°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚ3TBÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-03-09

1¡¢°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚÔ¼3TBÊý¾Ýй¶


¾ÝýÌå3ÔÂ7ÈÕ±¨µÀ £¬°ÍÎ÷µÄ¿ç¹ú¹«Ë¾Andrade GutierrezÔ¼3TBµÄÊý¾Ýй¶¡£ÕâÊÇÀ­¶¡ÃÀÖÞ×î´óµÄ¹¤³Ì¹«Ë¾Ö®Ò» £¬ÈÏÕæ¸ÃµØÇø»ù´¡ÉèÊ©¡¢ÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»ÆøÒÔ¼°ÔËÊäÁìÓòµÄÖØ´óÏîÄ¿¡£ºÚ¿ÍDark AngelsÉù³ÆÇÔÈ¡ÁË3TBµÄÓʼþºÍ¹«Ë¾Êý¾Ý £¬Éæ¼°Ô±¹¤ÐÕÃû¡¢»¤ÕÕÐÅÏ¢¡¢¸¶¿îÐÅÏ¢ºÍ˰ºÅµÈСÎÒ˽¼ÒÐÅÏ¢ £¬ÒÔ¼°¼¸¸ö×ÅÃûÐÞ½¨ÏîÄ¿µÄÀ¶Í¼¡£¾ÝϤ £¬Ð¹Â¶ÊÂÎñ±¬·¢ÔÚÈ¥Äê9ÔÂÖÁ10Ô¡£


https://www.infosecurity-magazine.com/news/brazilian-conglomerate-3tb-data/ 


2¡¢FortinetÐÞ¸´Ó°ÏìFortiOSºÍFortiProxyµÄÎó²î


3ÔÂ7ÈÕ £¬FortinetÐû²¼¸üР£¬ÐÞ¸´ÁËÒ»¸öÓ°ÏìFortiOSºÍFortiProxyµÄ»º³åÇøÒç³öÎó²î¡£¸ÃÎó²î£¨CVE-2023-25610£©µÄCVSSÆÀ·ÖΪ9.3 £¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÃÌØÖÆÇëÇó £¬À´ÔÚGUIÉÏÖ´ÐÐí§Òâ´úÂë»ò¾Ü¾ø·þÎñ(DoS)¡£Fortinetͨ¸æ³Æ £¬ÏÖÔÚÉÐδ·¢Ã÷ÈκÎÔÚÒ°ÍâʹÓõÄÇéÐΡ£¹ØÓÚÎÞ·¨Ó¦ÓøüеÄÓû§ £¬Fortinet½¨Òé½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏÞÖÆ¿ÉÔ¶³Ì»á¼ûµÄIPµØµã¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability/


3¡¢Check Point·¢Ã÷Sharp Panda¹¥»÷¶«ÄÏÑÇÕþ¸®»ú¹¹µÄÔ˶¯


3ÔÂ7ÈÕ £¬Check Point³ÆÆä·¢Ã÷ÁËSharp PandaÕë¶Ô¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ¹¥»÷Ô˶¯¡£¸ÃÔ˶¯´Ó2022Äêµ××îÏȲ¢Ò»Á¬µ½2023Äê £¬Ê¹ÓÃÓã²æÊ½´¹ÂÚ¹¥»÷¾ÙÐгõʼÈëÇÖ¡£´¹ÂÚÓʼþµÄ¶ñÒ⸽¼þ×°ÖÃRoyalRoad RTF¹¤¾ß°ü £¬±ýÊÔͼʹÓÃÎó²îÔÚÖ÷»úÉÏ·Ö·¢¶ñÒâÈí¼þ¡£È»ºó×°Öò¢Ö´ÐÐÒ»¸öDLL¶ñÒâÈí¼þÏÂÔØ³ÌÐò £¬ËüÓÖ»á´ÓC2·þÎñÆ÷»ñÈ¡²¢Ö´Ðеڶþ¸öDLL £¬¼´SoulSearcher loader £¬×îÖÕ»á¼ÓÔØSoulÄ£¿é»¯¿ò¼Ü¡£


https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/


4¡¢Ñо¿Ö°Ô±Åû¶DJIÎÞÈË»úÖÐ16¸öÇå¾²Îó²îµÄÏêϸÐÅÏ¢


ýÌå3ÔÂ7ÈÕ³Æ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËDJIÎÞÈË»úÖеÄ16¸öÇå¾²Îó²î¡£ÕâЩÎó²îµÄÓ°Ïì¹æÄ£ºÜ¹ã £¬´Ó¾Ü¾ø·þÎñµ½í§Òâ´úÂëÖ´ÐС£ÖµµÃ×¢ÖØµÄÊÇ £¬ÆäÖÐÓÐ14¸öÎó²î¿ÉÒÔͨ¹ýÖÇÄÜÊÖ»úÔ¶³Ì´¥·¢ £¬¿ÉÄܵ¼ÖÂÎÞÈË»úÔÚº½ÐÐ;ÖÐ×¹»Ù¡£¹¥»÷Õß»¹¿ÉÒÔ¸üËûÈÕÖ¾Êý¾Ý»òÐòÁкÅÀ´Î±×°Éí·Ý £¬»òÕßÈÆ¹ý¶ÔËÙÂʺ͸߶ȷ½ÃæµÄÏÞÖÆ £¬ÒÔ¼°Í¨¹ýµØÀíΧÀ¸ºÍÐéÄâ½çÏß¶Ô½û·ÉÇøÓòµÄÏÞÖÆ¡£ÏÖÔÚ £¬DJIÒÑÐÞ¸´ÕâЩÎó²î¡£


https://www.hackread.com/dji-drones-flaw-crash-drones-mid-flight/


5¡¢TrendMicroÐû²¼2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ £¬Trend MicroÐû²¼ÁË2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£2022Äê £¬Trend Micro¼ì²âµ½ÁË1464ÒÚ´ÎÍþв £¬±ÈÉÏÒ»ÄêÔöÌíÁË55.3%¡£¹¥»÷Õß×î³£ÓõÄATT&CKÊÖÒÕΪԶ³Ì·þÎñ¡¢ÓÐÓÃÕÊ»§ºÍ²Ù×÷ϵͳƾ֤ת´¢¡£2022Äê £¬Microsoft×èÖ¹ÁËOfficeÎĵµÖкê³ÌÐòµÄÖ´ÐÐ £¬´Ë¾Ùµ¼ÖÂOfficeºêµÄʹÓÃϽµ £¬µ«¹¥»÷Õß×îÏÈѰÕÒÌæ»»¼Æ»® £¬ÀýÈçHTML×ß˽µÈÕ½ÂÔ¡£¹¥»÷ÕßÕë¶ÔÔÆ·þÎñ £¬°üÀ¨ÎÞ·þÎñÆ÷ƽ̨ÉϵũӦÁ´¹¥»÷ £¬ÒÔ¼°ÔÚLinuxϵͳÉÏÌᳫ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷¡£


https://www.trendmicro.com/en_us/research/23/c/expanding-attack-blueprints-2022-annual-cybersecurity-report-.html


6¡¢MorphisecÐû²¼¶ñÒâÈí¼þSYS01ÇÔÊØÐÅÏ¢µÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ £¬MorphisecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þSYS01µÄÆÊÎö±¨¸æ¡£×Ô2022Äê11ÔÂÒÔÀ´ £¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚÕë¶ÔÒªº¦Õþ¸®»ù´¡ÉèÊ©¡¢ÖÆÔ칫˾ºÍÆäËüÐÐÒµµÄ¹¥»÷¡£¹¥»÷Õßͨ¹ýʹÓùȸè¹ã¸æºÍÐéαµÄFacebookСÎÒ˽¼Ò×ÊÁÏÀ´Õë¶ÔFacebookÉÌÒµÕË»§ £¬ÓÕʹĿµÄÏÂÔØ¶ñÒâÎļþ¡£¸Ã¹¥»÷Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢ £¬°üÀ¨µÇ¼Êý¾Ý¡¢cookieÒÔ¼° Facebook¹ã¸æºÍÆóÒµÕÊ»§ÐÅÏ¢¡£ 


https://blog.morphisec.com/sys01stealer-facebook-info-stealer