INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

Ðû²¼Ê±¼ä 2023-10-09

1¡¢INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

¾Ý10ÔÂ6ÈÕ±¨µÀ £¬INC RansomwareÉù³ÆÈëÇÖÁËÃÀ¹úÁª°îÀͶ¯¹ØÏµ¾Ö£¨FLRA£©¡£INCÔÚ9ÔÂ20ÈÕ½«FLRAÌí¼Óµ½ÆäÍøÕ¾ÉÏ £¬²¢ÌṩÁË6ÕÅÎļþͼÏñ×÷Ϊ֤¾Ý¡£Ñо¿ÈËÔ±ÔÚ9ÔÂ24ÈÕºÍ10ÔÂ3ÈÕͨ¹ýÓʼþÁªÏµÁËFLRA £¬¾ùδÊÕµ½»ØÓ¦¡£INCûÓÐÊ״ηÃÎÊFLRAµÄʱ¼ä»ò·½Ê½ £¬µ«È·ÈÏ8ÔÂ26ÈÕÊÇÊý¾Ýй¶¿ªÊ¼µÄʱ¼ä £¬ËûÃÇÒÑ»ñÈ¡29 GBÎļþ¡£INC·¢ÑÔÈË»¹³ÆÒÑÁôÁËÊê½ðÌõÒªÇó70ÍòÃÀÔª £¬µ«FLRA´Óδ¶Ô´Ë×ö³öÈκλØÓ¦¡£


https://www.databreaches.net/inc-ransomware-claims-to-have-hit-federal-labor-relations-authority/


2¡¢Ñо¿ÈËÔ±·¢ÏÖ´óÁ¿AndroidµçÊÓºÐÖаüÂÞ¶ñÒâÈí¼þ


¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ £¬´óÁ¿Á®¼ÛAndroidµçÊÓºÐÖаüÂÞºóÃÅ¡£HUMAN³ÆÆä´ÓÔÚÏßÁãÊÛÉÌ´¦¹ºÖõÄÉ豸ÖÐ £¬80%¶¼Ñ¬È¾ÁËBADBOX¡£BadboxԤװÔÚAndroidµçÊÓºÐÖÐ £¬É豸²åÈëºó £¬¶ñÒâÈí¼þ»áÓë¹¥»÷ÕßµÄC2·þÎñÆ÷Á¬½Ó¡£Ëü»¹¿ÉÖ´ÐÐ¹ã¸æÆÛÕ©¡¢´´½¨Ðé¼ÙWhatsAppºÍGmailÕË»§¡¢³öÊÛ¼ÒÍ¥ÍøÂç·ÃÎÊȨÏÞÒÔ¼°°²×°Ô¶³Ì´úÂ롣ȫÇòÖÁÉÙÓÐ74000²¿»ùÓÚAndroidµÄÉ豸ѬȾÁËBADBOX¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁËÁíÒ»ÖÖ¶ñÒâÈí¼þPEACHPIT £¬ËüÊÇBadboxµÄ¹ã¸æÆÛÕ©×é¼þ £¬¿ÉÒÔÔÚAndroidºÍiOSÉ豸ºÍÓ¦ÓÃÉÏÆô¶¯ÆÛÆ­ÐÔÍøÂçÁ÷Á¿¡¢Òþ²Ø¹ã¸æºÍ¶ñÒâ¹ã¸æ¡£


https://www.hackread.com/android-tv-boxes-backdoors-home-networks/


3¡¢Atlassian ConfluenceÐÞ¸´±»ÀûÓé¶´CVE-2023-22515


AtlassianÔÚ10ÔÂ4ÈÕÐÞ¸´ÁËConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷ÖеķÃÎÊ¿ØÖÆÂ©¶´£¨CVE-2023-22515£©¡£¹¥»÷Õß¿ÉÔ¶³ÌÀûÓøÃ©¶´ £¬À´´´½¨Î´¾­ÊÚȨµÄConfluence¹ÜÀíÔ±ÕÊ»§²¢·ÃÎÊ·þÎñÆ÷¡£Ëü²»»áÓ°Ïì8.0.0֮ǰµÄConfluence°æ±¾ £¬ÒÔ¼°Í¨¹ýatlassian.netÓò·ÃÎʵÄConfluenceÍøÕ¾¡£Atlassian³Æ¸Ã©¶´Òѱ»ÔÚÒ°ÀûÓà £¬µ«Ã»ÓÐ͸¶¹¥»÷ÐÔÖÊ¡¢¹æÄ£»ò©¶´µÄ»ù´¡Ô­ÒòµÈ½øÒ»²½Ï¸½Ú¡£½¨Òé¿Í»§Á¢¼´¸üР£¬ÎÞ·¨Ó¦ÓøüеĿͻ§Ó¦ÏÞÖÆ¶ÔÊÜÓ°ÏìʵÀýµÄÍⲿ·ÃÎÊ¡£


