±£¼ÓÀûÑÇ×Üͳ°ì¹«ÊÒµÈÕþ¸®»ú¹¹µÄÍøÕ¾Ôâµ½DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-10-18
±£¼ÓÀûÑÇ×ܼì²ì³¤°ì¹«ÊÒ10ÔÂ15ÈÕÌåÏÖ£¬±£¼ÓÀûÑÇÕþ¸®»ú¹¹µÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£DDoS¹¥»÷¡£×ܼì²ì³¤³Æ£¬³ýÁË×Üͳ°ì¹«ÊÒ£¬´Ë´ÎDDoS¹¥»÷»¹µ¼Ö¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Ë¾·¨²¿ºÍÏÜ·¨·¨ÔºµÄÍøÕ¾·þÎñÖжϡ£ËûÔö²¹µÀ£¬´Ë´Î¹¥»÷À´×Ô¶íÂÞ˹¶¼ÊÐÂí¸ñÄáÍиç¶û˹¿Ë£¨Magnitogorsk£©¡£±£¼ÓÀûÑÇÕþ¸®ÒѶÔÕâһʼþÕ¹¿ªÊӲ죬²¢ÒѽÓÄÉ´ëÊ©¼õÉÙ¹¥»÷´øÀ´µÄÓ°Ïì¡£
https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html
2¡¢0patchƽ̨Ðû²¼MotWÖÐÒѱ»ÀûÓõÄ©¶´µÄ·Ç¹Ù·½²¹¶¡
¾ÝýÌå10ÔÂ17ÈÕ±¨µÀ£¬0patchƽ̨Ðû²¼ÁËÒ»¸öÃâ·ÑµÄ·Ç¹Ù·½²¹¶¡£¬ÒÔÐÞ¸´Windows Mark of the Web(MotW)Äþ¾²»úÖÆÖб»»ý¼«ÀûÓõÄ©¶´¡£¸Ã©¶´¿É±»¹¥»÷ÕßÓÃÀ´×èÖ¹WindowsÔÚ´ÓInternetÏÂÔØµÄZIP´æµµÖÐÌáÈ¡µÄÎļþÉÏÓ¦ÓÃ(MotW)±êÇ©¡£Ñо¿ÈËÔ±ÓÚ7ÔÂÏòMicrosoft³ÂËßÁ˸ÃÎÊÌ⣬ËûÊ×ÏÈ·¢ÏÖÁËZIPÎĵµÎ´ÕýÈ·Ìí¼ÓMoTW±êÖ¾¡£ÔÚ΢ÈíÐû²¼¹Ù·½¸üÐÂ֮ǰ£¬0patchΪ¶à¸öÊÜÓ°ÏìµÄ°æ±¾¿ª·¢ÁËÃâ·ÑµÄ²¹¶¡¡£
https://www.bleepingcomputer.com/news/microsoft/windows-mark-of-the-web-bypass-zero-day-gets-unofficial-patch/
3¡¢Woolworths³ÆÆä220ÍòMyDeal¿Í»§µÄÐÅÏ¢ÒѾй¶
¾Ý10ÔÂ15ÈÕ±¨µÀ£¬WoolworthsµÄ×Ó¹«Ë¾MyDealÅû¶ÁËÒ»ÆðÓ°Ïì220Íò¿Í»§µÄÊý¾Ýй¶Ê¼þ¡£ÉÏÖÜÎ壬MyDealÌåÏÖºÚ¿ÍʹÓÃй¶µÄÓû§Æ¾¾Ý·ÃÎÊÁ˹«Ë¾µÄ¿Í»§¹ØÏµ¹ÜÀí(CRM) ϵͳ£¬´Ó¶ø¿ÉÒÔ¼ì²ìºÍµ¼³ö¿Í»§ÐÅÏ¢¡£ÉÏÖÜÈÕ£¬¹¥»÷Õß¿ªÊ¼ÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏÒÔ600ÃÀÔªµÄ¼Û¸ñ³öÊÛ±»µÁÊý¾Ý¡£¹¥»÷ÕßÉù³Æ¸ÃÊý¾ÝĿǰ°üÂÞ100Íò¸öÌõÄ¿£¬µ«µ±ËûÃÇÍê³É¶ÔÊý¾Ý¿âµÄ½âÎöʱ£¬Ð¹Â¶µÄ¿Í»§ÊýÁ¿½«»áÔö¼Ó¡£10ÔÂ17ÈÕ£¬ºÚ¿Í¹ûÈ»ÁË286¸öMyDeal¿Í»§µÄÐÅÏ¢×÷Ϊ±»µÁÊý¾ÝµÄÑù±¾¡£
https://www.databreaches.net/woolworths-says-2-2m-mydeal-customers-data-hacked/
