ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø
Ðû²¼Ê±¼ä 2024-12-031. ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ£¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø
12ÔÂ1ÈÕ£¬ÎڸɴïÕþ¸®¹ÙԱ֤ʵ£¬¹ú¼ÒÖÐÑëÒøÐÐϵͳÔâÊÜÁËÒÔ¾¼ÃΪĿµÄµÄºÚ¿Í¹¥»÷¡£²ÆÕþ²¿¸ß¼¶¹ÙÔ±ÌåÏÖ£¬¾¡¹Üȷʵ·¢ÉúÁ˺ڿÍÈëÇÖʼþ£¬µ«Çé¿ö²¢Î´È籨µÀ°ãÑÏÖØ£¬Ä¿Ç°Éó¼ÆºÍÊÓ²ìÊÂÇéÒѽøÈëβÉù¡£¾ÝÎڸɴïÒøÐÐ͸¶£¬ËûÃÇÕýÔÚÅäºÏ¾¯·½¶ÔÒ»ÆðÉæÏÓ¾³ÍâºÚ¿ÍÇÔÈ¡620ÒÚÏÈÁԼ1680ÍòÃÀÔª£©µÄ°¸¼þ½øÐÐÊӲ졣¾Ý³Æ£¬Ò»¸ö×Գơ°Waste¡±µÄ¶«ÄÏÑǺڿÍ×éÖ¯¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬ËûÃÇÔÚ11Ô³õÈëÇÖÁËÎڸɴïÒøÐÐϵͳ²¢×ªÒÆÁË×ʽð£¬ÆäÖв¿ÃÅ×ʽð±»×ªÖÁÈÕ±¾ÕË»§¡£ÎڸɴïÖÐÑëÒøÐÐÒÑ×·»ØÒ»°ëÒÔÉϱ»µÁ×ʽ𣬵«ÈÔÓв¿ÃÅ×ʽð±»ÌáÈ¡»òתÒÆÖÁÆäËû¹ú¼Ò£¬ÈçÓ¢¹úµÄÕË»§±»¶³½áÁË700ÍòÃÀÔª£¬¶ø¸Ã×éÖ¯ÔÚÈÕ±¾ÔòÊÕµ½ÁË600ÍòÃÀÔª¡£´Ë´ÎʼþÒýÆðÁË×èµ²µ³ÒéÔ±µÄÕ𾪺͹Ø×¢£¬ËûÃǺôÓõÕþ¸®Ìṩ¸ü¶àÐÅÏ¢ÒÔ×ÊÖú¹«ÖÚÁ˽âʼþÕæÏࡣĿǰ£¬Ïà¹Ø²¿ÃÅÈÔÔÚ¼ÌÐøÊÓ²ì´Ë´ÎºÚ¿Í¹¥»÷µÄ¾ßÌåϸ½ÚºÍËðʧÇé¿ö¡£
https://securityaffairs.com/171562/security/financially-motivated-threat-actors-hacked-ugandas-central-bank.html
2. ÐÂÐÍÍøÂçµöÓã¹¥»÷ÀûÓÃË𻵵ÄWordÎĵµÈƹýÄþ¾²¼ì²â
12ÔÂ1ÈÕ£¬Ò»ÖÖÐÂÓ±µÄÍøÂçµöÓã¹¥»÷·½Ê½ÀûÓÃÁËMicrosoft WordµÄÎļþ»Ö¸´¹¦Ð§£¬Í¨¹ý·¢ËÍË𻵵ÄWordÎĵµ×÷Ϊµç×ÓÓʼþ¸½¼þÀ´ÈƹýÄþ¾²Èí¼þµÄ¼ì²â¡£ÕâЩ¸½¼þαװ³ÉÀ´×ÔÈËΪºÍÈËÁ¦×ÊÔ´²¿ÃŵÄÔ±¹¤¸£ÀûºÍ½±½ð֪ͨ£¬ÎļþÃûÖаüÂÞbase64±àÂëµÄ×Ö·û´®£¬½âÂëºóΪһ´®Ëæ»úÎı¾¡£µ±½ÓÊÕÕßʵÑé´ò¿ªÕâЩË𻵵ÄÎĵµÊ±£¬Word»áÌáʾ»Ö¸´Îļþ£¬¶ø»Ö¸´ºóµÄÎĵµ»áÏÔʾһ¸öÓÕµ¼Óû§É¨Ãè¶þάÂëÒÔ¼ìË÷ÎĵµµÄÌáʾ£¬¶þάÂëÁ´½Óµ½µÄÔòÊÇÒ»¸öαװ³ÉMicrosoftµÇ¼ҳÃæµÄµöÓãÍøÕ¾£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾¾Ý¡£ÓÉÓÚÕâЩÎļþÔÚ²Ù×÷ϵͳÄÚÀÖ³ÉÔËÐе«Î´ÄÜÕë¶ÔÆäÎļþÀàÐÍÓ¦ÓÃÊʵ±µÄ·¨Ê½£¬´ó¶àÊýÄþ¾²½â¾ö·½°¸¶¼Î´Äܼì²âµ½ËüÃÇ¡£ÕâÖÖ¹¥»÷·½Ê½Ï൱Àֳɣ¬ÒòΪ¼¸ºõËùÓи½¼þÔÚVirusTotalÉ϶¼Î´±»¼ì²âµ½£¬Ö»ÓÐÉÙÊýÄþ¾²¹©Ó¦ÉÌÓÐËù²ì¾õ¡£È»¶ø£¬Õâ¿ÉÄÜÊÇÒòΪÎĵµ×Ô¼º²¢Î´°üÂÞ¶ñÒâ´úÂ룬ֻÊÇÓÕµ¼Óû§É¨Ãè¶þάÂë¡£Òò´Ë£¬Óû§Ó¦Ìá¸ß¾¯Ì裬¶ÔÓÚÀ´×Ôδ֪·¢¼þÈ˵ĵç×ÓÓʼþ£¬ÓÈÆäÊÇ°üÂÞ¸½¼þµÄ£¬Ó¦Á¢¼´É¾³ý»òÔÚ´ò¿ªÖ®Ç°ÓëÍøÂç¹ÜÀíԱȷÈÏ£¬ÒÔ±£»¤×Ô¼ºÃâÊÜ´ËÀàÍøÂçµöÓã¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/
3. º«¹ú¾¯·½´þ²¶ÁùÈË£¬ÉæÏÓÖÆÔ캬DDoS¹¥»÷¹¦Ð§ÎÀÐǽÓÊÕÆ÷
12ÔÂ2ÈÕ£¬º«¹ú¾¯·½´þ²¶ÁËÒ»ÃûÊ×ϯִÐйٺÍÎåÃûÔ±¹¤£¬ËûÃÇÉæÏÓÖÆÔìÁè¼Ý24Íǫ̀¶ñÒâÎÀÐǽÓÊÕÆ÷£¬ÕâЩÉ豸±»Ô¤×°»òºóÀ´¸üÐÂÒÔ°üÂÞDDoS¹¥»÷¹¦Ð§¡£¾Ý³Æ£¬ÕâЩ¹¥»÷¹¦Ð§ÊÇΪÁ˵ÖÓù¾ºÕùʵÌåµÄ¹¥»÷£¬µ«Êµ¼ÊÉÏÊÇ·Ç·¨µÄ£¬ÇÒµ¼ÖÂÉ豸Óû§ÔÚ·Ç×ÔÔ¸µÄÇé¿öϼÓÈëÁ˹¥»÷£¬¿ÉÄÜ»áÓöµ½ÐÔÄÜϽµµÄÇé¿ö¡£´Ó2019Äê1Ôµ½2024Äê9Ô£¬¹²³ö»õÁË24Íǫ̀É豸£¬ÆäÖÐ98,000̨ԤװÁËDDoSÄ£¿é£¬ÆäÓàͨ¹ý¹Ì¼þ¸üлñµÃ¸Ã¹¦Ð§¡£º«¹ú¾¯·½ÔÚÊÕµ½¹ú¼ÊÐ̾¯×éÖ¯µÄÇ鱨ºó·¢ÏÖÁËÕâÒ»¶ñÒâ¼Æ»®£¬²¢´þ²¶ÁËÉæ°¸ÁùÈË£¬ËûÃÇÃæÁÙÎ¥·´ÐÅϢͨÐÅÍøÂçÖ´·¨µÄÖ¸¿Ø¡£´ËÍ⣬·¨Ôº»¹Åú×¼¿ÛѺ¸Ã¹«Ë¾µÄ×ʲú£¬²¢Ã»ÊÕÔ¼435ÍòÃÀÔª£¬Ô¤¼ÆÕâÊǹ«Ë¾Í¨¹ý³öÊÛ¶ñÒâÉ豸Ëù׬ȡµÄ½ð¶î¡£¶ø¹ºÖøÃÉ豸µÄ¹«Ë¾²Ù×÷ԱĿǰÈÔåÐÒ£·¨Í⣬º«¹ú¾¯·½ÕýÔÚÑ°Çó¹ú¼ÊºÏ×÷ÒÔ×·×ٺʹþ²¶ËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/
4. Bootkit¶ñÒâÈí¼þÀûÓÃLogoFAIL©¶´Ñ¬È¾Linuxϵͳ
https://www.bleepingcomputer.com/news/security/bootkitty-uefi-malware-exploits-logofail-to-infect-linux-systems/
5. SignzyÈ·ÈÏ·¢ÉúÄþ¾²Ê¼þ£¬Éæ¼°¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¿Í»§Êý¾Ý
12ÔÂ2ÈÕ£¬SignzyÊÇÒ»¼ÒΪ¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¡¢ÉÌÒµÒøÐкͽðÈڿƼ¼¹«Ë¾ÌṩÔÚÏßÉí·ÝÑéÖ¤ºÍ¿Í»§ÈëÖ°·þÎñµÄÖªÃû¹©Ó¦ÉÌ£¬¸Ã¹«Ë¾È·ÈÏ·¢ÉúÁËÒ»ÆðÄþ¾²Ê¼þ¡£Õâ¼Ò×ܲ¿Î»ÓÚ°à¼ÓÂÞ¶ûµÄ³õ´´¹«Ë¾ÉÏÖÜÔâÊÜÁËÍøÂç¹¥»÷£¬¾¡¹ÜËü¾Ü¾ø͸¶ÏêÇ飬µ«ÏûÏ¢ÈËʿ͸¶£¬¸ÃʼþÉæ¼°¿Í»§Êý¾ÝµÄй¶£¬ÕâЩÊý¾ÝÔøÔÚÍøÂç·¸×ïÂÛ̳µÄÌû×ÓÖжÌÔÝ·ºÆð¡£SignzyΪȫÇò600¶à¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ£¬°üÂÞÓ¡¶ÈËÄ´óÒøÐС£Ó¡¶È¼ÆËã»úÓ¦¼±ÏìӦС×éCERT-InÒÑ×¢Òâµ½Õâһʼþ£¬²¢ÕýÔÚ½ÓÄÉÊʵ±Ðж¯¡£ÆäËû¿Í»§£¬ÈçPayU£¬ÌåÏÖËûÃÇδÊܴ˴ι¥»÷Ó°Ï죬²¢¼á³Æ×Ô¼ºµÄÊý¾ÝÈÔÈ»Äþ¾²¡£SignzyÔÚÒ»·ÝÉùÃ÷Öоܾø¾Í¿Í»§Êý¾ÝÊÇ·ñ±»Ð¹Â¶·¢±íÆÀÂÛ£¬µ«ÌåÏÖÒÑƸÇëרҵ»ú¹¹½øÐÐÄþ¾²Ê¼þÊӲ졣¸Ã¹«Ë¾µÃµ½ÁËÍòÊ´│µÈ¶à¼ÒͶ×ÊÕßµÄÖ§³Ö£¬²¢Òѽ«´Ëʼþ¼û¸æÆä¿Í»§¡¢¼à¹Ü»ú¹¹ºÍÀûÒæÏà¹ØÕß¡£È»¶ø£¬µ±±»Îʼ°ÊÇ·ñÓëÓ¡¶ÈÑëÐÐÓйý½Ó´¥Ê±£¬SignzyÌåÏÖûÓÐÏàͬ£¬¶øÓ¡¶ÈÑëÐÐҲδ»ØÓ¦ÖÃÆÀÇëÇó¡£
https://techcrunch.com/2024/12/02/indian-online-id-verification-firm-signzy-confirms-security-incident/
6. È«ÇòÖ´·¨Ðж¯¡°HAECHI-V¡±´þ²¶5500¶àÈË£¬½É»ñ4ÒÚÃÀÔª×ʲú
12ÔÂ2ÈÕ£¬¹ú¼ÊÖ´·¨Ðж¯¡°HAECHI-V¡±ÔÚ2024Äê7ÔÂÖÁ11ÔÂÆڼ䣬Éæ¼°40¸ö¹ú¼Ò£¬Àֳɴþ²¶ÁË5500¶àÃûÏÓÒÉÈË£¬²¢²é»ñÁË4ÒÚ¶àÃÀÔª×ʲú¡£´Ë´ÎÐж¯Ö÷ÒªÕë¶ÔÍøÂçµöÓã¡¢Áµ°®Æ¾Ö¡¢ÐÔÀÕË÷¡¢Í¶×ÊÆÛÕ©¡¢ÔÚÏ߶ÄÇ®µÈ¶àÖÖÍøÂçÆÛÕ©ÐÐΪ¡£ÆäÖУ¬º«¹úºÍÖйúÕþ¸®µ·»ÙÁËÒ»¸öÔì³É11ÒÚÃÀÔªËðʧµÄÓïÒôµöÓ㼯ÍÅ£¬´þ²¶27È˲¢ÆðËß19ÈË¡£¹ú¼ÊÐ̾¯×éÖ¯»¹Ðû²¼ÁË×Ïɫͨ¸æ£¬¾¯¸æÉæ¼°¼ÓÃÜ»õ±ÒµÄÐÂÐËÆÛÕ©»î¶¯£¬ÌرðÊÇ¡°USDT´ú±ÒÅú׼ƾ֡±¡£Í¬Ê±£¬¹ú¼ÊÐ̾¯×éÖ¯ÓëÀ´×Ô80¶à¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹¼ÓÇ¿ÁËÀ¹½Ø±»µÁ×ʽ𹤾ßI-GRIPµÄʹÓã¬Ð¼Óƾ¯·½ÀûÓøù¤¾ßÀÖ³É×èÖ¹ÁËÒ»±Ê3930ÍòÃÀÔªµÄתÕË¡£´ËÍ⣬¹ú¼ÊÐ̾¯×éÖ¯»¹ÔÚ·ÇÖÞ19¸ö¹ú¼Ò¿ªÕ¹ÁË¡°ÈûÂ׸ǵÙÐж¯¡±£¬´þ²¶1006ÃûÏÓÒÉÈË£¬µ·»Ù¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç134089¸ö¡£ÔÚ¡°Ðͬ¶þºÅÐж¯¡±ÖУ¬¹ú¼ÊÐ̾¯×éÖ¯Óë˽Ӫ²¿ÃźÏ×÷»ï°éºÍ95¸ö¹ú¼ÒÅäºÏ²ð³ýÁË22000¶ą̀ÓëÍøÂç·¸×ï»î¶¯ÓйصĶñÒâ·þÎñÆ÷¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤ÌåÏÖ£¬ÍøÂç·¸×ïµÄÎÞ¹ú½çÐÔÒâζ׏ú¼Ê¾¯²ìºÏ×÷ÖÁ¹ØÖØÒª£¬Ö»ÓÐͨ¹ýÅäºÏŬÁ¦£¬²ÅÆøÈÃÏÖʵÊÀ½çºÍÊý×ÖÊÀ½çÔ½·¢Äþ¾²¡£
https://securityaffairs.com/171593/cyber-crime/operation-haechi-v-5500-arrests.html