΢ÈíÖÒÑÔÕýµ±ÎļþÍйÜЧÀͳÉÍøÂç´¹ÂÚÐÂÇþµÀ
Ðû²¼Ê±¼ä 2024-10-091. ΢ÈíÖÒÑÔÕýµ±ÎļþÍйÜЧÀͳÉÍøÂç´¹ÂÚÐÂÇþµÀ
10ÔÂ8ÈÕ£¬£¬£¬£¬£¬Microsoft Threat Intelligence±¨¸æÖ¸³ö£¬£¬£¬£¬£¬Ê¹ÓÃSharePoint¡¢OneDriveºÍDropboxµÈÕýµ±ÎļþÍйÜЧÀÍÌᳫµÄÉÌÒµµç×ÓÓʼþÈëÇÖ£¨BEC£©¹¥»÷ÍøÂç´¹ÂڻÕýÔÚÉÏÉý¡£¡£¡£¡£¡£ÕâЩ»î¶¯×Ô2024Äê4ÔÂÖÐÑ®×îÏÈ£¬£¬£¬£¬£¬½ÓÄÉÖØ´ó·ÀÓù¹æ±ÜÊÖÒÕÈÆ¹ýÇå¾²²½·¥£¬£¬£¬£¬£¬µ¼ÖÂÉí·ÝµÁÓá¢×°±¸Ê§Ôô£¬£¬£¬£¬£¬ÉõÖÁÒýÅÕþڲơ¢Êý¾Ýй¶¼°×éÖ¯ÄÚ²¿ºáÏòÒÆ¶¯¡£¡£¡£¡£¡£ÎļþÍйÜЧÀÍËäΪÆóÒµÊý¾Ý´æ´¢ºÍ¹²ÏíÌṩÁ˱㵱£¬£¬£¬£¬£¬µ«Ò²ÒòÆÕ±éʹÓöø³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÉç½»¹¤³Ì»ñÈ¡ÊÜÐÅÈÎÕË»§È¨ÏÞ£¬£¬£¬£¬£¬ÀÄÓÃÆ½Ì¨·¢ËÍ¿´ËÆÀ´×Ô¿ÉÐÅȪԴµÄ¶ñÒâÎļþ»òÁ´½Ó£¬£¬£¬£¬£¬±Ü¿ª¹Å°å¼ì²â¡£¡£¡£¡£¡£Î¢Èí·¢Ã÷£¬£¬£¬£¬£¬ÏÞÖÆ»á¼ûºÍÖ»¶ÁÎļþÕ½ÂÔ±»ÆÕ±éÓ¦ÓÃÒÔÌÓ±ÜÇ徲ϵͳ¼ì²â£¬£¬£¬£¬£¬Ê¹Ç徲ɨÃèºÍÆÊÎö¶ñÒâÁ´½Ó±äµÃÄÑÌâ¡£¡£¡£¡£¡£¹¥»÷ͨ³£Ê¼ÓÚÈëÇÖÊÜÐÅÈι©Ó¦ÉÌÕË»§£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâÎļþ²¢ÓëÄ¿µÄ×éÖ¯¹²Ïí£¬£¬£¬£¬£¬Ê¹ÓÃÐÅÈιØÏµÈƹýÇå¾²¹ýÂËÆ÷¡£¡£¡£¡£¡£¹¥»÷Õß»¹»áð³äITÖ§³Ö»òÖÎÀíÔ±£¬£¬£¬£¬£¬Ê¹ÓýôÆÈ»òÊìϤ¸ÐÇ¿µÄÎļþÃûÓÕµ¼Óû§·¿ªÎļþ¡£¡£¡£¡£¡£Ò»µ©Óû§Í¨¹ýÒ»´ÎÐÔÃÜÂëÑéÖ¤Éí·Ý£¬£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½¶ñÒâÖÐÐÄÈËÍøÂç´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬ÒªÇóÌṩÃÜÂëºÍÍê³É¶àÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬¹¥»÷Õß´Ó¶ø²¶»ñ»á»°ÁîÅÆ¾ÙÐнøÒ»²½Ê¹Óᣡ£¡£¡£¡£
https://securityonline.info/microsoft-warns-of-sophisticated-identity-phishing-campaigns-misusing-file-hosting-services/
2. GoldenJackal APT×éÖ¯Í»ÆÆÅ·ÖÞÕþ¸®¸ôÀëϵͳÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ8ÈÕ£¬£¬£¬£¬£¬ÃûΪGoldenJackalµÄAPTºÚ¿Í×é֯ʹÓÃÁ½Ì××Ô½ç˵¹¤¾ßÀÖ³ÉÉøÍ¸ÁËÅ·ÖÞÕþ¸®µÄ¸ôÀëϵͳ£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨µç×ÓÓʼþ¡¢¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢µµ°¸ºÍÎĵµµÈÔÚÄڵĶàÖÖÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¾ÝESET±¨¸æ£¬£¬£¬£¬£¬¸Ã×éÖ¯ÖÁÉÙÁ½´ÎʵÑé´ËÀ๥»÷£¬£¬£¬£¬£¬Ò»´ÎÕë¶ÔÄÏÑǹú¼Òפ°×¶íÂÞ˹´óʹ¹Ý£¬£¬£¬£¬£¬ÁíÒ»´ÎÔòÕë¶ÔijŷÖÞÕþ¸®×éÖ¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚѬȾ»¥ÁªÍøÅþÁ¬ÏµÍ³£¬£¬£¬£¬£¬Ê¹ÓÃľÂíÈí¼þ»ò¶ñÒâÎĵµÒÔ¼°ÃûΪGoldenDealerµÄ¶ñÒâÈí¼þ¼à¿ØUSBÇý¶¯Æ÷µÄʹÓ㬣¬£¬£¬£¬²¢ÔÚÇý¶¯Æ÷²åÈë¸ôÀëϵͳʱ¸´ÖƶñÒâ×é¼þ¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬GoldenRoboɨÃè²¢ÇÔÈ¡¸ôÀëϵͳÉϵÄÓмÛÖµÐÅÏ¢£¬£¬£¬£¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷½«Êý¾Ý´«Ê仨Ôʼ»¥ÁªÍøÅþÁ¬ÏµÍ³£¬£¬£¬£¬£¬×îÖÕ·¢Ë͸ø¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£GoldenHowl×÷Ϊ¶à¹¦Ð§PythonºóÃÅ£¬£¬£¬£¬£¬ÔÚÅþÁ¬»¥ÁªÍøµÄ»úеÉÏÔËÐУ¬£¬£¬£¬£¬ÊµÏÖÎļþÇÔÈ¡¡¢³¤ÆÚÐÔ¼á³Ö¡¢Îó²îɨÃèºÍC2ͨѶ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/european-govt-air-gapped-systems-breached-using-custom-malware/
3. Red BarrelsÔâÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÓÎÏ·¿ª·¢ÊÜÓ°Ïì
10ÔÂ4ÈÕ£¬£¬£¬£¬£¬¹ãÊÜºÃÆÀµÄ¿Ö²ÀÓÎϷϵÁС¶Outlast¡·µÄÖÆ×÷¹«Ë¾Red BarrelsÐû²¼£¬£¬£¬£¬£¬ÆäÔâÊÜÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬¿ª·¢Ê±¼ä±í±»´òÂÒ¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶ÈëÇÖµÄÏêϸϸ½Ú£¬£¬£¬£¬£¬µ«ÓÐÐÂÎųƹ¥»÷Õß»ñÈ¡ÁËÓÎÏ·Ô´´úÂë¡¢ÄÚ²¿°æ±¾¡¢Ô±¹¤¼Í¼¼°¹«Ë¾ÐÅÓÿ¨ÏêϸÐÅÏ¢µÈ´ó×ÚÓмÛÖµµÄÐÅÏ¢¡£¡£¡£¡£¡£Red BarrelsѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬Ô¼ÇëÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ²¢Í¨ÖªÏà¹ØÀûÒæ·½ºÍÕþ¸®£¬£¬£¬£¬£¬Í¬Ê±½ÓÄɲ½·¥È·±£ÏµÍ³Çå¾²¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¶ÔÊÂÇéÊÒµÄÔËÓª±¬·¢ÁËÖØ´óÓ°Ï죬£¬£¬£¬£¬µ¼ÖÂÖÆ×÷ʱ¼ä±íÊܵ½ÖØ´óÓ°Ï죬£¬£¬£¬£¬²¿·ÖÏîÄ¿²»µÃ²»ÍƳ١£¡£¡£¡£¡£Õâ¶ÔÆÚ´ý¡¶ÌÓÉúÊÔÁ¶¡·Ðû²¼µÄ·ÛË¿À´ËµÊÇÒ»¸ö¹¥»÷¡£¡£¡£¡£¡£Red BarrelsÒÑÈ·ÈÏÆä¶ÔÍøÂçÇå¾²µÄÔÊÐí£¬£¬£¬£¬£¬²¢ÌåÏÖ½«¼ÌÐøÊµÑé×î¼Ñʵ¼ù²½·¥£¬£¬£¬£¬£¬È·±£ÎªÔ±¹¤ÌṩÇå¾²ÇéÐΡ£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬ÊÓ²ìÒÑÍê³É£¬£¬£¬£¬£¬ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬£¬µ«ÍøÂç¹¥»÷µÄÓ°Ïì¿ÉÄÜ»¹»áÒ»Á¬Ò»¶Îʱ¼ä¡£¡£¡£¡£¡£
https://securityonline.info/red-barrels-hit-by-cyberattack-outlast-game-data-compromised/
4. FBCSÊý¾Ýй¶²¨¼°ComcastÓëTruist Bank£¬£¬£¬£¬£¬Êý°ÙÍò¿Í»§ÊÜÓ°Ïì
10ÔÂ6ÈÕ£¬£¬£¬£¬£¬¿µ¿¨Ë¹ÌØÓÐÏßͨѶ¹«Ë¾ (Comcast) ºÍ Truist Bank ¿ËÈÕÅû¶£¬£¬£¬£¬£¬ËûÃÇÊܵ½ FBCS Êý¾Ýй¶ÊÂÎñµÄÓ°Ï죬£¬£¬£¬£¬ÕýÔÚ֪ͨ¸÷×Ô¿Í»§Êý¾ÝÒѱ»Ð¹Â¶¡£¡£¡£¡£¡£FBCS ÊÇÒ»¼ÒÕ®Îñ´ßÊÕ»ú¹¹£¬£¬£¬£¬£¬½ñÄê4ÔÂת´ïÁËÒ»Æð±¬·¢ÔÚ2ÔÂÖÁ2ÔÂʱ´úµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäÍøÂç²¢ÇÔÈ¡ÁË´ó×ÚСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÕÊ»§ÐÅÏ¢¡¢¼ÝʻִÕÕºÅÂë»òÉí·ÝÖ¤µÈ¡£¡£¡£¡£¡£×î³õÊÜÓ°ÏìÈËÊýԼΪ190ÍòÈË£¬£¬£¬£¬£¬ºóÖð²½ÉÏÉýÖÁ420ÍòÈË¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿µ¿¨Ë¹ÌغÍTruistÊÇ×îб»Í¨ÖªÊÜÓ°ÏìµÄʵÌåÖ®Ò»£¬£¬£¬£¬£¬¿µ¿¨Ë¹ÌØÓÐ273,703Ãû¿Í»§ÊÜÓ°Ï죬£¬£¬£¬£¬¶øTruistµÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÐû²¼¡£¡£¡£¡£¡£FBCSµÄ²ÆÎñ״̬¶ñ»¯£¬£¬£¬£¬£¬ÊÜÊÂÎñ¼ä½ÓÓ°ÏìµÄʵÌåÐè×ÔÐоÙÐÐ֪ͨºÍµ÷½â³ÌÐò¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÈ˽«»ñµÃ12¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£È¥Äê6Ô£¬£¬£¬£¬£¬Truist BankÒ²ÔøÖ¤ÊµÒ»Æðµ¥¶ÀµÄÎ¥¹æÐÐΪ£¬£¬£¬£¬£¬ÆäʱһÃûÍþвÐÐΪÕßÔÚÒ»¸öºÚ¿ÍÂÛ̳ÉÏй¶Á˱»µÁÊý¾Ý¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/
5. »·ÇòÒôÀÖ¼¯ÍÅ680ÃûСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬£¬£¬£¬£¬Ìṩ24¸öÔÂÐÅÓÃ¼à¿ØÐ§ÀÍ
10ÔÂ7ÈÕ£¬£¬£¬£¬£¬»·ÇòÒôÀÖ¼¯ÍÅ7ÔÂ15ÈÕÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂ680ÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂëµÈ£¬£¬£¬£¬£¬±»²»·¨»ñÈ¡¡£¡£¡£¡£¡£¸ÃÊÂÎñÖ±µ½8ÔÂ30Èղű»¹«Ë¾·¢Ã÷¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬»·ÇòÒôÀÖ¼¯ÍÅ×î³õÔÚ7Ô³õµÄij¸öÄÚ²¿Ó¦ÓóÌÐòÖмà²âµ½Î´¾ÊÚȨµÄ»î¶¯£¬£¬£¬£¬£¬Ëæ¼´Æô¶¯½ôÆÈÏìÓ¦»úÖÆ£¬£¬£¬£¬£¬Ô¼ÇëµÚÈý·½×¨¼ÒÕö¿ªÖÜÈ«ÊÓ²ìÓëµ÷½â²½·¥¡£¡£¡£¡£¡£¾ÓÉһϵÁÐÉó²é£¬£¬£¬£¬£¬¹«Ë¾È·ÈÏСÎÒ˽¼ÒÐÅÏ¢Òѱ»Î´¾ÊÚȨµÄµÚÈý·½»ñÈ¡£¬£¬£¬£¬£¬²¢ÔÚ8ÔÂ30ÈÕ»ñµÃÉó²éЧ¹ûºó£¬£¬£¬£¬£¬ÒÀ¾ÝÖ´·¨ÒªÇ󣬣¬£¬£¬£¬ÏòÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢³öÁËÊý¾Ýй¶֪ͨ¡£¡£¡£¡£¡£ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÐÅÖÐÌá¼°£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¼°Éç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬»·ÇòÒôÀÖ¼¯ÍÅÉÐδ·¢Ã÷Êý¾Ý±»µÁÓõÄÇéÐΣ¬£¬£¬£¬£¬µ«ÎªÈ·±£ÊÜÓ°Ïì¸öÌåµÄ²ÆÎñÇå¾²£¬£¬£¬£¬£¬¹«Ë¾ÌṩÁËÓÉExperianÌṩµÄΪÆÚ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£ÖÁÓÚ´Ë´ÎÇå¾²Îó²îµÄÏêϸÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬»·ÇòÒôÀÖ¼¯ÍÅδÓè͸¶£¬£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌáÐÑËùÓÐÊÜÓ°ÏìÓû§¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬Ç×½ü¹Ø×¢ÈκÎÒì³£½ðÈڻ¼£Ï󡣡£¡£¡£¡£
https://securityaffairs.com/169502/data-breach/universal-music-group-data-breach.html
6. ÀÖ¸ßÍøÕ¾Ôâ¼ÓÃÜÇ®±ÒÆ×Ó¶ÌÔÝÈëÇÖ£¬£¬£¬£¬£¬Íƹã¼ÙÀָߴú±Ò
10ÔÂ7ÈÕ£¬£¬£¬£¬£¬ÀÖ¸ßÍøÕ¾ÔâÓöÁ˼ÓÃÜÇ®±ÒÆ×ӵĶÌÔÝÈëÇÖ¡£¡£¡£¡£¡£ºÚ¿Í½«ÍøÕ¾Ö÷ºá·ùÌæ»»ÎªÐû´«¼ÙÀָߴú±ÒµÄͼƬ£¬£¬£¬£¬£¬Éù³Æ¿ÉÓÃÒÔÌ«·»¹ºÖò¢½âËøÉñÃØ½±Àø¡£¡£¡£¡£¡£´Ë´ÎÈëÇÖ±¬·¢ÔÚÃÀ¹ú¶«²¿Ê±¼ä10ÔÂ5ÈÕÍíÉÏ9µã£¬£¬£¬£¬£¬Ò»Á¬Ô¼75·ÖÖÓ£¬£¬£¬£¬£¬Ö±µ½ÍíÉÏ10µã15·ÖÍøÕ¾²Å»Ö¸´¡£¡£¡£¡£¡£Óë³£¼ûµÄ¼ÓÃÜÇ®±ÒȦÌײî±ð£¬£¬£¬£¬£¬¸ÃȦÌײ¢Î´Ö¸µ¼Óû§ÖÁ¶ñÒâÍøÕ¾ÇÔÈ¡×ʲú£¬£¬£¬£¬£¬¶øÊǽ«»á¼ûÕß´øµ½Uniswapƽ̨¹ºÖÃȦÌ×´ú±Ò¡£¡£¡£¡£¡£ÀÖ¸ß֤ʵÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬µ«Î´Í¸Â¶ÈëÇÖϸ½Ú£¬£¬£¬£¬£¬ÌåÏÖûÓÐÓû§ÕË»§±»µÁ£¬£¬£¬£¬£¬¿Í»§¿ÉÕý³£¹ºÎ£¬£¬£¬£¬²¢ÒѽÓÄɲ½·¥±ÜÃâÔٴα¬·¢¡£¡£¡£¡£¡£´Ë´Î¹¥»÷×ÜÌåʧ°Ü£¬£¬£¬£¬£¬½öÉÙÊýÈ˹ºÖÃÁËÀָߴú±Ò¡£¡£¡£¡£¡£ÁîÈ˾ªÑȵÄÊÇ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¾¹½«ÀÖ¸ßÍøÕ¾ÓÃÓÚ¼ÓÃÜȦÌ×£¬£¬£¬£¬£¬¶ø·Ç¸ü³£¼ûµÄÇÔÈ¡¿Í»§ÐÅÏ¢·½·¨¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬ÍøÕ¾ÈëÇÖ»á×¢Èë¶ñÒâJavaScript£¬£¬£¬£¬£¬ÒÔÇÔÈ¡¿Í»§ÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬ÓÃÓÚÀÕË÷¡¢³öÊÛ»òÔÚÏßڲơ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/


¾©¹«Íø°²±¸11010802024551ºÅ