MikroTik¹ûÕæDDoS½©Ê¬ÍøÂ磺Unit 42Ðû²¼ÒÔÂÃÓÎÖ÷ÌâµÄ´¹Âڻ

Ðû²¼Ê±¼ä 2021-09-18

Anonymous³ÆÒÑÇÔÈ¡ÍйÜÔËÓªÉÌEpik½üÊ®ÄêµÄÊý¾Ý


Anonymous³ÆÒÑÇÔÈ¡ÍйÜÔËÓªÉÌEpik½üÊ®ÄêµÄÊý¾Ý.jpg


AnonymousÔÚ9ÔÂ15ÈÕÉù³ÆÒÑÇÔÈ¡ÍйÜÔËÓªÉÌEpik½üÊ®ÄêµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÔÚDDoSecretsÉϹûÕæ¡£¡£¡£¡£ ¡£EpikµÄ¿Í»§°üÀ¨Parler¡¢Gab¡¢The DonaldºÍprolifewhistleblower.comµÈ¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷ÊÇEPIKFAILÐж¯µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬×ܼÆÇÔÈ¡ÁËÔ¼180GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÕË»§Æ¾Ö¤¡¢WHOISÀúÊ·¡¢DNS¸ü¸Ä¡¢Git´æ´¢¿âºÍ½¹µãϵͳµÄ/home/ºÍ/root/Ŀ¼µÈ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔøÔÚÉÏÖÜÈëÇÖÁËGOP£¨µÂ¿ËÈøË¹¹²ºÍµ³£©µÄ¹Ù·½ÍøÕ¾¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/anonymous-steals-far-right-web-host-epik-data/


ÃÀ¹úDesert WellsÒ½ÔºEHRϵͳÔâµ½¹¥»÷ÇÒÊý¾Ýɥʧ


ÃÀ¹úDesert WellsÒ½ÔºEHRϵͳÔâµ½¹¥»÷ÇÒÊý¾Ýɥʧ.png


ÃÀ¹úÑÇÀûÉ£ÄÇÖݵÄÒ½ÔºDesert Wells Family Medicine³ÆÆäµç×Ó¿µ½¡¼Í¼(EHR)ϵͳÔâµ½¹¥»÷¡£¡£¡£¡£ ¡£¹¥»÷±¬·¢ÔÚ5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬×ÝÈ»¸ÃÒ½ÔºÔÚ¹¥»÷±¬·¢Ç°±¸·ÝÁËEHRÖеÄËùÓÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß¶ÔÁ½¸öϵͳÖеÄÊý¾Ý¾ù¾ÙÐÐÁ˼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬Ê¹µÃϵͳÖеÄËùÓÐEHRÐÅÏ¢¶¼ÒÑÓÀÊÀɥʧ¡£¡£¡£¡£ ¡£Desert WellsÌåÏÖÒѾ¡ÆäËùÄָܻ´Êý¾Ýµ«Ã»ÓÐÈκÎ×÷Ó㬣¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚ¹¹½¨È«ÐµÄEHRϵͳ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÒÑ֪ͨ35000¸ö»¼ÕßËûÃǵĿµ½¡ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/arizona-medical-practice-loses-ehr/



MikroTik¹ûÕæDDoS½©Ê¬ÍøÂçM¨¥ris»î¶¯µÄÏêϸÐÅÏ¢


MikroTik¹ûÕæDDoS½©Ê¬ÍøÂçM¨¥ris»î¶¯µÄÏêϸÐÅÏ¢.jpg


À­ÍÑάÑÇÍøÂç×°±¸ÖÆÔìÉÌMikroTikÔÚ9ÔÂ15ÈÕ¹ûÕæÁËM¨¥ris¹¥»÷»î¶¯µÄÐÅÏ¢¡£¡£¡£¡£ ¡£MicroTik½²»°È˳Æ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ʹÓõÄ·ÓÉÆ÷Óë2018Äê±»ÈëÇֵķÓÉÆ÷Ïàͬ£¬£¬£¬£¬£¬£¬£¬ÆäʱMikroTik RouterOSÖб£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬µ«¸ÃÎó²îºÜ¿ì¾Í±»ÐÞ¸´ÁË¡£¡£¡£¡£ ¡£²»¹ý½öÐÞ¸´Îó²î²¢²»¿É±£»£»£»¤Â·ÓÉÆ÷£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÔÚ2018Äê¾Í»ñµÃÁËÓû§µÄƾ֤¡£¡£¡£¡£ ¡£MicroTik½¨ÒéÓû§°´ÆÚÉý¼¶×°±¸£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÇ¿ÃÜÂë²¢°´ÆÚÌæ»»µÈ²½·¥¡£¡£¡£¡£ ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mikrotik-shares-info-on-securing-routers-hit-by-massive-m-ris-botnet/


Çå¾²¹«Ë¾BitdefenderÐû²¼ÀÕË÷Èí¼þREvilÖ÷½âÃÜÆ÷


Çå¾²¹«Ë¾BitdefenderÐû²¼ÀÕË÷Èí¼þREvilÖ÷½âÃÜÆ÷.jpg


Çå¾²¹«Ë¾BitdefenderÐû²¼ÁËÕë¶ÔÀÕË÷Èí¼þREvilÖ÷½âÃÜÆ÷¡£¡£¡£¡£ ¡£Bitdefender³Æ¸Ã½âÃÜÆ÷ÊÇÓÉÆäºÍijִ·¨²¿·ÖÏàÖú¿ª·¢µÄ£¬£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ7ÔÂ13ÈÕ֮ǰÔâµ½REvil¹¥»÷µÄËùÓÐÊܺ¦Õß¡£¡£¡£¡£ ¡£BleepingComputerÑо¿Ö°Ô±Ê¹ÓýñÄêÔçЩʱ¼äµÄREvilÑù±¾¶ÔÆä¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬£¬£¬È·¶¨Ã»ÓÐÎÊÌâ¡£¡£¡£¡£ ¡£7Ô·Ýʱ£¬£¬£¬£¬£¬£¬£¬KaseyaÒ²Ôø»ñµÃÁËREvil½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹¤¾ßÖ»ÊÊÓÃÓÚÕë¶ÔKaseyaµÄ¹¥»÷»î¶¯µÄÊܺ¦Õß¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/free-revil-ransomware-master-decrypter-released-for-past-victims/


΢ÈíÅû¶½üÆÚʹÓÃMSHTMLÎó²îµÄ´¹ÂÚ¹¥»÷»î¶¯


΢ÈíÅû¶½üÆÚʹÓÃMSHTMLÎó²îµÄ´¹ÂÚ¹¥»÷»î¶¯.png


΢ÈíÔÚ9ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬£¬ÆäÍþвÇ鱨ÖÐÐÄÔÚ8Ô·ݷ¢Ã÷ÁËÉÙÁ¿Í¨¹ýÌØÖÆMicrosoftOfficeÎĵµÊ¹ÓÃMSHTMLÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-40444£©µÄ»î¶¯¡£¡£¡£¡£ ¡£´Ë´Î»î¶¯Ê¹ÓÃÁ˽»¸¶»úÖÆ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÍйÜÔÚÎļþ¹²ÏíÕ¾µãÉϵÄÌõÔ¼ºÍÖ´·¨Ð­Ò飬£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄÏÂÔØCabinet¹éµµÎļþ£¬£¬£¬£¬£¬£¬£¬Æä°üÀ¨Ò»¸öÀ©Õ¹ÃûΪINFµÄDLL£¬£¬£¬£¬£¬£¬£¬¸ÃDLL½«¼ìË÷²¢ÏÂÔØÔ¶³ÌÍйܵÄshellcode¡£¡£¡£¡£ ¡£Î¢Èí½«´Ë´Î»î¶¯¹éÒòÓÚºÚ¿Í×éÖ¯DEV-0413ºÍDEV-0365¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/09/windows-mshtml-0-day-exploited-to.html


Unit 42Ðû²¼ÒÔÂÃÓÎΪÖ÷ÌâµÄ´¹ÂڻµÄÆÊÎö±¨¸æ


Unit 42Ðû²¼ÒÔÂÃÓÎΪÖ÷ÌâµÄ´¹ÂڻµÄÆÊÎö±¨¸æ.jpg


Unit 42ÓÚ9ÔÂ15ÈÕÐû²¼ÁËÒÔÂÃÓÎΪÖ÷ÌâµÄ´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÆÊÎöÁË2019Äê10ÔÂÖÁ2021Äê8Ô½¨ÉèµÄÒÔÂÃÓÎΪÖ÷ÌâµÄ´¹ÂÚURL£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÊýÄ¿³ÊÖð½¥ÉÏÉýµÄÇ÷ÊÆ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ2021Äê6Ô·ºÆðÏÔÖøÔöÌí¡£¡£¡£¡£ ¡£±¨¸æÌṩÁËDridexÔÚ2021ÄêʹÓõĴøÓС°º½¿Õ¹«Ë¾¡±ºÍ¡°¼ÙÆÚ¡±Òªº¦´ÊµÄ´¹ÂڻµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆÊÎö·¢Ã÷¹¥»÷Õßͨ³£Ê¹ÓÃGoogle FirebaseÓòÀ´ÓÕÆ­Ä¿µÄ²¢ÈƹýÇå¾²¹ýÂËÆ÷¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/travel-themed-phishing/