ÓÎÏ·¿¯Ðй«Ë¾ActivisionµÄÊý¾Ý±»Ðû²¼ÔÚijºÚ¿ÍÂÛ̳

Ðû²¼Ê±¼ä 2023-03-01

1¡¢ÓÎÏ·¿¯Ðй«Ë¾ActivisionµÄÊý¾Ý±»Ðû²¼ÔÚijºÚ¿ÍÂÛ̳


¾ÝýÌå2ÔÂ27ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁË´ÓÃÀ¹úÓÎÏ·¿¯ÐÐÉÌActivisionµÄAzureÊý¾Ý¿âÖÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£ ¡£¡£¹¥»÷±¬·¢ÓÚ2022Äê12ÔÂ4ÈÕ£¬ £¬£¬£¬£¬£¬ºÚ¿Í´¹ÂÚ¹¥»÷ÁËActivisionµÄÒ»ÃûHRÔ±¹¤²¢ÇÔÈ¡Æäƾ֤¡£¡£¡£ ¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨19444Ìõ¼Í¼£¬ £¬£¬£¬£¬£¬Éæ¼°Ô±¹¤µÄÐÕÃû¡¢µç»°¡¢Ö°Î»¡¢Î»ÖúÍÓʼþµØµãµÈ¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬ £¬£¬£¬£¬£¬¾­Óɳ¹µ×ÊӲ죬 £¬£¬£¬£¬£¬È·¶¨Ã»ÓÐÃô¸ÐµÄÔ±¹¤ÐÅÏ¢¡¢ÓÎÏ·´úÂë»òÍæ¼ÒÐÅϢй¶¡£¡£¡£ ¡£¡£


https://securityaffairs.com/142779/data-breach/activision-data-leak.html


2¡¢BitdefenderÐû²¼ÀÕË÷Èí¼þMortalKombatµÄ½âÃÜÆ÷


ýÌå2ÔÂ28Èճƣ¬ £¬£¬£¬£¬£¬Çå¾²¹«Ë¾BitdefenderÐû²¼ÁËÀÕË÷Èí¼þMortalKombatµÄ½âÃÜÆ÷¡£¡£¡£ ¡£¡£MortalKombat»ùÓÚXorist£¬ £¬£¬£¬£¬£¬ÓÚ2023Äê1ÔÂÊ״ηºÆð£¬ £¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÃÀ¹ú£¬ £¬£¬£¬£¬£¬µ«Ò²ÓÐÓ¢¹ú¡¢ÍÁ¶úÆäºÍ·ÆÂɱöµÄѬȾ»î¶¯¡£¡£¡£ ¡£¡£¹¥»÷Õ߻ᷢËͰüÀ¨¶ñÒâZIP¸½¼þµÄÓʼþ£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨BAT¼ÓÔØ³ÌÐò¾ç±¾£¬ £¬£¬£¬£¬£¬Æô¶¯Ê±Ëü»áÏÂÔØ²¢Ö´ÐÐÀÕË÷Èí¼þ¶þ½øÖÆÎļþºÍLaplas¡£¡£¡£ ¡£¡£´Ë½âÃÜÆ÷ÊÇÒ»¸ö×ÔÁ¦µÄ¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬£¬£¬ÎÞÐèÔÚ±»Ñ¬È¾µÄ×°±¸ÉÏ×°Öᣡ£¡£ ¡£¡£Ëü¿ÉɨÃèÕû¸öÎļþϵͳÒÔ¶¨Î»Ñ¬È¾MortalKombatµÄÎļþ£¬ £¬£¬£¬£¬£¬µ«ÎÞ·¨¶¨Î»ºÍ¸ù³ýLaplasÎļþ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-decryptor-recovers-your-files-for-free/


3¡¢ºÚ¿ÍʹÓÃWordPress HouzezÖеÄÎó²îÀ´Ð®ÖÆÍøÕ¾


¾ÝPatchstackÔÚ2ÔÂ27ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬ºÚ¿ÍÔÚʹÓÃWordPress²å¼þHouzezÖеÄÁ½¸öÎó²îÀ´Ð®ÖÆÍøÕ¾¡£¡£¡£ ¡£¡£HouzezÊÇThemeForestÉϵÄÒ»¿î¸ß¼¶²å¼þ£¬ £¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ·¿µØ²úÍøÕ¾£¬ £¬£¬£¬£¬£¬ÌṩÇáËɵÄÁбíÖÎÀíÎÂ˳³©µÄ¿Í»§ÌåÑé¡£¡£¡£ ¡£¡£µÚÒ»¸öÊÇHouzezÖ÷Ìâ²å¼þÖеÄÌáȨÎó²î£¨CVE-2023-26540£©£¬ £¬£¬£¬£¬£¬ÁíÒ»¸öÊÇÓ°ÏìHouzesµÇ¼ע²á²å¼þµÄÌáȨÎó²î£¨CVE-2023-260090£©¡£¡£¡£ ¡£¡£PatchstackÔÚÒ°Íâ·¢Ã÷µÄʹÓôËÎó²îµÄ¹¥»÷ÖУ¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÉÏ´«ÁËÒ»¸öÄܹ»Ö´ÐÐÏÂÁî¡¢ÔÚÍøÕ¾ÉÏ×¢Èë¹ã¸æ»ò½«Á÷Á¿Öض¨Ïòµ½ÆäËü¶ñÒâÍøÕ¾µÄºóÃÅ¡£¡£¡£ ¡£¡£


https://patchstack.com/articles/psa-houzez-theme-unauthenticated-privilege-escalation-vulnerability-exploited-in-the-wild/


