ͨѶ¹«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2023-05-04

1¡¢Í¨Ñ¶¹«Ë¾T-MobileÅû¶2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ


¾ÝýÌå5ÔÂ1ÈÕ±¨µÀ£¬£¬Í¨Ñ¶¹«Ë¾T-MobileÅû¶ÁË2023ÄêµÚ¶þÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¾ÝϤ£¬£¬´Ó2ÔÂÏÂÑ®×îÏȵÄÒ»¸ö¶àÔÂÄÚ£¬£¬¹¥»÷Õß¿ÉÒÔ»á¼ûÆäÊý°ÙÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£´Ë´ÎÊÂÎñ½öÓ°ÏìÁË836ÃûÓû§£¬£¬¿ÉÊÇй¶µÄÐÅÏ¢Á¿ºÜÊÇÆÕ±é£¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò½«ÃæÁÙÉí·ÝµÁÓúʹ¹ÂÚ¹¥»÷¡£¡£¡£T-MobileÒÑΪÊÜÓ°ÏìÓû§ÖØÖÃÕÊ»§PIN£¬£¬²¢Í¨¹ýTransunion myTrueIdentityÌṩ¡¢¹©Á½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ¼ì²âЧÀÍ¡£¡£¡£1Ô·Ý£¬£¬T-MobileÔâµ½ÁË2023ÄêµÄÊ×´ÎÊý¾Ýй¶£¬£¬¹¥»÷ÕßÇÔÈ¡ÁË3700ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£


https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/


2¡¢µÂ¹úITÌṩÉÌBitmarckÔâµ½¹¥»÷ËùÓÐϵͳÔÝʱ¹Ø±Õ


¾Ý5ÔÂ1ÈÕ±¨µÀ£¬£¬µÂ¹úITЧÀÍÌṩÉÌÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£ÕâµÂ¹ú×î´óµÄIT¹«Ë¾Ö®Ò»£¬£¬Îª¹«¹²¿µ½¡°ü¹ÜÁìÓòµÄ80¶à¼Ò×éÖ¯ÌṩÊÖÒÕ»ù´¡ÉèÊ©ºÍЧÀÍ¡£¡£¡£¼ì²âµ½¹¥»÷ºó£¬£¬¸Ã¹«Ë¾Á¬Ã¦¹Ø±ÕÁ˿ͻ§ºÍÄÚ²¿ÏµÍ³£¬£¬ÒÔ¼°Êý¾ÝÖÐÐÄ¡£¡£¡£¸Ã¹«Ë¾Ö¸³öûÓÐÊý¾Ýй¶£¬£¬´æ´¢ÔÚEHRÖеϼÕßÊý¾Ý²»»áÊܵ½¹¥»÷µÄÓ°Ïì¡£¡£¡£Ö»¹ÜЧÀÍÕýÔÚÖð½¥»Ö¸´£¬£¬µ«BitmarckÔ¤¼ÆÔÚÖÐÖ¹ÈÔ½«¼ÌÐø¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶Óйع¥»÷µÄ¸ü¶àϸ½Ú¡£¡£¡£1Ô·Ý£¬£¬Bitmarck±¬·¢Êý¾Ýй¶£¬£¬Ó°ÏìÁËÁè¼Ý300000Ãû±£µ¥³ÖÓÐÈË¡£¡£¡£


https://securityaffairs.com/145568/hacking/bitmarck-cyberattack.html


3¡¢TBK DVR×°±¸Éí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2018-9995±»Ê¹ÓÃ


ýÌå5ÔÂ2Èճƣ¬£¬Fortinet·¢Ã÷ʹÓÃTBK DVR×°±¸ÖÐÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-9995£©µÄ¹¥»÷¼¤Ôö¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.8£¬£¬¿É±»ÓÃÀ´ÈƹýÉè±¹ØÁ¬ÄÉí·ÝÑéÖ¤²¢»ñµÃÄ¿µÄÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£¾ÝFortinet³Æ£¬£¬×èÖ¹4ÔÂÓÐÁè¼Ý50000´ÎÊÔͼʹÓôËÎó²î¹¥»÷TBK DVR×°±¸µÄ»î¶¯¡£¡£¡£2018Äê4Ô£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁË´ËÎó²îµÄPoC´úÂë¡£¡£¡£ÏÖÔÚ£¬£¬¹©Ó¦ÉÌÉÐδÐû²¼Çå¾²²¹¶¡À´½â¾ö¸ÃÎó²î¡£¡£¡£±ðµÄ£¬£¬Ê¹ÓÃMVPower CCTV DVRÖÐRCEÎó²î£¨CVE-2016-20016£©µÄ¹¥»÷Ò²ÔÚ¼¤Ôö¡£¡£¡£


https://www.infosecurity-magazine.com/news/high-severity-flaw-tbk-dvr-camera/


4¡¢ÃÀ¹ú´ïÀ­Ë¹ÊÐÔâµ½RoyalµÄÀÕË÷¹¥»÷Ó°Ï쾯¾ÖµÈЧÀÍ


5ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬µÂ¿ËÈøË¹ÖÝ´ïÀ­Ë¹ÊÐÔâµ½ÁËRoyalÀÕË÷¹¥»÷£¬£¬Æä¹Ø±ÕÁ˲¿·ÖITϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£´ïÀ­Ë¹ÊÇÃÀ¹úµÚ¾Å´ó¶¼»á£¬£¬Éú³ÝÔ¼260Íò¡£¡£¡£ÍâµØÃ½Ì屨µÀ£¬£¬¸ÃÊо¯·½µÄͨѶºÍITϵͳÔÚ±¾ÖÜÒ»ÉÏÎç±»¹Ø±Õ¡£¡£¡£±¾ÖÜÈý£¬£¬´ïÀ­Ë¹ÊÐÈ·¶¨Æä¶à¸öЧÀÍÆ÷Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬Ó°ÏìÁ˼¸¸ö¹¦Ð§ÇøÓò£¬£¬°üÀ¨´ïÀ­Ë¹¾¯Ô±¾ÖÍøÕ¾¡£¡£¡£¾ÝϤ£¬£¬¸ÃÊеÄÍøÂç´òÓ¡»úÔÚ5ÔÂ3ÈÕÔçÉÏ×îÏÈ´òÓ¡Êê½ð¼Í¼£¬£¬ÏÔʾÁËRoyalÊǴ˴ι¥»÷»î¶¯µÄÄ»ºóºÚÊÖ¡£¡£¡£ÏÖÔÚ£¬£¬Éв»ÇåÎúÊÇ·ñÓÐÊý¾Ý±»µÁ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services/


5¡¢Å·ÖÞ¾¯·½µÄSpecTorÐж¯¾Ð²¶288Ãû°µÍø¹©Ó¦É̺Ϳͻ§


ýÌå5ÔÂ2ÈÕ±¨µÀ£¬£¬Å·ÖÞÐ̾¯×é֯Эµ÷µÄ¹ú¼ÊÖ´·¨Ðж¯SpecTor²é»ñÁ˲»·¨°µÍøÊг¡Monopoly Market¡£¡£¡£°ÂµØÀû¡¢·¨¹ú¡¢µÂ¹úºÍºÉÀ¼µÈ¾Å¸ö¹ú¼ÒµÄÖ´·¨²¿·Ö¾Ð²¶ÁË288ÃûÉæÏÓÔÚ°µÍøÉúÒⶾƷµÄÈË£¬£¬Ö´·¨²¿·Ö»¹½É»ñÁËÁè¼Ý5080ÍòÅ·Ôª£¨5340ÍòÃÀÔª£©µÄÏÖ½ðºÍÐéÄâÇ®±ÒµÈ¡£¡£¡£Monopoly MarketÓÚ2019ÄêÆô¶¯£¬£¬Æä»ù´¡ÉèÊ©ÓÚ2021Äê12Ô±»µÂ¹úÕþ¸®²é·â£¬£¬Ö®ºóËü±»ÓÃÓÚÍøÂçÔÚ¸ÃÍøÕ¾ÉÏÉúÒⶾƷµÄ¹©Ó¦É̺Ϳͻ§µÄÖ¤¾Ý¡£¡£¡£´Ë´Î¾Ð²¶µÄ´ó²¿·ÖÏÓÒÉÈËÔÚÃÀ¹ú£¨153ÈË£©£¬£¬Æä´ÎÊÇÓ¢¹ú£¨55ÈË£©ºÍµÂ¹ú£¨52ÈË£©¡£¡£¡£


https://securityaffairs.com/145656/cyber-crime/law-enforcement-op-spector.html


6¡¢ElasticÐû²¼¶ñÒâÈí¼þLOBSHOT¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


ElasticÔÚ4ÔÂ25ÈÕÅû¶ÁËжñÒâÈí¼þLOBSHOTͨ¹ýGoogle Ads·Ö·¢µÄ»î¶¯¡£¡£¡£¸Ã»î¶¯Ã°³äÕýµ±µÄµÄAnyDeskÔ¶³ÌÖÎÀíÈí¼þ£¬£¬ÍÆËÍÁËÒ»¸ö¶ñÒâMSIÎļþ£¬£¬Í¨¹ýÖ´ÐÐPowerShellÏÂÁîÀ´ÏÂÔØDLL¡£¡£¡£ÏÂÔØµÄDLLÎļþΪ¶ñÒâÈí¼þLOBSHOT£¬£¬ÉúÑÄÔÚC:\ProgramDataÎļþ¼ÐÖУ¬£¬ÓÉRunDLL32.exeÖ´ÐС£¡£¡£±ðµÄ£¬£¬LOBSHOT»¹°²ÅÅÁËÒ»¸öhVNC£¨Òþ²ØÐéÄâÍøÂçÅÌË㣩Ä£¿£¿é£¬£¬¿É¶ÔÄ¿µÄ¾ÙÐÐÖ±½ÓÇÒ²»»á±»·¢Ã÷µÄ»á¼û¡£¡£¡£LOBSHOTÖ÷ÒªÕë¶Ô½ðÈÚÐÐÒµ£¬£¬½ÓÄÉÁËÒøÐÐľÂíºÍÐÅÏ¢ÇÔÈ¡¹¦Ð§¡£¡£¡£


https://www.elastic.co/cn/security-labs/elastic-security-labs-discovers-lobshot-malware