ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§

Ðû²¼Ê±¼ä 2023-04-14

1¡¢ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§


¾ÝýÌå4ÔÂ12ÈÕ±¨µÀ£¬£¬ £¬ £¬£¬ÏÖ´úÆû³µÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬ £¬£¬Ó°ÏìÆä·¨¹úºÍÒâ´óÀûµÄ¿Í»§¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾ÔÚ֪ͨÖгƣ¬£¬ £¬ £¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁ˿ͻ§Êý¾Ý¿â£¬£¬ £¬ £¬£¬ËûÃÇ»¹ÔÚÈ·¶¨ÊÂÎñµÄ¹æÄ£¡£¡£¡£ ¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢¼ÒÍ¥µØµã¡¢µç»°ºÅÂëºÍ³µÁ¾Ê¶ÓÖÃûµÈ£¬£¬ £¬ £¬£¬ÊÜÓ°ÏìµÄÈËÊýÉв»ÇåÎú¡£¡£¡£ ¡£¡£ÎªÓ¦¶ÔÕâÒ»ÊÂÎñ£¬£¬ £¬ £¬£¬¸Ã¹«Ë¾Òѽ«ÊÜÓ°ÏìµÄϵͳÏÂÏß¡£¡£¡£ ¡£¡£½ñÄê2Ô·ݣ¬£¬ £¬ £¬£¬ÏÖ´úÔøÐû²¼½ôÆÈ¸üУ¬£¬ £¬ £¬£¬ÐÞ¸´¿Éͨ¹ýUSBÊý¾ÝÏßµÁ³µµÄÎó²î¡£¡£¡£ ¡£¡£


https://securityaffairs.com/144732/data-breach/hyundai-suffered-data-breach.html


2¡¢¾©´ÉÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÎó²îCVE-2023-25954


ýÌå4ÔÂ12Èճƣ¬£¬ £¬ £¬£¬¾©´É£¨Kyocera£©ÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÈö²¥¶ñÒâÈí¼þµÄÎó²î£¨CVE-2023-25954£©¡£¡£¡£ ¡£¡£Îó²îÓ°ÏìÁËKYOCERA Mobile Print¡¢UTAX/TA Mobile PrintºÍOlivetti Mobile Print¡£¡£¡£ ¡£¡£Ö»¹ÜÕâЩӦÓõÄÐû²¼Õß²î±ð£¬£¬ £¬ £¬£¬µ«ËüÃÇ»ùÓÚÏàͬµÄ´úÂ룬£¬ £¬ £¬£¬Òò´Ë¶¼»áÊÜÓ°Ïì¡£¡£¡£ ¡£¡£ÕâЩӦÓóÌÐòÔÊÐí´Ó¶ñÒâµÚÈý·½Òƶ¯Ó¦Óô«ÊäÊý¾Ý£¬£¬ £¬ £¬£¬¿ÉÏÂÔØ¶ñÒâpayload¡£¡£¡£ ¡£¡£²¢ÇÒ£¬£¬ £¬ £¬£¬Í¨¹ýʹÓþ©´ÉÒÆ¶¯´òÓ¡Ó¦ÓõÄä¯ÀÀÆ÷¹¦Ð§£¬£¬ £¬ £¬£¬¿É»á¼û¶ñÒâÍøÕ¾²¢ÏÂÔØºÍÖ´ÐжñÒâÎļþ£¬£¬ £¬ £¬£¬µ¼ÖÂÒÆ¶¯×°±¸ÐÅϢй¶¡£¡£¡£ ¡£¡£¾©´ÉÒÑÐÞ¸´¸ÃÎó²î£¬£¬ £¬ £¬£¬¼´½«ÍƳöµÄAndroid 14Ò²ÓÐÍû¼õÇá´ËÀàΣº¦¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/kyocera-android-app-with-1m-installs-can-be-abused-to-drop-malware/


3¡¢NorthOne BankÊý¾Ý¿âÉèÖùýʧй¶100ÍòÌõ²ÆÎñ¼Í¼


¾Ý4ÔÂ12ÈÕ±¨µÀ£¬£¬ £¬ £¬£¬½ðÈڿƼ¼¹«Ë¾NorthOne BankÊý¾Ý¿âÉèÖùýʧ£¬£¬ £¬ £¬£¬Ð¹Â¶Áè¼Ý100ÍòÌõ²ÆÎñ¼Í¼¡£¡£¡£ ¡£¡£Êý¾Ý¿âÖйûÕæµÄPDFÎļþ°üÀ¨Ê¹ÓÃÓ¦ÓóÌÐòÖ§¸¶²úÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÆóÒµµÄ·¢Æ±¡£¡£¡£ ¡£¡£Éæ¼°ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈ£¬£¬ £¬ £¬£¬»¹°üÀ¨Óйظ¶¿îÓÃ;¡¢×ܽð¶îºÍµ½ÆÚÈÕµÄ×¢ÊÍ£¬£¬ £¬ £¬£¬ÓÐЩÉõÖÁ°üÀ¨Ë°ºÅµÈ˰ÎñÐÅÏ¢¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÓÚ1ÔÂ19ÈÕÊ״α¨¸æÁËÕâÒ»·¢Ã÷£¬£¬ £¬ £¬£¬Êý¾Ý¿âÔÚ1ÔÂ31ÈÕ±»±£»£»£» £»¤ÆðÀ´¡£¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎúÕâЩ¼Í¼ÒÑ̻¶¶à³¤Ê±¼ä¡£¡£¡£ ¡£¡£


