ÒÔÉ«Áжà¼ÒÎïÁ÷¹«Ë¾Ô¼50 GB¸öÈ˺ÍÔËÊä¼Ç¼ÔÚ°µÍø³öÊÛ
Ðû²¼Ê±¼ä 2022-12-07¾ÝýÌå12ÔÂ5ÈÕ±¨µÀ£¬Ô¼50 GBµÄÊý¾Ý¿âÔÚ°µÍøÉϳöÊÛ£¬Êý¾ÝÐû²¼Ê±¼äΪ2022Äê11ÔÂ26ÈÕºÍ27ÈÕ¡£ÊÓ²ìÏÔʾ£¬ÕâЩÊý¾ÝÊôÓÚ29¼ÒÒÔÉ«ÁеÄÔËÊä¡¢ÎïÁ÷ºÍ»õÔ˹«Ë¾¡£Ñо¿ÈËÔ±ÈÏΪ£¬ºÚ¿Íͨ¹ýÈí¼þ¹©Ó¦É̵ĵ¥µã¹ÊÕÏ£¬Î´¾ÊÚȨ½øÈëÕâЩÎïÁ÷¹«Ë¾µÄ¹©Ó¦Á´£¬²¢ÇÔÈ¡ÁË´óÁ¿¸öÈËÊý¾ÝºÍÔËÊä¼Ç¼¡£Ã¿¸öÊý¾Ý¿âµÄÊÛ¼ÛΪ1 BTC£¬Ï൱ÓÚ17000ÃÀÔª¡£¹¥»÷Õß×ܹ²ÁгöÁË110ÍòÌõ¼Ç¼£¬Éв»Çå³þ»áÓ°Ï켸¶àÈË¡£
https://www.hackread.com/israel-logistics-employees-data/
2¡¢¶íÂÞ˹µÚ¶þ´óÒøÐÐVTBµÄÍøÕ¾Ôâµ½´ó¹æÄ£DDoS¹¥»÷
¾Ý12ÔÂ6ÈÕ±¨µÀ£¬¶íÂÞ˹µÚ¶þ´ó½ðÈÚ»ú¹¹VTBÒøÐÐÌåÏÖ£¬ÓÉÓÚÁ¬ÐøµÄDDoS¹¥»÷£¬ÆäÍøÕ¾ºÍÒÆ¶¯Ó¦ÓÃÔÝʱÎÞ·¨·ÃÎÊ¡£VTB·¢ÑÔÈ˳ƣ¬Õâ²»½öÊǽñÄê×î´ó¹æÄ£µÄ¹¥»÷£¬Ò²ÊǸÃÒøÐÐÕû¸öÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷¡£ÏÖÒÑÈ·¶¨´ó¶àÊý¶ñÒâDDoSÇëÇó¶¼À´×Ô¹úÍ⣬µ«ÊÇÒ²Éæ¼°¶à¸ö¶íÂÞ˹µÄIPµØÖ·¡£ºÚ¿ÍÍÅ»ïIT Army of UkraineÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢ÓÚ11Ôµ×ÔÚTelegramÉÏÐû²¼Á˴˴λ¡£Ä¿Ç°£¬VTBµÄÃÅ»§ÍøÕ¾´¦ÓÚÀëÏß״̬£¬µ«ËùÓкËÐÄ·þÎñ¶¼ÔÚÕý³£ÔËÐУ¬¿Í»§Êý¾ÝҲδÊÜÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/massive-ddos-attack-takes-russia-s-second-largest-bank-vtb-offline/
3¡¢MT BangladeshÉù³ÆÒÑÈëÇÖÓ¡¶ÈCBHE²¢ÇÔÈ¡¸öÈËÐÅÏ¢
ýÌå12ÔÂ5ÈÕ͸¶£¬ÃûΪTeamMysteriousBangladesh£¨MTBangladesh£©µÄÍÅ»ïÉù³ÆÒÑÈëÇÖÓ¡¶ÈÖÐÑë¸ßµÈ½ÌÓýίԱ»á(CBHE)µÄϵͳ¡£¸ÃÍÅ»ïÌåÏÖÇÔÈ¡ÁË2004ÄêÖÁ2022ÄêµÄѧÉúÐÅÏ¢£¬²¢Ðû²¼ÁËÑù±¾¡£CloudSEK½âÊÍ˵£¬·ÃÎÊCBHEDelhiƽ̨¹ÜÀíÃæ°åµÄÈκÎÈ˶¼¿ÉÒÔ¼ì²ì2004ÄêÖÁ2022ÄêËùÓÐѧÉúµÄ½á¹û£¬ÉõÖÁ¿ÉÒÔɾ³ý»òÌí¼Ó¡£Òò´Ë£¬¹¥»÷Õß¿ÉÄÜ»ñµÃÁ˹ÜÀíÃæ°åµÄ·ÃÎÊȨÏÞ£¬È»ºóÆÆ»µÁËCBHEµÄÊý¾Ý¡£
https://cloudsek.com/threatintelligence/indian-central-board-of-higher-education-compromised-by-team-mysterious-bangladesh/
4¡¢Sysdig·¢ÏÖÀûÓÿªÔ´¹¤¾ßPRoot¹¥»÷LinuxϵͳµÄ»î¶¯