4¡¢Ñо¿Ö°Ô±·¢Ã÷αװ³ÉÕýµ±Windowsµ÷ÊÔ¹¤¾ßµÄPlugX


2ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬Trend MicroÅû¶ÁËPlugXαװ³É¿ªÔ´Windowsµ÷ÊÔ¹¤¾ßx32dbgµÄ¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£¸Ãx32dbg.exe¾ßÓÐÓÐÓõÄÊý×ÖÊðÃû£¬ £¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Òþ²Ø¡¢¼á³Ö³¤ÆÚÐÔ¡¢ÌáÉýȨÏÞ²¢ÈƹýÎļþÖ´ÐÐÏÞÖÆ¡£¡£¡£ ¡£¡£´Ë´Î»î¶¯ÒÀȻʹÓÃÁËDLL²à¼ÓÔØµÄÊÖÒÕ£¬ £¬£¬£¬£¬£¬Ê¹Óþ­ÓÉÊý×ÖÊðÃûµÄÈí¼þÓ¦ÓóÌÐò¼ÓÔØ¶ñÒâDLL¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±¶Ô¸Ã¹¥»÷Á´µÄÆÊÎö»¹ÏÔʾ£¬ £¬£¬£¬£¬£¬Ê¹ÓÃx32dbg.exe×°ÖÃÁËÒ»¸öºóÃÅ¡£¡£¡£ ¡£¡£ÕâÊÇÒ»¸öUDP shell¿Í»§¶Ë£¬ £¬£¬£¬£¬£¬ÍøÂçϵͳÐÅÏ¢²¢ÆÚ´ýÔ¶³ÌЧÀÍÆ÷µÄÌØÊâÖ¸Áî¡£¡£¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/23/b/investigating-the-plugx-trojan-disguised-as-a-legitimate-windows.html


5¡¢ProofpointÐû²¼¹ØÓÚTA569¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


ProofpointÔÚ2ÔÂ26ÈÕÐû²¼Á˹ØÓÚTA569¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£TA569ÊÇÒ»¸ö¶à²úµÄ¹¥»÷ÍŻ £¬£¬£¬£¬£¬Ê¹ÓÃÁ˶àÖÖÀàÐ͵Ä×¢Èë·½·¨¡¢Á÷Á¿·ÖÅÉϵͳ(TDS)ºÍpayload£¬ £¬£¬£¬£¬£¬°üÀ¨µ«²»ÏÞÓÚSocGholish¡£¡£¡£ ¡£¡£TA569±»ÒÔΪÊÇÒ»¸ö³õʼ»á¼ûÊðÀí(IAB)»ò×ÔÁ¦µÄÍøÂç·¸·¨ÍŻ £¬£¬£¬£¬£¬ÆäTTPÔÚÒÑÍù¼¸¸öÔÂÖб¬·¢ÁËת±ä¡£¡£¡£ ¡£¡£Ä¿µÄ»á¼ûÔâµ½TA569×¢Èë¹¥»÷µÄÍøÕ¾Ê±£¬ £¬£¬£¬£¬£¬Æää¯ÀÀÆ÷»áÚ¹ÊÍ×¢ÈëµÄJavaScript£¬ £¬£¬£¬£¬£¬Öª×ãÌØ¶¨Ìõ¼þºó»áÅ׳öÒ»¸öÓÕ¶ü£¬ £¬£¬£¬£¬£¬ÈçÐéαµÄä¯ÀÀÆ÷¸üС£¡£¡£ ¡£¡£ÕâЩÓÕ¶üÓÃÓÚ·Ö·¢ÖÖÖÖ¶ñÒâÈí¼þpayload£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡³ÌÐò»òRAT¡£¡£¡£ ¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/ta569-socgholish-and-beyond


6¡¢KasperskyÐû²¼2022ÄêÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


2ÔÂ27ÈÕ£¬ £¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2022ÄêÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£ÔÚ2022Ä꣬ £¬£¬£¬£¬£¬Kaspersky¼ì²âµ½1661743¸ö¶ñÒâ×°ÖóÌÐò¡¢196476¸öеÄÊÖ»úÒøÐÐľÂíºÍ10543¸öеÄÒÆ¶¯ÀÕË÷Èí¼þ¡£¡£¡£ ¡£¡£Òƶ¯¹¥»÷ÔÚ2021ϰëÄêϽµºóÇ÷ÓÚÆ½ÎÈ£¬ £¬£¬£¬£¬£¬²¢ÔÚÕû¸ö2022Äê¼á³ÖÔÚͳһˮƽ¡£¡£¡£ ¡£¡£°´Òƶ¯¶ñÒâÈí¼þÀàÐÍ·ÖÀ࣬ £¬£¬£¬£¬£¬RiskToolÀàÀ¬»øÈí¼þ£¨27.39%£©Î»¾Ó°ñÊ×£¬ £¬£¬£¬£¬£¬È¡´úÁË֮ǰ×î¶àµÄ¹ã¸æÈí¼þ£¨24.05%£©¡£¡£¡£ ¡£¡£Òƶ¯¹ã¸æÈí¼þÖÐAdloϵÁÐÕ¼±È×î´ó (22.07%)£¬ £¬£¬£¬£¬£¬Æä´ÎÊÇEwind£¨16.46%£©ºÍHiddenAd£¨15.02%£©¡£¡£¡£ ¡£¡£


https://securelist.com/mobile-threat-report-2022/108844/