ŦԼ½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2022-09-201¡¢Å¦Ô¼½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÉÌEmpress EMSÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå9ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î»ÓÚŦԼµÄ½ôÆÈÏìÓ¦ºÍ¾È»¤³µÐ§ÀÍÌṩÉÌEmpress EMS£¨½ôÆÈÒ½ÁÆÐ§ÀÍ£©Åû¶ÁËÒ»Æð¿Í»§ÐÅϢй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ7ÔÂ14ÈÕÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ5ÔÂ26ÈÕ»ñµÃÁ˶Ըù«Ë¾ÏµÍ³µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬ÔÚÔ¼Ò»¸ö°ëÔº󣬣¬£¬£¬£¬£¬£¬¼´7ÔÂ13ÈÕÇÔÈ¡ÁËһС²¿·ÖÎļþ¡£¡£¡£¡£¡£¡£Empress EMSÕýÔÚ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬²¢ÎªÇкÏÌõ¼þµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾Ã»ÓÐÌá¼°¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬£¬£¬£¬µ«Ðí¶àÖ¤¾Ý¾ùÖ¸ÏòHive¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
2¡¢ÃÀ¹úº½¿Õ¹«Ë¾³ÆÆä²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕË»§±»ÈëÇÖ
ýÌå9ÔÂ19Èճƣ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËÃÀ¹úº½¿Õ¹«Ë¾²¿·ÖÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬£¬²¢»ñµÃÁËСÎÒ˽¼ÒÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ7ÔÂ5ÈÕ·¢Ã÷ÁËÕâÒ»ÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ö®ºóÁ¬Ã¦±£»£»£»£»£»£»¤ÁËÊÊÓõÄÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÁ˵ÚÈý·½Ç徲ȡ֤¹«Ë¾¾ÙÐÐÊӲ죬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÊÂÎñµÄÐÔ×Ӻ͹æÄ£¡£¡£¡£¡£¡£¡£¸Ãº½¿Õ¹«Ë¾¾Ü¾øÍ¸Â¶ÊÜÓ°Ïì¿Í»§ºÍÔ±¹¤µÄÊýÄ¿£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÕâÊÇÒ»¸öºÜÊÇСµÄÊý×Ö£¬£¬£¬£¬£¬£¬£¬ÇÒûÓÐÊý¾Ý±»ÀÄÓ㬣¬£¬£¬£¬£¬£¬ËûÃÇ»¹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁ½ÄêÃâ·ÑµÄExperian IdentityWorks»áÔ±¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-airlines-discloses-data-breach-after-employee-email-compromise/
3¡¢CISAºÍNSAÐû²¼¿ª·ÅÎÞÏßµç½ÓÈëÍøÂçÇå¾²µÄ×¢ÖØÊÂÏî
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬CISAºÍNSAÐû²¼ÁË¿ª·ÅÎÞÏßµç½ÓÈëÍøÂ磨Open RAN£©Çå¾²µÄ×¢ÖØÊÂÏî¡£¡£¡£¡£¡£¡£Open RANÊǹŰåRAN¼Ü¹¹ÑݱäΪ¿ª·Å»¥²Ù×÷½Ó¿Ú¡¢ÐéÄ⻯¡¢´óÊý¾ÝºÍÖ§³ÖÈ˹¤ÖÇÄܵÄÖÇÄܵÄÐÐÒµÊõÓ£¬£¬£¬£¬£¬£¬Open RAN¼Ü¹¹·¿ªÁËÔÆºÍÐéÄ⻯µÄ´óÃÅ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ý½¨Éè¶à¹©Ó¦ÉÌÉú̬ϵͳÀ´Ôö½ø¾ºÕù¼Ó¾ç¡¢¹©Ó¦É̶àÑùÐÔºÍÁ¢Òì¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÆÀ¹ÀÁËÓëʵÑ鿪·ÅRAN¼Ü¹¹Ïà¹ØµÄÀûÒæºÍÇå¾²×¢ÖØÊÂÏ£¬£¬£¬£¬£¬£¬CISAÃãÀøÓû§¡¢ÍøÂçÔËÓªÉÌ¡¢¹©Ó¦É̺ÍÀûÒæÏà¹ØÕßÉó²éÕâÐ©×¢ÖØÊÂÏî¡£¡£¡£¡£¡£¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-and-nsa-publish-open-radio-access-network-security
4¡¢ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾µÄ¹¥»÷ÈÏÕæ
¾Ý9ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïHiveÉù³Æ¶ÔBell¼ÓÄôó×Ó¹«Ë¾BellÊÖÒÕ½â¾ö¼Æ»®(BTS)ϵͳµÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£BTSÊÇÒ»¼ÒÓµÓÐ4500¶àÃûÔ±¹¤µÄ×ÔÁ¦×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬×¨ÃÅΪ°²¼òªʡºÍ¿ý±±¿ËÊ¡µÄסլºÍСÐÍÆóÒµ¿Í»§×°ÖÃBellЧÀÍ¡£¡£¡£¡£¡£¡£Õâ¼ÒµçÐŹ«Ë¾Ã»ÓÐ͸¶¹¥»÷±¬·¢µÄʱ¼ä£¬£¬£¬£¬£¬£¬£¬µ«HiveÔÚÆäÍøÕ¾ÖÐÌåÏÖÔÚÔ¼Ò»¸öÔÂǰ£¬£¬£¬£¬£¬£¬£¬¼´8ÔÂ20ÈÕ¼ÓÃÜÁËBTSµÄϵͳ¡£¡£¡£¡£¡£¡£BTSµÄÍøÕ¾ÏÖÔÚÈÔÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬£¬²¿·Ö¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ÐÅϢй¶¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
5¡¢Kaspersky³ÆÐ¶ñÒâÈí¼þ°üͨ¹ýYouTubeÊÓÆµ×ÔÎÒÈö²¥
KasperskyÔÚ9ÔÂ15ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬Ò»¸öеĶñÒâÈí¼þ°üʹÓñ»¹¥»÷µÄYouTubeƵµÀÉÏ´«¶ñÒâÊÓÆµ½Ì³Ì×ÔÎÒÈö²¥¡£¡£¡£¡£¡£¡£ÕâЩÊÓÆµÍ¨³£°üÀ¨ÏÂÔØ¼ÙµÄÆÆ½âºÍ×÷±×Èí¼þµÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖÃ×ÔÎÒÈö²¥µÄ¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔFIFA¡¢×îÖÕÀíÏë¡¢¼«ÏÞ¾ºËÙµØÆ½Ïß¡¢ÀÖ¸ßÐÇÇò´óÕ½ºÍÖ©ÖëÏÀµÈÓÎÏ·µÄ·ÛË¿¡£¡£¡£¡£¡£¡£Ôʼ°üÊÇÒ»¸ö×Ô½âѹRAR´æµµ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ðí¶à¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£½âѹºó»áÔËÐÐÈý¸ö¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬»®·ÖΪRedLineÇÔÈ¡³ÌÐò¡¢¿ó¹¤ºÍÅú´¦Öóͷ£Îļþ¡£¡£¡£¡£¡£¡£
https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
6¡¢AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
9ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬AquaSecÐû²¼¹ØÓÚTeamTNTµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£×Ô9Ô³õÒÔÀ´£¬£¬£¬£¬£¬£¬£¬AquaSecÔÚÃÛ¹ÞÉÏ·¢Ã÷ÁËTeamTNT»î¶¯µÄ¼£Ï󣬣¬£¬£¬£¬£¬£¬²¢ÏàПúڿÍ×éÖ¯ÓÖ×îÏÈÐж¯ÁË¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚTeamTNTÐÂÒ»ÂֵĻÖÐÊӲ쵽ÁËÈýÖÖ¹¥»÷ÀàÐÍ£ºKangaroo¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ê¹Óñ»Ð®ÖÆÐ§ÀÍÆ÷µÄÅÌËãÄÜÁ¦À´ÔËÐÐPollardµÄKangaroo WIFÇó½âÆ÷£»£»£»£»£»£»Cronb¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁ˾ɵÄrootkitºÍcron jobsµÈÊÖÒÕ£»£»£»£»£»£»What Will Be¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õë¶ÔDockerÊØ»¤Àú³Ì£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃshellÎļþÔٴηַ¢AlpineÓ³Ïñ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÎó²î´ÓÈÝÆ÷ÌÓÒݵ½Ö÷»ú¡£¡£¡£¡£¡£¡£
https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt


¾©¹«Íø°²±¸11010802024551ºÅ