LockBit ÀÕË÷Èí¼þÍÅ»ïÒò¹ú¼ÊÖ´·¨Ðж¯¶øÍß½â
Ðû²¼Ê±¼ä 2024-02-212ÔÂ20ÈÕ£¬À´×Ô 11 ¸ö¹ú¼ÒµÄÖ´·¨»ú¹¹¿ªÕ¹µÄ´úºÅΪ¡°¿ËÂÞŵ˹Ðж¯¡±µÄÍŽáÖ´·¨Ðж¯£¬Éæ¼°LockBitÀÕË÷ÍŻÆäÍøÕ¾ÒѾ±»¿ØÖÆ¡£×Ô 2019 Äêµ×·ºÆðÒÔÀ´£¬¸Ã×éÖ¯µÄ¹æÄ£Ô¶Ô¶Áè¼ÝÆäËûÀÕË÷Èí¼þÍŻRecorded Future µÄÑо¿Ö°Ô±¿ìÒª 2,300 Æð¹¥»÷¹éÒòÓÚ¸Ã×éÖ¯¡£Conti Êǵڶþ»îÔ¾µÄ×éÖ¯£¬½ö¹ûÕæÓë 883 Æð¹¥»÷Óйء£×Ô 2020 Äê 1 ÔÂÒÔÀ´£¬Ê¹Óà LockBit µÄÁ¥Êô»ú¹¹Òѽ«Ä¿µÄËø¶¨ÔÚ½ðÈÚ·þÎñ¡¢Ê³ÎïºÍÅ©Òµ¡¢½ÌÓý¡¢ÄÜÔ´µÈÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄÖÖÖÖ¹æÄ£µÄ×éÖ¯¡£Õþ¸®ºÍ½ôÆÈ·þÎñ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìºÍÔËÊä¡£
https://therecord.media/lockbit-ransomware-disrupted-international-operation
2.Cactus ÀÕË÷Èí¼þÉù³ÆÇÔÈ¡ 1.5TB Ê©Ä͵µçÆøÊý¾Ý
2ÔÂ19ÈÕ£¬Cactus ÀÕË÷Èí¼þÍÅ»ïÉù³Æ£¬ËûÃÇÉϸöÔÂÈëÇÖÊ©Ä͵µçÆøÍøÂçºóÇÔÈ¡ÁË 1.5TB µÄÊý¾Ý¡£²¢ÔÚ°µÍøй¶ÍøÕ¾ÉÏ»¹Ð¹Â¶ÁË 25MB µÄ¾Ý³Æ±»µÁÊý¾Ý£¬×÷ΪÍþвÐÐΪÕßÉù³ÆµÄÖ¤¾Ý£¬±ðµÄÉÐÓÐÏÔʾ¼¸ÃûÃÀ¹ú¹«Ãñ»¤Õպͱ£ÃÜÐÒéÎļþɨÃèµÄ¿ìÕÕ¡£¸ÃÍÅ»ïÏÖÔÚÕýÔÚÀÕË÷¸Ã¹«Ë¾£¬²¢Íþв³Æ£¬ÈôÊDz»Ö§¸¶Êê½ð£¬¾Í»áй¶ËùÓоݳƱ»µÁµÄÊý¾Ý¡£ÏÖÔÚÉв»ÇåÎúÏêϸµÄÊý¾Ý±»µÁ£¬µ«Ê©Ä͵µçÆøµÄ¿ÉÒ»Á¬Éú³¤ÓªÒµ²¿·ÖΪȫÇòÐí¶à×ÅÃû¹«Ë¾Ìṩ¿ÉÔÙÉúÄÜÔ´ºÍî¿ÏµºÏ¹æ×Éѯ·þÎñ£¬°üÀ¨ Allegiant Travel Company¡¢Clorox¡¢DHL¡¢¶Å°î¡¢Ï£¶û¶Ù¡¢ÀûÃË¡¢°ÙÊ¿ÉÀÖºÍÎÖ¶ûÂê¡£¼øÓÚ´Ë£¬´ÓÆäÄ¿µÄϵͳÖÐÇÔÈ¡µÄÊý¾Ý¿ÉÄÜ°üÀ¨Óйؿͻ§¹¤Òµ¿ØÖƺÍ×Ô¶¯»¯ÏµÍ³µÄÃô¸ÐÐÅÏ¢ÒÔ¼°ÓйØÇéÐκÍÄÜÔ´¹æÔòºÏ¹æÐÔµÄÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/cactus-ransomware-claim-to-steal-15tb-of-schneider-electric-data/
3.Wyze ÉãÏñÍ·¹ÊÕϵ¼ÖÂÁè¼Ý 13000 Óû§ÊÜÓ°Ïì
2ÔÂ19ÈÕ£¬Wyze ·ÖÏíÁËÓ°ÏìÊýǧÃûÓû§µÄÇå¾²ÊÂÎñµÄ¸ü¶àϸ½Ú£¬¸Ã¹«Ë¾½«Æä¹é×ïÓÚ×î½üÌí¼Óµ½ÆäϵͳÖеĵÚÈý·½»º´æ¿Í»§¶Ë¿â£¬¸Ã¿âÔÚ´¦Öóͷ£ÖÜÎå´ó¹æģͣµçºóͬʱÉÏÏߵĴó×ÚÉãÏñ»úʱ·ºÆðÎÊÌâ¡£¡°Õâ´ÎÖÐÖ¹ÊÇÓÉÎÒÃǵÄÏàÖúͬ°é AWS Ôì³ÉµÄ£¬ÖÜÎåÆÆÏþ Wyze ×°±¸Í£»úÁ˼¸¸öСʱ¡£ÈôÊÇÄúÔÚÕâ¶Îʱ¼äÄÚʵÑéÉó²éʵʱÉãÏñÍ·»òÔ˶¯£¬Äú¿ÉÄÜÎÞ·¨Ô¢Ä¿¡£¹ØÓÚ¸øÄú´øÀ´µÄ´ì°Ü¸ÐºÍÒÉÐÄ£¬ÎÒÃÇÉî±íǸÒâÕâµ¼ÖÂÁË¡±¸Ã¹«Ë¾ÔÚ·¢Ë͸øÊÜÓ°ÏìÓû§µÄµç×ÓÓʼþÖÐÌåÏÖ¡£Wyze ÌåÏÖ£¬·ºÆðÕâÖÖÇéÐÎÊÇÓÉÓÚÐèÇóͻȻÔöÌí£¬µ¼ÖÂ×°±¸ ID ºÍÓû§ ID Ó³Éä»ìÏý£¬µ¼ÖÂijЩÊý¾ÝÓ벻׼ȷµÄÓû§ÕÊ»§¹ýʧÅþÁ¬¡£Òò´Ë£¬¿Í»§¿ÉÒÔÔÚµã»÷ Wyze Ó¦ÓóÌÐòµÄ¡°ÊÂÎñ¡±Ñ¡ÏÖеÄÏà»úËõÂÔͼºó¿´µ½ÆäËûÈ˵ÄÊÓƵԴËõÂÔͼ£¬ÔÚijЩÇéÐÎÏÂÉõÖÁ¿ÉÒÔ¿´µ½ÊÓƵƬ¶Ï¡£
https://www.bleepingcomputer.com/news/security/wyze-camera-glitch-gave-13-000-users-a-peek-into-other-homes/
4.Linux ÄÚºËȱÏÝ (CVE-2024-0646) ʹϵͳÃæÁÙȨÏÞÌáÉý
2ÔÂ19ÈÕ£¬Linux Äں˴«Êä²ãÇå¾²ÐÔ (kTLS) ÖеÄÎó²î(CVE-2024-0646)¿ÉÄܱ»ÍâµØÓû§Ê¹ÓÃÀ´»ñÈ¡ÌáÉýµÄϵͳȨÏÞ»òÖÐֹϵͳ²Ù×÷¡£ÐÒÔ˵ÄÊÇ£¬ÏÖÔÚÒѾÌṩÁËÕë¶Ô´ËÎó²îµÄ²¹¶¡¡£kTLS ½«»ù±¾µÄ TLS ¼ÓÃܺÍÉí·ÝÑéÖ¤¹¦Ð§Ö±½ÓÒýÈë Linux Äںˡ£Õâ¼ò»¯ÁË»ù±¾»¥ÁªÍøÐÒéµÄÇ徲ͨѶ£¬ÀýÈç HTTPS£¨Çå¾²ÍøÒ³ä¯ÀÀ£©¡¢µç×ÓÓʼþºÍÆäËû»¥ÁªÍøÅþÁ¬Ó¦ÓóÌÐò¡£¸ÃÎó²îµÄʵÖÊÔÚÓÚŲÓÃsplice() ʱÄÚ´æ´¦Öóͷ£²»µ±¡£KTLS ´úÂëÎÞ·¨×¼È·¸üÐÂÃ÷ÎÄÊèÉ¢ÍøÂ绺³åÇø ( struct sk_msg_sg ) µÄÄÚ²¿¼ÇÕÊ ( curr/copybreak ) £¬´Ó¶øµ¼ÖÂÔ½½çÄÚ´æдÈëȱÏÝ¡£ÄÚ´æÖÎÀíÖеÄÕâÖÖʧÎó¿ÉÄÜ»áÔÊÐíºóÐø¶ÔÌ×½Ó×ÖµÄдÈëÁýÕÖÆ´½ÓÒ³ÃæµÄÄÚÈÝ£¬´Ó¶øΣÏյذüÀ¨Å²ÓÃÕß²»Ó¦¾ßÓÐд»á¼ûȨÏÞµÄÎļþÖеÄÒ³Ãæ¡£¹¥»÷Õß¿ÉÄÜ»áʹÓôËÎó²îÒÔ·ÇÔ¤ÆÚµÄϵͳȨÏÞµ¼Ö´úÂëÒâÍâÖ´ÐС£
https://securityonline.info/linux-kernel-flaw-cve-2024-0646-exposes-systems-to-privilege-escalation/
5.Android ÒøÐÐľÂí Anatsa ¾íÍÁÖØÀ´ÐÂÔö˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿË
2ÔÂ19ÈÕ£¬ThreatFabric µÄÑо¿Ö°Ô±ÊӲ쵽AnatsaÒøÐÐľÂí£¨ÓÖÃû TeaBot ºÍ Toddler£©¾íÍÁÖØÀ´¡£11 ÔÂÖÁ 2 ÔÂʱ´ú£¬×¨¼ÒÃÇÊӲ쵽ÁËÎ岨²î±ðµÄ¹¥»÷£¬Ã¿Ò»²¨¶¼¼¯ÖÐÔÚ²î±ðµÄµØÇø¡£¸Ã¶ñÒâÈí¼þ´ËÇ°Ö÷ÒªÕë¶ÔÓ¢¹ú¡¢µÂ¹úºÍÎ÷°àÑÀ¾ÙÐÐÔ˶¯£¬µ«×îеÄÔ˶¯Õë¶ÔµÄÊÇ˹Âå·¥¿Ë¡¢Ë¹ÂåÎÄÄáÑǺͽݿˣ¬ÕâÅú×¢ÆäÔËÓªÕ½ÂÔ±¬·¢ÁËת±ä¡£Ñо¿Ö°Ô±½« Anatsa µÄÔ˶¯¹éÀàΪ¡°ÓÐÕë¶ÔÐÔ¡±£¬ÊӲ쵽ÍþвÐÐΪÕßÒ»´Î¼¯ÖÐÓÚ 3-5 ¸öÇøÓò¡£¾Ý ThreatFabric ³Æ£¬Í¶·ÅÆ÷Ó¦ÓóÌÐòÒÑÉÏ´«µ½Ä¿µÄÇøÓòµÄ Google Play ÉÏ¡£¹¥»÷Õß×¢Öص½ÕâЩӦÓóÌÐò¾³£½øÈë¡°ÈÈÃÅÐÂÃâ·Ñ¡±ÖÖ±ðÖеÄÇ°ÈýÃû£¬ÊÔͼÓÕÆÓû§ÐÅÍиÃÓ¦ÓóÌÐòÊÇÕýµ±µÄ²¢Óдó×ÚÓû§ÏÂÔØ¡£
https://securityaffairs.com/159344/malware/anatsa-banking-trojan-resurgence.html
6.Áè¼Ý 28500 ̨ Exchange ·þÎñÆ÷Ò×ÊÜ×Ô¶¯Ê¹ÓõÄÎó²î¹¥»÷
https://www.bleepingcomputer.com/news/security/over-28-500-exchange-servers-vulnerable-to-actively-exploited-bug/