SAPÐû²¼Çå¾²¸üÐÂÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
Ðû²¼Ê±¼ä 2023-03-161¡¢SAPÐû²¼Çå¾²¸üУ¬ÐÞ¸´Ó°ÏìÆä¶à¸ö²úÆ·µÄ19¸öÎó²î
3ÔÂ14ÈÕ£¬Èí¼þ¹©Ó¦ÉÌSAPÒÑÕë¶Ô19¸öÎó²îÐû²¼ÁËÇå¾²¸üС£´Ë´ÎÐÞ¸´µÄÎó²îÓ°ÏìÁËÐí¶à²úÆ·£¬µ«ÑÏÖØµÄÎó²î»áÓ°ÏìSAP Business ObjectsÉÌÒµÖÇÄÜÆ½Ì¨(CMC)ºÍSAP NetWeaver¡£´Ë´ÎÐÞ¸´µÄ5¸ö½ÏΪÑÏÖØµÄÎó²î»®·ÖΪ´úÂë×¢ÈëÎó²î£¨CVE-2023-25616£©¡¢Ä¿Â¼±éÀúÎó²î£¨CVE-2023-27269ºÍCVE-2023-27500£©¡¢È±ÉÙÉí·ÝÑéÖ¤¼ì²éÎó²î£¨CVE-2023-23857£©ÒÔ¼°ÏÂÁîÖ´ÐÐÎó²î£¨CVE-2023-25617£©¡£Ñо¿Ö°Ô±½¨ÒéÁ¬Ã¦×°Öò¹¶¡¡£
https://www.bleepingcomputer.com/news/security/sap-releases-security-updates-fixing-five-critical-vulnerabilities/
2¡¢LockBit³Æ´ÓMaximum Industries»ñÈ¡µ½SpaceXµÄÊý¾Ý
¾ÝýÌå3ÔÂ14Èճƣ¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÉú²ú¹«Ë¾Maximum IndustriesµÄϵͳ²¢»ñÈ¡µ½SpaceXµÄÉñÃØÊý¾Ý¡£Maximum IndustriesרÃÅ´ÓÊÂË®µ¶ºÍ¼¤¹âÇиîÒÔ¼°CNC¼Ó¹¤·þÎñ£¬ÊÇSpaceXµÄµÚÈý·½³Ð°üÉÌÖ®Ò»¡£¹¥»÷ÕßÌåÏÖÇÔÈ¡ÁËԼĪ3000ÕÅÓÉspace-x¹¤³ÌʦÈÏÖ¤µÄͼֽ£¬²¢ÍýÏëÔÚÒ»ÖÜÄÚÌᳫÅÄÂô£¬½«ÕâЩͼֽÂô¸øÆäËûÖÆÔìÉÌ¡£ÏÖÔÚ£¬Ñо¿Ö°Ô±ÒѾÁªÏµÁËSpaceXºÍMaximum Industries£¬µ«ËûÃǶ¼Ã»ÓлØÓ¦¡£
https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html
3¡¢Ò½ÁƱ£½¡ÌṩÉÌILS͸¶Áè¼Ý420Íò»¼ÕßµÄÐÅϢй¶
ýÌå3ÔÂ15Èճƣ¬Ò½ÁƱ£½¡ÌṩÉÌIndependent Living Systems(ILS)Ðû²¼Í¨ÖªÍ¸Â¶Êý¾Ýй¶ÊÂÎñÓ°ÏìÁË4226508¸ö»¼Õß¡£¸Ã¹«Ë¾·¢Ã÷ÆäϵͳÓÚ2022Äê7ÔÂ5ÈÕÔâµ½¹¥»÷£¬ËæºóÊÓ²ìÏÔʾ¹¥»÷ÕßÔÚ2022Äê6ÔÂ30ÈÕÖÁ7ÔÂ5ÈÕ»ñµÃÁ˲¿·ÖILSϵͳµÄ»á¼ûȨÏÞ¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÄÉ˰ÈËʶÓÖÃûºÍÒ½ÁÆÐÅÏ¢µÈ¡£ILSÔÚ·¢Ã÷Î¥¹æÐÐΪºóµÄÁù¸öÔºó£¬Ò²¾ÍÊÇ2023Äê1ÔÂ17ÈÕÍê³ÉÁËÈ·¶¨ÊÜÓ°ÏìСÎÒ˽¼Ò»òʵÌåµÄÄÚ²¿Éó²é¡£×îºó£¬ILSÌåÏÖ½«ÎªÊÜÓ°Ï컼ÕßÌṩΪÆÚÒ»ÄêµÄExperianÉí·Ý±£»¤·þÎñ¡£
https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/
4¡¢CiscoÅû¶YoroTrooperÕë¶ÔCIS¹ú¼ÒÕþ¸®ºÍÄÜÔ´×éÖ¯µÄ¹¥»÷
CiscoÔÚ3ÔÂ14ÈÕÅû¶ÁËÒ»¸öÐµĹ¥»÷ÍÅ»ïYoroTrooper£¬Ö÷ÒªÕë¶Ô×ÔÁ¦¹ú¼ÒÍŽáÌå(CIS)¹ú¼ÒµÄÕþ¸®ºÍÄÜÔ´×éÖ¯¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê6ÔÂ×îÏÈ»îÔ¾£¬ÒѾÈëÇÖÁËÒ»¸ö´ÓÊÂÒ½ÁƱ£½¡µÄÖ÷ҪŷÃË»ú¹¹¡¢ÌìÏÂ֪ʶ²úȨ×éÖ¯(WIPO)ºÍ¶à¸öÅ·ÖÞ´óʹ¹Ý¡£YoroTrooperµÄ¹¤¾ß°üÀ¨ÉÌÆ·ºÍ×Ô½ç˵ÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂíºÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þ£¬Ñ¬È¾Á´ÓɶñÒâ¿ì½Ý·½·¨Îļþ(LNK)ºÍ¿ÉÑ¡µÄÓÕ¶üÎļþ×é³É¡£
https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/
5¡¢ESET·¢Ã÷TickÕë¶Ô¶«ÑÇijDLPÈí¼þ¿ª·¢É̵Ĺ¥»÷Ô˶¯
3ÔÂ14ÈÕ£¬ESET³ÆÆä·¢Ã÷ÁËAPT×éÖ¯TickÕë¶Ô¶«ÑÇÒ»¼Ò¿ª·¢Êý¾Ýɥʧ·À»¤(DLP)Èí¼þµÄ¹«Ë¾µÄÔ˶¯¡£¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄÄÚ²¿¸üзþÎñÆ÷£¬ÔÚÈí¼þ¿ª·¢É̵ÄϵͳÄÚÈö²¥¶ñÒâÈí¼þ£¬²¢Ä¾Âí»¯¸Ã¹«Ë¾Ê¹ÓõÄÕýµ±¹¤¾ßµÄ×°ÖóÌÐò£¬×îÖÕµ¼ÖÂÔÚ¹«Ë¾¿Í»§µÄÅÌËã»úÉÏÖ´ÐжñÒâÈí¼þ¡£ÔÚÈëÇÖÀú³ÌÖУ¬¹¥»÷Õß×°ÖÃÁËÒ»¸öеÄÏÂÔØ³ÌÐòShadowPy£¬»¹Ê¹ÓÃÁ˺óÃÅNetboy£¨ÓÖÃûInvader£©ºÍÏÂÔØ³ÌÐòGhostdown¡£
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
6¡¢Check PointÐû²¼¹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ
Check PointÔÚ3ÔÂ14ÈÕÐû²¼Á˹ØÓÚAndroidľÂíFakeCallsµÄÆÊÎö±¨¸æ¡£ÕâÖÖ¶ñÒâÈí¼þ¿ÉÒÔαװ³É20¶àÖÖ½ðÈÚÓ¦Ó㬲¢Ä£ÄâÓëÒøÐлò½ðÈÚ·þÎñÔ±¹¤µÄµç»°ÅÊ̸¾ÙÐÐÓïÒô´¹ÂÚ¹¥»÷¡£FakeCallsÖ÷ÒªÕë¶Ôº«¹ú£¬¾ßÓÐÈðÊ¿¾üµ¶µÄ¹¦Ð§£¬²»µ«Äܹ»Ö´ÐÐÆäÖ÷ҪʹÃü£¬²¢ÇÒÄܹ»´ÓÄ¿µÄ×°±¸ÖÐÇÔȡСÎÒ˽¼ÒÊý¾Ý¡£Ñо¿Ö°Ô±³ÆÆä·¢Ã÷ÁË2500¶à¸öFakeCallsÑù±¾£¬ËüÃÇʹÓÃÁËÖÖÖÖÄ£Äâ½ðÈÚ×éÖ¯µÄ×éºÏ²¢ÊµÑéÁË ·´ÆÊÎöÊÖÒÕ¡£
https://research.checkpoint.com/2023/south-korean-android-banking-menace-fakecalls/


¾©¹«Íø°²±¸11010802024551ºÅ