Microsoft 365Ôٴα¬·¢Ð§ÀÍÖÐÖ¹Ö÷ÒªÓ°ÏìÎ÷Å·µØÇø

Ðû²¼Ê±¼ä 2023-05-24

1¡¢Microsoft 365Ôٴα¬·¢Ð§ÀÍÖÐÖ¹Ö÷ÒªÓ°ÏìÎ÷Å·µØÇø


¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ £¬£¬£¬ £¬£¬£¬£¬MicrosoftÕýÔÚÊÓ²ìÓû§ÎÞ·¨»á¼ûÆäMicrosoft 365ÕÊ»§ºÍÒÑ×°ÖÃÓ¦ÓóÌÐòµÄÎÊÌâ ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¿Í»§³ÆÔÚ»á¼ûOutlookÓÊÏäʱÓöµ½ÎÊÌâ £¬£¬£¬ £¬£¬£¬£¬²¢ÇÒÎÞ·¨ÅþÁ¬µ½Microsoft 365ЧÀÍÆ÷ ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚͨ¸æÖÐÌåÏÖ £¬£¬£¬ £¬£¬£¬£¬Ö÷Ó°ÏìÁ˱±ÃÀ¡¢²¨À¼ºÍÓ¢¹úµÄÓû§ £¬£¬£¬ £¬£¬£¬£¬µ«ÆäËüµØÇøµÄÓû§Ò²¿ÉÄÜÊܵ½Ó°Ïì ¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬ £¬£¬£¬£¬ÎÊÌâÒѾ­»ñµÃÏàʶ¾ö ¡£¡£¡£¡£¡£¡£ÉϸöÔ £¬£¬£¬ £¬£¬£¬£¬ÁíÒ»ÆðMicrosoft 365ЧÀÍÖÐÖ¹ÊÂÎñµ¼Ö±±ÃÀÓû§ÎÞ·¨»á¼ûExchange Online ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-hit-by-new-outage-causing-connectivity-issues/


2¡¢µÂ¹ú¾üÆ÷¹«Ë¾RheinmetallÔâµ½Black BastaµÄ¹¥»÷


¾Ý5ÔÂ23ÈÕ±¨µÀ £¬£¬£¬ £¬£¬£¬£¬µÂ¹úÆû³µºÍÎäÆ÷ÖÆÔìÉÌRheinmetall AG³Æ £¬£¬£¬ £¬£¬£¬£¬ËüÔâµ½ÁËBlackBastaµÄÀÕË÷¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÃñÓÃÓªÒµÊܵ½Ó°Ïì ¡£¡£¡£¡£¡£¡£5ÔÂ20ÈÕ £¬£¬£¬ £¬£¬£¬£¬BlackBastaÔÚÆäÍøÕ¾Ðû²¼ÁË´ÓRheinmetallÇÔÈ¡µÄÊý¾ÝÑù±¾ £¬£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨±£ÃÜЭÒé¡¢ÊÖÒÕʾÒâͼ¡¢»¤ÕÕɨÃè¼þºÍ²É¹º¶©µ¥µÈ ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Í¸Â¶ £¬£¬£¬ £¬£¬£¬£¬ËûÃÇÔÚ4ÔÂ14ÈÕ·¢Ã÷¹¥»÷»î¶¯ £¬£¬£¬ £¬£¬£¬£¬ÓÉÓÚ¼¯ÍÅÄÚ²¿µÄIT»ù´¡ÉèÊ©ÊÇÑÏ¿áÊèÉ¢µÄ £¬£¬£¬ £¬£¬£¬£¬Òò´ËÆä¾üÊÂӪҵδÊܵ½´Ë´Î¹¥»÷µÄÓ°Ïì ¡£¡£¡£¡£¡£¡£


https://therecord.media/rheinmetall-confirms-black-basta-ransomware-group-behind-cyberattack


3¡¢¿µ½¡°ü¹Ü¹«Ë¾Point32HealthÔâµ½ÀÕË÷¹¥»÷»¼ÕßÐÅϢй¶


ýÌå5ÔÂ23ÈÕ³Æ £¬£¬£¬ £¬£¬£¬£¬¿µ½¡°ü¹Ü¹«Ë¾Point32HealthÕýÔÚ֪ͨ»¼ÕßËûÃǵÄÐÅÏ¢¿ÉÄÜÒÑй¶ ¡£¡£¡£¡£¡£¡£Point32HealthÊÇTufts Health PlanºÍHarvard Pilgrim Health Careĸ¹«Ë¾ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßÔÚ3ÔÂ28ÈÕÖÁ4ÔÂ17ÈÕʱ´ú £¬£¬£¬ £¬£¬£¬£¬´ÓHarvard PilgrimµÄϵͳÖи´ÖƲ¢ÇÔÈ¡ÁËÊý¾Ý ¡£¡£¡£¡£¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬£¬£¬ £¬£¬£¬£¬Éв»È·¶¨Óм¸¶àÈËÊܵ½Ó°Ïì £¬£¬£¬ £¬£¬£¬£¬µ«¿ÉÄÜ»áÓ°Ïì´Ó2012Äê3ÔÂ28ÈÕÖÁ½ñ×¢²áµÄÓû§ ¡£¡£¡£¡£¡£¡£°ü¹Ü¹«Ë¾µÄ½²»°ÈËûÓÐ͸¶ÊÇ·ñ½»ÁËÊê½ð ¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/after-ransomware-attack-states-second-largest-health-insurer-says-patient-data-were-stolen/


4¡¢Trend MicroÅû¶BlackCat½üÆÚ¹¥»÷ÖÐÈÆ¹ý¼ì²âµÄÒªÁì


5ÔÂ22ÈÕ £¬£¬£¬ £¬£¬£¬£¬Trend MicroÅû¶ÁËBlackCatÔÚ½üÆÚµÄ¹¥»÷ÖÐʹÓÃÊðÃûµÄWindowsÄÚºËÇý¶¯³ÌÐòÀ´Èƹý¼ì²âµÄÒªÁì ¡£¡£¡£¡£¡£¡£¸ÃÇý¶¯³ÌÐòÊÇÈ¥ÄêÄêµ×Åû¶µÄ¶ñÒâÈí¼þPOORTRYµÄˢа汾 ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÊÔͼʹÓÃMicrosoft ÊðÃûµÄPOORTRYÇý¶¯³ÌÐò £¬£¬£¬ £¬£¬£¬£¬µ«ÆäÊðÃû±»×÷·Ïºó¼ì²âÂÊºÜ¸ß ¡£¡£¡£¡£¡£¡£Òò´Ë £¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÒ»¸öPOORTRYÄÚºËÇý¶¯µÄˢа汾 £¬£¬£¬ £¬£¬£¬£¬²¢Ê¹Óñ»µÁ»òй¶µÄ½»Ö¯ÊðÃûÖ¤Êé¾ÙÐÐÊðÃû ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬ £¬£¬£¬£¬¸ÃÇý¶¯³ÌÐòʹÓÃSafengine Protector v2.4.0.0¹¤¾ß¾ÙÐлìÏýÒÔÈÆ¹ý¾²Ì¬ÆÊÎö ¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html


5¡¢Fortinet·¢Ã÷Õë¶ÔÖж«µÄÐÂÄÚºËÇý¶¯³ÌÐòWINTAPIX


FortinetÔÚ5ÔÂ22ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÖж«¹ú¼ÒµÄÐÂÄÚºËÇý¶¯³ÌÐòWINTAPIX(WinTapix.sys) ¡£¡£¡£¡£¡£¡£Ò£²âÊý¾ÝÅú×¢ £¬£¬£¬ £¬£¬£¬£¬¸Ã»î¶¯Ö÷ÒªÕë¶ÔÉ³ÌØ°¢À­²®¡¢Ô¼µ©¡¢¿¨Ëþ¶ûºÍ°¢À­²®ÁªºÏÇõ³¤¹ú ¡£¡£¡£¡£¡£¡£WinTapix.sysʵÖÊÉÏÊÇÒ»¸ö¼ÓÔØ³ÌÐò £¬£¬£¬ £¬£¬£¬£¬Ö÷ҪĿµÄÊÇÌìÉúºÍÖ´ÐÐÏÂÒ»½×¶ÎµÄ¹¥»÷ ¡£¡£¡£¡£¡£¡£Ò»µ©±»¼ÓÔØµ½ÄÚºËÖÐ £¬£¬£¬ £¬£¬£¬£¬WinTapix.sys¾Í»á½«Ç¶Èëʽshellcode×¢Èëµ½Êʵ±µÄÓû§Ä£Ê½Àú³ÌÖÐ £¬£¬£¬ £¬£¬£¬£¬¶ø¸ÃÀú³ÌÓÖ»áÖ´ÐмÓÃܵÄ.NET payload ¡£¡£¡£¡£¡£¡£.NET¶ñÒâÈí¼þ¾ßÓкóÃźÍÊðÀí¹¦Ð§ £¬£¬£¬ £¬£¬£¬£¬¿ÉÒÔÖ´ÐÐÏÂÁî £¬£¬£¬ £¬£¬£¬£¬ÏºÍÉÏ´«Îļþ £¬£¬£¬ £¬£¬£¬£¬ÒÔ¼°³äµ±ÊðÀíÔÚÁ½¸öͨѶ¶ËµãÖ®¼äת´ïÊý¾Ý ¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/wintapix-kernal-driver-middle-east-countries


6¡¢Ñо¿ÍŶӳÆGUI-vilÍÅ»ïʹÓÃAWS EC2ʵÀýÀ´ÍÚ¿ó


5ÔÂ22ÈÕ £¬£¬£¬ £¬£¬£¬£¬Permiso P0 Labs³ÆÓ¡¶ÈÄáÎ÷ÑǺڿÍÍÅ»ïGUI-vilʹÓÃAWS EC2ʵÀýÀ´ÍÚ¿ó ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2021Äê11ÔÂÊ״α»¼ì²âµ½ £¬£¬£¬ £¬£¬£¬£¬×î½üÒ»´ÎµÄ»î¶¯±¬·¢ÔÚ½ñÄê4ÔÂ·Ý ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÆ«ºÃʹÓÃͼÐÎÓû§½çÃæ(GUI) ¹¤¾ß £¬£¬£¬ £¬£¬£¬£¬ÌØÊâÊǽϾɰ汾µÄS3ä¯ÀÀÆ÷ ¡£¡£¡£¡£¡£¡£GUI-vilÊ×ÏÈËÑË÷̻¶µÄAWSÃÜÔ¿ºÍɨÃè±£´æÎó²î£¨ÈçCVE-2021-22205£©µÄGitLabʵÀý £¬£¬£¬ £¬£¬£¬£¬À´»ñµÃ³õʼ»á¼ûȨÏÞ ¡£¡£¡£¡£¡£¡£ÀÖ³ÉÈëÇÖºóÊÇȨÏÞÌáÉýºÍÄÚ²¿Õì̽ £¬£¬£¬ £¬£¬£¬£¬ÆäÖ÷ҪʹÃüÊǽ¨ÉèEC2ʵÀý £¬£¬£¬ £¬£¬£¬£¬ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¿ó»î¶¯ ¡£¡£¡£¡£¡£¡£


https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/