ÒÔÉ«Áжà¼ÒÎïÁ÷¹«Ë¾Ô¼50 GBСÎÒ˽¼ÒºÍÔËÊä¼Í¼ÔÚ°µÍø³öÊÛ

Ðû²¼Ê±¼ä 2022-12-07
1¡¢ÒÔÉ«Áжà¼ÒÎïÁ÷¹«Ë¾Ô¼50 GBСÎÒ˽¼ÒºÍÔËÊä¼Í¼ÔÚ°µÍø³öÊÛ

¾ÝýÌå12ÔÂ5ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬£¬Ô¼50 GBµÄÊý¾Ý¿âÔÚ°µÍøÉϳöÊÛ £¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÐû²¼Ê±¼äΪ2022Äê11ÔÂ26ÈÕºÍ27ÈÕ¡£¡£¡£¡£ ¡£¡£ÊÓ²ìÏÔʾ £¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊôÓÚ29¼ÒÒÔÉ«ÁеÄÔËÊä¡¢ÎïÁ÷ºÍ»õÔ˹«Ë¾¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÒÔΪ £¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÈí¼þ¹©Ó¦É̵ĵ¥µã¹ÊÕÏ £¬£¬£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨ½øÈëÕâЩÎïÁ÷¹«Ë¾µÄ¹©Ó¦Á´ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×ÚСÎÒ˽¼ÒÊý¾ÝºÍÔËÊä¼Í¼¡£¡£¡£¡£ ¡£¡£Ã¿¸öÊý¾Ý¿âµÄÊÛ¼ÛΪ1 BTC £¬£¬£¬£¬£¬£¬£¬£¬Ï൱ÓÚ17000ÃÀÔª¡£¡£¡£¡£ ¡£¡£¹¥»÷Õß×ܹ²ÁгöÁË110ÍòÌõ¼Í¼ £¬£¬£¬£¬£¬£¬£¬£¬Éв»ÇåÎú»áÓ°Ï켸¶àÈË¡£¡£¡£¡£ ¡£¡£

https://www.hackread.com/israel-logistics-employees-data/

2¡¢¶íÂÞ˹µÚ¶þ´óÒøÐÐVTBµÄÍøÕ¾Ôâµ½´ó¹æÄ£DDoS¹¥»÷

¾Ý12ÔÂ6ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹µÚ¶þ´ó½ðÈÚ»ú¹¹VTBÒøÐÐÌåÏÖ £¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÒ»Á¬µÄDDoS¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ºÍÒÆ¶¯Ó¦ÓÃÔÝʱÎÞ·¨»á¼û¡£¡£¡£¡£ ¡£¡£VTB½²»°ÈË³Æ £¬£¬£¬£¬£¬£¬£¬£¬Õâ²»µ«ÊǽñÄê×î´ó¹æÄ£µÄ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬Ò²ÊǸÃÒøÐÐÕû¸öÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷¡£¡£¡£¡£ ¡£¡£ÏÖÒÑÈ·¶¨´ó´ó¶¼¶ñÒâDDoSÇëÇó¶¼À´×ÔÍâÑó £¬£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÒ²Éæ¼°¶à¸ö¶íÂÞ˹µÄIPµØµã¡£¡£¡£¡£ ¡£¡£ºÚ¿ÍÍÅ»ïIT Army of UkraineÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ11ÔÂβÔÚTelegramÉÏÐû²¼Á˴˴λ¡£¡£¡£¡£ ¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬£¬£¬VTBµÄÃÅ»§ÍøÕ¾´¦ÓÚÀëÏß״̬ £¬£¬£¬£¬£¬£¬£¬£¬µ«ËùÓн¹µãЧÀͶ¼ÔÚÕý³£ÔËÐÐ £¬£¬£¬£¬£¬£¬£¬£¬¿Í»§Êý¾ÝҲδÊÜÓ°Ïì¡£¡£¡£¡£ ¡£¡£

https://www.bleepingcomputer.com/news/security/massive-ddos-attack-takes-russia-s-second-largest-bank-vtb-offline/

3¡¢MT BangladeshÉù³ÆÒÑÈëÇÖÓ¡¶ÈCBHE²¢ÇÔȡСÎÒ˽¼ÒÐÅÏ¢

ýÌå12ÔÂ5ÈÕ͸¶ £¬£¬£¬£¬£¬£¬£¬£¬ÃûΪTeamMysteriousBangladesh£¨MTBangladesh£©µÄÍÅ»ïÉù³ÆÒÑÈëÇÖÓ¡¶ÈÖÐÑë¸ßµÈ½ÌÓýίԱ»á(CBHE)µÄϵͳ¡£¡£¡£¡£ ¡£¡£¸ÃÍÅ»ïÌåÏÖÇÔÈ¡ÁË2004ÄêÖÁ2022ÄêµÄѧÉúÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÑù±¾¡£¡£¡£¡£ ¡£¡£CloudSEKÚ¹ÊÍ˵ £¬£¬£¬£¬£¬£¬£¬£¬»á¼ûCBHEDelhiƽ̨ÖÎÀíÃæ°åµÄÈκÎÈ˶¼¿ÉÒÔÉó²é2004ÄêÖÁ2022ÄêËùÓÐѧÉúµÄЧ¹û £¬£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ¿ÉÒÔɾ³ý»òÌí¼Ó¡£¡£¡£¡£ ¡£¡£Òò´Ë £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»ñµÃÁËÖÎÀíÃæ°åµÄ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬£¬È»ºóÆÆËðÁËCBHEµÄÊý¾Ý¡£¡£¡£¡£ ¡£¡£

https://cloudsek.com/threatintelligence/indian-central-board-of-higher-education-compromised-by-team-mysterious-bangladesh/

4¡¢Sysdig·¢Ã÷ʹÓÿªÔ´¹¤¾ßPRoot¹¥»÷LinuxϵͳµÄ»î¶¯

SysdigÔÚ12ÔÂ5ÈÕ³ÆÆä·¢Ã÷ºÚ¿ÍÔÚBYOF£¨×Ô´øÎļþϵͳ£©¹¥»÷ÖÐÀÄÓÿªÔ´¹¤¾ßPRoot £¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½«¹¥»÷¹æÄ£À©Õ¹µ½¶à¸öLinux¿¯Ðа沢¼ò»¯ÐëÒªµÄÊÂÇé¡£¡£¡£¡£ ¡£¡£PRoot²¢·Ç³öÓÚ¶ñÒ⿪·¢µÄ £¬£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÔÚLinuxÖÐÉèÖÃÒ»¸ö×ÔÁ¦µÄ¸ùÎļþϵͳ¡£¡£¡£¡£ ¡£¡£¸Ã»î¶¯Ê¹ÓÃPRootÔÚÒѱ»ÈëÇÖµÄϵͳÉÏ×°ÖöñÒâÎļþϵͳ £¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨masscan¡¢nmap¡¢XMRig cryptominer¼°ÆäÉèÖÃÎļþ¡£¡£¡£¡£ ¡£¡£Îļþϵͳ°üÀ¨¹¥»÷ËùÐèµÄÒ»ÇÐ £¬£¬£¬£¬£¬£¬£¬£¬ÕûÆëµØ´ò°üÔÚÒ»¸öGzipѹËõµÄtarÎļþÖС£¡£¡£¡£ ¡£¡£Ê¹ÓÃPRoot £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÏÕЩ²»±ØË¼Á¿Ä¿µÄµÄ¼Ü¹¹»òÂþÑÜ £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷·¾¶Ò²»ñµÃÁ˼ò»¯ £¬£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÐÂÓ±µÄ¹¥»÷ÊÖÒÕºÜÊÇǿʢ¡£¡£¡£¡£ ¡£¡£

https://sysdig.com/blog/proot-post-explotation-cryptomining/

5¡¢ResecurityÅû¶ÐµÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳

ýÌå12ÔÂ5ÈÕ³Æ £¬£¬£¬£¬£¬£¬£¬£¬Resecurity·¢Ã÷ÁËеÄÃæÏòÒÆ¶¯¶ñÒâÈí¼þ¿ª·¢µÄ°µÍøÂÛ̳In The Box¡£¡£¡£¡£ ¡£¡£InTheBoxÓÚ2020Äê1ÔÂ×óÓÒÊ״α»·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÌṩWebinjects¿ª·¢Ð§ÀÍ £¬£¬£¬£¬£¬£¬£¬£¬ÔÚ»ñµÃ×ã¹»µÄÐÅÓþºó £¬£¬£¬£¬£¬£¬£¬£¬ÔËÓªÖ°Ô±½«ÆäÀ©Õ¹ÎªÒ»¸öÍêÈ«²úÆ·»¯µÄ×Ô¶¯»¯Êг¡¡£¡£¡£¡£ ¡£¡£¸ÃÊг¡ÊÇÉæ¼°Òƶ¯×°±¸µÄÒøÐÐ͵ÇÔºÍڲƭµÄ×î´óºÍ×îÖ÷ÒªµÄ´ß»¯¼Á £¬£¬£¬£¬£¬£¬£¬£¬ÌṩÁËÁè¼Ý1849¸ö¶ñÒâ¼Æ»®¹© £¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ¼Æ»®ÊÇרΪÃÀ¹ú¡¢Ó¢¹úºÍ¼ÓÄôóµÈÁè¼Ý45¸ö¹ú¼ÒµÄÖ÷Òª½ðÈÚ»ú¹¹¡¢µç×ÓÉÌÎñ¡¢Ö§¸¶ÏµÍ³¡¢ÔÚÏßÁãÊÛÉ̺ÍÉ罻ýÌ幫˾Éè¼ÆµÄ¡£¡£¡£¡£ ¡£¡£ÔÚ2022Äê11ÔÂʱ´ú £¬£¬£¬£¬£¬£¬£¬£¬ÔËÓªÖ°Ô±¾ÙÐÐÁËÖØ´ó¸üР£¬£¬£¬£¬£¬£¬£¬£¬²¢¸ÄÉÆÁËÊÓ¾õÉè¼Æ¡£¡£¡£¡£ ¡£¡£


https://securityaffairs.co/wordpress/139310/cyber-crime/dark-web-mobile-malware-marketplace.html

6¡¢KasperskyÐû²¼¹ØÓÚ¶ñÒâÈí¼þÉú³¤Ç÷ÊÆµÄÆÊÎö±¨¸æ

12ÔÂ5ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼¹ØÓÚ½üÆÚ¶ñÒâÈí¼þÉú³¤Ç÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£2022Äêǰ10¸öÔ £¬£¬£¬£¬£¬£¬£¬£¬Ôâµ½Õë¶ÔÐÔÀÕË÷Èí¼þÓ°ÏìµÄÓû§Õ¼ËùÓÐÊÜÖÖÖÖ¶ñÒâÈí¼þÓ°ÏìµÄÓû§µÄ±ÈÀýÏÕЩͬ±È·­ÁËÒ»·¬ £¬£¬£¬£¬£¬£¬£¬£¬µÖ´ï0.26%¡£¡£¡£¡£ ¡£¡£LockBitÊÇÄ¿½ñ×îÊܽӴý¡¢×î¾ßÁ¢ÒìÐÔºÍÉú³¤×î¿ìµÄÀÕË÷Èí¼þ¼Ò×åÖ®Ò» £¬£¬£¬£¬£¬£¬£¬£¬³ýÁËPsExecÖ®Íâ £¬£¬£¬£¬£¬£¬£¬£¬ËüÏÖÔÚ»¹Ö§³Ö×ÔÎÒÈö²¥¡£¡£¡£¡£ ¡£¡£PlayÊÇ×î½üÓöµ½µÄÒ»ÖÖÐÂÀÕË÷Èí¼þ±äÌå £¬£¬£¬£¬£¬£¬£¬£¬Ò»µ©·¢Ã÷SMB×ÊÔ´¾Í»á½¨ÉèÅþÁ¬²¢ÊÔÍ¼×°ÔØËü £¬£¬£¬£¬£¬£¬£¬£¬ÔÚÔ¶³ÌϵͳÖÐÈö²¥ºÍÖ´ÐÐ×ÔÉí¡£¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬£¬Çý¶¯³ÌÐò¿ÉÄܰüÀ¨¹¥»÷ÕßÄܹ»Ê¹ÓõÄÎó²î¡£¡£¡£¡£ ¡£¡£

https://securelist.com/crimeware-report-ransomware-tactics-vulnerable-drivers/108197/