Ñо¿ÈËÔ±Åû¶ÀûÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµµÄ»î¶¯

Ðû²¼Ê±¼ä 2023-11-01

1¡¢Ñо¿ÈËÔ±Åû¶ÀûÓÃBiBi-Linux¹¥»÷ÒÔÉ«ÁÐµÄÆóÒµµÄ»î¶¯


¾ÝýÌå10ÔÂ30ÈÕ±¨µÀ£¬Ò»ÖÖÃûΪBiBi-LinuxµÄÐÂÐÍWiper¶ñÒâÈí¼þÕýÔÚ±»ÓÃÓÚÕë¶ÔÒÔÉ«ÁеĹ«Ë¾µÄ¹¥»÷»î¶¯¡£¸Ã¶ñÒâÈí¼þÊÇx64 ELF¿ÉÖ´ÐÐÎļþ£¬Ã»ÓлìÏýµÈ±£»¤´ëÊ©£¬ÕâʹÑо¿ÈËÔ±µÄ·ÖÎö¹ý³Ì±äµÃÔ½·¢ÈÝÒס£Ëü¿ÉÖ¸¶¨Ä¿±êÎļþ¼Ð£¬Èç¹ûÒÔrootȨÏÞÔËÐÐÔò¿ÉÄÜ»áÏú»ÙÕû¸öϵͳ¡£BiBi-Linux»¹Ê¹ÓöàÏ̺߳ÍÐÐÁÐϵͳÀ´Ìá¸ßËٶȺÍЧÂÊ¡£VirusTotal³Æ£¬Ä¿Ç°£¬Ö»ÓÐÁ½¼ÒÄþ¾²¹©Ó¦É̵ĶñÒâÈí¼þɨÃèÒýÇæ½«BiBi-Linux¼ì²âΪ¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/new-bibi-linux-wiper-malware-targets-israeli-orgs-in-destructive-attacks/ 


2¡¢Unit 42·¢ÏÖÀûÓÃIAMƾ֤µÄ¼ÓÃܽٳֹ¥»÷EleKtra-Leak


 Unit 42ÔÚ10ÔÂ30ÈÕ³ÆÆä·¢ÏÖÁËÐµĹ¥»÷»î¶¯EleKtra-Leak£¬¿É×Ô¶¯¶¨Î»¹ûÈ»GitHub´æ´¢¿âÖÐ̻¶µÄÉí·ÝºÍ·ÃÎʹÜÀí(IAM)ƾ֤£¬Ö¼ÔÚ½øÐмÓÃÜ»õ±Ò½Ù³Ö»î¶¯¡£¸Ã»î¶¯ÖÁÉÙ×Ô2020Äê12Ô¾ÍÒ»Ö±»îÔ¾£¬²¢ÓÚ½ñÄê8ÔÂ30ÈÕÖÁ10ÔÂ6ÈÕ´Ó¶à´ï474¸öAmazon EC2ʵÀýÖÐÍÚ¾òÃÅÂÞ±Ò¡£´ËÍ⣬¹¥»÷ÕßÄܹ»ÔÚIAMƾ֤Ê×´Î̻¶µÄÎå·ÖÖÓÄھͼì²â²¢ÀûÓÃËü£¬»¹»á°Ñ¹ûÈ»IAMƾ֤µÄAWSÕË»§ÁÐÈëºÚÃûµ¥¡£


https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/


3¡¢eSentireÑÝʾ½«Ä¿±êÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾µÄWiki-Slack¹¥»÷


¾Ý10ÔÂ30ÈÕ±¨µÀ£¬eSentireÑо¿ÈËÔ±Éè¼ÆÁËÒ»ÖÖеÄWiki-Slack¹¥»÷£¬¿É½«×¨ÒµÈËÊ¿ÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¹¥»÷ÕßÊ×ÏÈÑ¡ÔñÒ»¸öWikipediaÖ÷Ì⣬Ȼºó½øÈëÌõÄ¿µÄÊ×Ò³²¢±à¼­Ò³Ã棬Ìí¼ÓÒ»¸öºÏ·¨µÄ²Î¿¼½Å×¢¡£ÔÚSlackÉÏ·ÖÏíÎÄÕÂʱ£¬Ò»µ©Âú×ãijЩ¸½¼ÓÌõ¼þ£¬Slack½«·ºÆðÔÚԭʼWikipediaÖв»ÐмûµÄÁ´½Ó¡£Òò´Ë£¬×¨ÒµÈËÊ¿½«WikipediaÌõÄ¿¸´ÖƵ½Slackʱ¾Í»á·ºÆð¶ñÒâÁ´½Ó£¬Èç¹ûÁ´½ÓµÄÓï·¨Éè¼ÆµÃ×ã¹»ºÃ£¬SlackÓû§¾Í»á±»ÎüÒý²¢µã»÷Ëü£¬´Ó¶ø±»Öض¨Ïòµ½¶ñÒâÍøÕ¾£¬ÆäÖпÉÄÜÓлùÓÚä¯ÀÀÆ÷µÄ¶ñÒâÈí¼þ¡£


