Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶

Ðû²¼Ê±¼ä 2023-09-15

1¡¢Rollbar¹«Ë¾µÄϵͳÔâµ½¹¥»÷µ¼Ö¿ͻ§µÄ»á¼ûÁîÅÆÐ¹Â¶


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬Èí¼þBug¸ú×Ù¹«Ë¾RollbarµÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÊý¾Ýй¶ ¡£¡£¡£RollbarÓÚ9ÔÂ6ÈÕÔÚÉó²éÊý¾Ý¿âÈÕ־ʱ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬£¬£¬£¬£¬¸ÃÈÕÖ¾ÏÔʾЧÀÍÕÊ»§±»ÓÃÀ´µÇ¼»ùÓÚÔÆµÄBug¼à¿ØÆ½Ì¨ ¡£¡£¡£ºóÐøÊӲ췢Ã÷£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ8ÔÂ9ÈÕÖÁ8ÔÂ11ÈÕ»á¼ûÁËÆäϵͳ£¬£¬£¬£¬£¬Éæ¼°Ãô¸ÐµÄ¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÓû§Ãû¡¢ÓʼþµØµã¡¢ÕÊ»§ÃûºÍÏîÄ¿ÐÅÏ¢µÈ ¡£¡£¡£¸üÖ÷ÒªµÄÊÇ£¬£¬£¬£¬£¬¹¥»÷Õß»¹¼ìË÷Á˿ͻ§ÓëRollbarÏîÄ¿½»»¥µÄÏîÄ¿»á¼ûÁîÅÆ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/rollbar-discloses-data-breach-after-hackers-stole-access-tokens/


2¡¢Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯¾Ö(GMP)͸¶²¿·ÖÔ±¹¤µÄÐÅϢй¶


ýÌå9ÔÂ14Èճƣ¬£¬£¬£¬£¬Ó¢¹ú´óÂü³¹Ë¹Ìؾ¯Ô±¾Ö(GMP)²¿·ÖÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊǵÚÈý·½¹©Ó¦ÉÌÔâµ½ÀÕË÷¹¥»÷ ¡£¡£¡£Ðû²¼µÄÉùÃ÷ÖÐδÌá¼°±»¹¥»÷¹«Ë¾µÄÃû³Æ£¬£¬£¬£¬£¬µ«ËüÊÇGMPµÈÓ¢¹úÆäËü»ú¹¹µÄЧÀ͹©Ó¦ÉÌ ¡£¡£¡£GMP³ÆÔ±¹¤µÄ²ÆÎñÐÅÏ¢²¢Î´Ð¹Â¶ ¡£¡£¡£Ô¼Ò»¸öÔÂǰ£¬£¬£¬£¬£¬±±°®¶ûÀ¼¾¯¾Ö(PSNI)Ò²±¬·¢ÁËÒ»ÆðÀàËÆµÄÊÂÎñ£¬£¬£¬£¬£¬Ð¹Â¶ÁË10000¶àÃû¾¯Ô±µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡¢¾üÏκÍλÖà ¡£¡£¡£


https://securityaffairs.com/150828/data-breach/greater-manchester-police-gmp-data-breach.html


3¡¢SymantecÔÚ×°ÖÃLockBitʧ°ÜµÄ¹¥»÷Öз¢Ã÷еÄ3AM


9ÔÂ13ÈÕ£¬£¬£¬£¬£¬Symantec³ÆÆä·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þ3AM ¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬Ê¹ÓÃ3AMµÄ¹¥»÷»î¶¯ºÜÉÙ¼û£¬£¬£¬£¬£¬Æù½ñΪֹ½öÔÚ¹¥»÷ÕßδÄÜ×°ÖÃLockBitµÄÒ»´Î¹¥»÷»î¶¯Öз¢Ã÷¹ý¸Ã¶ñÒâÈí¼þµÄ·Ö·¢ ¡£¡£¡£3AMÓÉRust¿ª·¢£¬£¬£¬£¬£¬ÔÚ×îÏȼÓÃÜ֮ǰ£¬£¬£¬£¬£¬Ëü»áʵÑé×èÖ¹¶à¸öЧÀÍ£¬£¬£¬£¬£¬Íê³É¼ÓÃܺó»áɾ³ý¾íÓ°(VSS)¸±±¾ ¡£¡£¡£ÆäΪ¼ÓÃÜÎļþ¸½¼ÓµÄÀ©Õ¹ÃûÊÇ.Threeamtime£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÉÐδȷ¶¨3AM±³ºóµÄ¹¥»÷ÕßÊÇ·ñÓëÒÑÖªµÄ¹¥»÷ÍÅ»ïÓйØÁª ¡£¡£¡£ 


