΢ÈíÐû²¼9Ô·ÝÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´63¸öÄþ¾²Â©¶´

Ðû²¼Ê±¼ä 2022-09-14
1¡¢Î¢ÈíÐû²¼9Ô·ÝÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´63¸öÄþ¾²Â©¶´

      

9ÔÂ13ÈÕ£¬Î¢ÈíÐû²¼ÁË9Ô·ÝÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´63¸öÄþ¾²Â©¶´¡£´Ë´ÎÐÞ¸´µÄ©¶´ÀàÐÍΪ18¸öÌáȨ©¶´¡¢1¸öÄþ¾²¹¦Ð§Èƹý©¶´¡¢30¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´¡¢7¸öÐÅϢй¶©¶´¡¢7¸ö¾Ü¾ø·þÎñ©¶´ºÍ16¸öEdge-Chromium©¶´¡£´Ë´Î¹²ÐÞ¸´ÁËÁ½¸ö¹ûÈ»Åû¶µÄÁãÈÕ©¶´£¬·Ö±ðΪWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½ÖеÄÌáȨ©¶´£¨CVE-2022-37969£©ºÍCache Speculation Restriction©¶´£¨CVE-2022-23960£©¡£ÆäÖУ¬CVE-2022-37969ÒÑÔÚ¹¥»÷Öб»»ý¼«ÀûÓá£


https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2022-patch-tuesday-fixes-zero-day-used-in-attacks-63-flaws/


2¡¢ºÚ¿ÍÍÅ»ïGhostSecÉù³ÆÒѾ­ÈëÇÖ55¸öBerghof PLC

      

¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬Óë°ÍÀÕ˹̹Ïà¹ØµÄºÚ¿ÍÍÅ»ïGhostSecÉù³Æ£¬ÒÑÈëÇÖÒÔÉ«ÁеÄ×é֯ʹÓõÄ55¸öBerghof¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)¡£GhostSecÐû²¼ÁËÒ»¶ÎÊÓÆµ£¬Õ¹Ê¾ÁËÀֳɵǼPLC¹ÜÀíÃæ°åµÄ¹ý³Ì£¬ÒÔ¼°ÏÔʾ¹¥»÷ijЩ½×¶ÎµÄHMIÆÁÄ»½ØÍ¼¡£Ñо¿ÈËÔ±ÈÏΪ£¬¹¥»÷Õßͨ¹ýʹÓÃĬÈϺÍͨÓÃÆ¾¾Ý»ñµÃÁ˶ÔPLC¹ÜÀíÃæ°åµÄ·ÃÎÊȨÏÞ¡£³ý´ËÖ®Í⣬GhostSec»¹Ðû²¼ÁËÆäËüÆÁÄ»½ØÍ¼£¬Éù³Æ¿ÉÒÔ·ÃÎÊÁíÒ»¸ö¿ÉÓÃÓÚÐÞ¸ÄË®ÖеÄÂȺ¬Á¿ºÍpHÖµµÄ¿ØÖÆÃæ°å¡£


https://securityaffairs.co/wordpress/135656/hacktivism/ghostsec-hacked-berghof-plcs-israel.html


3¡¢U-HaulµÄ×âÁÞºÏͬËÑË÷ÃÅ»§Ôâµ½¹¥»÷ºó¿Í»§ÐÅϢй¶

      

ýÌå9ÔÂ12Èճƣ¬±±ÃÀ×î´óµÄ°áÔ˺Ͳִ¢×âÁÞ¹«Ë¾Ö®Ò»U-HaulµÄ¿Í»§ÐÅϢй¶¡£¸Ã¹«Ë¾ÔÚ7ÔÂ12ÈÕ¶Ô´ËÊÂÕ¹¿ªÊӲ죬ÓÚ8ÔÂ1ÈÕ·¢ÏÖ¹¥»÷ÕßÔÚÈ¥Äê11ÔÂ5ÈÕÖÁ½ñÄê4ÔÂ5ÈÕÆÚ¼ä·ÃÎÊÁ˲¿Ãſͻ§µÄ×âÁÞºÏͬ£¬²¢ÓÚ9ÔÂ7ÈÕÈ·¶¨Ð¹Â¶µÄÐÅÏ¢°üÂÞ¿Í»§µÄÐÕÃû¼°¼ÝʻִÕÕ»òÉí·ÝÖ¤ºÅÂë¡£¾ÝϤ£¬¹¥»÷ÕßÊÇÔÚµÁÓÃÁËÁ½¸ö¡°Î¨Ò»µÄÃÜÂë"ºó½øÈëÁËU-HaulµÄ×âÁÞºÏͬËÑË÷ÃÅ»§£¬µ«¸Ã¹«Ë¾²¢Î´½âÊÍÆ¾Ö¤ÊÇÈçºÎй¶µÄ¡£


https://www.bleepingcomputer.com/news/security/u-haul-discloses-data-breach-exposing-customer-driver-licenses/


