Clearview AIÒò·Ç·¨ÊÕ¼¯Êý¾Ý±»·¨¹ú·£¿î2000ÍòÅ·Ôª
Ðû²¼Ê±¼ä 2022-10-24
10ÔÂ21ÈÕ±¨µÀ£¬·¨¹úÊý¾Ý±£»¤»ú¹¹(CNIL)Òò·Ç·¨ÊÕ¼¯ºÍ´¦Ö÷¨¹ú¹«ÃñµÄÉúÎïÌØÕ÷Êý¾Ý¶ø¶ÔClearview AI´¦ÒÔ2000ÍòÅ·ÔªµÄ·£¿î¡£CNIL»¹ÃüÁîÕâ¼Ò¹«Ë¾Í£Ö¹ËùÓеÄÊý¾ÝÊÕ¼¯»î¶¯£¬²¢ÔÚÁ½¸öÔÂÄÚɾ³ýÒѾÊÕ¼¯µÄËùÓÐÊý¾Ý¡£Èç¹ûClearview AIÔÚÁ½¸öÔºóδÄÜ×ñÊØÃüÁCNIL½«¶Ô¸Ã¹«Ë¾´¦ÒÔÿÌì100000Å·ÔªµÄ·£¿î¡£CNILͨ¸æÖгƣ¬¸Ã»ú¹¹ÔÚ2021Äê5ÔÂÔø¾ÍÎ¥¹æÐÐΪÏòClearview AI·¢³öÁ˾¯¸æ£¬²¢ÔÚ2021Äê12Ô·¢³öÁË×îºó¾¯¸æ£¬µ«ºóÕßδ×ñÊØÃüÁî¡£
https://www.bleepingcomputer.com/news/security/clearview-ai-gets-third-20-million-fine-for-illegal-data-collection/
2¡¢Black RewardÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÒÁÀÊÔ×ÓÄÜ»ú¹¹µÄÊý¾Ý
¾Ý10ÔÂ23ÈÕ±¨µÀ£¬×Ô³ÆΪBlack RewardµÄºÚ¿ÍÍÅ»ïÔÚTelegramÉÏÉù³Æ¹¥»÷ÁËÒÁÀÊÔ×ÓÄÜ×éÖ¯£¬´ËÍ⣬ËûÃÇ»¹Ðû²¼ÁËÓйز¼Ê²¶û¹¤³§µÄºÏͬ¡¢½¨Éè¼Æ»®ºÍÉ豸ϸ½ÚµÄÏà¹ØÎļþ£¬×÷ΪÈëÇÖµÄÖ¤¾Ý¡£¸Ã×éÖ¯³ÆÒÑÇÔÈ¡50 GBµÄÎļþ£¬Ä¿Ç°Éв»Çå³þÕâЩÊý¾ÝÖÐÊÇ·ñ»¹°üÂÞ»úÃÜÐÅÏ¢¡£ÒÁÀÊÔ×ÓÄÜ»ú¹¹ÔÚÉÏÖÜÈÕ͸¶£¬¹¥»÷ÕßÈëÇÖÁËÒ»¼ÒÔÚ²¼Ê²¶ûÔËÓª¸Ã¹úΨһºËµçÕ¾µÄ¹«Ë¾ËùʹÓõĵç×ÓÓʼþϵͳ£¬²¢½«¹¥»÷¹é¾ÌÓÚ¡°Íâ¹ú¡±£¬µ«Ã»ÓÐÏêϸ˵Ã÷¡£
https://securityaffairs.co/wordpress/137513/hacking/hackers-stole-sensitive-data-from-irans-atomic-energy-agency.html
3¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹AAH͸¶Լ300Íò»¼ÕߵĸöÈËÐÅϢй¶
ýÌå10ÔÂ20ÈÕ±¨µÀ£¬ÔÚÍþ˹¿µÐÇÖݺÍÒÁÀûŵÒÁÖÝÓµÓÐ26¼ÒÒ½ÔºµÄAdvocate Aurora Health(AAH)ÕýÔÚÏòÆ仼Õß·¢Ë͹ØÓÚ½üÆÚÊý¾Ýй¶Ê¼þµÄ֪ͨ¡£¸ÃʼþÊÇÓÉÓÚÔÚAAHÍøÕ¾É϶ÔMeta PixelµÄʹÓò»Í×Ôì³ÉµÄ£¬¿ÉÄÜ鶻¼ÕߵĸöÈ˺ÍÒ½ÁÆÐÅÏ¢¡£AAHÏòÃÀ¹úÎÀÉú²¿µÄ³ÂË߳ƣ¬¸ÃʼþÓ°ÏìÁËÔ¼300ÍòÈË¡£ÃÀ¹úÐí¶àÒ½Ôº¶¼Ê¹ÓÃMeta Pixel£¬Òò´ËÕâÒ»Òþ˽й¶ÎÊÌâÔڸùúÏÆÆðÁËÒ»³¡·çÀË£¬µ¼ÖÂÊý°ÙÍòÈËÐÅϢ̻¶¸øµÚÈý·½£¬²¢Òý·¢Á˶ÔÔðÈλú¹¹µÄ¼¯ÌåËßËÏ¡£
https://www.securityweek.com/data-3-million-advocate-aurora-health-patients-exposed-malformed-pixel