https://www.websiteplanet.com/news/northone-leak-report/


4¡¢APT36ʹÓöñÒâÈí¼þCrimson RAT¹¥»÷Ó¡¶ÈµÄ½ÌÓýÐÐÒµ


SentinelLabsÔÚ4ÔÂ13ÈÕÅû¶ÁËAPT36(Transparent Tribe)Õë¶ÔÓ¡¶È½ÌÓýÐÐÒµµÄ¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃÎäÆ÷»¯µÄMicrosoft OfficeÎĵµ£¬£¬ £¬ £¬£¬Í¨¹ý¶ñÒâºê»òOLEǶÈëÊÖÒÕÀ´·Ö·¢Crimson RAT¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ÖÖÖÖCrimson RAT .NETµÄʵÏÖ£¬£¬ £¬ £¬£¬±àÒëʱ¼äÔÚ2022Äê7ÔÂÖÁ9ÔÂÖ®¼ä¡£¡£¡£ ¡£¡£Æä¹¦Ð§°üÀ¨ÇÔȡϵͳÐÅÏ¢¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢Æô¶¯ºÍ×èÖ¹Àú³ÌÒÔ¼°Ã¶¾ÙÎļþºÍÇý¶¯Æ÷¡£¡£¡£ ¡£¡£Crimson RAT±äÌåʵÏÖÁ˲î±ðÇ¿¶ÈµÄ»ìÏýÊÖÒÕ£¬£¬ £¬ £¬£¬ÀýÈ磬£¬ £¬ £¬£¬¼òÆÓµÄº¯ÊýÃû³Æ»û±äºÍ¶¯Ì¬×Ö·û´®ÆÊÎö¡£¡£¡£ ¡£¡£


https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/


5¡¢KasperskyÐû²¼LazarusµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ


4ÔÂ12ÈÕ£¬£¬ £¬ £¬£¬KasperskyÐû²¼Á˹ØÓÚLazarus GroupµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±×Ô2019ÄêÒÔÀ´Ò»Ö±ÔÚ¸ú×ٸû£¬£¬ £¬ £¬£¬·¢Ã÷¹¥»÷Ä¿µÄÔÚ2020Äê4Ô±¬·¢ÁËÖØ´óת±ä£¬£¬ £¬ £¬£¬Í¬Ê±»¹¸üÐÂÁËÑ¬È¾ÔØÌå¡£¡£¡£ ¡£¡£DeathNote¼¯Èº±»ÓÃÓÚÕë¶Ô¶«Å·µÄÆû³µºÍѧÊõÐÐÒµ£¬£¬ £¬ £¬£¬ËüÃǶ¼Óë¹ú·À¹¤ÒµÓйØ¡£¡£¡£ ¡£¡£¹¥»÷Õß»¹½«ËùÓÐÓÕ¶üÎļþת»»ÎªÓë¹ú·À³Ð°üÉ̺ÍÍ⽻ЧÀÍÏà¹ØµÄְλÐÎò¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬Ñ¬È¾Á´Ò²»ñµÃÁËˢУ¬£¬ £¬ £¬£¬²»µ«ÒÀÀµÓÚÎäÆ÷»¯ÎĵµÖеÄÔ¶³ÌÄ£°å×¢ÈëÊÖÒÕ£¬£¬ £¬ £¬£¬»¹ÒÀÀµÓÚľÂí»¯µÄ¿ªÔ´PDFÉó²é¹¤¾ß¡£¡£¡£ ¡£¡£


https://securelist.com/the-lazarus-group-deathnote-campaign/109490/


6¡¢CloudflareÐû²¼2023ÄêQ1 DDoSÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ     

 

4ÔÂ11ÈÕ£¬£¬ £¬ £¬£¬CloudflareÐû²¼ÁË2023ÄêµÚÒ»¼¾¶ÈDDoSÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£ ¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬ £¬£¬³¬ÈÝÁ¿DDoS¹¥»÷ÓÐËùÔöÌí£¬£¬ £¬ £¬£¬×î´óµÄÒ»´ÎµÖ´ïÿÃë7100Íò´ÎÇëÇó(rps)ÒÔÉÏ¡£¡£¡£ ¡£¡£ÐÂÒ»´ú½©Ê¬ÍøÂçÖð½¥·ÅÆúÁËʹÓôó×ÚÎïÁªÍø×°±¸µÄÕ½ÂÔ£¬£¬ £¬ £¬£¬×ª¶øÊ¹ÓÃÒ×±»¹¥»÷ºÍÉèÖùýʧµÄVPSЧÀÍÆ÷£¬£¬ £¬ £¬£¬ÆäÇ¿¶È±È»ùÓÚÎïÁªÍøµÄ½©Ê¬ÍøÂçºá¿ç5000±¶¡£¡£¡£ ¡£¡£ÀÕË÷DDoS¹¥»÷ͬ±ÈÔöÌí60%£¬£¬ £¬ £¬£¬Õ¼ËùÓÐDDoS¹¥»÷µÄ16%¡£¡£¡£ ¡£¡£DDoS¹¥»÷Ö÷ÒªÕë¶ÔµÄ¹ú¼ÒÊÇÒÔÉ«ÁУ¬£¬ £¬ £¬£¬Æä´ÎÊÇÃÀ¹ú¡¢¼ÓÄôóºÍÍÁ¶úÆä¡£¡£¡£ ¡£¡£


https://blog.cloudflare.com/ddos-threat-report-2023-q1/