°Ä½ðÈÚ¹«Ë¾Latitude Finance 1400ÍòÌõ¿Í»§¼Í¼й¶
Ðû²¼Ê±¼ä 2023-03-271¡¢°Ä½ðÈÚ¹«Ë¾Latitude Finance 1400ÍòÌõ¿Í»§¼Í¼й¶
¾ÝýÌå3ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬°Ä½ðÈÚ¹«Ë¾Latitude Finance¸üÐÂÁËÊý¾Ýй¶֪ͨ£¬£¬£¬£¬Í¸Â¶ÊܸÃÊÂÎñÓ°ÏìµÄÈËÊýÔöÌíµ½ÁË1400ÍòÈË¡£¡£¡£¡£¡£¡£3ÔÂ16ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾Åû¶ÁËÒ»Æð¹¥»÷ÊÂÎñ£¬£¬£¬£¬³ÆºÚ¿ÍÁËÈëÇÖÁËÆäÁ½¼ÒЧÀÍÌṩÉ̵Äϵͳ²¢»á¼ûÁËÔ¼328000Ìõ¿Í»§¼Í¼¡£¡£¡£¡£¡£¡£Ëæ×ŽøÒ»³ÌÐò²é£¬£¬£¬£¬·¢Ã÷¸ÃÊÂÎñµÄÓ°ÏìÒª´óµÃ¶à¡£¡£¡£¡£¡£¡£Ô¼790Íò¸ö°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄ¼ÝÕÕºÅÂëй¶£¬£¬£¬£¬ÆäÖÐ40%ÊÇÔÚÒÑÍù10ÄêÄÚÌá½»¸ø¸Ã¹«Ë¾µÄ¡£¡£¡£¡£¡£¡£×·ËÝÖÁ2005ÄêµÄÁíÍâ610ÍòÌõ¼Í¼ҲÒÑй¶£¬£¬£¬£¬ÆäÖÐ94%ÊÇÔÚ2013ÄêÖ®Ìõ¼þ½»µÄ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/latitude-financial-admits-breach/
2¡¢IEEE 802.11 WiFi±ê×¼ÖпÉÓÃÀ´Ð®ÖÆÍøÂçÁ÷Á¿µÄÎó²î
¾Ý3ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚIEEE 802.11 WiFiÐÒé±ê×¼µÄÉè¼ÆÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬¿É±»ÓÃÀ´Ð®ÖÆÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£¡£¸Ã±ê×¼°üÀ¨Ê¡µç»úÖÆ£¬£¬£¬£¬µ±¿Í»§¶ËÕ¾½øÈë˯Ãßģʽʱ»áÏò½ÓÈëµã·¢ËÍÒ»¸ö°üÀ¨½ÚÄÜλµÄÖ¡£¬£¬£¬£¬Ö®ºóËùÓз¢ÍùËüµÄÖ¡¶¼»áÅŶӡ£¡£¡£¡£¡£¡£¿¢ÊÂÐÝÃߺó½ÓÈëµã¾Í»á½«»º³åµÄÖ¡È¡³ö£¬£¬£¬£¬Ó¦ÓüÓÃÜ£¬£¬£¬£¬²¢½«ËüÃÇ´«Ê䵽ĿµÄµØ¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÓկװ±¸µÄMACµØµãÏò½ÓÈëµã·¢½ÚÄÜÖ¡£¬£¬£¬£¬È»ºó·¢ËͽÐÐÑÖ¡À´¼ìË÷Ö¡¿ÍÕ»¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¿ª·¢ÁË×Ô½ç˵¹¤¾ßMacStealer£¬£¬£¬£¬¿É²âÊÔWiFiÍøÂçµÄ¿Í»§¶Ë¸ôÀëÈÆ¹ý£¬£¬£¬£¬²¢ÔÚMAC²ã×èµ²·¢ÍùÆäËû¿Í»§¶ËµÄÁ÷Á¿¡£¡£¡£¡£¡£¡£CiscoÈÏ¿ÉÆä²úÆ·ÊܸÃÎó²îµÄÓ°Ïì¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic/
3¡¢Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Á½¸öIcedIDбäÌåLiteºÍForked
ýÌå3ÔÂ27Èճƣ¬£¬£¬£¬IcedIDбäÌåûÓг£¼ûµÄÍøÉÏÒøÐÐڲƹ¦Ð§£¬£¬£¬£¬¶øÊÇרעÓÚÔÚÄ¿µÄϵͳÉÏ×°Öøü¶à¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ProofpointÒÑ·¢Ã÷ÁËIcedIDµÄÁ½¸öбäÌ壬£¬£¬£¬¼´Lite£¨Ê״ηºÆðÓÚ2022Äê11Ô£©ºÍForked£¨Ê״ηºÆðÓÚ2023Äê2Ô£©¡£¡£¡£¡£¡£¡£ForkedÓëStandard°æÄÚÇéËÆ£¬£¬£¬£¬µ«ÆäʹÓòî±ðµÄÎļþÀàÐÍ£¨COM Server£©£¬£¬£¬£¬²¢¾ßÓÐÌØÁíÍâÓòºÍ×Ö·û´®½âÃÜ´úÂë¡£¡£¡£¡£¡£¡£LiteÖ»ÓÐ20KB£¬£¬£¬£¬²¢ÇÒ²»»á½«Ö÷»úÐÅÏ¢´«Êäµ½C2£¬£¬£¬£¬ÓÉÓÚËüÊÇÓëEmotetÒ»Æð·Ö·¢µÄ£¬£¬£¬£¬¶øEmotetÒѾ¶Ô±»ÈëÇÖµÄϵͳ¾ÙÐÐÁËÆÊÎö¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/
4¡¢ÃÀ¹úÂÉËùHPMBÒòй¶Áè¼Ý11ÍòÈËÐÅÏ¢±»·£¿£¿£¿£¿£¿£¿î20ÍòÃÀÔª
3ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÃÀ¹úÂÉËùHeidell,Pittoni,Murphy & Bach(HPMB)ÒòδÄܱ£»£»£»£»£»¤¹«ÃñµÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢£¬£¬£¬£¬±»Å¦Ô¼Õþ¸®·£¿£¿£¿£¿£¿£¿î20ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬2021Äê11Ô¹¥»÷ÕßʹÓÃHPMBµÄExchangeЧÀÍÆ÷ÖеÄÎó²î»á¼ûÁËÆäϵͳ£¬£¬£¬£¬´Ëǰ΢ÈíÒÑÐû²¼Õë¶Ô¸ÃÎó²îµÄ²¹¶¡µ«HPMBδӦÓᣡ£¡£¡£¡£¡£2021Äê12Ô£¬£¬£¬£¬¹¥»÷Õß×°ÖÃÁËÀÕË÷Èí¼þLockBit²¢ÇÔÈ¡ÁË114979È˵ÄÐÅÏ¢¡£¡£¡£¡£¡£¡£2022Äê5Ô£¬£¬£¬£¬HPMB×îÏÈ֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£¡£¡£Å¦Ô¼Õþ¸®ÒÔΪ¸Ã¹«Ë¾Î¥·´ÁË¡¶¿µ½¡°ü¹ÜÁ÷ͨÓëÔðÈη¨°¸¡·(HIPAA)»®¶¨µÄÊý¾Ý±£»£»£»£»£»¤±ê×¼£¬£¬£¬£¬³ýÁË20ÍòÃÀÔª·£¿£¿£¿£¿£¿£¿îÍ⻹ÐèÔöÇ¿ÆäÍøÂçÇå¾²²½·¥¡£¡£¡£¡£¡£¡£
https://therecord.media/new-york-law-firm-hpmb-fined-data-breach-ransomware
5¡¢Check PointÅû¶ÇÔÈ¡³ÌÐòRhadamanthysµÄÊÖÒÕϸ½Ú
Check PointÓÚ3ÔÂ27ÈÕÅû¶Á˶ñÒâÈí¼þRhadamanthysµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£RhadamanthysÊÇÒ»Öָ߼¶µÄÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬ÓÚÈ¥Äê9ÔÂÊ×´ÎÔÚ°µÍøÉÏ·ºÆð¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ°üÀ¨Á˾¡¿ÉÄܶàµÄ¹¦Ð§£¬£¬£¬£¬ÀýÈçÇÔȡĿµÄϵͳÐÅÏ¢¡¢FTP¿Í»§¶Ëƾ֤¡¢Óʼþ¿Í»§¶Ë¡¢2FAÓ¦ÓúÍÃÜÂëÖÎÀíÆ÷ƾ֤¡¢VPNЧÀÍÆ¾Ö¤ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°üµÈ¡£¡£¡£¡£¡£¡£Ä¬ÈÏÇéÐÎÏ£¬£¬£¬£¬²»Õë¶ÔÌØ¶¨¹ú¼ÒºÍµØÇø£¬£¬£¬£¬Ö»Òª²»Éæ¼°CIS¹ú¼Ò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ñо¿Ö°Ô±Ö÷ÒªÆÊÎöÁËÆäÆðÔ´Ö´ÐÐÁ÷³Ì¡¢ÏÖʵµÄÇÔÈ¡Âß¼ÒÔ¼°ÇÔÈ¡ChromeÐÅÏ¢µÄ¹¦Ð§¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2023/rhadamanthys-the-everything-bagel-infostealer/
6¡¢CybleÐû²¼Õë¶Ôº½ÌìºÍº½¿ÕÐÐÒµ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
3ÔÂ27ÈÕ£¬£¬£¬£¬CybleÐû²¼ÁËÕë¶Ôº½ÌìºÍº½¿ÕÐÐÒµ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬½üÆÚÕë¶ÔÖ±½ÓºÍ¼ä½ÓÓ뺽ÌìºÍº½¿ÕÐÐÒµ´ò½»µÀµÄ×éÖ¯µÄÀÕË÷¹¥»÷ÕýÔÚÔöÌí¡£¡£¡£¡£¡£¡£3ÔÂ14ÈÕ£¬£¬£¬£¬GhostSecÐû²¼ÁËÆä¹¥»÷È«Çòµ¼º½ÎÀÐÇϵͳ(GNSS)ÎüÊÕÆ÷µÄÏà¹ØÍÆÎÄ¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬CybleÊӲ췢Ã÷¶à¸ö¹©Ó¦ÉÌÌṩµÄGNSSÎüÊÕÆ÷̻¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬£¬ÇÒGNSSϵͳ±£´æ¶à¸öÎó²î¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÀÕË÷Èí¼þ¶Ôº½ÌìÐÐÒµµÄÍþвԽÀ´Ô½´ó£¬£¬£¬£¬LockbitÔø¹¥»÷Á˶à¸öÓë¸ÃÐÐÒµÏà¹ØµÄ×éÖ¯¡£¡£¡£¡£¡£¡£
https://blog.cyble.com/2023/03/27/ghostsec-targeting-satellite-receivers/


¾©¹«Íø°²±¸11010802024551ºÅ