΢ÈíÅû¶CODESYS V3 SDKÖÐÓ°ÏìOTϵͳµÄ¶à¸öÎó²î

Ðû²¼Ê±¼ä 2023-08-15

1¡¢Î¢ÈíÅû¶CODESYS V3 SDKÖÐÓ°ÏìOTϵͳµÄ¶à¸öÎó²î


΢ÈíÓÚ8ÔÂ10ÈÕ³ÆÆäÔÚCODESYS V3Èí¼þ¿ª·¢Ì×¼þ(SDK)Öз¢Ã÷ÁËͳ³ÆÎªCoDe16µÄ¶à¸öÎó²î¡£¡£¡£¡£¡£¡£¸ÃÌ×¼þ±»ÓÃÓÚPLCµÄÈí¼þ¿ª·¢ÇéÐΣ¬£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁË3.5.19.0֮ǰµÄËùÓÐCODESYS V3°æ±¾£¬£¬£¬£¬£¬Ê¹OT»ù´¡ÉèÊ©ÃæÁÙÔâµ½RCEºÍDoSµÈ¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£ÕâЩÎó²î»®·ÖΪCVE-2022-47378¡¢CVE-2022-47379ºÍCVE-2022-47380µÈ¡£¡£¡£¡£¡£¡£Î¢ÈíÓÚ2022Äê9ÔÂÏòCODESYS±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬£¬¹©Ó¦ÉÌÓÚ½ñÄê4ÔÂÐÞ¸´ÁËËüÃÇ¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/


2¡¢Discord.ioÔ¼76ÍòÓû§µÄÊý¾ÝÔÚºÚ¿ÍÂÛ̳±»³öÊÛ


¾ÝýÌå8ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬Discord.ioÔ¼760000Ãû»áÔ±µÄÐÅϢй¶£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÔÝʱ¹Ø±Õ¡£¡£¡£¡£¡£¡£Discord.io²»Êǹٷ½DiscordÍøÕ¾¶øÊǵÚÈý·½Ð§ÀÍ£¬£¬£¬£¬£¬±»Ð§ÀÍÆ÷ËùÓÐÕßÓÃÀ´½¨Éè×Ô½ç˵ԼÇë¡£¡£¡£¡£¡£¡£8ÔÂ13ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍAkhirahÔÚÂÛ̳BreachedÉϳöÊÛÁËDiscord.ioµÄÊý¾Ý¿â£¬£¬£¬£¬£¬²¢¹ûÕæÁËÆäÖеÄ4ÌõÓû§¼Í¼×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£¡£¡£¾Ý¹¥»÷Õ߳ƣ¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨760000ÃûDiscord.ioÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£²»¾Ãºó£¬£¬£¬£¬£¬Discord.io֤ʵÁËй¶Êý¾ÝµÄÕæÊµÐÔ£¬£¬£¬£¬£¬²¢¹Ø±ÕÆäЧÀÍ£¬£¬£¬£¬£¬×÷·ÏËùÓи¶·Ñ»áÔ±µÄ×ʸñ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/discordio-confirms-breach-after-hacker-steals-data-of-760k-users/


3¡¢Sophos·¢Ã÷αװ³ÉTripAdvisorͶËßµÄKnight·Ö·¢»î¶¯


¾Ý8ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬SophosÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÐµĹ¥»÷»î¶¯£¬£¬£¬£¬£¬Î±×°³ÉTripAdvisorͶËߣ¬£¬£¬£¬£¬µ«È´·Ö·¢ÀÕË÷Èí¼þKnight¡£¡£¡£¡£¡£¡£CyclopsÔÚ7ÔÂβ¸üÃûΪKnight£¬£¬£¬£¬£¬»¹¸üÐÂÁ˾«¼ò°æ¼ÓÃÜÆ÷ÒÔÖ§³ÖÅúÁ¿·Ö·¢£¬£¬£¬£¬£¬²¢ÍƳöеÄÐ¹Â¶ÍøÕ¾¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþ°üÀ¨ZIP¸½¼þTripAdvisorComplaint.zip£¬£¬£¬£¬£¬È»ºóÓÕʹĿµÄÏÂÔØÍ¨¹ýExcel-DNA½¨ÉèµÄÒ»¸öXLLÎļþ¡£¡£¡£¡£¡£¡£·­¿ªXLLʱ½«¼ì²âMoTW±ê¼Ç£¬£¬£¬£¬£¬ÈôÊÇûÓУ¬£¬£¬£¬£¬Ôò»áÌáÐÑÄ¿µÄÆôÓøüÓÔØÏî¡£¡£¡£¡£¡£¡£Õâ»áÔÚеÄexplorer.exeÀú³ÌÖÐ×¢ÈëKnight Lite¼ÓÃܳÌÐò£¬£¬£¬£¬£¬²¢×îÏȼÓÃÜÅÌËã»úÉϵÄÎļþ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/knight-ransomware-distributed-in-fake-tripadvisor-complaint-emails/


