ÓÎÏ·¿¯Ðй«Ë¾ActivisionµÄÊý¾Ý±»Ðû²¼ÔÚijºÚ¿ÍÂÛ̳

Ðû²¼Ê±¼ä 2023-03-01

1¡¢ÓÎÏ·¿¯Ðй«Ë¾ActivisionµÄÊý¾Ý±»Ðû²¼ÔÚijºÚ¿ÍÂÛ̳


¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬£¬ £¬£¬£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁË´ÓÃÀ¹úÓÎÏ·¿¯ÐÐÉÌActivisionµÄAzureÊý¾Ý¿âÖÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¹¥»÷±¬·¢ÓÚ2022Äê12ÔÂ4ÈÕ£¬£¬ £¬£¬£¬ºÚ¿Í´¹ÂÚ¹¥»÷ÁËActivisionµÄÒ»ÃûHRÔ±¹¤²¢ÇÔÈ¡Æäƾ֤¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨19444Ìõ¼Í¼£¬£¬ £¬£¬£¬Éæ¼°Ô±¹¤µÄÐÕÃû¡¢µç»°¡¢Ö°Î»¡¢Î»ÖúÍÓʼþµØµãµÈ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬¾­Óɳ¹µ×ÊӲ죬£¬ £¬£¬£¬È·¶¨Ã»ÓÐÃô¸ÐµÄÔ±¹¤ÐÅÏ¢¡¢ÓÎÏ·´úÂë»òÍæ¼ÒÐÅϢй¶¡£¡£¡£


https://securityaffairs.com/142779/data-breach/activision-data-leak.html


2¡¢BitdefenderÐû²¼ÀÕË÷Èí¼þMortalKombatµÄ½âÃÜÆ÷


ýÌå2ÔÂ28Èճƣ¬£¬ £¬£¬£¬Çå¾²¹«Ë¾BitdefenderÐû²¼ÁËÀÕË÷Èí¼þMortalKombatµÄ½âÃÜÆ÷¡£¡£¡£MortalKombat»ùÓÚXorist£¬£¬ £¬£¬£¬ÓÚ2023Äê1ÔÂÊ״ηºÆð£¬£¬ £¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÃÀ¹ú£¬£¬ £¬£¬£¬µ«Ò²ÓÐÓ¢¹ú¡¢ÍÁ¶úÆäºÍ·ÆÂɱöµÄѬȾ»î¶¯¡£¡£¡£¹¥»÷Õ߻ᷢËͰüÀ¨¶ñÒâZIP¸½¼þµÄÓʼþ£¬£¬ £¬£¬£¬ÆäÖаüÀ¨BAT¼ÓÔØ³ÌÐò¾ç±¾£¬£¬ £¬£¬£¬Æô¶¯Ê±Ëü»áÏÂÔØ²¢Ö´ÐÐÀÕË÷Èí¼þ¶þ½øÖÆÎļþºÍLaplas¡£¡£¡£´Ë½âÃÜÆ÷ÊÇÒ»¸ö×ÔÁ¦µÄ¿ÉÖ´ÐÐÎļþ£¬£¬ £¬£¬£¬ÎÞÐèÔÚ±»Ñ¬È¾µÄ×°±¸ÉÏ×°Öᣡ£¡£Ëü¿ÉɨÃèÕû¸öÎļþϵͳÒÔ¶¨Î»Ñ¬È¾MortalKombatµÄÎļþ£¬£¬ £¬£¬£¬µ«ÎÞ·¨¶¨Î»ºÍ¸ù³ýLaplasÎļþ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-decryptor-recovers-your-files-for-free/


3¡¢ºÚ¿ÍʹÓÃWordPress HouzezÖеÄÎó²îÀ´Ð®ÖÆÍøÕ¾


¾ÝPatchstackÔÚ2ÔÂ27ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ºÚ¿ÍÔÚʹÓÃWordPress²å¼þHouzezÖеÄÁ½¸öÎó²îÀ´Ð®ÖÆÍøÕ¾¡£¡£¡£HouzezÊÇThemeForestÉϵÄÒ»¿î¸ß¼¶²å¼þ£¬£¬ £¬£¬£¬Ö÷ÒªÓÃÓÚ·¿µØ²úÍøÕ¾£¬£¬ £¬£¬£¬ÌṩÇáËɵÄÁбíÖÎÀíÎÂ˳³©µÄ¿Í»§ÌåÑé¡£¡£¡£µÚÒ»¸öÊÇHouzezÖ÷Ìâ²å¼þÖеÄÌáȨÎó²î£¨CVE-2023-26540£©£¬£¬ £¬£¬£¬ÁíÒ»¸öÊÇÓ°ÏìHouzesµÇ¼ע²á²å¼þµÄÌáȨÎó²î£¨CVE-2023-260090£©¡£¡£¡£PatchstackÔÚÒ°Íâ·¢Ã÷µÄʹÓôËÎó²îµÄ¹¥»÷ÖУ¬£¬ £¬£¬£¬¹¥»÷ÕßÉÏ´«ÁËÒ»¸öÄܹ»Ö´ÐÐÏÂÁî¡¢ÔÚÍøÕ¾ÉÏ×¢Èë¹ã¸æ»ò½«Á÷Á¿Öض¨Ïòµ½ÆäËü¶ñÒâÍøÕ¾µÄºóÃÅ¡£¡£¡£


https://patchstack.com/articles/psa-houzez-theme-unauthenticated-privilege-escalation-vulnerability-exploited-in-the-wild/


