NBA͸¶ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿·ÖÇòÃÔÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-20

1¡¢NBA͸¶ÆäµÚÈý·½ÌṩÉ̳ÖÓеIJ¿·ÖÇòÃÔÐÅϢй¶


¾ÝýÌå3ÔÂ17ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬£¬NBA£¨ÃÀ¹ú¹ú¼ÒÀºÇòЭ»á£©Í¸Â¶ÆäµÚÈý·½Ê±ÊÆÍ¨Ñ¶Ð§ÀͳÖÓеIJ¿·ÖÇòÃÔСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£NBAÌåÏÖÆäϵͳ²¢Î´Ôâµ½¹¥»÷£¬£¬ £¬£¬ £¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÊýÄ¿²»ÏêµÄСÎÒ˽¼Ò¡£¡£¡£¾Ý¸ÃЭ»á³Æ£¬£¬ £¬£¬ £¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼û²¢½¨ÉèÁ˲¿·ÖÇòÃÔµÄÐÕÃûºÍÓʼþµØµãµÄ¸±±¾£¬£¬ £¬£¬ £¬£¬£¬Óû§Ãû¡¢ÃÜÂëºÍÆäËüÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£¡£NBA»¹ÌáÐѵÀ£¬£¬ £¬£¬ £¬£¬£¬ÓÉÓÚËùÉæ¼°Êý¾ÝµÄÃô¸ÐÐÔ£¬£¬ £¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò¿ÉÄÜÔâµ½´¹ÂÚ¹¥»÷ºÍÖÖÖÖÕ©Æ­»î¶¯£¬£¬ £¬£¬ £¬£¬£¬½¨ÒéÔÚ·­¿ª¿ÉÒÉÓʼþ»òͨѶʱ¼á³ÖСÐÄ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nba-alerts-fans-of-a-data-breach-exposing-personal-information/


2¡¢Emotet»ØºÏ²¢Ê¹ÓÃMicrosoft OneNoteÎļþÈÆ¹ý¼ì²â


¾Ý3ÔÂ18ÈÕ±¨µÀ£¬£¬ £¬£¬ £¬£¬£¬EmotetÏÖÔÚͨ¹ýMicrosoft OneNoteÓʼþ¸½¼þ¾ÙÐзַ¢£¬£¬ £¬£¬ £¬£¬£¬Ö¼ÔÚÈÆ¹ýMicrosoftÇå¾²ÏÞÖÆ²¢Ñ¬È¾¸ü¶àÄ¿µÄ¡£¡£¡£EmotetÔÚÒÑÍùµÄÒ»ÄêÀïʱ¶ÏÊ±Ðø£¬£¬ £¬£¬ £¬£¬£¬×îÖÕÔÚ2022Äêµ×ǰ×èÖ¹»î¶¯¡£¡£¡£ÔÚÐÝÕûÈý¸öԺ󣬣¬ £¬£¬ £¬£¬£¬Emotet¾íÍÁÖØÀ´£¬£¬ £¬£¬ £¬£¬£¬ÓÚ±¾ÔÂÔçЩʱ¼ä·¢ËͶñÒâÓʼþ¡£¡£¡£Õâ¸ö»î¶¯×î³õ±£´æÈ±ÏÝ£¬£¬ £¬£¬ £¬£¬£¬ËüÈÔȻʹÓôøÓкêµÄWordºÍExcelÎĵµ£¬£¬ £¬£¬ £¬£¬£¬ÓÉÓÚMicrosoftµÄÇå¾²ÏÞÖÆËüÖ»ÄÜѬȾÉÙÊýÈË¡£¡£¡£¹¥»÷ÕßÏÖÔÚʹÓöñÒâOneNote¸½¼þ·Ö·¢Emotet£¬£¬ £¬£¬ £¬£¬£¬ÕâЩ¸½¼þÔÚð³äÖ¸ÄÏ¡¢²Ù×÷Ö¸ÄÏ¡¢·¢Æ±¡¢ÊÂÇé²Î¿¼µÈ»Ø¸´Á´µç×ÓÓʼþÖС£¡£¡£


https://www.bleepingcomputer.com/news/security/emotet-malware-now-distributed-in-microsoft-onenote-files-to-evade-defenses/


3¡¢ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÖ°Ô±ÔÚÃÀ¹úŦԼ±»²¶


ýÌå3ÔÂ18Èճƣ¬£¬ £¬£¬ £¬£¬£¬ºÚ¿ÍÂÛ̳BreachForumsµÄÔËÓªÖ°Ô±PompompurinÓÚÉÏÖÜÈýÔÚŦԼ±»²¶¡£¡£¡£2022ÄêRaidForums±»²é·âºó£¬£¬ £¬£¬ £¬£¬£¬Pompourin½¨ÉèÁËÒ»¸öÃûΪBreachForumsµÄÐÂÂÛ̳À´Ìî²¹¿Õȱ¡£¡£¡£ËüÒѳÉΪͬÀàÖÐ×î´óµÄÊý¾Ýй¶ÂÛ̳£¬£¬ £¬£¬ £¬£¬£¬³£±»ºÚ¿ÍºÍÀÕË÷ÍÅ»ïÓÃÀ´Ð¹Â¶Êý¾Ý¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬ £¬£¬ £¬£¬£¬ÏÓÒÉÈ˱»Ö¸¿Ø·¸Ò»Ïîıº¦ÊµÑé»á¼û×°±¸Ú²Æ­µÄ×ïÃû¡£¡£¡£PompourinÒÔ300000ÃÀÔªµÄ±£Êͽð»ñÊÍ£¬£¬ £¬£¬ £¬£¬£¬²¢½«ÓÚ3ÔÂ24ÈÕÔÚ¸¥¼ªÄáÑǶ«ÇøµØÒªÁìÔº³öÍ¥¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬ £¬£¬£¬×èÖ¹ÏÖÔÚÂÛ̳ÈÔÈ»¿ÉÒÔ»á¼û¡£¡£¡£


https://www.hackread.com/breach-forums-owner-pompompurin-arrested-new-york/


4¡¢Unit 42·¢Ã÷ÐÂÀÕË÷Èí¼þTrigonaÕë¶ÔÎ÷Å·µÈµØµÄ»î¶¯


Unit 42ÓÚ3ÔÂ16ÈÕÅû¶ÁËÀÕË÷Èí¼þTrigonaÕë¶ÔÎ÷Å·µÈµØµÄ»î¶¯¡£¡£¡£TrigonaÓÚ2022Äê10ÔÂÏÂÑ®Ê״α»·¢Ã÷£¬£¬ £¬£¬ £¬£¬£¬ÔÚ12Ô·dz£»£»£»£»£» £»£»îÔ¾£¬£¬ £¬£¬ £¬£¬£¬Ó°ÏìÁËÖÁÉÙ15¸ö×éÖ¯£¬£¬ £¬£¬ £¬£¬£¬Éæ¼°ÖÆÔì¡¢½ðÈÚ¡¢ÐÞ½¨¡¢Å©Òµ¡¢ÓªÏúºÍ¸ß¿Æ¼¼ÐÐÒµ¡£¡£¡£¸ÃÀÕË÷Èí¼þ»áʹÓðüÀ¨JavaScript´úÂëµÄ.htaÊê½ð¼Í¼ÏòÄ¿µÄÏÔʾ¸¶¿î˵Ã÷¡£¡£¡£Ñо¿Ö°Ô±ÔÚTrigona¹¥»÷ÖÐÊӲ쵽µÄһЩ¹¤¾ßºÍÊÖÒÕ°üÀ¨£¬£¬ £¬£¬ £¬£¬£¬NetScan¡¢Start.batÅú´¦Öóͷ£¾ç±¾¡¢Turnoff.bat¡¢Newuser.bat¡¢Mimikatz¡¢DC4.exeºÍAdvanced Port Scanner¡£¡£¡£


https://unit42.paloaltonetworks.com/trigona-ransomware-update/


5¡¢Î¢Èí¸ÅÊöKillNet½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷


΢ÈíÔÚ3ÔÂ17ÈÕÐû²¼±¨¸æ£¬£¬ £¬£¬ £¬£¬£¬¸ÅÊöÁËÒÑÍùÈý¸öÔÂKillNet¼°ÆäÁ¥Êô×éÖ¯½üÆÚÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄDDoS¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±ÕÉÁ¿ÁË2022Äê11ÔÂ18ÈÕÖÁ2023Äê2ÔÂ17ÈÕÌìÌìÕë¶ÔAzureÖÐÒ½ÁÆ»ú¹¹µÄ¹¥»÷´ÎÊý£¬£¬ £¬£¬ £¬£¬£¬·¢Ã÷ÁË´ÓÌìÌì10-20´Î¹¥»÷µ½40-60´Î¹¥»÷µÄÇ÷ÊÆ¡£¡£¡£ÓÐÒ»ÔÙ¹¥»÷µÖ´ïÿÃë5MÊý¾Ý°ü(pps)£¬£¬ £¬£¬ £¬£¬£¬µ«´ó´ó¶¼¹¥»÷¶¼µÍÓÚ2M pps¡£¡£¡£±¨¸æ»¹ÏêÊöÁËKillNetµÄÒ»ÔÙ¹¥»÷»î¶¯£¬£¬ £¬£¬ £¬£¬£¬ÀýÈçÕë¶ÔijҽÁƱ£½¡ÌṩÉ̵ÄDDoS¹¥»÷£¬£¬ £¬£¬ £¬£¬£¬·åֵΪ1.3M pps£¬£¬ £¬£¬ £¬£¬£¬¹¥»÷ÔØÌåΪTCP SYN¡¢TCP ACKºÍÊý¾Ý°üÒì³££¬£¬ £¬£¬ £¬£¬£¬Ò»Á¬Á˲»µ½12Сʱ¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/03/17/killnet-and-affiliate-hacktivist-groups-targeting-healthcare-with-ddos-attacks/


6¡¢SentinelLabsÐû²¼Winter Vivern¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


3ÔÂ16ÈÕ£¬£¬ £¬£¬ £¬£¬£¬SentinelLabsÐû²¼Á˹ØÓÚAPTÍÅ»ïWinter Vivern¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£½üÆÚ»î¶¯ÖУ¬£¬ £¬£¬ £¬£¬£¬¸ÃÍÅ»ïÖ÷ÒªÕë¶Ô²¨À¼Õþ¸®»ú¹¹¡¢ÎÚ¿ËÀ¼Íâ½»²¿¡¢Òâ´óÀûÍâ½»²¿ºÍÓ¡¶ÈÕþ¸®ÄÚ²¿µÄСÎÒ˽¼Ò£¬£¬ £¬£¬ £¬£¬£¬ÒÔ¼°µçÐŹ«Ë¾¡£¡£¡£¸ÃÍÅ»ïʹÓÃÁËÒ»ÖÖеÄÓÕ¶üÊÖÒÕ£¬£¬ £¬£¬ £¬£¬£¬Éæ¼°Ä£ÄâÕþ¸®ÓòÀ´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£ÔÚÒ»¸ö°¸ÀýÖУ¬£¬ £¬£¬ £¬£¬£¬¹¥»÷ÕßʹÓÃWindowsÅú´¦Öóͷ£ÎļþÀ´Ã°³äɱ¶¾É¨Ãè³ÌÐò£¬£¬ £¬£¬ £¬£¬£¬¶øÏÖʵÉÏÊÇÔÚÏÂÔØ¶ñÒâpayload¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬£¬Winter VivernʹÓõÄÒ»ÖÖÐÂpayloadÔÚ¹¦Ð§ÉÏËÆºõÓëAperefitÏàËÆ£¬£¬ £¬£¬ £¬£¬£¬µ«Éè¼Æ²¢²»ÍêÕû£¬£¬ £¬£¬ £¬£¬£¬Åú×¢ËüÈÔÔÚ¾ÙÐÐÖС£¡£¡£


https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/