LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼ÊÖ´·¨Ðж¯¶øÍß½â

Ðû²¼Ê±¼ä 2024-02-21
1. LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼ÊÖ´·¨Ðж¯¶øÍß½â


2ÔÂ20ÈÕ£¬£¬£¬£¬£¬ £¬£¬À´×Ô 11 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹¿ªÕ¹µÄ´úºÅΪ¡°¿ËÂÞŵ˹Ðж¯¡±µÄÁªºÏÖ´·¨Ðж¯£¬£¬£¬£¬£¬ £¬£¬Éæ¼°LockBitÀÕË÷ÍŻ£¬£¬£¬£¬ £¬£¬ÆäÍøÕ¾ÒѾ­±»¿ØÖÆ¡£¡£¡£¡£¡£¡£¡£×Ô 2019 Äêµ×·ºÆðÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯µÄ¹æÄ£Ô¶Ô¶Áè¼ÝÆäËûÀÕË÷Èí¼þÍŻ£¬£¬£¬£¬ £¬£¬Recorded Future µÄÑо¿Ö°Ô±¿ìÒª 2,300 Æð¹¥»÷¹éÒòÓÚ¸Ã×éÖ¯¡£¡£¡£¡£¡£¡£¡£Conti Êǵڶþ»îÔ¾µÄ×éÖ¯£¬£¬£¬£¬£¬ £¬£¬½ö¹ûÕæÓë 883 Æð¹¥»÷ÓйØ¡£¡£¡£¡£¡£¡£¡£×Ô 2020 Äê 1 ÔÂÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬Ê¹Óà LockBit µÄÁ¥Êô»ú¹¹Òѽ«Ä¿µÄËø¶¨ÔÚ½ðÈÚЧÀÍ¡¢Ê³ÎïºÍũҵ¡¢½ÌÓý¡¢ÄÜÔ´µÈÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄÖÖÖÖ¹æÄ£µÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£Õþ¸®ºÍ½ôÆÈЧÀÍ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìºÍÔËÊä¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/lockbit-ransomware-disrupted-international-operation


2.Cactus ÀÕË÷Èí¼þÉù³ÆÇÔÈ¡ 1.5TB Ê©ÄÍµÂµçÆøÊý¾Ý


2ÔÂ19ÈÕ£¬£¬£¬£¬£¬ £¬£¬Cactus ÀÕË÷Èí¼þÍÅ»ïÉù³Æ£¬£¬£¬£¬£¬ £¬£¬ËûÃÇÉϸöÔÂÈëÇÖÊ©ÄÍµÂµçÆøÍøÂçºóÇÔÈ¡ÁË 1.5TB µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£²¢ÔÚ°µÍøÐ¹Â¶ÍøÕ¾ÉÏ»¹Ð¹Â¶ÁË 25MB µÄ¾Ý³Æ±»µÁÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬×÷ΪÍþвÐÐΪÕßÉù³ÆµÄÖ¤¾Ý£¬£¬£¬£¬£¬ £¬£¬±ðµÄÉÐÓÐÏÔʾ¼¸ÃûÃÀ¹ú¹«Ãñ»¤Õպͱ£ÃÜЭÒéÎļþɨÃèµÄ¿ìÕÕ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÏÖÔÚÕýÔÚÀÕË÷¸Ã¹«Ë¾£¬£¬£¬£¬£¬ £¬£¬²¢Íþв³Æ£¬£¬£¬£¬£¬ £¬£¬ÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬ £¬£¬¾Í»áй¶ËùÓоݳƱ»µÁµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÏêϸµÄÊý¾Ý±»µÁ£¬£¬£¬£¬£¬ £¬£¬µ«Ê©ÄÍµÂµçÆøµÄ¿ÉÒ»Á¬Éú³¤ÓªÒµ²¿·ÖΪȫÇòÐí¶à×ÅÃû¹«Ë¾Ìṩ¿ÉÔÙÉúÄÜÔ´ºÍî¿ÏµºÏ¹æ×ÉѯЧÀÍ£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ Allegiant Travel Company¡¢Clorox¡¢DHL¡¢¶Å°î¡¢Ï£¶û¶Ù¡¢ÀûÃË¡¢°ÙÊ¿ÉÀÖºÍÎÖ¶ûÂê¡£¡£¡£¡£¡£¡£¡£¼øÓÚ´Ë£¬£¬£¬£¬£¬ £¬£¬´ÓÆäÄ¿µÄϵͳÖÐÇÔÈ¡µÄÊý¾Ý¿ÉÄܰüÀ¨Óйؿͻ§¹¤Òµ¿ØÖƺÍ×Ô¶¯»¯ÏµÍ³µÄÃô¸ÐÐÅÏ¢ÒÔ¼°ÓйØÇéÐκÍÄÜÔ´¹æÔòºÏ¹æÐÔµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cactus-ransomware-claim-to-steal-15tb-of-schneider-electric-data/


3.Wyze ÉãÏñÍ·¹ÊÕϵ¼ÖÂÁè¼Ý 13000 Óû§ÊÜÓ°Ïì


2ÔÂ19ÈÕ£¬£¬£¬£¬£¬ £¬£¬Wyze ·ÖÏíÁËÓ°ÏìÊýǧÃûÓû§µÄÇå¾²ÊÂÎñµÄ¸ü¶àϸ½Ú£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾½«Æä¹é×ïÓÚ×î½üÌí¼Óµ½ÆäϵͳÖеĵÚÈý·½»º´æ¿Í»§¶Ë¿â£¬£¬£¬£¬£¬ £¬£¬¸Ã¿âÔÚ´¦Öóͷ£ÖÜÎå´ó¹æÄ£Í£µçºóͬʱÉÏÏߵĴó×ÚÉãÏñ»úʱ·ºÆðÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡°Õâ´ÎÖÐÖ¹ÊÇÓɼøºÚµ£±£ÍøÏàÖúͬ°é AWS Ôì³ÉµÄ£¬£¬£¬£¬£¬ £¬£¬ÖÜÎ寯Ïþ Wyze ×°±¸Í £»£» £» £»úÁ˼¸¸öСʱ¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÄúÔÚÕâ¶Îʱ¼äÄÚʵÑéÉó²éʵʱÉãÏñÍ·»ò»î¶¯£¬£¬£¬£¬£¬ £¬£¬Äú¿ÉÄÜÎÞ·¨Ô¢Ä¿¡£¡£¡£¡£¡£¡£¡£¹ØÓÚ¸øÄú´øÀ´µÄ´ì°Ü¸ÐºÍÒÉÐÄ£¬£¬£¬£¬£¬ £¬£¬ÎÒÃÇÉî±íǸÒâÕâµ¼ÖÂÁË¡±¸Ã¹«Ë¾ÔÚ·¢Ë͸øÊÜÓ°ÏìÓû§µÄµç×ÓÓʼþÖÐÌåÏÖ¡£¡£¡£¡£¡£¡£¡£Wyze ÌåÏÖ£¬£¬£¬£¬£¬ £¬£¬·ºÆðÕâÖÖÇéÐÎÊÇÓÉÓÚÐèÇóͻȻÔöÌí£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂ×°±¸ ID ºÍÓû§ ID Ó³Éä»ìÏý£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂijЩÊý¾ÝÓ벻׼ȷµÄÓû§ÕÊ»§¹ýʧÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ £¬£¬¿Í»§¿ÉÒÔÔÚµã»÷ Wyze Ó¦ÓóÌÐòµÄ¡°ÊÂÎñ¡±Ñ¡ÏÖеÄÏà»úËõÂÔͼºó¿´µ½ÆäËûÈ˵ÄÊÓÆµÔ´ËõÂÔͼ£¬£¬£¬£¬£¬ £¬£¬ÔÚijЩÇéÐÎÏÂÉõÖÁ¿ÉÒÔ¿´µ½ÊÓÆµÆ¬¶Ï¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wyze-camera-glitch-gave-13-000-users-a-peek-into-other-homes/


