ºÚɽÕþ¸®³ÆÆäÊý×Ö»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2022-08-30
¾Ý8ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬ºÚɽÕþ¸®Í¸Â¶ÆäÔâµ½ÁËÖØ´óÇÒÒ»Á¬µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìÁ˹ú¼ÒµÄÊý×Ö»ù´¡ÉèÊ©¡£¡£¡£¡£ÍøÂç¹¥»÷µÄÄ¿µÄ°üÀ¨µçÁ¦ºÍ¹©Ë®ÏµÍ³¡¢½»Í¨Ð§ÀÍ¡¢ÓÃÓÚ¹«Ãñ»á¼ûÖÖÖÖ¹ú¼ÒЧÀ͵ÄÔÚÏßÃÅ»§ÍøÕ¾µÈµÈ¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬Ò»Ð©·¢µç³§ÒѾתΪÊÖ¶¯²Ù×÷£¬£¬£¬£¬£¬¹ú¼ÒÖÎÀíµÄIT»ù´¡ÉèÊ©Òѹرգ¬£¬£¬£¬£¬µ«¹«ÃñºÍÉÌÆóÒµµÄÕË»§¼°ÆäÊý¾ÝµÄÇå¾²ÐÔ²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¸Ã¹ú¹ú·À²¿³¤½«´Ë´Î¹¥»÷¹é×ïÓÚ¶íÂÞ˹µÄºÚ¿ÍÍŻ¡£¡£¡£
https://securityaffairs.co/wordpress/134900/cyber-warfare-2/montenegro-cyber-attack.html
2¡¢¶íÂÞ˹Á÷ýÌåÆ½Ì¨STARTÊý¾Ýй¶ӰÏì4400ÍòÓû§
ýÌå8ÔÂ29Èճƣ¬£¬£¬£¬£¬¶íÂÞ˹Á÷ýÌåÆ½Ì¨START¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÒ»´Î¹¥»÷ÖÐй¶¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶Óм¸¶àÓû§Êܵ½Ó°Ï죬£¬£¬£¬£¬Information Leaks¹ûÕæµÄ½ØÍ¼ÏÔʾ´Ë´Îй¶ÁË4400Íò¿Í»§µÄ72 GBÊý¾Ý¡£¡£¡£¡£ºÚ¿ÍÉù³ÆÕâЩÊý¾ÝÀ´×ÔÒ»¸ö̻¶µÄMongoDBÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÔÚÈ¥Äê9ÔÂ22ÈÕ֮ǰÔÚ¸ÃÍøÕ¾ÉÏ×¢²áµÄÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£STARTÌåÏÖÒѾÐÞ¸´Îó²î²¢¹Ø±ÕÁËÊý¾Ý¿â£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄºÚ¿Í¼°ÆäÄîÍ·¡£¡£¡£¡£
https://therecord.media/leading-russian-streaming-platform-suffers-data-leak-allegedly-impacting-44-million-users/
3¡¢MERCURYʹÓÃSysAidÖеÄLog4Shell¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµ
8ÔÂ25ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÅû¶ÁËÒÁÀÊÍÅ»ïMERCURYÕë¶ÔÒÔÉ«ÁÐÆóÒµµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2022Äê7ÔÂ23ÈÕÖÁ25ÈÕ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓñ£´æLog4ShellÎó²îµÄSysAidÓ¦ÓóÌÐò¾ÙÐгõʼ»á¼û¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬MERCURYͨ¹ýÌØÖÆµÄÇëÇóÖ´ÐжñÒâPowerShell²¢×°ÖÃWeb shell¡£¡£¡£¡£ÔÚͨ¹ýcmd.exeÍøÂçµ½ËùÐèÐÅÏ¢ºó£¬£¬£¬£¬£¬»áÌí¼ÓÒ»¸öÓû§²¢½«ÆäȨÏÞÌáÉýΪÍâµØÖÎÀíÔ±£¬£¬£¬£¬£¬È»ºó½«¹¥»÷¹¤¾ßÌí¼Óµ½Æô¶¯Îļþ¼ÐÖУ¬£¬£¬£¬£¬ÒÔ½¨É賤ÆÚÐÔ¡£¡£¡£¡£MuddyWater»¹Ê¹ÓÃMimikatzÖ´ÐÐÆ¾Ö¤ÇÔÈ¡£¬£¬£¬£¬£¬Í¨¹ýWMIºÍRemComºáÏòÒÆ¶¯£¬£¬£¬£¬£¬²¢Í¨¹ý¶¨ÖƵÄLigoloËíµÀ¹¤¾ß½«±»µÁÊý¾Ý·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/
4¡¢Ó¡¶ÈÄáÎ÷ÑÇPT.JASA MARGAÔâµ½DESORDENµÄ¹¥»÷
¾ÝýÌå8ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ó¡¶ÈÄáÎ÷ÑǵÄÊշѹ«Â·ÔËÓªÉÌPT JASAMARGA TOLLROAD OPERATORÔâµ½À´×ÔDESORDENµÄ¹¥»÷¡£¡£¡£¡£DESORDENÌåÏÖ£¬£¬£¬£¬£¬ÒÑÇÔÈ¡252 GBµÄÊý¾Ý¡¢±àÂëºÍÎĵµ£¬£¬£¬£¬£¬ÂþÑÜÔÚ5̨ЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬Éæ¼°¸Ã¹«Ë¾µÄÓû§¡¢¿Í»§¡¢Ô±¹¤¹«Ë¾ºÍ²ÆÎñµÄÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾×÷³ö»ØÓ¦£¬£¬£¬£¬£¬³ÆÐ¹Â¶µÄÊý¾ÝÖ»ÊÇÄÚ²¿Êý¾ÝºÍ¹«Ë¾Ïà¹ØÐÅÏ¢£¬£¬£¬£¬£¬¶ø²»Éæ¼°¿Í»§Êý¾Ý£¬£¬£¬£¬£¬ËûÃÇÒѹرÕÊÜÓ°ÏìµÄЧÀÍÆ÷£¬£¬£¬£¬£¬ÏÖÔÚÔÚ»Ö¸´Êý¾Ý²¢½«ÏµÍ³Òƶ¯µ½¸üÇå¾²µÄЧÀÍÆ÷ÉÏ¡£¡£¡£¡£
https://www.databreaches.net/major-indonesia-tollroad-operator-hacked-by-desorden/
5¡¢¼ÙµÄP2E Cthulhu World·Ö·¢¶à¸öÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ
ýÌå8ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеĶñÒâÈí¼þ·Ö·¢»î¶¯¡£¡£¡£¡£ºÚ¿Í½¨ÉèÁËÒ»¸ö¼ÙµÄplay-to-earnƽ̨Cthulhu World£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÍøÕ¾¡¢Discord Groups¡¢Éç½»ÕË»§ºÍÒ»¸öMedium¿ª·¢ÕßÍøÕ¾£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢ÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þRaccoon Stealer¡¢AsyncRATºÍRedLine¡£¡£¡£¡£ÆäÍøÕ¾ËÆºõ¿Ë¡ÁËÕýµ±µÄAlchemic WorldÏîÄ¿¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Cthulhu WorldµÄÍøÕ¾Òѹرգ¬£¬£¬£¬£¬µ«ËûÃǵÄDiscordÈÔÈ»»îÔ¾¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-cthulhu-world-p2e-project-used-to-push-info-stealing-malware/
6¡¢Unit42Ðû²¼¹ØÓÚÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ
8ÔÂ25ÈÕ£¬£¬£¬£¬£¬Unit42Ðû²¼Á˹ØÓÚÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Black BastaÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)£¬£¬£¬£¬£¬ÓÚ2022Äê4ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬ÒÑÈëÇÖÁËÁè¼Ý75¸ö×éÖ¯£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔλÓÚ°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢Ó¢¹úºÍÃÀ¹úµÄ×éÖ¯¡£¡£¡£¡£2022Äê6Ô£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ËüµÄVMware ESXi±äÌåÕë¶ÔÔÚÆóÒµLinuxЧÀÍÆ÷ÉÏÔËÐеÄÐéÄâ»ú¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÊÔͼ¼ì²â´úÂë·ÂÕæ»òɳºÐÀ´ÈƹýÄæÏòÆÊÎö£»£»£»£»£»£»£»£»ÌìÉúÒ»¸ö´øÓÐdsajdhas.0×Ö·û´®µÄ»¥³âËø£¬£¬£¬£¬£¬ÒÔÈ·±£Ã¿´ÎÖ»ÓÐÒ»¸ö¶ñÒâÈí¼þµÄʵÀýÔÚÔËÐУ»£»£»£»£»£»£»£»Í¨¹ýChaCha20ºÍRSA-4096µÄ×éºÏ¶ÔÓû§Êý¾Ý¾ÙÐмÓÃÜ¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