IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-08-16

1¡¢IBMÔâµ½¹¥»÷µ¼Ö¿ÆÂÞÀ­¶àÖÝHCPFÁè¼Ý400ÍòÈ˵ÄÐÅϢй¶


¾ÝýÌå8ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖÝÒ½ÁƱ£½¡Õþ²ßÓëÈÚ×ʲ¿(HCPF)ÏòÁè¼Ý400ÍòÈË·¢³ö֪ͨ£¬£¬£¬£¬³ÆÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËËûÃǵÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£HCPF³ÎÇå˵£¬£¬£¬£¬ËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷£¬£¬£¬£¬¿ÉÊÇËûÃǵijаüÉÌIBMÔâµ½ÁËÕë¶ÔMOVEitµÄ¹¥»÷¡£¡£¡£6ÔÂ13ÈÕÊӲ췢Ã÷£¬£¬£¬£¬IBMʹÓõÄMOVEitÓ¦ÓÃÉϵIJ¿·ÖHCPFÎļþÔÚ5ÔÂ28ÈÕ×óÓÒ±»»á¼û£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ä³Ð©Health First ColoradoºÍCHP+»áÔ±ÐÅÏ¢µÄÎļþ¡£¡£¡£×ܹ²Ó°ÏìÁË4091794ÈË£¬£¬£¬£¬HPCF½«Í¨¹ýExperianΪÊÜÓ°ÏìÓû§ÌṩÁ½ÄêµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/colorado-warns-4-million-of-data-stolen-in-ibm-moveit-breach/


2¡¢Akamai·¢Ã÷Õë¶ÔÔËÐÐMagento 2µÄµçÉÌÆ½Ì¨µÄXurum»î¶¯


AkamaiÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÔËÐÐMagento 2 CMSµÄµçÉÌÆ½Ì¨µÄ¹¥»÷»î¶¯£¬£¬£¬£¬²¢½«¸Ã»î¶¯ÃüÃûΪXurum¡£¡£¡£»£»£»£»£»£»£»î¶¯Ê¼ÓÚ1Ô·Ý£¬£¬£¬£¬Ê¹ÓÃÁËAdobe CommerceºÍMagento Open SourceÖеÄЧÀÍÆ÷¶ËÄ£°å×¢ÈëÎó²î£¨CVE-2022-24086£©¡£¡£¡£¹¥»÷ÕßËÆºõ¶ÔÄ¿µÄMagentoÊÐËÁÒÑÍù10ÌìÄÚËù϶©µ¥µÄ¸¶¿îͳ¼ÆÊý¾Ý¸ÐÐËȤ¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËwso-ng£¬£¬£¬£¬ÕâÊÇа汾µÄWSO webshell¡£¡£¡£»£»£»£»£»£»£»î¶¯»¹Ê¹ÓÃÁ˽ϾɵÄDirty COWÎó²î(CVE-2016-5195)£¬£¬£¬£¬ÒÔʵÑéÔÚLinuxÖÐÌáȨ¡£¡£¡£ÓÐÖ¤¾ÝÅú×¢¹¥»÷Óë¶íÂÞ˹Óйء£¡£¡£ 


https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell


3¡¢ÀÕË÷Èí¼þMonti¾íÍÁÖØÀ´Ö÷ÒªÕë¶ÔÖ´·¨ºÍÕþ¸®ÁìÓò»ú¹¹


8ÔÂ14ÈÕ£¬£¬£¬£¬Trend Micro·¢Ã÷ʱ¸ô2¸öÔºóMonti¾íÍÁÖØÀ´£¬£¬£¬£¬ÖØµã¹Ø×¢Ö´·¨ºÍÕþ¸®ÁìÓò»ú¹¹¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬»ùÓÚLinuxƽ̨µÄMontiбäÌåÒ²ÒѸ¡³öË®Ãæ£¬£¬£¬£¬Óë֮ǰµÄ°æ±¾ÓÐ×ÅÏÔ×Ųî±ð¡£¡£¡£ÒÔǰ°æ±¾ºÜºéÁ÷ƽÉÏ»ùÓÚContiй¶µÄ´úÂ루99%£©£¬£¬£¬£¬µ«ÐÈÎÃüܳÌÐòµÄÏàËÆ¶È½öΪ29%¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬Í¨¹ý¶Ô´úÂ루ÓÈÆäÊǼÓÃÜËã·¨£©¾ÙÐдó×ÚÐ޸쬣¬£¬£¬MontiÈÆ¹ý¼ì²âµÄÄÜÁ¦»ñµÃÌá¸ß£¬£¬£¬£¬ÕâÔöÌíÁ˼ì²â»ººÍ½â´ËÀà¶ñÒâ»î¶¯µÄÄѶȡ£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/monti-ransomware-unleashes-a-new-encryptor-for-linux.html


