ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§

Ðû²¼Ê±¼ä 2023-04-14

1¡¢ÏÖ´úÆû³µ±¬·¢Êý¾ÝÐ¹Â¶Éæ¼°·¨¹úºÍÒâ´óÀûµÄ¿Í»§


¾ÝýÌå4ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÏÖ´úÆû³µÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ó°ÏìÆä·¨¹úºÍÒâ´óÀûµÄ¿Í»§¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ֪ͨÖгÆ£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁ˿ͻ§Êý¾Ý¿â£¬£¬£¬£¬£¬£¬ËûÃÇ»¹ÔÚÈ·¶¨ÊÂÎñµÄ¹æÄ£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢¼ÒÍ¥µØµã¡¢µç»°ºÅÂëºÍ³µÁ¾Ê¶ÓÖÃûµÈ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÈËÊýÉв»ÇåÎú¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Òѽ«ÊÜÓ°ÏìµÄϵͳÏÂÏß¡£¡£¡£¡£¡£¡£½ñÄê2Ô·Ý£¬£¬£¬£¬£¬£¬ÏÖ´úÔøÐû²¼½ôÆÈ¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¿Éͨ¹ýUSBÊý¾ÝÏßµÁ³µµÄÎó²î¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/144732/data-breach/hyundai-suffered-data-breach.html


2¡¢¾©´ÉÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÎó²îCVE-2023-25954


ýÌå4ÔÂ12Èճƣ¬£¬£¬£¬£¬£¬¾©´É£¨Kyocera£©ÐÞ¸´ÆäAndroid´òÓ¡Ó¦ÓÃÖÐÈö²¥¶ñÒâÈí¼þµÄÎó²î£¨CVE-2023-25954£©¡£¡£¡£¡£¡£¡£Îó²îÓ°ÏìÁËKYOCERA Mobile Print¡¢UTAX/TA Mobile PrintºÍOlivetti Mobile Print¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩӦÓõÄÐû²¼Õß²î±ð£¬£¬£¬£¬£¬£¬µ«ËüÃÇ»ùÓÚÏàͬµÄ´úÂ룬£¬£¬£¬£¬£¬Òò´Ë¶¼»áÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòÔÊÐí´Ó¶ñÒâµÚÈý·½Òƶ¯Ó¦Óô«ÊäÊý¾Ý£¬£¬£¬£¬£¬£¬¿ÉÏÂÔØ¶ñÒâpayload¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓþ©´ÉÒÆ¶¯´òÓ¡Ó¦ÓõÄä¯ÀÀÆ÷¹¦Ð§£¬£¬£¬£¬£¬£¬¿É»á¼û¶ñÒâÍøÕ¾²¢ÏÂÔØºÍÖ´ÐжñÒâÎļþ£¬£¬£¬£¬£¬£¬µ¼ÖÂÒÆ¶¯×°±¸ÐÅϢй¶¡£¡£¡£¡£¡£¡£¾©´ÉÒÑÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬¼´½«ÍƳöµÄAndroid 14Ò²ÓÐÍû¼õÇá´ËÀàΣº¦¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/kyocera-android-app-with-1m-installs-can-be-abused-to-drop-malware/


3¡¢NorthOne BankÊý¾Ý¿âÉèÖùýʧй¶100ÍòÌõ²ÆÎñ¼Í¼


¾Ý4ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬½ðÈڿƼ¼¹«Ë¾NorthOne BankÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý100ÍòÌõ²ÆÎñ¼Í¼¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖйûÕæµÄPDFÎļþ°üÀ¨Ê¹ÓÃÓ¦ÓóÌÐòÖ§¸¶²úÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÆóÒµµÄ·¢Æ±¡£¡£¡£¡£¡£¡£Éæ¼°ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈ£¬£¬£¬£¬£¬£¬»¹°üÀ¨Óйظ¶¿îÓÃ;¡¢×ܽð¶îºÍµ½ÆÚÈÕµÄ×¢ÊÍ£¬£¬£¬£¬£¬£¬ÓÐЩÉõÖÁ°üÀ¨Ë°ºÅµÈ˰ÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ1ÔÂ19ÈÕÊ״α¨¸æÁËÕâÒ»·¢Ã÷£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÔÚ1ÔÂ31ÈÕ±»±£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÕâЩ¼Í¼ÒÑ̻¶¶à³¤Ê±¼ä¡£¡£¡£¡£¡£¡£


https://www.websiteplanet.com/news/northone-leak-report/


4¡¢APT36ʹÓöñÒâÈí¼þCrimson RAT¹¥»÷Ó¡¶ÈµÄ½ÌÓýÐÐÒµ


SentinelLabsÔÚ4ÔÂ13ÈÕÅû¶ÁËAPT36(Transparent Tribe)Õë¶ÔÓ¡¶È½ÌÓýÐÐÒµµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÎäÆ÷»¯µÄMicrosoft OfficeÎĵµ£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâºê»òOLEǶÈëÊÖÒÕÀ´·Ö·¢Crimson RAT¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ÖÖÖÖCrimson RAT .NETµÄʵÏÖ£¬£¬£¬£¬£¬£¬±àÒëʱ¼äÔÚ2022Äê7ÔÂÖÁ9ÔÂÖ®¼ä¡£¡£¡£¡£¡£¡£Æä¹¦Ð§°üÀ¨ÇÔȡϵͳÐÅÏ¢¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢Æô¶¯ºÍ×èÖ¹Àú³ÌÒÔ¼°Ã¶¾ÙÎļþºÍÇý¶¯Æ÷¡£¡£¡£¡£¡£¡£Crimson RAT±äÌåʵÏÖÁ˲î±ðÇ¿¶ÈµÄ»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬¼òÆÓµÄº¯ÊýÃû³Æ»û±äºÍ¶¯Ì¬×Ö·û´®ÆÊÎö¡£¡£¡£¡£¡£¡£


https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/


5¡¢KasperskyÐû²¼LazarusµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ


4ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚLazarus GroupµÄDeathNote»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±×Ô2019ÄêÒÔÀ´Ò»Ö±ÔÚ¸ú×ٸû£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷Ä¿µÄÔÚ2020Äê4Ô±¬·¢ÁËÖØ´óת±ä£¬£¬£¬£¬£¬£¬Í¬Ê±»¹¸üÐÂÁËÑ¬È¾ÔØÌå¡£¡£¡£¡£¡£¡£DeathNote¼¯Èº±»ÓÃÓÚÕë¶Ô¶«Å·µÄÆû³µºÍѧÊõÐÐÒµ£¬£¬£¬£¬£¬£¬ËüÃǶ¼Óë¹ú·À¹¤ÒµÓйء£¡£¡£¡£¡£¡£¹¥»÷Õß»¹½«ËùÓÐÓÕ¶üÎļþת»»ÎªÓë¹ú·À³Ð°üÉ̺ÍÍ⽻ЧÀÍÏà¹ØµÄְλÐÎò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ñ¬È¾Á´Ò²»ñµÃÁËˢУ¬£¬£¬£¬£¬£¬²»µ«ÒÀÀµÓÚÎäÆ÷»¯ÎĵµÖеÄÔ¶³ÌÄ£°å×¢ÈëÊÖÒÕ£¬£¬£¬£¬£¬£¬»¹ÒÀÀµÓÚľÂí»¯µÄ¿ªÔ´PDFÉó²é¹¤¾ß¡£¡£¡£¡£¡£¡£


https://securelist.com/the-lazarus-group-deathnote-campaign/109490/


6¡¢CloudflareÐû²¼2023ÄêQ1 DDoSÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ     

 

4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬CloudflareÐû²¼ÁË2023ÄêµÚÒ»¼¾¶ÈDDoSÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬³¬ÈÝÁ¿DDoS¹¥»÷ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬×î´óµÄÒ»´ÎµÖ´ïÿÃë7100Íò´ÎÇëÇó(rps)ÒÔÉÏ¡£¡£¡£¡£¡£¡£ÐÂÒ»´ú½©Ê¬ÍøÂçÖð½¥·ÅÆúÁËʹÓôó×ÚÎïÁªÍø×°±¸µÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃÒ×±»¹¥»÷ºÍÉèÖùýʧµÄVPSЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÆäÇ¿¶È±È»ùÓÚÎïÁªÍøµÄ½©Ê¬ÍøÂçºá¿ç5000±¶¡£¡£¡£¡£¡£¡£ÀÕË÷DDoS¹¥»÷ͬ±ÈÔöÌí60%£¬£¬£¬£¬£¬£¬Õ¼ËùÓÐDDoS¹¥»÷µÄ16%¡£¡£¡£¡£¡£¡£DDoS¹¥»÷Ö÷ÒªÕë¶ÔµÄ¹ú¼ÒÊÇÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬Æä´ÎÊÇÃÀ¹ú¡¢¼ÓÄôóºÍÍÁ¶úÆä¡£¡£¡£¡£¡£¡£


https://blog.cloudflare.com/ddos-threat-report-2023-q1/