S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼ÊеÄϵͳ崻ú
Ðû²¼Ê±¼ä 2023-11-031¡¢S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼ÊеÄϵͳ崻ú
¾ÝýÌå11ÔÂ1ÈÕ±¨µÀ£¬·þÎñÌṩÉÌS¨¹dwestfalen ITÔâµ½ÀÕË÷¹¥»÷£¬µ¼Öµ¹ú70¶à¸ö¶¼ÊеÄÊÐÕþϵͳ崻ú¡£±¾ÖÜÒ»£¬¸Ã·þÎñÌṩÉ̵Äϵͳ±»¼ÓÃÜ¡£ÎªÁË·ÀÖ¹¶ñÒâÈí¼þÁ÷´«£¬¸Ã¹«Ë¾ÖжÏÁË70¶à¸ö¶¼ÊÐ¶ÔÆä»ù´¡ÉèÊ©µÄ·ÃÎÊ£¬Ö÷ÒªÓ°ÏìÁ˵¹úÎ÷²¿µÄ±±À³Òð-ÍþË¹ÌØ·¨Â×ÖÝ¡£¹¥»÷µ±Ì죬µÂ¹úÎý¸ùÊÐÕþ¸®È¡ÏûÁ˹«ÃñµÄÔ¤Ô¼£¬½ØÖÁ±¾Öܶþ£¬¸ÃÊÐÕþ¸®µÄ´ó²¿ÃÅÔÚÏß·þÎñÈÔÎÞ·¨Ê¹Óá£Î¤Ã·¶û˹»ùÐ˺Ͳ¼¶ûɳÒÁµÂÊÐÕþ¸®µÄÍøÕ¾Ò²ÔÚÖÜÈý¹Ø±Õ¡£µÂ¹ú¾¯·½ºÍÄþ¾²»ú¹¹ÕýÔÚÊÓ²ìÕâÆðʼþ£¬²¢Å¬Á¦»Ö¸´¶¼ÊйÜÀí²¿ÃŵķþÎñ¡£
https://therecord.media/massive-cyberattack-hinders-services-in-germany
2¡¢Êý¾ÝÖÐÐÄÍ£µçµ¼ÖÂCloudflare¶à¸ö²úÎïÔÝʱÎÞ·¨Ê¹ÓÃ
¾Ý11ÔÂ2ÈÕ±¨µÀ£¬CloudflareÖжϵ¼ÖÂÆäÐí¶à²úÎïÎÞ·¨Ê¹Óá£CloudflareÌåÏÖ£¬Õâ¸öÎÊÌâÓ°ÏìÁËËùÓÐÒÀÀµÆäAPI»ù´¡ÉèÊ©µÄ·þÎñ£¬°üÂÞ¿ØÖÆÃæ°å¡¢Cloudflare API¡¢LogpushºÍAlert Notification SystemµÈ¡£¿Í»§ÔÚʵÑéµÇ¼ÕÊ»§²¢·ÃÎÊCloudflare¿ØÖÆÃæ°åʱ£¬»á¿´µ½¡°Code:10000¡±Éí·ÝÑéÖ¤´íÎóºÍÄÚ²¿·þÎñÆ÷´íÎó¡£ÖжÏÁ½Ð¡Ê±ºó£¬¸Ã¹«Ë¾Í¸Â¶£¬ÕâÊǶà¸öÊý¾ÝÖÐÐÄÍ£µçµ¼Öµġ£»ù´¡ÔÒòÊÇ·¢µç»ú¹ÊÕϵ¼ÖµÄÇøÓòÐÔµçÁ¦ÎÊÌ⣬Ôì³ÉÉ豸ÍÑ»ú¡£Ä¿Ç°£¬´ó²¿ÃÅ·þÎñ¶¼Òѻָ´¡£
https://www.bleepingcomputer.com/news/security/cloudflare-dashboard-and-apis-down-after-data-center-power-outage/
3¡¢Advarra¹«Ë¾Ôâµ½AlphVÀÕË÷¹¥»÷Áè¼Ý120 GBÊý¾Ýй¶
ýÌå11ÔÂ1Èճƣ¬Ò½ÁÆ×ۺϽâ¾ö·½°¸¹«Ë¾AdvarraÔâµ½ÁËÀÕË÷¹¥»÷¡£¾ÝϤ£¬¹¥»÷·¢ÉúÓÚ10ÔÂ25ÈÕ×óÓÒ£¬¹«Ë¾¹ÜÀíÈËÔ±ÌåÏ־ܾø½»Êê½ð£¬Ò²²»Óë¹¥»÷Õß̸ÅС£10ÔÂ31ÈÕ£¬¹¥»÷ÕßÔÚAlphVÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾£¬Éù³ÆÒÑÇÔÈ¡ÁËÁè¼Ý120GBÊý¾Ý£¬Éæ¼°¿Í»§¡¢»¼ÕßÒÔ¼°Ô±¹¤¡£AdvarraÌåÏÖ£¬¹¥»÷Ô´ÓÚÒ»ÃûÔ±¹¤µÄµç»°ºÅÂë±»µÁ£¬¹¥»÷Õß½è´Ë·ÃÎÊÁ˸ÃÔ±¹¤µÄһЩÕË»§£¬°üÂÞLinkedInºÍÊÂÇéÕË»§¡£
