EverestÈëÇÖÄϷǹúÓеçÁ¦¹«Ë¾ESKOM²¢ÀÕË÷20ÍòÃÀÔª

Ðû²¼Ê±¼ä 2022-10-11
1¡¢EverestÈëÇÖÄϷǹúÓеçÁ¦¹«Ë¾ESKOM²¢ÀÕË÷20ÍòÃÀÔª

      

¾ÝýÌå10ÔÂ9ÈÕ±¨µÀ£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïEverestÈëÇÖÁËÄϷǹúÓеçÁ¦¹«Ë¾ESKOM ¡£¡£¡£¡£¡£EverestÔÚ2022Äê3ÔÂÐû²¼ÉùÃ÷³ÆÒÔ12.5ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛÄϷǵçÁ¦¹«Ë¾µÄroot»á¼ûȨÏÞ£¬£¬£¬£¬Æäʱ¸Ã¹«Ë¾·ñ¶¨±¬·¢ÁËÇå¾²ÊÂÎñ ¡£¡£¡£¡£¡£10ÔÂ8ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±³ÆESKOM Hld SOC LtdµÄЧÀÍÆ÷Óöµ½ÎÊÌâ ¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬EverestÐû²¼Á˹¥»÷ÉùÃ÷£¬£¬£¬£¬ÌåÏÖ¿ÉÒÔ»á¼û¹«Ë¾µÄËùÓÐЧÀÍÆ÷£¬£¬£¬£¬»¹Ìṩһ¸öÈí¼þ°ü£¬£¬£¬£¬ÆäÖаüÀ¨´øÓÐÖÎÀíÔ±¡¢root¡¢ÓÃÓÚLinuxºÍWindowsЧÀÍÆ÷µÄϵͳÖÎÀíÔ±ÃÜÂëµÄЧÀÍÆ÷µÈ£¬£¬£¬£¬ÒªÇó¸Ã¹«Ë¾Ö§¸¶20ÍòÃÀÔª ¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/136866/cyber-crime/south-africa-eskom-everest-ransomware.html


2¡¢·áÌï³ÆÆäT-ConnectЧÀÍÖÐÔ¼29Íò¿Í»§µÄÐÅÏ¢¿ÉÄÜй¶

      

¾Ý·͸Éç10ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬·áÌïÆû³µ¹«Ë¾·¢Ã÷ÆäT-ConnectЧÀÍÖÐÔ¼29Íò¿Í»§µÄÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶ ¡£¡£¡£¡£¡£Toyota T-ConnectÊǸù«Ë¾µÄ¹Ù·½ÅþÁ¬Ó¦Ó㬣¬£¬£¬³µÖ÷¿ÉʹÓøÃÓ¦Óý«ÖÇÄÜÊÖ»úÓë³µÁ¾µÄÐÅÏ¢ÓéÀÖϽµµÍ¬½ÓÆðÀ´ ¡£¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌÌåÏÖ£¬£¬£¬£¬¿ª·¢T-ConnectÍøÕ¾µÄ³Ð°üÉ̲»Ð¡ÐÄÉÏ´«ÁË´øÓй«¹²ÉèÖõIJ¿·ÖÔ´´úÂ룬£¬£¬£¬ÆäÖаüÀ¨´æ´¢¿Í»§ÓʼþµØµãºÍÖÎÀíºÅÂëµÄÊý¾ÝЧÀÍÆ÷µÄ»á¼ûÃÜÔ¿ ¡£¡£¡£¡£¡£ÕâʹµÃδ¾­ÊÚȨµÄµÚÈý·½¿ÉÒÔÔÚ2017Äê12ÔÂÖÁ2022Äê9ÔÂ15ÈÕ»á¼û296019Ãû¿Í»§µÄÏêϸÐÅÏ¢ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÔÚ2022Äê9ÔÂ17ÈÕ¸ü¸ÄÁËÊý¾Ý¿âµÄÃÜÔ¿ ¡£¡£¡£¡£¡£


https://www.reuters.com/technology/toyota-says-information-about-296000-users-its-t-connect-service-leaked-2022-10-07/


