ͨѶ¹«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2023-05-04

1¡¢Í¨Ñ¶¹«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ


¾ÝýÌå5ÔÂ1ÈÕ±¨µÀ£¬£¬£¬Í¨Ñ¶¹«Ë¾T-MobileÅû¶ÁË2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¾ÝϤ£¬£¬£¬´Ó2ÔÂÏÂÑ®×îÏȵÄÒ»¸ö¶àÔÂÄÚ£¬£¬£¬¹¥»÷Õß¿ÉÒÔ»á¼ûÆäÊý°ÙÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£´Ë´ÎÊÂÎñ½öÓ°ÏìÁË836ÃûÓû§£¬£¬£¬¿ÉÊÇй¶µÄÐÅÏ¢Á¿ºÜÊÇÆÕ±é£¬£¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò½«ÃæÁÙÉí·ÝµÁÓúʹ¹ÂÚ¹¥»÷¡£¡£T-MobileÒÑΪÊÜÓ°ÏìÓû§ÖØÖÃÕÊ»§PIN£¬£¬£¬²¢Í¨¹ýTransunion myTrueIdentityÌṩ¡¢¹©Á½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ¼ì²âЧÀÍ¡£¡£1Ô·Ý£¬£¬£¬T-MobileÔâµ½ÁË2023ÄêµÄÊ×´ÎÊý¾Ýй¶£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁË3700ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£


https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/


2¡¢µÂ¹úITÌṩÉÌBitmarckÔâµ½¹¥»÷ËùÓÐϵͳÔÝʱ¹Ø±Õ


¾Ý5ÔÂ1ÈÕ±¨µÀ£¬£¬£¬µÂ¹úITЧÀÍÌṩÉÌÔâµ½ÁËÍøÂç¹¥»÷¡£¡£ÕâµÂ¹ú×î´óµÄIT¹«Ë¾Ö®Ò»£¬£¬£¬Îª¹«¹²¿µ½¡°ü¹ÜÁìÓòµÄ80¶à¼Ò×éÖ¯ÌṩÊÖÒÕ»ù´¡ÉèÊ©ºÍЧÀÍ¡£¡£¼ì²âµ½¹¥»÷ºó£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦¹Ø±ÕÁ˿ͻ§ºÍÄÚ²¿ÏµÍ³£¬£¬£¬ÒÔ¼°Êý¾ÝÖÐÐÄ¡£¡£¸Ã¹«Ë¾Ö¸³öûÓÐÊý¾Ýй¶£¬£¬£¬´æ´¢ÔÚEHRÖеϼÕßÊý¾Ý²»»áÊܵ½¹¥»÷µÄÓ°Ïì¡£¡£Ö»¹ÜЧÀÍÕýÔÚÖð½¥»Ö¸´£¬£¬£¬µ«BitmarckÔ¤¼ÆÔÚÖÐÖ¹ÈÔ½«¼ÌÐø¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶Óйع¥»÷µÄ¸ü¶àϸ½Ú¡£¡£1Ô·Ý£¬£¬£¬Bitmarck±¬·¢Êý¾Ýй¶£¬£¬£¬Ó°ÏìÁËÁè¼Ý300000Ãû±£µ¥³ÖÓÐÈË¡£¡£


https://securityaffairs.com/145568/hacking/bitmarck-cyberattack.html


3¡¢TBK DVR×°±¸Éí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2018-9995±»Ê¹ÓÃ


ýÌå5ÔÂ2Èճƣ¬£¬£¬Fortinet·¢Ã÷ʹÓÃTBK DVR×°±¸ÖÐÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-9995£©µÄ¹¥»÷¼¤Ôö¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.8£¬£¬£¬¿É±»ÓÃÀ´ÈƹýÉè±¹ØÁ¬ÄÉí·ÝÑéÖ¤²¢»ñµÃÄ¿µÄÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¾ÝFortinet³Æ£¬£¬£¬×èÖ¹4ÔÂÓÐÁè¼Ý50000´ÎÊÔͼʹÓôËÎó²î¹¥»÷TBK DVR×°±¸µÄ»î¶¯¡£¡£2018Äê4Ô£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁË´ËÎó²îµÄPoC´úÂë¡£¡£ÏÖÔÚ£¬£¬£¬¹©Ó¦ÉÌÉÐδÐû²¼Çå¾²²¹¶¡À´½â¾ö¸ÃÎó²î¡£¡£±ðµÄ£¬£¬£¬Ê¹ÓÃMVPower CCTV DVRÖÐRCEÎó²î£¨CVE-2016-20016£©µÄ¹¥»÷Ò²ÔÚ¼¤Ôö¡£¡£


https://www.infosecurity-magazine.com/news/high-severity-flaw-tbk-dvr-camera/


4¡¢ÃÀ¹ú´ïÀ­Ë¹ÊÐÔâµ½RoyalµÄÀÕË÷¹¥»÷Ó°Ï쾯¾ÖµÈЧÀÍ


5ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬£¬µÂ¿ËÈøË¹ÖÝ´ïÀ­Ë¹ÊÐÔâµ½ÁËRoyalÀÕË÷¹¥»÷£¬£¬£¬Æä¹Ø±ÕÁ˲¿·ÖITϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£´ïÀ­Ë¹ÊÇÃÀ¹úµÚ¾Å´ó¶¼»á£¬£¬£¬Éú³ÝÔ¼260Íò¡£¡£ÍâµØÃ½Ì屨µÀ£¬£¬£¬¸ÃÊо¯·½µÄͨѶºÍITϵͳÔÚ±¾ÖÜÒ»ÉÏÎç±»¹Ø±Õ¡£¡£±¾ÖÜÈý£¬£¬£¬´ïÀ­Ë¹ÊÐÈ·¶¨Æä¶à¸öЧÀÍÆ÷Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬Ó°ÏìÁ˼¸¸ö¹¦Ð§ÇøÓò£¬£¬£¬°üÀ¨´ïÀ­Ë¹¾¯Ô±¾ÖÍøÕ¾¡£¡£¾ÝϤ£¬£¬£¬¸ÃÊеÄÍøÂç´òÓ¡»úÔÚ5ÔÂ3ÈÕÔçÉÏ×îÏÈ´òÓ¡Êê½ð¼Í¼£¬£¬£¬ÏÔʾÁËRoyalÊǴ˴ι¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£ÏÖÔÚ£¬£¬£¬Éв»ÇåÎúÊÇ·ñÓÐÊý¾Ý±»µÁ¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services/


5¡¢Å·ÖÞ¾¯·½µÄSpecTorÐж¯¾Ð²¶288Ãû°µÍø¹©Ó¦É̺Ϳͻ§


ýÌå5ÔÂ2ÈÕ±¨µÀ£¬£¬£¬Å·ÖÞÐ̾¯×é֯Эµ÷µÄ¹ú¼ÊÖ´·¨Ðж¯SpecTor²é»ñÁ˲»·¨°µÍøÊг¡Monopoly Market¡£¡£°ÂµØÀû¡¢·¨¹ú¡¢µÂ¹úºÍºÉÀ¼µÈ¾Å¸ö¹ú¼ÒµÄÖ´·¨²¿·Ö¾Ð²¶ÁË288ÃûÉæÏÓÔÚ°µÍøÉúÒⶾƷµÄÈË£¬£¬£¬Ö´·¨²¿·Ö»¹½É»ñÁËÁè¼Ý5080ÍòÅ·Ôª£¨5340ÍòÃÀÔª£©µÄÏÖ½ðºÍÐéÄâÇ®±ÒµÈ¡£¡£Monopoly MarketÓÚ2019ÄêÆô¶¯£¬£¬£¬Æä»ù´¡ÉèÊ©ÓÚ2021Äê12Ô±»µÂ¹úÕþ¸®²é·â£¬£¬£¬Ö®ºóËü±»ÓÃÓÚÍøÂçÔÚ¸ÃÍøÕ¾ÉÏÉúÒⶾƷµÄ¹©Ó¦É̺Ϳͻ§µÄÖ¤¾Ý¡£¡£´Ë´Î¾Ð²¶µÄ´ó²¿·ÖÏÓÒÉÈËÔÚÃÀ¹ú£¨153ÈË£©£¬£¬£¬Æä´ÎÊÇÓ¢¹ú£¨55ÈË£©ºÍµÂ¹ú£¨52ÈË£©¡£¡£


https://securityaffairs.com/145656/cyber-crime/law-enforcement-op-spector.html


6¡¢ElasticÐû²¼¶ñÒâÈí¼þLOBSHOT¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


ElasticÔÚ4ÔÂ25ÈÕÅû¶ÁËжñÒâÈí¼þLOBSHOTͨ¹ýGoogle Ads·Ö·¢µÄ»î¶¯¡£¡£¸Ã»î¶¯Ã°³äÕýµ±µÄµÄAnyDeskÔ¶³ÌÖÎÀíÈí¼þ£¬£¬£¬ÍÆËÍÁËÒ»¸ö¶ñÒâMSIÎļþ£¬£¬£¬Í¨¹ýÖ´ÐÐPowerShellÏÂÁîÀ´ÏÂÔØDLL¡£¡£ÏÂÔØµÄDLLÎļþΪ¶ñÒâÈí¼þLOBSHOT£¬£¬£¬ÉúÑÄÔÚC:\ProgramDataÎļþ¼ÐÖУ¬£¬£¬ÓÉRunDLL32.exeÖ´ÐС£¡£±ðµÄ£¬£¬£¬LOBSHOT»¹°²ÅÅÁËÒ»¸öhVNC£¨Òþ²ØÐéÄâÍøÂçÅÌË㣩ģ¿£¿£¿£¿£¿£¿é£¬£¬£¬¿É¶ÔÄ¿µÄ¾ÙÐÐÖ±½ÓÇÒ²»»á±»·¢Ã÷µÄ»á¼û¡£¡£LOBSHOTÖ÷ÒªÕë¶Ô½ðÈÚÐÐÒµ£¬£¬£¬½ÓÄÉÁËÒøÐÐľÂíºÍÐÅÏ¢ÇÔÈ¡¹¦Ð§¡£¡£


https://www.elastic.co/cn/security-labs/elastic-security-labs-discovers-lobshot-malware