Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶

Ðû²¼Ê±¼ä 2023-09-15

1¡¢Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶


¾Ý9ÔÂ13ÈÕ±¨µÀ £¬Èí¼þBug¸ú×Ù¹«Ë¾RollbarµÄϵͳÔâµ½ÈëÇÖ £¬µ¼Ö²¿·ÖÊý¾Ýй¶¡£RollbarÓÚ9ÔÂ6ÈÕÔÚÉó²éÊý¾Ý¿âÈÕ־ʱ·¢Ã÷ÁËÕâÒ»ÎÊÌâ £¬¸ÃÈÕÖ¾ÏÔʾ·þÎñÕÊ»§±»ÓÃÀ´µÇ¼»ùÓÚÔÆµÄBug¼à¿ØÆ½Ì¨¡£ºóÐøÊӲ췢Ã÷ £¬¹¥»÷ÕßÔÚ8ÔÂ9ÈÕÖÁ8ÔÂ11ÈÕ»á¼ûÁËÆäϵͳ £¬Éæ¼°Ãô¸ÐµÄ¿Í»§ÐÅÏ¢ £¬ÀýÈçÓû§Ãû¡¢ÓʼþµØÖ·¡¢ÕÊ»§ÃûºÍÏîÄ¿ÐÅÏ¢µÈ¡£¸üÖ÷ÒªµÄÊÇ £¬¹¥»÷Õß»¹¼ìË÷Á˿ͻ§ÓëRollbarÏîÄ¿½»»¥µÄÏîÄ¿»á¼ûÁîÅÆ¡£


https://www.bleepingcomputer.com/news/security/rollbar-discloses-data-breach-after-hackers-stole-access-tokens/


2¡¢Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯¾Ö(GMP)͸¶²¿·ÖÔ±¹¤µÄÐÅϢй¶


ýÌå9ÔÂ14ÈÕ³Æ £¬Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯Ô±¾Ö(GMP)²¿·ÖÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶ £¬Ôµ¹ÊÔ­ÓÉÊǵÚÈý·½¹©Ó¦ÉÌÔâµ½ÀÕË÷¹¥»÷¡£Ðû²¼µÄÉùÃ÷ÖÐδÌá¼°±»¹¥»÷¹«Ë¾µÄÃû³Æ £¬µ«ËüÊÇGMPµÈÓ¢¹úÆäËü»ú¹¹µÄ·þÎñ¹©Ó¦ÉÌ¡£GMP³ÆÔ±¹¤µÄ²ÆÎñÐÅÏ¢²¢Î´Ð¹Â¶¡£Ô¼Ò»¸öÔÂǰ £¬±±°®¶ûÀ¼¾¯¾Ö(PSNI)Ò²±¬·¢ÁËÒ»ÆðÀàËÆµÄÊÂÎñ £¬Ð¹Â¶ÁË10000¶àÃû¾¯Ô±µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡¢¾üÏκÍλÖá£


https://securityaffairs.com/150828/data-breach/greater-manchester-police-gmp-data-breach.html


3¡¢SymantecÔÚ×°ÖÃLockBitʧ°ÜµÄ¹¥»÷Öз¢Ã÷еÄ3AM


9ÔÂ13ÈÕ £¬Symantec³ÆÆä·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þ3AM¡£Ñо¿Ö°Ô±³Æ £¬Ê¹ÓÃ3AMµÄ¹¥»÷Ô˶¯ºÜÉÙ¼û £¬Æù½ñΪֹ½öÔÚ¹¥»÷ÕßδÄÜ×°ÖÃLockBitµÄÒ»´Î¹¥»÷Ô˶¯Öз¢Ã÷¹ý¸Ã¶ñÒâÈí¼þµÄ·Ö·¢¡£3AMÓÉRust¿ª·¢ £¬ÔÚ×îÏȼÓÃÜ֮ǰ £¬Ëü»áʵÑé×èÖ¹¶à¸ö·þÎñ £¬Íê³É¼ÓÃܺó»áɾ³ý¾íÓ°(VSS)¸±±¾¡£ÆäΪ¼ÓÃÜÎļþ¸½¼ÓµÄÀ©Õ¹ÃûÊÇ.Threeamtime £¬Ñо¿Ö°Ô±ÉÐδȷ¶¨3AM±³ºóµÄ¹¥»÷ÕßÊÇ·ñÓëÒÑÖªµÄ¹¥»÷ÍÅ»ïÓйØÁª¡£ 


