°Ä´óÀûÑǾü·½µÄͨѶƽ̨ForceNetÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-11-03
¾Ý·͸Éç10ÔÂ31ÈÕ±¨µÀ£¬°Ä´óÀûÑÇForceNetÔâµ½ÁËÀÕË÷¹¥»÷¡£ForceNetÊÇÓɹú·À²¿ÍⲿICT¹©Ó¦ÉÌÔËÓªµÄ£¬ÊǰĴóÀûÑǾüʺ͹ú·ÀְԱʹÓõÄͨѶƽ̨¡£¹ú·À²¿ÖúÀí²¿³¤ÌåÏÖ£¬¸Ã·þÎñÔâµ½¹¥»÷£¬µ«µ½ÏÖÔÚΪֹûÓÐÈκÎÊý¾Ýй¶¡£¾Ý°Ä´óÀûÑÇýÌ峯£¬Ò»Ð©Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬Èç¾üÊÂÖ°Ô±µÄ³öÉúÈÕÆÚºÍÈëÎéϸ½ÚµÈ¿ÉÄÜÒѱ»µÁ¡£¹ú·À²¿½²»°ÈË͸¶£¬ËûÃÇÕýÔÚ¼ì²éÊÜÓ°ÏìÊý¾Ý¼¯µÄÄÚÈݼ°Æä°üÀ¨µÄСÎÒ˽¼ÒÐÅÏ¢£¬²¢ÒÑ֪ͨËùÓÐÏà¹ØÖ°Ô±¡£
https://www.reuters.com/technology/ransomware-hackers-hit-australian-defence-communications-platform-2022-10-31/
2¡¢Ñо¿Ö°Ô±Åû¶Azure Cosmos DBÖеÄRCEÎó²îCosMiss
¾Ý11ÔÂ1ÈÕ±¨µÀ£¬Orca SecurityÑо¿Ö°Ô±Åû¶ÁËAzure Cosmos DBÄÚÖõÄJupyter NotebooksÖеÄRCEÎó²îCosMiss¡£ÈôÊǹ¥»÷ÕßÖªµÀNotebookµÄ'forwardingId'£¬¼´Notebook WorkspaceµÄUUID£¬ËûÃǽ«ÓµÓÐNotebookµÄÍêÕûȨÏÞ¶øÎÞÐè¾ÙÐÐÉí·ÝÑéÖ¤£¬°üÀ¨¶ÁÈ¡ºÍдÈë»á¼ûȨÏÞ¡£Ñо¿Ö°Ô±ÓÚ2022Äê10ÔÂ3ÈÕÏòMicrosoft±¨¸æÁ˸ÃÎó²î£¬Èí¼þ¹©Ó¦ÉÌÔÚ10ÔÂ5ÈÕÐÞ¸´ÁËËü¡£MicrosoftÚ¹Êͳƣ¬²»Ê¹ÓÃJupyter NotebooksµÄ¿Í»§£¨99.8%µÄ¿Í»§£©²»Ò×Êܵ½´ËÎó²îµÄÓ°Ïì ¡£
https://thehackernews.com/2022/11/researchers-disclose-details-of.html
3¡¢DropboxÔâµ½´¹ÂÚ¹¥»÷µ¼ÖÂ130¸öGitHub´æ´¢¿âй¶
DropboxÔÚ11ÔÂ1ÈÕ͸¶£¬ºÚ¿ÍʹÓô¹ÂÚ¹¥»÷ÖлñµÃµÄÔ±¹¤Æ¾Ö¤»á¼ûÆäÒ»¸öGitHubÕÊ»§ºóÇÔÈ¡ÁË130¸ö´úÂë´æ´¢¿â¡£¸Ã¹«Ë¾ÓÚ10ÔÂ14ÈÕ·¢Ã÷¹¥»÷ÕßÈëÇÖÁ˸ÃÕÊ»§£¬´Ë´Î¹¥»÷Õë¶Ô¶àÃûDropboxÔ±¹¤£¬Í¨¹ýð³äCircleCIµÄÓʼþ½«ËûÃÇÖØ¶¨Ïòµ½´¹ÂÚÒ³Ãæ£¬²¢ÒªÇóËûÃÇÊäÈëGitHubƾ֤¡£¸Ã¹«Ë¾³Æ£¬ÊÜÓ°Ïì´æ´¢¿â°üÀ¨ÆäΪDropboxʹÓöøÉÔ×÷Ð޸ĵĵÚÈý·½¿â¸±±¾¡¢ÄÚ²¿ÔÐÍÒÔ¼°Çå¾²ÍŶÓʹÓõÄһЩ¹¤¾ßºÍÉèÖÃÎļþ£¬²¢²»°üÀ¨½¹µãÓ¦ÓóÌÐò»ò»ù´¡ÉèÊ©µÄ´úÂë¡£
https://www.bleepingcomputer.com/news/security/dropbox-discloses-breach-after-hacker-stole-130-github-repositories/
4¡¢Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý100Íò´Î
¾ÝMalwarebytes 11ÔÂ1ÈÕ±¨µÀ£¬Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý100Íò´Î¡£ÕâЩӦÓÃÈÔÈ»±£´æÓÚ¿ª·¢ÕßÕË»§Mobile apps Group֮ϣ¬»®·ÖΪBluetooth Auto Connect¡¢Bluetooth App Sender¡¢Driver: Bluetooth, Wi-Fi, USBºÍMobile transfer: smart switch¡£ËüÃǿɽ«Óû§ÒýÏòÇÔÊØÐÅÏ¢»òΪÔËÓªÍŶӴ´Á¢"pay-per-click"ÊÕÈëµÄÍøÕ¾¡£ÆäÖÐÒ»Ð©ÍøÕ¾ÓÕʹĿµÄÏÂÔØÎ±ÔìµÄÇå¾²¹¤¾ß»ò¸üУ¬ÒÔʹÓÃÆäÊÖ¶¯×°ÖöñÒâÎļþ¡£
https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
5¡¢Emotet¶ÌÔÝͣЪ5¸öÔÂºó»Ø¹é£¬·Ö·¢¶ñÒâExcel¸½¼þ
ýÌå11ÔÂ2Èճƣ¬ÔÚÂÄÀúÁ˽ü5¸öÔµġ°¼ÙÆÚ¡±Ö®ºó£¬EmotetÔÙ´Î×îÏȹ¥»÷Ô˶¯¡£CryptolaemusÑо¿Ö°Ô±±¨¸æËµ£¬ÔÚÃÀ¹ú¶«²¿Ê±¼ä11ÔÂ2ÈÕÆÆÏþ4:00×óÓÒ£¬EmotetͻȻÔٴλîÔ¾ÆðÀ´£¬ÏòÈ«ÇòµÄÓʼþµØµã·¢ËÍÀ¬»øÓʼþ¡£¸ÃÔ˶¯Ê¹Óñ»µÁµÄµç×ÓÓʼþ»Ø¸´Á´½ÓÀ´·Ö·¢¶ñÒâExcel¸½¼þ£¬ÒÔÖÖÖÖÓïÑÔºÍÎļþÃûÕë¶ÔÈ«ÇòÓû§£¬Î±×°³É·¢Æ±¡¢É¨Ãè¼þ¡¢µç×Ó±í¸ñµÈÓÕ¶ü¡£±ðµÄ£¬Ô˶¯»¹ÒýÈëÁËÒ»¸öеÄExcel¸½¼þÄ£°å£¬ÆäÖаüÀ¨ÈƹýMicrosoftÊܱ£»¤ÊÓͼµÄ˵Ã÷¡£
https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-5-month-break/
6¡¢KasperskyÐû²¼2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄÆÊÎö±¨¸æ
KasperskyÔÚ11ÔÂ1ÈÕÐû²¼ÁË2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¸Ã¼¾¶ÈµÄÖ÷ÒªÇ÷ÊÆ°üÀ¨£ºAPTÔ˶¯ÂþÑܺÜÊÇÆÕ±é£¬±¾¼¾¶ÈµÄ¹¥»÷¹æÄ£À©´óµ½Å·ÖÞ¡¢ÃÀ¹ú¡¢º«¹ú¡¢°ÍÎ÷¡¢Öж«ºÍÑÇÖÞ¸÷µØ£»APT¹¥»÷ÍÅ»ïÑ¡ÔñµÄÄ¿µÄ¶àÑù»¯£¬°üÀ¨Õþ¸®ºÍÍâ½»»ú¹¹¡¢¹ú·À³Ð°üÉÌ¡¢½ðÈÚÐÐÒµ¡¢¿Æ¼¼Ó²¼þºÍ°ëµ¼ÌåÐÐÒµ£¬ÒÔ¼°ITÕÐÆ¸µÈ£»µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÖ÷ÒªÇý¶¯Á¦£¬Ìع¤Ô˶¯ÊÇAPTÔ˶¯µÄÖ÷ҪĿµÄ¡£±ðµÄ£¬±¨¸æ»¹ÏÈÈÝÁËÓë¶íÂÞ˹¡¢Öж«¡¢¶«ÄÏÑǺͳ¯Ïʰ뵺µÈµØÇøÏà¹ØµÄAPTÔ˶¯¡£
https://securelist.com/apt-trends-report-q3-2022/107787/


¾©¹«Íø°²±¸11010802024551ºÅ