ÃÀ¹úÃÜЪ¸ù´óѧÔâµ½¹¥»÷ËùÓÐϵͳºÍ·þÎñÔÝʱÖжÏ
Ðû²¼Ê±¼ä 2023-08-311¡¢ÃÀ¹úÃÜЪ¸ù´óѧÔâµ½¹¥»÷ËùÓÐϵͳºÍ·þÎñÔÝʱÖжÏ
¾ÝýÌå8ÔÂ29ÈÕ±¨µÀ£¬ÃÀ¹úÃÜЪ¸ù´óѧ(UM)Ôâµ½ÍøÂç¹¥»÷£¬ËùÓÐϵͳºÍ·þÎñÔÝʱÖжϡ£ÔÚÉÏÖÜÈÕ£¬ÃÜЪ¸ù´óѧ·¢ÉúÁËÍøÂçÄþ¾²Ê¼þ£¬Ñ§Ð£³ÆÔÚ¾¹ý×ÐϸÆÀ¹Àºó¾ö¶¨Çжϻ¥ÁªÍø¡£Õâ°üÂÞÓÐÏߺÍWiFiÐ£Ô°Íø¡¢M-Pathways¡¢eResearch¡¢DARTÒÔ¼°Ñ§Éú×¢²áÖÐʹÓõÄËùÓÐϵͳ¡£È»¶ø£¬Ê¼þ·¢ÉúÔÚÐÂѧÄêǰϦ£¬ÆäʱѧÉúºÍ½ÌʦÕý×¼±¸¿ª¿Î¡£Òò´Ë£¬UM¾ö¶¨Ãâ³ý8Ô·ݵÄÓâÆÚ×¢²á»òÍËѧÓöȡ£ÔÚÏß·þÎñ¿ÉÄÜÐèÒª¼¸Ìì²ÅÆø»Ö¸´£¬¸ÃУҲûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄÖÃÆÀÇëÇó¡£
https://www.bleepingcomputer.com/news/security/university-of-michigan-shuts-down-network-after-cyberattack/
2¡¢Forever 21Åû¶һÆðÉæ¼°½ü54ÍòÔ±¹¤µÄÊý¾Ýй¶Ê¼þ
¾Ý8ÔÂ30ÈÕ±¨µÀ£¬Ê±ÉÐÁãÊÛÉÌForever 21֪ͨԼ54ÍòÃû¼ÓÈ빫˾½¡¿µ¼Æ»®µÄÔ±¹¤£¬ËûÃǵÄÐÅÏ¢Òѱ»Ð¹Â¶¡£Forever 21³Æ£¬ËûÃÇÔÚ3ÔÂ20ÈÕ·¢ÏÖÒ»ÆðÍøÂçÄþ¾²Ê¼þ¡£ËæºóµÄÊÓ²ìÈ·¶¨£¬¹¥»÷ÕßÔÚ1ÔÂ5ÈÕÖÁ3ÔÂ21ÈÕ·ÃÎÊÁËForever 21µÄ²¿ÃÅϵͳ¡£ËäÈ»Forever 21ûÓв¢Ã»ÓÐÖ±½ØÁ˵±µØËµÓÐÀÕË÷ÒªÇ󣬵«ËûÃÇÔÚÐÅÖеÄ˵»°±íÃ÷£¬²»½öÓÐÀÕË÷ÒªÇ󣬶øÇÒForever 21»¹Ïò¹¥»÷Õß½»ÁËÊê½ð£¬ÒÔ»ñµÃɾ³ýÊý¾ÝµÄ±£Ö¤¡£¸ÃʼþÓ°ÏìÁË539207¸öÈË£¬ËûÃǽ«»ñµÃ12¸öÔµÄÉí·Ý¼à¿Ø·þÎñ¡£
https://www.databreaches.net/forever-21-notifies-540000-of-breach-affecting-employees-enrolled-in-firms-health-plan/
3¡¢·áÌïµÄ¶©µ¥ÏµÍ³·ºÆð¹ÊÕϵ¼ÖÂ14¸öÉú²ú³µ¼äÍ£²ú36Сʱ
ýÌå8ÔÂ30Èճƣ¬ÈÕ±¾·áÌ﹫˾µÄ¶©µ¥ÏµÍ³·ºÆð¹ÊÕÏ£¬µ¼ÖÂ14¸öÉú²ú³µ¼äµÄ28ÌõÉú²úÏßÍ£²ú¡£¹ÊÕÏ¿ªÊ¼ÓÚ±¾ÖÜÒ»Íí¼ä£¬Éú²úÓÚ±¾ÖÜÈý°´¼Æ»®»Ö¸´¡£Õâ¼ÒÆû³µÖÆÔìÉÌÒÔÆä¾«Òæ×¼Ê±µÄÉú²úϵͳÎÅÃû£¬²¢ÈÏΪ¸Ãϵͳ·Ç³£¿É¿¿¡£ÕâÒâζ×Å·áÌïÆû³µµÄÁ㲿¼þ¿â´æÁ¿¼«µÍ£¬¼¸ºõÔÚÐèÒª°²×°µ½Æû³µÉÏʱÕâЩÁã¼þ²Å»á¾Íλ¡£¸Ã¹«Ë¾ÔÚÖܶþÌåÏÖ£¬ÏµÍ³¹ÊÕϲ¢·Ç¹¥»÷µ¼Öµģ¬µ«ËûÃǽ«¼ÌÐøÊÓ²ìÔÒò¡£
https://www.theregister.com/2023/08/30/toyota_japan_production_resumes/
4¡¢MandiantÅû¶UNC4841ÀûÓÃBarracuda©¶´¹¥»÷µÄϸ½Ú