3¡¢ÒÁÀʹúÓª¹ã²¥¹«Ë¾ÔÚÖ±²¥ÐÂÎÅʱÔâµ½Edalate AliµÄ¹¥»÷

      

10ÔÂ10ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÒÁÀʹ㲥¹«Ë¾IRIBÔËÓªµÄIRINNÔÚÉÏÖÜÁùÍíÉϲ¥³öÐÂÎÅͨ¸æÊ±Ôâµ½Á˺ڿ͹¥»÷ ¡£¡£¡£¡£¡£ÃûΪEdalate AliµÄºÚ¿ÍÉù³Æ¶Ô´ËÊÂÈÏÕæ£¬£¬£¬£¬¹¥»÷ÊÇÒÔAnonymousÌᳫµÄOpIranÐж¯µÄÃûÒå¾ÙÐÐµÄ ¡£¡£¡£¡£¡£ÖÜÁùÏÂÖç17:30 GMT×óÓÒ£¬£¬£¬£¬¸ÃƵµÀÔÚ²¥·ÅÐÂÎÅʱͻȻÖÐÖ¹£¬£¬£¬£¬²¢×îÏȲ¥·ÅÀ´×Ժڿ͵ÄÐÂÎÅ ¡£¡£¡£¡£¡£¸ÃÍÅ»ï»¹ÔøÓÚÈ¥Äê8ÔÂÈëÇÖÁ˵ºÚÀ¼±±²¿ÀÎÓüµÄϵͳºÍÉãÏñÍ·£¬£¬£¬£¬ÒÔ½ÒÆÆÀÎÓüÖеÄÑÏ¿áÌõ¼þºÍÇּ෸ȨµÄÐÐΪ ¡£¡£¡£¡£¡£


https://www.hackread.com/iran-state-run-tv-hacked-edalate-ali-hackers/


4¡¢BidenCashÃâ·ÑÐû²¼Áè¼Ý120ÍòÕÅÐÅÓÿ¨µÄÖ§¸¶ÐÅÏ¢

      

ýÌå10ÔÂ9Èճƣ¬£¬£¬£¬BidenCashÐû²¼ÁË1221551ÕÅÐÅÓÿ¨µÄÐÅÏ¢£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÃâ·ÑÏÂÔØËüÃÇÀ´¾ÙÐнðÈÚÕ©Æ­ ¡£¡£¡£¡£¡£BidenCashÊÇÒ»¸öÉúÒâ±»µÁÐÅÓÿ¨µÄÊг¡£¬£¬£¬£¬ÓÚ2022Äê6ÔÂÍÆ³ö£¬£¬£¬£¬ËüЧ·ÂÁËÀàËÆÆ½Ì¨All World CardsÔÚ2021Äê8Ô½ÓÄɵķ½·¨£¬£¬£¬£¬ÒÔ´ó¹æÄ£Íƹã¸ÃÍøÕ¾ ¡£¡£¡£¡£¡£´Ë´ÎÐû²¼µÄÎļþ°üÀ¨À´×ÔÌìϸ÷µØµÄÓÐÓÃÆÚΪ2023ÄêÖÁ2026ÄêµÄÐÅÓÿ¨ÜöÝÍ£¬£¬£¬£¬´ó´ó¶¼ËƺõÀ´×ÔÃÀ¹ú£¬£¬£¬£¬ÆäÖÐÉæ¼°¿¨ºÅ¡¢×èÖ¹ÈÕÆÚ¡¢CVVºÅÂë¡¢³ÖÓÐÈËÐÕÃûºÍÒøÐÐÃû³ÆµÈÐÅÏ¢ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/darkweb-market-bidencash-gives-away-12-million-credit-cards-for-free/


5¡¢¹þ·ðÉÌÒµ³öÊéÉçÔÚÍÁ¶úÆäµÄÔÊÐí¹«Ë¾Ôâµ½ÀÕË÷¹¥»÷

      

ýÌå10ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬¹þ·ðÉÌÒµ³öÊéÉçÔÚÍÁ¶úÆäµÄÔÊÐí¹«Ë¾Ôâµ½ÁËÀÕË÷¹¥»÷ ¡£¡£¡£¡£¡£9ÔÂ16ÈÕ£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±·¢Ã÷ÁËinfomag.com.trµÄÒ»¸ö¿ª·ÅµÄMongoDBʵÀý£¬£¬£¬£¬InfomagÒÔÍÁ¶úÆäÓï³öÊé¡¶Åí²©ÉÌÒµÖÜ¿¯¡·ºÍ¡¶¹þ·ðÉÌҵ̸ÂÛ¡· ¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÍйÜÔÚÍÁ¶úÆä£¬£¬£¬£¬Ô¼Îª3.9GB£¬£¬£¬£¬ÓÐÁè¼Ý1950ÍòÌõ¼Í¼£¬£¬£¬£¬152000ÌõÓë¿Í»§ÓйصÄÐÅÏ¢£¬£¬£¬£¬×îÔç¿ÉÒÔ×·Ëݵ½2017Äê ¡£¡£¡£¡£¡£9ÔÂ19ÈÕ£¬£¬£¬£¬CybernewsÖØÐ»á¼û¸ÃÊý¾Ý¿âÉó²éËüÊÇ·ñ¹Ø±Õʱ£¬£¬£¬£¬µÃÖªËüÔâµ½ÁËÀÕË÷¹¥»÷ ¡£¡£¡£¡£¡£¹¥»÷ÕßÀÕË÷0.01±ÈÌØ±Ò£¬£¬£¬£¬²¢ÒÔÎ¥·´GDPRÃæÁÙ¾Þ¶î·£¿£¿£¿ £¿£¿£¿£¿îΪÍþв£¬£¬£¬£¬InfomagËÆºõ²¢Î´¸¶Êê½ð ¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/136860/cyber-crime/harvard-business-publishing-licensee-hit-by-ransomware.html


6¡¢TrellixÐû²¼BazarCallÉ繤¹¥»÷Õ½ÂÔÑݱäµÄÆÊÎö±¨¸æ

      

10ÔÂ6ÈÕ£¬£¬£¬£¬TrellixÐû²¼Á˹ØÓÚBazarCallÉ繤¹¥»÷Õ½ÂÔÑݱäµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£¡£Æ¾Ö¤ÆÊÎö£¬£¬£¬£¬Trellix¸ÅÊöÁËBazarCall»î¶¯µÄ¹¥»÷Á÷³Ì£¬£¬£¬£¬²¢½«Æä·ÖΪÈý¸ö½×¶Î£¬£¬£¬£¬»¹Õ¹ÏÖÁËÉ繤¹¥»÷Õ½ÂÔµÄÑÝ±ä ¡£¡£¡£¡£¡£´ËÀ๥»÷ÓÚ2021Äê3ÔÂÊ״ηºÆð£¬£¬£¬£¬×îеĻÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢¼ÓÄôó¡¢Ó¢¹ú¡¢Ó¡¶ÈºÍÈÕ±¾µÈ¹ú¼ÒµÄÓû§£¬£¬£¬£¬ÆäÖдó´ó¶¼¶¼ÔÚÍÆËÍÃûΪsupport.Client.exeµÄClickOnce¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬¸ÃÎļþ»áÔÚÆô¶¯Ê±»á×°ÖÃÔ¶³Ì»á¼û¹¤¾ßScreenConnect ¡£¡£¡£¡£¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/evolution-of-bazarcall-social-engineering-tactics.html