±£¼ÓÀûÑÇ×Üͳ°ì¹«ÊÒµÈÕþ¸®»ú¹¹µÄÍøÕ¾Ôâµ½DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-10-18
±£¼ÓÀûÑÇ×ÜÉó²é³¤°ì¹«ÊÒ10ÔÂ15ÈÕÌåÏÖ£¬£¬£¬£¬£¬£¬£¬±£¼ÓÀûÑÇÕþ¸®»ú¹¹µÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£×ÜÉó²é³¤³Æ£¬£¬£¬£¬£¬£¬£¬³ýÁË×Üͳ°ì¹«ÊÒ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎDDoS¹¥»÷»¹µ¼Ö¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Ë¾·¨²¿ºÍÏÜ·¨·¨ÔºµÄÍøÕ¾Ð§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ËûÔö²¹µÀ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷À´×Ô¶íÂÞ˹¶¼»áÂí¸ñÄáÍиç¶û˹¿Ë£¨Magnitogorsk£©¡£¡£¡£¡£¡£¡£¡£±£¼ÓÀûÑÇÕþ¸®ÒѶÔÕâÒ»ÊÂÎñÕö¿ªÊӲ죬£¬£¬£¬£¬£¬£¬²¢ÒѽÓÄɲ½·¥ïÔ̹¥»÷´øÀ´µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html
2¡¢0patchƽ̨Ðû²¼MotWÖÐÒѱ»Ê¹ÓõÄÎó²îµÄ·Ç¹Ù·½²¹¶¡
¾ÝýÌå10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬0patchƽ̨Ðû²¼ÁËÒ»¸öÃâ·ÑµÄ·Ç¹Ù·½²¹¶¡£¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´Windows Mark of the Web(MotW)Çå¾²»úÖÆÖб»Æð¾¢Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´×èÖ¹WindowsÔÚ´ÓInternetÏÂÔØµÄZIP´æµµÖÐÌáÈ¡µÄÎļþÉÏÓ¦ÓÃ(MotW)±êÇ©¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ7ÔÂÏòMicrosoft±¨¸æÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬ËûÊ×ÏÈ·¢Ã÷ÁËZIPÎĵµÎ´×¼È·Ìí¼ÓMoTW±ê¼Ç¡£¡£¡£¡£¡£¡£¡£ÔÚ΢ÈíÐû²¼¹Ù·½¸üÐÂ֮ǰ£¬£¬£¬£¬£¬£¬£¬0patchΪ¶à¸öÊÜÓ°ÏìµÄ°æ±¾¿ª·¢ÁËÃâ·ÑµÄ²¹¶¡¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-mark-of-the-web-bypass-zero-day-gets-unofficial-patch/
3¡¢Woolworths³ÆÆä220ÍòMyDeal¿Í»§µÄÐÅÏ¢ÒѾй¶
¾Ý10ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬WoolworthsµÄ×Ó¹«Ë¾MyDealÅû¶ÁËÒ»ÆðÓ°Ïì220Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÎ壬£¬£¬£¬£¬£¬£¬MyDealÌåÏÖºÚ¿ÍʹÓÃй¶µÄÓû§Æ¾Ö¤»á¼ûÁ˹«Ë¾µÄ¿Í»§¹ØÏµÖÎÀí(CRM) ϵͳ£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÒÔÉó²éºÍµ¼³ö¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÈÕ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß×îÏÈÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏÒÔ600ÃÀÔªµÄ¼ÛÇ®³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ¸ÃÊý¾ÝÏÖÔÚ°üÀ¨100Íò¸öÌõÄ¿£¬£¬£¬£¬£¬£¬£¬µ«µ±ËûÃÇÍê³É¶ÔÊý¾Ý¿âµÄÆÊÎöʱ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ¿Í»§ÊýÄ¿½«»áÔöÌí¡£¡£¡£¡£¡£¡£¡£10ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¹ûÕæÁË286¸öMyDeal¿Í»§µÄÐÅÏ¢×÷Ϊ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/woolworths-says-2-2m-mydeal-customers-data-hacked/
