°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚ3TBÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-03-09

1¡¢°ÍÎ÷¿ç¹ú¹«Ë¾Andrade Gutierrez±»ºÚÔ¼3TBÊý¾Ýй¶


¾ÝýÌå3ÔÂ7ÈÕ±¨µÀ£¬°ÍÎ÷µÄ¿ç¹ú¹«Ë¾Andrade GutierrezÔ¼3TBµÄÊý¾Ýй¶ ¡£ÕâÊÇÀ­¶¡ÃÀÖÞ×î´óµÄ¹¤³Ì¹«Ë¾Ö®Ò»£¬ÈÏÕæ¸ÃµØÇø»ù´¡ÉèÊ©¡¢ÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»ÆøÒÔ¼°ÔËÊäÁìÓòµÄÖØ´óÏîÄ¿ ¡£ºÚ¿ÍDark AngelsÉù³ÆÇÔÈ¡ÁË3TBµÄÓʼþºÍ¹«Ë¾Êý¾Ý£¬Éæ¼°Ô±¹¤ÐÕÃû¡¢»¤ÕÕÐÅÏ¢¡¢¸¶¿îÐÅÏ¢ºÍ˰ºÅµÈСÎÒ˽¼ÒÐÅÏ¢£¬ÒÔ¼°¼¸¸ö×ÅÃûÐÞ½¨ÏîÄ¿µÄÀ¶Í¼ ¡£¾ÝϤ£¬Ð¹Â¶ÊÂÎñ±¬·¢ÔÚÈ¥Äê9ÔÂÖÁ10Ô ¡£


https://www.infosecurity-magazine.com/news/brazilian-conglomerate-3tb-data/ 


2¡¢FortinetÐÞ¸´Ó°ÏìFortiOSºÍFortiProxyµÄÎó²î


3ÔÂ7ÈÕ£¬FortinetÐû²¼¸üУ¬ÐÞ¸´ÁËÒ»¸öÓ°ÏìFortiOSºÍFortiProxyµÄ»º³åÇøÒç³öÎó²î ¡£¸ÃÎó²î£¨CVE-2023-25610£©µÄCVSSÆÀ·ÖΪ9.3£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýʹÓÃÌØÖÆÇëÇó£¬À´ÔÚGUIÉÏÖ´ÐÐí§Òâ´úÂë»ò¾Ü¾ø·þÎñ(DoS) ¡£Fortinetͨ¸æ³Æ£¬ÏÖÔÚÉÐδ·¢Ã÷ÈκÎÔÚÒ°ÍâʹÓõÄÇéÐÎ ¡£¹ØÓÚÎÞ·¨Ó¦ÓøüеÄÓû§£¬Fortinet½¨Òé½ûÓÃHTTP/HTTPS¹ÜÀí½çÃæ»òÏÞÖÆ¿ÉÔ¶³Ì»á¼ûµÄIPµØÖ· ¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability/


3¡¢Check Point·¢Ã÷Sharp Panda¹¥»÷¶«ÄÏÑÇÕþ¸®»ú¹¹µÄÔ˶¯


3ÔÂ7ÈÕ£¬Check Point³ÆÆä·¢Ã÷ÁËSharp PandaÕë¶Ô¶«ÄÏÑÇÕþ¸®»ú¹¹µÄ¹¥»÷Ô˶¯ ¡£¸ÃÔ˶¯´Ó2022Äêµ××îÏȲ¢Ò»Á¬µ½2023Ä꣬ʹÓÃÓã²æÊ½´¹ÂÚ¹¥»÷¾ÙÐгõʼÈëÇÖ ¡£´¹ÂÚÓʼþµÄ¶ñÒ⸽¼þ×°ÖÃRoyalRoad RTF¹¤¾ß°ü£¬±ýÊÔͼʹÓÃÎó²îÔÚÖ÷»úÉÏ·Ö·¢¶ñÒâÈí¼þ ¡£È»ºó×°Öò¢Ö´ÐÐÒ»¸öDLL¶ñÒâÈí¼þÏÂÔØ³ÌÐò£¬ËüÓÖ»á´ÓC2·þÎñÆ÷»ñÈ¡²¢Ö´Ðеڶþ¸öDLL£¬¼´SoulSearcher loader£¬×îÖÕ»á¼ÓÔØSoulÄ£¿é»¯¿ò¼Ü ¡£