MandiantÔÚ8ÔÂ30ÈÕÅû¶Á˹ØÓÚUNC4841ÀûÓÃBarracuda©¶´µÄ¹¥»÷»î¶¯µÄϸ½Ú¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬½üÈý·ÖÖ®Ò»±»¹¥»÷µÄÉ豸ÊôÓÚÕþ¸®»ú¹¹£¬ÆäÖдó¶àÊýÊÇÔÚ2022Äê10ÔÂÖÁ12ÔÂÆÚ¼ä·¢ÉúµÄ¡£´ó²¿ÃŹ¥»÷Õë¶ÔÃÀÖÞ(55%)£¬Æä´ÎÊÇÅ·ÖÞ¡¢Öж«ºÍ·ÇÖÞ(24%)ÒÔ¼°ÑÇÌ«µØÓò(22%)¡£Mandiant»¹¹ûÈ»ÁËUNC4841Èý¸öÓÐÕë¶ÔÐԵŤ¾ßSKIPJACK¡¢ DEPTHCHARGEºÍFOXTROTµÄϸ½Ú£¬ÒÔ¼°ËüÊÇÈçºÎºáÏòÒÆ¶¯µÄ¡£FBIÔøÔÚÉÏÖÜÐû²¼Í¨¸æ³ÆÕë¶ÔBarracuda©¶´µÄ²¹¶¡ÎÞЧ£¬½¨ÒéÓû§¾¡¿ì¸ôÀëºÍ¸ü»»±»ºÚµÄÉ豸¡£
https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation
5¡¢Juniper·¢ÏÖDreamBusÀûÓÃRocketMQ©¶´µÄ¹¥»÷»î¶¯
8ÔÂ28ÈÕ£¬Juniper³ÆÆä·¢ÏÖÁ˽©Ê¬ÍøÂçDreamBusÀûÓÃRocketMQ©¶´µÄ¹¥»÷»î¶¯¡£±»ÀûÓõÄÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-33246£©£¬ÓÚ5Ô·ݱ»Åû¶¡£Juniper³Æ£¬ÔÚ6ÔÂÉÏÑ®·¢ÏÖÁËÊ×´ÎÀûÓøÃ©¶´µÄ¹¥»÷»î¶¯£¬Ö÷ÒªÕë¶ÔRocketMQµÄĬÈÏ10911¶Ë¿ÚºÍÆäËü7¸ö¶Ë¿Ú¡£¹¥»÷ÕßÀûÓÿªÔ´Õì²ì¹¤¾ßinteractshÈ·¶¨Èí¼þ°æ±¾£¬»¹´ÓTorÊðÀí·þÎñÏÂÔØ¶ñÒâbash½Å±¾reketed£¬ËüÊÇDreamBusÖ÷Ä£¿é£¨ELFÎļþ£©µÄÏÂÔØºÍ°²×°·¨Ê½¡£´Ë´Î»î¶¯µÄÖ÷ҪĿµÄËÆºõÊÇÃÅÂÞ±ÒµÄÍÚ¿ó¡£
https://blogs.juniper.net/en-us/threat-research/dreambus-botnet-resurfaces-targets-rocketmq-vulnerability
6¡¢FlashpointÐû²¼ÐºڿÍÂÛ̳RansomedµÄ·ÖÎö³ÂËß
8ÔÂ28ÈÕ£¬FlashpointÐû²¼Á˹ØÓÚкڿÍÂÛ̳RansomedµÄ·ÖÎö³ÂËß¡£8ÔÂ15ÈÕ£¬Ransomed³ÉΪһ¸öеĺڿÍÂÛ̳¡£µ«ÔÚRansomedµÄ»î¶¯ÕæÕý¿ªÊ¼Ö®Ç°£¬¸ÃÍøÕ¾¾ÍÔâµ½ÁËDDoS¹¥»÷¡£×÷Ϊ»ØÓ¦£¬¸ÃÍøÕ¾µÄÔËÓªÍÅ»ïѸËÙ½«ÆäÖØËÜΪһ¸öÀÕË÷Èí¼þ²©¿Í¡£RansomedÕýÔÚÀûÓÃÒ»ÖÖеÄÀÕË÷¼ÆÄ±£¬ËûÃÇͨ¹ýÅ·Ã˵ÄGDPRµÈÊý¾Ý±£»¤·¨À´ÍþвĿ±ê£¬Èç¹ûËûÃDz»½»Êê½ð¾Í»á±»·£¿î¡£Ä¿Ç°Éв»Çå³þ¸ÃÍÅ»ïÊÇ·ñÕæµÄÔÚ²¿ÊðÀÕË÷Èí¼þ£¬»òÕßÖ»ÊÇÉù³ÆÊý¾Ý±»µÁ¡£FlashpotÌåÏÖ£¬Ransomed±³ºóµÄºÚ¿Í¿ÉÄÜÓëBreachForumsºÍExposedµÈÊý¾ÝÐ¹Â¶ÍøÕ¾ÓйØÁª¡£
https://flashpoint.io/blog/ransomed-uncertain-cyber-threat/