INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

Ðû²¼Ê±¼ä 2023-10-09

1¡¢INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

¾Ý10ÔÂ6ÈÕ±¨µÀ£¬INC RansomwareÉù³ÆÈëÇÖÁËÃÀ¹úÁª°îÀͶ¯¹ØÏµ¾Ö£¨FLRA£©¡£INCÔÚ9ÔÂ20ÈÕ½«FLRAÌí¼Óµ½ÆäÍøÕ¾ÉÏ£¬²¢ÌṩÁË6ÕÅÎļþͼÏñ×÷Ϊ֤¾Ý¡£Ñо¿ÈËÔ±ÔÚ9ÔÂ24ÈÕºÍ10ÔÂ3ÈÕͨ¹ýÓʼþÁªÏµÁËFLRA£¬¾ùδÊÕµ½»ØÓ¦¡£INCûÓÐÊ״ηÃÎÊFLRAµÄʱ¼ä»ò·½Ê½£¬µ«È·ÈÏ8ÔÂ26ÈÕÊÇÊý¾Ýй¶¿ªÊ¼µÄʱ¼ä£¬ËûÃÇÒÑ»ñÈ¡29 GBÎļþ¡£INC·¢ÑÔÈË»¹³ÆÒÑÁôÁËÊê½ðÌõÒªÇó70ÍòÃÀÔª£¬µ«FLRA´Óδ¶Ô´Ë×ö³öÈκλØÓ¦¡£


https://www.databreaches.net/inc-ransomware-claims-to-have-hit-federal-labor-relations-authority/


2¡¢Ñо¿ÈËÔ±·¢ÏÖ´óÁ¿AndroidµçÊÓºÐÖаüÂÞ¶ñÒâÈí¼þ


¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ£¬´óÁ¿Á®¼ÛAndroidµçÊÓºÐÖаüÂÞºóÃÅ¡£HUMAN³ÆÆä´ÓÔÚÏßÁãÊÛÉÌ´¦¹ºÖõÄÉ豸ÖУ¬80%¶¼Ñ¬È¾ÁËBADBOX¡£BadboxԤװÔÚAndroidµçÊÓºÐÖУ¬É豸²åÈëºó£¬¶ñÒâÈí¼þ»áÓë¹¥»÷ÕßµÄC2·þÎñÆ÷Á¬½Ó¡£Ëü»¹¿ÉÖ´ÐÐ¹ã¸æÆÛÕ©¡¢´´½¨Ðé¼ÙWhatsAppºÍGmailÕË»§¡¢³öÊÛ¼ÒÍ¥ÍøÂç·ÃÎÊȨÏÞÒÔ¼°°²×°Ô¶³Ì´úÂ롣ȫÇòÖÁÉÙÓÐ74000²¿»ùÓÚAndroidµÄÉ豸ѬȾÁËBADBOX¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁËÁíÒ»ÖÖ¶ñÒâÈí¼þPEACHPIT£¬ËüÊÇBadboxµÄ¹ã¸æÆÛÕ©×é¼þ£¬¿ÉÒÔÔÚAndroidºÍiOSÉ豸ºÍÓ¦ÓÃÉÏÆô¶¯ÆÛÆ­ÐÔÍøÂçÁ÷Á¿¡¢Òþ²Ø¹ã¸æºÍ¶ñÒâ¹ã¸æ¡£


https://www.hackread.com/android-tv-boxes-backdoors-home-networks/


3¡¢Atlassian ConfluenceÐÞ¸´±»ÀûÓé¶´CVE-2023-22515


AtlassianÔÚ10ÔÂ4ÈÕÐÞ¸´ÁËConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷ÖеķÃÎÊ¿ØÖÆÂ©¶´£¨CVE-2023-22515£©¡£¹¥»÷Õß¿ÉÔ¶³ÌÀûÓøÃ©¶´£¬À´´´½¨Î´¾­ÊÚȨµÄConfluence¹ÜÀíÔ±ÕÊ»§²¢·ÃÎÊ·þÎñÆ÷¡£Ëü²»»áÓ°Ïì8.0.0֮ǰµÄConfluence°æ±¾£¬ÒÔ¼°Í¨¹ýatlassian.netÓò·ÃÎʵÄConfluenceÍøÕ¾¡£Atlassian³Æ¸Ã©¶´Òѱ»ÔÚÒ°ÀûÓ㬵«Ã»ÓÐ͸¶¹¥»÷ÐÔÖÊ¡¢¹æÄ£»ò©¶´µÄ»ù´¡Ô­ÒòµÈ½øÒ»²½Ï¸½Ú¡£½¨Òé¿Í»§Á¢¼´¸üУ¬ÎÞ·¨Ó¦ÓøüеĿͻ§Ó¦ÏÞÖÆ¶ÔÊÜÓ°ÏìʵÀýµÄÍⲿ·ÃÎÊ¡£


