´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-29

1. ´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÓëFBIÏàÖúÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ£¬ £¬£¬´ïÀ­Ë¹½¼ÇøÀí²éÉ­ÊÐÕýÃæÁÙÀÕË÷Èí¼þ¹¥»÷µÄÑÏËàÌôÕ½£¬ £¬£¬ÒѽôÆÈÇëÇó²¢»ñµÃÁª°îÊÓ²ì¾ÖµÄÔ®Öú¡£ ¡£¡£ºÚ¿ÍÓÚÖÜÈýÔçÉÏÀÖ³ÉÇÖÈëÕþ¸®Ð§ÀÍÆ÷£¬ £¬£¬ÊÔͼ¼ÓÃÜÎļþ£¬ £¬£¬µ«¶¼»áµÄÇ徲ϵͳѸËÙÏìÓ¦£¬ £¬£¬ÓÐÓÃÏÞÖÆÁËË𺦹æÄ£¡£ ¡£¡£ÏÖÔÚ£¬ £¬£¬ÊÐÕþ¸®ÕýÆð¾¢½ÓÄɲ½·¥£¬ £¬£¬°üÀ¨¹Ø±ÕÄÚ²¿»á¼û¡¢Ìæ»»×°±¸¼°´Ó±¸·ÝÖлָ´ÐÅÏ¢£¬ £¬£¬ÒÔ¾¡¿ì»Ö¸´ÏµÍ³¡£ ¡£¡£Ö»¹ÜÄÚ²¿Ð§ÀÍÊܵ½Ò»¶¨ÏÞÖÆ£¬ £¬£¬µ«Òªº¦ÍⲿЧÀÍÈç911¡¢¾¯Ô±¡¢ÔÚÏßÖ§¸¶¼°·ÏÎï´¦Öóͷ£µÈÈÔ¼á³ÖÕý³£ÔËÐС£ ¡£¡£´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁË´ïÀ­Ë¹µØÇøÕþ¸®ÍøÂçÇå¾²ÐÎÊÆµÄÑÏËàÐÔ£¬ £¬£¬¼ÌÈ¥Äê´ïÀ­Ë¹Êм°½ñÄê´ïÀ­Ë¹ÏØÏà¼ÌÔâÊܹ¥»÷ºó£¬ £¬£¬Àí²éÉ­ÊгÉΪ×îÐÂÊܺ¦Õß¡£ ¡£¡£Ö»¹ÜÉÐδÊÕµ½ÀÕË÷ÍÅ»ïµÄÏêϸҪÇó£¬ £¬£¬µ«Ïà¹Ø²¿·ÖÒÑÈ«Á¦ÅäºÏFBI¼°ÁìÍÁÇå¾²²¿Õö¿ªÊӲ졣 ¡£¡£¹ÙÔ±ÌåÏÖ£¬ £¬£¬»Ö¸´ÏµÍ³µÄÏêϸʱ¼äÉÐÎÞ·¨È·¶¨£¬ £¬£¬µ«½«½ß¾¡È«Á¦ïÔÌ­¶ÔÊÐÃñÉúÑĵÄÓ°Ïì¡£ ¡£¡£


https://therecord.media/richardson-texas-cyberattack-city-government


2. Ó¢¹úÌúÂ·ÍøWi-FiÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬Èö²¥³ðÊÓÑÔÂÛ


