SAPÐû²¼Çå¾²¸üÐÂÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î

Ðû²¼Ê±¼ä 2023-03-16

1¡¢SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î


3ÔÂ14ÈÕ£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌSAPÒÑÕë¶Ô19¸öÎó²îÐû²¼ÁËÇå¾²¸üС£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²îÓ°ÏìÁËÐí¶à²úÆ·£¬£¬£¬£¬µ«ÑÏÖØµÄÎó²î»áÓ°ÏìSAP Business ObjectsÉÌÒµÖÇÄÜÆ½Ì¨(CMC)ºÍSAP NetWeaver¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ5¸ö½ÏΪÑÏÖØµÄÎó²î»®·ÖΪ´úÂë×¢ÈëÎó²î£¨CVE-2023-25616£©¡¢Ä¿Â¼±éÀúÎó²î£¨CVE-2023-27269ºÍCVE-2023-27500£©¡¢È±ÉÙÉí·ÝÑéÖ¤¼ì²éÎó²î£¨CVE-2023-23857£©ÒÔ¼°ÏÂÁîÖ´ÐÐÎó²î£¨CVE-2023-25617£©¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÁ¬Ã¦×°Öò¹¶¡¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sap-releases-security-updates-fixing-five-critical-vulnerabilities/ 


2¡¢LockBit³Æ´ÓMaximum Industries»ñÈ¡µ½SpaceXµÄÊý¾Ý


¾ÝýÌå3ÔÂ14Èճƣ¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÉú²ú¹«Ë¾Maximum IndustriesµÄϵͳ²¢»ñÈ¡µ½SpaceXµÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Maximum IndustriesרÃÅ´ÓÊÂË®µ¶ºÍ¼¤¹âÇиîÒÔ¼°CNC¼Ó¹¤Ð§ÀÍ£¬£¬£¬£¬ÊÇSpaceXµÄµÚÈý·½³Ð°üÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖÇÔÈ¡ÁËԼĪ3000ÕÅÓÉspace-x¹¤³ÌʦÈÏÖ¤µÄͼֽ£¬£¬£¬£¬²¢ÍýÏëÔÚÒ»ÖÜÄÚÌᳫÅÄÂô£¬£¬£¬£¬½«ÕâЩͼֽÂô¸øÆäËûÖÆÔìÉÌ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­ÁªÏµÁËSpaceXºÍMaximum Industries£¬£¬£¬£¬µ«ËûÃǶ¼Ã»ÓлØÓ¦¡£¡£¡£¡£¡£¡£¡£ 


https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html


3¡¢Ò½ÁƱ£½¡ÌṩÉÌILS͸¶Áè¼Ý420Íò»¼ÕßµÄÐÅϢй¶


ýÌå3ÔÂ15Èճƣ¬£¬£¬£¬Ò½ÁƱ£½¡ÌṩÉÌIndependent Living Systems(ILS)Ðû²¼Í¨ÖªÍ¸Â¶Êý¾Ýй¶ÊÂÎñÓ°ÏìÁË4226508¸ö»¼Õß¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾·¢Ã÷ÆäϵͳÓÚ2022Äê7ÔÂ5ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬ËæºóÊÓ²ìÏÔʾ¹¥»÷ÕßÔÚ2022Äê6ÔÂ30ÈÕÖÁ7ÔÂ5ÈÕ»ñµÃÁ˲¿·ÖILSϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉ˰ÈËʶÓÖÃûºÍÒ½ÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£ILSÔÚ·¢Ã÷Î¥¹æÐÐΪºóµÄÁù¸öԺ󣬣¬£¬£¬Ò²¾ÍÊÇ2023Äê1ÔÂ17ÈÕÍê³ÉÁËÈ·¶¨ÊÜÓ°ÏìСÎÒ˽¼Ò»òʵÌåµÄÄÚ²¿Éó²é¡£¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬ILSÌåÏÖ½«ÎªÊÜÓ°Ï컼ÕßÌṩΪÆÚÒ»ÄêµÄExperianÉí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/


4¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒÕþ¸®ºÍÄÜÔ´×éÖ¯µÄ¹¥»÷


CiscoÔÚ3ÔÂ14ÈÕÅû¶ÁËÒ»¸öÐµĹ¥»÷ÍÅ»ïYoroTrooper£¬£¬£¬£¬Ö÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÁªºÏÌå(CIS)¹ú¼ÒµÄÕþ¸®ºÍÄÜÔ´×éÖ¯¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬ÒѾ­ÈëÇÖÁËÒ»¸ö´ÓÊÂÒ½ÁƱ£½¡µÄÖ÷ҪŷÃË»ú¹¹¡¢ÌìÏÂ֪ʶ²úȨ×éÖ¯(WIPO)ºÍ¶à¸öÅ·ÖÞ´óʹ¹Ý¡£¡£¡£¡£¡£¡£¡£YoroTrooperµÄ¹¤¾ß°üÀ¨ÉÌÆ·ºÍ×Ô½ç˵ÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂíºÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Ñ¬È¾Á´ÓɶñÒâ¿ì½Ý·½·¨Îļþ(LNK)ºÍ¿ÉÑ¡µÄÓÕ¶üÎļþ×é³É¡£¡£¡£¡£¡£¡£¡£


https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/


5¡¢ESET·¢Ã÷TickÕë¶Ô¶«ÑÇijDLPÈí¼þ¿ª·¢É̵Ĺ¥»÷»î¶¯


3ÔÂ14ÈÕ£¬£¬£¬£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯TickÕë¶Ô¶«ÑÇÒ»¼Ò¿ª·¢Êý¾Ýɥʧ·À»¤(DLP)Èí¼þµÄ¹«Ë¾µÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄÄÚ²¿¸üÐÂЧÀÍÆ÷£¬£¬£¬£¬ÔÚÈí¼þ¿ª·¢É̵ÄϵͳÄÚÈö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬²¢Ä¾Âí»¯¸Ã¹«Ë¾Ê¹ÓõÄÕýµ±¹¤¾ßµÄ×°ÖóÌÐò£¬£¬£¬£¬×îÖÕµ¼ÖÂÔÚ¹«Ë¾¿Í»§µÄÅÌËã»úÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÔÚÈëÇÖÀú³ÌÖУ¬£¬£¬£¬¹¥»÷Õß×°ÖÃÁËÒ»¸öеÄÏÂÔØ³ÌÐòShadowPy£¬£¬£¬£¬»¹Ê¹ÓÃÁ˺óÃÅNetboy£¨ÓÖÃûInvader£©ºÍÏÂÔØ³ÌÐòGhostdown¡£¡£¡£¡£¡£¡£¡£


https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/


6¡¢Check PointÐû²¼¹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ


Check PointÔÚ3ÔÂ14ÈÕÐû²¼Á˹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¶ñÒâÈí¼þ¿ÉÒÔαװ³É20¶àÖÖ½ðÈÚÓ¦Ó㬣¬£¬£¬²¢Ä£ÄâÓëÒøÐлò½ðÈÚЧÀÍÔ±¹¤µÄµç»°ÅÊ̸¾ÙÐÐÓïÒô´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£FakeCallsÖ÷ÒªÕë¶Ôº«¹ú£¬£¬£¬£¬¾ßÓÐÈðÊ¿¾üµ¶µÄ¹¦Ð§£¬£¬£¬£¬²»µ«Äܹ»Ö´ÐÐÆäÖ÷ҪʹÃü£¬£¬£¬£¬²¢ÇÒÄܹ»´ÓÄ¿µÄ×°±¸ÖÐÇÔȡСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁË2500¶à¸öFakeCallsÑù±¾£¬£¬£¬£¬ËüÃÇʹÓÃÁËÖÖÖÖÄ£Äâ½ðÈÚ×éÖ¯µÄ×éºÏ²¢ÊµÑéÁË ·´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£


https://research.checkpoint.com/2023/south-korean-android-banking-menace-fakecalls/