https://thehackernews.com/2023/10/atlassian-confluence-hit-by-newly.html


4¡¢ÒòÊê½ð̸ÅÐÆÆÁÑLockBit¼Æ»®¹ûÈ»IT¹«Ë¾CDWµÄÊý¾Ý


ýÌå10ÔÂ6Èճƣ¬ÒòÊê½ð̸ÅÐÆÆÁÑ£¬ÀÕË÷ÍÅ»ïLockBit¼Æ»®¹ûÈ»´ÓIT¹«Ë¾CDWÇÔÈ¡µÄÊý¾Ý¡£ÃûΪLockBitSuppµÄ·¢ÑÔÈËÌåÏÖ£¬ÔÚ̸ÅÐÆÚ¼äCDW¸ø³öµÄ½ð¶îÌ«µÍ£¬¼òÖ±ÊÇ¶ÔÆ­×ÓµÄÎêÈè¡£ËûÃǾܾøÁËÕâ¸ö»ÄÃýµÄ½ð¶î£¬²¢¾ö¶¨¹ûÈ»Îļþ¡£Æ¾¾ÝLockBitÍøÕ¾Éϵĵ¹¼ÆÊ±£¬CDWµÄÎļþ½«ÓÚ10ÔÂ11ÈÕÁ賿Ðû²¼¡£Õâһʼþ¿ªÊ¼ÓÚ9ÔÂ3ÈÕ£¬Æäʱ¸Ã¹«Ë¾Ê״α»Ìí¼Óµ½LockBitµÄÍøÕ¾ÉÏ£¬¶øCDWÈÔδ¶ÔÕâһʼþ·¢±íÆÀÂÛ¡£


https://www.theregister.com/2023/10/06/cdw_lockbit_negotiations/


5¡¢TrendMicroÅû¶ÔÚÓ¦ÓúʹúÂë¿âÖ²Èë¶ñÒâ´úÂëµÄÒªÁì


10ÔÂ5ÈÕ£¬Trend MicroÐû²¼³ÂËߣ¬ÉîÈëÑо¿Á˹¥»÷ÕßÔÚ¿´ËƺϷ¨µÄÓ¦Ó÷¨Ê½ºÍ´úÂë¿âÖÐÖ²Èë¶ñÒâpayloadµÄÅÓ¸ÅÂÔÁì¡£¹©Ó¦Á´¹¥»÷µÄÐËÆð³ÉÎªÍøÂçÄþ¾²ÁìÓòµÄÒ»¸öÒªº¦ÎÊÌâ¡£¿ª·¢ÈËÔ±ÒÀ¿¿µÚÈý·½×é¼þÀ´¼ò»¯¿ª·¢Á÷³Ì£¬¹¥»÷ÕßÒ²¿ÉÒÔͨ¹ýÕë¶Ô¹©Ó¦Á´ÖÐÄþ¾²ÐԽϵ͵ÄÔªËØÀ´¼ä½ÓÈëÇÖϵͳ¡£Ñо¿ÈËÔ±·ÖÎöÁ˹¥»÷Õ߿ˡºÏ·¨GitHub´æ´¢¿â£¨ÈçBinance-trading-bot¡¢crypto-clipperºÍÆäËüÓÃPython3¿ª·¢µÄ·¨Ê½£©£¬È»ºóÓöñÒâ´úÂë¶ÔÆä½øÐÐľÂí»¯ºÍѬȾµÄ°¸ÀýÑо¿¡£


https://www.trendmicro.com/en_us/research/23/j/infection-techniques-across-supply-chains-and-codebases.html


6¡¢MicrosoftÐû²¼¹ØÓÚ2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö³ÂËß


10ÔÂ5ÈÕ±¨µÀ³Æ£¬MicrosoftÐû²¼ÁË2023ÄêÊý×Ö·ÀÓùµÄ·ÖÎö³ÂËߣ¬·ÖÎöÁË2022Äê7ÔÂÖÁ2023Äê6ÔÂÆÚ¼äµÄÄþ¾²Ç÷ÊÆ¡£×Ô2022Äê9ÔÂÒÔÀ´£¬ÊÖ¶¯Ö´ÐеÄÀÕË÷¹¥»÷Ôö¼ÓÁË200%ÒÔÉÏ¡£×Ô2022Äê11ÔÂÒÔÀ´£¬Éæ¼°Êý¾Ýй¶µÄ¹¥»÷ÊýÁ¿Ôö¼ÓÁËÒ»±¶¡£´ó¶àÊýÀÕË÷¹¥»÷²¢Î´ÀֳɼÓÃÜÈκÎÄÚÈÝ£¬Ö»ÓÐ2%µÄ¹¥»÷Àֳɲ¿ÊðÁËÀÕË÷Èí¼þ¡£´ó¶àÊý¹¥»÷¿ÉÒÔ×·Ëݵ½3¸öµã£ºÆÆ»µÍⲿԶ³Ì·þÎñ¡¢ÀûÓÃÓÐЧÕÊ»§ºÍÈëÇÖÃæÏò¹«ÖÚµÄÓ¦Ó÷¨Ê½¡£½üÈý·ÖÖ®¶þµÄ¹¥»÷¿É×·Ëݵ½4¸öÀÕË÷ÍŻMagniber¡¢LockBit¡¢HiveºÍBlackCat¡£


https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023