Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâÀÕË÷¹¥»÷£¬²¿Ãź½°àÑÓÎó
Ðû²¼Ê±¼ä 2022-05-271¡¢Ó¡¶Èº½¿Õ¹«Ë¾SpiceJetÔâµ½ÀÕË÷¹¥»÷£¬²¿Ãź½°àÑÓÎó
Ó¡¶ÈµÄº½¿Õ¹«Ë¾SpiceJetÔÚ5ÔÂ25ÈÕ֪ͨ¿Í»§£¬ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£Æ¾¾Ý¸Ã¹«Ë¾µÄͨ¸æ£¬ÆäITÍŶÓÒÑÀÖ³É×èÖ¹´Ë´Î¹¥»÷£¬Òò´Ë»Ö¸´ÁËÕý³£µÄÔËӪ״̬¡£È»¶ø£¬TwitterºÍFacebookÉϵĶà¸ö¿Í»§ÈÔÈ»·´Ó³´æÔÚµÄÎÊÌ⣬ÀýÈçÁ˺½°àÑÓÎó£¬ÎÞ·¨Í¨¹ýµç»°ÁªÏµ¿Í·þ£¬ÇÒÔ¤¶©ÏµÍ³²»ÐÐÓ᣽ØÖÁ25ÈÕ£¬SpiceJetµÄÍøÕ¾ÖÐÖ»ÓÐÖ÷Ò³¿É·ÃÎÊ£¬¶ø´ó¶àÊýµ×²ãϵͳºÍÍøÒ³¶¼ÎÞ·¨¼ÓÔØ£¬º½°à״̬±íÏÔʾËùÓÐÄ¿µÄµØµÄº½°à¶¼´æÔÚ´óÁ¿ÑÓÎó¡£SpiceJetÊÇÓ¡¶ÈµÚ¶þ´óº½¿Õ¹«Ë¾£¬´Ë´Î¹¥»÷»áÓ°Ïì´óÁ¿´î¿Í£¬²¢Ôì³É¾Þ´óµÄ¾¼ÃËðʧ¡£
https://www.bitdefender.com/blog/hotforsecurity/airline-passengers-left-stranded-after-ransomware-attack/
2¡¢¹ú¼ÊÐ̾¯×éÖ¯ÒÑ´þ²¶BECÍÅ»ïSilver TerrierµÄÍ·Ä¿
ƾ¾Ý5ÔÂ25ÈÕ±¨µÀ£¬¹ú¼ÊÐ̾¯×éÖ¯¾¹ý³¤´ïÒ»ÄêµÄ´úºÅΪ¡°Operation Delilah¡±µÄÊÓ²ìºó£¬´þ²¶ÁËBECÍÅ»ïSilver TerrierµÄÍ·Ä¿¡£´Ë´ÎÖ´·¨Ðж¯ÓÚ2021Äê5Ô¿ªÊ¼£¬ÔÚÄáÈÕÀûÑǾ¯·½ºÍGroup-IBµÈ¶à¼ÒÍøÂçÄþ¾²¹«Ë¾µÄе÷Ï£¬ÓÚ2022Äê3Ô´þ²¶ÁËÒ»Ãû37ËêµÄÄáÈÕÀûÑÇÄÐ×Ó¡£¹ú¼ÊÐ̾¯×éÖ¯ÔÚÉùÃ÷Öгƣ¬¸ÃÄÐ×Ó±»Ö¸¿ØÔËÓª×ÅÒ»¸ö¿ç¹úÍøÂç·¸×ïÍŻ²¢¶Ô¹«Ë¾ºÍ¸öÈ˽øÐÐÁË´ó¹æÄ£µöÓã»î¶¯ºÍBEC¹¥»÷¡£
https://securityaffairs.co/wordpress/131659/cyber-crime/silverterrier-leader-arrested.html
3¡¢°µÍøÊг¡Versus±»±¬´æÔÚÐÅϢй¶©¶´ºó¾ö¶¨¹Ø±Õ
¾Ý5ÔÂ25ÈÕ±¨µÀ£¬°µÍøÊг¡Versus MarketÕýÔڹرա£ÕâÊÇ×îÊÜ»¶ÓµÄ°µÍøÊг¡Ö®Ò»£¬ÓÚ3ÄêÇ°ÍÆ³ö¡£ÉÏÖÜ£¬Ä³ºÚ¿ÍÔÚDreadÉÏÐû²¼ÁËÒ»¸ö¹ØÓÚÈçºÎ·ÃÎʸÃÍøÕ¾·þÎñÆ÷ÎļþϵͳµÄPoC¡£ÒòΪµ£ÓÇ´æÔÚÑÏÖØµÄ©¶´ÈÝÒ×Ôâµ½ºÚ¿ÍµÄ¹¥»÷£¬ÔËÓªÍŶӽ«VersusÏÂÏß²¢½øÐÐÄþ¾²É󼯡£µ«ÔÚÏÂÏߺó£¬Óû§¿ªÊ¼µ£ÓÇVersusÕýÔÚÍ˳ö¶øFBIÒѾ½Ó¹ÜÁ˸ÃÍøÕ¾¡£²»¾ÃÖ®ºó£¬¸Ãƽ̨µÄÔËÓªÍŶÓÖØÐ·ºÆð£¬²¢Ðû²¼½«¹Ø±Õ¸ÃÊг¡¡£Ä¿Ç°Éв»Çå³þÖ´·¨ÈËÔ±ÊÇ·ñÒѾÀûÓÃÁË´Ë©¶´¡£
https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/
4¡¢Â׶ظÛÎñ¾ÖPLAµÄ¹ÙÍøÔâµ½À´×ÔALtahreaµÄDDoS¹¥»÷
Â׶ظÛÎñ¾Ö£¨PLA£©ÓÚ5ÔÂ24ÈÕÈ·ÈÏ£¬Æä¹ÙÍøÔâµ½¹¥»÷±»ÆÈ¹Ø±Õ¡£PLAÊÇÒ»¸ö¹«¹²ÐÅÍлú¹¹£¬ÒµÎñÁýÕÖ´ÓÌ©¶¡¶Ùµ½±±º£µÄÌ©ÎîÊ¿ºÓ¡£Check PointÌåÏÖ£¬´Ë´ÎÖжÏÔ´ÓÚÒ»¸öÒÁÀÊ×éÖ¯ÌᳫµÄÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷¡£²»¾Ãºó£¬ºÚ¿ÍÍÅ»ïALtahrea TeamÔÚTelegramÉÏÉù³Æ¶Ô´ËÊÂÂôÁ¦¡£ALtahreaÓëÒÁÀÊÓйأ¬Ôø¹¥»÷¹ýÒÔÉ«ÁиÛÎñ¾Ö¡¢ÒÔÉ«ÁÐ9ƵµÀºÍÍÁ¶úÆä×ÜͳµÄ¹Ù·½ÍøÕ¾µÈ¡£Ä¿Ç°£¬¸ÃÍøÕ¾ÒÑ¾ÖØÐÂÉÏÏß¡£
https://www.hackread.com/pro-iran-altahrea-hit-port-of-london-website-ddos-attack/
5¡¢Red Canary·¢ÏÖеÄä¯ÀÀÆ÷½Ù³Ö¶ñÒâÈí¼þChromeLoader
5ÔÂ25ÈÕ£¬Red CanaryÐû²¼Á˹ØÓÚжñÒâÈí¼þChromeLoaderµÄ¼¼Êõ·ÖÎö³ÂËß¡£ChromeLoaderÊÇÒ»ÖÖä¯ÀÀÆ÷½Ù³Ö·¨Ê½£¬Ëü»áÐÞ¸ÄÄ¿±êµÄä¯ÀÀÆ÷ÉèÖò¢½«Óû§Á÷Á¿Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£ÕâÀà½Ù³Ö·¨Ê½Óкܶ࣬µ«ChromeLoaderÒòÆä³Ö¾ÃÐÔºÍѬȾ;¾¶µÈÌØÐÔÍÑÓ±¶ø³ö¡£Ëüαװ³ÉÆÆ½â°æÓÎÏ·»òÉÌÒµÈí¼þISO£¬ÔÚ´ò¿ªºó½«±»¹ÒÔØÎªÒ»¸öÐéÄâµÄCD-ROMÇý¶¯Æ÷¡£×îÖÕ£¬Ëü»áÓÃPowerShell½«×Ô¼º×¢Èëµ½ä¯ÀÀÆ÷ÖУ¬²¢½«¶ñÒâÀ©Õ¹Ìí¼Óµ½ä¯ÀÀÆ÷ÖУ¬Í¨³£²»»á±»¼ì²âµ½¡£
https://www.bleepingcomputer.com/news/security/new-chromeloader-malware-surge-threatens-browsers-worldwide/
6¡¢QCT¶à¿î·þÎñÆ÷Ò×ÊÜPantsdown©¶´CVE-2019-6260µÄÓ°Ïì
ýÌå5ÔÂ26Èճƣ¬¹ã´ïÔÆ¼¼Êõ(QCT)·þÎñÆ÷ÈÝÒ×Êܵ½»ù°å¹ÜÀí¿ØÖÆÆ÷(BMC)©¶´¡°Pantsdown¡±µÄÓ°Ïì¡£¸Ã©¶´×·×ÙΪCVE-2019-6260£¨CVSSÆÀ·Ö9.8£©£¬ÓÚ2019Äê1ÔÂÊ×´ÎÆØ¹â£¬Éæ¼°¶ÔBMCÎïÀíµØÖ·¿Õ¼äµÄÈÎÒâ¶Áд·ÃÎÊ£¬¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£Ñо¿ÈËÔ±³Æ£¬ÀÖ³ÉÀûÓøÃ©¶´¿É»ñµÃ·þÎñÆ÷µÄÍêÈ«¿ØÖÆÈ¨£¬´Ó¶øÊ¹ÓöñÒâ´úÂëÁýÕÖBMC¹Ì¼þ¡¢°²×°¶ñÒâÈí¼þ¡¢Ð¹Â¶Êý¾Ý£¬ÉõÖÁÆÆ»µÏµÍ³¡£ÊÜÓ°ÏìµÄQCT·þÎñÆ÷ÐͺŰüÂÞD52BQ-2U¡¢D52BQ-2U 3UPIºÍD52BV-2U¡£Â©¶´ÓÚ2021Äê10ÔÂ7ÈÕÅû¶֮ºó£¬²¹¶¡ÒÑÓÚ½ñÄê4ÔÂ15ÈÕÌṩӦ¿Í»§¡£
https://thehackernews.com/2022/05/critical-pantsdown-bmc-vulnerability.html