https://thehackernews.com/2023/10/atlassian-confluence-hit-by-newly.html


4¡¢ÒòÊê½ð̸ÅÐÆÆÁÑLockBit¼Æ»®¹ûÈ»IT¹«Ë¾CDWµÄÊý¾Ý


ýÌå10ÔÂ6ÈÕ³Æ £¬ÒòÊê½ð̸ÅÐÆÆÁÑ £¬ÀÕË÷ÍÅ»ïLockBit¼Æ»®¹ûÈ»´ÓIT¹«Ë¾CDWÇÔÈ¡µÄÊý¾Ý¡£ÃûΪLockBitSuppµÄ·¢ÑÔÈËÌåÏÖ £¬ÔÚ̸ÅÐÆÚ¼äCDW¸ø³öµÄ½ð¶îÌ«µÍ £¬¼òÖ±ÊÇ¶ÔÆ­×ÓµÄÎêÈè¡£ËûÃǾܾøÁËÕâ¸ö»ÄÃýµÄ½ð¶î £¬²¢¾ö¶¨¹ûÈ»Îļþ¡£Æ¾¾ÝLockBitÍøÕ¾Éϵĵ¹¼ÆÊ± £¬CDWµÄÎļþ½«ÓÚ10ÔÂ11ÈÕÁ賿Ðû²¼¡£Õâһʼþ¿ªÊ¼ÓÚ9ÔÂ3ÈÕ £¬Æäʱ¸Ã¹«Ë¾Ê״α»Ìí¼Óµ½LockBitµÄÍøÕ¾ÉÏ £¬¶øCDWÈÔδ¶ÔÕâһʼþ·¢±íÆÀÂÛ¡£


https://www.theregister.com/2023/10/06/cdw_lockbit_negotiations/


5¡¢TrendMicroÅû¶ÔÚÓ¦ÓúʹúÂë¿âÖ²Èë¶ñÒâ´úÂëµÄÒªÁì


10ÔÂ5ÈÕ £¬Trend MicroÐû²¼³ÂËß £¬ÉîÈëÑо¿Á˹¥»÷ÕßÔÚ¿´ËƺϷ¨µÄÓ¦Ó÷¨Ê½ºÍ´úÂë¿âÖÐÖ²Èë¶ñÒâpayloadµÄÅÓ¸ÅÂÔÁì¡£¹©Ó¦Á´¹¥»÷µÄÐËÆð³ÉÎªÍøÂçÄþ¾²ÁìÓòµÄÒ»¸öÒªº¦ÎÊÌâ¡£¿ª·¢ÈËÔ±ÒÀ¿¿µÚÈý·½×é¼þÀ´¼ò»¯¿ª·¢Á÷³Ì £¬¹¥»÷ÕßÒ²¿ÉÒÔͨ¹ýÕë¶Ô¹©Ó¦Á´ÖÐÄþ¾²ÐԽϵ͵ÄÔªËØÀ´¼ä½ÓÈëÇÖϵͳ¡£Ñо¿ÈËÔ±·ÖÎöÁ˹¥»÷Õ߿ˡºÏ·¨GitHub´æ´¢¿â£¨ÈçBinance-trading-bot¡¢crypto-clipperºÍÆäËüÓÃPython3¿ª·¢µÄ·¨Ê½£© £¬È»ºóÓöñÒâ´úÂë¶ÔÆä½øÐÐľÂí»¯ºÍѬȾµÄ°¸ÀýÑо¿¡£


https://www.trendmicro.com/en_us/research/23/j/infection-techniques-across-supply-chains-and-codebases.html


6¡¢MicrosoftÐû²¼¹ØÓÚ2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö³ÂËß


10ÔÂ5ÈÕ±¨µÀ³Æ £¬MicrosoftÐû²¼ÁË2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö³ÂËß £¬·ÖÎöÁË2022Äê7ÔÂÖÁ2023Äê6ÔÂÆÚ¼äµÄÄþ¾²Ç÷ÊÆ¡£×Ô2022Äê9ÔÂÒÔÀ´ £¬ÊÖ¶¯Ö´ÐеÄÀÕË÷¹¥»÷Ôö¼ÓÁË200%ÒÔÉÏ¡£×Ô2022Äê11ÔÂÒÔÀ´ £¬Éæ¼°Êý¾Ýй¶µÄ¹¥»÷ÊýÁ¿Ôö¼ÓÁËÒ»±¶¡£´ó¶àÊýÀÕË÷¹¥»÷²¢Î´ÀֳɼÓÃÜÈκÎÄÚÈÝ £¬Ö»ÓÐ2%µÄ¹¥»÷Àֳɲ¿ÊðÁËÀÕË÷Èí¼þ¡£´ó¶àÊý¹¥»÷¿ÉÒÔ×·Ëݵ½3¸öµã£ºÆÆ»µÍⲿԶ³Ì·þÎñ¡¢ÀûÓÃÓÐЧÕÊ»§ºÍÈëÇÖÃæÏò¹«ÖÚµÄÓ¦Ó÷¨Ê½¡£½üÈý·ÖÖ®¶þµÄ¹¥»÷¿É×·Ëݵ½4¸öÀÕË÷ÍŻMagniber¡¢LockBit¡¢HiveºÍBlackCat¡£


https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023