4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÁªºÏÐж¯¾Ð²¶Black AxeÍÅ»ïµÄ75ÈË
10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶Á˺ڿÍÍÅ»ïBlack AxµÄ75ÈË£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÁ½ÈËÔÚÉϸöÔÂβ²ß»®Á˶àÖÖڲƻ²¢×¬Ç®180ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ÕâЩÏÓÒÉÈËÊÇÔÚ2022Äê9ÔÂ26ÈÕÖÁ30ÈÕʱ´úÔÚÄϷǾÙÐеĹú¼ÊÁªºÏÖ´·¨Ðж¯Operation JackalÖб»²¶µÄ¡£¡£¡£¡£¡£¡£¡£Black AxeÓÚ1977ÄêÔÚÄáÈÕÀûÑǽ¨É裬£¬£¬£¬£¬£¬£¬±»ÒÔΪÊÇÌìÏÂÉÏÓ°Ïì×îÉîÔ¶¡¢×îΣÏյ폷¨ÍÅ»ïÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ÓÚ2015ÄêÊ×´ÎÉæ×ãÍøÂç·¸·¨¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨Ðж¯¾ÙÐÐÁË49´Î¹¤ÒµËѲ飬£¬£¬£¬£¬£¬£¬²é»ñÁË12000ÕÅSIM¿¨ºÍ´ó×򵀮äËü×ʲú¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html
5¡¢WIP19ÍÅ»ïÖ÷ÒªÕë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍITЧÀÍÌṩÉÌ
ýÌå10ÔÂ14ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬SentinelOne³ÆÆä·¢Ã÷ÁËÐµĹ¥»÷ÍÅ»ïWIP19Ò»Ö±Õë¶ÔÖж«ºÍÑÇÖ޵ĵçÐźÍITЧÀÍÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïʹÓÃÓɺ«¹ú¹«Ë¾DEEPSoft½ÒÏþµÄÕýµ±µÄ±»µÁÊý×ÖÖ¤ÊéÀ´Ç©ÊðÔÚѬȾÁ´ÖÐ×°ÖõĶñÒ⹤¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¡£Ëü»¹ÓëOperation Shadow ForceÓÐËùÖØµþ£¬£¬£¬£¬£¬£¬£¬µ«Ê¹ÓÃÁËеĶñÒâÈí¼þºÍ²î±ðµÄÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔڻÖÐʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æ¾Ö¤×ª´¢³ÌÐò¡¢ÍøÂçɨÃ蹤¾ß¡¢ä¯ÀÀÆ÷ÇÔÈ¡³ÌÐò¡¢¼üÅ̼ͼ¹¤¾ßºÍÆÁÄ»¼Í¼¹¤¾ß¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/10/new-chinese-cyberespionage-group.html
6¡¢HP³ÆMagniberͨ¹ýJavaScriptÎļþѬȾWindowsÓû§
HPÔÚ10ÔÂ13ÈÕÐû²¼±¨¸æÕ¹ÏÖÁËÀÕË÷Èí¼þMagniberÐÂÒ»Âֵķַ¢»î¶¯¡£¡£¡£¡£¡£¡£¡£ÔÚ֮ǰµÄ»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËMSIºÍEXEÎļþ£¬£¬£¬£¬£¬£¬£¬¶ø×î½ü£¬£¬£¬£¬£¬£¬£¬ËüÇл»µ½ÁËJavaScriptÎļþ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎļþ¾ÓÉ»ìÏý´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃDotNetToJScriptÊÖÒյıäÌåÔÚϵͳÄÚ´æÖÐÖ´ÐÐ.NETÎļþ¡£¡£¡£¡£¡£¡£¡£.NETÎļþ¶Ôshellcode¾ÙÐнâÂë²¢½«Æä×¢ÈëÐÂÀú³Ì¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬Magniber¶ÔÖ÷»úÉϵÄÎļþ¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼¡£¡£¡£¡£¡£¡£¡£HPÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï»áÒªÇó¼ÒÍ¥Óû§Ö§¸¶¸ß´ï2500ÃÀÔªµÄÓöÈÀ´»Ö¸´Îļþ¡£¡£¡£¡£¡£¡£¡£
https://threatresearch.ext.hp.com/magniber-ransomware-switches-to-javascript-targeting-home-users-with-fake-software-updates/