ConnectWiseÐÞ¸´¿ÉÓ°ÏìÊýǧ̨ЧÀÍÆ÷µÄRCEÎó²î

Ðû²¼Ê±¼ä 2022-11-01

1¡¢ConnectWiseÐÞ¸´¿ÉÓ°ÏìÊýǧ̨ЧÀÍÆ÷µÄRCEÎó²î

      

ýÌå10ÔÂ28Èճƣ¬£¬£¬£¬ £¬£¬£¬ConnectWiseÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬ £¬£¬£¬ÐÞ¸´ÁËConnectWise RecoverºÍR1Soft Server Backup Manager(SBM)Çå¾²±¸·Ý½â¾ö¼Æ»®ÖеÄÎó²î¡£¡£¡£¸ÃÎó²îÊÇÏÂÓÎ×é¼þʹÓõÄÊä³öÖÐÌØÊâÔªËØµÄÖкͲ»µ±ÎÊÌ⣬£¬£¬£¬ £¬£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´»á¼ûÉñÃØÊý¾Ý»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£Æ¾Ö¤ShodanɨÃ裬£¬£¬£¬ £¬£¬£¬Áè¼Ý4800̨R1SoftЧÀÍÆ÷¿ÉÄÜ»áÔâµ½´ËÀ๥»÷¡£¡£¡£¸ÃÎó²î±»±ê¼ÇΪ¸ßÓÅÏȼ¶£¬£¬£¬£¬ £¬£¬£¬¼´ÔÚ¹¥»÷Öб»Ê¹ÓõÄΣº¦ºÜ¸ß¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄConnectWise Recover sbmÒÑ×Ô¶¯¸üе½×îа汾(v2.9.9)¡£¡£¡£


https://www.bleepingcomputer.com/news/security/connectwise-fixes-rce-bug-exposing-thousands-of-servers-to-attacks/


2¡¢Ó¢¹úǰÔ׺âLiz TrussµÄÊÖ»ú¾Ý³Æ±»ÍøÂçÌØ¹¤ÈëÇÖ

      

¾ÝÓ¢¹ú¡¶ÖðÈÕÓʱ¨¡·10ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬£¬Ó¢¹úǰÔ׺âÀû×È¡¤ÌØÀ­Ë¹£¨Liz Truss£©µÄ˽ÈËÊÖ»úÔâµ½ÒÉËÆÀ´×Ô¶íÂÞ˹µÄÈëÇÖ¡£¡£¡£¾ÝϤ£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÒѾ­»ñµÃÁËÓëÖ÷Òª¹ú¼ÊÏàÖúͬ°éµÄ¾øÃܽ»Á÷£¬£¬£¬£¬ £¬£¬£¬ÒÔ¼°ÓëËýµÄÖ÷ÒªÕþÖÎÃËÓÑ¿äÎ÷¡¤¿ËÎÖëøµÄ˽ÈË̸»°¡£¡£¡£ÓÐÐÂÎųÆ£¬£¬£¬£¬ £¬£¬£¬¸ÃÊÖ»úÒѱ»ÑÏÖØË𻵣¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚ°²ÅÅÔÚÕþ¸®Çå¾²µãµÄÒ»¸ö°ü¹ÜÏäÖС£¡£¡£¹¥»÷ÕßÔÚÏÄÈÕÊØ¾Éµ³Ïòµ¼¾ºÑ¡Ê±´úÈëÇÖÁËÌØÀ­Ë¹µÄÊÖ»ú£¬£¬£¬£¬ £¬£¬£¬ÆäʱµÄÔ׺ⱫÀï˹¡¤Ô¼º²Ñ·ºÍÄÚ¸óÃØÊéÎ÷ÃÉ¡¤¿­Ë¹¾öÒéÖÜÈ«·â±Õ¸ÃÊÂÎñ¡£¡£¡£¡¶ÐÇÆÚÈÕÓʱ¨¡·Í¸Â¶£¬£¬£¬£¬ £¬£¬£¬ÌØÀ­Ë¹¼°25λÄڸ󲿳¤µÄÊÖ»úºÅÂëÒ»ÆðÔÚÍøÉϳöÊÛ£¬£¬£¬£¬ £¬£¬£¬ÊÛ¼Û½öΪ6.49Ó¢°÷¡£¡£¡£


https://securityaffairs.co/wordpress/137826/intelligence/liz-truss-phone-hacked.html


3¡¢AndroidľÂíDrinikбäÌå¹¥»÷Ó¡¶ÈµÄ18¼Ò½ðÈÚ»ú¹¹

      

CybleÔÚ10ÔÂ27ÈÕ³ÆÆä·¢Ã÷DrinikµÄбäÌåÕë¶ÔÓ¡¶ÈµÄ18¼Ò½ðÈÚ»ú¹¹¡£¡£¡£2016Ä꣬£¬£¬£¬ £¬£¬£¬Drinik¶ñÒâÈí¼þµÄÔçÆÚ±äÖÖÊ״α»·¢Ã÷ÊÇSMSÇÔÈ¡³ÌÐò£¬£¬£¬£¬ £¬£¬£¬Ô¼ÄªÔÚ2021Äê8ÔÂÆäÔٴλîÔ¾£¬£¬£¬£¬ £¬£¬£¬ÕâÒ»´ÎÑݱäΪAndroidÒøÐÐľÂí¡£¡£¡£×îа汾µÄ¶ñÒâÈí¼þαװ³ÉÃûΪiAssistµÄAPK£¬£¬£¬£¬ £¬£¬£¬Éù³ÆÊÇÓ¡¶È˰Îñ²¿·ÖµÄ¹Ù·½Ë°ÎñÖÎÀí¹¤¾ß¡£¡£¡£×îÖջὫĿµÄÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾£¬£¬£¬£¬ £¬£¬£¬²¢ÓÕʹËûÃÇÊäÈë²ÆÎñÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬ÈçÕʺš¢ÐÅÓÿ¨ºÅ¡¢CVVºÍPINµÈ¡£¡£¡£


https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/


4¡¢BlackByteÉù³ÆÒѹ¥»÷Asahi Group²¢ÀÕË÷60ÍòÃÀÔª

      

