΢ÈíÐû²¼3Ô¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓÃÎó²îÔÚÄÚµÄ83¸öÎó²î

Ðû²¼Ê±¼ä 2023-03-15

1¡¢Î¢ÈíÐû²¼3Ô¸üÐÂÐÞ¸´Á½¸öÒѱ»Ê¹ÓÃÎó²îÔÚÄÚµÄ83¸öÎó²î


3ÔÂ14ÈÕ £¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼2023Äê3ÔµÄÖܶþ²¹¶¡ £¬£¬£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨Á½¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ83¸öÎó²î £¬£¬£¬£¬£¬£¬´Ë¼ÆÊý²»°üÀ¨21¸öMicrosoft EdgeÎó²î¡£¡£¡£Òѱ»Ê¹ÓõÄÎó²î»®·ÖΪMicrosoft OutlookȨÏÞÌáÉýÎó²î£¨CVE-2023-23397£©ºÍWindows SmartScreenÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-24880£©¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬½ÏΪÑÏÖØµÄÎó²î°üÀ¨»¥ÁªÍø¿ØÖÆÐÂÎÅЭÒé(ICMP)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-23415£©ºÍWindows Hyper-V¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2023-23411£©µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws/


2¡¢Euler FinanceÔâµ½ÉÁµç´û¹¥»÷Ëðʧ¸ß´ï1.96ÒÚÃÀÔª


¾ÝýÌå3ÔÂ13ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬Euler FinanceÔâµ½ÉÁµç´û¹¥»÷ £¬£¬£¬£¬£¬£¬ËðʧÁ˼ÛÖµ1.97ÒÚÃÀÔªµÄ¶àÖÖÊý×Ö×ʲú¡£¡£¡£Ñо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÉÁ´æ´û¿î´ÓDe-FiЭÒéAaveºÍBalancerÆò´û £¬£¬£¬£¬£¬£¬²¢½«Ç®´æÈëEuler¡£¡£¡£È»ºó £¬£¬£¬£¬£¬£¬¹¥»÷Õß½èÁËÊ®±¶ÓÚÆä´æÈëEulerµÄ½ð¶î¡£¡£¡£¹¥»÷ÕßÈëÇÖÖÇÄܺÏÔ¼²¢±£´æÆò´û¼òÖ±ÇÐÊֶλòÎó²î²¢²»ÇåÎú £¬£¬£¬£¬£¬£¬Ò²²»ÇåÎú¹¥»÷ÊÇ·ñÒѾ­¿¢Ê¡£¡£¡£Elliptic±¨¸æ³Æ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾ­ÔÚͨ¹ýTornado CashÏ´Ç®¡£¡£¡£Õâ´Î¹¥»÷µ¼ÖÂEuler(EUL)´ú±Ò¼ÛÖµÒ»Ò¹Ö®¼äϵøÁË44.2% £¬£¬£¬£¬£¬£¬´Ó6.56ÃÀÔªµøÖÁ3.37ÃÀÔª¡£¡£¡£


https://www.securityweek.com/euler-loses-nearly-200-million-to-flash-loan-attack/


3¡¢Î¢Èí¹ûÕæ¹ØÓÚDEV-1101¼°ÆäÏà¹ØAiTM»î¶¯µÄÏêϸÐÅÏ¢


΢ÈíÔÚ3ÔÂ13ÈÕ¹ûÕæÁ˹ØÓÚDEV-1101¼°ÆäÏà¹ØAiTM»î¶¯µÄÏêϸÐÅÏ¢¡£¡£¡£DEV-1101ÊÇ΢Èí¸ú×ٵĹ¥»÷Õß £¬£¬£¬£¬£¬£¬ÈÏÕæ¿ª·¢¡¢Ö§³ÖºÍÐû´«¶à¸öAiTMÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£¸ÃÍÅ»ïÓÚ2022Äê×îÏÈÌṩËûÃǵÄAiTM´¹ÂÚ¹¤¾ß°ü £¬£¬£¬£¬£¬£¬ÒÔºó¶ÔÆä¹¤¾ß°ü¾ÙÐÐÁ˶àÏîˢР£¬£¬£¬£¬£¬£¬ÀýÈç´ÓÒÆ¶¯×°±¸ÖÎÀí»î¶¯µÄÄÜÁ¦ £¬£¬£¬£¬£¬£¬ÒÔ¼°CAPTCHAÒ³ÃæµÈÈÆ¹ý¹¦Ð§¡£¡£¡£Ñо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬ËäÈ»AiTM´¹ÂÚÊÔÍ¼ÈÆ¹ýMFA £¬£¬£¬£¬£¬£¬µ«MFAÈÔÈ»ÊÇÉí·ÝÇå¾²µÄÖ÷ÒªÖ§Öù £¬£¬£¬£¬£¬£¬²¢ÇÒÔÚ×èÖ¹ÖÖÖÖÍþв·½ÃæºÜÊÇÓÐÓᣡ£¡£


https://www.microsoft.com/en-us/security/blog/2023/03/13/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit/


4¡¢ÂåÉ¼í¶ºâÓîÖÎÀí¾ÖÅû¶LockBit¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ


¾Ý3ÔÂ13ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÂåÉ¼í¶ºâÓîÖÎÀí¾Ö£¨HACLA£©Åû¶ÁËLockBitÀÕË÷¹¥»÷µ¼ÖµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£Æ¾Ö¤Í¨Öª £¬£¬£¬£¬£¬£¬2022Äê12ÔÂ31ÈÕ £¬£¬£¬£¬£¬£¬HACLA·¢Ã÷ÆäϵͳÒѱ»¼ÓÃÜ £¬£¬£¬£¬£¬£¬ÆÈʹ¸Ã»ú¹¹µÄITÍŶӹرÕËùÓÐЧÀÍÆ÷²¢Õö¿ªÊӲ졣¡£¡£ÊÓ²ìÓÚ2023Äê2ÔÂ13ÈÕÍê³É £¬£¬£¬£¬£¬£¬ÏÔʾºÚ¿ÍÔÚ2022Äê1ÔÂ15ÈÕÖÁ12ÔÂ31ÈÕδ¾­ÊÚȨ»á¼ûÁËϵͳ¡£¡£¡£LockBit 3.0ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬²¢ÍþвҪÔÚ2023Äê1ÔÂ27ÈÕÐû²¼ËùÓÐÎļþ¡£¡£¡£ÕâÅúע̸ÅÐʧ°Ü £¬£¬£¬£¬£¬£¬¸Ã»ú¹¹¾Ü¾øÁ˺ڿ͵ÄÒªÇ󡣡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬LockBitÍøÕ¾ÉϵÄÏÂÔØÁ´½ÓÒÑʧЧ £¬£¬£¬£¬£¬£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉϼõÇáÁËÓ°Ïì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/la-housing-authority-discloses-data-breach-after-ransomware-attack/


5¡¢Dark PinkÕë¶Ô¶«ÄÏÑǵÄ×éÖ¯·Ö·¢¶ñÒâÈí¼þKamiKakaBot


3ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬EclecticIQ³ÆÆä·¢Ã÷Á˶à¸ö¶ñÒâÈí¼þKamiKakaBotÑù±¾ £¬£¬£¬£¬£¬£¬±»Dark Pink£¨ÓÖÃûSaaiwc£©ÓÃÀ´¹¥»÷¶«ÄÏÑǹú¼ÒµÄÕþ¸®»ú¹¹¡£¡£¡£×î½üµÄ¹¥»÷±¬·¢ÔÚ2023Äê2Ô £¬£¬£¬£¬£¬£¬Group-IBÓÚ1Ô·ÝÊ×´ÎÏêϸÏÈÈÝÁ˸ÃÍÅ»ïµÄ»î¶¯ £¬£¬£¬£¬£¬£¬Á½´Î»î¶¯µÄÇø±ðÊǹ¥»÷ÕßË¢ÐÂÁ˶ñÒâÈí¼þµÄ»ìÏý³ÌÐòÒÔ×èÖ¹±»·¢Ã÷¡£¡£¡£KamiKakaBotͨ¹ý°üÀ¨¶ñÒâISOÎļþµÄ´¹ÂÚÓʼþ¾ÙÐÐÈö²¥ £¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔÇÔÈ¡´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÊý¾Ý £¬£¬£¬£¬£¬£¬»¹Ö§³Ö¸üлúÖÆ £¬£¬£¬£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£


https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries


6¡¢Ñо¿Ö°Ô±·¢Ã÷Akuvox E11ÖÇÄܶԽ²»úÖеÄÊ®¶à¸öÎó²î


ýÌå3ÔÂ13ÈÕ±¨µÀ³Æ £¬£¬£¬£¬£¬£¬ ClarotyÑо¿Ö°Ô±·¢Ã÷Akuvox E11ÖÇÄܶԽ²»úÖеÄÊ®¶à¸öÎó²î¡£¡£¡£ÕâЩÎó²îÉæ¼°Èõ¼ÓÃÜ¡¢Ê¹ÓÃÓ²±àÂëÃÜÔ¿¡¢Ãô¸ÐÐÅϢ̻¶¡¢²»Çå¾²µÄÃÜÂë»Ö¸´»úÖÆºÍÏÂÁî×¢ÈëÎó²îµÈ¡£¡£¡£Ñо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÔ¶³ÌÖ´ÐдúÂë £¬£¬£¬£¬£¬£¬Ô¶³Ì¼¤»î×°±¸µÄÂó¿Ë·çºÍÉãÏñÍ·²¢½«Êý¾Ý´«Êäµ½Ô¶³ÌЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬²¢»ñÈ¡´æ´¢µÄͼÏñºÍ×°±¸²¶»ñµÄÊý¾Ý¡£¡£¡£AkuvoxÌåÏÖÍýÏëÐû²¼¹Ì¼þ¸üР£¬£¬£¬£¬£¬£¬ÒÔÔÚ2023Äê3ÔÂ20ÈÕ֮ǰÐÞ¸´ÕâЩÎó²î¡£¡£¡£


https://thehackernews.com/2023/03/researchers-uncover-over-dozen-security.html