ÃÀ¹úÃÜЪ¸ù´óѧÔâµ½¹¥»÷ËùÓÐϵͳºÍ·þÎñÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-08-31

1¡¢ÃÀ¹úÃÜЪ¸ù´óѧÔâµ½¹¥»÷ËùÓÐϵͳºÍ·þÎñÔÝʱÖÐÖ¹


¾ÝýÌå8ÔÂ29ÈÕ±¨µÀ£¬ÃÀ¹úÃÜЪ¸ù´óѧ(UM)Ôâµ½ÍøÂç¹¥»÷£¬ËùÓÐϵͳºÍ·þÎñÔÝʱÖÐÖ¹¡£ÔÚÉÏÖÜÈÕ£¬ÃÜЪ¸ù´óѧ±¬·¢ÁËÍøÂçÇå¾²ÊÂÎñ£¬Ñ§Ð£³ÆÔÚ¾­ÓÉ×ÐϸÆÀ¹Àºó¾öÒéÇжϻ¥ÁªÍø¡£Õâ°üÀ¨ÓÐÏߺÍWiFiУ԰Íø¡¢M-Pathways¡¢eResearch¡¢DARTÒÔ¼°Ñ§Éú×¢²áÖÐʹÓõÄËùÓÐϵͳ¡£È»¶ø£¬ÊÂÎñ±¬·¢ÔÚÐÂѧÄêǰϦ£¬ÆäʱѧÉúºÍÎ÷ϯÕý×¼±¸¿ª¿Î¡£Òò´Ë£¬UM¾öÒéÃâÈ¥8Ô·ݵÄÓâÆÚ×¢²á»òÍËѧÓöÈ¡£ÔÚÏß·þÎñ¿ÉÄÜÐèÒª¼¸Ìì²Å»ª»Ö¸´£¬¸ÃУҲûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄÖÃÆÀÇëÇó¡£


https://www.bleepingcomputer.com/news/security/university-of-michigan-shuts-down-network-after-cyberattack/


2¡¢Forever 21Åû¶һÆðÉæ¼°½ü54ÍòÔ±¹¤µÄÊý¾Ýй¶ÊÂÎñ


¾Ý8ÔÂ30ÈÕ±¨µÀ£¬Ê±ÉÐÁãÊÛÉÌForever 21֪ͨԼ54ÍòÃû¼ÓÈ빫˾¿µ½¡ÍýÏëµÄÔ±¹¤£¬ËûÃǵÄÐÅÏ¢Òѱ»Ð¹Â¶¡£Forever 21³Æ£¬ËûÃÇÔÚ3ÔÂ20ÈÕ·¢Ã÷Ò»ÆðÍøÂçÇå¾²ÊÂÎñ¡£ËæºóµÄÊÓ²ìÈ·¶¨£¬¹¥»÷ÕßÔÚ1ÔÂ5ÈÕÖÁ3ÔÂ21ÈÕ»á¼ûÁËForever 21µÄ²¿·Öϵͳ¡£ËäÈ»Forever 21ûÓв¢Ã»ÓÐÖ±½ØÁËÍâµØ˵ÓÐÀÕË÷ÒªÇ󣬵«ËûÃÇÔÚÐÅÖеÄÓïÑÔÅú×¢£¬²»µ«ÓÐÀÕË÷ÒªÇ󣬲¢ÇÒForever 21»¹Ïò¹¥»÷Õß½»ÁËÊê½ð£¬ÒÔ»ñµÃɾ³ýÊý¾ÝµÄ°ü¹Ü¡£¸ÃÊÂÎñÓ°ÏìÁË539207СÎÒ˽¼Ò£¬ËûÃǽ«»ñµÃ12¸öÔµÄÉí·Ý¼à¿Ø·þÎñ¡£


https://www.databreaches.net/forever-21-notifies-540000-of-breach-affecting-employees-enrolled-in-firms-health-plan/


3¡¢·áÌïµÄ¶©µ¥ÏµÍ³·ºÆð¹ÊÕϵ¼ÖÂ14¸öÉú²ú³µ¼äÍ£²ú36Сʱ


ýÌå8ÔÂ30Èճƣ¬ÈÕ±¾·áÌ﹫˾µÄ¶©µ¥ÏµÍ³·ºÆð¹ÊÕÏ£¬µ¼ÖÂ14¸öÉú²ú³µ¼äµÄ28ÌõÉú²úÏßÍ£²ú¡£¹ÊÕÏ×îÏÈÓÚ±¾ÖÜÒ»Íí¼ä£¬Éú²úÓÚ±¾ÖÜÈý°´ÍýÏë»Ö¸´¡£Õâ¼ÒÆû³µÖÆÔìÉÌÒÔÆ侫Òæ׼ʱµÄÉú²úϵͳÖøÃû£¬²¢ÒÔΪ¸Ãϵͳ·Ç³£¿É¿¿¡£ÕâÒâζ×Å·áÌïÆû³µµÄÁ㲿¼þ¿â´æÁ¿¼«µÍ£¬ÏÕЩÔÚÐèҪװÖõ½Æû³µÉÏʱÕâЩÁã¼þ²Å»á¾Íλ¡£¸Ã¹«Ë¾ÔÚÖܶþÌåÏÖ£¬ÏµÍ³¹ÊÕϲ¢·Ç¹¥»÷µ¼ÖµÄ£¬µ«ËûÃǽ«¼ÌÐøÊÓ²ìÔµ¹ÊÔ­ÓÉ¡£


https://www.theregister.com/2023/08/30/toyota_japan_production_resumes/


4¡¢MandiantÅû¶UNC4841ʹÓÃBarracudaÎó²î¹¥»÷µÄϸ½Ú


MandiantÔÚ8ÔÂ30ÈÕÅû¶Á˹ØÓÚUNC4841ʹÓÃBarracudaÎó²îµÄ¹¥»÷Ô˶¯µÄϸ½Ú¡£Ôڴ˴ι¥»÷Ô˶¯ÖУ¬½üÈý·ÖÖ®Ò»±»¹¥»÷µÄ×°±¸ÊôÓÚÕþ¸®»ú¹¹£¬ÆäÖдó´ó¶¼ÊÇÔÚ2022Äê10ÔÂÖÁ12ÔÂʱ´ú±¬·¢µÄ¡£´ó²¿·Ö¹¥»÷Õë¶ÔÃÀÖÞ(55%)£¬Æä´ÎÊÇÅ·ÖÞ¡¢Öж«ºÍ·ÇÖÞ(24%)ÒÔ¼°ÑÇÌ«µØÇø(22%)¡£Mandiant»¹¹ûÕæÁËUNC4841Èý¸öÓÐÕë¶ÔÐԵŤ¾ßSKIPJACK¡¢ DEPTHCHARGEºÍFOXTROTµÄϸ½Ú£¬ÒÔ¼°ËüÊÇÔõÑùºáÏòÒƶ¯µÄ¡£FBIÔøÔÚÉÏÖÜÐû²¼Í¨¸æ³ÆÕë¶ÔBarracudaÎó²îµÄ²¹¶¡ÎÞЧ£¬½¨ÒéÓû§¾¡¿ì¸ôÀëºÍÌæ»»±»ºÚµÄ×°±¸¡£


https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation


5¡¢Juniper·¢Ã÷DreamBusʹÓÃRocketMQÎó²îµÄ¹¥»÷Ô˶¯


8ÔÂ28ÈÕ£¬Juniper³ÆÆä·¢Ã÷Á˽©Ê¬ÍøÂçDreamBusʹÓÃRocketMQÎó²îµÄ¹¥»÷Ô˶¯¡£±»Ê¹ÓõÄÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-33246£©£¬ÓÚ5Ô·ݱ»Åû¶¡£Juniper³Æ£¬ÔÚ6ÔÂÉÏÑ®·¢Ã÷ÁËÊ×´ÎʹÓøÃÎó²îµÄ¹¥»÷Ô˶¯£¬Ö÷ÒªÕë¶ÔRocketMQµÄĬÈÏ10911¶Ë¿ÚºÍÆäËü7¸ö¶Ë¿Ú¡£¹¥»÷ÕßʹÓÿªÔ´Õì̽¹¤¾ßinteractshÈ·¶¨Èí¼þ°æ±¾£¬»¹´ÓTorÊðÀí·þÎñÏÂÔضñÒâbash¾ç±¾reketed£¬ËüÊÇDreamBusÖ÷Ä£¿é£¨ELFÎļþ£©µÄÏÂÔغÍ×°ÖóÌÐò¡£´Ë´ÎÔ˶¯µÄÖ÷ҪĿµÄËƺõÊÇÃÅÂÞ±ÒµÄÍÚ¿ó¡£


https://blogs.juniper.net/en-us/threat-research/dreambus-botnet-resurfaces-targets-rocketmq-vulnerability


6¡¢FlashpointÐû²¼ÐºڿÍÂÛ̳RansomedµÄÆÊÎö±¨¸æ


8ÔÂ28ÈÕ£¬FlashpointÐû²¼Á˹ØÓÚкڿÍÂÛ̳RansomedµÄÆÊÎö±¨¸æ¡£8ÔÂ15ÈÕ£¬Ransomed³ÉΪһ¸öеĺڿÍÂÛ̳¡£µ«ÔÚRansomedµÄÔ˶¯ÕæÕý×îÏÈ֮ǰ£¬¸ÃÍøÕ¾¾ÍÔâµ½ÁËDDoS¹¥»÷¡£×÷Ϊ»ØÓ¦£¬¸ÃÍøÕ¾µÄÔËÓªÍÅ»ïѸËÙ½«ÆäÖØËÜΪһ¸öÀÕË÷Èí¼þ²©¿Í¡£RansomedÕýÔÚʹÓÃÒ»ÖÖеÄÀÕË÷Õ½ÂÔ£¬ËûÃÇͨ¹ýÅ·Ã˵ÄGDPRµÈÊý¾Ý±£»¤·¨À´ÍþвĿµÄ£¬ÈôÊÇËûÃDz»½»Êê½ð¾Í»á±»·£¿î¡£ÏÖÔÚÉв»ÇåÎú¸ÃÍÅ»ïÊÇ·ñÕæµÄÔÚ°²ÅÅÀÕË÷Èí¼þ£¬»òÕßÖ»ÊÇÉù³ÆÊý¾Ý±»µÁ¡£FlashpotÌåÏÖ£¬Ransomed±³ºóµÄºÚ¿Í¿ÉÄÜÓëBreachForumsºÍExposedµÈÊý¾Ýй¶ÍøÕ¾ÓйØÁª¡£


https://flashpoint.io/blog/ransomed-uncertain-cyber-threat/