NBA͸¶ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿·ÖÇòÃÔÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-201¡¢NBA͸¶ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿·ÖÇòÃÔÐÅϢй¶
¾ÝýÌå3ÔÂ17ÈÕ±¨µÀ£¬NBA£¨ÃÀ¹ú¹ú¼ÒÀºÇòлᣩ͸¶ÆäµÚÈý·½Ê±ÊÆÍ¨Ñ¶·þÎñ³ÖÓеIJ¿·ÖÇòÃÔСÎÒ˽¼ÒÐÅϢй¶¡£NBAÌåÏÖÆäϵͳ²¢Î´Ôâµ½¹¥»÷£¬¸ÃÊÂÎñÓ°ÏìÁËÊýÄ¿²»ÏêµÄСÎÒ˽¼Ò¡£¾Ý¸ÃÐ»á³Æ£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼û²¢½¨ÉèÁ˲¿·ÖÇòÃÔµÄÐÕÃûºÍÓʼþµØµãµÄ¸±±¾£¬Óû§Ãû¡¢ÃÜÂëºÍÆäËüÐÅÏ¢²¢Î´Ð¹Â¶¡£NBA»¹ÌáÐѵÀ£¬ÓÉÓÚËùÉæ¼°Êý¾ÝµÄÃô¸ÐÐÔ£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò¿ÉÄÜÔâµ½´¹ÂÚ¹¥»÷ºÍÖÖÖÖÕ©ÆÔ˶¯£¬½¨ÒéÔÚ·¿ª¿ÉÒÉÓʼþ»òͨѶʱ¼á³ÖСÐÄ¡£
https://www.bleepingcomputer.com/news/security/nba-alerts-fans-of-a-data-breach-exposing-personal-information/
2¡¢Emotet»ØºÏ²¢Ê¹ÓÃMicrosoft OneNoteÎļþÈÆ¹ý¼ì²â
¾Ý3ÔÂ18ÈÕ±¨µÀ£¬EmotetÏÖÔÚͨ¹ýMicrosoft OneNoteÓʼþ¸½¼þ¾ÙÐзַ¢£¬Ö¼ÔÚÈÆ¹ýMicrosoftÇå¾²ÏÞÖÆ²¢Ñ¬È¾¸ü¶àÄ¿µÄ¡£EmotetÔÚÒÑÍùµÄÒ»ÄêÀïʱ¶ÏÊ±Ðø£¬×îÖÕÔÚ2022Äêµ×ǰ×èÖ¹Ô˶¯¡£ÔÚÐÝÕûÈý¸öÔºó£¬Emotet¾íÍÁÖØÀ´£¬ÓÚ±¾ÔÂÔçЩʱ¼ä·¢ËͶñÒâÓʼþ¡£Õâ¸öÔ˶¯×î³õ±£´æÈ±ÏÝ£¬ËüÈÔȻʹÓôøÓкêµÄWordºÍExcelÎĵµ£¬ÓÉÓÚMicrosoftµÄÇå¾²ÏÞÖÆËüÖ»ÄÜѬȾÉÙÊýÈË¡£¹¥»÷ÕßÏÖÔÚʹÓöñÒâOneNote¸½¼þ·Ö·¢Emotet£¬ÕâЩ¸½¼þÔÚð³äÖ¸ÄÏ¡¢²Ù×÷Ö¸ÄÏ¡¢·¢Æ±¡¢ÊÂÇé²Î¿¼µÈ»Ø¸´Á´µç×ÓÓʼþÖС£
https://www.bleepingcomputer.com/news/security/emotet-malware-now-distributed-in-microsoft-onenote-files-to-evade-defenses/
3¡¢ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÖ°Ô±ÔÚÃÀ¹úŦԼ±»²¶
ýÌå3ÔÂ18Èճƣ¬ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÖ°Ô±PompompurinÓÚÉÏÖÜÈýÔÚŦԼ±»²¶¡£2022ÄêRaidForums±»²é·âºó£¬Pompourin½¨ÉèÁËÒ»¸öÃûΪBreachForumsµÄÐÂÂÛ̳À´Ìî²¹¿Õȱ¡£ËüÒѳÉΪͬÀàÖÐ×î´óµÄÊý¾Ýй¶ÂÛ̳£¬³£±»ºÚ¿ÍºÍÀÕË÷ÍÅ»ïÓÃÀ´Ð¹Â¶Êý¾Ý¡£Æ¾Ö¤·¨Í¥Îļþ£¬ÏÓÒÉÈ˱»Ö¸¿Ø·¸Ò»Ïîıº¦ÊµÑé»á¼û×°±¸Ú²ÆµÄ×ïÃû¡£PompourinÒÔ300000ÃÀÔªµÄ±£Êͽð»ñÊÍ£¬²¢½«ÓÚ3ÔÂ24ÈÕÔÚ¸¥¼ªÄáÑǶ«ÇøµØÒªÁìÔº³öÍ¥¡£¾ÝϤ£¬×èÖ¹ÏÖÔÚÂÛ̳ÈÔÈ»¿ÉÒÔ»á¼û¡£
https://www.hackread.com/breach-forums-owner-pompompurin-arrested-new-york/
4¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þTrigonaÕë¶ÔÎ÷Å·µÈµØµÄÔ˶¯
Unit 42ÓÚ3ÔÂ16ÈÕÅû¶ÁËÀÕË÷Èí¼þTrigonaÕë¶ÔÎ÷Å·µÈµØµÄÔ˶¯¡£TrigonaÓÚ2022Äê10ÔÂÏÂÑ®Ê״α»·¢Ã÷£¬ÔÚ12Ô·dz£»îÔ¾£¬Ó°ÏìÁËÖÁÉÙ15¸ö×éÖ¯£¬Éæ¼°ÖÆÔì¡¢½ðÈÚ¡¢ÐÞ½¨¡¢Å©Òµ¡¢ÓªÏúºÍ¸ß¿Æ¼¼ÐÐÒµ¡£¸ÃÀÕË÷Èí¼þ»áʹÓðüÀ¨JavaScript´úÂëµÄ.htaÊê½ð¼Í¼ÏòÄ¿µÄÏÔʾ¸¶¿î˵Ã÷¡£Ñо¿Ö°Ô±ÔÚTrigona¹¥»÷ÖÐÊӲ쵽µÄһЩ¹¤¾ßºÍÊÖÒÕ°üÀ¨£¬NetScan¡¢Start.batÅú´¦Öóͷ£¾ç±¾¡¢Turnoff.bat¡¢Newuser.bat¡¢Mimikatz¡¢DC4.exeºÍAdvanced Port Scanner¡£
https://unit42.paloaltonetworks.com/trigona-ransomware-update/
5¡¢Î¢Èí¸ÅÊöKillNet½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷
΢ÈíÔÚ3ÔÂ17ÈÕÐû²¼±¨¸æ£¬¸ÅÊöÁËÒÑÍùÈý¸öÔÂKillNet¼°ÆäÁ¥Êô×éÖ¯½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷¡£Ñо¿Ö°Ô±ÕÉÁ¿ÁË2022Äê11ÔÂ18ÈÕÖÁ2023Äê2ÔÂ17ÈÕÌìÌìÕë¶ÔAzureÖÐÒ½ÁÆ»ú¹¹µÄ¹¥»÷´ÎÊý£¬·¢Ã÷ÁË´ÓÌìÌì10-20´Î¹¥»÷µ½40-60´Î¹¥»÷µÄÇ÷ÊÆ¡£ÓÐÒ»ÔÙ¹¥»÷µÖ´ïÿÃë5MÊý¾Ý°ü(pps)£¬µ«´ó´ó¶¼¹¥»÷¶¼µÍÓÚ2M pps¡£±¨¸æ»¹ÏêÊöÁËKillNetµÄÒ»ÔÙ¹¥»÷Ô˶¯£¬ÀýÈçÕë¶ÔijҽÁƱ£½¡ÌṩÉ̵ÄDDoS¹¥»÷£¬·åֵΪ1.3M pps£¬¹¥»÷ÔØÌåΪTCP SYN¡¢TCP ACKºÍÊý¾Ý°üÒì³££¬Ò»Á¬Á˲»µ½12Сʱ¡£
https://www.microsoft.com/en-us/security/blog/2023/03/17/killnet-and-affiliate-hacktivist-groups-targeting-healthcare-with-ddos-attacks/
6¡¢SentinelLabsÐû²¼Winter Vivern¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
3ÔÂ16ÈÕ£¬SentinelLabsÐû²¼Á˹ØÓÚAPTÍÅ»ïWinter Vivern¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£½üÆÚÔ˶¯ÖУ¬¸ÃÍÅ»ïÖ÷ÒªÕë¶Ô²¨À¼Õþ¸®»ú¹¹¡¢ÎÚ¿ËÀ¼Íâ½»²¿¡¢Òâ´óÀûÍâ½»²¿ºÍÓ¡¶ÈÕþ¸®ÄÚ²¿µÄСÎÒ˽¼Ò£¬ÒÔ¼°µçÐŹ«Ë¾¡£¸ÃÍÅ»ïʹÓÃÁËÒ»ÖÖеÄÓÕ¶üÊÖÒÕ£¬Éæ¼°Ä£ÄâÕþ¸®ÓòÀ´·Ö·¢¶ñÒâÈí¼þ¡£ÔÚÒ»¸ö°¸ÀýÖУ¬¹¥»÷ÕßʹÓÃWindowsÅú´¦Öóͷ£ÎļþÀ´Ã°³äɱ¶¾É¨Ãè³ÌÐò£¬¶øÏÖʵÉÏÊÇÔÚÏÂÔØ¶ñÒâpayload¡£±ðµÄ£¬Winter VivernʹÓõÄÒ»ÖÖÐÂpayloadÔÚ¹¦Ð§ÉÏËÆºõÓëAperefitÏàËÆ£¬µ«Éè¼Æ²¢²»ÍêÕû£¬Åú×¢ËüÈÔÔÚ¾ÙÐÐÖС£
https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/


¾©¹«Íø°²±¸11010802024551ºÅ