4¡¢Ñо¿Ö°Ô±·¢Ã÷αװ³ÉÕýµ±Windowsµ÷ÊÔ¹¤¾ßµÄPlugX


2ÔÂ24ÈÕ£¬£¬ £¬£¬£¬Trend MicroÅû¶ÁËPlugXαװ³É¿ªÔ´Windowsµ÷ÊÔ¹¤¾ßx32dbgµÄ¹¥»÷»î¶¯¡£¡£¡£¸Ãx32dbg.exe¾ßÓÐÓÐÓõÄÊý×ÖÊðÃû£¬£¬ £¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Òþ²Ø¡¢¼á³Ö³¤ÆÚÐÔ¡¢ÌáÉýȨÏÞ²¢ÈƹýÎļþÖ´ÐÐÏÞÖÆ¡£¡£¡£´Ë´Î»î¶¯ÒÀȻʹÓÃÁËDLL²à¼ÓÔØµÄÊÖÒÕ£¬£¬ £¬£¬£¬Ê¹Óþ­ÓÉÊý×ÖÊðÃûµÄÈí¼þÓ¦ÓóÌÐò¼ÓÔØ¶ñÒâDLL¡£¡£¡£Ñо¿Ö°Ô±¶Ô¸Ã¹¥»÷Á´µÄÆÊÎö»¹ÏÔʾ£¬£¬ £¬£¬£¬Ê¹ÓÃx32dbg.exe×°ÖÃÁËÒ»¸öºóÃÅ¡£¡£¡£ÕâÊÇÒ»¸öUDP shell¿Í»§¶Ë£¬£¬ £¬£¬£¬ÍøÂçϵͳÐÅÏ¢²¢ÆÚ´ýÔ¶³ÌЧÀÍÆ÷µÄÌØÊâÖ¸Áî¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/b/investigating-the-plugx-trojan-disguised-as-a-legitimate-windows.html


5¡¢ProofpointÐû²¼¹ØÓÚTA569¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


ProofpointÔÚ2ÔÂ26ÈÕÐû²¼Á˹ØÓÚTA569¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£TA569ÊÇÒ»¸ö¶à²úµÄ¹¥»÷ÍŻ£¬ £¬£¬£¬Ê¹ÓÃÁ˶àÖÖÀàÐ͵Ä×¢Èë·½·¨¡¢Á÷Á¿·ÖÅÉϵͳ(TDS)ºÍpayload£¬£¬ £¬£¬£¬°üÀ¨µ«²»ÏÞÓÚSocGholish¡£¡£¡£TA569±»ÒÔΪÊÇÒ»¸ö³õʼ»á¼ûÊðÀí(IAB)»ò×ÔÁ¦µÄÍøÂç·¸·¨ÍŻ£¬ £¬£¬£¬ÆäTTPÔÚÒÑÍù¼¸¸öÔÂÖб¬·¢ÁËת±ä¡£¡£¡£Ä¿µÄ»á¼ûÔâµ½TA569×¢Èë¹¥»÷µÄÍøÕ¾Ê±£¬£¬ £¬£¬£¬Æää¯ÀÀÆ÷»áÚ¹ÊÍ×¢ÈëµÄJavaScript£¬£¬ £¬£¬£¬Öª×ãÌØ¶¨Ìõ¼þºó»áÅ׳öÒ»¸öÓÕ¶ü£¬£¬ £¬£¬£¬ÈçÐéαµÄä¯ÀÀÆ÷¸üС£¡£¡£ÕâЩÓÕ¶üÓÃÓÚ·Ö·¢ÖÖÖÖ¶ñÒâÈí¼þpayload£¬£¬ £¬£¬£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡³ÌÐò»òRAT¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/ta569-socgholish-and-beyond


6¡¢KasperskyÐû²¼2022ÄêÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


2ÔÂ27ÈÕ£¬£¬ £¬£¬£¬KasperskyÐû²¼ÁË2022ÄêÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ÔÚ2022Ä꣬£¬ £¬£¬£¬Kaspersky¼ì²âµ½1661743¸ö¶ñÒâ×°ÖóÌÐò¡¢196476¸öеÄÊÖ»úÒøÐÐľÂíºÍ10543¸öеÄÒÆ¶¯ÀÕË÷Èí¼þ¡£¡£¡£Òƶ¯¹¥»÷ÔÚ2021ϰëÄêϽµºóÇ÷ÓÚÆ½ÎÈ£¬£¬ £¬£¬£¬²¢ÔÚÕû¸ö2022Äê¼á³ÖÔÚͳһˮƽ¡£¡£¡£°´Òƶ¯¶ñÒâÈí¼þÀàÐÍ·ÖÀ࣬£¬ £¬£¬£¬RiskToolÀàÀ¬»øÈí¼þ£¨27.39%£©Î»¾Ó°ñÊ×£¬£¬ £¬£¬£¬È¡´úÁË֮ǰ×î¶àµÄ¹ã¸æÈí¼þ£¨24.05%£©¡£¡£¡£Òƶ¯¹ã¸æÈí¼þÖÐAdloϵÁÐÕ¼±È×î´ó (22.07%)£¬£¬ £¬£¬£¬Æä´ÎÊÇEwind£¨16.46%£©ºÍHiddenAd£¨15.02%£©¡£¡£¡£


https://securelist.com/mobile-threat-report-2022/108844/