4¡¢LorenzÀûÓÃMitel MiVoice VOIPÖЩ¶´ÈëÇÖÆóÒµÍøÂç

      

¾ÝArctic Wolf Labs 9ÔÂ12ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïLorenzÏÖÀûÓÃMitel MiVoice VOIPÉ豸ÖеÄ©¶´À´ÈëÇÖÆóÒµÍøÂç¡£×î³õµÄ¶ñÒâ»î¶¯Ô´×ÔλÓÚÍøÂçÍâΧµÄMitelÉ豸£¬LorenzÀûÓÃÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-29499£©À´»ñÈ¡·´Ïòshell£¬È»ºóʹÓÃChisel×÷ΪËíµÀ¹¤¾ß½øÈëÍøÂç¡£¹¥»÷Õß»áÔÚ»ñµÃ³õʼ·ÃÎÊȨÏÞºóÆÚ´ýÒ»¸öÔ£¬È»ºó½øÐкáÏòÒÆ¶¯£¬»¹ÀûÓÃFileZilla½øÐÐÊý¾Ýй¶£¬²¢ÀûÓÃBitLockerºÍÀÕË÷Èí¼þLorenz¶ÔESXi½øÐмÓÃÜ¡£


https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/


5¡¢Group-IB·¢ÏÖͨ¹ýеÄBitB¹¥»÷ÇÔÈ¡SteamÕÊ»§µÄ»î¶¯

      

Group-IBÔÚ9ÔÂ13ÈÕÅû¶Á˹¥»÷ÕßÀûÓÃBrowser-in-the-Browser£¨BitB£©µöÓã¹¥»÷ÇÔÈ¡Steamƾ¾ÝµÄ»î¶¯¡£BitBÊÇÒ»ÖÖÐµĹ¥»÷ÒªÁ죬Ôڻ´°¿ÚÖд´½¨¼ÙµÄä¯ÀÀÆ÷´°¿Ú£¬Ê¹ÆäÏÔʾΪĿ±êµÇ¼·þÎñµÄµÇ¼µ¯³öÒ³Ãæ¡£¸Ã»î¶¯ÒÔ½õ±êÈüΪÓÕ¶ü£¬ÑûÇëÄ¿±ê¼ÓÈëÓ¢ÐÛÁªÃË¡¢CS¡¢Dota 2»òPUBG½õ±êÈüµÄÍŶÓ£¬ËùÀûÓõĵöÓ㹤¾ß°üÔÚºÚ¿ÍÂÛ̳»ò°µÍøÖв¢Î´±»¹ã·ºÊ¹Óá£ÕâЩµöÓã¹¥»÷Ö¼ÔÚ³öÊÛ¶ÔÕÊ»§µÄ·ÃÎÊȨÏÞ£¬Ò»Ð©ÖøÃûµÄSteamÕÊ»§µÄ¼ÛÖµÔÚ100000ÃÀÔªµ½300000ÃÀÔªÖ®¼ä¡£


https://blog.group-ib.com/steam


6¡¢MandiantÐû²¼¹ØÓÚAPT42¹¥»÷»î¶¯µÄÏêϸ·ÖÎö³ÂËß

      

9ÔÂ7ÈÕ£¬MandiantÐû²¼ÁËÒ»·ÝÈ«ÃæµÄ³ÂËߣ¬ÏêÊöÁËAPT42µÄ¹¥»÷»î¶¯¡£APT42£¨Ô­UNC788£©ÓëÒÁÀÊÓйØ£¬´ú±íÒÁ˹À¼¸ïÃüÎÀ¶Ó(IRGC)µÄÇ鱨×éÖ¯(IRGC-IO)ÔË×÷£¬»¹ÓëAPT35ÓÐËùÖØµþ¡£¸ÃÍÅ»ïÖ÷Òª½øÐиßÕë¶ÔÐÔµÄÓã²æÊ½µöÓã¹¥»÷ºÍÉç»á¹¤³Ì¹¥»÷£¬Æä»î¶¯´óÖ·ÖΪÈýÀ࣬ƾ֤ÊÕ¼¯¡¢¼àÊӻºÍ¶ñÒâÈí¼þ·Ö·¢¡£×Ô2015Äê³õÒÔÀ´£¬MandiantÒÑÊӲ쵽Áè¼Ý30´ÎÈ·ÈÏÊÇÀ´×ÔAPT42µÄ¹¥»÷»î¶¯¡£ÓëÒÁÀÊµÄÆäËü¹¥»÷ÍÅ»ïÏàËÆ£¬Æä´ó²¿ÃŻ¼¯ÖÐÔÚÖж«µØÓò£¬Ö÷ÒªÕë¶ÔµÐ¶ÔµÄ×éÖ¯ºÍ¸öÈË¡£


https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises