°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚ3TBÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-03-09

1¡¢°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚÔ¼3TBÊý¾Ýй¶


¾ÝýÌå3ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬°ÍÎ÷µÄ¿ç¹ú¹«Ë¾Andrade GutierrezÔ¼3TBµÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ÕâÊÇÀ­¶¡ÃÀÖÞ×î´óµÄ¹¤³Ì¹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬ÈÏÕæ¸ÃµØÇø»ù´¡ÉèÊ©¡¢ÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»ÆøÒÔ¼°ÔËÊäÁìÓòµÄÖØ´óÏîÄ¿¡£¡£¡£¡£¡£¡£ºÚ¿ÍDark AngelsÉù³ÆÇÔÈ¡ÁË3TBµÄÓʼþºÍ¹«Ë¾Êý¾Ý£¬£¬£¬£¬£¬Éæ¼°Ô±¹¤ÐÕÃû¡¢»¤ÕÕÐÅÏ¢¡¢¸¶¿îÐÅÏ¢ºÍ˰ºÅµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÒÔ¼°¼¸¸ö×ÅÃûÐÞ½¨ÏîÄ¿µÄÀ¶Í¼¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬Ð¹Â¶ÊÂÎñ±¬·¢ÔÚÈ¥Äê9ÔÂÖÁ10Ô¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/brazilian-conglomerate-3tb-data/ 


2¡¢FortinetÐÞ¸´Ó°ÏìFortiOSºÍFortiProxyµÄÎó²î


3ÔÂ7ÈÕ£¬£¬£¬£¬£¬FortinetÐû²¼¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸öÓ°ÏìFortiOSºÍFortiProxyµÄ»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2023-25610£©µÄCVSSÆÀ·ÖΪ9.3£¬£¬£¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÃÌØÖÆÇëÇ󣬣¬£¬£¬£¬À´ÔÚGUIÉÏÖ´ÐÐí§Òâ´úÂë»ò¾Ü¾øÐ§ÀÍ(DoS)¡£¡£¡£¡£¡£¡£Fortinetͨ¸æ³Æ£¬£¬£¬£¬£¬ÏÖÔÚÉÐδ·¢Ã÷ÈκÎÔÚÒ°ÍâʹÓõÄÇéÐΡ£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Ó¦ÓøüеÄÓû§£¬£¬£¬£¬£¬Fortinet½¨Òé½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏÞÖÆ¿ÉÔ¶³Ì»á¼ûµÄIPµØµã¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability/


3¡¢Check Point·¢Ã÷Sharp Panda¹¥»÷¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ»î¶¯


3ÔÂ7ÈÕ£¬£¬£¬£¬£¬Check Point³ÆÆä·¢Ã÷ÁËSharp PandaÕë¶Ô¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯´Ó2022Äêµ××îÏȲ¢Ò»Á¬µ½2023Ä꣬£¬£¬£¬£¬Ê¹ÓÃÓã²æÊ½´¹ÂÚ¹¥»÷¾ÙÐгõʼÈëÇÖ¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþµÄ¶ñÒ⸽¼þ×°ÖÃRoyalRoad RTF¹¤¾ß°ü£¬£¬£¬£¬£¬±ýÊÔͼʹÓÃÎó²îÔÚÖ÷»úÉÏ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£È»ºó×°Öò¢Ö´ÐÐÒ»¸öDLL¶ñÒâÈí¼þÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬ËüÓÖ»á´ÓC2ЧÀÍÆ÷»ñÈ¡²¢Ö´Ðеڶþ¸öDLL£¬£¬£¬£¬£¬¼´SoulSearcher loader£¬£¬£¬£¬£¬×îÖÕ»á¼ÓÔØSoulÄ£¿£¿ £¿£¿£¿ £¿£¿é»¯¿ò¼Ü¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/


4¡¢Ñо¿Ö°Ô±Åû¶DJIÎÞÈË»úÖÐ16¸öÇå¾²Îó²îµÄÏêϸÐÅÏ¢


ýÌå3ÔÂ7Èճƣ¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËDJIÎÞÈË»úÖеÄ16¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îµÄÓ°Ïì¹æÄ£ºÜ¹ã£¬£¬£¬£¬£¬´Ó¾Ü¾øÐ§À͵½í§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ÆäÖÐÓÐ14¸öÎó²î¿ÉÒÔͨ¹ýÖÇÄÜÊÖ»úÔ¶³Ì´¥·¢£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÎÞÈË»úÔÚº½ÐÐ;ÖÐ×¹»Ù¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹¿ÉÒÔ¸üËûÈÕÖ¾Êý¾Ý»òÐòÁкÅÀ´Î±×°Éí·Ý£¬£¬£¬£¬£¬»òÕßÈÆ¹ý¶ÔËÙÂʺ͸߶ȷ½ÃæµÄÏÞÖÆ£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýµØÀíΧÀ¸ºÍÐéÄâ½çÏß¶Ô½û·ÉÇøÓòµÄÏÞÖÆ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬DJIÒÑÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£¡£


https://www.hackread.com/dji-drones-flaw-crash-drones-mid-flight/


5¡¢TrendMicroÐû²¼2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ£¬£¬£¬£¬£¬Trend MicroÐû²¼ÁË2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬Trend Micro¼ì²âµ½ÁË1464ÒÚ´ÎÍþв£¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË55.3%¡£¡£¡£¡£¡£¡£¹¥»÷Õß×î³£ÓõÄATT&CKÊÖÒÕΪԶ³ÌЧÀÍ¡¢ÓÐÓÃÕÊ»§ºÍ²Ù×÷ϵͳƾ֤ת´¢¡£¡£¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬Microsoft×èÖ¹ÁËOfficeÎĵµÖкê³ÌÐòµÄÖ´ÐУ¬£¬£¬£¬£¬´Ë¾Ùµ¼ÖÂOfficeºêµÄʹÓÃϽµ£¬£¬£¬£¬£¬µ«¹¥»÷Õß×îÏÈѰÕÒÌæ»»¼Æ»®£¬£¬£¬£¬£¬ÀýÈçHTML×ß˽µÈÕ½ÂÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶ÔÔÆÐ§ÀÍ£¬£¬£¬£¬£¬°üÀ¨ÎÞЧÀÍÆ÷ƽ̨ÉϵũӦÁ´¹¥»÷£¬£¬£¬£¬£¬ÒÔ¼°ÔÚLinuxϵͳÉÏÌᳫ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/c/expanding-attack-blueprints-2022-annual-cybersecurity-report-.html


6¡¢MorphisecÐû²¼¶ñÒâÈí¼þSYS01ÇÔÊØÐÅÏ¢µÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ£¬£¬£¬£¬£¬MorphisecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þSYS01µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£×Ô2022Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚÕë¶ÔÒªº¦Õþ¸®»ù´¡ÉèÊ©¡¢ÖÆÔ칫˾ºÍÆäËüÐÐÒµµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓùȸè¹ã¸æºÍÐéαµÄFacebookСÎÒ˽¼Ò×ÊÁÏÀ´Õë¶ÔFacebookÉÌÒµÕË»§£¬£¬£¬£¬£¬ÓÕʹĿµÄÏÂÔØ¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨µÇ¼Êý¾Ý¡¢cookieÒÔ¼° Facebook¹ã¸æºÍÆóÒµÕÊ»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£ 


https://blog.morphisec.com/sys01stealer-facebook-info-stealer