9ÔÂ26ÈÕ£¬ £¬£¬Ó¢¹úÈÏÕæ»ð³µ»ù´¡ÉèÊ©µÄ¹«¹²»ú¹¹Network RailÕý½ôÆÈ´¦Öóͷ£Ò»ÆðÉæ¼°ÆäÖÎÀíµÄÃâ·ÑWi-FiЧÀ͵ÄÍøÂçÇå¾²ÊÂÎñ¡£ ¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÓû§ÔÚ¶à¸öÖ÷Òª³µÕ¾£¬ £¬£¬°üÀ¨Â×¶Ø¡¢Âü³¹Ë¹ÌØ¡¢²®Ã÷º²µÈ¶¼»áµÄÕ¾µã£¬ £¬£¬Í¨¹ýWi-FiµÇÂ¼Ò³ÃæÎüÊÕµ½°üÀ¨³ðÊÓÒÁ˹À¼½ÌÑÔÂÛ¼°Ìá¼°2017ÄêÂü³¹Ë¹Ìر¬Õ¨°¸µÄ¶ñÒâÐÅÏ¢¡£ ¡£¡£Wi-FiЧÀÍÒÑÔÝÍ££¬ £¬£¬ÒÔÅäºÏÓ¢¹ú½»Í¨¾¯Ô±ºÍͨѶ¹«Ë¾TelentµÄÊӲ졣 ¡£¡£¾ÝÊӲ죬 £¬£¬¸ÃÊÂÎñÊÇÓɲ»Ã÷ºÚ¿Íͨ¹ý¹¥»÷TelentÖÎÀíµÄWi-FiÉϰ¶Ò³ÃæËùÖ£¬ £¬£¬¸ÃÒ³ÃæÓÉGlobal ReachÔËÓª£¬ £¬£¬²¢Ô⵽ijÕýµ±ÖÎÀíÔ±ÕË»§µÄ²»·¨ÈëÇÖ¡£ ¡£¡£ËäÈ»ÏêϸÊÖÒÕϸ½ÚÉÐδ¹ûÕæ£¬ £¬£¬µ«ÐÅÏ¢Ç徲ר¼ÒÖ¸³ö£¬ £¬£¬¹«¹²Wi-FiÒòÆä¿ª·ÅÐÔ³£³ÉÎªÍøÂç·¸·¨·Ö×ӵĹ¥»÷Ä¿µÄ£¬ £¬£¬Ç¿µ÷ÁËÔöÇ¿ÕâÀàÍøÂçÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£ ¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁËÒªº¦¹ú¼Ò»ù´¡ÉèÊ©ÍøÂçÇå¾²µÄ¾¯ÖÓ£¬ £¬£¬´ÙʹÈËÃǹØ×¢¹«¹²½»Í¨µÈ¹«¹²Ð§ÀÍÖпÉÄܱ£´æµÄÍøÂçÇå¾²Îó²î¡£ ¡£¡£Ö»¹ÜÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÊý¾Ýй¶£¬ £¬£¬µ«¹«ÖÚ¹ØÓÚÍøÂçÇå¾²µÄµ£ÐÄÈÔÔÚÔöÌí¡£ ¡£¡£Network Rail¼°ÏàÖúͬ°éÕýÈ«Á¦ÒÔ¸°£¬ £¬£¬Ö¼ÔÚ¾¡¿ì»Ö¸´Ð§ÀͲ¢±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£ ¡£¡£