¾Ý10ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬£¬ÀÕË÷ÍÅ»ïBlackByteÉù³ÆÒÑÈëÇÖÁËϸÃܽðÊôÖÆÔìºÍ½ðÊô½â¾ö¼Æ»®ÌṩÉÌAsahi Group Holdings¡£¡£¡£BlackByteÌåÏÖÒѴӸù«Ë¾ÇÔÈ¡ÁËÊýǧÕ××Ö½ÚµÄÎļþ£¬£¬£¬£¬ £¬£¬£¬°üÀ¨²ÆÎñºÍÏúÊÛ±¨¸æ¡£¡£¡£¸ÃÍÅ»ïÒªÇó50ÍòÃÀÔª¹ºÖÃÊý¾Ý£¬£¬£¬£¬ £¬£¬£¬²¢ÒªÇó60ÍòÃÀԪɾ³ý±»µÁÊý¾Ý¡£¡£¡£BlackByte×Ô2021Äê9ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬ £¬£¬£¬FBIÔÚ2Ô·Ý͸¶¸ÃÍÅ»ïÒÑÈëÇÖÁËÃÀ¹úÖÁÉÙ3¸öÉæ¼°Òªº¦»ù´¡ÉèÊ©ÁìÓòµÄ×éÖ¯¡£¡£¡£


https://securityaffairs.co/wordpress/137803/cyber-crime/blackbyte-ransomware-asahi-group-holdings.html


5¡¢Î¢ÈíÐû²¼¹ØÓÚRaspberry RobinÈ䳿µÄÆÊÎö±¨¸æ

      

΢ÈíÔÚ10ÔÂ27ÈÕÐû²¼Á˹ØÓÚRaspberry RobinÈ䳿µÄÆÊÎö±¨¸æ¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬±»×·×ÙΪDEV-0950µÄ×é֯ʹÓÃClopÀÕË÷Èí¼þÀ´¼ÓÃÜÏÈǰѬȾÁËRaspberry RobinÈ䳿µÄÍøÂ磬£¬£¬£¬ £¬£¬£¬DEV-0950µÄ»î¶¯ÓëFIN11ºÍTA505ÍÅ»ïÖØµþ¡£¡£¡£³ýÁËÀÕË÷Èí¼þ£¬£¬£¬£¬ £¬£¬£¬Raspberry Robin»¹±»ÓÃÓÚ½«×°ÖÃÆäËüµÚ¶þ½×¶Îpayload£¬£¬£¬£¬ £¬£¬£¬°üÀ¨IcedID¡¢BumblebeeºÍTruebot¡£¡£¡£Î¢Èí»¹Ö¸³ö£¬£¬£¬£¬ £¬£¬£¬Ô¼1000¸ö×éÖ¯µÄ½ü3000̨װ±¸ÔÚÒÑÍù30ÌìÄÚ·ºÆðÁËÖÁÉÙÒ»´ÎÓëRaspberry Robin payloadÏà¹ØµÄ¾¯±¨¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/


6¡¢NSAµÈ»ú¹¹Ðû²¼Èí¼þ¹©Ó¦ÉÌÔõÑù±£»£»£»£»£»¤¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ

      

¾ÝýÌå10ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬£¬NSA¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)Ðû²¼¹ØÓÚÈí¼þ¹©Ó¦ÉÌÔõÑù±£»£»£»£»£»¤¹©Ó¦Á´Çå¾²µÄÖ¸ÄÏ£¬£¬£¬£¬ £¬£¬£¬°üÀ¨Çå¾²ÐèÇóÍýÏëºÍÈí¼þÇ徲ά»¤¡£¡£¡£Èí¼þ¹©Ó¦ÉÌÈÏÕæÁªÏµ¿Í»§ºÍÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬ £¬£¬£¬Í¨¿ÉÒÔͨ¹ýÌõԼЭÒé¡¢Èí¼þÐû²¼ºÍ¸üС¢Í¨ÖªºÍÎó²î»º½âµÈ·½·¨Ó¦ÓÃÌØÁíÍâÇå¾²¹¦Ð§¡£¡£¡£¸ÃÖ¸ÄÏÊÇÔÚ×î½ü¶à´Î±¸ÊÜÖõÄ¿µÄÍøÂç¹¥»÷Ö®ºóÐû²¼µÄ£¬£¬£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷͹ÏÔÁ˹ú¼ÒÖ§³ÖµÄ¹¥»÷Õß¿ÉÒÔÇáËɵØÊ¹ÓÃÈí¼þ¹©Ó¦Á´ÖеÄÎó²î¡£¡£¡£


https://media.defense.gov/2022/Oct/31/2003105368/-1/-1/0/SECURING_THE_SOFTWARE_SUPPLY_CHAIN_SUPPLIERS.PDF