SysdigÔÚ12ÔÂ5ÈÕ³ÆÆä·¢ÏÖºÚ¿ÍÔÚBYOF£¨×Ô´øÎļþϵͳ£©¹¥»÷ÖÐÀÄÓÿªÔ´¹¤¾ßPRoot£¬Ö¼ÔÚ½«¹¥»÷·¶Î§À©Õ¹µ½¶à¸öLinux¿¯Ðа沢¼ò»¯ÐëÒªµÄÊÂÇé¡£PRoot²¢·Ç³öÓÚ¶ñÒ⿪·¢µÄ£¬Ëü¿ÉÔÚLinuxÖÐÉèÖÃÒ»¸ö¶ÀÁ¢µÄ¸ùÎļþϵͳ¡£¸Ã»î¶¯Ê¹ÓÃPRootÔÚÒѱ»ÈëÇÖµÄϵͳÉϰ²×°¶ñÒâÎļþϵͳ£¬ÆäÖаüÂÞmasscan¡¢nmap¡¢XMRig cryptominer¼°ÆäÅäÖÃÎļþ¡£Îļþϵͳ°üÂÞ¹¥»÷ËùÐèµÄÒ»ÇУ¬ÕûÆëµØ´ò°üÔÚÒ»¸öGzipѹËõµÄtarÎļþÖС£ÀûÓÃPRoot£¬¹¥»÷Õß¼¸ºõ²»Óÿ¼ÂÇÄ¿±êµÄ¼Ü¹¹»òÂþÑÜ£¬¹¥»÷·¾¶Ò²µÃµ½Á˼ò»¯£¬ÕâÖÖÐÂÓ±µÄ¹¥»÷¼¼Êõ·Ç³£Ç¿´ó¡£
https://sysdig.com/blog/proot-post-explotation-cryptomining/
5¡¢ResecurityÅû¶ÐµÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳
ýÌå12ÔÂ5Èճƣ¬Resecurity·¢ÏÖÁËеÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳In The Box¡£InTheBoxÓÚ2020Äê1ÔÂ×óÓÒÊ״α»·¢ÏÖ£¬Ëü¿ÉÌṩWebinjects¿ª·¢·þÎñ£¬ÔÚ»ñµÃ×ã¹»µÄÐÅÓþºó£¬ÔËÓªÈËÔ±½«ÆäÀ©Õ¹ÎªÒ»¸öÍêÈ«²úÎﻯµÄ×Ô¶¯»¯Êг¡¡£¸ÃÊг¡ÊÇÉæ¼°Òƶ¯É豸µÄÒøÐÐ͵ÇÔºÍÆÛÕ©µÄ×î´óºÍ×îÖØÒªµÄ´ß»¯¼Á£¬ÌṩÁËÁè¼Ý1849¸ö¶ñÒâ·½°¸¹©£¬ÕâЩ·½°¸ÊÇרΪÃÀ¹ú¡¢Ó¢¹úºÍ¼ÓÄôóµÈÁè¼Ý45¸ö¹ú¼ÒµÄÖ÷Òª½ðÈÚ»ú¹¹¡¢µç×ÓÉÌÎñ¡¢Ö§¸¶ÏµÍ³¡¢ÔÚÏßÁãÊÛÉ̺ÍÉ罻ýÌ幫˾Éè¼ÆµÄ¡£ÔÚ2022Äê11ÔÂÆÚ¼ä£¬ÔËÓªÈËÔ±½øÐÐÁËÖØ´ó¸üУ¬²¢¸ÄÉÆÁËÊÓ¾õÉè¼Æ¡£
6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þÉú³¤Ç÷ÊÆµÄ·ÖÎö³ÂËß
12ÔÂ5ÈÕ£¬KasperskyÐû²¼¹ØÓÚ½üÆÚ¶ñÒâÈí¼þÉú³¤Ç÷ÊÆµÄ·ÖÎö³ÂËß¡£2022Äêǰ10¸öÔ£¬Ôâµ½Õë¶ÔÐÔÀÕË÷Èí¼þÓ°ÏìµÄÓû§Õ¼ËùÓÐÊÜÖÖÖÖ¶ñÒâÈí¼þÓ°ÏìµÄÓû§µÄ±ÈÀý¼¸ºõͬ±È·ÁËÒ»·¬£¬µ½´ï0.26%¡£LockBitÊǵ±Ç°×îÊÜ»¶Ó¡¢×î¾ß´´ÐÂÐÔºÍÉú³¤×î¿ìµÄÀÕË÷Èí¼þ¼Ò×åÖ®Ò»£¬³ýÁËPsExecÖ®Í⣬ËüÏÖÔÚ»¹Ö§³Ö×ÔÎÒÁ÷´«¡£PlayÊÇ×î½üÓöµ½µÄÒ»ÖÖÐÂÀÕË÷Èí¼þ±äÌ壬һµ©·¢ÏÖSMB×ÊÔ´¾Í»á½¨Á¢Á¬½Ó²¢ÊÔÍ¼×°ÔØËü£¬ÔÚÔ¶³ÌϵͳÖÐÁ÷´«ºÍÖ´ÐÐ×ÔÉí¡£´ËÍ⣬Çý¶¯·¨Ê½¿ÉÄܰüÂÞ¹¥»÷ÕßÄܹ»ÀûÓõÄ©¶´¡£
https://securelist.com/crimeware-report-ransomware-tactics-vulnerable-drivers/108197/