°Ä´óÀûÑǾü·½µÄͨѶƽ̨ForceNetÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-11-03
¾Ý·͸Éç10ÔÂ31ÈÕ±¨µÀ£¬£¬£¬£¬°Ä´óÀûÑÇForceNetÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£ForceNetÊÇÓɹú·À²¿ÍⲿICT¹©Ó¦ÉÌÔËÓªµÄ£¬£¬£¬£¬ÊǰĴóÀûÑǾüʺ͹ú·ÀְԱʹÓõÄͨѶƽ̨¡£¡£¡£¡£¹ú·À²¿ÖúÀí²¿³¤ÌåÏÖ£¬£¬£¬£¬¸ÃЧÀÍÔâµ½¹¥»÷£¬£¬£¬£¬µ«µ½ÏÖÔÚΪֹûÓÐÈκÎÊý¾Ýй¶¡£¡£¡£¡£¾Ý°Ä´óÀûÑÇýÌ峯£¬£¬£¬£¬Ò»Ð©Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬Èç¾üÊÂÖ°Ô±µÄ³öÉúÈÕÆÚºÍÈëÎéϸ½ÚµÈ¿ÉÄÜÒѱ»µÁ¡£¡£¡£¡£¹ú·À²¿½²»°ÈË͸¶£¬£¬£¬£¬ËûÃÇÕýÔÚ¼ì²éÊÜÓ°ÏìÊý¾Ý¼¯µÄÄÚÈݼ°Æä°üÀ¨µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬²¢ÒÑ֪ͨËùÓÐÏà¹ØÖ°Ô±¡£¡£¡£¡£
https://www.reuters.com/technology/ransomware-hackers-hit-australian-defence-communications-platform-2022-10-31/
2¡¢Ñо¿Ö°Ô±Åû¶Azure Cosmos DBÖеÄRCEÎó²îCosMiss
¾Ý11ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬Orca SecurityÑо¿Ö°Ô±Åû¶ÁËAzure Cosmos DBÄÚÖõÄJupyter NotebooksÖеÄRCEÎó²îCosMiss¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÖªµÀNotebookµÄ'forwardingId'£¬£¬£¬£¬¼´Notebook WorkspaceµÄUUID£¬£¬£¬£¬ËûÃǽ«ÓµÓÐNotebookµÄÍêÕûȨÏÞ¶øÎÞÐè¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬°üÀ¨¶ÁÈ¡ºÍдÈë»á¼ûȨÏÞ¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê10ÔÂ3ÈÕÏòMicrosoft±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌÔÚ10ÔÂ5ÈÕÐÞ¸´ÁËËü¡£¡£¡£¡£MicrosoftÚ¹Êͳƣ¬£¬£¬£¬²»Ê¹ÓÃJupyter NotebooksµÄ¿Í»§£¨99.8%µÄ¿Í»§£©²»Ò×Êܵ½´ËÎó²îµÄÓ°Ïì ¡£¡£¡£¡£
https://thehackernews.com/2022/11/researchers-disclose-details-of.html
3¡¢DropboxÔâµ½´¹ÂÚ¹¥»÷µ¼ÖÂ130¸öGitHub´æ´¢¿âй¶
DropboxÔÚ11ÔÂ1ÈÕ͸¶£¬£¬£¬£¬ºÚ¿ÍʹÓô¹ÂÚ¹¥»÷ÖлñµÃµÄÔ±¹¤Æ¾Ö¤»á¼ûÆäÒ»¸öGitHubÕÊ»§ºóÇÔÈ¡ÁË130¸ö´úÂë´æ´¢¿â¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ10ÔÂ14ÈÕ·¢Ã÷¹¥»÷ÕßÈëÇÖÁ˸ÃÕÊ»§£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶Ô¶àÃûDropboxÔ±¹¤£¬£¬£¬£¬Í¨¹ýð³äCircleCIµÄÓʼþ½«ËûÃÇÖØ¶¨Ïòµ½´¹ÂÚÒ³Ãæ£¬£¬£¬£¬²¢ÒªÇóËûÃÇÊäÈëGitHubƾ֤¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ÊÜÓ°Ïì´æ´¢¿â°üÀ¨ÆäΪDropboxʹÓöøÉÔ×÷Ð޸ĵĵÚÈý·½¿â¸±±¾¡¢ÄÚ²¿ÔÐÍÒÔ¼°Çå¾²ÍŶÓʹÓõÄһЩ¹¤¾ßºÍÉèÖÃÎļþ£¬£¬£¬£¬²¢²»°üÀ¨½¹µãÓ¦ÓóÌÐò»ò»ù´¡ÉèÊ©µÄ´úÂë¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dropbox-discloses-breach-after-hacker-stole-130-github-repositories/
