IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-08-16

1¡¢IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶


¾ÝýÌå8ÔÂ14ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖÝÒ½ÁƱ£½¡Õþ²ßÓëÈÚ×ʲ¿(HCPF)ÏòÁè¼Ý400ÍòÈË·¢³ö֪ͨ£¬£¬£¬ £¬£¬£¬³ÆÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËËûÃǵÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£ ¡£¡£HCPF³ÎÇå˵£¬£¬£¬ £¬£¬£¬ËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷£¬£¬£¬ £¬£¬£¬¿ÉÊÇËûÃǵijаüÉÌIBMÔâµ½ÁËÕë¶ÔMOVEitµÄ¹¥»÷¡£¡£¡£¡£ ¡£¡£6ÔÂ13ÈÕÊӲ췢Ã÷£¬£¬£¬ £¬£¬£¬IBMʹÓõÄMOVEitÓ¦ÓÃÉϵIJ¿·ÖHCPFÎļþÔÚ5ÔÂ28ÈÕ×óÓÒ±»»á¼û£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ä³Ð©Health First ColoradoºÍCHP+»áÔ±ÐÅÏ¢µÄÎļþ¡£¡£¡£¡£ ¡£¡£×ܹ²Ó°ÏìÁË4091794ÈË£¬£¬£¬ £¬£¬£¬HPCF½«Í¨¹ýExperianΪÊÜÓ°ÏìÓû§ÌṩÁ½ÄêµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/colorado-warns-4-million-of-data-stolen-in-ibm-moveit-breach/


2¡¢Akamai·¢Ã÷Õë¶ÔÔËÐÐMagento 2µÄµçÉÌÆ½Ì¨µÄXurum»î¶¯


AkamaiÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÔËÐÐMagento 2 CMSµÄµçÉÌÆ½Ì¨µÄ¹¥»÷»î¶¯£¬£¬£¬ £¬£¬£¬²¢½«¸Ã»î¶¯ÃüÃûΪXurum¡£¡£¡£¡£ ¡£¡£»£»£»£»£»£»£»î¶¯Ê¼ÓÚ1Ô·Ý£¬£¬£¬ £¬£¬£¬Ê¹ÓÃÁËAdobe CommerceºÍMagento Open SourceÖеÄЧÀÍÆ÷¶ËÄ£°å×¢ÈëÎó²î£¨CVE-2022-24086£©¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßËÆºõ¶ÔÄ¿µÄMagentoÊÐËÁÒÑÍù10ÌìÄÚËù϶©µ¥µÄ¸¶¿îͳ¼ÆÊý¾Ý¸ÐÐËȤ¡£¡£¡£¡£ ¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËwso-ng£¬£¬£¬ £¬£¬£¬ÕâÊÇа汾µÄWSO webshell¡£¡£¡£¡£ ¡£¡£»£»£»£»£»£»£»î¶¯»¹Ê¹ÓÃÁ˽ϾɵÄDirty COWÎó²î(CVE-2016-5195)£¬£¬£¬ £¬£¬£¬ÒÔʵÑéÔÚLinuxÖÐÌáȨ¡£¡£¡£¡£ ¡£¡£ÓÐÖ¤¾ÝÅú×¢¹¥»÷Óë¶íÂÞ˹ÓйØ¡£¡£¡£¡£ ¡£¡£ 


https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell


3¡¢ÀÕË÷Èí¼þMonti¾íÍÁÖØÀ´Ö÷ÒªÕë¶ÔÖ´·¨ºÍÕþ¸®ÁìÓò»ú¹¹


8ÔÂ14ÈÕ£¬£¬£¬ £¬£¬£¬Trend Micro·¢Ã÷ʱ¸ô2¸öÔºóMonti¾íÍÁÖØÀ´£¬£¬£¬ £¬£¬£¬ÖØµã¹Ø×¢Ö´·¨ºÍÕþ¸®ÁìÓò»ú¹¹¡£¡£¡£¡£ ¡£¡£Óë´Ëͬʱ£¬£¬£¬ £¬£¬£¬»ùÓÚLinuxƽ̨µÄMontiбäÌåÒ²ÒѸ¡³öË®Ãæ£¬£¬£¬ £¬£¬£¬Óë֮ǰµÄ°æ±¾ÓÐ×ÅÏÔ×Ųî±ð¡£¡£¡£¡£ ¡£¡£ÒÔǰ°æ±¾ºÜºéÁ÷ƽÉÏ»ùÓÚContiй¶µÄ´úÂ루99%£©£¬£¬£¬ £¬£¬£¬µ«ÐÈÎÃüܳÌÐòµÄÏàËÆ¶È½öΪ29%¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ £¬£¬£¬Í¨¹ý¶Ô´úÂ루ÓÈÆäÊǼÓÃÜËã·¨£©¾ÙÐдó×ÚÐ޸쬣¬£¬ £¬£¬£¬MontiÈÆ¹ý¼ì²âµÄÄÜÁ¦»ñµÃÌá¸ß£¬£¬£¬ £¬£¬£¬ÕâÔöÌíÁ˼ì²â»ººÍ½â´ËÀà¶ñÒâ»î¶¯µÄÄѶÈ¡£¡£¡£¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/23/h/monti-ransomware-unleashes-a-new-encryptor-for-linux.html


4¡¢ZscaleÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT


ZscaleÔÚ8ÔÂ10ÈÕÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøµÄ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT¡£¡£¡£¡£ ¡£¡£×èÖ¹6Ô·Ý£¬£¬£¬ £¬£¬£¬JanelaRATÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøÒøÐкͽðÈÚ»ú¹¹£¬£¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈںͼÓÃÜÇ®±ÒÏà¹ØÊý¾Ý£¬£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÀ´×ÔÕýµ±ÈªÔ´£¨ÈçVMWareºÍMicrosoft£©µÄDLL²à¼ÓÔØÊÖÒÕÀ´Èƹý¼ì²â¡£¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬JanelaRAT¾ßÓд°¿ÚÎÊÌâ¸ÐÖª»úÖÆ£¬£¬£¬ £¬£¬£¬²¢½ÓÄɶ¯Ì¬Ì×½ÖÉ×ÓèÖÃϵͳ¡£¡£¡£¡£ ¡£¡£JanelaRATµÄ¿ª·¢Õß¿ÉÄÜ´ÓBX RATµÄ´úÂëÖлñµÃÁËÁé¸Ð£¬£¬£¬ £¬£¬£¬µ«Ëü½ö¾ß±¸BX RATÌṩµÄ²¿·Ö¹¦Ð§£¬£¬£¬ £¬£¬£¬Ã»Óе¼ÈëshellÏÂÁîÖ´Ðеȹ¦Ð§¡£¡£¡£¡£ ¡£¡£


https://www.zscaler.com/blogs/security-research/janelarat-repurposed-bx-rat-variant-targeting-latam-fintech


5¡¢Kaspersky³Æ´ó×Ú±»ºÚµÄWPÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷


¾Ý8ÔÂ14ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬Kaspersky·¢Ã÷´ó×Ú±»ºÚµÄWordPressÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷¡£¡£¡£¡£ ¡£¡£5ÔÂ15ÈÕµ½7ÔÂ31ÈÕ£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË22400¸öWordPressÍøÕ¾±»ºÚ¿Í¹¥»÷ÒÔ½¨Éè´¹ÂÚÒ³Ãæ¡£¡£¡£¡£ ¡£¡£Í³Ò»Ê±ÆÚÄÚ£¬£¬£¬ £¬£¬£¬Óû§×ܹ²ÊµÑé»á¼û±»Ñ¬È¾ÍøÕ¾ÉÏÍйܵÄÐéÎ±Ò³Ãæ200213´Î¡£¡£¡£¡£ ¡£¡£×î³£±»´¹ÂÚ¹¥»÷µÄЧÀÍºÍÆóÒµ°üÀ¨Netflix¡¢Å·ÖÞµÄÒøÐкͳ£¼ûµÄ¿ìµÝЧÀÍ¡£¡£¡£¡£ ¡£¡£Kaspersky»¹ÏêÊöÁËÄÄÐ©ÍøÕ¾×îÈÝÒ×Ôâµ½ºÚ¿Í¹¥»÷¡¢ÔõÑùÈëÇÖWordPressÍøÕ¾ÒÔ¼°WordPressÍøÕ¾±»ºÚµÄ¼£ÏóµÈ¡£¡£¡£¡£ ¡£¡£


https://securelist.com/phishing-with-hacked-sites/110334/


6¡¢UptycsÐû²¼¹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ


8ÔÂ14ÈÕ£¬£¬£¬ £¬£¬£¬UptycsÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÓÚ8ÔÂÉÏÑ®·¢Ã÷Á˸öñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬Ëüͨ¹ýTelegramºÍDiscordƽ̨¾ÙÐÐÈö²¥¡£¡£¡£¡£ ¡£¡£Ã¿Öܶ©ÔÄ·ÑΪ150¬²¼£¬£¬£¬ £¬£¬£¬µ«Ò²ÓÐÓÐÏÞµÄÃâ·Ñ°æ±¾¡£¡£¡£¡£ ¡£¡£Ò»µ©×°Ö㬣¬£¬ £¬£¬£¬RAT¾Í»áÉñÃØÍøÂçÊý¾Ý£¬£¬£¬ £¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄTelegram bot¡£¡£¡£¡£ ¡£¡£ÎªÁËÈÆ¹ýɱ¶¾Èí¼þµÄ¼ì²â£¬£¬£¬ £¬£¬£¬RATͨ¹ýTelegram bot¾ÙÐÐC2¡£¡£¡£¡£ ¡£¡£³ýÁËÇÔÈ¡Êý¾ÝÖ®Í⣬£¬£¬ £¬£¬£¬QwixxRAT»¹ÓµÓÐǿʢµÄÔ¶³ÌÖÎÀí¹¤¾ß£¬£¬£¬ £¬£¬£¬¿É¿ØÖÆÄ¿µÄ×°±¸ºÍÆô¶¯ÏÂÁî¡£¡£¡£¡£ ¡£¡£


https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram