´ïÀ˹½¼ÇøÀí²éÉÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2024-09-291. ´ïÀ˹½¼ÇøÀí²éÉÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷
9ÔÂ27ÈÕ£¬£¬£¬´ïÀ˹½¼ÇøÀí²éÉÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½£¬£¬£¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£¡£¡£¡£¡£¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®Ð§ÀÍÆ÷£¬£¬£¬ÊÔͼ¼ÓÃÜÎļþ£¬£¬£¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦£¬£¬£¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥£¬£¬£¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢£¬£¬£¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£¡£¡£¡£¡£¡£Ö»¹ÜÄÚ²¿Ð§ÀÍÊܵ½Ò»¶¨ÏÞÖÆ£¬£¬£¬µ«Òªº¦ÍⲿЧÀÍÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ˹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ£¬£¬£¬¼ÌÈ¥Äê´ïÀ˹Êм°½ñÄê´ïÀË¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó£¬£¬£¬Àí²éÉÊгÉΪ×îÐÂÊܺ¦Õß¡£¡£¡£¡£¡£¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇ󣬣¬£¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣¡£¡£¡£¡£¡£¹ÙÔ±ÌåÏÖ£¬£¬£¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨£¬£¬£¬µ«½«½ß¾¡È«Á¦ïÔ̶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£¡£¡£¡£¡£¡£
https://therecord.media/richardson-texas-cyberattack-city-government
2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ£¬£¬£¬Èö²¥³ðÊÓÑÔÂÛ
9ÔÂ26ÈÕ£¬£¬£¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-FiЧÀ͵ÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾£¬£¬£¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã£¬£¬£¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£¡£¡£¡£¡£¡£Wi-FiЧÀÍÒÑÔÝÍ££¬£¬£¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ£¬£¬£¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª£¬£¬£¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£¡£¡£¡£¡£¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ£¬£¬£¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö£¬£¬£¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ£¬£¬£¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ£¬£¬£¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²Ð§ÀÍÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶£¬£¬£¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£¡£¡£¡£¡£¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸°£¬£¬£¬Ö¼ÔÚ¾¡¿ì»Ö¸´Ð§ÀͲ¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/
3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв£¬£¬£¬Äê´´14Íò´¹ÂÚÍøÕ¾
9ÔÂ26ÈÕ£¬£¬£¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬£¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨É裬£¬£¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏßЧÀÍ×÷Ϊ¹¥»÷Ä¿µÄ£¬£¬£¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å£¬£¬£¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓÐЧÀÍÆ÷ÉÏ¡£¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ£¬£¬£¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ£¬£¬£¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ£¬£¬£¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý£¬£¬£¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£¡£¡£¡£¡£¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀíЧÀÍÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù£¬£¬£¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£¡£¡£¡£¡£¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌ壬£¬£¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¡£¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦£¬£¬£¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂڻµÄÔöÌí£¬£¬£¬Òò´Ë£¬£¬£¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ£¬£¬£¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£¡£¡£¡£¡£¡£
https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/
4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò
9ÔÂ28ÈÕ£¬£¬£¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©ÆÊֶΣ¬£¬£¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ÐÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ£¬£¬£¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò£¬£¬£¬×ÜËðʧ³¬7ÍòÃÀÔª¡£¡£¡£¡£¡£¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈΣ¬£¬£¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£¡£¡£¡£¡£¡£Õ©ÆÕßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ£¬£¬£¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Ó㬣¬£¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆÓû§Ç©ÊðÚ²ÆÉúÒ⣬£¬£¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢£¬£¬£¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽ𡣡£¡£¡£¡£¡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é£¬£¬£¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ£¬£¬£¬´Ó¶øºã¾ÃDZÔÚ¡£¡£¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂ磬£¬£¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Ö»¹ÜÊܺ¦ÕßÖڶ࣬£¬£¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ£¬£¬£¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©ÆÊֶεÄÈÏ֪ȱ·¦£¬£¬£¬ÒÔ¼°Õ©ÆÕßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£¡£¡£¡£¡£¡£
https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/
5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷£¬£¬£¬¶à¼ÒҽԺϵͳ̱»¾
9ÔÂ28ÈÕ£¬£¬£¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾£¬£¬£¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£¡£¡£¡£¡£¡£ÖÜÈý£¬£¬£¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐУ¬£¬£¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£¡£¡£¡£¡£¡£ÊÖÒÕÍŶÓѸËÙ½éÈ룬£¬£¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏ룬£¬£¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â£¬£¬£¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏߣ¬£¬£¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£¡£¡£¡£¡£¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú£¬£¬£¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲ⣬£¬£¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£ÎÀÉú²¿Ç¿µ÷£¬£¬£¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´£¬£¬£¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬ÒÔ°ü¹Ü¹«¹²ÎÀÉúЧÀ͵ÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html
6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷
9ÔÂ27ÈÕ£¬£¬£¬Î¢Èí·¢³öÖÒÑÔ£¬£¬£¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ£¬£¬£¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐΣ¬£¬£¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£¡£¡£¡£¡£¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´£¬£¬£¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö£¬£¬£¬Ò»Ö±½ø»¯£¬£¬£¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬ËûÃÇÌØÊâ»îÔ¾£¬£¬£¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂ磬£¬£¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖᣡ£¡£¡£¡£¡£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤£¬£¬£¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë£¬£¬£¬ÆÆËðͬ²½ÕË»§£¬£¬£¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂ룬£¬£¬Èƹý±£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£µ½Êֺ󣬣¬£¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ£¬£¬£¬Î±×°³ÉÕýµ±Óû§Éí·Ý£¬£¬£¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ£¬£¬£¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷£¬£¬£¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óᣡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/