Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑѬȾÁè¼Ý1Íò¸öϵͳ

Ðû²¼Ê±¼ä 2023-03-14

1¡¢Cisco¼ì²âµ½½©Ê¬ÍøÂçPrometeiÒÑѬȾÁè¼Ý1Íò¸öϵͳ


CiscoÔÚ3ÔÂ9ÈÕ³ÆÆä¼ì²âµ½Ð°汾µÄ½©Ê¬ÍøÂçPrometeiµÄ¹¥»÷»î¶¯¡£PrometeiÓÚ2016ÄêÊ״ηºÆð£¬×Ô2022Äê11ÔÂÒÔÀ´£¬¸Ãа汾ÒÑѬȾȫÇò·¶Î§ÄÚµÄ10000¶à¸öϵͳ£¬Éæ¼°155¸ö¹ú¼Ò/µØÓò¡£¸Ã½©Ê¬ÍøÂçµÄÔËÓªÈËÔ±¸üÐÂÁËÖ´ÐÐÁ´µÄijЩ×ÓÄ £¿é£¬ÒÔ×Ô¶¯»¯Á÷³Ì²¢ÌôÈÆ¹ýÖ¤·ÖÎöÒªÁì¡£´ËÍ⣬Ëü»¹ÓÐÐí¶àÐµĹ¦Ð§£¬°üÂÞÌæ´úµÄC2ÓòÉú³ÉËã·¨(DGA)£¬×ÔÎÒ¸üлúÖÆ£¬ÒÔ¼°Apache WebserverµÄÀ¦°ó°æ±¾ºÍ°²×°µ½Ä¿±êÖ÷»úÉϵÄWeb shell¡£


https://blog.talosintelligence.com/prometei-botnet-improves/


2¡¢ÓÎÏ·¿ª·¢ÉÌGSC Game WorldµÄϵͳ±»ºÚ²¿ÃÅÊý¾Ýй¶


¾Ý3ÔÂ13ÈÕ±¨µÀ£¬Ç±ÐÐÕß2£ºÇжûŵ±´ÀûÖ®ÐÄ£¨Stalker 2£©ÓÎÏ·µÄ¿ª·¢ÉÌGSC Game World͸¶ÆäϵͳÒѱ»ÈëÇÖ£¬ºÚ¿Í¿ÉÒÔÔÚ¹¥»÷ÆÚ¼äÇÔÈ¡ÓÎÏ·×ʲú¡£¸Ã¹«Ë¾ÌåÏÖ£¬ÆäÔ±¹¤µÄ¼¯ÌåͼÏñ´¦ÖÃÓ¦Ó÷¨Ê½ÕÊ»§Ôâµ½¹¥»÷£¬ÕâÖ»ÊÇËüÔÚ¹ýÈ¥Ò»ÄêÖÐÔâµ½µÄÖڶ๥»÷Ö®Ò»¡£ºÚ¿ÍÔÚ¶íÂÞ˹É罻ýÌåÆ½Ì¨VK³ÆÒÑÇÔÈ¡ÁË´óÁ¿STALKER 2ËØ²Ä£¬°üÂÞÕû¸ö¹ÊÊÂÇé½Ú¡¢¹ý³¡¶¯»­ÃèÊö¡¢¿´·¨ÒÕÊõºÍµØÍ¼µÈ¡£²¢ÍþвÈç¹ûÓÎÏ·¿ª·¢ÉÌÔÚ3ÔÂ15ÈÕ֮ǰ²»¸Ä±äÆä¶Ô¶íÂÞ˹ºÍ°×¶íÂÞË¹Íæ¼ÒµÄÁ¢³¡£¬ËûÃǽ«Ð¹Â¶ÇÔÈ¡µÄÊýÊ®GBÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/stalker-2-game-developer-hacked-by-russian-hacktivists-data-stolen/


3¡¢BlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷±»· £¿î300ÍòÃÀÔª


ýÌå3ÔÂ10ÈÕ±¨µÀ³Æ£¬ÔƼÆË㹩ӦÉÌBlackbaudÒòÎóµ¼ÐÔÅû¶2020ÄêµÄÀÕË÷¹¥»÷ʼþ£¬±»ÃÀ¹ú֤ȯ½»Ò×ίԱ»á(SEC)· £¿î300ÍòÃÀÔª¡£¸Ã¹«Ë¾ÔÚ2020Äê7ÔÂÌåÏÖ£¬µ±Äê5ÔµÄÀÕË÷¹¥»÷ÎÞ·¨·ÃÎʾèÔùÕßÒøÐÐÕË»§ÏêϸÐÅÏ¢»òÉç»áÄþ¾²ºÅÂ롣Ȼ¶øBlackbaud¼¼ÊõÈËÔ±ºÜ¿ìÁ˽⵽¹¥»÷ÕßÒѾ­·ÃÎʲ¢ÇÔÈ¡ÁËÕâЩÃô¸ÐÐÅÏ¢¡£ÓÉÓÚ¹«Ë¾È±·¦Êʵ±µÄÅû¶¿ØÖƺͷ¨Ê½£¬ËûÃÇδÄÜÏò¹ÜÀí²ã³ÂËß¡£Õâµ¼ÖÂBlackbaudÌá½»µÄSEC³ÂËßÖÐûÓаüÂÞÓйØÎ¥¹æË®Æ½µÄÖØÒªÐÅÏ¢¡£ 


https://www.securityweek.com/blackbaud-fined-3m-for-misleading-disclosures-about-2020-ransomware-attack/


