CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹ÂÚÔ˶¯
Ðû²¼Ê±¼ä 2023-08-181¡¢CofenseÅû¶Ö÷ÒªÕë¶ÔÃÀ¹úijÄÜÔ´¹«Ë¾µÄ¶þάÂë´¹ÂÚÔ˶¯
CofenseÔÚ8ÔÂ16ÈÕÅû¶ÁËÒ»³¡Ê¹ÓöþάÂëµÄ´óÐÍ´¹ÂÚÔ˶¯£¬Ö÷ÒªÕë¶ÔÃÀ¹úµÄÒ»¼Ò´óÐÍÄÜÔ´¹«Ë¾¡£¸ÃÔ˶¯µÄƽ¾ùÔÂÔöÌíÂÊÁè¼Ý270%£¬×Ô5ÔÂÒÔÀ´ÕûÌåÔ˶¯ÔöÌíÁË2400%ÒÔÉÏ¡£¹¥»÷ÕßÊ×ÏÈ·¢ËÍð³äMicrosoftÇ徲֪ͨµÄÓʼþ£¬ÆäÖаüÀ¨PNG»òPDF¸½¼þ£¬ÒªÇóÓû§É¨Ãè¶þάÂ룬Ȼºó½«Ä¿µÄÖض¨Ïòµ½´¹ÂÚÍøÕ¾¡£¾Ýͳ¼Æ£¬¸ÃÔ˶¯29%µÄÁ÷Á¿Õë¶ÔµÄÊÇÄÜÔ´¹«Ë¾£¬ÆäËüÄ¿µÄÐÐÒµ°üÀ¨ÖÆÔìÒµ(15%)¡¢°ü¹ÜÒµ(9%)¡¢ÊÖÒÕ(7%)ºÍ½ðÈÚ·þÎñ£¨6%£©ÐÐÒµ¡£
https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/
2¡¢AT&T·¢Ã÷¹¹½¨°üÀ¨40Íò¸ö½ÚµãµÄ½©Ê¬ÍøÂçµÄ¹¥»÷Ô˶¯
8ÔÂ16ÈÕ£¬AT&T Alien Labs³ÆÆä·¢Ã÷ÁËÒ»Æð´ó¹æÄ£¹¥»÷Ô˶¯ÖÁÉÙÏò400000¸öWindowsÅÌËã»ú·Ö·¢ÁËÊðÀí·þÎñÆ÷Ó¦ÓóÌÐò¡£Ñо¿Ö°Ô±³Æ£¬ÔÚÒ»ÖÜÄھͷ¢Ã÷ÁËһǧ¶à¸öÔÚÒ°Íâ·Ö·¢ÊðÀíÓ¦ÓóÌÐòµÄжñÒâÈí¼þÑù±¾¡£¾ÝÊðÀíÍøÕ¾³Æ£¬ÊðÀí³ö¿Ú½ÚµãÁè¼Ý40Íò¸ö£¬Éв»ÇåÎúÆäÖÐÓм¸¶àÊDZ»¶ñÒâ´úÂë×°Öõġ£Ò»µ©×°Öõ½±»ÈëÇÖµÄϵͳÉÏ£¬¶ñÒâÈí¼þ¾Í»áÏÂÔز¢×°ÖÃÊðÀíÓ¦Ó᣼ÓÔسÌÐòÒþ²ØÔÚÆƽâÈí¼þºÍÓÎÏ·ÖУ¬ÇÒ×°Öò»ÐèÒªÓëÓû§¾ÙÐн»»¥¡£¸ÃÊðÀíÊÇÓÃGo¿ª·¢£¬ÓÉÓÚËüÒÑÊðÃûÒÔÊǼì²âΪÁã¡£
https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware
3¡¢Citrix ShareFileÎó²îCVE-2023-24489Òѱ»Ê¹ÓÃ
¾ÝýÌå8ÔÂ16ÈÕ±¨µÀ£¬CISAÌáÐÑCitrix ShareFileÎó²îCVE-2023-24489Òѱ»ÔÚҰʹÓá£Ê¹ÓøÃÎó²î£¬¹¥»÷Õß¿ÉÒÔ½«Web shellÉÏ´«µ½Ä¿µÄ×°±¸£¬À´»ñµÃ¶Ô´æ´¢¼°ÆäËùÓÐÎļþµÄÍêÈ«»á¼ûȨÏÞ£¬ÒÑÓÚ6ÔÂ13ÈÕ±»ÐÞ¸´¡£ÏÖÔÚ£¬GreyNoiseÒÑ·¢Ã÷72¸öIPµØµãÊÔͼʹÓûò¼ì²éShareFile·þÎñÆ÷ÊÇ·ñÈÝÒ×Ôâµ½¹¥»÷£¬ÆäÖдó´ó¶¼À´×Ôº«¹úÒÔ¼°·ÒÀ¼¡¢Ó¢¹úºÍÃÀ¹úµÈ¹ú¼Ò¡£CISAÒªÇóÕþ¸®»ú¹¹ÔÚ9ÔÂ6ÈÕ֮ǰӦÓò¹¶¡¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/
4¡¢Ñо¿Ö°Ô±ÔÚPowerShell GalleryÖмì²âµ½¶à¸öÎó²î
AquaÔÚ8ÔÂ16ÈÕ͸¶ÔÚPowerShell GalleryÖз¢Ã÷Á˶à¸ö¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷µÄÎó²î¡£PowerShell GalleryÓÉMicrosoftά»¤£¬ÊÇÒ»¸öÓÃÓÚ¹²ÏíºÍ»ñÈ¡PowerShell´úÂëµÄÖÐÑë´æ´¢¿â¡£µÚÒ»¸öÎó²îÉæ¼°¿íËɵİüÃûÕþ²ß£¬¹¥»÷Õß¿ÉÉÏ´«ÓëÏÖÓд洢¿âÃû³ÆÏàËƵĶñÒâPowerShellÄ£¿é¡£µÚ¶þ¸öÎó²îÉ漰αÔìÄ£¿éÔªÊý¾Ý£¬µ±»á¼ûPowerShellÄ£¿éÉÏ°¶Ò³Ãæʱ£¬ÏÕЩËùÓÐϸ½Ú¶¼¿ÉÄܱ»Î±Ô죬°üÀ¨¿ª·¢Õß¡¢°æȨºÍÐÎò¡£µÚÈý¸öÎó²î¿ÉÓÃÓÚö¾ÙËùÓаüÃû³ÆºÍ°æ±¾£¬°üÀ¨Î´ÁгöÇÒÒþ²ØÔÚ¹«ÖÚÊÓÒ°Ö®ÍâµÄÈí¼þ°ü¡£AquaÓÚ2022Äê9Ô±¨¸æÁËÕâЩÎó²î£¬Î¢Èí³ÆÒѽâ¾öÕâЩÎÊÌ⣬µ«ÏÖÔÚÎó²îÈÔÈ»¿ÉÒÔÖØÏÖ¡£
https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks
5¡¢CubaʹÓÃй¤¾ß¹¥»÷ÃÀ¹ú»ù´¡ÉèÊ©ºÍÀ¶¡ÃÀÖÞIT¼¯³ÉÉÌ
8ÔÂ17ÈÕ£¬Blackberry³ÆÀÕË÷ÍÅ»ïCubaʹÓÃй¤¾ß¹¥»÷ÁËÃÀ¹úµÄÒ»¸ö»ù´¡ÉèÊ©»ú¹¹ºÍÀ¶¡ÃÀÖÞµÄÒ»¼ÒIT¼¯³ÉÉÌ¡£¹¥»÷±¬·¢ÓÚ6Ô£¬Æ乤¾ß¼¯°üÀ¨×Ô½ç˵ÏÂÔسÌÐòBUGHATCH¡¢BURNTCIGAR¡¢MetasploitºÍCobalt Strike¿ò¼Ü£¬ÒÔ¼°´ó×ÚLOLBINS¡£¹¥»÷Ô˶¯»¹Ê¹ÓÃÁËNetLogonÎó²î£¨CVE-2020-1472£©ºÍVeeamÎó²î£¨CVE-2023-27532£©¡£ÖµµÃ×¢ÖصÄÊÇ£¬CubaµÄÍøÕ¾ÔÚÒÑÍù¼¸¸öÔÂÀïʱ¶ÏʱÐø£¬¾ÝÊӲ죬ÔÚÁгöеı»¹¥»÷Ä¿µÄʱ¸ÃÍøÕ¾¾Í»áÖØÐÂÉÏÏߣ¬È»ºóÔٴιرա£
https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america
6¡¢IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ý鶱¾Ç®µÄÆÊÎö±¨¸æ
8ÔÂ16ÈÕ£¬IBMÐû²¼ÁË2023ÄêÊý¾Ý鶱¾Ç®µÄÆÊÎö±¨¸æ£¬ÆÊÎöÁË2022Äê3ÔÂÖÁ2023Äê3ÔÂÍøÂçµÄÊý¾Ý¡£¸÷ÐÐÒµÊý¾Ý鶵Äƽ¾ù±¾Ç®Îª445ÍòÃÀÔª£¬¶øÒ½ÁÆÐÐÒµµÄƽ¾ù±¾Ç®ÊÇ×î¸ßµÄ£¬Îª1093ÍòÃÀÔª¡£ÒÑÍùÈýÄ꣬ҽÁƱ£½¡µÄ±¾Ç®ÔöÌíÁË53.3%¡£Óë¼òµ¥´æ´¢ÒªÁìÏà±È£¬¿ç¶à¸öÇéÐδ洢µÄÊý¾Ý鶱¾Ç®×î¸ß£¬¼ì²âºÍÓ¦¶ÔµÄƽ¾ùʱ¼äΪ291Ìì¡£´¹ÂÚÔ˶¯³ÉΪ×î³£Óõijõʼ¹¥»÷ÔØÌ壬ռ±È16%£¬Æä´ÎÊÇƾ֤й¶ºÍÔÆÉèÖùýʧ¡£Ò½ÁƱ£½¡ÐÐÒµÊý¾Ýй¶ÍùÍù»áÒ»Á¬231Ìì²Å±»·¢Ã÷£¬¶øÆäËüÐÐÒµÔòΪ204Ìì¡£
https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/