https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/


3. Sniper DzÃâ·ÑPhaaSƽ̨³ÉÍøÂç´¹ÂÚÐÂÍþв£¬ £¬£¬Äê´´14Íò´¹ÂÚÍøÕ¾


9ÔÂ26ÈÕ£¬ £¬£¬Palo Alto Networks µÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»¸öÃûΪ Sniper Dz µÄÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬ £¬£¬¸Ãƽ̨ÔÚÒÑÍùÒ»ÄêÖÐÒÑ´Ù³ÉÁè¼Ý 14 Íò¸öÍøÂç´¹ÂÚÍøÕ¾µÄ½¨É裬 £¬£¬¶ÔÈ«ÇòÓû§×é³ÉÑÏÖØÍþв¡£ ¡£¡£Sniper Dz רעÓÚʹÓÃÉ罻ýÌåºÍÔÚÏßЧÀÍ×÷Ϊ¹¥»÷Ä¿µÄ£¬ £¬£¬Í¨¹ýÌṩÃâ·ÑµÄÔÚÏßÖÎÀíÃæ°å£¬ £¬£¬ÈÃÍøÂç´¹ÂÚÕßÄÜÇáËÉÌìÉúÕë¶Ô×ÅÃûÆ·ÅÆµÄ´¹ÂÚÒ³Ãæ£¬ £¬£¬²¢¿ÉÑ¡ÔñÍйÜÔÚÆ½Ì¨»ò×ÔÓÐЧÀÍÆ÷ÉÏ¡£ ¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ£¬ £¬£¬Sniper Dz ²»Ö±ÎüÊÕ·Ñ£¬ £¬£¬¶øÊÇ´Ó±»ÍµÈ¡µÄÊܺ¦Õ߯¾Ö¤ÖÐ׬Ǯ£¬ £¬£¬Í¨¹ýÄÚÖúóÃÅÍøÂçÊý¾Ý£¬ £¬£¬ÔöÇ¿ÆäÔÚÍøÂç´¹ÂÚÁìÓòµÄְλ¡£ ¡£¡£¸Ãƽ̨»¹Ê¹Óù«¹²ÊðÀíЧÀÍÆ÷ºÍÕýµ± SaaS ƽ̨£¨Èç Blogspot£©Òþ²ØÐÐ×Ù£¬ £¬£¬ÔöÌí¹¥»÷Òþ²ØÐÔºÍÀÖ³ÉÂÊ¡£ ¡£¡£Sniper Dz ÔÚ Telegram ÉÏÓµÓÐÖØ´óµÄ×·ËæÕßȺÌ壬 £¬£¬ÆäÒ×ÓÃÐÔºÍÃâ·ÑÌØÕ÷ÎüÒýÁË´ó×ÚÍøÂç·¸·¨·Ö×Ó¡£ ¡£¡£¼øÓÚÆäǿʢµÄ¹æ±ÜÊÖÒÕºÍÆÕ±éµÄÊܺ¦Õ߯¾Ö¤»ñÈ¡ÄÜÁ¦£¬ £¬£¬Sniper Dz Ô¤¼Æ½«Ò»Á¬Íƶ¯È«ÇòÍøÂç´¹ÂڻµÄÔöÌí£¬ £¬£¬Òò´Ë£¬ £¬£¬Óû§ºÍ×éÖ¯Ðè¸ß¶ÈСÐÄ£¬ £¬£¬½ÓÄÉÓÐÓÃÇå¾²²½·¥ÒÔµÖÓù´ËÀàÐÂÐËÍþв¡£ ¡£¡£


https://securityonline.info/phishing-frenzy-140000-websites-created-with-sniper-dz-in-one-year/


4. ð³äÓ¦ÓÃWalletConnectÇÔÈ¡ÁË7ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


9ÔÂ28ÈÕ£¬ £¬£¬Check Point Research (CPR) ×î½ü½ÒÆÆÁËÒ»ÖÖÖØ´óµÄ¼ÓÃÜÇ®±ÒÕ©Æ­ÊֶΣ¬ £¬£¬¸ÃȦÌ×ͨ¹ýÒ»¿îαװ³ÉÈÈÃÅWeb3ЭÒéWalletConnectµÄÐéαӦÓÃÔÚGoogle PlayÉÏDZÔÚÊýÔ£¬ £¬£¬ÀÖ³É͵ȡÁËÁè¼Ý150ÃûÓû§µÄ¼ÓÃÜÇ®±Ò£¬ £¬£¬×ÜËðʧ³¬7ÍòÃÀÔª¡£ ¡£¡£´Ë¶ñÒâÓ¦ÓÃʹÓÃÁËÓû§¶ÔWalletConnectµÄÐÅÈΣ¬ £¬£¬ºóÕß±¾ÊÇÅþÁ¬È¥ÖÐÐÄ»¯Ó¦ÓÃÓë¼ÓÃÜÇ®±ÒÇ®°üµÄÇå¾²ÇÅÁº¡£ ¡£¡£Õ©Æ­Õßͨ¹ý¸ßÆÀ·ÖºÍÐéα̸ÂÛÓÕµ¼Óû§ÏÂÔØ£¬ £¬£¬Ò»µ©Óû§ÊµÑéÅþÁ¬Ç®°üÖÁWeb3Ó¦Ó㬠£¬£¬Ã°³äÓ¦ÓñãÄ£ÄâÕý³£Á÷³ÌÓÕÆ­Óû§Ç©ÊðڲƭÉúÒ⣬ £¬£¬ÉñÃØÏò¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷·¢ËÍÓû§×ʲúÐÅÏ¢£¬ £¬£¬Ê¹ÓÃÖÇÄܺÏÔ¼ÇÄÎÞÉùÏ¢µØ×ªÒÆ×ʽð¡£ ¡£¡£¸ÃÓ¦Óû¹½ÓÄÉ·´¼ì²âÊÖÒÕÌÓ±ÜÇå¾²¹¤¾ßÉó²é£¬ £¬£¬¶ÔÉóºËְԱչʾÎÞº¦ÄÚÈÝ£¬ £¬£¬´Ó¶øºã¾ÃDZÔÚ¡£ ¡£¡£ÆÊÎöÏÔʾ£¬ £¬£¬±»µÁ×ʽðÆÕ±é¶à¸öÒÔÌ«·»ÐéÄâ»úÍøÂ磬 £¬£¬ÇҴ󲿷ÖÉÐδ׷»Ø¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬Ö»¹ÜÊܺ¦ÕßÖڶ࣬ £¬£¬µ«½öÉÙÊýÈËÔÚGoogle PlayÉÏÁôϲîÆÀ£¬ £¬£¬·´Ó¦³ö¹«ÖÚ¶Ô´ËÀàÕ©Æ­ÊֶεÄÈÏ֪ȱ·¦£¬ £¬£¬ÒÔ¼°Õ©Æ­Õßͨ¹ýÐéαºÃÆÀÑÚÊÎ×ïÐеÄÕ½ÂÔ¡£ ¡£¡£


https://securityonline.info/fake-walletconnect-app-on-google-play-drains-70k-in-crypto/


5. ¿ÆÍþÌØÎÀÉú²¿ÔâÍøÂç¹¥»÷£¬ £¬£¬¶à¼ÒҽԺϵͳ̱»¾


9ÔÂ28ÈÕ£¬ £¬£¬¿ÆÍþÌØÎÀÉú²¿½üÆÚÕýÆð¾¢Ó¦¶ÔÒ»ÆðÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬ £¬£¬¸ÃÊÂÎñµ¼Ö¶à¼ÒÒ½ÔºµÄÐÅϢϵͳ̱»¾£¬ £¬£¬²¢Ó°ÏìÁËÈøºÕÀÕÒ½ÁƱ£½¡Ó¦ÓóÌÐò¼°ÎÀÉú²¿¹Ù·½ÍøÕ¾µÄÕý³£ÔËÐС£ ¡£¡£ÖÜÈý£¬ £¬£¬ÎÀÉú²¿Ðû²¼Òѻָ´²¿·ÖÒªº¦¹¦Ð§µÄÔËÐУ¬ £¬£¬°üÀ¨°©Ö¢¿ØÖÆÖÐÐÄ¡¢¿µ½¡°ü¹Ü¼°Íâ¼®ÈËÊ¿Ìå¼ìµÈÖ÷Ҫϵͳ¡£ ¡£¡£ÊÖÒÕÍŶÓѸËÙ½éÈ룬 £¬£¬×·×Ù²¢½ÒÆÆÁËÈëÇÖÍýÏ룬 £¬£¬Í¬Ê±ÔÚÕþ¸®Çå¾²»ú¹¹µÄÖ§³ÖÏ¿ØÖÆÁËÊÂ̬Éú³¤¡£ ¡£¡£Îª±ÜÃâ¹¥»÷½øÒ»²½À©É¢ÖÁ½¹µãÊý¾Ý¿â£¬ £¬£¬ÎÀÉú²¿¼á¾ö½«ÊÜÓ°ÏìµÄÒ½ÁƱ£½¡ÏµÍ³ÏÂÏߣ¬ £¬£¬²¢½ÓÄÉÁËһϵÁÐÔöÇ¿»ù´¡ÉèÊ©Çå¾²µÄ²½·¥¡£ ¡£¡£Ö»¹Üδ͸¶Ïêϸ¹¥»÷ϸ½Ú£¬ £¬£¬µ«Æ¾Ö¤Ó¦¶Ô²½·¥ÍƲ⣬ £¬£¬´Ë´ÎÊÂÎñºÜ¿ÉÄÜΪÀÕË÷Èí¼þ¹¥»÷¡£ ¡£¡£×èÖ¹ÏÖÔÚ£¬ £¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐû³Æ¶Ô´ËÈÏÕæ¡£ ¡£¡£ÎÀÉú²¿Ç¿µ÷£¬ £¬£¬ÒÑÈ«Á¦Í¶Èë×ÊÔ´ÒÔÈ·±£ÏµÍ³¾¡¿ìÖÜÈ«»Ö¸´£¬ £¬£¬²¢ÔÊÐí½«Ò»Á¬ÔöÇ¿ÍøÂçÇå¾²·À»¤£¬ £¬£¬ÒÔ°ü¹Ü¹«¹²ÎÀÉúЧÀ͵ÄÎȹÌÔËÐкͻ¼ÕßÊý¾ÝµÄÇå¾²¡£ ¡£¡£


https://securityaffairs.com/169031/security/cyberattack-on-kuwait-health-ministry-impacted-hospitals.html


6. Storm-0501ÀÕË÷Èí¼þÍÅ»ïתÏò»ìÏýÔÆ¹¥»÷


9ÔÂ27ÈÕ£¬ £¬£¬Î¢Èí·¢³öÖÒÑÔ£¬ £¬£¬Ö¸³öÀÕË÷Èí¼þÍÅ»ïStorm-0501Òѵ÷½âÕ½ÂÔ£¬ £¬£¬½«¹¥»÷ÖØÐÄתÏò»ìÏýÔÆÇéÐΣ¬ £¬£¬²¢ÍýÏëËðº¦Êܺ¦ÕßµÄËùÓÐ×ʲú¡£ ¡£¡£×Ô2021ÄêÊ×´ÎÏÖÉíÒÔÀ´£¬ £¬£¬Storm-0501×÷ΪSabbathÀÕË÷Èí¼þÐж¯µÄÒ»²¿·Ö£¬ £¬£¬Ò»Ö±½ø»¯£¬ £¬£¬½üÆÚ¸üÊÇÉæ×ãHive¡¢BlackCat¡¢LockBit¼°Hunters InternationalµÈ¶à¸öÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâÈí¼þ¡£ ¡£¡£½üÆÚ£¬ £¬£¬ËûÃÇÌØÊâ»îÔ¾£¬ £¬£¬½ÓÄÉEmbargoÀÕË÷Èí¼þ¶ÔÃÀ¹úÒ½ÁÆ¡¢Õþ¸®¡¢ÖÆÔì¡¢ÔËÊä¼°Ö´·¨»ú¹¹·¢¶¯¹¥»÷¡£ ¡£¡£Storm-0501ʹÓÃÈõÃÜÂë¡¢ÌØÈ¨ÕË»§»òÒÑÖªÎó²î£¨ÈçCVE-2022-47966¡¢CVE-2023-4966µÈ£©ÉøÍ¸ÍøÂ磬 £¬£¬²¢Í¨¹ýImpacketºÍCobalt StrikeµÈ¹¤¾ßºáÏòÒÆ¶¯£¬ £¬£¬ÇÔÈ¡Êý¾Ý²¢½ûÓÃÇå¾²ÉèÖᣠ¡£¡£Ò»µ©»ñÈ¡Microsoft Entra ID£¨¼´Azure AD£©Æ¾Ö¤£¬ £¬£¬¸ÃÍÅ»ï±ãÄÜÎÞ·ì´ÓÍâµØÇ¨áãµ½ÔÆ¶Ë£¬ £¬£¬ÆÆËðͬ²½ÕË»§£¬ £¬£¬Ð®ÖƻỰÒÔά³Ö»á¼ûȨÏÞ¡£ ¡£¡£ËûÃÇ»¹¿ÉÄÜʹÓÃAADInternalsµÈ¹¤¾ß¸ü¸ÄÔÆÃÜÂ룬 £¬£¬Èƹý±£»£»£» £»£»£»¤¡£ ¡£¡£µ½ÊÖºó£¬ £¬£¬Storm-0501ÔÚMicrosoft Entra×â»§ÄÚÖ²È볤ÆÚºóÃÅ£¬ £¬£¬Î±×°³ÉÕýµ±Óû§Éí·Ý£¬ £¬£¬×îÖÕÔÚÄÚ²¿°²ÅźÍÔÆÇéÐÎÖа²ÅÅEmbargoÀÕË÷Èí¼þ£¬ £¬£¬»òͨ¹ýÍýÏëʹÃüÓëGPO¼ÓÃÜÎļþ¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬¸ÃÍŻﲢ·Ç×ÜÊÇÁ¬Ã¦ÊµÑéÀÕË÷£¬ £¬£¬ÓÐʱ½ö±£´æºóÃÅÒÔ×÷ºóÐøÖ®Óᣠ¡£¡£


https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/