Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶
Ðû²¼Ê±¼ä 2023-09-151¡¢Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶
¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Èí¼þBug¸ú×Ù¹«Ë¾RollbarµÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£¡£¡£¡£RollbarÓÚ9ÔÂ6ÈÕÔÚÉó²éÊý¾Ý¿âÈÕ־ʱ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬£¬£¬£¬£¬£¬¸ÃÈÕÖ¾ÏÔʾЧÀÍÕÊ»§±»ÓÃÀ´µÇ¼»ùÓÚÔÆµÄBug¼à¿ØÆ½Ì¨¡£¡£¡£¡£¡£ºóÐøÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ8ÔÂ9ÈÕÖÁ8ÔÂ11ÈÕ»á¼ûÁËÆäϵͳ£¬£¬£¬£¬£¬£¬Éæ¼°Ãô¸ÐµÄ¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÀýÈçÓû§Ãû¡¢ÓʼþµØµã¡¢ÕÊ»§ÃûºÍÏîÄ¿ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸üÖ÷ÒªµÄÊÇ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹¼ìË÷Á˿ͻ§ÓëRollbarÏîÄ¿½»»¥µÄÏîÄ¿»á¼ûÁîÅÆ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rollbar-discloses-data-breach-after-hackers-stole-access-tokens/
2¡¢Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯¾Ö(GMP)͸¶²¿·ÖÔ±¹¤µÄÐÅϢй¶
ýÌå9ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯Ô±¾Ö(GMP)²¿·ÖÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÊǵÚÈý·½¹©Ó¦ÉÌÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£Ðû²¼µÄÉùÃ÷ÖÐδÌá¼°±»¹¥»÷¹«Ë¾µÄÃû³Æ£¬£¬£¬£¬£¬£¬µ«ËüÊÇGMPµÈÓ¢¹úÆäËü»ú¹¹µÄЧÀ͹©Ó¦ÉÌ¡£¡£¡£¡£¡£GMP³ÆÔ±¹¤µÄ²ÆÎñÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£¡£¡£¡£Ô¼Ò»¸öÔÂǰ£¬£¬£¬£¬£¬£¬±±°®¶ûÀ¼¾¯¾Ö(PSNI)Ò²±¬·¢ÁËÒ»ÆðÀàËÆµÄÊÂÎñ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁË10000¶àÃû¾¯Ô±µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡¢¾üÏκÍλÖᣡ£¡£¡£¡£
https://securityaffairs.com/150828/data-breach/greater-manchester-police-gmp-data-breach.html
3¡¢SymantecÔÚ×°ÖÃLockBitʧ°ÜµÄ¹¥»÷Öз¢Ã÷еÄ3AM
9ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Symantec³ÆÆä·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þ3AM¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬Ê¹ÓÃ3AMµÄ¹¥»÷»î¶¯ºÜÉÙ¼û£¬£¬£¬£¬£¬£¬Æù½ñΪֹ½öÔÚ¹¥»÷ÕßδÄÜ×°ÖÃLockBitµÄÒ»´Î¹¥»÷»î¶¯Öз¢Ã÷¹ý¸Ã¶ñÒâÈí¼þµÄ·Ö·¢¡£¡£¡£¡£¡£3AMÓÉRust¿ª·¢£¬£¬£¬£¬£¬£¬ÔÚ×îÏȼÓÃÜ֮ǰ£¬£¬£¬£¬£¬£¬Ëü»áʵÑé×èÖ¹¶à¸öЧÀÍ£¬£¬£¬£¬£¬£¬Íê³É¼ÓÃܺó»áɾ³ý¾íÓ°(VSS)¸±±¾¡£¡£¡£¡£¡£ÆäΪ¼ÓÃÜÎļþ¸½¼ÓµÄÀ©Õ¹ÃûÊÇ.Threeamtime£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÉÐδȷ¶¨3AM±³ºóµÄ¹¥»÷ÕßÊÇ·ñÓëÒÑÖªµÄ¹¥»÷ÍÅ»ïÓйØÁª¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit
4¡¢TrendMicroÏêÊöRedLineºÍVidarÊÇÔõÑùʹÓÃEVÖ¤Êé
TrendMicroÔÚ9ÔÂ13ÈÕÏêÊöÁËRedLineºÍVidarµÄ¹¥»÷ÕßÔõÑùʹÓôøÓÐÀ©Õ¹ÑéÖ¤(EV)´úÂëÊðÃûµÄÖ¤Êé¡£¡£¡£¡£¡£×îÐÂÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬RedLineºÍVidar±³ºóµÄ¹¥»÷Õß×îÏÈʹÓÃÓëÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐòÏàͬµÄ·½·¨À´·Ö·¢ÀÕË÷Èí¼þpayload¡£¡£¡£¡£¡£ÔÚÕâÒ»ÌØÊâ°¸ÀýÖУ¬£¬£¬£¬£¬£¬Ä¿µÄ×î³õÊÕµ½µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´øÓÐÀ©Õ¹ÑéÖ¤£¨EV£©´úÂëÊðÃûÖ¤Ê飬£¬£¬£¬£¬£¬²»¾ÃºóËûÃÇ×îÏÈͨ¹ýͬÑùµÄ;¾¶ÊÕµ½ÁËÀÕË÷Èí¼þpayload¡£¡£¡£¡£¡£Ö»¹ÜCABFʵÑéÁ˸üÑÏ¿áµÄÇå¾²²½·¥£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÄÜÈö²¥Ê¹ÓÃEVÖ¤Êé¾ÙÐÐÊðÃûµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/i/redline-vidar-first-abuses-ev-certificates.html
5¡¢Î¢ÈíÌáÐÑStorm-0324½üÆÚʹÓÃMS TeamsµÄ´¹ÂÚ¹¥»÷
¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÌáÐÑÖ÷ÒªÓëÀÕË÷ÍÅ»ïÏàÖúµÄStorm-0324×î½üת¶øÊ¹ÓÃMicrosoft Teams´¹ÂÚ¹¥»÷À´ÈëÇÖÆóÒµÍøÂç¡£¡£¡£¡£¡£´Ó7Ô·Ý×îÏÈ£¬£¬£¬£¬£¬£¬Storm-0324±»·¢Ã÷ʹÓÃTeams·¢ËÍ´¹ÂÚÓÕ¶ü£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâSharePointÍйÜÎļþµÄÁ´½Ó¡£¡£¡£¡£¡£¹ØÓڴ˻£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï×îÓпÉÄÜÒÀÀµÓÚÃûΪTeamsPhisherµÄ¿ªÔ´¹¤¾ß¡£¡£¡£¡£¡£¸Ã¹¤¾ßÄܹ»Èƹý¶ÔÀ´×ÔÍⲿÓû§µÄ´«ÈëÎļþµÄÏÞÖÆ£¬£¬£¬£¬£¬£¬²¢ÏòTeamsÓû§·¢ËÍ´¹ÂÚ¸½¼þ¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖºÜÊÇÖØÊÓÕâЩ´¹Âڻ£¬£¬£¬£¬£¬£¬²¢ÍƳöÁ˶àÏîˢв½·¥£¬£¬£¬£¬£¬£¬ÒÔ¸üºÃµØ·ÀÓùÕâЩ¹¥»÷¡£¡£¡£¡£¡£
https://thehackernews.com/2023/09/microsoft-warns-of-new-phishing.html
6¡¢KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄ±¨¸æ
9ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄͳ¼Æ±¨¸æ¡£¡£¡£¡£¡£2023ÄêÉϰëÄ꣬£¬£¬£¬£¬£¬±»×èµ²¶ñÒ⹤¾ßµÄICSÅÌËã»ú±ÈÀý½Ï2022ÄêϰëÄêϽµÁË0.3¸ö°Ù·Öµã£¬£¬£¬£¬£¬£¬½µÖÁ34%¡£¡£¡£¡£¡£´ÓµØÀíλÖÃÀ´¿´£¬£¬£¬£¬£¬£¬·ÇÖÞÔâµ½¹¥»÷µÄICSÅÌËã»ú×î¶à£¨Õ¼±È40.3%£©£¬£¬£¬£¬£¬£¬¶ø±±Å·×îÉÙ£¨14.7%£©¡£¡£¡£¡£¡£¹¤³ÌºÍICS¼¯³É£¨ÔöÌí2%£©¡¢ÖÆÔ죨ÔöÌí1.9%£©ºÍÄÜÔ´£¨ÔöÌí1.5%£©ÁìÓòÔâµ½¹¥»÷µÄICSÅÌËã»úÓÐËùÔöÌí¡£¡£¡£¡£¡£»£»£»£»£»£»£»¥ÁªÍø¡¢µç×ÓÓʼþ¿Í»§¶ËºÍ¿ÉÒÆ¶¯×°±¸ÈÔÈ»ÊÇ×éÖ¯ÔËÓªÊÖÒÕ»ù´¡ÉèÊ©ÖÐÅÌËã»úµÄÖ÷ÒªÍþвȪԴ¡£¡£¡£¡£¡£
https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/110605/