Ñо¿Ö°Ô±³ÆÔÚ°µÍø·¢Ã÷ÊýÊ®Íò¸öOpenAIƾ֤±»³öÊÛ

Ðû²¼Ê±¼ä 2023-07-21

1¡¢Ñо¿Ö°Ô±³ÆÔÚ°µÍø·¢Ã÷ÊýÊ®Íò¸öOpenAIƾ֤±»³öÊÛ


¾ÝýÌå7ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁè¼Ý200000¸öOpenAIƾ֤ÒÔÇÔÈ¡³ÌÐòÈÕÖ¾µÄÐÎʽÔÚ°µÍøÉϳöÊÛ¡£¡£¡£¡£¡£¡£¡£Óë1Ô·ÝÔ¤¼ÆµÄ1ÒÚ»îÔ¾Óû§µÄÊýÄ¿Ïà±È£¬£¬£¬£¬ £¬Õâ¸öÊý×ÖËÆºõ΢ȱ·¦µÀ£¬£¬£¬£¬ £¬µ«ËüȷʵÅú×¢¹¥»÷ÕßÔÚÌìÉúʽÈ˹¤ÖÇÄܹ¤¾ßÖп´µ½Á˶ñÒâ¹¥»÷µÄDZÁ¦¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í¶Ô´ËÀà³ÌÐòµÄÐËȤÒѱ»¼¤Æð£¬£¬£¬£¬ £¬ÆäÖÐÒ»ÈË¿ª·¢ÁËÃûΪWormGPTµÄChatGPT¿Ë¡°æ£¬£¬£¬£¬ £¬²¢¶ÔÆä¾ÙÐÐÁËÒÔ¶ñÒâÈí¼þÎªÖØµãµÄÊý¾ÝѵÁ·£¬£¬£¬£¬ £¬ÓÃÓÚBEC¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/openai-credentials-stolen-by-the-thousands-for-sale-on-the-dark-web/


2¡¢TurlaʹÓÃCapiBar¹¥»÷ÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¼ÒµÄ¹ú·À×éÖ¯


¾Ý7ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬ £¬Î¢ÈíºÍÎÚ¿ËÀ¼CERTÅû¶ÁËTurlaÕë¶ÔÎÚ¿ËÀ¼ºÍ¶«Å·¹ú¼ÒµÄ¹ú·À×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒâºêµÄExcel XLSM¸½¼þ£¬£¬£¬£¬ £¬¼¤»îºó¶ñÒâºê»áÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬ £¬½¨ÉèÒ»¸öð³äFirefoxä¯ÀÀÆ÷¸üгÌÐòµÄÍýÏëʹÃü¡£¡£¡£¡£¡£¡£¡£´ËʹÃü»áÏÂÔØCapiBarºóÃÅ£¨Ò²³ÆÎªDeliveryCheck£©£¬£¬£¬£¬ £¬È»ºóʹÓÃRclone¹¤¾ßÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£CapiBarµÄ²î±ðÖ®´¦ÊÇÒ»¸öExchangeЧÀÍÆ÷¶Ë×é¼þ£¬£¬£¬£¬ £¬Ëü¿É½«Ð§ÀÍÆ÷Äð³É¹¥»÷ÕßµÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÔÚ¹¥»÷Àú³ÌÖУ¬£¬£¬£¬ £¬Turla»¹·Ö·¢ÁËÐÅÏ¢ÇÔÈ¡ºóÃÅKAZUAR¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-turn-exchange-servers-into-malware-control-centers/


3¡¢Tampa GeneralÒ½ÔºÔâµ½¹¥»÷Ó°Ïì120Íò»¼ÕßµÄÐÅÏ¢


ýÌå7ÔÂ19Èճƣ¬£¬£¬£¬ £¬ÃÀ¹ú·ðÂÞÀï´ïÖݵÄTampa GeneralÒ½ÔºÔ¼120Íò»¼ÕßµÄÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½Ôº³ÆÆäÔÚ5ÔÂ31ÈÕ·¢Ã÷ÆäÔâµ½Á˹¥»÷£¬£¬£¬£¬ £¬µ«Ã»ÓÐ͸¶¹¥»÷ÕßµÄÃû×Ö¡£¡£¡£¡£¡£¡£¡£ÆäÉùÃ÷ûÓÐÌá¼°ÈκιØÓÚÊê½ðÒªÇóµÄÎÊÌ⣬£¬£¬£¬ £¬²¢Ö¸³öËûÃǵÄÇå¾²²¿·ÖÄܹ»±ÜÃâÎļþ±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂëºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£Snatch TeamÒѽ«¸ÃÒ½ÔºÌí¼Óµ½ÆäÍøÕ¾ÖУ¬£¬£¬£¬ £¬Ã»ÓÐÌṩÈκÎÀÕË÷Ö¤¾Ý£¬£¬£¬£¬ £¬¿ÉÊÇÉù³ÆÒÑ´ÓÒ½Ôº»ñÈ¡ÁË4 TBµÄÎļþ¡£¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/tampa-general-hospital-confirms-cybersecurity-incident-1-2-million-patients-being-notified/


4¡¢Fortinet¼ì²âµ½¶à¸öʹÓÃZyxelÎó²îµÄ½©Ê¬ÍøÂç·Ö·¢»î¶¯


FortinetÔÚ7ÔÂ19ÈÕ͸¶£¬£¬£¬£¬ £¬Æä¼ì²âµ½¶à¸öʹÓÃZyxelÎó²î£¨CVE-2023-28771£©µÄDDoS½©Ê¬ÍøÂç·Ö·¢»î¶¯¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬ £¬¿É±»¹¥»÷ÕßÓÃÓÚÏòÄ¿µÄ·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ £¬´Ó5Ô·Ý×îÏÈ£¬£¬£¬£¬ £¬¹¥»÷ÊýÄ¿ÏÔ×ÅÔöÌí¡£¡£¡£¡£¡£¡£¡£Éæ¼°¶à¸ö½©Ê¬ÍøÂ磬£¬£¬£¬ £¬ÆäÖаüÀ¨»ùÓÚMiraiµÄ±äÌåDark.IoT£¬£¬£¬£¬ £¬ÒÔ¼°ÁíÒ»¸ö½ÓÄɶ¨ÖÆDDoS¹¥»÷ÒªÁìµÄ½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýʶ±ð¹¥»÷ÕßIPµØµã£¬£¬£¬£¬ £¬È·¶¨¹¥»÷±¬·¢ÔÚ¶à¸öµØÇø£¬£¬£¬£¬ £¬°üÀ¨ÖÐÃÀÖÞ¡¢±±ÃÀ¡¢¶«ÑǺÍÄÏÑǵÈ¡£¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/ddos-botnets-target-zyxel-vulnerability-cve-2023-28771


5¡¢Lookout³ÆWyrmSpyºÍDragonEggÓëAPT41ÓйØ


LookoutÔÚ7ÔÂ19ÈÕÅû¶ÁËAPT41ʹÓÃAndroidÌØ¹¤Èí¼þWyrmSpyºÍDragonEggµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2017ÄêÊ×´Îʶ±ð³öWyrmSpy£¬£¬£¬£¬ £¬ÓÖÓÚ2021ÄêÍ··¢Ã÷ÁËDragonEgg£¬£¬£¬£¬ £¬×î½üµÄÑù±¾¿É×·Ëݵ½2023Äê4Ô¡£¡£¡£¡£¡£¡£¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼¾ßÓÐÊý¾ÝÍøÂçºÍÉøÍ¸¹¦Ð§£¬£¬£¬£¬ £¬WyrmSpyαװ³ÉĬÈϲÙ×÷ϵͳӦÓóÌÐò£¬£¬£¬£¬ £¬¶øDragonEggÔòαװ³ÉµÚÈý·½¼üÅÌ»òÐÂÎÅÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¡£ËüÃǵÄAndroidÊðÃûÖ¤ÊéÓÐÖØµþ£¬£¬£¬£¬ £¬ÕâÔöÇ¿ÁËËüÃÇÓëͳһ¹¥»÷ÕßµÄÁªÏµ¡£¡£¡£¡£¡£¡£¡£GoogleÈ·ÈÏ£¬£¬£¬£¬ £¬ÏÖÔÚÉÐδÔÚGoogle PlayÉϼì²âµ½°üÀ¨´Ë¶ñÒâÈí¼þµÄÓ¦Óᣡ£¡£¡£¡£¡£¡£


https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41


6¡¢Unit 42Ðû²¼¹ØÓÚÐÂP2PÈ䳿P2PInfectµÄÆÊÎö±¨¸æ


7ÔÂ19ÈÕ£¬£¬£¬£¬ £¬Unit 42Ðû²¼Á˹ØÓÚÐÂP2PÈ䳿P2PInfectµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ7ÔÂ11ÈÕ·¢Ã÷ÁËP2PInfect£¬£¬£¬£¬ £¬ËüÓÉRust¿ª·¢£¬£¬£¬£¬ £¬Äܹ»¿çƽ̨ѬȾ£¬£¬£¬£¬ £¬Õë¶ÔRedisʵÀý¡£¡£¡£¡£¡£¡£¡£¸ÃÈä³æÊ¹ÓÃLuaɳÏäÌÓÒÝÎó²î£¨CVE-2022-0543£©À´Ñ¬È¾Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ £¬ËäÈ»ÔÚÒÑÍùÁ½ÖÜÄÚ·¢Ã÷ÁËÁè¼Ý307000¸ö̻¶µÄRedisЧÀÍÆ÷£¬£¬£¬£¬ £¬µ«Ö»ÓÐ934¸ö¿ÉÄÜÈÝÒ×Ôâµ½´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£Unit 42ÒÔΪ£¬£¬£¬£¬ £¬´Ë´ÎP2PInfect»î¶¯ÊÇʹÓÃP2PÏÂÁîºÍ¿ØÖÆ(C2)ÍøÂç¾ÙÐиüÇ¿¹¥»÷µÄµÚÒ»½×¶Î¡£¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/