4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÁªºÏÐж¯´þ²¶Black AxeÍÅ»ïµÄ75ÈË
10ÔÂ17ÈÕ±¨µÀ£¬¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼´þ²¶Á˺ڿÍÍÅ»ïBlack AxµÄ75ÈË£¬ÆäÖÐÁ½ÈËÔÚÉϸöÔµ׳ïıÁ˶àÖÖÆÛÕ©»î¶¯²¢»ñÀû180ÍòÃÀÔª¡£ÕâЩÏÓÒÉÈËÊÇÔÚ2022Äê9ÔÂ26ÈÕÖÁ30ÈÕÆÚ¼äÔÚÄϷǽøÐеĹú¼ÊÁªºÏÖ´·¨Ðж¯Operation JackalÖб»²¶µÄ¡£Black AxeÓÚ1977ÄêÔÚÄáÈÕÀûÑǽ¨Á¢£¬±»ÈÏΪÊÇÊÀ½çÉÏÓ°Ïì×îÉîÔ¶¡¢×îΣÏյķ¸×ïÍÅ»ïÖ®Ò»£¬ÓÚ2015ÄêÊ×´ÎÉæ×ãÍøÂç·¸×ï¡£´Ë´ÎÖ´·¨Ðж¯½øÐÐÁË49´Î¹¤ÒµËѲ飬²é»ñÁË12000ÕÅSIM¿¨ºÍ´óÁ¿µÄÆäËü×ʲú¡£
https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html
5¡¢WIP19ÍÅ»ïÖ÷ÒªÕë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ
ýÌå10ÔÂ14ÈÕ͸¶£¬SentinelOne³ÆÆä·¢ÏÖÁËÐµĹ¥»÷ÍÅ»ïWIP19Ò»Ö±Õë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍIT·þÎñÌṩÉÌ¡£¸ÃÍÅ»ïʹÓÃÓɺ«¹ú¹«Ë¾DEEPSoft·¢±íµÄºÏ·¨µÄ±»µÁÊý×ÖÖ¤ÊéÀ´Ç©ÊðÔÚѬȾÁ´Öа²×°µÄ¶ñÒ⹤¼þ£¬ÒÔÈÆ¹ý¼ì²â¡£Ëü»¹ÓëOperation Shadow ForceÓÐËùÖØµþ£¬µ«Ê¹ÓÃÁËеĶñÒâÈí¼þºÍ²îÒìµÄ¼¼Êõ¡£´ËÍ⣬¹¥»÷ÕßÔڻÖÐʹÓÃÁ˶àÖÖ¹¤¾ß£¬°üÂÞÆ¾Ö¤×ª´¢·¨Ê½¡¢ÍøÂçɨÃ蹤¾ß¡¢ä¯ÀÀÆ÷ÇÔÈ¡·¨Ê½¡¢¼üÅ̼Ǽ¹¤¾ßºÍÆÁÄ»¼Ç¼¹¤¾ß¡£
https://thehackernews.com/2022/10/new-chinese-cyberespionage-group.html
6¡¢HP³ÆMagniberͨ¹ýJavaScriptÎļþѬȾWindowsÓû§
HPÔÚ10ÔÂ13ÈÕÐû²¼³ÂËß½ÒʾÁËÀÕË÷Èí¼þMagniberÐÂÒ»Âֵķַ¢»î¶¯¡£ÔÚ֮ǰµÄ»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁËMSIºÍEXEÎļþ£¬¶ø×î½ü£¬ËüÇл»µ½ÁËJavaScriptÎļþ¡£ÕâЩÎļþ¾¹ý»ìÏý´¦Ö㬲¢Ê¹ÓÃDotNetToJScript¼¼ÊõµÄ±äÌåÔÚϵͳÄÚ´æÖÐÖ´ÐÐ.NETÎļþ¡£.NETÎļþ¶Ôshellcode½øÐнâÂë²¢½«Æä×¢Èëнø³Ì¡£×îÖÕ£¬Magniber¶ÔÖ÷»úÉϵÄÎļþ½øÐмÓÃÜ£¬²¢ÁôÏÂÊê½ð¼Ç¼¡£HPÖ¸³ö£¬¸ÃÍÅ»ï»áÒªÇó¼ÒÍ¥Óû§Ö§¸¶¸ß´ï2500ÃÀÔªµÄÓöÈÀ´»Ö¸´Îļþ¡£
https://threatresearch.ext.hp.com/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates/