Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑѬȾÁè¼Ý1Íò¸öϵͳ

Ðû²¼Ê±¼ä 2023-03-14

1¡¢Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑѬȾÁè¼Ý1Íò¸öϵͳ


CiscoÔÚ3ÔÂ9ÈÕ³ÆÆä¼ì²âµ½Ð°汾µÄ½©Ê¬ÍøÂçPrometeiµÄ¹¥»÷»î¶¯ ¡£¡£¡£¡£¡£PrometeiÓÚ2016ÄêÊ״ηºÆð£¬ £¬£¬ £¬£¬£¬×Ô2022Äê11ÔÂÒÔÀ´£¬ £¬£¬ £¬£¬£¬¸Ãа汾ÒÑѬȾȫÇò¹æÄ£ÄÚµÄ10000¶à¸öϵͳ£¬ £¬£¬ £¬£¬£¬Éæ¼°155¸ö¹ú¼Ò/µØÇø ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçµÄÔËÓªÖ°Ô±¸üÐÂÁËÖ´ÐÐÁ´µÄijЩ×ÓÄ £¿ £¿£¿£¿£¿£¿£¿é£¬ £¬£¬ £¬£¬£¬ÒÔ×Ô¶¯»¯Á÷³Ì²¢ÌôÈÆ¹ýÖ¤ÆÊÎöÒªÁì ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬£¬ËüÉÐÓÐÐí¶àÐµĹ¦Ð§£¬ £¬£¬ £¬£¬£¬°üÀ¨Ìæ»»µÄC2ÓòÌìÉúËã·¨(DGA)£¬ £¬£¬ £¬£¬£¬×ÔÎÒ¸üлúÖÆ£¬ £¬£¬ £¬£¬£¬ÒÔ¼°Apache WebserverµÄÀ¦°ó°æ±¾ºÍ×°Öõ½Ä¿µÄÖ÷»úÉϵÄWeb shell ¡£¡£¡£¡£¡£


https://blog.talosintelligence.com/prometei-botnet-improves/


2¡¢ÓÎÏ·¿ª·¢ÉÌGSC Game WorldµÄϵͳ±»ºÚ²¿·ÖÊý¾Ýй¶


¾Ý3ÔÂ13ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬£¬Ç±ÐÐÕß2£ºÇжûŵ±´ÀûÖ®ÐÄ£¨Stalker 2£©ÓÎÏ·µÄ¿ª·¢ÉÌGSC Game World͸¶ÆäϵͳÒѱ»ÈëÇÖ£¬ £¬£¬ £¬£¬£¬ºÚ¿Í¿ÉÒÔÔÚ¹¥»÷ʱ´úÇÔÈ¡ÓÎÏ·×ʲú ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬ £¬£¬ £¬£¬£¬ÆäÔ±¹¤µÄÕûÌåͼÏñ´¦Öóͷ£Ó¦ÓóÌÐòÕÊ»§Ôâµ½¹¥»÷£¬ £¬£¬ £¬£¬£¬ÕâÖ»ÊÇËüÔÚÒÑÍùÒ»ÄêÖÐÔâµ½µÄÖڶ๥»÷Ö®Ò» ¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ¶íÂÞ˹É罻ýÌåÆ½Ì¨VK³ÆÒÑÇÔÈ¡ÁË´ó×ÚSTALKER 2ËØ²Ä£¬ £¬£¬ £¬£¬£¬°üÀ¨Õû¸ö¹ÊÊÂÇé½Ú¡¢¹ý³¡¶¯»­ÐÎò¡¢¿´·¨ÒÕÊõºÍµØÍ¼µÈ ¡£¡£¡£¡£¡£²¢ÍþвÈôÊÇÓÎÏ·¿ª·¢ÉÌÔÚ3ÔÂ15ÈÕ֮ǰ²»¸Ä±äÆä¶Ô¶íÂÞ˹ºÍ°×¶íÂÞË¹Íæ¼ÒµÄ̬¶È£¬ £¬£¬ £¬£¬£¬ËûÃǽ«Ð¹Â¶ÇÔÈ¡µÄÊýÊ®GBÊý¾Ý ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/stalker-2-game-developer-hacked-by-russian-hacktivists-data-stolen/


3¡¢BlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷±»· £¿ £¿£¿£¿£¿£¿£¿î300ÍòÃÀÔª


ýÌå3ÔÂ10ÈÕ±¨µÀ³Æ£¬ £¬£¬ £¬£¬£¬ÔÆÅÌË㹩ӦÉÌBlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷ÊÂÎñ£¬ £¬£¬ £¬£¬£¬±»ÃÀ¹ú֤ȯÉúÒâίԱ»á(SEC)· £¿ £¿£¿£¿£¿£¿£¿î300ÍòÃÀÔª ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ2020Äê7ÔÂÌåÏÖ£¬ £¬£¬ £¬£¬£¬Îôʱ5ÔµÄÀÕË÷¹¥»÷ÎÞ·¨»á¼û¾èÔùÕßÒøÐÐÕË»§ÏêϸÐÅÏ¢»òÉç»áÇå¾²ºÅÂë ¡£¡£¡£¡£¡£È»¶øBlackbaudÊÖÒÕÖ°Ô±ºÜ¿ìÏàʶµ½¹¥»÷ÕßÒѾ­»á¼û²¢ÇÔÈ¡ÁËÕâЩÃô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£ÓÉÓÚ¹«Ë¾È±·¦Êʵ±µÄÅû¶¿ØÖƺͳÌÐò£¬ £¬£¬ £¬£¬£¬ËûÃÇδÄÜÏòÖÎÀí²ã±¨¸æ ¡£¡£¡£¡£¡£Õâµ¼ÖÂBlackbaudÌá½»µÄSEC±¨¸æÖÐûÓаüÀ¨ÓйØÎ¥¹æË®Æ½µÄÖ÷ÒªÐÅÏ¢ ¡£¡£¡£¡£¡£ 


https://www.securityweek.com/blackbaud-fined-3m-for-misleading-disclosures-about-2020-ransomware-attack/


4¡¢Ö´·¨²¿·Ö²é·âNetwire RATµÄ»ù´¡ÉèÊ©²¢¾Ð²¶ÆäÔËÓªÖ°Ô±


¾ÝýÌå3ÔÂ9ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬£¬Ò»Ïî¹ú¼ÊÖ´·¨Ðж¯²é·âÁËNetwire RATµÄ»ù´¡ÉèÊ©£¬ £¬£¬ £¬£¬£¬²¢¾Ð²¶ÆäÔËÓªÖ°Ô± ¡£¡£¡£¡£¡£NetWireÊÇÒ»ÖÖÔ¶³Ì»á¼ûľÂí£¬ £¬£¬ £¬£¬£¬×Ô2014ÄêÒÔÀ´Ò»Ö±ÊÇÖÖÖÖ¶ñÒâ¹¥»÷»î¶¯µÄÊ×Ñ¡¹¤¾ß ¡£¡£¡£¡£¡£×÷Ϊ´Ë´ÎÐж¯µÄÒ»²¿·Ö£¬ £¬£¬ £¬£¬£¬FBI²é·âÁËÓÃÓÚÍÆ¹ã¸ÃЧÀ͵Äworldwiredlabs.comÓò£¬ £¬£¬ £¬£¬£¬ÈðÊ¿¾¯·½²é·âÁËÍйܸÃÍøÕ¾µÄЧÀÍÆ÷ ¡£¡£¡£¡£¡£Ò»ÃûÒÉËÆÊÇNetWireÍøÕ¾ÖÎÀíÔ±µÄ¿ËÂÞµØÑǹúÃñÔÚ¿ËÂÞµØÑDZ»²¶£¬ £¬£¬ £¬£¬£¬²¢½«±»µØ·½Õþ¸®¸®ÆðËß ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/police-seize-netwire-rat-malware-infrastructure-arrest-admin/


5¡¢ZOLL MedicalÔâµ½¹¥»÷Áè¼Ý100Íò»¼ÕßµÄPHIÐÅϢй¶


ýÌå3ÔÂ11Èճƣ¬ £¬£¬ £¬£¬£¬ZOLL MedicalÕýÔÚ֪ͨ1004443¸ö»¼Õߣ¬ £¬£¬ £¬£¬£¬ËûÃǵÄPHIÐÅÏ¢¿ÉÄÜÔÚ×î½üµÄÒ»´ÎÇå¾²ÊÂÎñÖÐй¶ ¡£¡£¡£¡£¡£Æ¾Ö¤ZOLLµÄ֪ͨ£¬ £¬£¬ £¬£¬£¬¸Ã¹«Ë¾µÄÇå¾²ÍŶÓÔÚ1ÔÂ28ÈÕÊ×´ÎÔÚÆäÄÚÍøÉϼì²âµ½Òì³£»£»£»£»£»£»£»î¶¯ ¡£¡£¡£¡£¡£ËûÃÇѸËÙ×ö³ö·´Ó¦£¬ £¬£¬ £¬£¬£¬»º½â²¢ÊÓ²ìÁËÕâÒ»ÊÂÎñ ¡£¡£¡£¡£¡£ÊÓ²ìÅú×¢£¬ £¬£¬ £¬£¬£¬PHI¿ÉÄÜÔÚ2023Äê2ÔÂ2ÈÕǰºóÊܵ½Ó°Ïì ¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈ ¡£¡£¡£¡£¡£ZOLL½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄExperian IdentityWorksSMʹÓÃȨÏÞ ¡£¡£¡£¡£¡£


https://www.databreaches.net/zoll-medical-notifying-1004443-patients-of-data-breach-hipaa/


6¡¢SentinelLabsÐû²¼ÀÕË÷Èí¼þIceFireµÄLinux°æ±¾µÄ±¨¸æ


3ÔÂ9ÈÕ£¬ £¬£¬ £¬£¬£¬SentinelLabsÐû²¼Á˹ØÓÚÀÕË÷Èí¼þIceFireµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£¡£×î½ü¼¸ÖÜ£¬ £¬£¬ £¬£¬£¬SentinelLabs·¢Ã÷еÄLinux°æ±¾IceFire±»ÓÃÓÚÕë¶Ô¶à¸öýÌåºÍÓéÀÖÐÐÒµµÄ×éÖ¯µÄ¹¥»÷»î¶¯ÖÐ ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËIBM Aspera FaspexÎļþ¹²ÏíÈí¼þÖеķ´ÐòÁл¯Îó²î£¨CVE-2022-47986£©À´×°ÖÃÀÕË÷Èí¼þ ¡£¡£¡£¡£¡£Ö´ÐÐʱ£¬ £¬£¬ £¬£¬£¬IceFire»á¼ÓÃÜÎļþ£¬ £¬£¬ £¬£¬£¬½«À©Õ¹Ãû.ifire¸½¼Óµ½ÎļþÃû£¬ £¬£¬ £¬£¬£¬È»ºóͨ¹ýɾ³ý×ÔÉíºÍ¶þ½øÖÆÎļþÀ´ÑÚÊÎÆä×Ù¼£ ¡£¡£¡£¡£¡£


https://www.sentinelone.com/labs/icefire-ransomware-returns-now-targeting-linux-enterprise-networks/