4¡¢ZscaleÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT


ZscaleÔÚ8ÔÂ10ÈÕÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøµÄ½ðÈڿƼ¼ÐÐÒµµÄJanelaRAT¡£¡£¡£×èÖ¹6Ô·Ý£¬£¬£¬£¬JanelaRATÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖÞµØÇøÒøÐкͽðÈÚ»ú¹¹£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈںͼÓÃÜÇ®±ÒÏà¹ØÊý¾Ý£¬£¬£¬£¬²¢Ê¹ÓÃÀ´×ÔÕýµ±ÈªÔ´£¨ÈçVMWareºÍMicrosoft£©µÄDLL²à¼ÓÔØÊÖÒÕÀ´Èƹý¼ì²â¡£¡£¡£±ðµÄ£¬£¬£¬£¬JanelaRAT¾ßÓд°¿ÚÎÊÌâ¸ÐÖª»úÖÆ£¬£¬£¬£¬²¢½ÓÄɶ¯Ì¬Ì×½ÖÉ×ÓèÖÃϵͳ¡£¡£¡£JanelaRATµÄ¿ª·¢Õß¿ÉÄÜ´ÓBX RATµÄ´úÂëÖлñµÃÁËÁé¸Ð£¬£¬£¬£¬µ«Ëü½ö¾ß±¸BX RATÌṩµÄ²¿·Ö¹¦Ð§£¬£¬£¬£¬Ã»Óе¼ÈëshellÏÂÁîÖ´Ðеȹ¦Ð§¡£¡£¡£


https://www.zscaler.com/blogs/security-research/janelarat-repurposed-bx-rat-variant-targeting-latam-fintech


5¡¢Kaspersky³Æ´ó×Ú±»ºÚµÄWPÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷


¾Ý8ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬Kaspersky·¢Ã÷´ó×Ú±»ºÚµÄWordPressÍøÕ¾±»ÓÃÓÚÖ´Ðд¹ÂÚ¹¥»÷¡£¡£¡£5ÔÂ15ÈÕµ½7ÔÂ31ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË22400¸öWordPressÍøÕ¾±»ºÚ¿Í¹¥»÷ÒÔ½¨Éè´¹ÂÚÒ³Ãæ¡£¡£¡£Í³Ò»Ê±ÆÚÄÚ£¬£¬£¬£¬Óû§×ܹ²ÊµÑé»á¼û±»Ñ¬È¾ÍøÕ¾ÉÏÍйܵÄÐéÎ±Ò³Ãæ200213´Î¡£¡£¡£×î³£±»´¹ÂÚ¹¥»÷µÄЧÀÍºÍÆóÒµ°üÀ¨Netflix¡¢Å·ÖÞµÄÒøÐкͳ£¼ûµÄ¿ìµÝЧÀÍ¡£¡£¡£Kaspersky»¹ÏêÊöÁËÄÄÐ©ÍøÕ¾×îÈÝÒ×Ôâµ½ºÚ¿Í¹¥»÷¡¢ÔõÑùÈëÇÖWordPressÍøÕ¾ÒÔ¼°WordPressÍøÕ¾±»ºÚµÄ¼£ÏóµÈ¡£¡£¡£


https://securelist.com/phishing-with-hacked-sites/110334/


6¡¢UptycsÐû²¼¹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ


8ÔÂ14ÈÕ£¬£¬£¬£¬UptycsÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þQwixxRATµÄÆÊÎö±¨¸æ¡£¡£¡£Ñо¿Ö°Ô±ÓÚ8ÔÂÉÏÑ®·¢Ã÷Á˸öñÒâÈí¼þ£¬£¬£¬£¬Ëüͨ¹ýTelegramºÍDiscordƽ̨¾ÙÐÐÈö²¥¡£¡£¡£Ã¿Öܶ©ÔÄ·ÑΪ150¬²¼£¬£¬£¬£¬µ«Ò²ÓÐÓÐÏÞµÄÃâ·Ñ°æ±¾¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬RAT¾Í»áÉñÃØÍøÂçÊý¾Ý£¬£¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄTelegram bot¡£¡£¡£ÎªÁËÈÆ¹ýɱ¶¾Èí¼þµÄ¼ì²â£¬£¬£¬£¬RATͨ¹ýTelegram bot¾ÙÐÐC2¡£¡£¡£³ýÁËÇÔÈ¡Êý¾ÝÖ®Í⣬£¬£¬£¬QwixxRAT»¹ÓµÓÐǿʢµÄÔ¶³ÌÖÎÀí¹¤¾ß£¬£¬£¬£¬¿É¿ØÖÆÄ¿µÄ×°±¸ºÍÆô¶¯ÏÂÁî¡£¡£¡£


https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram