ÂíÀ´Î÷ÑǵçÐŹ«Ë¾RedOneÔâµ½DESORDENÍÅ»ïµÄ¹¥»÷

Ðû²¼Ê±¼ä 2022-09-29
1¡¢ÂíÀ´Î÷ÑǵçÐŹ«Ë¾RedOneÔâµ½DESORDENÍÅ»ïµÄ¹¥»÷

      

¾ÝýÌå9ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÂíÀ´Î÷ÑǵçÐŹ«Ë¾RedOneÔâµ½ÁËDESORDENµÄ¹¥»÷¡£¡£¡£9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬DESORDENÉù³ÆÒѾ­ÈëÇָõçÐŹ«Ë¾¡£¡£¡£ÔÚredONEûÓлØÓ¦DESORDENµÄÒªÇóºó£¬£¬£¬£¬£¬£¬DESORDENÓÚ9ÔÂ21ÈÕ×óÓÒÓÖ¾ÙÐÐÁ˵ڶþ´Î¹¥»÷£¬£¬£¬£¬£¬£¬ÈëÇÖÁËËûÃǵÄredCARDºÍredCARE³ÌÐò¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢Éæ¼°redONEÊý¾Ý¿âºÍÔ´´úÂ룬£¬£¬£¬£¬£¬°üÀ¨¿Í»§ÐÕÃû¡¢NRIC£¨¹úÃñÉí·ÝÖ¤ºÅÂ룩¡¢µØµã¡¢µç»°ºÍµç×ÓÓʼþµÈ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬redONEÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£¡£¡£


https://www.databreaches.net/malaysian-telecom-redone-hit-by-desorden/


2¡¢Okta×Ó¹«Ë¾Auth0͸¶Æä²¿·ÖÔ´´úÂë´æ´¢¿âÒѾ­Ð¹Â¶

      

ýÌå9ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬Okta×Ó¹«Ë¾Éí·ÝÑé֤ЧÀÍÌṩÉÌAuth0³ÆÆä²¿·ÖÔ´´úÂë´æ´¢¿âÒѾ­Ð¹Â¶¡£¡£¡£Auth0µÄÈÏ֤ƽ̨ÌìÌìÓÃÓÚÈÏÖ¤30¸ö¹ú¼ÒµÄ2000¶à¼ÒÆóÒµ¿Í»§µÄ4200¶àÍò´ÎµÇ¼£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨AMD¡¢Î÷ÃÅ×Ó¡¢»ÔÈð¡¢Âí×Ô´ïºÍ˹°Í³µÈ¹«Ë¾¡£¡£¡£8ÔÂ⣬£¬£¬£¬£¬£¬Ä³µÚÈý·½Í¨ÖªOkta£¬£¬£¬£¬£¬£¬ËûÃÇÓµÓÐ2020Äê10Ô¼°¸üÔçµÄAuth0´úÂë¿âµÄ¸±±¾¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦ÊÓ²ìÊý¾ÝÊÇÔõÑù±»Ð¹Â¶µÄ£¬£¬£¬£¬£¬£¬µ«Ö±µ½ÏÖÔÚ£¬£¬£¬£¬£¬£¬»¹Ã»ÓÐÕÒµ½ÈκÎÎ¥¹æµÄÖ¤¾Ý¡£¡£¡£Auth0»¹ÌåÏÖ£¬£¬£¬£¬£¬£¬´ËÊÂÎñδ¶Ô¿Í»§Ôì³ÉÓ°Ï죬£¬£¬£¬£¬£¬Òò´ËËûÃÇÎÞÐè½ÓÄÉÈκÎÐж¯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/auth0-warns-that-some-source-code-repos-may-have-been-stolen/


3¡¢LazarusÒÔCrypto.comÊÂÇéʱ»úΪÓÕ¶ü·Ö·¢¶ñÒâÈí¼þ

      

SentinelOneÔÚ9ÔÂ26ÈÕÅû¶Á˳¯ÏÊLazarusÍÅ»ïÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£ÓëÍù³£Ò»Ñù£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ³£Ê¹ÓÃLinkedIn¿¿½üÄ¿µÄ£¬£¬£¬£¬£¬£¬·¢ËÍÒ»¸öαװ³ÉPDFµÄmacOS¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Crypto.comµÄÕÐÆ¸Ö°Î»¡£¡£¡£ÔÚºǫ́£¬£¬£¬£¬£¬£¬Mach-O¶þ½øÖÆÎļþ»áÔÚÓû§µÄ¿âĿ¼Öн¨ÉèÒ»¸öÎļþ¼Ð²¢·Ö·¢µÚ¶þ½×¶ÎºÍµÚÈý½×¶ÎµÄÎļþ¡£¡£¡£ÓÉÓÚC2ÔÚÊÓ²ìʱһֱ´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÎÞ·¨¼ìË÷×îÖÕpayload²¢¾ÙÐÐÆÊÎö¡£¡£¡£


https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/


4¡¢Unit 42ÊӲ쵽ʹÓöàÓïÑÔCHMÎļþÎļþÈö²¥IcedIDµÄ»î¶¯

      

9ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Unit 42³ÆÆäÔÚ½üÆÚÊӲ쵽һ¸ö¶àÓïÑÔMicrosoft±àÒëHTML×ÊÖú(CHM)Îļþ±»ÓÃÓÚ·Ö·¢ÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þIcedID¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê8ÔÂÉÏÑ®·¢Ã÷ÁËÕâ¸öÌØÊâµÄ¹¥»÷Á´£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕ¿ÉÒÔ×èֹʹÓó¤ÐдúÂ룬£¬£¬£¬£¬£¬Õâʹ¶ñÒâÎļþ¸üÈÝÒ×ÈÆ¹ýÇå¾²²úÆ·µÄ¼ì²â¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓöàÓïÑÔÎļþÀ´ÈƹýÒÀÀµÎļþÃûÌÃʶ±ðµÄ·´¶ñÒâÈí¼þϵͳ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕÔÚѬȾÀú³ÌÖлá¶Ôͳһ¸öCHMÎļþÖ´ÐÐÁ½´Î£¬£¬£¬£¬£¬£¬µÚÒ»´ÎÖ´Ðп´ÆðÀ´ÊÇÕýµ±»î¶¯£¬£¬£¬£¬£¬£¬¶øµÚ¶þ´ÎÖ´ÐÐÔòÒþ²ØµØ¾ÙÐжñÒâ»î¶¯¡£¡£¡£


https://unit42.paloaltonetworks.com/polyglot-file-icedid-payload/


5¡¢ProofpointÅû¶ʹÓÃMicrosoft SwayµÄ´¹ÂڻµÄϸ½Ú

      

9ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ProofpointÅû¶Á˽üÆÚʹÓÃMicrosoft Sway¿ªÕ¹µÄ´¹Âڻ¡£¡£¡£SwayÊÇMicrosoft 365Ì×¼þÖв»Ì«³£ÓõijÌÐòÖ®Ò»£¬£¬£¬£¬£¬£¬±»ÓÃÓÚ½«Îı¾ºÍýÌåÁ¬ÏµÆðÀ´½¨ÉèÒ»¸öÑŹ۵ÄÍøÕ¾¡£¡£¡£Microsoft½öÔÊÐíÔÚSwayÒ³ÃæÖÐÉÏ´«Ã½ÌåÎļþ£¬£¬£¬£¬£¬£¬²¢»á×Ô¶¯×èÖ¹ÉÏ´«¿ÉÖ´ÐÐÎļþ¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔÈ»¿ÉÒÔͨ¹ý½«ÍйܶñÒâÈí¼þǶÈëSwayÖÐÀ´Ê¹ÓÃSway·Ö·¢¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£ÎªÁ˽µµÍΣº¦£¬£¬£¬£¬£¬£¬Proofpoint½¨ÒéÓû§ÔÚÐëҪʱÏÞÖÆSwayÔÚÔÆÇéÐÎÖеÄʹÓᣡ£¡£


https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables


6¡¢NETSCOUTÐû²¼2022Äê1H DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ    

      

¾Ý9ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬NETSCOUTÐû²¼ÁË2022Äê1H DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬2022Äê1HµÄ¹¥»÷×ÜÊýΪ6019888£¬£¬£¬£¬£¬£¬±È2021Äê2HïÔÌ­ÁË2%£»£»£»£»£»£»×î´ó´ø¿íΪ957.9 Gbps£¬£¬£¬£¬£¬£¬±È2021Äê2HÔöÌíÁË57%£»£»£»£»£»£»×î´óÍÌÍÂÁ¿Îª284.4 Mpps£¬£¬£¬£¬£¬£¬½Ï2021Äê2HïÔÌ­ÁË37%¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÒ»Ö±Á¢ÒìºÍ̽Ë÷еġ¢¸üǿʢµÄDDoS¹¥»÷ǰÑÔ£»£»£»£»£»£»½©Ê¬ÍøÂçÈÔÔÚ¼ÌÐøÒÔ¾ªÈ˵ÄËÙÂÊÀ©É¢£»£»£»£»£»£»¾ßÓÐÕ½Õù¡¢×ڽ̺ÍÕþÖÎÒòËØµÄDDoS¹¥»÷»î¶¯Ôö¶à¡£¡£¡£


https://www.netscout.com/threatreport