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit


4¡¢TrendMicroÏêÊöRedLineºÍVidarÊÇÔõÑùʹÓÃEVÖ¤Êé


TrendMicroÔÚ9ÔÂ13ÈÕÏêÊöÁËRedLineºÍVidarµÄ¹¥»÷ÕßÔõÑùʹÓôøÓÐÀ©Õ¹ÑéÖ¤(EV)´úÂëÊðÃûµÄÖ¤Êé¡£×îÐÂÊÓ²ìÏÔʾ £¬RedLineºÍVidar±³ºóµÄ¹¥»÷Õß×îÏÈʹÓÃÓëÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐòÏàͬµÄ·½·¨À´·Ö·¢ÀÕË÷Èí¼þpayload¡£ÔÚÕâÒ»ÌØÊâ°¸ÀýÖÐ £¬Ä¿µÄ×î³õÊÕµ½µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´øÓÐÀ©Õ¹ÑéÖ¤£¨EV£©´úÂëÊðÃûÖ¤Êé £¬²»¾ÃºóËûÃÇ×îÏÈͨ¹ýͬÑùµÄ;¾¶ÊÕµ½ÁËÀÕË÷Èí¼þpayload¡£Ö»¹ÜCABFʵÑéÁ˸üÑÏ¿áµÄÇå¾²²½·¥ £¬µ«¹¥»÷ÕßÈÔÄÜÈö²¥Ê¹ÓÃEVÖ¤Êé¾ÙÐÐÊðÃûµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£


https://www.trendmicro.com/en_us/research/23/i/redline-vidar-first-abuses-ev-certificates.html 


5¡¢Î¢ÈíÌáÐÑStorm-0324½üÆÚʹÓÃMS TeamsµÄ´¹ÂÚ¹¥»÷


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ £¬Î¢ÈíÌáÐÑÖ÷ÒªÓëÀÕË÷ÍÅ»ïºÏ×÷µÄStorm-0324×î½üת¶øÊ¹ÓÃMicrosoft Teams´¹ÂÚ¹¥»÷À´ÈëÇÖÆóÒµÍøÂç¡£´Ó7Ô·Ý×îÏÈ £¬Storm-0324±»·¢Ã÷ʹÓÃTeams·¢ËÍ´¹ÂÚÓÕ¶ü £¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâSharePointÍйÜÎļþµÄÁ´½Ó¡£¹ØÓÚ´ËÔ˶¯ £¬¸ÃÍÅ»ï×îÓпÉÄÜÒÀÀµÓÚÃûΪTeamsPhisherµÄ¿ªÔ´¹¤¾ß¡£¸Ã¹¤¾ßÄܹ»Èƹý¶ÔÀ´×ÔÍⲿÓû§µÄ´«ÈëÎļþµÄÏÞÖÆ £¬²¢ÏòTeamsÓû§·¢ËÍ´¹ÂÚ¸½¼þ¡£Î¢ÈíÌåÏÖºÜÊÇÖØÊÓÕâЩ´¹ÂÚÔ˶¯ £¬²¢ÍƳöÁ˶àÏîˢв½·¥ £¬ÒÔ¸üºÃµØ·ÀÓùÕâЩ¹¥»÷¡£ 


https://thehackernews.com/2023/09/microsoft-warns-of-new-phishing.html


6¡¢KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄ±¨¸æ


9ÔÂ13ÈÕ £¬KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄͳ¼Æ±¨¸æ¡£2023ÄêÉϰëÄê £¬±»×èµ²¶ñÒ⹤¾ßµÄICSÅÌËã»ú±ÈÀý½Ï2022ÄêϰëÄêϽµÁË0.3¸ö°Ù·Öµã £¬½µÖÁ34%¡£´ÓµØÀíλÖÃÀ´¿´ £¬·ÇÖÞÔâµ½¹¥»÷µÄICSÅÌËã»ú×î¶à£¨Õ¼±È40.3%£© £¬¶ø±±Å·×îÉÙ£¨14.7%£©¡£¹¤³ÌºÍICS¼¯³É£¨ÔöÌí2%£©¡¢ÖÆÔ죨ÔöÌí1.9%£©ºÍÄÜÔ´£¨ÔöÌí1.5%£©ÁìÓòÔâµ½¹¥»÷µÄICSÅÌËã»úÓÐËùÔöÌí¡£»¥ÁªÍø¡¢µç×ÓÓʼþ¿Í»§¶ËºÍ¿ÉÒÆ¶¯×°±¸ÈÔÈ»ÊÇ×éÖ¯ÔËÓªÊÖÒÕ»ù´¡ÉèÊ©ÖÐÅÌËã»úµÄÖ÷ÒªÍþвȪԴ¡£


https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/110605/