4¡¢Google PlayÖеÄ16¸ö¶ñÒâÓ¦ÓÃÒѱ»ÏÂÔØÁè¼Ý2000Íò´Î
McAfeeÓÚ10ÔÂ19ÈÕÅû¶ÁËGoogle PlayÉÏ16¸öѬȾÁËClicker¶ñÒâÈí¼þµÄÓ¦Óã¬×Ü°²×°Á¿¸ß´ï2000Íò´Î¡£ClickerÊÇÒ»ÖÖÌØÊâµÄ¹ã¸æÈí¼þ£¬ËüÔÚ²»ÐмûµÄ¿ò¼Ü»òÅä¾°ÖмÓÔعã¸æ²¢µã»÷ËüÃÇΪÆäÔËÓªÍŻﴴÊÕ¡£¶ÔÉ豸µÄÓ°Ïì¿ÉÄÜÊǵ¼ÖÂÐÔÄÜϽµ¡¢¹ýÈÈ¡¢µç³ØʹÓÃÁ¿Ôö¼ÓÒÔ¼°Òƶ¯Êý¾ÝÊշѹý¸ß¡£Ä¿Ç°£¬ÕâЩ¶ñÒâÓ¦ÓÃÒѱ»É¾³ý£¬ÆäÖÐDxCleanÔÚ±»É¾³ý֮ǰÒÑ°²×°ÁË500Íò´Î¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-malicious-clicker-found-in-apps-installed-by-20m-users/
5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚDaixin TeamµÄÄþ¾²×Éѯ
10ÔÂ21ÈÕ£¬CISA¡¢FBIºÍHHSÁªºÏÐû²¼Á˹ØÓÚDaixin TeamµÄÄþ¾²×Éѯ¡£¸ÃÍÅ»ï×Ô2022Äê6Ô¿ªÊ¼¾ÍÕë¶ÔÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)²¿ÃÅ£¬¶ÔÓÃÓÚÒ½ÁÆ·þÎñµÄϵͳ½øÐмÓÃÜ£¬²¢ÇÔÈ¡»¼ÕߵĽ¡¿µÐÅÏ¢(PHI)ºÍ¸öÈËÉí·ÝÐÅÏ¢(PII)¡£¹¥»÷Õßͨ¹ýÀûÓÃ×éÖ¯VPN·þÎñÆ÷ÖеÄ©¶´£¬»òʹÓÃÏÈÇ°±»ÆÆ»µµÄƾ¾Ý·ÃÎÊδÆôÓÃMFAµÄµÄ¾É°æVPN·þÎñÆ÷£¬À´»ñµÃ¶ÔÄ¿±êÍøÂçµÄ·ÃÎÊȨÏÞ¡£Ò»µ©Àֳɣ¬ËûÃǾͻáʹÓÃRDPºÍSSHÔÚÄ¿±êÍøÂçÖкáÏòÒƶ¯¡£¸Ã×Éѯ»¹¹ûÈ»ÁËIOCºÍTTP£¬ÒÔ×ÊÖúÄþ¾²ÈËÔ±¼ì²âºÍ×èÖ¹´ËÀ๥»÷¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/21/stopransomware-daixin-team
6¡¢MandiantÐû²¼¹ØÓÚURSNIFбäÌåµÄ¼¼Êõ·ÖÎö³ÂËß
10ÔÂ19ÈÕ£¬MandiantÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þURSNIFбäÌåµÄ¼¼Êõ·ÖÎö³ÂËß¡£Ð±äÌåÔÚ6ÔÂÊ״α»·¢ÏÖ£¬Óë֮ǰµÄµü´ú°æ±¾²îÒ죬Õâ¸ö±»³ÆΪLDR4µÄбäÌå²»ÊÇÒøÐÐľÂí£¬¶øÊÇÒ»¸öÆÕͨµÄºóÃÅ£¨ÀàËÆÓÚSAIGON±äÌ壩¡£ÓëLDR4Ïà¹ØµÄ¹¥»÷Á´Ê¼ÓÚÕÐƸÏà¹ØµÄÀ¬»øÓʼþ»î¶¯£¬Óʼþ°üÂÞÖ¸Ïò±»Ñ¬È¾ÍøÕ¾µÄÁ´½Ó£¬Á´½ÓÖض¨Ïòµ½Î±×°³ÉºÏ·¨¹«Ë¾µÄÓò¡£»áÏÂÔØ°üÂÞÓëÓʼþÓÕ¶üÏà¹ØµÄExcelÎĵµ£¬´ò¿ªºó½«ÏÂÔز¢Ö´ÐÐLDR4 payload¡£¶Ô×îбäÌå´úÂëµÄ·ÖÎö±íÃ÷£¬¿ª·¢ÈËÔ±ÒѾÍêȫɾ³ýÁËÒøÐÐÏà¹Ø¹¦Ð§¡£
https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud