¶àÂ×¶à½ÌÓý¾ÖÔâLockBitÀÕË÷Èí¼þ¹¥»÷£¬£¬Ñ§ÉúÐÅϢй¶

Ðû²¼Ê±¼ä 2024-09-03
1. ¶àÂ×¶à½ÌÓý¾ÖÔâLockBitÀÕË÷Èí¼þ¹¥»÷£¬£¬Ñ§ÉúÐÅϢй¶


8ÔÂ31ÈÕ£¬£¬¶àÂ×¶àµØÇø½ÌÓý¾Ö£¨TDSB£©±¾ÖÜÈ·ÈÏÁË6Ô·ݱ¬·¢µÄÒ»´ÎÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬£¬¸ÃÊÂÎñÉæ¼°Ñ§ÉúÐÅÏ¢µÄй¶¡£¡£Ö»¹Ü×î³õ½ÌÓý¾ÖÌåÏÖ¹¥»÷½öÕë¶ÔÒ»¸öÊÖÒÕ²âÊÔÇéÐΣ¬£¬Óë¹Ù·½ÍøÂç¸ôÀ룬£¬µ«ºóÐøÖ¤Êµ2023/2024ѧÄêÖв¿·ÖѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬°üÀ¨ÐÕÃû¡¢Ñ§Ð£ÏêÇé¡¢Äê¼¶¡¢ÓÊÏ䵨µã¡¢Ñ§ºÅ¼°³öÉúÈÕÆÚµÈ£¬£¬È·×Åʵ²âÊÔÇéÐÎÖб»Ð¹Â¶¡£¡£½ÌÓý¾ÖÇ¿µ÷£¬£¬¾­ÍøÂçÇå¾²ÍŶӺÍÍⲿר¼ÒÆÀ¹À£¬£¬Ñ§ÉúÃæÁÙµÄΣº¦¡°ºÜµÍ¡±£¬£¬ÇÒδ·¢Ã÷Êý¾Ý¹ûÕæÅû¶µÄÇéÐΡ£¡£È»¶ø£¬£¬LockBitÀÕË÷Èí¼þÍÅ»ïËæºóÈÏ¿ÉÁ˴˴ι¥»÷£¬£¬²¢ÔÚÆäйÃÜÍøÕ¾Éϸø½ÌÓý¾ÖÉ趨ÁËÖ§¸¶Êê½ðµÄÏÞÆÚ£¬£¬µ«Î´¹ûÕæÏêϸÊê½ðÊý¶î¡£¡£TDSBÉÐδ¾ÍLockBitµÄÉùÃ÷×÷³ö»ØÓ¦£¬£¬µ«ÒÑÖÂÐżҳ¤ËµÃ÷ÇéÐΣ¬£¬²¢Ç¿µ÷ÒѽÓÄɶàÏî²½·¥ÔöǿѧÉúÐÅÏ¢Çå¾²£¬£¬Í¬Ê±ÅäºÏÖ´·¨²¿·ÖÊӲ졣¡£´Ë´ÎÊÂÎñ±¬·¢ÔÚLockBitÍÅ»ïÖÙ´º·ÝÔâ¹¥»÷ºóÊÔͼ¸´³öµÄÅä¾°Ï£¬£¬ÆäÐû²¼µÄÊܺ¦ÕßÐÅÏ¢Öб£´æ²»ÉÙ¹ýʧ»òÖØ¸´ÌõÄ¿£¬£¬Òý·¢×¨¼ÒÖÊÒÉ¡£¡£


