ͨÐŹ«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶Ê¼þ
Ðû²¼Ê±¼ä 2023-05-041¡¢Í¨ÐŹ«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶Ê¼þ
¾ÝýÌå5ÔÂ1ÈÕ±¨µÀ£¬Í¨ÐŹ«Ë¾T-MobileÅû¶ÁË2023ÄêµÚ¶þÆðÊý¾Ýй¶Ê¼þ¡£¾ÝϤ£¬´Ó2ÔÂÏÂÑ®¿ªÊ¼µÄÒ»¸ö¶àÔÂÄÚ£¬¹¥»÷Õß¿ÉÒÔ·ÃÎÊÆäÊý°ÙÃû¿Í»§µÄ¸öÈËÐÅÏ¢¡£´Ë´Îʼþ½öÓ°ÏìÁË836ÃûÓû§£¬µ«ÊÇ鶵ÄÐÅÏ¢Á¿·Ç³£¹ã·º£¬ÊÜÓ°ÏìµÄ¸öÈ˽«ÃæÁÙÉí·ÝµÁÓú͵öÓã¹¥»÷¡£T-MobileÒÑΪÊÜÓ°ÏìÓû§ÖØÖÃÕÊ»§PIN£¬²¢Í¨¹ýTransunion myTrueIdentityÌṩ¡¢¹©Á½ÄêµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ¼ì²â·þÎñ¡£1Ô·ݣ¬T-MobileÔâµ½ÁË2023ÄêµÄÊ×´ÎÊý¾Ýй¶£¬¹¥»÷ÕßÇÔÈ¡ÁË3700ÍòÓû§µÄ¸öÈËÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/
2¡¢µÂ¹úITÌṩÉÌBitmarckÔâµ½¹¥»÷ËùÓÐϵͳÔÝʱ¹Ø±Õ
¾Ý5ÔÂ1ÈÕ±¨µÀ£¬µÂ¹úIT·þÎñÌṩÉÌÔâµ½ÁËÍøÂç¹¥»÷¡£ÕâµÂ¹ú×î´óµÄIT¹«Ë¾Ö®Ò»£¬Îª¹«¹²½¡¿µ±£ÏÕÁìÓòµÄ80¶à¼Ò×éÖ¯Ìṩ¼¼Êõ»ù´¡ÉèÊ©ºÍ·þÎñ¡£¼ì²âµ½¹¥»÷ºó£¬¸Ã¹«Ë¾Á¢¿Ì¹Ø±ÕÁË¿Í»§ºÍÄÚ²¿ÏµÍ³£¬ÒÔ¼°Êý¾ÝÖÐÐÄ¡£¸Ã¹«Ë¾Ö¸³öûÓÐÊý¾Ýй¶£¬´æ´¢ÔÚEHRÖеĻ¼ÕßÊý¾Ý²»»áÊܵ½¹¥»÷µÄÓ°Ïì¡£¾¡¹Ü·þÎñÕýÔÚÖð½¥»Ö¸´£¬µ«BitmarckÔ¤¼ÆÔÚÖжÏÈÔ½«¼ÌÐø¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶Óйع¥»÷µÄ¸ü¶àϸ½Ú¡£1Ô·ݣ¬Bitmarck·¢ÉúÊý¾Ýй¶£¬Ó°ÏìÁËÁè¼Ý300000Ãû±£µ¥³ÖÓÐÈË¡£
https://securityaffairs.com/145568/hacking/bitmarck-cyberattack.html
3¡¢TBK DVRÉ豸Éí·ÝÑéÖ¤Èƹý©¶´CVE-2018-9995±»ÀûÓÃ
ýÌå5ÔÂ2Èճƣ¬Fortinet·¢ÏÖÀûÓÃTBK DVRÉ豸ÖÐÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2018-9995£©µÄ¹¥»÷¼¤Ôö¡£¸Ã©¶´CVSSÆÀ·ÖΪ9.8£¬¿É±»ÓÃÀ´ÈƹýÉè±¹ØÁ¬ÄÉí·ÝÑéÖ¤²¢»ñµÃÄ¿±êÍøÂçµÄ·ÃÎÊȨÏÞ¡£¾ÝFortinet³Æ£¬½ØÖÁ4ÔÂÓÐÁè¼Ý50000´ÎÊÔͼÀûÓôË©¶´¹¥»÷TBK DVRÉ豸µÄ»î¶¯¡£2018Äê4Ô£¬Ñо¿ÈËÔ±Ðû²¼ÁË´Ë©¶´µÄPoC´úÂ롣Ŀǰ£¬¹©Ó¦ÉÌÉÐδÐû²¼Äþ¾²²¹¶¡À´½â¾ö¸Ã©¶´¡£´ËÍ⣬ÀûÓÃMVPower CCTV DVRÖÐRCE©¶´£¨CVE-2016-20016£©µÄ¹¥»÷Ò²ÔÚ¼¤Ôö¡£
https://www.infosecurity-magazine.com/news/high-severity-flaw-tbk-dvr-camera/
4¡¢ÃÀ¹ú´ïÀ˹ÊÐÔâµ½RoyalµÄÀÕË÷¹¥»÷Ó°Ï쾯¾ÖµÈ·þÎñ
5ÔÂ3ÈÕ±¨µÀ³Æ£¬µÂ¿ËÈø˹ÖÝ´ïÀ˹ÊÐÔâµ½ÁËRoyalÀÕË÷¹¥»÷£¬Æä¹Ø±ÕÁ˲¿ÃÅITϵͳÒÔ·ÀÖ¹¹¥»÷ÂûÑÓ¡£´ïÀ˹ÊÇÃÀ¹úµÚ¾Å¶àÊý»á£¬ÈË¿ÚÔ¼260Íò¡£µ±µØýÌ屨µÀ£¬¸ÃÊо¯·½µÄͨѶºÍITϵͳÔÚ±¾ÖÜÒ»ÉÏÎç±»¹Ø±Õ¡£±¾ÖÜÈý£¬´ïÀ˹ÊÐÈ·¶¨Æä¶à¸ö·þÎñÆ÷Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬Ó°ÏìÁ˼¸¸ö¹¦Ð§ÇøÓò£¬°üÂÞ´ïÀ˹¾¯²ì¾ÖÍøÕ¾¡£¾ÝϤ£¬¸ÃÊеÄÍøÂç´òÓ¡»úÔÚ5ÔÂ3ÈÕÔçÉÏ¿ªÊ¼´òÓ¡Êê½ð¼Ç¼£¬ÏÔʾÁËRoyalÊǴ˴ι¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£Ä¿Ç°£¬Éв»Çå³þÊÇ·ñÓÐÊý¾Ý±»µÁ¡£
https://www.bleepingcomputer.com/news/security/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services/
5¡¢Å·ÖÞ¾¯·½µÄSpecTorÐж¯´þ²¶288Ãû°µÍø¹©Ó¦É̺Ϳͻ§
ýÌå5ÔÂ2ÈÕ±¨µÀ£¬Å·ÖÞÐ̾¯×é֯е÷µÄ¹ú¼ÊÖ´·¨Ðж¯SpecTor²é»ñÁË·Ç·¨°µÍøÊг¡Monopoly Market¡£°ÂµØÀû¡¢·¨¹ú¡¢µÂ¹úºÍºÉÀ¼µÈ¾Å¸ö¹ú¼ÒµÄÖ´·¨²¿ÃÅ´þ²¶ÁË288ÃûÉæÏÓÔÚ°µÍøÂòÂô¶¾Æ·µÄÈË£¬Ö´·¨²¿ÃÅ»¹½É»ñÁËÁè¼Ý5080ÍòÅ·Ôª£¨5340ÍòÃÀÔª£©µÄÏÖ½ðºÍÐéÄâ»õ±ÒµÈ¡£Monopoly MarketÓÚ2019ÄêÆô¶¯£¬Æä»ù´¡ÉèÊ©ÓÚ2021Äê12Ô±»µÂ¹úÕþ¸®²é·â£¬Ö®ºóËü±»ÓÃÓÚÊÕ¼¯ÔÚ¸ÃÍøÕ¾ÉÏÂòÂô¶¾Æ·µÄ¹©Ó¦É̺Ϳͻ§µÄÖ¤¾Ý¡£´Ë´Î´þ²¶µÄ´ó²¿ÃÅÏÓÒÉÈËÔÚÃÀ¹ú£¨153ÈË£©£¬Æä´ÎÊÇÓ¢¹ú£¨55ÈË£©ºÍµÂ¹ú£¨52ÈË£©¡£
https://securityaffairs.com/145656/cyber-crime/law-enforcement-op-spector.html
6¡¢ElasticÐû²¼¶ñÒâÈí¼þLOBSHOT¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
ElasticÔÚ4ÔÂ25ÈÕÅû¶ÁËжñÒâÈí¼þLOBSHOTͨ¹ýGoogle Ads·Ö·¢µÄ»î¶¯¡£¸Ã»î¶¯Ã°³äºÏ·¨µÄµÄAnyDeskÔ¶³Ì¹ÜÀíÈí¼þ£¬ÍÆËÍÁËÒ»¸ö¶ñÒâMSIÎļþ£¬Í¨¹ýÖ´ÐÐPowerShellÃüÁîÀ´ÏÂÔØDLL¡£ÏÂÔصÄDLLÎļþΪ¶ñÒâÈí¼þLOBSHOT£¬Éú´æÔÚC:\ProgramDataÎļþ¼ÐÖУ¬ÓÉRunDLL32.exeÖ´ÐС£´ËÍ⣬LOBSHOT»¹²¿ÊðÁËÒ»¸öhVNC£¨Òþ²ØÐéÄâÍøÂç¼ÆË㣩ģ¿é£¬¿É¶ÔÄ¿±ê½øÐÐÖ±½ÓÇÒ²»»á±»·¢ÏֵķÃÎÊ¡£LOBSHOTÖ÷ÒªÕë¶Ô½ðÈÚÐÐÒµ£¬½ÓÄÉÁËÒøÐÐľÂíºÍÐÅÏ¢ÇÔÈ¡¹¦Ð§¡£
https://www.elastic.co/cn/security-labs/elastic-security-labs-discovers-lobshot-malware