4¡¢Ö´·¨²¿ÃŲé·âNetwire RATµÄ»ù´¡ÉèÊ©²¢´þ²¶ÆäÔËÓªÈËÔ±


¾ÝýÌå3ÔÂ9ÈÕ±¨µÀ£¬Ò»Ïî¹ú¼ÊÖ´·¨Ðж¯²é·âÁËNetwire RATµÄ»ù´¡ÉèÊ©£¬²¢´þ²¶ÆäÔËÓªÈËÔ±¡£NetWireÊÇÒ»ÖÖÔ¶³Ì·ÃÎÊľÂí£¬×Ô2014ÄêÒÔÀ´Ò»Ö±ÊÇÖÖÖÖ¶ñÒâ¹¥»÷»î¶¯µÄÊ×Ñ¡¹¤¾ß¡£×÷Ϊ´Ë´ÎÐж¯µÄÒ»²¿ÃÅ£¬FBI²é·âÁËÓÃÓÚÍÆ¹ã¸Ã·þÎñµÄworldwiredlabs.comÓò£¬ÈðÊ¿¾¯·½²é·âÁËÍйܸÃÍøÕ¾µÄ·þÎñÆ÷¡£Ò»ÃûÒÉËÆÊÇNetWireÍøÕ¾¹ÜÀíÔ±µÄ¿ËÂÞµØÑǹúÃñÔÚ¿ËÂÞµØÑDZ»²¶£¬²¢½«±»µØ·½Õþ¸®¸®ÆðËß¡£


https://www.bleepingcomputer.com/news/security/police-seize-netwire-rat-malware-infrastructure-arrest-admin/


5¡¢ZOLL MedicalÔâµ½¹¥»÷Áè¼Ý100Íò»¼ÕßµÄPHIÐÅϢй¶


ýÌå3ÔÂ11Èճƣ¬ZOLL MedicalÕýÔÚ֪ͨ1004443¸ö»¼Õߣ¬ËûÃǵÄPHIÐÅÏ¢¿ÉÄÜÔÚ×î½üµÄÒ»´ÎÄþ¾²Ê¼þÖÐй¶¡£Æ¾¾ÝZOLLµÄ֪ͨ£¬¸Ã¹«Ë¾µÄÄþ¾²ÍŶÓÔÚ1ÔÂ28ÈÕÊ×´ÎÔÚÆäÄÚÍøÉϼì²âµ½Òì³£»î¶¯¡£ËûÃÇѸËÙ×ö³ö·´Ó³£¬»º½â²¢ÊÓ²ìÁËÕâһʼþ¡£ÊÓ²ì±íÃ÷£¬PHI¿ÉÄÜÔÚ2023Äê2ÔÂ2ÈÕǰºóÊܵ½Ó°Ï졣й¶ÐÅÏ¢Éæ¼°ÐÕÃû¡¢µØÖ·ºÍÉç»áÄþ¾²ºÅÂëµÈ¡£ZOLL½«ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩ24¸öÔµÄExperian IdentityWorksSMʹÓÃȨÏÞ¡£


https://www.databreaches.net/zoll-medical-notifying-1004443-patients-of-data-breach-hipaa/


6¡¢SentinelLabsÐû²¼ÀÕË÷Èí¼þIceFireµÄLinux°æ±¾µÄ³ÂËß


3ÔÂ9ÈÕ£¬SentinelLabsÐû²¼Á˹ØÓÚÀÕË÷Èí¼þIceFireµÄ·ÖÎö³ÂËß¡£×î½ü¼¸ÖÜ£¬SentinelLabs·¢ÏÖеÄLinux°æ±¾IceFire±»ÓÃÓÚÕë¶Ô¶à¸öýÌåºÍÓéÀÖÐÐÒµµÄ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¹¥»÷ÕßÀûÓÃÁËIBM Aspera FaspexÎļþ¹²ÏíÈí¼þÖеķ´ÐòÁл¯Â©¶´£¨CVE-2022-47986£©À´°²×°ÀÕË÷Èí¼þ¡£Ö´ÐÐʱ£¬IceFire»á¼ÓÃÜÎļþ£¬½«À©Õ¹Ãû.ifire¸½¼Óµ½ÎļþÃû£¬È»ºóͨ¹ýɾ³ý×ÔÉíºÍ¶þ½øÖÆÎļþÀ´ÑÚ¸ÇÆä×Ù¼£¡£


https://www.sentinelone.com/labs/icefire-ransomware-returns-now-targeting-linux-enterprise-networks/