Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈЧÀÍÔݲ»¿ÉÓÃ

Ðû²¼Ê±¼ä 2023-09-13

1¡¢Ã׸ß÷Ôâµ½¹¥»÷µ¼ÖÂÆäÍøÕ¾ºÍATM»úµÈЧÀÍÔݲ»¿ÉÓÃ


¾ÝýÌå9ÔÂ12ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬Ã׸ß÷¹ú¼ÊÂùݼ¯ÍÅ(MGM Resorts International)͸¶ÆäÕýÔÚ´¦Öóͷ£Ó°Ï첿·ÖϵͳµÄÍøÂçÇå¾²ÎÊÌâ¡£ ¡£¡£¶È¼Ù´åµÄϵͳ×ÔÉÏÖÜÈÕÍíÉÏ×îÏÈ¹Ø±Õ £¬£¬£¬£¬£¬£¬ËùÓÐʹÓÃÓëÖ÷ÍøÕ¾ÏàͬÓòÃû£¨¼´mgmresorts.com£©µÄÍøÕ¾ÒÑÖÐÖ¹ £¬£¬£¬£¬£¬£¬MGM RewardsÓ¦ÓóÌÐòÎÞ·¨ÔËÐС£ ¡£¡£ÀÏ»¢»ú¡¢ATM»úºÍÐÅÓÿ¨×°±¸¶¼Êܵ½ÁËÓ°Ïì £¬£¬£¬£¬£¬£¬Ò»Ð©¿ÍÈË»¹³Æ·¿¼äÔ¿³×ÎÞ·¨Ê¹Óᣠ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬Ã׸ß÷ÆìÏÂÂùݣ¨°üÀ¨Bellagio Hotel£©µÄϵͳҲ·ºÆð¹ÊÕÏ¡£ ¡£¡£´Ë´ÎÇå¾²ÊÂÎñµÄÐÔ×ÓÉÐδ¹ûÕæ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄÈÔ²»Ã÷È·¡£ ¡£¡£


https://therecord.media/mgm-resorts-offline-after-cyberattack


2¡¢Î¢ÈíÐû²¼9Ô·ÝÇå¾²¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓõÄÎó²î


΢ÈíÔÚ9ÔÂ12ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡ £¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË59¸öÎó²î £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Á½¸öÒѱ»Ê¹ÓõÄÎó²î¡£ ¡£¡£±»Ê¹ÓÃÎó²î»®·ÖÊÇMicrosoftÁ÷ЧÀÍÊðÀíÌáȨÎó²î£¨CVE-2023-36802£©ºÍMicrosoft WordÐÅϢй¶Îó²î£¨CVE-2023-36761£©¡£ ¡£¡£´Ë´ÎÐÞ¸´µÄÆäËü½ÏΪÑÏÖØµÄÎó²îÊÇVisual StudioÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-36796¡¢CVE-2023-36792ºÍCVE-2023-36793£©¡¢Microsoft Azure KubernetesЧÀÍÌáȨÎó²î£¨CVE-2023-29332£©ºÍInternetÅþÁ¬¹²Ïí(ICS)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-38148£©¡£ ¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2023-patch-tuesday-fixes-2-zero-days-59-flaws/


3¡¢ÀÕË÷ÍÅ»ïSnatch¹ûÕæ¼ÓÄôó»¤Ê¿Ð­»áµÄ37 GBÊý¾Ý


¾Ý9ÔÂ12ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬¼ÓÄôó»¤Ê¿Ð­»á(CNA)͸¶ÆäÔâµ½ºÚ¿Í¹¥»÷µ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£ ¡£¡£¸ÃЭ»á´ú±íÁ˼ÓÄôó½ü50ÍòÃû»¤Ê¿ £¬£¬£¬£¬£¬£¬Æä½²»°È˳Ƹûú¹¹ÔÚ4ÔÂ3ÈÕÔâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬²¢Î´Ó°ÏìÆäÔËÓª £¬£¬£¬£¬£¬£¬Ö»ÊÇÓ°ÏìÁ˲¿·Öϵͳ¡£ ¡£¡£Á½¸ö²î±ðµÄÀÕË÷ÍÅ»ïSnatchºÍNokoyawaÉù³Æ¶Ô5Ô·ݵĹ¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬µ«ÔÚ9ÔÂ1ÈÕ £¬£¬£¬£¬£¬£¬Snatchй¶ÁËÀ´×ÔCNAµÄ37 GBÊý¾Ý¡£ ¡£¡£Snatch×î½ü»¹Éù³Æ¹¥»÷ÁËÄϷǹú·À²¿²¢ÇÔÈ¡ÁË1.6 TBÊý¾Ý £¬£¬£¬£¬£¬£¬µ«¶à¼ÒýÌå֤ʵ £¬£¬£¬£¬£¬£¬Snatchй¶µÄÊý¾ÝÖÐÖÁÉÙÓÐÒ»²¿·ÖÊÇÕýµ±µÄ¡£ ¡£¡£


https://therecord.media/cna-confirms-data-incident


4¡¢Charming KittenʹÓúóÃÅSponsor¹¥»÷ÖÁÉÙ34¼Ò¹«Ë¾


9ÔÂ11ÈÕ £¬£¬£¬£¬£¬£¬ESETÅû¶ÁËCharming KittenʹÓÃкóÃÅSponsorµÄ¹¥»÷»î¶¯Sponsoring Access¡£ ¡£¡£¸Ã»î¶¯µÄÒ»Á¬Ê±¼äΪ2021Äê3ÔÂÖÁ2022Äê6Ô £¬£¬£¬£¬£¬£¬Õë¶ÔÕþ¸®ºÍÒ½ÁƱ£½¡»ú¹¹ £¬£¬£¬£¬£¬£¬ÒÔ¼°½ðÈÚЧÀÍ¡¢¹¤³Ì¡¢ÖÆÔì¡¢ÊÖÒÕ¡¢Ö´·¨ºÍµçÐŵÈÁìÓòµÄ¹«Ë¾ £¬£¬£¬£¬£¬£¬ÏÖÔÚÒѹ¥»÷°ÍÎ÷¡¢ÒÔÉ«ÁкͰ¢À­²®ÁªºÏÇõ³¤¹úµÄÖÁÉÙ34¼Ò¹«Ë¾¡£ ¡£¡£¹¥»÷ÕßʹÓÃMicrosoft Exchange RCEÎó²î£¨CVE-2021-26855£©»ñµÃ³õʼ»á¼ûȨÏÞ¡£ ¡£¡£SponsorÊÇÒ»¸öC++ºóÃÅ £¬£¬£¬£¬£¬£¬ÓÃÓÚÍøÂçÖ÷»úÐÅÏ¢ £¬£¬£¬£¬£¬£¬´¦Öóͷ£ÎüÊÕµ½µÄÖ¸Áî²¢½«Ð§¹û·¢ËÍ»ØÐ§ÀÍÆ÷¡£ ¡£¡£


https://www.welivesecurity.com/en/eset-research/sponsor-batch-filed-whiskers-ballistic-bobcats-scan-strike-backdoor/


5¡¢Ñо¿Ö°Ô±·¢Ã÷¿Éͨ¹ýWiFiÇÔÈ¡Êý×ÖÃÜÂëµÄWiKI-Eve¹¥»÷


ýÌå9ÔÂ11ÈÕ³Æ £¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪWiKI-EveµÄÐÂÐ͹¥»÷¿ÉÒÔ×èµ²ÅþÁ¬µ½WiFi·ÓÉÆ÷µÄÖÇÄÜÊÖ»úµÄÃ÷ÎÄ´«Êä £¬£¬£¬£¬£¬£¬²¢ÒԸߴï90%µÄ׼ȷÂÊÍÆ¶Ï³öµ¥¸öÊý×Ö»÷¼ü £¬£¬£¬£¬£¬£¬À´ÇÔÈ¡Êý×ÖÃÜÂë¡£ ¡£¡£ÔÚ¹¥»÷µÄÖ÷Òª½×¶Î £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃWiresharkµÈÁ÷Á¿¼à¿Ø¹¤¾ß²¶»ñÄ¿µÄÊäÈëÃÜÂëʱ´úµÄBFI£¨²¨Êø³ÉÐη´ÏìÐÅÏ¢£©Ê±¼äÐòÁС£ ¡£¡£Ã¿´ÎÄ¿µÄ°´Ï°´¼üʱ £¬£¬£¬£¬£¬£¬¶¼»áÌìÉúÆæÒìµÄWiFiÐźÅ¡£ ¡£¡£¼Í¼µÄBFIÐòÁпÉÄÜ»áÄ£ºý»÷¼üÖ®¼äµÄ½çÏß £¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖËã·¨ £¬£¬£¬£¬£¬£¬ÓÃÓÚÆÊÎöºÍ»Ö¸´¿ÉÓÃÊý¾Ý¡£ ¡£¡£ÊµÑéÅú×¢ £¬£¬£¬£¬£¬£¬ÔÚʹÓÃÏ£º±»Ö¸´Ëã·¨ºÍÓò×Ô˳ӦµÄÇéÐÎÏ £¬£¬£¬£¬£¬£¬WiKI-EveµÄ»÷¼ü·ÖÀàµÄ׼ȷÂÊÎȹÌÔÚ88.9%¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-wiki-eve-attack-can-steal-numerical-passwords-over-wifi/


6¡¢KasperskyÐû²¼¹ØÓÚCubaÍÅ»ïÀúÊ·¼°TTPsµÄÆÊÎö±¨¸æ


9ÔÂ11ÈÕ £¬£¬£¬£¬£¬£¬KasperskyÐû²¼¹ØÓÚCubaÍÅ»ïÀúÊ·¼°TTPsµÄÆÊÎö±¨¸æ¡£ ¡£¡£CubaÓÚ2020Äêµ×Ê×´ÎÒýÆðÑо¿Ö°Ô±µÄ×¢ÖØ £¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢¼ÓÄôóºÍÅ·ÖÞ¡£ ¡£¡£¸ÃÍÅ»ïʹÓõĶñÒâÈí¼þ°üÀ¨Bughatch¡¢Burntcigar¡¢Cobeacon¡¢Hancitor (Chanitor)¡¢Termite¡¢SystemBC¡¢Veeamp¡¢WedgecutºÍRomCOM RAT £¬£¬£¬£¬£¬£¬¹¤¾ß°üÀ¨Mimikatz¡¢PowerShell¡¢PsExecºÍRemote Desktop Protocol £¬£¬£¬£¬£¬£¬Ê¹ÓõÄÎó²î°üÀ¨ProxyShell¡¢ProxyLogon¡¢VeeamÎó²îºÍZeroLogon¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹°üÀ¨ÁËCubaÏà¹ØÊÂÎñµÄÊӲ켰¶ñÒâÈí¼þµÄÆÊÎö¡£ ¡£¡£


https://securelist.com/cuba-ransomware/110533/