4¡¢Ö¥¼Ó¸ç±´¶ûÌØÌú·¹«Ë¾Ôâµ½AkiraµÄ¹¥»÷85GBÊý¾Ýй¶


ýÌå8ÔÂ12Èճƣ¬£¬£¬£¬£¬Ö¥¼Ó¸ç±´¶ûÌØÌú·¹«Ë¾³ÆÆäÕýÔÚÊÓ²ìÀÕË÷¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÉÃÀ¹úºÍ¼ÓÄôóµÄÁù¼ÒÌú·¹«Ë¾ÅäºÏÓµÓУ¬£¬£¬£¬£¬Ã¿¼ÒÌú·¹«Ë¾¶¼Ê¹Óøù«Ë¾µÄתÔ˺ͻ»³ËÉèÊ©£¬£¬£¬£¬£¬ÊÇÃÀ¹ú×î´óµÄÖÐÐÄ»»³ËÖÕµãÕ¾Ìú·¡£¡£¡£¡£¡£¡£8ÔÂ10ÈÕ£¬£¬£¬£¬£¬Akira½«¸Ã¹«Ë¾Ìí¼Óµ½ÆäÍøÕ¾£¬£¬£¬£¬£¬²¢ÌåÏÖÒÑ»ñÈ¡85 GBÊý¾Ý¡£¡£¡£¡£¡£¡£½²»°È˳Æ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢Î´Ó°Ï칫˾µÄÔËÓª¡£¡£¡£¡£¡£¡£È¥Ä꣬£¬£¬£¬£¬¶à¼ÒÌú·¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÃÀ¹úTSAÊÔͼ¶ÔÌú·µÈÖ÷Òª»ù´¡ÉèÊ©½ÓÄɸüǿӲµÄ²½·¥¡£¡£¡£¡£¡£¡£


https://therecord.media/belt-railway-chicago-ransomware-data-theft-akira


5¡¢Ñо¿Ö°Ô±¹ûÕæÕë¶ÔBarracuda ESGµÄкóÃÅWhirlpool


8ÔÂ10ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬CISAÔÚÕë¶ÔBarracuda ESG×°±¸µÄ¹¥»÷»î¶¯Öз¢Ã÷ÁËÒ»¸öÃûΪWhirlpoolµÄкóÃÅ¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö32λELFÎļþ£¬£¬£¬£¬£¬´ÓÄ£¿£¿£¿éÖлñÈ¡Á½¸ö²ÎÊý£¨C2 IPºÍ¶Ë¿ÚºÅ£©À´½¨Éè´«Êä²ãÇå¾²(TLS)·´Ïòshell¡£¡£¡£¡£¡£¡£WhirlpoolÊÇÔÚÕë¶ÔBarracuda ESGµÄ¹¥»÷»î¶¯Öз¢Ã÷µÄµÚ3¸öºóÃÅ£¬£¬£¬£¬£¬ÁíÍâÁ½¸öÊÇSeaSpyºÍSubmarine¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËÏÂÁî×¢ÈëÎó²î(CVE-2023-2868)£¬£¬£¬£¬£¬¸Ã¹«Ë¾Í¨¹ýÌæ»»×°±¸À´ÐÞ¸´ËüÃÇ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/149392/hacking/whirlpool-backdoor-barracuda-esg-attacks.html


6¡¢ZscalerÐû²¼Ð¶ñÒâÈí¼þStatc StealerµÄÆÊÎö±¨¸æ


8ÔÂ8ÈÕ£¬£¬£¬£¬£¬ZscalerÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þStatc StealerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¿ÉÒÔ´ÓWindows×°±¸ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£ËüÊÇÓÉC++¿ª·¢µÄ£¬£¬£¬£¬£¬Ö§³ÖÎļþÃû²î±ð¼ì²éÒÔÈÆ¹ýɳÏäºÍÄæÏò¹¤³ÌµÄÆÊÎö¡£¡£¡£¡£¡£¡£Ñ¬È¾Á´Ê¼ÓÚαÔìµÄ¹È¸è¹ã¸æ£¬£¬£¬£¬£¬»áÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤ºÍÃÜÂ룬£¬£¬£¬£¬ÉõÖÁ°üÀ¨TelegramµÈÐÂÎÅÓ¦ÓóÌÐòµÄÊý¾Ý¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬Ê¹ÓÃHTTPSЭÒ齫ÇÔÈ¡µÄ¼ÓÃÜÊý¾Ý·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/statc-stealer-decoding-elusive-malware-threat