Clearview AIÒò²»·¨ÍøÂçÊý¾Ý±»·¨¹ú·£¿î2000ÍòÅ·Ôª
Ðû²¼Ê±¼ä 2022-10-24
10ÔÂ21ÈÕ±¨µÀ£¬·¨¹úÊý¾Ý±£»¤»ú¹¹(CNIL)Òò²»·¨ÍøÂçºÍ´¦Öóͷ£·¨¹ú¹«ÃñµÄÉúÎïÌØÕ÷Êý¾Ý¶ø¶ÔClearview AI´¦ÒÔ2000ÍòÅ·ÔªµÄ·£¿î¡£CNIL»¹ÏÂÁîÕâ¼Ò¹«Ë¾×èÖ¹ËùÓеÄÊý¾ÝÍøÂçÔ˶¯£¬²¢ÔÚÁ½¸öÔÂÄÚɾ³ýÒÑ¾ÍøÂçµÄËùÓÐÊý¾Ý¡£ÈôÊÇClearview AIÔÚÁ½¸öÔºóδÄÜ×ñÊØÏÂÁCNIL½«¶Ô¸Ã¹«Ë¾´¦ÒÔÌìÌì100000Å·ÔªµÄ·£¿î¡£CNILͨ¸æÖгƣ¬¸Ã»ú¹¹ÔÚ2021Äê5ÔÂÔø¾ÍÎ¥¹æÐÐΪÏòClearview AI·¢³öÁËÖÒÑÔ£¬²¢ÔÚ2021Äê12Ô·¢³öÁË×îºóÖÒÑÔ£¬µ«ºóÕßδ×ñÊØÏÂÁî¡£
https://www.bleepingcomputer.com/news/security/clearview-ai-gets-third-20-million-fine-for-illegal-data-collection/
2¡¢Black RewardÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÒÁÀÊÔ×ÓÄÜ»ú¹¹µÄÊý¾Ý
¾Ý10ÔÂ23ÈÕ±¨µÀ£¬×Ô³ÆÎªBlack RewardµÄºÚ¿ÍÍÅ»ïÔÚTelegramÉÏÉù³Æ¹¥»÷ÁËÒÁÀÊÔ×ÓÄÜ×éÖ¯£¬±ðµÄ£¬ËûÃÇ»¹Ðû²¼ÁËÓйز¼Ê²¶û¹¤³§µÄÌõÔ¼¡¢½¨ÉèÍýÏëºÍ×°±¸Ï¸½ÚµÄÏà¹ØÎļþ£¬×÷ΪÈëÇÖµÄÖ¤¾Ý¡£¸Ã×éÖ¯³ÆÒÑÇÔÈ¡50 GBµÄÎļþ£¬ÏÖÔÚÉв»ÇåÎúÕâЩÊý¾ÝÖÐÊÇ·ñ»¹°üÀ¨ÉñÃØÐÅÏ¢¡£ÒÁÀÊÔ×ÓÄÜ»ú¹¹ÔÚÉÏÖÜÈÕ͸¶£¬¹¥»÷ÕßÈëÇÖÁËÒ»¼ÒÔÚ²¼Ê²¶ûÔËÓª¸Ã¹úΨһºËµçÕ¾µÄ¹«Ë¾ËùʹÓõĵç×ÓÓʼþϵͳ£¬²¢½«¹¥»÷¹é×ïÓÚ¡°Íâ¹ú¡±£¬µ«Ã»ÓÐÏêϸ˵Ã÷¡£
https://securityaffairs.co/wordpress/137513/hacking/hackers-stole-sensitive-data-from-irans-atomic-energy-agency.html
3¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹AAH͸¶Լ300Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶
ýÌå10ÔÂ20ÈÕ±¨µÀ£¬ÔÚÍþ˹¿µÐÇÖݺÍÒÁÀûŵÒÁÖÝÓµÓÐ26¼ÒÒ½ÔºµÄAdvocate Aurora Health(AAH)ÕýÔÚÏòÆä»¼Õß·¢Ë͹ØÓÚ½üÆÚÊý¾Ýй¶ÊÂÎñµÄ֪ͨ¡£¸ÃÊÂÎñÊÇÓÉÓÚÔÚAAHÍøÕ¾É϶ÔMeta PixelµÄʹÓò»µ±Ôì³ÉµÄ£¬¿ÉÄÜй¶»¼ÕßµÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢¡£AAHÏòÃÀ¹úÎÀÉú²¿µÄ±¨¸æ³Æ£¬¸ÃÊÂÎñÓ°ÏìÁËÔ¼300ÍòÈË¡£ÃÀ¹úÐí¶àÒ½Ôº¶¼Ê¹ÓÃMeta Pixel£¬Òò´ËÕâÒ»Òþ˽й¶ÎÊÌâÔڸùúÏÆÆðÁËÒ»³¡·ç²¨£¬µ¼ÖÂÊý°ÙÍòÈËÐÅϢ̻¶¸øµÚÈý·½£¬²¢Òý·¢Á˶ÔÔðÈλú¹¹µÄÕûÌåËßËÏ¡£
https://www.securityweek.com/data-3-million-advocate-aurora-health-patients-exposed-malformed-pixel
4¡¢Google PlayÖеÄ16¸ö¶ñÒâÓ¦ÓÃÒѱ»ÏÂÔØÁè¼Ý2000Íò´Î
McAfeeÓÚ10ÔÂ19ÈÕÅû¶ÁËGoogle PlayÉÏ16¸öѬȾÁËClicker¶ñÒâÈí¼þµÄÓ¦Óã¬×Ü×°ÖÃÁ¿¸ß´ï2000Íò´Î¡£ClickerÊÇÒ»ÖÖÌØÊâµÄ¹ã¸æÈí¼þ£¬ËüÔÚ²»¿É¼ûµÄ¿ò¼Ü»òÅä¾°ÖмÓÔØ¹ã¸æ²¢µã»÷ËüÃÇΪÆäÔËÓªÍŻﴴÊÕ¡£¶Ô×°±¸µÄÓ°Ïì¿ÉÄÜÊǵ¼ÖÂÐÔÄÜϽµ¡¢¹ýÈÈ¡¢µç³ØÊ¹ÓÃÁ¿ÔöÌíÒÔ¼°Òƶ¯Êý¾ÝÊշѹý¸ß¡£ÏÖÔÚ£¬ÕâЩ¶ñÒâÓ¦ÓÃÒѱ»É¾³ý£¬ÆäÖÐDxCleanÔÚ±»É¾³ý֮ǰÒÑ×°ÖÃÁË500Íò´Î¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-malicious-clicker-found-in-apps-installed-by-20m-users/
5¡¢CISAµÈ»ú¹¹ÍŽáÐû²¼¹ØÓÚDaixin TeamµÄÇå¾²×Éѯ
10ÔÂ21ÈÕ£¬CISA¡¢FBIºÍHHSÍŽáÐû²¼Á˹ØÓÚDaixin TeamµÄÇå¾²×Éѯ¡£¸ÃÍÅ»ï×Ô2022Äê6ÔÂ×îÏȾÍÕë¶ÔÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)²¿·Ö£¬¶ÔÓÃÓÚÒ½ÁÆ·þÎñµÄϵͳ¾ÙÐмÓÃÜ£¬²¢ÇÔÈ¡»¼ÕߵĿµ½¡ÐÅÏ¢(PHI)ºÍСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡£¹¥»÷Õßͨ¹ýʹÓÃ×éÖ¯VPN·þÎñÆ÷ÖеÄÎó²î£¬»òʹÓÃÏÈǰ±»ÆÆËðµÄƾ֤»á¼ûδÆôÓÃMFAµÄµÄ¾É°æVPN·þÎñÆ÷£¬À´»ñµÃ¶ÔÄ¿µÄÍøÂçµÄ»á¼ûȨÏÞ¡£Ò»µ©Àֳɣ¬ËûÃǾͻáʹÓÃRDPºÍSSHÔÚÄ¿µÄÍøÂçÖкáÏòÒÆ¶¯¡£¸Ã×Éѯ»¹¹ûÕæÁËIOCºÍTTP£¬ÒÔ×ÊÖúÇå¾²Ö°Ô±¼ì²âºÍ×èÖ¹´ËÀ๥»÷¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/21/stopransomware-daixin-team
6¡¢MandiantÐû²¼¹ØÓÚURSNIFбäÌåµÄÊÖÒÕÆÊÎö±¨¸æ
10ÔÂ19ÈÕ£¬MandiantÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þURSNIFбäÌåµÄÊÖÒÕÆÊÎö±¨¸æ¡£Ð±äÌåÔÚ6ÔÂÊ״α»·¢Ã÷£¬Óë֮ǰµÄµü´ú°æ±¾²î±ð£¬Õâ¸ö±»³ÆÎªLDR4µÄбäÌå²»ÊÇÒøÐÐľÂí£¬¶øÊÇÒ»¸öͨË׵ĺóÃÅ£¨ÀàËÆÓÚSAIGON±äÌ壩¡£ÓëLDR4Ïà¹ØµÄ¹¥»÷Á´Ê¼ÓÚÕÐÆ¸Ïà¹ØµÄÀ¬»øÓʼþÔ˶¯£¬Óʼþ°üÀ¨Ö¸Ïò±»Ñ¬È¾ÍøÕ¾µÄÁ´½Ó£¬Á´½ÓÖØ¶¨Ïòµ½Î±×°³ÉÕýµ±¹«Ë¾µÄÓò¡£»áÏÂÔØ°üÀ¨ÓëÓʼþÓÕ¶üÏà¹ØµÄExcelÎĵµ£¬·¿ªºó½«ÏÂÔØ²¢Ö´ÐÐLDR4 payload¡£¶Ô×îбäÌå´úÂëµÄÆÊÎöÅú×¢£¬¿ª·¢Ö°Ô±ÒѾÍêȫɾ³ýÁËÒøÐÐÏà¹Ø¹¦Ð§¡£
https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud


¾©¹«Íø°²±¸11010802024551ºÅ