https://www.databreaches.net/exclusive-advarra-hacked-threat-actors-threatening-to-leak-data/
4¡¢VMware·¢ÏÖÊýÊ®¸öÄÚºËÇý¶¯·¨Ê½ÈÝÒ×Ôâµ½ÍøÂç¹¥»÷
VMware Carbon Black TAUÔÚ10ÔÂ31ÈÕ³ÆÆä·¢ÏÖÁË34¸öÒ×±»¹¥»÷µÄÄÚºËÇý¶¯·¨Ê½£¨30¸öWDMºÍ4¸öWDF£©¡£ÆäÖÐ6¸ö¿ÉÒÔÓÃÀ´·ÃÎÊÄÚºËÄڴ棬ËùÓÐÇý¶¯·¨Ê½¶¼¿É±»¾ßÓзÇϵͳȨÏ޵Ĺ¥»÷ÕßÓÃÓÚÍêÈ«¿ØÖÆÉ豸¡£Í¨¹ýÀûÓÃÕâЩÇý¶¯·¨Ê½£¬¹¥»÷Õß¿ÉÒÔ²Á³ý»ò¸ü¸Ä¹Ì¼þ£¬ÒÔ¼°ÌáÉýȨÏÞ¡£ÕâЩÇý¶¯µÄ¿ª·¢ÈËÔ±ÒÑÓÚ2023Äê´º¼¾ÊÕµ½Í¨Öª£¬µ«Ö»ÓÐÁ½¼Ò¹«Ë¾ÐÞ¸´ÁË©¶´¡£VMwareÕë¶Ô¶à¸öÇý¶¯·¨Ê½¿ª·¢ÁËPoC©¶´£¬ÒÔÑÝʾÈçºÎÀûÓÃËüÃÇÀ´²Á³ý¹Ì¼þ»òÌáÉýȨÏÞ¡£
https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
5¡¢Unit 42Ðû²¼¹ØÓÚTurlaµÄºóÃÅKazuarбäÌåµÄ³ÂËß
10ÔÂ31ÈÕ£¬Unit 42Ðû²¼Á˹ØÓÚTurlaºóÃÅKazuarµÄбäÌåµÄ·ÖÎö³ÂËß¡£KazuarÊÇÒ»¸ö.NETºóÃÅ£¬×÷ΪTurlaµÄµÚ¶þ½×¶ÎpayloadÓëÆäËü³£Óù¤¾ßÒ»ÆðʹÓá£ÔÚа汾ÖУ¬¹¥»÷ÕßʹÓÃÁËÖÖÖÖÅÓ´óµÄ·´·ÖÎö¼¼Êõ£¬²¢Í¨¹ýÓÐЧµÄ¼ÓÃܺͻìÏýÀ´ÑÚ»¤¶ñÒâÈí¼þ´úÂë¡£KazuarµÄй¦Ð§°üÂÞ£º¸üÈ«ÃæµÄϵͳ·ÖÎö£¬ÇÔÈ¡ÔÆÓ¦Ó÷¨Ê½ºÍÐźÅÏûÏ¢Ó¦Ó÷¨Ê½£¬Ö§³Ö45¸öÃüÁ¹¥»÷Õ߿ɿªÆô/¹Ø±ÕһϵÁÐ×Ô¶¯»¯ÈÎÎñ£¬ÊµÏÖ²îÒìµÄ¼ÓÃÜËã·¨ºÍ·½°¸£¬ÒÔ¼°¾ßÓжàÖÖ×¢Èëģʽ¡£
https://unit42.paloaltonetworks.com/pensive-ursa-uses-upgraded-kazuar-backdoor/
6¡¢HPÐû²¼2023ÄêµÚÈý¼¾¶ÈÍøÂçÄþ¾²Ì¬ÊƵķÖÎö³ÂËß
10ÔÂ31ÈÕ£¬HPÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈÍøÂçÄþ¾²Ì¬ÊƵķÖÎö³ÂËß¡£¹¥»÷ÕßÔÚQ3¼ÌÐøÀûÓÃliving-off-the-land¹¥»÷¼ÆÄ±£¬Í¨¹ýWindowsÄÚÖõŤ¾ßÖ´Ðй¥»÷¡£ÀûÓÃExcel²å¼þ(XLL)ÎļþµÄ»î¶¯¼¤Ôö£¬ÔÚ¹¥»÷Õß×î³£ÓõÄÎļþÀ©Õ¹ÃûÖУ¬ÆôÓúêµÄExcel²å¼þ¶ñÒâÈí¼þ´ÓQ2µÄµÚ46λÉÏÉýµ½µÚ7λ¡£HP»¹·¢ÏÖÁËÒ»¸öÕë¶ÔÀ¶¡ÃÀÖ޾ƵêµÄ¹¥»÷»î¶¯£¬Ê¹ÓÃÁËÆôÓúêµÄPowerPoint²å¼þ¡£¹¥»÷Õß»¹ÔÚGitHubÉÏÍйÜαÔìµÄRAT£¬ÊÔͼÓÕÆÈ±·¦¾ÑéµÄºÚ¿ÍѬȾËûÃÇ×Ô¼ºµÄPC¡£
https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q3-2023/