Ñо¿ÈËÔ±³ÆÔÚ°µÍø·¢ÏÖÊýÊ®Íò¸öOpenAIƾ֤±»³öÊÛ

Ðû²¼Ê±¼ä 2023-07-21

1¡¢Ñо¿ÈËÔ±³ÆÔÚ°µÍø·¢ÏÖÊýÊ®Íò¸öOpenAIƾ֤±»³öÊÛ


¾ÝýÌå7ÔÂ19ÈÕ±¨µÀ £¬Ñо¿ÈËÔ±·¢ÏÖÁËÁè¼Ý200000¸öOpenAIƾ֤ÒÔÇÔÈ¡·¨Ê½ÈÕÖ¾µÄÐÎʽÔÚ°µÍøÉϳöÊÛ¡£Óë1Ô·ÝÔ¤¼ÆµÄ1ÒÚ»îÔ¾Óû§µÄÊýÁ¿Ïà±È £¬Õâ¸öÊý×ÖËÆºõ΢²»×ãµÀ £¬µ«Ëüȷʵ±íÃ÷¹¥»÷ÕßÔÚÉú³ÉʽÈ˹¤ÖÇÄܹ¤¾ßÖп´µ½Á˶ñÒâ¹¥»÷µÄDZÁ¦¡£ºÚ¿Í¶Ô´ËÀ෨ʽµÄÐËȤÒѱ»¼¤Æð £¬ÆäÖÐÒ»ÈË¿ª·¢ÁËÃûΪWormGPTµÄChatGPT¿Ë¡°æ £¬²¢¶ÔÆä½øÐÐÁËÒÔ¶ñÒâÈí¼þÎªÖØµãµÄÊý¾ÝѵÁ· £¬ÓÃÓÚBEC¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/openai-credentials-stolen-by-the-thousands-for-sale-on-the-dark-web/


2¡¢TurlaÀûÓÃCapiBar¹¥»÷ÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¼ÒµÄ¹ú·À×éÖ¯


¾Ý7ÔÂ19ÈÕ±¨µÀ £¬Î¢ÈíºÍÎÚ¿ËÀ¼CERTÅû¶ÁËTurlaÕë¶ÔÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¼ÒµÄ¹ú·À×éÖ¯µÄ¹¥»÷»î¶¯¡£¹¥»÷ʼÓÚ°üÂÞ¶ñÒâºêµÄExcel XLSM¸½¼þ £¬¼¤»îºó¶ñÒâºê»áÖ´ÐÐPowerShellÃüÁî £¬´´½¨Ò»¸öð³äFirefoxä¯ÀÀÆ÷¸üз¨Ê½µÄ¼Æ»®ÈÎÎñ¡£´ËÈÎÎñ»áÏÂÔØCapiBarºóÃÅ£¨Ò²³ÆÎªDeliveryCheck£© £¬È»ºóʹÓÃRclone¹¤¾ßÇÔÈ¡Êý¾Ý¡£CapiBarµÄ²îÒìÖ®´¦ÊÇÒ»¸öExchange·þÎñÆ÷¶Ë×é¼þ £¬Ëü¿É½«·þÎñÆ÷Äð³É¹¥»÷ÕßµÄC2·þÎñÆ÷¡£ÔÚ¹¥»÷¹ý³ÌÖÐ £¬Turla»¹·Ö·¢ÁËÐÅÏ¢ÇÔÈ¡ºóÃÅKAZUAR¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-turn-exchange-servers-into-malware-control-centers/


3¡¢Tampa GeneralÒ½ÔºÔâµ½¹¥»÷Ó°Ïì120Íò»¼ÕßµÄÐÅÏ¢


ýÌå7ÔÂ19ÈÕ³Æ £¬ÃÀ¹ú·ðÂÞÀï´ïÖݵÄTampa GeneralÒ½ÔºÔ¼120Íò»¼ÕßµÄÐÅϢй¶¡£¸ÃÒ½Ôº³ÆÆäÔÚ5ÔÂ31ÈÕ·¢ÏÖÆäÔâµ½Á˹¥»÷ £¬µ«Ã»ÓÐ͸¶¹¥»÷ÕßµÄÃû×Ö¡£ÆäÉùÃ÷ûÓÐÌá¼°ÈκιØÓÚÊê½ðÒªÇóµÄÎÊÌâ £¬²¢Ö¸³öËûÃǵÄÄþ¾²²¿ÃÅÄܹ»·ÀÖ¹Îļþ±»¼ÓÃÜ¡£Ð¹Â¶Êý¾Ý¿ÉÄܰüÂÞÐÕÃû¡¢µØÖ·¡¢µç»°¡¢½¡¿µ±£ÏÕÐÅÏ¢¡¢Éç»áÄþ¾²ºÅÂëºÍÖÎÁÆÐÅÏ¢µÈ¡£Snatch TeamÒѽ«¸ÃÒ½ÔºÌí¼Óµ½ÆäÍøÕ¾ÖÐ £¬Ã»ÓÐÌṩÈκÎÀÕË÷Ö¤¾Ý £¬µ«ÊÇÉù³ÆÒÑ´ÓÒ½Ôº»ñÈ¡ÁË4 TBµÄÎļþ¡£


https://www.databreaches.net/tampa-general-hospital-confirms-cybersecurity-incident-1-2-million-patients-being-notified/


4¡¢Fortinet¼ì²âµ½¶à¸öÀûÓÃZyxel©¶´µÄ½©Ê¬ÍøÂç·Ö·¢»î¶¯


FortinetÔÚ7ÔÂ19ÈÕ͸¶ £¬Æä¼ì²âµ½¶à¸öÀûÓÃZyxel©¶´£¨CVE-2023-28771£©µÄDDoS½©Ê¬ÍøÂç·Ö·¢»î¶¯¡£ÕâÊÇÒ»¸öÃüÁî×¢Èë©¶´ £¬¿É±»¹¥»÷ÕßÓÃÓÚÏòÄ¿±ê·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ö´ÐÐÈÎÒâ´úÂë¡£Ñо¿ÈËÔ±³Æ £¬´Ó5Ô·ݿªÊ¼ £¬¹¥»÷ÊýÁ¿ÏÔ×ÅÔö¼Ó¡£Éæ¼°¶à¸ö½©Ê¬ÍøÂç £¬ÆäÖаüÂÞ»ùÓÚMiraiµÄ±äÌåDark.IoT £¬ÒÔ¼°ÁíÒ»¸ö½ÓÄɶ¨ÖÆDDoS¹¥»÷ÒªÁìµÄ½©Ê¬ÍøÂç¡£Ñо¿ÈËԱͨ¹ýʶ±ð¹¥»÷ÕßIPµØÖ· £¬È·¶¨¹¥»÷·¢ÉúÔÚ¶à¸öµØÓò £¬°üÂÞÖÐÃÀÖÞ¡¢±±ÃÀ¡¢¶«ÑǺÍÄÏÑǵÈ¡£


https://www.fortinet.com/blog/threat-research/ddos-botnets-target-zyxel-vulnerability-cve-2023-28771


5¡¢Lookout³ÆWyrmSpyºÍDragonEggÓëAPT41ÓйØ


LookoutÔÚ7ÔÂ19ÈÕÅû¶ÁËAPT41ÀûÓÃAndroid¼äµýÈí¼þWyrmSpyºÍDragonEggµÄ¹¥»÷»î¶¯¡£Ñо¿ÈËÔ±ÓÚ2017ÄêÊ×´Îʶ±ð³öWyrmSpy £¬ÓÖÓÚ2021Äê³õ·¢ÏÖÁËDragonEgg £¬×î½üµÄÑù±¾¿É×·Ëݵ½2023Äê4Ô¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼¾ßÓÐÊý¾ÝÊÕ¼¯ºÍÉøÍ¸¹¦Ð§ £¬WyrmSpyαװ³ÉĬÈϲÙ×÷ϵͳӦÓ÷¨Ê½ £¬¶øDragonEggÔòαװ³ÉµÚÈý·½¼üÅÌ»òÏûÏ¢Ó¦Ó÷¨Ê½¡£ËüÃǵÄAndroidÇ©ÃûÖ¤ÊéÓÐÖØµþ £¬Õâ¼ÓÇ¿ÁËËüÃÇÓëͬһ¹¥»÷ÕßµÄÁªÏµ¡£GoogleÈ·ÈÏ £¬Ä¿Ç°ÉÐδÔÚGoogle PlayÉϼì²âµ½°üÂ޴˶ñÒâÈí¼þµÄÓ¦Óá£


https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41


6¡¢Unit 42Ðû²¼¹ØÓÚÐÂP2PÈ䳿P2PInfectµÄ·ÖÎö³ÂËß


7ÔÂ19ÈÕ £¬Unit 42Ðû²¼Á˹ØÓÚÐÂP2PÈ䳿P2PInfectµÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±ÔÚ7ÔÂ11ÈÕ·¢ÏÖÁËP2PInfect £¬ËüÓÉRust¿ª·¢ £¬Äܹ»¿çƽ̨ѬȾ £¬Õë¶ÔRedisʵÀý¡£¸ÃÈ䳿ÀûÓÃLuaɳÏäÌÓÒÝ©¶´£¨CVE-2022-0543£©À´Ñ¬È¾Ä¿±ê¡£Ñо¿ÈËÔ±³Æ £¬ËäÈ»ÔÚ¹ýÈ¥Á½ÖÜÄÚ·¢ÏÖÁËÁè¼Ý307000¸ö̻¶µÄRedis·þÎñÆ÷ £¬µ«Ö»ÓÐ934¸ö¿ÉÄÜÈÝÒ×Ôâµ½´ËÀ๥»÷¡£Unit 42ÈÏΪ £¬´Ë´ÎP2PInfect»î¶¯ÊÇÀûÓÃP2PÃüÁîºÍ¿ØÖÆ(C2)ÍøÂç½øÐиüÇ¿¹¥»÷µÄµÚÒ»½×¶Î¡£


https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/