Binarly·¢ÏÖÓ°ÏìUEFIÖÐͼÏñ½âÎö×é¼þµÄ©¶´LogoFAIL
Ðû²¼Ê±¼ä 2023-12-04¾ÝýÌå11ÔÂ30ÈÕ±¨µÀ£¬Binarly·¢ÏÖÁËͳ³ÆÎªLogoFAILµÄ¶à¸öÄþ¾²Â©¶´£¬¿ÉÓ°Ïì¸÷¸ö¹©Ó¦É̵ÄUEFI´úÂëÖеÄͼÏñ½âÎö×é¼þ¡£Ñо¿ÈËÔ±·¢ÏÖ£¬¹¥»÷Õß¿ÉÒÔ½«¶ñÒâͼÏñ»òlogo´æ´¢ÔÚEFIϵͳ·ÖÇø(ESP)»ò¹Ì¼þ¸üеÄδǩÃû²¿ÃÅÖС£ÒÔÕâÖÖ·½Ê½Ö²Èë¶ñÒâÈí¼þ¿ÉÈ·±£ÔÚϵͳÖÐÁ¬Ðø´æÔÚ£¬¼¸ºõ²»»á±»·¢ÏÖ¡£BinarlyÒѾȷ¶¨Ó¢Ìضû¡¢ºê³ž¡¢ÁªÏëºÍÆäËü¹©Ó¦É̵ÄÊý°Ù¸öÐͺſÉÄÜ´æÔÚ©¶´£¬¶¨ÖÆUEFI¹Ì¼þ´úÂëµÄÈý´ó¶ÀÁ¢ÌṩÉÌAMI¡¢InsydeºÍPhoenixÒ²ÊÇÈç´Ë¡£Ä¿Ç°£¬¸Ã©¶´µÄ¾ßÌåÓ°Ï췶ΧÈÔÔÚÈ·¶¨ÖС£
https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/
2¡¢ÃÀ¹ú¹«Ë¾StaplesÔâµ½ÍøÂç¹¥»÷ÒµÎñÔËÓªÊܵ½Ó°Ïì
ýÌå11ÔÂ30Èճƣ¬ÃÀ¹ú°ì¹«ÓÃÆ·ÁãÊÛÉÌStaplesÔâµ½ÍøÂç¹¥»÷ºó¹Ø±ÕÁ˲¿ÃÅϵͳ¡£×ÔÉÏÖÜÒ»ÒÔÀ´£¬StaplesÓöµ½ÁËÖÖÖÖÄÚ²¿ÔËÓªÎÊÌ⣬°üÂÞÎÞ·¨·ÃÎÊZendesk¡¢VPNÔ±¹¤ÃÅ»§¡¢´òÓ¡µç×ÓÓʼþºÍʹÓõ绰Ïߵȡ£ÓÐÔ±¹¤³Æ£¬Ò»Çж¼´¦ÓÚå´»ú״̬£¬ÔÚÃŵêÊÂÇéÎÞ·¨·ÃÎʵç×ÓÓʼþ¡¢bizfit¡¢pogsºÍµç×Ó·þÎñ̨¡£StaplesÌåÏÖËûÃÇÔÚ11ÔÂ27ÈÕ·¢ÏÖ¹¥»÷ºóÁ¢¼´½ÓÄÉÁËÏìÓ¦´ëÊ©£¬µ«Õâµ¼ÖÂÆäºǫ́´¦Öúͽ»¸¶ÒÔ¼°Í¨ÐÅÇþµÀºÍ¿Í»§·þÎñÔÝʱÖжϡ£¾ÝϤ£¬Õâ´Î¹¥»÷ÖÐûÓа²×°ÀÕË÷Èí¼þ£¬Ò²Ã»ÓÐÎļþ±»¼ÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/staples-confirms-cyberattack-behind-service-outages-delivery-issues/
3¡¢Ô¼60¼ÒÐÅÓúÏ×÷ÉçÒò¹©Ó¦É̱»ÀÕË÷¹¥»÷·þÎñÔÝʱÖжÏ
12ÔÂ2ÈÕ±¨µÀ³Æ£¬ÔÆ·þÎñÌṩÉÌOngoing OperationsÔâµ½ÁËÀÕË÷¹¥»÷£¬ËüÁ¥ÊôÓÚÐÅÓÃÉç¼¼Êõ¹«Ë¾Trellance¡£¹ú¼ÒÐÅÓÃÉç¹ÜÀí¾Ö(NCUA)ÌåÏÖ£¬²¿ÃÅÐÅÓÃÉçÊÕµ½ÁËÀ´×ÔOngoing OperationsµÄÐÅÏ¢£¬Í¸Â¶¸Ã¹«Ë¾ÔÚ11ÔÂ26ÈÕÔâµ½ÁËÀÕË÷¹¥»÷¡£Ä¿Ç°£¬ÊÓ²ìÈÔÔÚ½øÐÐÖУ¬ÏÖÒÑÈ·ÈÏÔ¼60¼ÒÐÅÓúÏ×÷ÉçÓÉÓÚµÚÈý·½·þÎñÌṩÉÌÔâµ½¹¥»÷£¬ÕýÔÚ¾ÀúÒ»¶¨Ë®Æ½µÄ·þÎñÖжϡ£
https://therecord.media/credit-unions-facing-outages-due-to-ransomware
4¡¢Å²ÍþÀ͹¤ºÍ¸£Àû¹ÜÀí¾ÖÒòÊý¾Ýй¶±»·£¿î185ÍòÃÀÔª
¾Ý12ÔÂ3ÈÕ±¨µÀ£¬Å²ÍþÀ͹¤ºÍ¸£Àû¹ÜÀí¾Ö(NAV)±»Å²Íþ¼à¹Ü¾Ö£¨Datatilsynet£©·£¿î170ÍòÅ·Ôª¡£Å²ÍþÊý¾Ý±£»¤¾ÖÔÚNAVµÄÉó¼ÆÖз¢ÏÖÁË12ÆðÎ¥·´¸öÈËÊý¾Ý±£»¤ÌõÀýµÄÐÐΪ¡£×÷ΪÊÓ²ìµÄÒ»²¿ÃÅ£¬DPA·¢ÏÖ¿ØÖÆÕßδÄܽÓÄÉÊʵ±µÄ¼¼ÊõºÍ×éÖ¯´ëÊ©À´±£»¤¸öÈËÊý¾Ý£¬ÀýÈçITϵͳûÓеõ½³äʵµÄ±£»¤¡£´ËÍ⣬¹ý¶àµÄÔ±¹¤¿ÉÒÔ·ÃÎʸöÈËÊý¾Ý£¬ÔÚijЩÇé¿öϰüÂ޷dz£Ãô¸ÐµÄÊý¾Ý¡£Í¬Ê±£¬¿ØÖÆÕßδÄܶÔÔ±¹¤Ê¹ÓÃITϵͳ½øÐÐϵͳµÄ¿ØÖÆ¡£
https://www.databreaches.net/norwegian-labor-and-welfare-administration-fined-for-data-protection-failures/
5¡¢Unit 42Åû¶Õë¶ÔÖж«¡¢·ÇÖÞºÍÃÀ¹úµÈµØµÄ¹¥»÷»î¶¯
Unit 42ÔÚ12ÔÂ1ÈÕÅû¶ÁËкóÃÅAgent Raccoon£¬Ëü±»ÓÃÓÚÕë¶ÔÖж«¡¢·ÇÖÞºÍÃÀ¹úµÈµØµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯Ö÷ÒªÕë¶Ô½ÌÓý¡¢·¿µØ²ú¡¢ÁãÊÛ¡¢·ÇÓªÀû×éÖ¯¡¢µçÐŹ«Ë¾ºÍÕþ¸®»ú¹¹£¬¹¥»÷ÍŻﱻUnit 42×·×ÙΪCL-STA-0002¡£ºóÃÅÓÃ.NET¿ª·¢£¬²¢ÀûÓÃÓòÃû·þÎñ(DNS)ÐÒéÓëC2»ù´¡ÉèÊ©½¨Á¢Òþ±ÎµÄͨÐÅͨµÀ¡£Agent RaccoonÔÚ¶à´Î¹¥»÷ÖÐÓëÆäËüÁ½¸ö¹¤¾ß½áºÏʹÓã¬ÆäÖÐÒ»¸öÊÇÇÔÈ¡Óû§Æ¾¾ÝµÄNetwork Provider DLLÄ£¿éNtospy£¬ÁíÒ»¸öÊDZ»³ÆÎªMimiliteµÄ¶¨ÖưæMimikatz¡£
https://unit42.paloaltonetworks.com/new-toolset-targets-middle-east-africa-usa/
6¡¢KasperskyÐû²¼2023ÄêQ3 ITÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß
12ÔÂ1ÈÕ£¬KasperskyÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈITÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß¡£³ÂËßÖÐÌá¼°µÄÓÐÕë¶ÔÐԵĹ¥»÷·ÖÎö°üÂÞ£ºÀûÓÃDroxiDatºÍCobalt Strike¹¥»÷ÄÜÔ´ÐÐÒµ¡¢ÀûÓÃCVE-2023-23397©¶´µÄ¹¥»÷¡¢Õë¶Ô¹¤¿ØÐÐÒµµÄ¹¥»÷Öг£¼ûµÄTTPºÍαÔìµÄTelegramÓ¦Óõȡ£ÆäËü¶ñÒâÈí¼þ°üÂÞ£ºÕë¶ÔLinuxµÄ¹©Ó¦Á´¹¥»÷¡¢CubaÀÕË÷ÍŻй¶µÄLockbit 3¹¹½¨Æ÷¡¢²»Í£Éú³¤µÄ¶ñÒâÈí¼þ¸ñʽÒÔ¼°cryptor¡¢stealerºÍbanking TrojanµÈ¡£
https://securelist.com/it-threat-evolution-q3-2023/111171/