https://securityaffairs.com/153245/hacking/wiki-slack-attack.html


4¡¢WiHDÅäÖôíÎóй¶½ü10ÍòtorrentÓû§µÄÏêϸÐÅÏ¢


ýÌå10ÔÂ31Èճƣ¬World-in-HD(WiHD)ÅäÖôíÎó£¬Ð¹Â¶ÁË97327¸öÓû§µÄÏêϸÐÅÏ¢¡£WiHDÊÇÒ»¿îÁ÷ÐеÄ˽ÈËÖÖ×Ó¸ú×Ù·¨Ê½£¬×¢²áÓû§¿ÉÒÔ·ÃÎÊ·¨ÓïºÍÓ¢ÓïµÄµçÊӾ硢ӰϷ¡¢¶¯»­µÈÄÚÈÝ¡£¸Ã˽È˸ú×Ù·¨Ê½Í¨³£½ö½ÓÊÜÑûÇ룬һЩÈËÒÔÁè¼Ý100ÃÀÔªµÄ¼Û¸ñ³öÊÛ¸ÃÍøÕ¾µÄÑûÇë¡£Cybernews·¢ÏÖÁËWiHDµÄÒ»¸ö¹ûÈ»µÄElasticsearch£¬Ã»ÓÐÈκÎÃÜÂë±£»¤£¬Ð¹Â¶ÁËÓû§µç×ÓÓʼþ¡¢IPµØÖ·¡¢·þÎñÐÅÏ¢¡¢Óû§ÃûºÍËùÓÐtorrentÓû§µÄÃÜÂë¡£


https://securityaffairs.com/153296/deep-web/wihd-data-leak.html


5¡¢SlashNextÐû²¼2023ÄêÍøÂçµöÓãÌ¬ÊÆµÄ·ÖÎö³ÂËß


10ÔÂ30ÈÕ±¨µÀ³Æ£¬SlashNextÐû²¼ÁË2023ÄêÍøÂçµöÓãÌ¬ÊÆµÄ·ÖÎö³ÂËß¡£¸Ã³ÂËß¶Ô2022ÄêQ4ÖÁ2023ÄêQ3µÄ12¸öÔÂÄÚͨ¹ýµç×ÓÓʼþ¡¢Òƶ¯É豸ºÍä¯ÀÀÆ÷ÊӲ쵽µÄ¹¥»÷»î¶¯½øÐÐÁË·ÖÎö¡£È¥ÄêQ4ÒÔÀ´£¬µöÓãµç×ÓÓʼþ¼¤ÔöÁË1265%£¬Æ¾Ö¤ÍøÂçµöÓã¹¥»÷Ôö¼ÓÁË967%¡£×ÔChatGPTÍÆ³öÒÔÀ´£¬µç×ÓÓʼþµöÓã´ó·ùÔö¼Ó¡£ÆäËüÖØÒªµÄ·¢ÏÖ°üÂÞ£¬Æ½¾ùÿÌì31000´ÎµöÓã¹¥»÷£¬ÆäÖÐ68%±»Ê¶±ðΪ»ùÓÚÎı¾µÄBEC¡£77%µÄרҵÈËÊ¿Ôø³ÉΪµöÓã¹¥»÷µÄÄ¿±ê£¬ÆäÖÐ28%µÄ¹¥»÷ÊÇͨ¹ý¶ÌÐŽøÐеÄ¡£


https://slashnext.com/state-of-phishing-2023/


6¡¢FortinetÐû²¼¹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö³ÂËß


10ÔÂ30ÈÕ£¬FortinetÐû²¼Á˹ØÓÚÀÕË÷Èí¼þKnightµÄ×ÛÊö³ÂËß¡£KnightÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷ÍŻÓÚ½ñÄê8Ô·ºÆð¡£KnightµÄǰÉíCyclopsÓµÓÐÊÊÓÃÓÚWindows¡¢LinuxºÍMac OSµÄ¶àϵͳ¹¤¾ß¡£Òò´Ë£¬ËäÈ»Ñо¿ÈËÔ±½ö·¢ÏÖÁËKnightµÄWindows°æ±¾£¬µ«ÆäËû°æ±¾¿ÉÄÜÕýÔÚ·ºÆð¡£KnightÕë¶Ô¶à¸ö´¹Ö±ÐÐÒµ£¬ÆäÖÐÁãÊÛÐÐÒµÊÜÓ°Ïì×î´ó¡£°´µØÓò·ÖÀ࣬ÃÀ¹úÔâµ½µÄKnight¹¥»÷×î¶à¡£


https://www.fortinet.com/blog/threat-research/ransomware-roundup-knight