÖÊÂÎñ£¬µ«Çé¿ö²¢Î´È籨·°ãÑϳÁ£¬Ä¿Ç°Éó¼ÆºÍµ÷²é¹¤×÷ÒѽøÈëβÉù¡£¾ÝÎڸɴïÒøÐÐй©£¬ËûÃÇÔÚ¹²Í¬¾¯·½¶ÔÒ»Â·ÉæÏÓ¾³±íºÚ¿ÍÇÔÈ¡620ÒÚÏÈÁԼ1680ÍòÃÀÔª£©µÄ°¸¼þ½øÐе÷²é¡£¾Ý³Æ£¬Ò»¸ö×Գơ°Waste¡±µÄ¶«ÄÏÑǺڿÍ×éÖ¯¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬ËûÃÇÔÚ11Ô³õÈëÇÖÁËÎڸɴïÒøÐÐϵͳ²¢×ªÒÆÁË×Ê½ð£¬ÆäÖв¿ÃÅ×ʽð±»×ªÖÁÈÕ±¾ÕË»§¡£ÎڸɴïÖÐÑëÒøÐÐÒÑ×·»ØÒ»°ëÒÔÉϱ»µÁ×ʽ𣬵«ÈÔÓв¿ÃÅ×ʽð±»ÌáÈ¡»ò×ªÒÆÖÁÆäËû¹ú¶È£¬ÈçÓ¢¹úµÄÕË»§±»¶³½áÁË700ÍòÃÀÔª£¬¶ø¸Ã×éÖ¯ÔÚÈÕ±¾ÔòÊÕµ½ÁË600ÍòÃÀÔª¡£Õâ´ÎÊÂÎñÒýÆðÁË·ñ¾öµ³ÒéÔ±µÄÕ𾪺͹Ø×¢£¬ËûÃǺôÓõµ±¾ÖÌṩ¸ü¶àÐÅÏ¢ÒÔÔ®ÊÖ¹«¼ÒÏàʶÊÂÎñÕæÏࡣĿǰ£¬Óйز¿ÃÅÈÔÔÚ³ÖÐøµ÷²éÕâ´ÎºÚ¿Í¹¥»÷µÄ¾ßÌåϸ½ÚºÍËðʧÇé¿ö¡£
https://securityaffairs.com/171562/security/financially-motivated-threat-actors-hacked-ugandas-central-bank.html
2. ÐÂÐÍÍøÂç´¹µö¹¥»÷ÀûÓðܻµµÄWordÎĵµÈƹý°²È«¼ì²â
12ÔÂ1ÈÕ£¬Ò»ÖÖÐÂÏʵÄÍøÂç´¹µö¹¥»÷·½Ê½ÀûÓÃÁËMicrosoft WordµÄÎļþ¸´ÔÖ°ÄÜ£¬Í¨¹ý·¢ËͰܻµµÄWordÎĵµ×÷Ϊµç×ÓÓʼþ¸½¼þÀ´Èƹý°²È«Èí¼þµÄ¼ì²â¡£ÕâЩ¸½¼þ¼Ù×°³ÉÀ´×Ô¹¤×ʺÍÈËÁ¦×ÊÔ´²¿ÃŵÄÔ±¹¤¸£ÀûºÍ½±½ð֪ͨ£¬ÎļþÃûÖÐÔ̺¬base64±àÂëµÄ×Ö·û´®£¬½âÂëºóΪһ´®Ëæ»úÎı¾¡£µ±½Ó¹ÜÕß³¢ÊÔ´ò¿ªÕâЩ°Ü»µµÄÎĵµÊ±£¬Word»áÌáÐѸ´ÔÎļþ£¬¶ø¸´ÔºóµÄÎĵµ»áÏÔʾһ¸öÓÕµ¼Óû§É¨Ãè¶þάÂëÒÔ¼ìË÷ÎĵµµÄÌáÐÑ£¬¶þάÂëÁ´½Óµ½µÄÔòÊÇÒ»¸ö¼Ù×°³ÉMicrosoftµÇÂ¼Ò³ÃæµÄ´¹µöÍøÕ¾£¬Ö¼ÔÚÇÔÈ¡Óû§Í´´¦¡£ÓÉÓÚÕâЩÎļþÔÚ²Ù×÷ϵͳÄڳɹ¦ÔËÐе«Î´ÄÜÕë¶ÔÆäÎļþÀàÐÍÀûÓÃÊʵ±µÄ·¨Ê½£¬´óÎÞÊý°²È«½â¾ö¹æ»®¶¼Î´Äܼì²âµ½ËüÃÇ¡£ÕâÖÖ¹¥»÷·½Ê½Ï൱³É¹¦£¬ÓÉÓÚÏÕЩËùÓи½¼þÔÚVirusTotalÉ϶¼Î´±»¼ì²âµ½£¬Ö»ÓÐÉÙÊý°²È«¹©¸øÉÌÓÐËù¾õ²ì¡£È»¶ø£¬Õâ¿ÉÄÜÊÇÓÉÓÚÎĵµ×ÔÉí²¢Î´Ô̺¬¶ñÒâ´úÂ룬ֻÊÇÓÕµ¼Óû§É¨Ãè¶þάÂë¡£Òò¶ø£¬Óû§Ó¦Ìá¸ß¾¯Ì裬¶ÔÓÚÀ´×Ôδ֪·¢¼þÈ˵ĵç×ÓÓʼþ£¬ÓÈÆäÊÇÔ̺¬¸½¼þµÄ£¬¸Ãµ±¼´É¾³ý»òÔÚ´ò¿ªÖ®Ç°ÓëÍøÂçÖÎÀíԱȷÈÏ£¬ÒÔ±£»¤×Ô¼ºÃâÊÜ´ËÀàÍøÂç´¹µö¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/
3. º«¹ú¾¯·½¿ÛÁôÁùÈË£¬ÉæÏÓÔì×÷º¬DDoS¹¥»÷Ö°ÄÜÎÀÐÇ½Ó¹ÜÆ÷
12ÔÂ2ÈÕ£¬º«¹ú¾¯·½¿ÛÁôÁËÒ»ÃûÊ×ϯִÐйٺÍÎåÃûÔ±¹¤£¬ËûÃÇÉæÏÓÔì×÷³¬¹ý24Íǫ̀¶ñÒâÎÀÐÇ½Ó¹ÜÆ÷£¬ÕâЩÉ豸±»Ô¤×°»òºóÀ´¸üÐÂÒÔÔ̺¬DDoS¹¥»÷Ö°ÄÜ¡£¾Ý³Æ£¬ÕâЩ¹¥»÷Ö°ÄÜÊÇΪÁËÕмܾºÕùʵÌåµÄ¹¥»÷£¬µ«ÏÖʵÉϳ¤¶Ì·¨µÄ£¬ÇÒµ¼ÖÂÉ豸Óû§ÔÚ·Ç×ÔÔ¸µÄÇé¿öϲμÓÁ˹¥»÷£¬¿ÉÄÜ»áÓöµ½»úÄܽµÂäµÄÇé¿ö¡£´Ó2019Äê1Ôµ½2024Äê9Ô£¬¹²³ö»õÁË24Íǫ̀É豸£¬ÆäÖÐ98,000̨ԤװÁËDDoSÄ£¿é£¬ÆäÓàͨ¹ý¹Ì¼þ¸üлñµÃ¸ÃÖ°ÄÜ¡£º«¹ú¾¯·½ÔÚÊÕµ½¹ú¼ÊÐ̾¯×éÖ¯µÄµý±¨ºó·¢ÏÖÁËÕâÒ»¶ñÒâ´òË㣬²¢¿ÛÁôÁËÉæ°¸ÁùÈË£¬ËûÃÇÃæ¶ÔÎ¥·´ÐÅÏ¢Í¨Ñ¶ÍøÂç˾·¨µÄÖ¸¿Ø¡£´Ë±í£¬·¨Ôº»¹ºË×¼¿ÛѺ¸Ã¹«Ë¾µÄ×ʲú£¬²¢³ä¹«Ô¼435ÍòÃÀÔª£¬¹À¼ÆÕâÊǹ«Ë¾Í¨¹ýÏúÊÛ¶ñÒâÉ豸Ëù׬ȡµÄ½ð¶î¡£¶ø²É°ì¸ÃÉ豸µÄ¹«Ë¾²Ù×÷ԱĿǰÈÔåÐÒ£·¨±í£¬º«¹ú¾¯·½ÔÚ×·Çó¹ú¼ÊºÏ×÷ÒÔ×·×ٺͿÛÁôËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/
