CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂëµöÓã»î¶¯

Ðû²¼Ê±¼ä 2023-08-18

1¡¢CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂëµöÓã»î¶¯


CofenseÔÚ8ÔÂ16ÈÕÅû¶ÁËÒ»³¡ÀûÓöþάÂëµÄ´óÐ͵öÓã»î¶¯£¬Ö÷ÒªÕë¶ÔÃÀ¹úµÄÒ»¼Ò´óÐÍÄÜÔ´¹«Ë¾¡£¸Ã»î¶¯µÄƽ¾ùÔÂÔö³¤ÂÊÁè¼Ý270%£¬×Ô5ÔÂÒÔÀ´ÕûÌå»î¶¯Ôö¼ÓÁË2400%ÒÔÉÏ¡£¹¥»÷ÕßÊ×ÏÈ·¢ËÍð³äMicrosoftÄþ¾²Í¨ÖªµÄÓʼþ£¬ÆäÖаüÂÞPNG»òPDF¸½¼þ£¬ÒªÇóÓû§É¨Ãè¶þάÂ룬Ȼºó½«Ä¿±êÖØ¶¨Ïòµ½µöÓãÍøÕ¾¡£¾Ýͳ¼Æ£¬¸Ã»î¶¯29%µÄÁ÷Á¿Õë¶ÔµÄÊÇÄÜÔ´¹«Ë¾£¬ÆäËüÄ¿±êÐÐÒµ°üÂÞÖÆÔìÒµ(15%)¡¢±£ÏÕÒµ(9%)¡¢¼¼Êõ(7%)ºÍ½ðÈÚ·þÎñ£¨6%£©ÐÐÒµ¡£


https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/


2¡¢AT&T·¢ÏÖ¹¹½¨°üÂÞ40Íò¸ö½ÚµãµÄ½©Ê¬ÍøÂçµÄ¹¥»÷»î¶¯


8ÔÂ16ÈÕ£¬AT&T Alien Labs³ÆÆä·¢ÏÖÁËÒ»Æð´ó¹æÄ£¹¥»÷»î¶¯ÖÁÉÙÏò400000¸öWindows¼ÆËã»ú·Ö·¢ÁËÊðÀí·þÎñÆ÷Ó¦Ó÷¨Ê½¡£Ñо¿ÈËÔ±³Æ£¬ÔÚÒ»ÖÜÄھͷ¢ÏÖÁËһǧ¶à¸öÔÚÒ°Íâ·Ö·¢ÊðÀíÓ¦Ó÷¨Ê½µÄжñÒâÈí¼þÑù±¾¡£¾ÝÊðÀíÍøÕ¾³Æ£¬ÊðÀí³ö¿Ú½ÚµãÁè¼Ý40Íò¸ö£¬Éв»Çå³þÆäÖÐÓм¸¶àÊDZ»¶ñÒâ´úÂë°²×°µÄ¡£Ò»µ©°²×°µ½±»ÈëÇÖµÄϵͳÉÏ£¬¶ñÒâÈí¼þ¾Í»áÏÂÔØ²¢°²×°ÊðÀíÓ¦Ó᣼ÓÔØ·¨Ê½Òþ²ØÔÚÆÆ½âÈí¼þºÍÓÎÏ·ÖУ¬ÇÒ°²×°²»ÐèÒªÓëÓû§½øÐн»»¥¡£¸ÃÊðÀíÊÇÓÃGo¿ª·¢£¬ÒòΪËüÒÑÇ©ÃûËùÒÔ¼ì²âΪÁã¡£


https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware


3¡¢Citrix ShareFile©¶´CVE-2023-24489Òѱ»ÀûÓÃ


¾ÝýÌå8ÔÂ16ÈÕ±¨µÀ£¬CISAÌáÐÑCitrix ShareFile©¶´CVE-2023-24489Òѱ»ÔÚÒ°ÀûÓá£ÀûÓøÃ©¶´£¬¹¥»÷Õß¿ÉÒÔ½«Web shellÉÏ´«µ½Ä¿±êÉ豸£¬À´»ñµÃ¶Ô´æ´¢¼°ÆäËùÓÐÎļþµÄÍêÈ«·ÃÎÊȨÏÞ£¬ÒÑÓÚ6ÔÂ13ÈÕ±»ÐÞ¸´¡£Ä¿Ç°£¬GreyNoiseÒÑ·¢ÏÖ72¸öIPµØÖ·ÊÔͼÀûÓûò¼ì²éShareFile·þÎñÆ÷ÊÇ·ñÈÝÒ×Ôâµ½¹¥»÷£¬ÆäÖдó¶àÊýÀ´×Ôº«¹úÒÔ¼°·ÒÀ¼¡¢Ó¢¹úºÍÃÀ¹úµÈ¹ú¼Ò¡£CISAÒªÇóÕþ¸®»ú¹¹ÔÚ9ÔÂ6ÈÕ֮ǰӦÓò¹¶¡¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/


4¡¢Ñо¿ÈËÔ±ÔÚPowerShell GalleryÖмì²âµ½¶à¸ö©¶´


AquaÔÚ8ÔÂ16ÈÕ͸¶ÔÚPowerShell GalleryÖз¢ÏÖÁ˶à¸ö¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷µÄ©¶´¡£PowerShell GalleryÓÉMicrosoftά»¤£¬ÊÇÒ»¸öÓÃÓÚ¹²ÏíºÍ»ñÈ¡PowerShell´úÂëµÄÖÐÑë´æ´¢¿â¡£µÚÒ»¸ö©¶´Éæ¼°¿íËɵİüÃûÕþ²ß£¬¹¥»÷Õß¿ÉÉÏ´«ÓëÏÖÓд洢¿âÃû³ÆÏàËÆµÄ¶ñÒâPowerShellÄ£¿é¡£µÚ¶þ¸ö©¶´É漰αÔìÄ£¿éÔªÊý¾Ý£¬µ±·ÃÎÊPowerShellÄ£¿éµÇÂ½Ò³ÃæÊ±£¬¼¸ºõËùÓÐϸ½Ú¶¼¿ÉÄܱ»Î±Ô죬°üÂÞ¿ª·¢Õß¡¢°æÈ¨ºÍÃèÊö¡£µÚÈý¸ö©¶´¿ÉÓÃÓÚö¾ÙËùÓаüÃû³ÆºÍ°æ±¾£¬°üÂÞδÁгöÇÒÒþ²ØÔÚ¹«ÖÚÊÓÒ°Ö®ÍâµÄÈí¼þ°ü¡£AquaÓÚ2022Äê9Ô³ÂËßÁËÕâЩ©¶´£¬Î¢Èí³ÆÒѽâ¾öÕâЩÎÊÌ⣬µ«ÏÖÔÚ©¶´ÈÔÈ»¿ÉÒÔÖØÏÖ¡£


https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks


5¡¢CubaÀûÓÃй¤¾ß¹¥»÷ÃÀ¹ú»ù´¡ÉèÊ©ºÍÀ­¶¡ÃÀÖÞIT¼¯³ÉÉÌ


8ÔÂ17ÈÕ£¬Blackberry³ÆÀÕË÷ÍÅ»ïCubaÀûÓÃй¤¾ß¹¥»÷ÁËÃÀ¹úµÄÒ»¸ö»ù´¡ÉèÊ©»ú¹¹ºÍÀ­¶¡ÃÀÖÞµÄÒ»¼ÒIT¼¯³ÉÉÌ¡£¹¥»÷·¢ÉúÓÚ6Ô£¬Æä¹¤¾ß¼¯°üÂÞ×Ô½ç˵ÏÂÔØ·¨Ê½BUGHATCH¡¢BURNTCIGAR¡¢MetasploitºÍCobalt Strike¿ò¼Ü£¬ÒÔ¼°´óÁ¿LOLBINS¡£¹¥»÷»î¶¯»¹ÀûÓÃÁËNetLogon©¶´£¨CVE-2020-1472£©ºÍVeeam©¶´£¨CVE-2023-27532£©¡£ÖµµÃ×¢ÒâµÄÊÇ£¬CubaµÄÍøÕ¾ÔÚ¹ýÈ¥¼¸¸öÔÂÀïʱ¶ÏÊ±Ðø£¬¾ÝÊӲ죬ÔÚÁгöеı»¹¥»÷Ä¿±êʱ¸ÃÍøÕ¾¾Í»áÖØÐÂÉÏÏߣ¬È»ºóÔٴιرÕ¡£


https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america


6¡¢IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö³ÂËß


8ÔÂ16ÈÕ£¬IBMÐû²¼ÁË2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö³ÂËߣ¬·ÖÎöÁË2022Äê3ÔÂÖÁ2023Äê3ÔÂÊÕ¼¯µÄÊý¾Ý¡£¸÷ÐÐÒµÊý¾Ýй¶µÄƽ¾ù³É±¾Îª445ÍòÃÀÔª£¬¶øÒ½ÁÆÐÐÒµµÄƽ¾ù³É±¾ÊÇ×î¸ßµÄ£¬Îª1093ÍòÃÀÔª¡£¹ýÈ¥ÈýÄ꣬ҽÁƱ£½¡µÄ³É±¾Ôö¼ÓÁË53.3%¡£Óëµ¥Ò»´æ´¢ÒªÁìÏà±È£¬¿ç¶à¸ö»·¾³´æ´¢µÄÊý¾Ýй¶³É±¾×î¸ß£¬¼ì²âºÍÓ¦¶ÔµÄƽ¾ùʱ¼äΪ291Ìì¡£µöÓã»î¶¯³ÉΪ×î³£Óõijõʼ¹¥»÷ÔØÌ壬ռ±È16%£¬Æä´ÎÊÇÆ¾Ö¤Ð¹Â¶ºÍÔÆÅäÖôíÎó¡£Ò½ÁƱ£½¡ÐÐÒµÊý¾Ýй¶ÍùÍù»áÁ¬Ðø231Ìì²Å±»·¢ÏÖ£¬¶øÆäËüÐÐÒµÔòΪ204Ìì¡£


https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/