ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæ3500ÍòÌõLinkedInÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2023-11-09
1¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæ3500ÍòÌõLinkedInÓû§Êý¾Ý


¾ÝýÌå11ÔÂ7ÈÕ±¨µÀ £¬ºÚ¿ÍUSDoDÔÚBreach ForumsÉÏй¶ÁËÁè¼Ý3500ÍòLinkedInÓû§µÄÐÅÏ¢ ¡£Ð¹Â¶µÄÊý¾Ý¿â·ÖΪÁ½²¿·Ö £¬Ò»²¿·Ö°üÀ¨500ÍòÌõÓû§¼Í¼ £¬µÚ¶þ²¿·Ö°üÀ¨3500ÍòÌõ¼Í¼ ¡£¸ÃºÚ¿ÍÌåÏÖ £¬×îеÄLinkedInÊý¾Ý¿âÊÇͨ¹ýÍøÂçץȡ»ñµÃµÄ ¡£ÆäÖаüÀ¨Óû§ÐÕÃûºÍСÎÒ˽¼Ò×ÊÁϵÈÐÅÏ¢ £¬ÉÐÓÐһЩÓʼþµØÖ·ÊôÓÚÃÀ¹úÕþ¸®µÄ¸ß¼¶¹ÙÔ±ºÍ»ú¹¹ ¡£Í³Ò»ºÚ¿ÍÔÚÈ¥ÄêÔøÈëÇÖÁËFBIÇ徲ƽ̨InfraGard £¬²¢Ð¹Â¶ÁË87000ÃûÓû§µÄÐÅÏ¢ ¡£


https://www.hackread.com/hacker-leaks-scraped-linkedin-user-records/


2¡¢¶íÂÞ˹µÄ¹úÓд¢±¸ÒøÐÐSberbankÔâµ½DDoS¹¥»÷


¾Ý11ÔÂ8ÈÕ±¨µÀ £¬¶íÂÞ˹Áª°î´¢±¸ÒøÐУ¨Sberbank£©Ôâµ½ÁË´ó¹æÄ£DDoS¹¥»÷ ¡£SberbankÊÇÒ»¼Ò¹úÓÐÒøÐкͽðÈÚ·þÎñ¹«Ë¾ £¬Ò²ÊǶíÂÞ˹×î´óµÄ½ðÈÚ»ú¹¹ £¬³ÖÓиùúÔ¼Èý·ÖÖ®Ò»µÄ×ʲú ¡£¶íÂÞ˹ýÌåInterfax³Æ £¬¹¥»÷ԼĪÔÚÁ½ÖÜǰ £¬µÖ´ïÁËÿÃë100Íò¸öÇëÇó(RPS) £¬ÕâԼĪÊǸÃÒøÐÐÆù½ñΪֹÔâµ½µÄ×î´ó¹æÄ£DDoS¹¥»÷µÄËı¶ ¡£¸Ã»ú¹¹»¹Í¸Â¶ÕâÊÇһЩеĺڿÍ £¬Ò²¾ÍÊÇ˵ £¬ÏÖÔÚ·ºÆðÁËһЩÐµĹ¥»÷ÍÅ»ï £¬ËûÃÇ×îÏÈϵͳÐԵع¥»÷¶íÂÞ˹×î´óµÄÒøÐÐ ¡£


https://www.bleepingcomputer.com/news/security/russian-state-owned-sberbank-hit-by-1-million-rps-ddos-attack/


3¡¢Ñо¿Ö°Ô±Åû¶BlueNorOffʹÓÃÐÂObjCShellzµÄ¹¥»÷


JamfÔÚ11ÔÂ7ÈÕÅû¶BlueNorOffÍÅ»ïʹÓÃÐÂmacOS¶ñÒâÈí¼þObjCShellzµÄ¹¥»÷Ô˶¯ ¡£Ñо¿Ö°Ô±Ê×ÏÈ·¢Ã÷ÁËÒ»¸öMach-OͨÓöþ½øÖÆÎļþÓëËûÃÇ֮ǰ¹éÀàΪ¶ñÒâµÄÓò¾ÙÐÐͨѶ £¬±»·¢Ã÷ʱËüÔÚVirusTotalÉϵļì²âÂÊΪÁã ¡£ObjCShellzÊÇ»ùÓÚObjective-CµÄ¶ñÒâÈí¼þ £¬³äµ±Ô¶³Ìshell £¬ÓÃÓÚÔÚ±»Ñ¬È¾µÄϵͳÉÏÖ´ÐÐÏÂÁî ¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄ³õʼ»á¼ûÔØÌå £¬µ«¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ¹¥»÷ºóÆÚÓÃÓÚÔÚÈëÇÖϵͳºóÊÖ¶¯Ö´ÐÐÏÂÁî ¡£


