ShuckwormÍÅ»ïͨ¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃÅPterodo
Ðû²¼Ê±¼ä 2023-06-201¡¢ShuckwormÍÅ»ïͨ¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃÅPterodo
6ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬SymantecÅû¶Á˶íÂÞ˹Ïà¹ØºÚ¿ÍÍÅ»ïShuckworm¸üÐµĹ¤¾ß¼¯ºÍѬȾսÂÔ¡£¡£¡£¡£¡£¡£¡£Shuckworm¼ÌÐø¶ÔÎÚ¿ËÀ¼ÌᳫÁ˶à´Î¹¥»÷£¬£¬£¬£¬£¬£¬×î½üµÄÄ¿µÄ°üÀ¨Çå¾²²¿·Ö¡¢¾ü¶ÓºÍÕþ¸®×éÖ¯¡£¡£¡£¡£¡£¡£¡£ShuckwormʹÓõç×ÓÓʼþ×÷Ϊ³õÊ¼Ñ¬È¾ÔØÌåÀ´·Ö·¢¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬È»ºóʹÓÃÁËÒ»¸öеÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬Í¨¹ýUSB·Ö·¢Æä×Ô½ç˵ºóÃŶñÒâÈí¼þPterodo¡£¡£¡£¡£¡£¡£¡£ÔÚ×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬£¬£¬¸ÃÍŻﻹʹÓÃÕýµ±Ð§Àͳ䵱C&CЧÀÍÆ÷£¬£¬£¬£¬£¬£¬°üÀ¨Telegram£¬£¬£¬£¬£¬£¬ÒÔ¼°TelegramµÄ΢²©Æ½Ì¨£¬£¬£¬£¬£¬£¬¼´Telegraph£¬£¬£¬£¬£¬£¬À´´æ´¢C&CµØµã¡£¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-russia-ukraine-military
2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖݺͶíÀÕ¸ÔÖÝÊý°ÙÍòסÃñµÄÐÅϢй¶
6ÔÂ16ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬Â·Ò×˹°²ÄÇÖݺͶíÀÕ¸ÔÖݵÄMOVEit TransferÇå¾²Îļþ´«ÊäϵͳÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Êý°ÙÍòסÃñµÄÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Â·Ò×˹°²ÄÇÖÝÎÞа³µÁ¾°ì¹«ÊÒ(OMV)͸¶£¬£¬£¬£¬£¬£¬¿ÉÄÜËùÓÐÓµÓиÃÖÝÕþ¸®½ÒÏþµÄ¼ÝʻִÕÕ¡¢Éí·ÝÖ¤»òÆû³µ¹ÒºÅÖ¤µÄסÃñ¶¼Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¶íÀÕ¸ÔDMVÒ²Ðû²¼ÁËÀàËÆµÄÉùÃ÷£¬£¬£¬£¬£¬£¬³Æ´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËԼĪ3500000Ãû¶íÀÕ¸ÔÈË¡£¡£¡£¡£¡£¡£¡£¶íÀÕ¸ÔÖÝÕþ¸®ÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÎÞ·¨È·¶¨ÏêϸµÄÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬Òò´Ë½¨ÒéËùÓй«Ãñ½ÓÄÉÔ¤·À²½·¥¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/millions-of-oregon-louisiana-state-ids-stolen-in-moveit-breach/
3¡¢»ªË¶Ðû²¼½ôÆÈ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î·ÓÉÆ÷ÖеÄÎó²î
ýÌå6ÔÂ19Èճƣ¬£¬£¬£¬£¬£¬»ªË¶Ðû²¼Á˽ôÆÈ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¸ö·ÓÉÆ÷ÐͺÅÖеÄ9¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖаüÀ¨Á½¸öCVSSÆÀ·ÖΪ9.8µÄÎó²î£¬£¬£¬£¬£¬£¬»®·ÖÊÇNetatalk 3.1.12֮ǰµÄÔ½½çдÈëÎó²î£¨CVE-2018-1160£©£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£ÒÔ¼°Asuswrt¹Ì¼þÖеÄÄÚ´æËð»µÎó²î£¨CVE-2022-26376£©£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ״̬»òí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾½¨ÒéÊÜÓ°Ïì·ÓÉÆ÷ÐͺŵÄÓû§¾¡¿ì½«×°±¸¸üе½×îй̼þ£¬£¬£¬£¬£¬£¬²¢ÎªÎÞÏßÍøÂçºÍ·ÓÉÆ÷ÖÎÀíÒ³ÃæÉèÖõ¥¶ÀµÄÖØ´óµÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/asus-patches-highly-critical-wifi-router-flaws/
4¡¢FTCÖ¸¿Ø»ùÒò¼ì²â¹«Ë¾1health.ioй¶Óû§µÄ¿µ½¡ÐÅÏ¢
ýÌå6ÔÂ16Èճƣ¬£¬£¬£¬£¬£¬ÃÀ¹úFTCÖ¸¿Ø»ùÒò¿µ½¡¼ì²â¹«Ë¾1health.ioδÄܱ£»£»£»£»£»£»¤Ãô¸ÐµÄ»ùÒòºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£FTC³Æ£¬£¬£¬£¬£¬£¬1healthÒÔǰ³ÆÎªVitagene£¬£¬£¬£¬£¬£¬ÔÚÆäÒþ˽Õþ²ß·½ÃæÓÕÆÁ˿ͻ§£¬£¬£¬£¬£¬£¬×·ËÝÐԵظü¸ÄÁ˸ÃÕþ²ß£¬£¬£¬£¬£¬£¬²¢ÔÚÆäɾ³ýÊý¾ÝµÄÀú³ÌÖÐÎóµ¼Á˿ͻ§¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾±»ÒªÇóÏòFTCÖ§¸¶75000ÃÀÔªÓÃÓÚÏûºÄÕßÍ˿£¬£¬£¬£¬£¬²¢±»Õ¥È¡ÔÚδ»ñµÃ¿Í»§Ã÷È·Ô޳ɵÄÇéÐÎÏÂÓëµÚÈý·½¹²Ïí¿µ½¡Êý¾Ý£¬£¬£¬£¬£¬£¬»¹±ØÐèʵÑéеÄÇå¾²ÍýÏë¡£¡£¡£¡£¡£¡£¡£1healthµÄÊ×ϯִÐйٳÆFTCµÄÊÓ²ìÊÇ¡°Õþ¸®Ì«¹ý¸ÉÔ¤µÄ°¸Àý¡±¡£¡£¡£¡£¡£¡£¡£
https://cyberscoop.com/ftc-1healthio-health-data-privacy/
5¡¢Ñо¿Ö°Ô±ÑÝʾÐÂÐͲàÐŵÀ¹¥»÷·½·¨Freaky Leaky SMS
¾Ý6ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ò»×éÑо¿Ö°Ô±Éè¼ÆÁËÃûΪFreaky Leaky SMSµÄÐÂÐͲàÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬ËüÒÀÀµÓÚSMS·¢Ëͱ¨¸æµÄʱ¼äÀ´ÍƶÏÊÕ¼þÈ˵ÄλÖᣡ£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÐèÒªÍøÂçһЩÕÉÁ¿Êý¾Ý£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚSMS·¢Ëͱ¨¸æºÍÄ¿µÄµÄλÖÃÖ®¼ä½¨ÉèÏêϸµÄ¹ØÁª¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕÆÎÕµÄÄ¿µÄÐÐ×ÙÊý¾ÝԽ׼ȷ£¬£¬£¬£¬£¬£¬¹¥»÷½×¶ÎMLÄ£×ÓÕ¹ÍûÖеÄλÖ÷ÖÀàЧ¹û¾ÍԽ׼ȷ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Í³Ò»×éÑо¿Ö°Ô±ÔÚÈ¥Ä꿪·¢ÁËÀàËÆµÄ׼ʱ¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÐÂÎÅÎüÊÕ±¨¸æ´óÖ¶¨Î»Signal¡¢ThreemaºÍWhatsAppµÈ¼´Ê±Í¨Ñ¶¹¤¾ßµÄÓû§¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sms-delivery-reports-can-be-used-to-infer-recipients-location/
6¡¢MandiantÅû¶UNC4841ʹÓÃBarracuda ESGÎó²îµÄ¹¥»÷ÏêÇé
MandiantÔÚ6ÔÂ15ÈÕÅû¶ÁËUNC4841ʹÓÃBarracuda ESGÎó²îµÄ¹¥»÷ÏêÇé¡£¡£¡£¡£¡£¡£¡£Ô¼Äª´Ó2022Äê10ÔÂ10ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬UNC4841×îÏÈʹÓÃÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2023-2868£©¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒ⸽¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬µ±Barracuda ESGʵÑéɨÃèÎļþʱ£¬£¬£¬£¬£¬£¬¸½¼þ»áʹÓøÃÎó²îÔÚ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£Ò»µ©»ñÈ¡»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¾Í»áʹÓöñÒâÈí¼þϵÁÐSaltwater¡¢SeaspyºÍSeasideѬȾËü£¬£¬£¬£¬£¬£¬À´´Ó×°±¸ÖÐÇÔÈ¡µç×ÓÓʼþÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Mandiant»¹³ÆBarracudaÉÏÖÜÒªÇóÓû§Ìæ»»×°±¸ÊdzöÓÚÉóÉ÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÎÞ·¨È·±£ÒÑÍêȫɾ³ý¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£
https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally


¾©¹«Íø°²±¸11010802024551ºÅ