4.Linux ÄÚºËȱÏÝ (CVE-2024-0646) Ê¹ÏµÍ³ÃæÁÙȨÏÞÌáÉý


2ÔÂ19ÈÕ£¬£¬£¬£¬£¬ £¬£¬Linux Äں˴«Êä²ãÇå¾²ÐÔ (kTLS) ÖеÄÎó²î(CVE-2024-0646)¿ÉÄܱ»ÍâµØÓû§Ê¹ÓÃÀ´»ñÈ¡ÌáÉýµÄϵͳȨÏÞ»òÖÐֹϵͳ²Ù×÷¡£¡£¡£¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÒѾ­ÌṩÁËÕë¶Ô´ËÎó²îµÄ²¹¶¡¡£¡£¡£¡£¡£¡£¡£kTLS ½«»ù±¾µÄ TLS ¼ÓÃܺÍÉí·ÝÑéÖ¤¹¦Ð§Ö±½ÓÒýÈë Linux Äںˡ£¡£¡£¡£¡£¡£¡£Õâ¼ò»¯ÁË»ù±¾»¥ÁªÍøÐ­ÒéµÄÇ徲ͨѶ£¬£¬£¬£¬£¬ £¬£¬ÀýÈç HTTPS£¨Çå¾²ÍøÒ³ä¯ÀÀ£©¡¢µç×ÓÓʼþºÍÆäËû»¥ÁªÍøÅþÁ¬Ó¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄʵÖÊÔÚÓÚŲÓÃsplice() ʱÄÚ´æ´¦Öóͷ£²»µ±¡£¡£¡£¡£¡£¡£¡£KTLS ´úÂëÎÞ·¨×¼È·¸üÐÂÃ÷ÎÄÊèÉ¢ÍøÂ绺³åÇø ( struct sk_msg_sg ) µÄÄÚ²¿¼ÇÕÊ ( curr/copybreak ) £¬£¬£¬£¬£¬ £¬£¬´Ó¶øµ¼ÖÂÔ½½çÄÚ´æÐ´ÈëȱÏÝ¡£¡£¡£¡£¡£¡£¡£ÄÚ´æÖÎÀíÖеÄÕâÖÖʧÎó¿ÉÄÜ»áÔÊÐíºóÐø¶ÔÌ×½Ó×ÖµÄдÈëÁýÕÖÆ´½ÓÒ³ÃæµÄÄÚÈÝ£¬£¬£¬£¬£¬ £¬£¬´Ó¶øÎ£ÏյذüÀ¨Å²ÓÃÕß²»Ó¦¾ßÓÐд»á¼ûȨÏÞµÄÎļþÖеÄÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜ»áʹÓôËÎó²îÒÔ·ÇÔ¤ÆÚµÄϵͳȨÏÞµ¼Ö´úÂëÒâÍâÖ´ÐС£¡£¡£¡£¡£¡£¡£


https://securityonline.info/linux-kernel-flaw-cve-2024-0646-exposes-systems-to-privilege-escalation/


5.Android ÒøÐÐľÂí Anatsa ¾íÍÁÖØÀ´ÐÂÔö˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË


2ÔÂ19ÈÕ£¬£¬£¬£¬£¬ £¬£¬ThreatFabric µÄÑо¿Ö°Ô±ÊӲ쵽AnatsaÒøÐÐľÂí£¨ÓÖÃû TeaBot ºÍ Toddler£©¾íÍÁÖØÀ´¡£¡£¡£¡£¡£¡£¡£11 ÔÂÖÁ 2 ÔÂʱ´ú£¬£¬£¬£¬£¬ £¬£¬×¨¼ÒÃÇÊӲ쵽ÁËÎ岨²î±ðµÄ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬Ã¿Ò»²¨¶¼¼¯ÖÐÔÚ²î±ðµÄµØÇø¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ´ËǰÖ÷ÒªÕë¶ÔÓ¢¹ú¡¢µÂ¹úºÍÎ÷°àÑÀ¾ÙÐл£¬£¬£¬£¬£¬ £¬£¬µ«×îеĻÕë¶ÔµÄÊÇ˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË£¬£¬£¬£¬£¬ £¬£¬ÕâÅú×¢ÆäÔËÓªÕ½ÂÔ±¬·¢ÁËת±ä¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½« Anatsa µÄ»î¶¯¹éÀàΪ¡°ÓÐÕë¶ÔÐÔ¡±£¬£¬£¬£¬£¬ £¬£¬ÊӲ쵽ÍþвÐÐΪÕßÒ»´Î¼¯ÖÐÓÚ 3-5 ¸öÇøÓò¡£¡£¡£¡£¡£¡£¡£¾Ý ThreatFabric ³Æ£¬£¬£¬£¬£¬ £¬£¬Í¶·ÅÆ÷Ó¦ÓóÌÐòÒÑÉÏ´«µ½Ä¿µÄÇøÓòµÄ Google Play ÉÏ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß×¢ÖØµ½ÕâЩӦÓóÌÐò¾­³£½øÈë¡°ÈÈÃÅÐÂÃâ·Ñ¡±ÖÖ±ðÖеÄǰÈýÃû£¬£¬£¬£¬£¬ £¬£¬ÊÔͼÓÕÆ­Óû§ÏàПÃÓ¦ÓóÌÐòÊÇÕýµ±µÄ²¢Óдó×ÚÓû§ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/159344/malware/anatsa-banking-trojan-resurgence.html


6.Áè¼Ý 28500 ̨ Exchange ЧÀÍÆ÷Ò×ÊÜ×Ô¶¯Ê¹ÓõÄÎó²î¹¥»÷


2ÔÂ19ÈÕ£¬£¬£¬£¬£¬ £¬£¬Microsoft Exchange ЧÀÍÆ÷¿ÉÄÜÈÝÒ×Êܵ½ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓõÄÑÏÖØÐÔȨÏÞÉý¼¶Îó²î£¨¸ú×ÙΪ CVE-2024-21410£©µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÓÚ 2 Ô 13 ÈÕ½â¾öÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬ £¬£¬Æäʱ¸ÃÎÊÌâÒѱ»ÓÃ×÷ÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬£¬ÒÑÓÐ 28500 ̨ЧÀÍÆ÷±»È·¶¨±£´æÎó²î¡£¡£¡£¡£¡£¡£¡£Exchange Server ÆÕ±éÓ¦ÓÃÓÚÉÌÒµÇéÐÎÖУ¬£¬£¬£¬£¬ £¬£¬ÒÔÔö½øÓû§Ö®¼äµÄͨѶºÍЭ×÷£¬£¬£¬£¬£¬ £¬£¬Ìṩµç×ÓÓʼþ¡¢ÈÕÀú¡¢ÁªÏµÈËÖÎÀíºÍʹÃüÖÎÀíЧÀÍ¡£¡£¡£¡£¡£¡£¡£¸ÃÇå¾²ÎÊÌâÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¶Ô Microsoft Exchange Server Ö´ÐÐ NTLM Öм̹¥»÷²¢ÌáÉýÆäÔÚϵͳÉϵÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬£¬CVE-2024-21410 »¹Ã»ÓйûÕæµÄ¿´·¨ÑéÖ¤ (PoC) Îó²î£¬£¬£¬£¬£¬ £¬£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉÏÏÞÖÆÁËʹÓøÃȱÏݾÙÐй¥»÷µÄ¹¥»÷ÕßÊýÄ¿¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-28-500-exchange-servers-vulnerable-to-actively-exploited-bug/