4. Bootkit¶ñÒâÈí¼þÀûÓÃLogoFAIL·ì϶ϰȾLinuxϵͳ
https://www.bleepingcomputer.com/news/security/bootkitty-uefi-malware-exploits-logofail-to-infect-linux-systems/
5. SignzyÈ·ÈϲúÉú°²È«ÊÂÎñ£¬Éæ¼°¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¿Í»§Êý¾Ý
12ÔÂ2ÈÕ£¬SignzyÊÇÒ»¼ÒΪ¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¡¢Ã³Ò×ÒøÐкͽðÈڿƼ¼¹«Ë¾ÌṩÔÚÏßÉí·ÝÑéÖ¤ºÍ¿Í»§ÈëÖ°·þÎñµÄ³ÛÃû¹©¸øÉÌ£¬¸Ã¹«Ë¾È·ÈϲúÉúÁËһ·°²È«ÊÂÎñ¡£Õâ¼Ò×ܲ¿Î»ÓÚ°à¼ÓÂÞ¶ûµÄ²Ý´´¹«Ë¾ÉÏÖÜÔâÓöÁËÍøÂç¹¥»÷£¬Ö»¹ÜËü»Ø¾øÐ¹Â©ÏêÇ飬µ«ÐÂÎÅÈËʿй©£¬¸ÃÊÂÎñÉæ¼°¿Í»§Êý¾ÝµÄй¶£¬ÕâЩÊý¾ÝÔøÔÚÍøÂç·¸×ïÂÛ̳µÄÌû×ÓÖжÌÔݳöÏÖ¡£SignzyΪȫÇò600¶à¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ£¬Ô̺¬Ó¡¶ÈËÄ´óÒøÐС£Ó¡¶ÈÍÆËã»úÓ¦¼±ÏìÓ¦Ó××éCERT-InÒѰÑÎȵ½ÕâÒ»ÊÂÎñ£¬²¢ÔÚ²ÉÈ¡Êʵ±Ðж¯¡£ÆäËû¿Í»§£¬ÈçPayU£¬°µÊ¾ËûÃÇδÊÜÕâ´Î¹¥»÷Ó°Ï죬²¢¼á³Æ×Ô¼ºµÄÊý¾ÝÒÀÈ»°²È«¡£SignzyÔÚÒ»·ÝÉêÃ÷Öлؾø¾Í¿Í»§Êý¾ÝÊÇ·ñ±»Ð¹Â¶°ä·¢ÆÀÂÛ£¬µ«°µÊ¾ÒÑÀñƸרҵ»ú¹¹½øÐа²È«ÊÂÎñµ÷²é¡£¸Ã¹«Ë¾µÃµ½ÁËÍòÊ´│µÈ¶à¼ÒͶ×ÊÕßµÄÖ§³Ö£¬²¢Òѽ«´ËÊÂÎñ·î¸æÆä¿Í»§¡¢¼à¹Ü»ú¹¹ºÍÀûÒæÓйØÕß¡£È»¶ø£¬µ±±»Îʼ°ÊÇ·ñÓëÓ¡¶ÈÑëÐÐÓйý½Ó´¥Ê±£¬Signzy°µÊ¾Ã»ÓйµÍ¨£¬¶øÓ¡¶ÈÑëÐÐҲδ»ØÓ¦ÖÃÆÀÒªÇó¡£
https://techcrunch.com/2024/12/02/indian-online-id-verification-firm-signzy-confirms-security-incident/
6. È«Çò·¨ÂÉÐж¯¡°HAECHI-V¡±¿ÛÁô5500¶àÈË£¬½É»ñ4ÒÚÃÀÔª×ʲú
12ÔÂ2ÈÕ£¬¹ú¼Ê·¨ÂÉÐж¯¡°HAECHI-V¡±ÔÚ2024Äê7ÔÂÖÁ11ÔÂÆÚ¼ä£¬Éæ¼°40¸ö¹ú¶È£¬³É¹¦¿ÛÁôÁË5500¶àÃûÏÓÒÉÈË£¬²¢²é»ñÁË4ÒÚ¶àÃÀÔª×ʲú¡£Õâ´ÎÐж¯ÖØÒªÕë¶ÔÍøÂç´¹µö¡¢°®ÇéȦÌס¢ÐÔÀÕË÷¡¢Í¶×Êڲơ¢ÔÚÏß´ò¶ÄµÈ¶àÖÖÍøÂçÚ²ÆÐÐΪ¡£ÆäÖУ¬º«¹úºÍÖйúµ±¾Öµ·»ÙÁËÒ»¸öÔì³É11ÒÚÃÀÔªËðʧµÄÓïÒô´¹µö¼¯ÍÅ£¬¿ÛÁô27È˲¢¸æ×´19ÈË¡£¹ú¼ÊÐ̾¯×éÖ¯»¹°ä²¼ÁË×ÏÉ«¹«¸æ£¬ÖÒ¸æÉæ¼°¼ÓÃÜÇ®±ÒµÄÐÂÐËڲƻ£¬³ö¸ñÊÇ¡°USDT´ú±ÒºË׼ȦÌס±¡£Í¬Ê±£¬¹ú¼ÊÐ̾¯×éÖ¯ÓëÀ´×Ô80¶à¸ö¹ú¶ÈµÄ·¨ÂÉ»ú¹¹¼ÓÇ¿ÁËÀ¹½Ø±»µÁ×ʽ𹤾ßI-GRIPµÄʹÓã¬ÐÂ¼ÓÆÂ¾¯·½ÀûÓøù¤¾ß³É¹¦×èÖ¹ÁËÒ»±Ê3930ÍòÃÀÔªµÄתÕË¡£´Ë±í£¬¹ú¼ÊÐ̾¯×éÖ¯»¹ÔÚ·ÇÖÞ19¸ö¹ú¶È·¢Õ¹ÁË¡°ÈûÂ׸ǵÙÐж¯¡±£¬¿ÛÁô1006ÃûÏÓÒÉÈË£¬µ·»Ù¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç134089¸ö¡£ÔÚ¡°Ðͬ¶þºÅÐж¯¡±ÖУ¬¹ú¼ÊÐ̾¯×éÖ¯Óë˽Ӫ²¿ÃźÏ×÷ͬ°éºÍ95¸ö¹ú¶È¹²Í¬²ð³ýÁË22000¶ą̀ÓëÍøÂç·¸×ï»î¶¯ÓйصĶñÒâ·þÎñÆ÷¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤°µÊ¾£¬ÍøÂç·¸×ïµÄÎÞ¹ú½çÐÔÒâζ׏ú¼Ê¾¯Ô±ºÏ×÷ÖÁ¹Ø³ÁÒª£¬Ö»ÓÐͨ¹ý¹²Í¬ÖÂÁ¦£¬ÄÜÁ¦ÈÃÏÖʵÊÀ½çºÍÊý×ÖÊÀ½çÔ½·¢°²È«¡£
https://securityaffairs.com/171593/cyber-crime/operation-haechi-v-5500-arrests.html


¾©¹«Íø°²±¸11010802024551ºÅ