https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/


4¡¢²¿·ÖOutlookÓû§ÔÚ·¢ËͰüÀ¨¸½¼þµÄÓʼþʱ»á±¨´í


11ÔÂ7ÈÕ±¨µÀ³Æ £¬Î¢ÈíÌáÐÑOutlook.comÓû§ÔÚ·¢ËͰüÀ¨¸½¼þµÄµç×ÓÓʼþʱ¿ÉÄÜ»áÓöµ½ÎÊÌâ ¡£ÊܸÃÎÊÌâÓ°ÏìµÄÓû§ÔÚʵÑé·¢Ë͵ç×ÓÓʼþʱ»áÊÕµ½¹ýʧÌáÐÑ"Error code 550 5.7.520 Message blocked" ¡£Î¢ÈíÌṩÁËÒ»ÖÖÔÝʱ½â¾öÒªÁì £¬Ê¹ÊÜÓ°ÏìµÄÓû§Äܹ»¹²ÏíÎļþ£º½«ÎļþÉÏ´«µ½OneDrive²¢ÓëÊÕ¼þÈ˹²ÏíÁ´½Ó ¡£7Ô·Ý £¬Î¢ÈíÔø½â¾öÁËÌáÐÑ401Òì³£¹ýʧ²¢×èÖ¹OutlookÓû§ËÑË÷ÓʼþµÄÎÊÌâ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-some-outlookcom-users-cant-send-emails-with-attachments/


5¡¢SideCopyʹÓÃ×îеÄWinRARÎó²î¹¥»÷Ó¡¶ÈµÄ¾üÕþ»ú¹¹


11ÔÂ6ÈÕ £¬SEQRITE Labs APT-Team³ÆÆä·¢Ã÷ÁËÔÚÒÑÍù¼¸¸öÔÂÕë¶ÔÓ¡¶ÈÕþ¸®ºÍ¹ú·À»ú¹¹µÄ¶à¸öSideCopy¹¥»÷Ô˶¯ ¡£SideCopyÖÁÉÙ´Ó2019Äê×îÏÈ»îÔ¾ £¬±»ÏÓÒÉÊÇTransparent TribeµÄÒ»¸ö×ÓÍÅ»ï ¡£¸ÃÍÅ»ïÏÖÔÚÕýÔÚʹÓÃ×îеÄWinRARÎó²î£¨CVE-2023-38831£©À´·Ö·¢AllaKore RAT¡¢DRatºÍÆäËüpayload ¡£SEQRITE³ÆÕâÊÇ¶àÆ½Ì¨¹¥»÷Ô˶¯ £¬Ëü»¹Í¨¹ý¼æÈݰ汾µÄAres RATÈëÇÖLinuxϵͳ ¡£


https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/


6¡¢IBMÐû²¼GootloaderбäÌåGootBotµÄÆÊÎö±¨¸æ


11ÔÂ6ÈÕ £¬IBM X-ForceÐû²¼Á˹ØÓÚGootloaderбäÌåGootBotµÄÆÊÎö±¨¸æ ¡£¹¥»÷Õß¿ª·¢ÁËÒ»ÖÖÐÂÐÍC2ºÍºáÏòÒÆ¶¯¹¤¾ßGootBot £¬ÓÃÓÚÈ¡´úCobaltStrikeµÈÆäËü¹Å°åµÄʹÓÿò¼Ü ¡£ÏÖÔÚÊӲ쵽µÄÔ˶¯Ê¹ÓÃSEOÖж¾¾ÙÐзַ¢ ¡£Ñ¬È¾ºó £¬´ó×ÚGootBotÖ²Èë³ÌÐò»áÔÚÕû¸öÆóÒµÇéÐÎÖÐÈö²¥ £¬Ã¿¸öÖ²Èë³ÌÐò¶¼°üÀ¨²î±ðµÄÓ²±àÂëC2·þÎñÆ÷ £¬Òò´ËºÜÄѱ»×èÖ¹ ¡£GootBotÔÚVirusTotalÉϵļì²âÂÊΪÁã ¡£Gootloader»¹³äµ±³õʼ»á¼ûÌṩÕß £¬¿ÉÄÜ»á·Ö·¢ÀÕË÷Èí¼þ ¡£


https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/