SAPÐû²¼Çå¾²¸üÐÂÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
Ðû²¼Ê±¼ä 2023-03-161¡¢SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌSAPÒÑÕë¶Ô19¸öÎó²îÐû²¼ÁËÇå¾²¸üС£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²îÓ°ÏìÁËÐí¶à²úÆ·£¬£¬£¬£¬£¬£¬£¬µ«ÑÏÖØµÄÎó²î»áÓ°ÏìSAP Business ObjectsÉÌÒµÖÇÄÜÆ½Ì¨(CMC)ºÍSAP NetWeaver¡£¡£¡£´Ë´ÎÐÞ¸´µÄ5¸ö½ÏΪÑÏÖØµÄÎó²î»®·ÖΪ´úÂë×¢ÈëÎó²î£¨CVE-2023-25616£©¡¢Ä¿Â¼±éÀúÎó²î£¨CVE-2023-27269ºÍCVE-2023-27500£©¡¢È±ÉÙÉí·ÝÑéÖ¤¼ì²éÎó²î£¨CVE-2023-23857£©ÒÔ¼°ÏÂÁîÖ´ÐÐÎó²î£¨CVE-2023-25617£©¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÁ¬Ã¦×°Öò¹¶¡¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sap-releases-security-updates-fixing-five-critical-vulnerabilities/
2¡¢LockBit³Æ´ÓMaximum Industries»ñÈ¡µ½SpaceXµÄÊý¾Ý
¾ÝýÌå3ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÉú²ú¹«Ë¾Maximum IndustriesµÄϵͳ²¢»ñÈ¡µ½SpaceXµÄÉñÃØÊý¾Ý¡£¡£¡£Maximum IndustriesרÃÅ´ÓÊÂË®µ¶ºÍ¼¤¹âÇиîÒÔ¼°CNC¼Ó¹¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬ÊÇSpaceXµÄµÚÈý·½³Ð°üÉÌÖ®Ò»¡£¡£¡£¹¥»÷ÕßÌåÏÖÇÔÈ¡ÁËԼĪ3000ÕÅÓÉspace-x¹¤³ÌʦÈÏÖ¤µÄͼֽ£¬£¬£¬£¬£¬£¬£¬²¢ÍýÏëÔÚÒ»ÖÜÄÚÌᳫÅÄÂô£¬£¬£¬£¬£¬£¬£¬½«ÕâЩͼֽÂô¸øÆäËûÖÆÔìÉÌ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾÁªÏµÁËSpaceXºÍMaximum Industries£¬£¬£¬£¬£¬£¬£¬µ«ËûÃǶ¼Ã»ÓлØÓ¦¡£¡£¡£
https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html
3¡¢Ò½ÁƱ£½¡ÌṩÉÌILS͸¶Áè¼Ý420Íò»¼ÕßµÄÐÅϢй¶
ýÌå3ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡ÌṩÉÌIndependent Living Systems(ILS)Ðû²¼Í¨ÖªÍ¸Â¶Êý¾Ýй¶ÊÂÎñÓ°ÏìÁË4226508¸ö»¼Õß¡£¡£¡£¸Ã¹«Ë¾·¢Ã÷ÆäϵͳÓÚ2022Äê7ÔÂ5ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ËæºóÊÓ²ìÏÔʾ¹¥»÷ÕßÔÚ2022Äê6ÔÂ30ÈÕÖÁ7ÔÂ5ÈÕ»ñµÃÁ˲¿·ÖILSϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉ˰ÈËʶÓÖÃûºÍÒ½ÁÆÐÅÏ¢µÈ¡£¡£¡£ILSÔÚ·¢Ã÷Î¥¹æÐÐΪºóµÄÁù¸öÔº󣬣¬£¬£¬£¬£¬£¬Ò²¾ÍÊÇ2023Äê1ÔÂ17ÈÕÍê³ÉÁËÈ·¶¨ÊÜÓ°ÏìСÎÒ˽¼Ò»òʵÌåµÄÄÚ²¿Éó²é¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬£¬ILSÌåÏÖ½«ÎªÊÜÓ°Ï컼ÕßÌṩΪÆÚÒ»ÄêµÄExperianÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£
https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/
4¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒÕþ¸®ºÍÄÜÔ´×éÖ¯µÄ¹¥»÷
CiscoÔÚ3ÔÂ14ÈÕÅû¶ÁËÒ»¸öÐµĹ¥»÷ÍÅ»ïYoroTrooper£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÁªºÏÌå(CIS)¹ú¼ÒµÄÕþ¸®ºÍÄÜÔ´×éÖ¯¡£¡£¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÒѾÈëÇÖÁËÒ»¸ö´ÓÊÂÒ½ÁƱ£½¡µÄÖ÷ҪŷÃË»ú¹¹¡¢ÌìÏÂ֪ʶ²úȨ×éÖ¯(WIPO)ºÍ¶à¸öÅ·ÖÞ´óʹ¹Ý¡£¡£¡£YoroTrooperµÄ¹¤¾ß°üÀ¨ÉÌÆ·ºÍ×Ô½ç˵ÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂíºÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ñ¬È¾Á´ÓɶñÒâ¿ì½Ý·½·¨Îļþ(LNK)ºÍ¿ÉÑ¡µÄÓÕ¶üÎļþ×é³É¡£¡£¡£
https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/
5¡¢ESET·¢Ã÷TickÕë¶Ô¶«ÑÇijDLPÈí¼þ¿ª·¢É̵Ĺ¥»÷»î¶¯
3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯TickÕë¶Ô¶«ÑÇÒ»¼Ò¿ª·¢Êý¾Ýɥʧ·À»¤(DLP)Èí¼þµÄ¹«Ë¾µÄ»î¶¯¡£¡£¡£¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄÄÚ²¿¸üÐÂЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÔÚÈí¼þ¿ª·¢É̵ÄϵͳÄÚÈö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢Ä¾Âí»¯¸Ã¹«Ë¾Ê¹ÓõÄÕýµ±¹¤¾ßµÄ×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬×îÖÕµ¼ÖÂÔÚ¹«Ë¾¿Í»§µÄÅÌËã»úÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£ÔÚÈëÇÖÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß×°ÖÃÁËÒ»¸öеÄÏÂÔØ³ÌÐòShadowPy£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁ˺óÃÅNetboy£¨ÓÖÃûInvader£©ºÍÏÂÔØ³ÌÐòGhostdown¡£¡£¡£
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
6¡¢Check PointÐû²¼¹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ
Check PointÔÚ3ÔÂ14ÈÕÐû²¼Á˹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ¡£¡£¡£ÕâÖÖ¶ñÒâÈí¼þ¿ÉÒÔαװ³É20¶àÖÖ½ðÈÚÓ¦Ó㬣¬£¬£¬£¬£¬£¬²¢Ä£ÄâÓëÒøÐлò½ðÈÚЧÀÍÔ±¹¤µÄµç»°ÅÊ̸¾ÙÐÐÓïÒô´¹ÂÚ¹¥»÷¡£¡£¡£FakeCallsÖ÷ÒªÕë¶Ôº«¹ú£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÈðÊ¿¾üµ¶µÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬²»µ«Äܹ»Ö´ÐÐÆäÖ÷ҪʹÃü£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÄܹ»´ÓÄ¿µÄ×°±¸ÖÐÇÔȡСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁË2500¶à¸öFakeCallsÑù±¾£¬£¬£¬£¬£¬£¬£¬ËüÃÇʹÓÃÁËÖÖÖÖÄ£Äâ½ðÈÚ×éÖ¯µÄ×éºÏ²¢ÊµÑéÁË ·´ÆÊÎöÊÖÒÕ¡£¡£¡£
https://research.checkpoint.com/2023/south-korean-android-banking-menace-fakecalls/