S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼»áµÄϵͳ崻ú
Ðû²¼Ê±¼ä 2023-11-031¡¢S¨¹dwestfalen IT±»ºÚµ¼Öµ¹ú70¶à¸ö¶¼»áµÄϵͳ崻ú
¾ÝýÌå11ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ð§ÀÍÌṩÉÌS¨¹dwestfalen ITÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬µ¼Öµ¹ú70¶à¸ö¶¼»áµÄÊÐÕþϵͳ崻ú¡£¡£¡£¡£¡£¡£¡£±¾ÖÜÒ»£¬£¬£¬£¬£¬¸ÃЧÀÍÌṩÉ̵Äϵͳ±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâ¶ñÒâÈí¼þÈö²¥£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÖÐÖ¹ÁË70¶à¸ö¶¼»á¶ÔÆä»ù´¡ÉèÊ©µÄ»á¼û£¬£¬£¬£¬£¬Ö÷ÒªÓ°ÏìÁ˵¹úÎ÷²¿µÄ±±À³Òð-ÍþË¹ÌØ·¨Â×ÖÝ¡£¡£¡£¡£¡£¡£¡£¹¥»÷µ±Ì죬£¬£¬£¬£¬µÂ¹úÎý¸ùÊÐÕþ¸®×÷·ÏÁ˹«ÃñµÄÔ¤Ô¼£¬£¬£¬£¬£¬×èÖ¹±¾Öܶþ£¬£¬£¬£¬£¬¸ÃÊÐÕþ¸®µÄ´ó²¿·ÖÔÚÏßЧÀÍÈÔÎÞ·¨Ê¹Óᣡ£¡£¡£¡£¡£¡£Î¤Ã·¶û˹»ùÐ˺Ͳ¼¶ûɳÒÁµÂÊÐÕþ¸®µÄÍøÕ¾Ò²ÔÚÖÜÈý¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£µÂ¹ú¾¯·½ºÍÇå¾²»ú¹¹ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´¶¼»áÖÎÀí²¿·ÖµÄЧÀÍ¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/massive-cyberattack-hinders-services-in-germany
2¡¢Êý¾ÝÖÐÐÄÍ£µçµ¼ÖÂCloudflare¶à¸ö²úÆ·ÔÝʱÎÞ·¨Ê¹ÓÃ
¾Ý11ÔÂ2ÈÕ±¨µÀ£¬£¬£¬£¬£¬CloudflareÖÐÖ¹µ¼ÖÂÆäÐí¶à²úÆ·ÎÞ·¨Ê¹Óᣡ£¡£¡£¡£¡£¡£CloudflareÌåÏÖ£¬£¬£¬£¬£¬Õâ¸öÎÊÌâÓ°ÏìÁËËùÓÐÒÀÀµÆäAPI»ù´¡ÉèÊ©µÄЧÀÍ£¬£¬£¬£¬£¬°üÀ¨¿ØÖÆÃæ°å¡¢Cloudflare API¡¢LogpushºÍAlert Notification SystemµÈ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿Í»§ÔÚʵÑéµÇ¼ÕÊ»§²¢»á¼ûCloudflare¿ØÖÆÃæ°åʱ£¬£¬£¬£¬£¬»á¿´µ½¡°Code:10000¡±Éí·ÝÑéÖ¤¹ýʧºÍÄÚ²¿Ð§ÀÍÆ÷¹ýʧ¡£¡£¡£¡£¡£¡£¡£ÖÐÖ¹Á½Ð¡Ê±ºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬ÕâÊǶà¸öÊý¾ÝÖÐÐÄÍ£µçµ¼Öµġ£¡£¡£¡£¡£¡£¡£»ù´¡Ôµ¹ÊÔÓÉÊÇ·¢µç»ú¹ÊÕϵ¼ÖµÄÇøÓòÐÔµçÁ¦ÎÊÌ⣬£¬£¬£¬£¬Ôì³É×°±¸ÍÑ»ú¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬´ó²¿·ÖЧÀͶ¼Òѻָ´¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cloudflare-dashboard-and-apis-down-after-data-center-power-outage/
3¡¢Advarra¹«Ë¾Ôâµ½AlphVÀÕË÷¹¥»÷Áè¼Ý120 GBÊý¾Ýй¶
ýÌå11ÔÂ1Èճƣ¬£¬£¬£¬£¬Ò½ÁÆ×ۺϽâ¾ö¼Æ»®¹«Ë¾AdvarraÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÓÚ10ÔÂ25ÈÕ×óÓÒ£¬£¬£¬£¬£¬¹«Ë¾ÖÎÀíÖ°Ô±ÌåÏ־ܾø½»Êê½ð£¬£¬£¬£¬£¬Ò²²»Óë¹¥»÷Õß̸ÅС£¡£¡£¡£¡£¡£¡£10ÔÂ31ÈÕ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚAlphVÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾£¬£¬£¬£¬£¬Éù³ÆÒÑÇÔÈ¡ÁËÁè¼Ý120GBÊý¾Ý£¬£¬£¬£¬£¬Éæ¼°¿Í»§¡¢»¼ÕßÒÔ¼°Ô±¹¤¡£¡£¡£¡£¡£¡£¡£AdvarraÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷Ô´ÓÚÒ»ÃûÔ±¹¤µÄµç»°ºÅÂë±»µÁ£¬£¬£¬£¬£¬¹¥»÷Õß½è´Ë»á¼ûÁ˸ÃÔ±¹¤µÄһЩÕË»§£¬£¬£¬£¬£¬°üÀ¨LinkedInºÍÊÂÇéÕË»§¡£¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/exclusive-advarra-hacked-threat-actors-threatening-to-leak-data/