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit


4¡¢TrendMicroÏêÊöRedLineºÍVidarÊÇÔõÑùʹÓÃEVÖ¤Êé


TrendMicroÔÚ9ÔÂ13ÈÕÏêÊöÁËRedLineºÍVidarµÄ¹¥»÷ÕßÔõÑùʹÓôøÓÐÀ©Õ¹ÑéÖ¤(EV)´úÂëÊðÃûµÄÖ¤Êé ¡£¡£¡£×îÐÂÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬RedLineºÍVidar±³ºóµÄ¹¥»÷Õß×îÏÈʹÓÃÓëÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐòÏàͬµÄ·½·¨À´·Ö·¢ÀÕË÷Èí¼þpayload ¡£¡£¡£ÔÚÕâÒ»ÌØÊâ°¸ÀýÖУ¬£¬£¬£¬£¬Ä¿µÄ×î³õÊÕµ½µÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´øÓÐÀ©Õ¹ÑéÖ¤£¨EV£©´úÂëÊðÃûÖ¤Ê飬£¬£¬£¬£¬²»¾ÃºóËûÃÇ×îÏÈͨ¹ýͬÑùµÄ;¾¶ÊÕµ½ÁËÀÕË÷Èí¼þpayload ¡£¡£¡£Ö»¹ÜCABFʵÑéÁ˸üÑÏ¿áµÄÇå¾²²½·¥£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÄÜÈö²¥Ê¹ÓÃEVÖ¤Êé¾ÙÐÐÊðÃûµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ ¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/i/redline-vidar-first-abuses-ev-certificates.html 


5¡¢Î¢ÈíÌáÐÑStorm-0324½üÆÚʹÓÃMS TeamsµÄ´¹ÂÚ¹¥»÷


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬Î¢ÈíÌáÐÑÖ÷ÒªÓëÀÕË÷ÍÅ»ïÏàÖúµÄStorm-0324×î½üת¶øÊ¹ÓÃMicrosoft Teams´¹ÂÚ¹¥»÷À´ÈëÇÖÆóÒµÍøÂç ¡£¡£¡£´Ó7Ô·Ý×îÏÈ£¬£¬£¬£¬£¬Storm-0324±»·¢Ã÷ʹÓÃTeams·¢ËÍ´¹ÂÚÓÕ¶ü£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâSharePointÍйÜÎļþµÄÁ´½Ó ¡£¡£¡£¹ØÓڴ˻£¬£¬£¬£¬£¬¸ÃÍÅ»ï×îÓпÉÄÜÒÀÀµÓÚÃûΪTeamsPhisherµÄ¿ªÔ´¹¤¾ß ¡£¡£¡£¸Ã¹¤¾ßÄܹ»Èƹý¶ÔÀ´×ÔÍⲿÓû§µÄ´«ÈëÎļþµÄÏÞÖÆ£¬£¬£¬£¬£¬²¢ÏòTeamsÓû§·¢ËÍ´¹ÂÚ¸½¼þ ¡£¡£¡£Î¢ÈíÌåÏÖºÜÊÇÖØÊÓÕâЩ´¹Âڻ£¬£¬£¬£¬£¬²¢ÍƳöÁ˶àÏîˢв½·¥£¬£¬£¬£¬£¬ÒÔ¸üºÃµØ·ÀÓùÕâЩ¹¥»÷ ¡£¡£¡£ 


https://thehackernews.com/2023/09/microsoft-warns-of-new-phishing.html


6¡¢KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄ±¨¸æ


9ÔÂ13ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼2023ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄͳ¼Æ±¨¸æ ¡£¡£¡£2023ÄêÉϰëÄ꣬£¬£¬£¬£¬±»×èµ²¶ñÒ⹤¾ßµÄICSÅÌËã»ú±ÈÀý½Ï2022ÄêϰëÄêϽµÁË0.3¸ö°Ù·Öµã£¬£¬£¬£¬£¬½µÖÁ34% ¡£¡£¡£´ÓµØÀíλÖÃÀ´¿´£¬£¬£¬£¬£¬·ÇÖÞÔâµ½¹¥»÷µÄICSÅÌËã»ú×î¶à£¨Õ¼±È40.3%£©£¬£¬£¬£¬£¬¶ø±±Å·×îÉÙ£¨14.7%£© ¡£¡£¡£¹¤³ÌºÍICS¼¯³É£¨ÔöÌí2%£©¡¢ÖÆÔ죨ÔöÌí1.9%£©ºÍÄÜÔ´£¨ÔöÌí1.5%£©ÁìÓòÔâµ½¹¥»÷µÄICSÅÌËã»úÓÐËùÔöÌí ¡£¡£¡£»£»£»£»£»£»¥ÁªÍø¡¢µç×ÓÓʼþ¿Í»§¶ËºÍ¿ÉÒÆ¶¯×°±¸ÈÔÈ»ÊÇ×éÖ¯ÔËÓªÊÖÒÕ»ù´¡ÉèÊ©ÖÐÅÌËã»úµÄÖ÷ÒªÍþвȪԴ ¡£¡£¡£


https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/110605/