ÃÀ¹úPurFoodsÔâµ½ÀÕË÷¹¥»÷Ô¼120ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-08-301¡¢ÃÀ¹úPurFoodsÔâµ½ÀÕË÷¹¥»÷Ô¼120ÍòÓû§µÄÐÅϢй¶
¾ÝýÌå8ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹ú²ÍÒû¹«Ë¾PurFoods¶ÁËÒ»ÆðÓ°ÏìÁè¼Ý120ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬ËüÓÚ2ÔÂ22ÈÕ·¢Ã÷ÆäÍøÂçÉϵĿÉÒɻ¡£¡£¡£¡£ÊÓ²ìÈ·¶¨£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÓÚ1ÔÂ16ÈÕÖÁ2ÔÂ22ÈÕ£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÎļþ±»¼ÓÃÜ¡£¡£¡£¡£ÉîÈëÊÓ²ìÓÚ7ÔÂ10ÈÕ¿¢Ê£¬£¬£¬£¬£¬·¢Ã÷ºÚ¿Í»á¼ûÁ˼ÝÕÕ¡¢Éí·ÝÖ¤ºÅ¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢ºÍÖÎÁÆÐÅÏ¢µÈÊý¾Ý¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ӰÏìÁ˿ͻ§¡¢Ô±¹¤ÒÔ¼°×ÔÁ¦³Ð°üÉÌ£¬£¬£¬£¬£¬Éæ¼°1237681ÈË£¬£¬£¬£¬£¬PurFoods½«Í¨¹ýKrollΪËûÃÇÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£
https://therecord.media/purfoods-delivery-service-reports-data-breach
2¡¢¶à¹úÁªºÏÖ´·¨Ðж¯Duck Huntµ·»Ù½©Ê¬ÍøÂçQakbot
SymantecÔÚ8ÔÂ30Èճƣ¬£¬£¬£¬£¬Ö´·¨Ðж¯Duck HuntÀֳɵ·»ÙÁ˽©Ê¬ÍøÂçQakbot¡£¡£¡£¡£¸ÃÐж¯ÓÉÃÀ¹úÁª°îÊÓ²ì¾ÖºÍ˾·¨²¿Ç£Í·£¬£¬£¬£¬£¬ÒÔ¼°·¨¹ú¡¢µÂ¹ú¡¢ºÉÀ¼¡¢Ó¢¹ú¡¢ÂÞÂíÄáÑǺÍÀÍÑάÑǵȹú¼ÓÈë¡£¡£¡£¡£Ö´·¨Ö°Ô±ÒÑ´ÓÁè¼Ý70Íǫ̀±»Ñ¬È¾µÄÅÌËã»úÖÐɾ³ýÁËQakbot¶ñÒâÈí¼þ£¬£¬£¬£¬£¬²¢²é»ñÁ˼ÛÖµ860ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£QakbotÊÇÔËÐÐʱ¼ä×µÄ½©Ê¬ÍøÂçÖ®Ò»£¬£¬£¬£¬£¬ÓÚ2007ÄêÊ״ηºÆð£¬£¬£¬£¬£¬½öÔÚÒÑÍù18¸öÔ¾ÍÒÑÔì³ÉÁËÁè¼Ý5800ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/qakbot-takedown-disruption
3¡¢¿ÕÖн»Í¨¹ÜÖÆÏµÍ³å´»úµ¼ÖÂÓ¢¹úº½°à´óÃæ»ý×÷·ÏºÍÑÓÎó
¾Ý8ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ó¢¹ú¿ÕÖн»Í¨¹ÜÖÆÏµÍ³å´»ú£¬£¬£¬£¬£¬ÊýÊ®ÍòÓο͵ÄÐгÌÊܵ½Ó°Ïì¡£¡£¡£¡£¹ú¼Ò¿ÕÖн»Í¨¹ÜÖÆÌṩÉÌNATS³ÆËüÓöµ½ÁË¡°ÊÖÒÕÎÊÌ⡱£¬£¬£¬£¬£¬²¢ÊµÑéÁ˽»Í¨Á÷Á¿ÏÞÖÆÒÔά»¤Çå¾²¡£¡£¡£¡£¸ÃÎÊÌâµ¼ÖÂÓ¢¹ú¸÷µØº½°à´óÃæ»ýÑÓÎóºÍ×÷·Ï£¬£¬£¬£¬£¬»¹¶ÔÕû¸öÅ·Ö޵ĺ½°à±¬·¢ÁËÁ¬Ëø·´Ó¦£¬£¬£¬£¬£¬Ò»Ð©º½¿Õ¹«Ë¾×÷·ÏÁËÍù·µÓ¢¹úµÄº½°à¡£¡£¡£¡£NATSÒѾʹ˴ÎÖÐÖ¹ÊÂÎñÖÂǸ£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÆð¾¢ÒÔ¾¡¿ì½â¾öÎÊÌâ¡£¡£¡£¡£
https://www.hackread.com/uk-air-traffic-control-system-collapses-travel-chaos/
4¡¢Sophos³ÆÊ¹ÓÃÎó²îCVE-2023-3519µÄ¹¥»÷ÓëFIN8ÓйØ
8ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÓëFIN8Ïà¹ØµÄ¹¥»÷ÕßʹÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-3519£©¹¥»÷Citrix NetScaler¡£¡£¡£¡£8ÔÂ2ÈÕ£¬£¬£¬£¬£¬Óб¨¸æ³ÆÔÚCitrixЧÀÍÆ÷Öз¢Ã÷ÁË640¸öWebshell£¬£¬£¬£¬£¬Á½Öܺ󣬣¬£¬£¬£¬ÕâÒ»Êý×ÖÔöÌíµ½1952¸ö¡£¡£¡£¡£Sophos³Æ£¬£¬£¬£¬£¬STAC4663ÕýÔÚʹÓøÃÎó²î£¬£¬£¬£¬£¬²¢ÒÔΪÕâÊDZ¾ÔÂÔçЩʱ¼ä±¨µÀµÄͳһ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£SophosÍÆ¶Ï£¬£¬£¬£¬£¬¸Ã»î¶¯ÓëFIN8ÓÐÒ»¶¨¹ØÁª£¬£¬£¬£¬£¬ÕâÒ»ÍÆ¶Ï»ùÓÚÓòÃûµÄÕì̽¡¢plink¡¢BlueVPSÍйܡ¢²»Ñ°³£µÄPowerShell¾ç±¾ºÍPuTTYÇå¾²¸´ÖÆ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/attacks-on-citrix-netscaler-systems-linked-to-ransomware-actor/
5¡¢Ñо¿Ö°Ô±·¢Ã÷¿ÉÒÔͨ¹ýSkypeÓ¦ÓÃÈ·¶¨Ä¿µÄµÄIPµØµã
ýÌå8ÔÂ28Èճƣ¬£¬£¬£¬£¬Ñо¿Ö°Ô±Yossi·¢Ã÷¿ÉÒÔͨ¹ýSkypeÒÆ¶¯Ó¦Ó÷¢ËÍÁ´½ÓÀ´»ñȡĿµÄµÄIPµØµã¡£¡£¡£¡£¹¥»÷Ö»ÐèҪĿµÄ·¿ªÐÂÎż´¿É£¬£¬£¬£¬£¬²»ÐèÒªµã»÷Á´½Ó»òÒÔÆäËü·½·¨Óë¹¥»÷Õß½»»¥¡£¡£¡£¡£YossiÓÚ±¾Ô³õÏò΢Èí±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬£¬µ«Î¢Èí×î³õµ»¯Á˸ÃÎÊÌ⣬£¬£¬£¬£¬²¢Ã»ÓÐÌåÏÖ½«ÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£Çå¾²¼ÇÕß²âÊÔ·¢Ã÷£¬£¬£¬£¬£¬µ±Ê¹ÓÃVPNÅþÁ¬µ½Skypeʱ£¬£¬£¬£¬£¬ÒÔ¼°ÔÚ²»Ê¹ÓÃVPNµÄÇéÐÎÏÂÅþÁ¬µ½¹«¹²Wi-FiÍøÂçʱ£¬£¬£¬£¬£¬¸ÃÊÖÒÕ¶¼ÓÐÓᣡ£¡£¡£ÔÙ´ÎÁªÏµÎ¢Èíºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖÍýÏëÔÚ¼´½«Ðû²¼µÄ¸üÐÂÖнâ¾ö¸ÃÎÊÌâ
https://securityaffairs.com/150000/hacking/grabbing-ip-addr-via-skype-mobile-app.html
6¡¢Trend MicroÐû²¼ÐÂAndroid¶ñÒâÈí¼þMMRatµÄÆÊÎö±¨¸æ
8ÔÂ29ÈÕ£¬£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚеÄAndroid¶ñÒâÈí¼þMMRatµÄÆÊÎö±¨¸æ¡£¡£¡£¡£MMRatÓÚ6ÔÂÏÂÑ®Ê״α»·¢Ã÷£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¶«ÄÏÑǵØÇø£¬£¬£¬£¬£¬²¢ÇÒÔÚVirusTotalµÈɱ¶¾É¨ÃèЧÀÍÖÐÈÔδ±»·¢Ã÷¡£¡£¡£¡£Ëü¿ÉÒÔÇÔÈ¡Óû§ÊäÈëºÍÆÁÄ»ÄÚÈÝ£¬£¬£¬£¬£¬»¹¿ÉÒÔͨ¹ýÖÖÖÖÊÖÒÕÔ¶³Ì¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬£¬£¬²¢Ö´ÐÐÒøÐÐڲơ£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÁË»ùÓÚÐÒ黺³åÇø£¨ÓÖÃûProtobuf£©µÄÌØÊâϵ½ç˵C&CÐÒ飬£¬£¬£¬£¬¿ÉÌá¸ßÆäÔÚ´«Êä´ó×ÚÊý¾ÝʱµÄÐÔÄÜ¡£¡£¡£¡£Éв»È·¶¨¶ñÒâÈí¼þ×î³õÊÇÔõÑùÈö²¥µÄ£¬£¬£¬£¬£¬µ«ËüÊÇͨ¹ýαװ³É¹Ù·½Ó¦ÓÃÊÐËÁµÄÍøÕ¾·Ö·¢µÄ¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/h/mmrat-carries-out-bank-fraud-via-fake-app-stores.html