https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/


4¡¢Ñо¿Ö°Ô±Åû¶DJIÎÞÈË»úÖÐ16¸öÇå¾²Îó²îµÄÏêϸÐÅÏ¢


ýÌå3ÔÂ7Èճƣ¬Ñо¿Ö°Ô±·¢Ã÷ÁËDJIÎÞÈË»úÖеÄ16¸öÇå¾²Îó²î ¡£ÕâЩÎó²îµÄÓ°Ïì¹æÄ£ºÜ¹ã£¬´Ó¾Ü¾ø·þÎñµ½í§Òâ´úÂëÖ´ÐÐ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ÆäÖÐÓÐ14¸öÎó²î¿ÉÒÔͨ¹ýÖÇÄÜÊÖ»úÔ¶³Ì´¥·¢£¬¿ÉÄܵ¼ÖÂÎÞÈË»úÔÚº½ÐÐ;ÖÐ×¹»Ù ¡£¹¥»÷Õß»¹¿ÉÒÔ¸üËûÈÕÖ¾Êý¾Ý»òÐòÁкÅÀ´Î±×°Éí·Ý£¬»òÕßÈÆ¹ý¶ÔËÙÂʺ͸߶ȷ½ÃæµÄÏÞÖÆ£¬ÒÔ¼°Í¨¹ýµØÀíΧÀ¸ºÍÐéÄâ½çÏß¶Ô½û·ÉÇøÓòµÄÏÞÖÆ ¡£ÏÖÔÚ£¬DJIÒÑÐÞ¸´ÕâЩÎó²î ¡£


https://www.hackread.com/dji-drones-flaw-crash-drones-mid-flight/


5¡¢TrendMicroÐû²¼2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ£¬Trend MicroÐû²¼ÁË2022Äê¶ÈÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ ¡£2022Ä꣬Trend Micro¼ì²âµ½ÁË1464ÒÚ´ÎÍþв£¬±ÈÉÏÒ»ÄêÔöÌíÁË55.3% ¡£¹¥»÷Õß×î³£ÓõÄATT&CKÊÖÒÕΪԶ³Ì·þÎñ¡¢ÓÐÓÃÕÊ»§ºÍ²Ù×÷ϵͳƾ֤ת´¢ ¡£2022Ä꣬Microsoft×èÖ¹ÁËOfficeÎĵµÖкê³ÌÐòµÄÖ´ÐУ¬´Ë¾Ùµ¼ÖÂOfficeºêµÄʹÓÃϽµ£¬µ«¹¥»÷Õß×îÏÈѰÕÒÌæ»»¼Æ»®£¬ÀýÈçHTML×ß˽µÈÕ½ÂÔ ¡£¹¥»÷ÕßÕë¶ÔÔÆ·þÎñ£¬°üÀ¨ÎÞ·þÎñÆ÷ƽ̨ÉϵũӦÁ´¹¥»÷£¬ÒÔ¼°ÔÚLinuxϵͳÉÏÌᳫ¼ÓÃÜÇ®±ÒÍÚ¾ò¹¥»÷ ¡£


https://www.trendmicro.com/en_us/research/23/c/expanding-attack-blueprints-2022-annual-cybersecurity-report-.html


6¡¢MorphisecÐû²¼¶ñÒâÈí¼þSYS01ÇÔÊØÐÅÏ¢µÄÆÊÎö±¨¸æ


3ÔÂ7ÈÕ£¬MorphisecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þSYS01µÄÆÊÎö±¨¸æ ¡£×Ô2022Äê11ÔÂÒÔÀ´£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚÕë¶ÔÒªº¦Õþ¸®»ù´¡ÉèÊ©¡¢ÖÆÔ칫˾ºÍÆäËüÐÐÒµµÄ¹¥»÷ ¡£¹¥»÷Õßͨ¹ýʹÓùȸè¹ã¸æºÍÐéαµÄFacebookСÎÒ˽¼Ò×ÊÁÏÀ´Õë¶ÔFacebookÉÌÒµÕË»§£¬ÓÕʹĿµÄÏÂÔØ¶ñÒâÎļþ ¡£¸Ã¹¥»÷Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬°üÀ¨µÇ¼Êý¾Ý¡¢cookieÒÔ¼° Facebook¹ã¸æºÍÆóÒµÕÊ»§ÐÅÏ¢ ¡£ 


https://blog.morphisec.com/sys01stealer-facebook-info-stealer