Ó¡¶ÈSree SaranÒ½ÁÆÖÐÐÄÁè¼Ý15Íò»¼ÕßµÄÊý¾Ý±»³öÊÛ

Ðû²¼Ê±¼ä 2022-12-06
1¡¢Ó¡¶ÈSree SaranÒ½ÁÆÖÐÐÄÁè¼Ý15Íò»¼ÕßµÄÊý¾Ý±»³öÊÛ

ýÌå12ÔÂ2Èճƣ¬Ä³ºÚ¿ÍÕýÔÚ³öÊÛÓ¡¶ÈÌ©Ã×¶ûÄɵ°îSree SaranÒ½ÁÆÖÐÐĵϼÕßÊý¾Ý¡£Ñо¿ÈËԱ͸¶£¬´ËʼþÔ´ÓÚ¹©Ó¦Á´¹¥»÷£¬Ò½ÔºµÄIT¹©Ó¦ÉÌThree Cube IT LabÊ×ÏÈÔâµ½¹¥»÷¡£¹¥»÷ÕßÀûÓöԹ©Ó¦ÉÌϵͳµÄ·ÃÎÊȨÏÞ£¬ÈëÇÖÒ½ÔºµÄϵͳ²¢ÇÔÈ¡»¼ÕßµÄPIIºÍPHIÐÅÏ¢¡£Ä¿Ç°£¬ÕâЩÊý¾ÝÔÚTelegramÉϳöÊÛ¡£Âô¼ÒÐû²¼µÄÑù±¾ÏÔʾÊý¾ÝÀ´×Ô2007-2011Ä꣬ÆäÖаüÂÞ15ÍòÌõ»¼ÕßÐÅÏ¢¼Ç¼¡£

https://www.databreaches.net/in-hackers-selling-personal-data-of-150000-patients-from-a-tamil-nadu-hospital-in-supply-chain-attack/

2¡¢AMI MegaRAC BMCÖжà¸ö©¶´Ó°ÏìAMDºÍ´÷¶ûµÈ³§ÉÌ

¾Ý12ÔÂ5ÈÕ±¨µÀ£¬American Megatrends MegaRAC Baseboard Management Controller(BMC)ÖеÄ3¸ö©¶´Ó°Ïì¶à¸öÔÆ·þÎñºÍÊý¾ÝÖÐÐÄÌṩÉÌʹÓõķþÎñÆ÷¡£ÆäÖÐ×îÑÏÖØµÄÊÇRedfish APIµÄÈÎÒâ´úÂëÖ´ÐЩ¶´£¨CVE-2022-40259£©£¬CVSSÆÀ·ÖΪ9.9£¬µ«ÐèÒªÊÂÏÈÖÁÉÙ·ÃÎÊÒ»¸öµÍȨÏÞÕÊ»§²ÅÆøÖ´ÐÐAPI»Øµ÷¡£Æä´ÎΪ¿É»ñµÃ¹ÜÀíshell·ÃÎÊȨÏ޵ĩ¶´£¨CVE-2022-40242£©ºÍö¾ÙÓû§Ãû²¢È·¶¨ÕÊ»§ÊÇ·ñ´æÔڵĩ¶´£¨CVE-2022-2827£©¡£MegaRAC BMC¹Ì¼þ±»ÖÁÉÙ15¼Ò·þÎñÆ÷ÖÆÔìÉÌʹÓ㬰üÂÞAMD¡¢Asus¡¢ARM¡¢Dell EMC¡¢Huawei¡¢InspurºÍLenovoµÈ¡£

https://www.bleepingcomputer.com/news/security/severe-ami-megarac-flaws-impact-servers-from-amd-arm-hpe-dell-others/

3¡¢°ÍÎ÷×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð

¾ÝýÌå12ÔÂ1ÈÕ±¨µÀ£¬×ܲ¿Î»ÓÚ°ÍÎ÷°ü³µÄÒ»¼Ò×·Õ®¹«Ë¾ÒÑÏòºÚ¿Í×éÖ¯Hive¸¶50ÍòÃÀÔªµÄÊê½ð¡£¸Ã¹«Ë¾ÔÚ°ÍÎ÷µÄÂíÀïÀûÑÇ¡¢°¢¹Å¶à˹ºÍÀï±´ÀÊÆÕÀ×ͼÉèÓÐÁíÍâ3¸ö·þÎñ´¦¡£SuspectFileµÄ³ÂË߼ǼÁ˸ù«Ë¾ºÍ¹¥»÷ÕßµÄ̸Åйý³Ì¡£×î³õµÄÊê½ð½ð¶îΪ700000ÃÀÔª£¬¹«Ë¾Ê×ÏÈÌá³ö5ÍòÃÀÔªµÄ±¨¼Û£¬Ôâµ½¶ÏÈ»¾Ü¾ø¡£ÁîÈ˾ªÑȵÄÊÇ£¬½ö½ö9·ÖÖӺ󣬸Ã×·Õ®¹«Ë¾¾ÍͬÒâÖ§¸¶50ÍòÃÀÔª¡£Õâ¼Ò¹«Ë¾ÌåÏÖËû²»»áִ֪ͨ·¨²¿ÃÅ£¬µ«Éв»Çå³þÆäÊÇ·ñ»á֪ͨÊÜÓ°ÏìµÄÈË¡£

https://www.suspectfile.com/brazil-debt-collection-company-pays-500000-ransom-to-hacker-group-hive/

