INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

Ðû²¼Ê±¼ä 2023-10-09

1¡¢INC³ÆÒÑÇÔÈ¡ÃÀ¹úFLRAµÄ29 GBÎļþ²¢ÀÕË÷70ÍòÃÀÔª

¾Ý10ÔÂ6ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬INC RansomwareÉù³ÆÈëÇÖÁËÃÀ¹úÁª°îÀͶ¯¹ØÏµ¾Ö£¨FLRA£©¡£¡£¡£¡£¡£¡£¡£INCÔÚ9ÔÂ20ÈÕ½«FLRAÌí¼Óµ½ÆäÍøÕ¾ÉÏ £¬£¬£¬£¬£¬£¬²¢ÌṩÁË6ÕÅÎļþͼÏñ×÷Ϊ֤¾Ý¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ9ÔÂ24ÈÕºÍ10ÔÂ3ÈÕͨ¹ýÓʼþÁªÏµÁËFLRA £¬£¬£¬£¬£¬£¬¾ùδÊÕµ½»ØÓ¦¡£¡£¡£¡£¡£¡£¡£INCûÓÐÊ״λá¼ûFLRAµÄʱ¼ä»ò·½·¨ £¬£¬£¬£¬£¬£¬µ«È·ÈÏ8ÔÂ26ÈÕÊÇÊý¾Ýй¶×îÏȵÄʱ¼ä £¬£¬£¬£¬£¬£¬ËûÃÇÒÑ»ñÈ¡29 GBÎļþ¡£¡£¡£¡£¡£¡£¡£INC½²»°ÈË»¹³ÆÒÑÁôÁËÊê½ðÌõÒªÇó70ÍòÃÀÔª £¬£¬£¬£¬£¬£¬µ«FLRA´Óδ¶Ô´Ë×ö³öÈκλØÓ¦¡£¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/inc-ransomware-claims-to-have-hit-federal-labor-relations-authority/


2¡¢Ñо¿Ö°Ô±·¢Ã÷´ó×ÚAndroidµçÊÓºÐÖаüÀ¨¶ñÒâÈí¼þ


¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬´ó×ÚÁ®¼ÛAndroidµçÊÓºÐÖаüÀ¨ºóÃÅ¡£¡£¡£¡£¡£¡£¡£HUMAN³ÆÆä´ÓÔÚÏßÁãÊÛÉÌ´¦¹ºÖõÄ×°±¸ÖÐ £¬£¬£¬£¬£¬£¬80%¶¼Ñ¬È¾ÁËBADBOX¡£¡£¡£¡£¡£¡£¡£BadboxԤװÔÚAndroidµçÊÓºÐÖÐ £¬£¬£¬£¬£¬£¬×°±¸²åÈëºó £¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÓë¹¥»÷ÕßµÄC2ЧÀÍÆ÷ÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Ëü»¹¿ÉÖ´ÐÐ¹ã¸æÚ²Æ­¡¢½¨ÉèÐéαWhatsAppºÍGmailÕË»§¡¢³öÊÛ¼ÒÍ¥ÍøÂç»á¼ûȨÏÞÒÔ¼°×°ÖÃÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¡£È«ÇòÖÁÉÙÓÐ74000²¿»ùÓÚAndroidµÄ×°±¸Ñ¬È¾ÁËBADBOX¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÒ»ÖÖ¶ñÒâÈí¼þPEACHPIT £¬£¬£¬£¬£¬£¬ËüÊÇBadboxµÄ¹ã¸æÚ²Æ­×é¼þ £¬£¬£¬£¬£¬£¬¿ÉÒÔÔÚAndroidºÍiOS×°±¸ºÍÓ¦ÓÃÉÏÆô¶¯ÓÕÆ­ÐÔÍøÂçÁ÷Á¿¡¢Òþ²Ø¹ã¸æºÍ¶ñÒâ¹ã¸æ¡£¡£¡£¡£¡£¡£¡£


https://www.hackread.com/android-tv-boxes-backdoors-home-networks/


3¡¢Atlassian ConfluenceÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-22515


AtlassianÔÚ10ÔÂ4ÈÕÐÞ¸´ÁËConfluenceÊý¾ÝÖÐÐĺÍЧÀÍÆ÷ÖеĻá¼û¿ØÖÆÎó²î£¨CVE-2023-22515£©¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î £¬£¬£¬£¬£¬£¬À´½¨Éèδ¾­ÊÚȨµÄConfluenceÖÎÀíÔ±ÕÊ»§²¢»á¼ûЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ëü²»»áÓ°Ïì8.0.0֮ǰµÄConfluence°æ±¾ £¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýatlassian.netÓò»á¼ûµÄConfluenceÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Atlassian³Æ¸ÃÎó²îÒѱ»ÔÚҰʹÓà £¬£¬£¬£¬£¬£¬µ«Ã»ÓÐ͸¶¹¥»÷ÐÔ×Ó¡¢¹æÄ£»£»£»£»£»£»£»òÎó²îµÄ»ù´¡Ôµ¹ÊÔ­ÓɵȽøÒ»²½Ï¸½Ú¡£¡£¡£¡£¡£¡£¡£½¨Òé¿Í»§Á¬Ã¦¸üР£¬£¬£¬£¬£¬£¬ÎÞ·¨Ó¦ÓøüеĿͻ§Ó¦ÏÞÖÆ¶ÔÊÜÓ°ÏìʵÀýµÄÍⲿ»á¼û¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/10/atlassian-confluence-hit-by-newly.html


4¡¢ÒòÊê½ð̸ÅÐÆÆËéLockBitÍýÏë¹ûÕæIT¹«Ë¾CDWµÄÊý¾Ý


ýÌå10ÔÂ6ÈÕ³Æ £¬£¬£¬£¬£¬£¬ÒòÊê½ð̸ÅÐÆÆËé £¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÍýÏë¹ûÕæ´ÓIT¹«Ë¾CDWÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÃûΪLockBitSuppµÄ½²»°ÈËÌåÏÖ £¬£¬£¬£¬£¬£¬ÔÚ̸ÅÐʱ´úCDW¸ø³öµÄ½ð¶îÌ«µÍ £¬£¬£¬£¬£¬£¬¼òÖ±ÊÇ¶ÔÆ­×ÓµÄÎêÈè¡£¡£¡£¡£¡£¡£¡£ËûÃǾܾøÁËÕâ¸öÃýÍýµÄ½ð¶î £¬£¬£¬£¬£¬£¬²¢¾öÒé¹ûÕæÎļþ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤LockBitÍøÕ¾Éϵĵ¹¼ÆÊ± £¬£¬£¬£¬£¬£¬CDWµÄÎļþ½«ÓÚ10ÔÂ11ÈÕÆÆÏþÐû²¼¡£¡£¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñ×îÏÈÓÚ9ÔÂ3ÈÕ £¬£¬£¬£¬£¬£¬Æäʱ¸Ã¹«Ë¾Ê״α»Ìí¼Óµ½LockBitµÄÍøÕ¾ÉÏ £¬£¬£¬£¬£¬£¬¶øCDWÈÔδ¶ÔÕâÒ»ÊÂÎñ½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2023/10/06/cdw_lockbit_negotiations/


5¡¢TrendMicroÅû¶ÔÚÓ¦ÓúʹúÂë¿âÖ²Èë¶ñÒâ´úÂëµÄÒªÁì


10ÔÂ5ÈÕ £¬£¬£¬£¬£¬£¬Trend MicroÐû²¼±¨¸æ £¬£¬£¬£¬£¬£¬ÉîÈëÑо¿Á˹¥»÷ÕßÔÚ¿´ËÆÕýµ±µÄÓ¦ÓóÌÐòºÍ´úÂë¿âÖÐÖ²Èë¶ñÒâpayloadµÄÅÓ¸ÅÂÔÁì¡£¡£¡£¡£¡£¡£¡£¹©Ó¦Á´¹¥»÷µÄÐËÆð³ÉÎªÍøÂçÇå¾²ÁìÓòµÄÒ»¸öÒªº¦ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿ª·¢Ö°Ô±ÒÀÀµµÚÈý·½×é¼þÀ´¼ò»¯¿ª·¢Á÷³Ì £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÒÔͨ¹ýÕë¶Ô¹©Ó¦Á´ÖÐÇå¾²ÐԽϵ͵ÄÔªÏòÀ´¼ä½ÓÈëÇÖϵͳ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁ˹¥»÷Õ߿ˡÕýµ±GitHub´æ´¢¿â£¨ÈçBinance-trading-bot¡¢crypto-clipperºÍÆäËüÓÃPython3¿ª·¢µÄ³ÌÐò£© £¬£¬£¬£¬£¬£¬È»ºóÓöñÒâ´úÂë¶ÔÆä¾ÙÐÐľÂí»¯ºÍѬȾµÄ°¸ÀýÑо¿¡£¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/j/infection-techniques-across-supply-chains-and-codebases.html


6¡¢MicrosoftÐû²¼¹ØÓÚ2023ÄêÊý×Ö·ÀÓùµÄÆÊÎö±¨¸æ


10ÔÂ5ÈÕ±¨µÀ³Æ £¬£¬£¬£¬£¬£¬MicrosoftÐû²¼ÁË2023ÄêÊý×Ö·ÀÓùµÄÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬ÆÊÎöÁË2022Äê7ÔÂÖÁ2023Äê6ÔÂʱ´úµÄÇå¾²Ç÷ÊÆ¡£¡£¡£¡£¡£¡£¡£×Ô2022Äê9ÔÂÒÔÀ´ £¬£¬£¬£¬£¬£¬ÊÖ¶¯Ö´ÐеÄÀÕË÷¹¥»÷ÔöÌíÁË200%ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£×Ô2022Äê11ÔÂÒÔÀ´ £¬£¬£¬£¬£¬£¬Éæ¼°Êý¾Ýй¶µÄ¹¥»÷ÊýÄ¿ÔöÌíÁËÒ»±¶¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÀÕË÷¹¥»÷²¢Î´ÀֳɼÓÃÜÈκÎÄÚÈÝ £¬£¬£¬£¬£¬£¬Ö»ÓÐ2%µÄ¹¥»÷Àֳɰ²ÅÅÁËÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼¹¥»÷¿ÉÒÔ×·Ëݵ½3¸öµã£ºÆÆËðÍⲿԶ³ÌЧÀÍ¡¢Ê¹ÓÃÓÐÓÃÕÊ»§ºÍÈëÇÖÃæÏò¹«ÖÚµÄÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¡£½üÈý·ÖÖ®¶þµÄ¹¥»÷¿É×·Ëݵ½4¸öÀÕË÷ÍŻMagniber¡¢LockBit¡¢HiveºÍBlackCat¡£¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023