4¡¢Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý100Íò´Î
¾ÝMalwarebytes 11ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬Google PlayÉϵÄ4¸ö¶ñÒâÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý100Íò´Î¡£¡£¡£¡£ÕâЩӦÓÃÈÔÈ»±£´æÓÚ¿ª·¢ÕßÕË»§Mobile apps Group֮ϣ¬£¬£¬£¬»®·ÖΪBluetooth Auto Connect¡¢Bluetooth App Sender¡¢Driver: Bluetooth, Wi-Fi, USBºÍMobile transfer: smart switch¡£¡£¡£¡£ËüÃǿɽ«Óû§ÒýÏòÇÔÊØÐÅÏ¢»òΪÔËÓªÍŶӴ´Á¢"pay-per-click"ÊÕÈëµÄÍøÕ¾¡£¡£¡£¡£ÆäÖÐÒ»Ð©ÍøÕ¾ÓÕʹĿµÄÏÂÔØÎ±ÔìµÄÇå¾²¹¤¾ß»ò¸üУ¬£¬£¬£¬ÒÔʹÓÃÆäÊÖ¶¯×°ÖöñÒâÎļþ¡£¡£¡£¡£
https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
5¡¢Emotet¶ÌÔÝͣЪ5¸öÔÂºó»Ø¹é£¬£¬£¬£¬·Ö·¢¶ñÒâExcel¸½¼þ
ýÌå11ÔÂ2Èճƣ¬£¬£¬£¬ÔÚÂÄÀúÁ˽ü5¸öÔµġ°¼ÙÆÚ¡±Ö®ºó£¬£¬£¬£¬EmotetÔÙ´Î×îÏȹ¥»÷»î¶¯¡£¡£¡£¡£CryptolaemusÑо¿Ö°Ô±±¨¸æËµ£¬£¬£¬£¬ÔÚÃÀ¹ú¶«²¿Ê±¼ä11ÔÂ2ÈÕÆÆÏþ4:00×óÓÒ£¬£¬£¬£¬EmotetͻȻÔٴλîÔ¾ÆðÀ´£¬£¬£¬£¬ÏòÈ«ÇòµÄÓʼþµØµã·¢ËÍÀ¬»øÓʼþ¡£¡£¡£¡£¸Ã»î¶¯Ê¹Óñ»µÁµÄµç×ÓÓʼþ»Ø¸´Á´½ÓÀ´·Ö·¢¶ñÒâExcel¸½¼þ£¬£¬£¬£¬ÒÔÖÖÖÖÓïÑÔºÍÎļþÃûÕë¶ÔÈ«ÇòÓû§£¬£¬£¬£¬Î±×°³É·¢Æ±¡¢É¨Ãè¼þ¡¢µç×Ó±í¸ñµÈÓÕ¶ü¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»î¶¯»¹ÒýÈëÁËÒ»¸öеÄExcel¸½¼þÄ£°å£¬£¬£¬£¬ÆäÖаüÀ¨ÈƹýMicrosoftÊܱ£»£»£»£»£»£»¤ÊÓͼµÄ˵Ã÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-5-month-break/
6¡¢KasperskyÐû²¼2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄÆÊÎö±¨¸æ
KasperskyÔÚ11ÔÂ1ÈÕÐû²¼ÁË2022ÄêµÚÈý¼¾¶ÈAPTÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã¼¾¶ÈµÄÖ÷ÒªÇ÷ÊÆ°üÀ¨£ºAPT»î¶¯ÂþÑܺÜÊÇÆÕ±é£¬£¬£¬£¬±¾¼¾¶ÈµÄ¹¥»÷¹æÄ£À©´óµ½Å·ÖÞ¡¢ÃÀ¹ú¡¢º«¹ú¡¢°ÍÎ÷¡¢Öж«ºÍÑÇÖÞ¸÷µØ£»£»£»£»£»£»APT¹¥»÷ÍÅ»ïÑ¡ÔñµÄÄ¿µÄ¶àÑù»¯£¬£¬£¬£¬°üÀ¨Õþ¸®ºÍÍâ½»»ú¹¹¡¢¹ú·À³Ð°üÉÌ¡¢½ðÈÚÐÐÒµ¡¢¿Æ¼¼Ó²¼þºÍ°ëµ¼ÌåÐÐÒµ£¬£¬£¬£¬ÒÔ¼°ITÕÐÆ¸µÈ£»£»£»£»£»£»µØÔµÕþÖÎÈÔÈ»ÊÇAPTÉú³¤µÄÖ÷ÒªÇý¶¯Á¦£¬£¬£¬£¬Ìع¤»î¶¯ÊÇAPT»î¶¯µÄÖ÷ҪĿµÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬±¨¸æ»¹ÏÈÈÝÁËÓë¶íÂÞ˹¡¢Öж«¡¢¶«ÄÏÑǺͳ¯Ïʰ뵺µÈµØÇøÏà¹ØµÄAPT»î¶¯¡£¡£¡£¡£
https://securelist.com/apt-trends-report-q3-2022/107787/


¾©¹«Íø°²±¸11010802024551ºÅ