4¡¢VMware·¢Ã÷ÊýÊ®¸öÄÚºËÇý¶¯³ÌÐòÈÝÒ×Ôâµ½ÍøÂç¹¥»÷
VMware Carbon Black TAUÔÚ10ÔÂ31ÈÕ³ÆÆä·¢Ã÷ÁË34¸öÒ×±»¹¥»÷µÄÄÚºËÇý¶¯³ÌÐò£¨30¸öWDMºÍ4¸öWDF£©¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ6¸ö¿ÉÒÔÓÃÀ´»á¼ûÄÚºËÄڴ棬£¬£¬£¬£¬ËùÓÐÇý¶¯³ÌÐò¶¼¿É±»¾ßÓзÇϵͳȨÏ޵Ĺ¥»÷ÕßÓÃÓÚÍêÈ«¿ØÖÆ×°±¸¡£¡£¡£¡£¡£¡£¡£Í¨¹ýʹÓÃÕâЩÇý¶¯³ÌÐò£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ²Á³ý»ò¸ü¸Ä¹Ì¼þ£¬£¬£¬£¬£¬ÒÔ¼°ÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£ÕâЩÇý¶¯µÄ¿ª·¢Ö°Ô±ÒÑÓÚ2023Äê´º¼¾ÊÕµ½Í¨Öª£¬£¬£¬£¬£¬µ«Ö»ÓÐÁ½¼Ò¹«Ë¾ÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£¡£¡£VMwareÕë¶Ô¶à¸öÇý¶¯³ÌÐò¿ª·¢ÁËPoCÎó²î£¬£¬£¬£¬£¬ÒÔÑÝʾÔõÑùʹÓÃËüÃÇÀ´²Á³ý¹Ì¼þ»òÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
5¡¢Unit 42Ðû²¼¹ØÓÚTurlaµÄºóÃÅKazuarбäÌåµÄ±¨¸æ
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬Unit 42Ðû²¼Á˹ØÓÚTurlaºóÃÅKazuarµÄбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£KazuarÊÇÒ»¸ö.NETºóÃÅ£¬£¬£¬£¬£¬×÷ΪTurlaµÄµÚ¶þ½×¶ÎpayloadÓëÆäËü³£Óù¤¾ßÒ»ÆðʹÓᣡ£¡£¡£¡£¡£¡£ÔÚа汾ÖУ¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÖÖÖÖÖØ´óµÄ·´ÆÊÎöÊÖÒÕ£¬£¬£¬£¬£¬²¢Í¨¹ýÓÐÓõļÓÃܺͻìÏýÀ´±£»£»£»£»£»£»£»¤¶ñÒâÈí¼þ´úÂë¡£¡£¡£¡£¡£¡£¡£KazuarµÄй¦Ð§°üÀ¨£º¸üÖÜÈ«µÄϵͳÆÊÎö£¬£¬£¬£¬£¬ÇÔÈ¡ÔÆÓ¦ÓóÌÐòºÍÐźÅÐÂÎÅÓ¦ÓóÌÐò£¬£¬£¬£¬£¬Ö§³Ö45¸öÏÂÁ£¬£¬£¬£¬¹¥»÷Õ߿ɿªÆô/¹Ø±ÕһϵÁÐ×Ô¶¯»¯Ê¹Ãü£¬£¬£¬£¬£¬ÊµÏÖ²î±ðµÄ¼ÓÃÜËã·¨ºÍ¼Æ»®£¬£¬£¬£¬£¬ÒÔ¼°¾ßÓжàÖÖ×¢Èëģʽ¡£¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/pensive-ursa-uses-upgraded-kazuar-backdoor/
6¡¢HPÐû²¼2023ÄêµÚÈý¼¾¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬HPÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚQ3¼ÌÐøÊ¹ÓÃliving-off-the-land¹¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬Í¨¹ýWindowsÄÚÖõŤ¾ßÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£¡£Ê¹ÓÃExcel²å¼þ(XLL)ÎļþµÄ»î¶¯¼¤Ôö£¬£¬£¬£¬£¬ÔÚ¹¥»÷Õß×î³£ÓõÄÎļþÀ©Õ¹ÃûÖУ¬£¬£¬£¬£¬ÆôÓúêµÄExcel²å¼þ¶ñÒâÈí¼þ´ÓQ2µÄµÚ46λÉÏÉýµ½µÚ7λ¡£¡£¡£¡£¡£¡£¡£HP»¹·¢Ã÷ÁËÒ»¸öÕë¶ÔÀ¶¡ÃÀÖÞÂùݵĹ¥»÷»î¶¯£¬£¬£¬£¬£¬Ê¹ÓÃÁËÆôÓúêµÄPowerPoint²å¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÔÚGitHubÉÏÍйÜαÔìµÄRAT£¬£¬£¬£¬£¬ÊÔͼÓÕÆÈ±·¦ÂÄÀúµÄºÚ¿ÍѬȾËûÃÇ×Ô¼ºµÄPC¡£¡£¡£¡£¡£¡£¡£
https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q3-2023/