ŦԼ½ô¼±ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-09-201¡¢Å¦Ô¼½ô¼±ÏìÓ¦ºÍ¾È»¤³µ·þÎñÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå9ÔÂ17ÈÕ±¨µÀ£¬Î»ÓÚŦԼµÄ½ô¼±ÏìÓ¦ºÍ¾È»¤³µ·þÎñÌṩÉÌEmpress EMS£¨½ô¼±Ò½ÁÆ·þÎñ£©Åû¶ÁËÒ»Æð¿Í»§ÐÅϢй¶Ê¼þ¡£Æ¾¾Ý֪ͨ£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ·ÃÎÊȨÏÞ£¬ÔÚÔ¼Ò»¸ö°ëÔº󣬼´7ÔÂ13ÈÕÇÔÈ¡ÁËһС²¿ÃÅÎļþ¡£Empress EMSÕýÔÚ֪ͨÊÜÓ°ÏìµÄ¸öÈË£¬²¢ÎªÇкÏÌõ¼þµÄ¸öÈËÌṩÐÅÓÃ¼à¿Ø·þÎñ¡£¾¡¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬µ«ºÜ¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ
ýÌå9ÔÂ19Èճƣ¬¹¥»÷Õßͨ¹ýµöÓã¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿ÃÅÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬²¢»ñµÃÁ˸öÈËÐÅÏ¢µÄ·ÃÎÊȨÏÞ¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢ÏÖÁËÕâÒ»ÎÊÌ⣬֮ºóÁ¢¿Ì±£»¤ÁËÊÊÓõÄÓʼþÕÊ»§£¬²¢Æ¸ÇëÁ˵ÚÈý·½Äþ¾²È¡Ö¤¹«Ë¾½øÐÐÊӲ죬ÒÔÈ·¶¨Ê¼þµÄÐÔÖʺͷ¶Î§¡£¸Ãº½¿Õ¹«Ë¾¾Ü¾øÍ¸Â¶ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÁ¿£¬µ«ÌåÏÖÕâÊÇÒ»¸ö·Ç³£Ð¡µÄÊý×Ö£¬ÇÒûÓÐÊý¾Ý±»ÀÄÓã¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£
https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/
3¡¢CISAºÍNSAÐû²¼¿ª·ÅÎÞÏßµç½ÓÈëÍøÂçÄþ¾²µÄ×¢ÒâÊÂÏî
9ÔÂ16ÈÕ£¬CISAºÍNSAÐû²¼ÁË¿ª·ÅÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©Äþ¾²µÄ×¢ÒâÊÂÏî¡£Open RANÊÇ´«Í³RAN¼Ü¹¹ÑݱäΪ¿ª·Å»¥²Ù×÷½Ó¿Ú¡¢ÐéÄ⻯¡¢´óÊý¾ÝºÍÖ§³ÖÈ˹¤ÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓOpen RAN¼Ü¹¹´ò¿ªÁËÔÆºÍÐéÄ⻯µÄ´óÃÅ£¬Í¬Ê±Í¨¹ý´´½¨¶à¹©Ó¦ÉÌÉú̬ϵͳÀ´´Ù½ø¾ºÕù¼Ó¾ç¡¢¹©Ó¦É̶àÑùÐԺʹ´Ð¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëʵʩ¿ª·ÅRAN¼Ü¹¹Ïà¹ØµÄºÃ´¦ºÍÄþ¾²×¢ÒâÊÂÏCISAÃãÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©Ó¦É̺ÍÀûÒæÏà¹ØÕß¼ì²ìÕâЩעÒâÊÂÏî¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security
4¡¢ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÂôÁ¦
¾Ý9ÔÂ15ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾Bell¼¼Êõ½â¾ö·½°¸(BTS)ϵͳµÄ¹¥»÷ÂôÁ¦¡£BTSÊÇÒ»¼ÒÓµÓÐ4500¶àÃûÔ±¹¤µÄ¶ÀÁ¢×Ó¹«Ë¾£¬×¨ÃÅΪ°²´óÂÔÊ¡ºÍ¿ý±±¿ËÊ¡µÄסլºÍСÐÍÆóÒµ¿Í»§°²×°Bell·þÎñ¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐ͸¶¹¥»÷·¢ÉúµÄʱ¼ä£¬µ«HiveÔÚÆäÍøÕ¾ÖÐÌåÏÖÔÚÔ¼Ò»¸öÔÂǰ£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£BTSµÄÍøÕ¾Ä¿Ç°ÈÔÎÞ·¨·ÃÎÊ£¬²¿Ãſͻ§µÄÐÕÃû¡¢µØÖ·ºÍµç»°ÐÅϢй¶¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒÁ÷´«
KasperskyÔÚ9ÔÂ15ÈÕ͸¶£¬Ò»¸öеĶñÒâÈí¼þ°üÀûÓñ»¹¥»÷µÄYouTubeƵµÀÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒÁ÷´«¡£ÕâЩÊÓÆµÍ¨³£°üÂÞÏÂÔØ¼ÙµÄÆÆ½âºÍ×÷±×Èí¼þµÄÁ´½Ó£¬Êµ¼ÊÉϻᰲװ×ÔÎÒÁ÷´«µÄ¶ñÒâÈí¼þ°ü£¬Ö÷ÒªÕë¶ÔFIFA¡¢×îÖÕ»ÃÏë¡¢¼«ÏÞ¾ºËÙµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÈÓÎÏ·µÄ·ÛË¿¡£Ôʼ°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬ÆäÖаüÂÞÐí¶à¶ñÒâÎļþ¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬·Ö±ðΪRedLineÇÔÈ¡·¨Ê½¡¢¿ó¹¤ºÍÅú´¦ÖÃÎļþ¡£
https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
6¡¢AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
9ÔÂ15ÈÕ£¬AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£×Ô9Ô³õÒÔÀ´£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢ÏÖÁËTeamTNT»î¶¯µÄ¼£Ï󣬲¢ÏàПúڿÍ×éÖ¯ÓÖ¿ªÊ¼Ðж¯ÁË¡£Ñо¿ÈËÔ±ÔÚTeamTNTÐÂÒ»ÂֵĻÖÐÊӲ쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬ÀûÓñ»½Ù³Ö·þÎñÆ÷µÄ¼ÆËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»Cronb¹¥»÷£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈ¼¼Êõ£»What Will Be¹¥»÷£¬Õë¶ÔDockerÊØ»¤½ø³Ì£¬ÀûÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬ÀûÓé¶´´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£
https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt