ÒÔÉ«ÁÐÊ×¶¼ÌØÀ­Î¬·òµÄµØÌúµÄÍøÂçÔâµ½´ó¹æÄ£¹¥»÷

Ðû²¼Ê±¼ä 2022-07-07

1¡¢ÒÔÉ«ÁÐÊ×¶¼ÌØÀ­Î¬·òµÄµØÌúµÄÍøÂçÔâµ½´ó¹æÄ£¹¥»÷


ÒÁÀÊ·¨¶û˹ͨѶÉ磨Fars News Agency£©7ÔÂ4ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ÒÔÉ«ÁÐÊ×¶¼ÌØÀ­Î¬·òµÄµØÌúµÄ²Ù×÷ϵͳºÍЧÀÍÆ÷Ôâµ½ÁË´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¸Ã»ú¹¹ØÊºóÓֳƣ¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÏÖʵÉÏÊÇÕë¶ÔÒ»¼Ò¼ÓÈëÌØÀ­Î¬·òµØÌúϵͳ½¨ÉèµÄ¹«Ë¾¡£¡£°ÍÀÕ˹̹×éÖ¯Sabareenͨ¹ýÆäTelegramƵµÀÉù³Æ¾ÙÐÐÁ˹¥»÷£¬£¬£¬£¬£¬Æ¾Ö¤¸ÃÍÅ»ïµÄTelegramÖÐÆäËüµÄ±¨µÀ£¬£¬£¬£¬£¬ÒÁÀ­¿ËºÚ¿ÍÍÅ»ïAl-TaheraÒ²Ãé×¼ÁËÒÔÉ«ÁÐÊý×ÖÇ鱨»ú¹¹¡£¡£


https://securityaffairs.co/wordpress/132897/hacking/tel-aviv-metro-company-attacked.html


2¡¢ITЧÀ͹«Ë¾SHI³ÆÆäÔ⵽רҵµÄ¶ñÒâÈí¼þ¹¥»÷


¾ÝýÌå7ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬Î»ÓÚÐÂÔóÎ÷ÖݵÄÐÅÏ¢ÊÖÒÕIT²úÆ·ºÍЧÀÍÌṩÉÌSHI International³Æ£¬£¬£¬£¬£¬ÆäÔÚÉÏÖÜÄ©Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£SHI×Ô³ÆÊDZ±ÃÀ×î´óµÄITЧÀ͹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬2021ÄêµÄÊÕÈëΪ123ÒÚÃÀÔª¡£¡£¹¥»÷±¬·¢ÔÚ7ÔÂ4ÈÕ£¬£¬£¬£¬£¬Ö®ºóSHIÔÚÆäÍøÕ¾ÉÏÌí¼ÓÁËÒ»ÌõÐÂÎųƣ¬£¬£¬£¬£¬ÓÉÓÚÒ»Á¬ÖÐÖ¹£¬£¬£¬£¬£¬ÆäÐÅϢϵͳÕýÔÚ¾ÙÐÐά»¤¡£¡£×Ô¹¥»÷ÒÔÀ´£¬£¬£¬£¬£¬²¿·ÖÍøÕ¾»á·µ»Ø¹ýʧ¡°Amazon CloudFront/S3 SHI¡±¡£¡£ÎªÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬SHI½«ÆäÍøÕ¾ºÍµç×ÓÓʼþµÈϵͳ¹Ø±Õ£¬£¬£¬£¬£¬Ö±µ½ÖÜÈýÔçÉϲŻָ´¡£¡£SHI»¹ÌåÏÖ£¬£¬£¬£¬£¬Æä¹©Ó¦Á´ÖеĵÚÈý·½ÏµÍ³Ã»ÓÐÊܵ½Ó°Ïì¡£¡£


https://www.bleepingcomputer.com/news/security/it-services-giant-shi-hit-by-professional-malware-attack/


3¡¢Ñо¿ÍŶÓÅû¶ÐÂÀÕË÷ÍÅ»ïRedAlertµÄ¹¥»÷»î¶¯µÄϸ½Ú


ýÌå7ÔÂ5ÈÕ±¨µÀ£¬£¬£¬£¬£¬MalwareHunterTeam·¢Ã÷ÁËÒ»¸öеÄÀÕË÷ÍÅ»ïRedAlert£¨»òN13V£©¡£¡£¸ÃÀÕË÷Èí¼þµÄLinux¼ÓÃÜÆ÷ÊÇÕë¶ÔVMware ESXiЧÀÍÆ÷¿ª·¢µÄ£¬£¬£¬£¬£¬Ö»½ÓÊÜÃÅÂÞ±Ò¾ÙÐÐÖ§¸¶¡£¡£¼ÓÃÜÎļþʱ»áʹÓÃNTRUEncrypt¹«Ô¿¼ÓÃÜËã·¨£¬£¬£¬£¬£¬¸ÃËã·¨Ö§³ÖÌṩ²î±ðÇå¾²¼¶±ðµÄÖݪֲÎÊý¼¯£¬£¬£¬£¬£¬ÒÑÖªµÄΨÖðÒ»¸öʹÓô˼ÓÃÜËã·¨µÄÀÕË÷ÍÅ»ïÊÇFiveHands¡£¡£ËäÈ»Ñо¿Ö°Ô±Ö»ÕÒµ½ÁËÒ»¸öLinux¼ÓÃÜÆ÷£¬£¬£¬£¬£¬µ«Í¨¹ýÆäÖ§¸¶ÍøÕ¾Òþ²ØµÄÔªËØÈ·¶¨Windows½âÃÜÆ÷Ò²±£´æ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬RedAlertÊý¾ÝÐ¹Â¶ÍøÕ¾½ö°üÀ¨Ò»¸ö×éÖ¯µÄÊý¾Ý£¬£¬£¬£¬£¬Åú×¢¸ÃÍÅ»ïºÜÊÇС£¡£


https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/


4¡¢¹¥»÷ÕßÉù³ÆÒÑÇÔÈ¡ÍòºÀ°üÀ¨ÐÅÓÿ¨ÐÅÏ¢ÔÚÄÚµÄ20GBÊý¾Ý


¾ÝýÌå7ÔÂ5Èճƣ¬£¬£¬£¬£¬ÍòºÀ¼¯ÍÅÔٴα»ºÚ£¬£¬£¬£¬£¬Ð¹Â¶Ô¼20 GBµÄÊý¾Ý¡£¡£DataBreachesÔÚ6ÔÂ28ÈÕÊÕµ½ÁËÒ»·âÀ´×Ôδ֪·¢¼þÈ˵ÄÓʼþ£¬£¬£¬£¬£¬Ö÷ÌâÊÇ¡°ÍòºÀÂùݵÄÎ¥¹æÐÐΪ£¡ºÜÖ÷Òª£¡¡±¡£¡£¹¥»÷Õ߳ƣ¬£¬£¬£¬£¬ËûÃÇԼĪһ¸öÔÂǰÈëÇÖÁËÍòºÀ£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË20 GBµÄÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¶Ô¹¥»÷ÕßÌṩµÄ¼¸¸öÎļþµÄ¼ì²éÅú×¢£¬£¬£¬£¬£¬ËüÃÇÀ´×ÔÂíÀïÀ¼ÖݵÄBWI»ú³¡ÍòºÀÂùݣ¨BWIA£©¡£¡£ÍòºÀÌåÏÖ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñµÄÔµ¹ÊÔ­ÓÉÊÇÆäÒ»ÃûÔ±¹¤Ôâµ½ÁËÉ繤¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÒÔ»á¼û¸ÃÔ±¹¤µÄÅÌËã»ú¡£¡£


https://www.databreaches.net/exclusive-marriott-hacked-again-yes-heres-what-we-know/


5¡¢CloudSEK·¢Ã÷ð³ä°¢ÁªÇõÕþ¸®Ö°Äܲ¿·ÖµÄ´¹Âڻ


7ÔÂ4ÈÕ£¬£¬£¬£¬£¬CloudSEKÅû¶ÁËð³ä°¢ÁªÇõÕþ¸®Ö°Äܲ¿·ÖµÄ´¹ÂڻµÄϸ½Ú¡£¡£´ËÂÖ¹¥»÷Ö÷ÒªÕë¶Ô½ðÈÚ¡¢ÂÃÓΡ¢Ò½Ôº¡¢Ö´·¨¡¢Ê¯ÓͺÍ×ÔÈ»ÆøÒÔ¼°×ÉѯÐÐÒµµÄÖÖÖÖÕþ¸®ºÍÆóҵʵÌå¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸öαÔìµÄÍøÕ¾www.mohregov-ae[.]com£¨Õýµ±ÍøÕ¾Îªwww[.]mohre[.]gov[.]ae£©¡£¡£Í¨¹ýÊÓ²ì¸ÃÍøÕ¾µÄ×¢²áÐÅÏ¢£¬£¬£¬£¬£¬·¢Ã÷ÁË43¸öʹÓÃÏàͬע²áÐÅÏ¢µÄÓò£¬£¬£¬£¬£¬ÕâЩÓò±»ÓÃÓÚÕë¶ÔÔÚÖж«µØÇøÑ°ÕÒÊÂÇéµÄÒÆÃñ¹¤È˵Ĺ¥»÷£¬£¬£¬£¬£¬ÒÔ¼°Õë¶ÔÆóÒµµÄBECÕ©Æ­¡£¡£


https://www.cloudsek.com/threatintelligence/advanced-phishing-scams-target-individuals-businesses-in-the-middle-east/


6¡¢MicrosoftÐû²¼¹ØÓÚÀÕË÷Èí¼þHiveµÄÊÖÒÕÆÊÎö±¨¸æ


MicrosoftÔÚ7ÔÂ5ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þHiveµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬HiveµÄ×îбäÖÖ¾ÙÐÐÁ˶àÏîÖØ´óÉý¼¶£¬£¬£¬£¬£¬×îÏÔÖøµÄת±äÊǰüÀ¨£ºÍêÕûµÄ´úÂëǨáãµ½ÁíÒ»ÖÖ±à³ÌÓ£¬£¬£¬£¬Ð±äÌåÓÉÔ­À´µÄGoLang±àдת±äΪÓÃRust±àд£¬£¬£¬£¬£¬ÊǼÌBlackCatÖ®ºóµÚ¶þ¸öÓøÃÓïÑÔ±àдµÄÀÕË÷Èí¼þ£»£»£»£»£»£»ÐµıäÌåʹÓÃÒ»Ìײî±ðµÄ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬ÍÖÔ²ÇúÏßDiffie-Hellmann£¨ECDH£©£¬£¬£¬£¬£¬ÇÒËü²»ÊÇÔÚ¼ÓÃܵÄÿ¸öÎļþÖÐǶÈëÒ»¸ö¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬¶øÊÇÔÚÄÚ´æÖÐÌìÉúÁ½Ì×ÃÜÔ¿À´¼ÓÃÜÎļþ£¬£¬£¬£¬£¬È»ºó½«ÕâÁ½Ì×ÃÜÔ¿¼ÓÃܲ¢Ð´ÈëËüËù¼ÓÃܵÄÇý¶¯Æ÷µÄrootÖС£¡£


https://www.microsoft.com/security/blog/2022/07/05/hive-ransomware-gets-upgrades-in-rust/