https://therecord.media/toronto-school-district-board-ransomware


2. ÐÂÐÍÀÕË÷Èí¼þCicada3301»îÔ¾£¬£¬»òÓëALPHVÓйØÁª


9ÔÂ2ÈÕ£¬£¬ÐÂÐÍÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Cicada3301½üÆÚÔÚÍþвÁìÓòո¶ͷ½Ç£¬£¬Õë¶Ô¶à¼Ò¹«Ë¾Ìᳫ¹¥»÷£¬£¬Æä»îÔ¾ÐÔÁîÈËÖõÄ¿¡£¡£×Ô6ÔÂÒÔÀ´£¬£¬Cicada3301ͨ¹ýRAMPÍøÂç·¸·¨ÂÛ̳ÕÐļ³ÉÔ±£¬£¬½ÓÄÉRustÓïÑÔ±àд£¬£¬Ö§³ÖWindows¼°Linux/ESXiϵͳ£¬£¬ÏÔʾ³öÓëÒÑÇýÖðµÄBlackCat/ALPHV×éÖ¯ÔÚÊÖÒÕÉϵÄÏàËÆÐÔ£¬£¬°üÀ¨¼ÓÃÜËã·¨¡¢ÏÂÁîʹÓúÍÎļþÃüÃûÔ¼¶¨¡£¡£Cicada3301ͨ¹ýÇÔÈ¡»ò±©Á¦ÆÆ½âƾ֤µÇ¼ϵͳ£¬£¬Ê¹ÓõÄIPµØµãÓëBrutus½©Ê¬ÍøÂçÏà¹ØÁª£¬£¬¿ÉÄÜÅú×¢Á½Õß¼äµÄijÖÖÁªÏµ¡£¡£Æä³õʼ¹¥»÷ÊֶζàÑù£¬£¬°üÀ¨Õë¶ÔVMware ESXiϵͳµÄÌØÊâ±äÌå¡£¡£¸ÃÀÕË÷Èí¼þ¾ß±¸¸ß¶È¿ÉÉèÖÃÐÔ£¬£¬ÔÊÐí²Ù×÷Ô±ÔÚÖ´ÐÐÀú³ÌÖе÷½âÆäÐÐΪ£¬£¬ÈçÑÓ³ÙÖ´ÐС¢ÏÔʾ¼ÓÃܽø¶È¼°ÔÚ¼ÓÃÜESXiÖ÷»úÎļþʱÎÞÐè¹Ø±ÕÐéÄâ»úµÈ£¬£¬ÕâЩ¹¦Ð§ÔöÇ¿ÁËÆä˳ӦÐÔºÍÎÞаÐÔ¡£¡£¼ÓÃÜÀú³ÌÖУ¬£¬Cicada3301ʹÓÃOsRngËæ»úÊýÌìÉúÆ÷ÌìÉú¶Ô³ÆÃÜÔ¿£¬£¬²¢Í¨¹ýPGP¹«Ô¿¼ÓÃÜÕâЩÃÜÔ¿£¬£¬Í¬Ê±ÔÚÿ¸ö¼ÓÃÜÎļþ¼ÐÖÐÁôÏÂÊê½ð˵Ã÷Îļþ¡£¡£¼ÓÃÜÍê³Éºó£¬£¬ChaCha20ÃÜÔ¿±»RSA¼ÓÃÜ£¬£¬²¢Óë¼ÓÃÜÎļþÀ©Õ¹Ãûһͬ¸½¼Óµ½Îļþĩ⣬£¬ÐγÉÍêÕûµÄÀÕË÷ÐÅÏ¢¡£¡£


https://securityaffairs.com/167897/cyber-crime/a-new-variant-of-cicada-ransomware-targets-vmware-esxi-systems.html


3. Â׶ؽ»Í¨¾ÖÓ¦¶ÔÍøÂç¹¥»÷£¬£¬ÉÐÎÞÖ¤¾ÝÏÔʾ¿Í»§Êý¾Ýй¶


9ÔÂ2ÈÕ£¬£¬Â׶ؽ»Í¨¾Ö£¨TfL£©ÕýÈ«Á¦Ó¦¶ÔÒ»ÆðÕýÔÚ¾ÙÐÐÖеÄÍøÂç¹¥»÷£¬£¬Í¬Ê±Ïò¹«ÖÚ°ü¹Ü£¬£¬ÏÖÔÚÉÐÎÞÈ·ÔäÖ¤¾ÝÅú×¢¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÒÑÒò´Ë´ÎÊÂÎñ¶øÐ¹Â¶£¬£¬ÇÒTfLµÄ¸÷ÏîЧÀÍÔË×÷Õý³££¬£¬Î´ÊÜÏÔ×ÅÓ°Ïì¡£¡£×÷ΪÂ׶صØÇø½»Í¨ÍøÂçµÄÖ÷ÒªÖÎÀí»ú¹¹£¬£¬TfLѸËÙÏìÓ¦£¬£¬Óë¹ú¼Ò·¸·¨¾Ö£¨NCA£©¼°¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ï¸ÃÜÏàÖú£¬£¬½ÓÄÉÁËһϵÁÐÄÚ²¿²½·¥ÒÔÔöÇ¿ÍøÂçÇå¾²·À»¤¡£¡£¾ÝÄÚ²¿ÐÂÎÅ͸¶£¬£¬´Ë´Î¹¥»÷Ö÷Òª¼¯ÖÐÓÚTfL×ܲ¿µÄºǫ́ϵͳ£¬£¬´Ùʹ²¿·ÖÔ±¹¤±»½¨Òé¾Ó¼Ò°ì¹«ÒÔïÔ̭DZÔÚΣº¦¡£¡£TfLÊ×ϯÊÖÒÕ¹ÙShashi VermaÇ¿µ÷£¬£¬±£»£»£»¤ÏµÍ³Óë¿Í»§Êý¾ÝµÄÇå¾²ÊÇÖ÷ҪʹÃü£¬£¬ÍŶӽ«Ò»Á¬¼à¿Ø²¢ÆÀ¹ÀÊÂ̬Éú³¤£¬£¬È·±£¹«ÖÚ³öÐÐÇå¾²ÓëÐÅÈβ»ÊÜË𺦡£¡£×ÜÌå¶øÑÔ£¬£¬Ö»¹ÜÃæÁÙÌôÕ½£¬£¬TfLÕ¹ÏÖ³öÆð¾¢Ó¦¶ÔµÄ̬¶È£¬£¬Á¦Õù½«Ç±ÔÚÓ°Ïì½µÖÁ×îµÍ¡£¡£


https://securityaffairs.com/167946/hacking/transport-for-london-tfl-ongoing-cyberattack.html


4. µØÀí¶¨Î»×·×ÙЧÀÍTracelo³¬140ÍòÈËÐÅÏ¢ÔâºÚ¿Íй¶


9ÔÂ2ÈÕ£¬£¬ÖÇÄÜÊÖ»úµØÀí¶¨Î»×·×ÙЧÀÍTraceloÔÚ9ÔÂ1ÈÕÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬ºÚ¿Í¡°Satanic¡±Éù³Æ¹¥ÆÆÁËÆäϵͳ£¬£¬²¢ÔÚÍøÂçºÚÊÐÉϹûÕæÁËÁè¼Ý140ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£Tracelo×÷ΪÐÂÐËЧÀÍ£¬£¬Ëä±ê°ñÆ·µÂ¹æ·¶µÄ¶¨Î»×·×Ù£¬£¬µ«ÆäÔÚÊý¾ÝÍøÂçÓëÔÞ³ÉÑéÖ¤ÉϵÄ͸Ã÷¶Èȱ·¦£¬£¬Òý·¢ÁËÒþ˽±£»£»£»¤ÕùÒé¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢µç»°ºÅÂë¡¢ÎïÀíµØµã¡¢µç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬£¬ÒÔ¼°´ó×Ú¿Í»§µÄGoogle IDºÅ£¬£¬ºóÕß¿ÉÄܽøÒ»²½Ì»Â¶Óû§µÄÈÕ³£»£»£»î¶¯¹ì¼£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬Ö»¹ÜTraceloÖ¼ÔÚ×ÊÖúÓû§×·×ÙËûÈËλÖ㬣¬µ«Ð¹Â¶µÄÊý¾ÝÖв¢Î´°üÀ¨Ä¿µÄСÎÒ˽¼ÒµÄλÖÃÐÅÏ¢£¬£¬·´¶øÖ÷ÒªÊǿͻ§×ÔÉíµÄÏêϸ×ÊÁÏ¡£¡£ÊÜÓ°ÏìµÄÓû§ÃæÁÙÍøÂç´¹ÂÚºÍÓïÒô´¹ÂÚÕ©Æ­µÄÍþвÔöÌí£¬£¬Òò´ËÐè¸ß¶ÈСÐÄÀ´×Ô²»Ã÷ȪԴµÄÓʼþºÍµç»°£¬£¬×èֹй¶¸ü¶àСÎÒ˽¼ÒÐÅÏ¢¡£¡£


https://hackread.com/tracelo-location-tracker-data-breach-user-records-leak/


5. CBIZÊý¾Ýй¶ÊÂÎñÆØ¹â£¬£¬½ü36,000¿Í»§ÐÅÏ¢ÔâÇÔ


9ÔÂ2ÈÕ£¬£¬CBIZ¸£ÀûÓë°ü¹ÜЧÀ͹«Ë¾Åû¶ÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬¸ÃÊÂÎñÉæ¼°½ü36,000Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£¡£¾ÝϤ£¬£¬Ò»ÃûÍþвÐÐΪÕßʹÓÃCBIZÍøÒ³ÖеÄÇå¾²Îó²î£¬£¬ÔÚ6ÔÂ2ÈÕÖÁ21ÈÕʱ´úDZÈëϵͳ²¢ÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢ÁªÏµ·½·¨¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉú/éæÃüÈÕÆÚ¡¢ÍËÐÝÖ°Ô±¿µ½¡ÐÅÏ¢¼°¸£ÀûÍýÏëÐÅÏ¢ÔÚÄڵĿͻ§Êý¾Ý¡£¡£CBIZ×÷ΪÃÀ¹úÁìÏȵÄ×ÛºÏÐÔЧÀÍÌṩÉÌ£¬£¬ÓªÒµ¹æÄ£º­¸Ç»á¼ÆË°Îñ¡¢°ü¹Ü¡¢ÉÌÒµ×Éѯ¼°ÈËÁ¦×ÊÔ´µÈ¶à¸öÁìÓò£¬£¬ÔÚÌìÏÂÓµÓÐ120¸öЧÀÍ´¦¼°6,700ÃûÔ±¹¤£¬£¬2023ÄêÊÕÈë¸ß´ï15.9ÒÚÃÀÔª¡£¡£¹«Ë¾ÒÑÓÚ6ÔÂ24ÈÕ·¢Ã÷´Ë´ÎÈëÇÖ£¬£¬²¢Á¬Ã¦×ÅÊÖÊӲ졣¡£ÊÜÓ°Ïì¿Í»§×Ô8ÔÂ28ÈÕÆðÂ½ÐøÊÕµ½¸öÐÔ»¯Í¨Öª£¬£¬CBIZËäδ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬µ«ÈÔÌṩΪÆÚÁ½ÄêµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ£¬£¬²¢½¨Òé¿Í»§½ÓÄÉÌØÊâ²½·¥ÈçÐÅÓö³½á¼°Ìí¼Óڲƭ¾¯±¨£¬£¬ÒÔ½µµÍDZÔÚΣº¦¡£¡£


https://www.bleepingcomputer.com/news/security/business-services-giant-cbiz-discloses-customer-data-breach/


6. Prasarana Malaysia BhdÔâÀÕË÷¹¥»÷£¬£¬³¬300GBÊý¾Ýй¶


8ÔÂ30ÈÕ£¬£¬ÂíÀ´Î÷Ñǹ«¹²½»Í¨¾ÞÍ·¹ú¼Ò»ù½¨¹«Ë¾£¨Prasarana Malaysia Bhd£©¿ËÈÕÈ·ÈÏÁËÉ罻ýÌåÉÏÈö²¥µÄÒ»ÔòÍøÂçÇå¾²ÊÂÎñ±¨µÀµÄÕæÊµÐÔ£¬£¬Ö¸³öÆäÄÚ²¿ÏµÍ³È·ÒÑÔâÊÜδÊÚȨ»á¼û¡£¡£Ö»¹Ü´Ë´ÎÊÂÎñÉÐδ¶Ô¹«Ë¾µÄÒ»Ñùƽ³£ÔËÓªÔì³ÉÓ°Ï죬£¬µ«¹«Ë¾ÒÑѸËÙ½ÓÄÉÐж¯£¬£¬ÁªºÏÍøÂçÇ徲ר¼ÒÕö¿ªÖÜÈ«ÊӲ죬£¬²¢×ÅÊÖ»º½âDZÔÚÍþв¡£¡£Í¬Ê±£¬£¬¹ú¼Ò»ù½¨¹«Ë¾ÒÑÓëÂíÀ´Î÷Ñǹú¼ÒÍøÂçÇå¾²¾Ö£¨Nacsa£©¼°ÍøÂçÇå¾²»ú¹¹£¨CyberSecurity Malaysia£©Ï¸ÃÜÏàÖú£¬£¬ÅäºÏÖÆ¶©²¢ÊµÑéÖÜÈ«µÄÇå¾²·ÀÓùÕ½ÂÔ£¬£¬ÒÔ°ü¹ÜÆä½»Í¨Ð§ÀÍϵͳµÄÇå¾²ÎȹÌÔËÐС£¡£×÷ΪÂíÀ´Î÷Ñǹ«¹²½»Í¨ÏµÍ³µÄÖ÷Òª×é³É²¿·Ö£¬£¬¹ú¼Ò»ù½¨¹«Ë¾²»µ«ÔËÓªRapidKLÆìϵÄÇá¹ì¡¢½ÝÔË¡¢°ÍÊ¿¿ìËÙ½»Í¨ÏµÍ³£¬£¬»¹ÖÎÀí¼ªÂ¡ÆÂµ¥¹ìÁгµ¼°ÖØ´óµÄ¹«½»³µ¶Ó¡£¡£ÕâÒ»ÉùÃ÷Ö¼ÔÚ»ØÓ¦Íâ½ç¹ØÓÚ¹«Ë¾ÍøÕ¾¿ÉÄÜÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬µ¼ÖÂ316GBÊý¾Ýй¶µÄ´«ÑÔ¡£¡£¾ÝϤ£¬£¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÒÑ·¢³öÍþв£¬£¬Éù³Æ½«ÔÚÁùµ½ÆßÌìÄÚ¹ûÕæ¹ú¼Ò»ù½¨¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£


https://www.freemalaysiatoday.com/category/nation/2024/08/26/prasarana-confirms-cybersecurity-incident/