4¡¢LazarusÍÅ»ïʹÓÃαÔìµÄ¼ÓÃÜ»õ±ÒÓ¦Ó÷ַ¢AppleJeus

12ÔÂ3ÈÕ±¨µÀ³Æ£¬VolexityÊӲ쵽³¯ÏʺڿÍÍÅ»ïLazarusÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¸Ã»î¶¯Ê¼ÓÚ2022Äê6Ô£¬²¢ÖÁÉÙÁ¬Ðøµ½2022Äê10Ô¡£¹¥»÷Õß×¢²áÁËÓòÃûbloxholder[.]com²¢½¨Á¢ÁËÒ»¸öÍøÕ¾£¬¸ÃÍøÕ¾ÊǺϷ¨µÄHaasOnline×Ô¶¯¼ÓÃÜ»õ±Ò½»Òׯ½Ì¨µÄ¿Ë¡¡£¹¥»÷ÕßʹÓøÃÍøÕ¾·Ö·¢Î±×°³ÉBloxHolderÓ¦ÓõÄWindows MSI°²×°·¨Ê½£¬Ëüʵ¼ÊÉÏÊÇÓëQTBitcoinTraderÓ¦ÓÃÀ¦°óÔÚÒ»ÆðµÄ¶ñÒâÈí¼þAppleJeus¡£¸Ã»î¶¯»¹Í¨¹ýÁ´Ê½DLL²à¼ÓÔØ£¬ÒÔ´ÓÊÜÐÅÈεĽø³ÌÖмÓÔØ¶ñÒâÈí¼þ£¬´Ó¶øÈƹýAVµÄ¼ì²â¡£

https://securityaffairs.co/wordpress/139290/apt/lazarus-apt-bloxholder-campaign.html

5¡¢HP Wolf SecurityÐû²¼2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß

HP Wolf SecurityÔÚ12ÔÂ1ÈÕÐû²¼ÁË2022ÄêQ3ÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬Q3ÓÐ44%µÄ¶ñÒâÈí¼þÊÇͨ¹ý´æµµÎļþ·Ö·¢µÄ£¬±ÈÉÏÒ»¼¾¶ÈÔö³¤ÁË11%£¬Ô¶¸ßÓÚͨ¹ýOfficeÎļþ·Ö·¢µÄ32%¡£¸ÃÍŶÓÔÚÕâÒ»¼¾¶È·¢ÏÖÁ˼¸¸ö½«´æµµÎļþÓëеÄHTML×ß˽¼¼ÊõÏà½áºÏµÄ¹¥»÷»î¶¯¡£´ËÍ⣬³ÂËß»¹ÃèÊöÁ˹¥»÷ÕßÈçºÎÕë¶ÔÀ­¶¡ÃÀÖ޵ľƵêÐÐÒµ·Ö·¢Òþ±ÎµÄ¶ñÒâÈí¼þOpenDocument£¬²¢¶Ô×î½üµÄMagniberÀÕË÷Èí¼þ»î¶¯½øÐÐÁË·ÖÎö¡£

https://threatresearch.ext.hp.com/wp-content/uploads/2022/11/HP-Wolf-Security-Threat-Insights-Report-Q3-2022.pdf

6¡¢AquaSecÐû²¼¹ØÓÚжñÒâÈí¼þRedigoµÄ·ÖÎö³ÂËß

12ÔÂ1ÈÕ£¬AquaSecÐû²¼Á˹ØÓÚÐÂRedisºóÃŶñÒâÈí¼þRedigoµÄ·ÖÎö³ÂËß¡£RedigoÊÇ»ùÓÚGoµÄ¶ñÒâÈí¼þ£¬Ö÷Òª¹¥»÷´æÔÚ©¶´£¨CVE-2022-0543£©µÄRedis·þÎñÆ÷¡£¸Ã©¶´ÓëLua½Å±¾ÒýÇæÖеÄɳÏäÌÓÒÝÓйØ£¬¿ÉÓÃÓÚÔ¶³ÌÖ´ÐдúÂ룬ÓÚ2022Äê2Ô±»·¢ÏÖ²¢ÐÞ¸´¡£¹¥»÷Õßͨ¹ýɨÃè¶Ë¿Ú6379£¬À´¶¨Î»Ì»Â¶µÄRedis·þÎñÆ÷ÒÔ½¨Á¢³õʼ·ÃÎÊ£¬È»ºóÖ´ÐÐÃüÁî¡£¶ñÒâÈí¼þͨ¹ý6379¶Ë¿ÚÄ£ÄâÕý³£µÄRedisͨÐÅ£¬ÒÔÈÆ¹ýÍøÂç·ÖÎö¹¤¾ßµÄ¼ì²â£¬Í¬Ê±ÊÔͼÒþ²ØÀ´×ÔRedigoµÄC2·þÎñÆ÷µÄÁ÷Á¿¡£

https://blog.aquasec.com/redigo-redis-backdoor-malware