{"vulnerability": "CVE-2023-3824", "sightings": [{"uuid": "ebdd68b3-6349-43fc-8b9c-4670063ee6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "Telegram/DxgP-VnMFjVo8D4WY1_VfM_mk0xbZdomHU6ckCD4IJyLzXQ", "content": "", "creation_timestamp": "2024-02-20T14:47:38.000000Z"}, {"uuid": "2a12b4ca-a2f3-4a3b-9792-7dd3e9462b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/xqaS9oQHj19EK8HlDk1UF-Sk0jvrfWjgjfI0LppzJ-gDvVs", "content": "", "creation_timestamp": "2024-03-03T21:29:38.000000Z"}, {"uuid": "d552d3ea-57be-4ea1-9997-f395222fbf77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/VWo2h8AbxPmyxGxPyU52gds0kEQ-BSb2QOV1f7kqaK5d0A4", "content": "", "creation_timestamp": "2024-04-05T21:43:54.000000Z"}, {"uuid": "5a062b68-5d4a-4c6d-b379-2b40991a83ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/1tvljGnqs_gH8ptwRWquPXQ1OnfnrYfZMfH5i0z8ghp7WA", "content": "", "creation_timestamp": "2024-04-07T21:44:40.000000Z"}, {"uuid": "b37571cb-0133-48a2-8b55-528a82d019d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/5xQwalAna856ewy_hFLpZ_0PvCvYtWozu6Y35w6NqdWq9Z8", "content": "", "creation_timestamp": "2024-04-05T21:41:55.000000Z"}, {"uuid": "4d06a78f-fcd9-4096-9854-68615512e19d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/wj9g3L9r8q1nE4oUlf-BQ9g3Jtyzp7APkPOeaMfq1U1Uvyg", "content": "", "creation_timestamp": "2024-04-22T06:11:14.000000Z"}, {"uuid": "5847e522-f309-4fb3-964c-6ff4eee94704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/fzHn0ebqNr3Xz7uVET6h6k_c0r5fv7H30uJ7EYStbABLkxY", "content": "", "creation_timestamp": "2024-04-07T21:44:38.000000Z"}, {"uuid": "2e0a074e-e253-4bba-9efb-de5ac864e172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/gwENtLCMQLIllHZjdepV9CNg-2bd_BefZFolsIBUrc4ZA9A", "content": "", "creation_timestamp": "2024-04-07T21:44:38.000000Z"}, {"uuid": "ab741049-a94d-47bd-9159-01b08025f889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/gry8yapGlnw-_PuwRwUbmhmR8DlL77eCnsgxUGNwaSEGQQU", "content": "", "creation_timestamp": "2024-04-05T23:16:32.000000Z"}, {"uuid": "c4fcfd09-c3da-4aa8-96b9-506db599344b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/ZgsDJb0kw9YZwa5Y5vW144MorCrqqouJFT5ZUL3UMwAXELY", "content": "", "creation_timestamp": "2024-04-05T23:16:32.000000Z"}, {"uuid": "7924009b-2ab2-4197-b069-8d2e26fe7ead", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "Telegram/qnmA3pS0inZm6dg3wSvzFOF0m4Bbs8C3oas3AikausURfJo", "content": "", "creation_timestamp": "2024-02-20T07:12:10.000000Z"}, {"uuid": "5e27a4e0-43ac-4ce9-a10a-916428ff6eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/LegionServiceNews/580", "content": "\u0417\u0430\u043f\u0430\u0434\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u044b \u0432 \u043b\u0438\u0446\u0435 \u0424\u0411\u0420 \u0438 \u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u0431\u043e\u0440\u044c\u0431\u0435 \u0441 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c\u044e \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u043e\u0432 LockBit. \u0423\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u23f3\"\u041a\u0440\u043e\u043d\u043e\u0441\" \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b\u0438 \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0438\u0437 11 \u0441\u0442\u0440\u0430\u043d. \n\nVX \u043f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u043c\u043e\u0433\u043b\u0430 \u0441\u0442\u0430\u0442\u044c CVE-2023-3824 \u0438 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u0430 \u0431\u044b\u043b\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 PHP.\n\n\u270b @Russian_OSINT", "creation_timestamp": "2024-02-20T06:21:15.000000Z"}, {"uuid": "b654c02c-e764-4a9b-9a95-3465e839aa5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "Telegram/PaY0yTkdDwMnBz73v8NV51xRm2XMe-Hg92RhXV5MofJKhW_r", "content": "", "creation_timestamp": "2024-02-24T09:40:21.000000Z"}, {"uuid": "1494c68e-f3b9-49cc-987a-aa997f4fbb48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/vyprDezk1Fqd9pLHzg9mEo6JxIKj94oM8yLPgSYm352UZkZg", "content": "", "creation_timestamp": "2024-02-24T09:39:28.000000Z"}, {"uuid": "10de58dd-0ded-46ea-850e-37c7302e6408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/-ukSGsTZ--Wm70IH41l9pTm9YecI7umUVL8kgFFkvkJueg", "content": "", "creation_timestamp": "2024-04-07T21:44:40.000000Z"}, {"uuid": "819546bd-d26f-403f-aece-10da67579786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/T8RrVhYocnMnDFdZe3eZtaiEF5y3WBd0rlqr1qdZzfHfTA", "content": "", "creation_timestamp": "2024-04-05T23:16:33.000000Z"}, {"uuid": "d9f31f16-e02d-4c28-b324-b8549e440343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "Telegram/IosYSVDWAYgAesXLoBlDe9WlPLMvaOPnNyDgVng5fCZSgQ", "content": "", "creation_timestamp": "2024-04-05T23:16:33.000000Z"}, {"uuid": "a0ce9734-2488-4061-8d42-f12af3aaf773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "https://t.me/LockBitRaasRansomware/16877", "content": "CVE-2023-3824 vulnerability .\n\nMore details: https://nvd.nist.gov/vuln/detail/CVE-2023-3824\n\nExploit: https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv", "creation_timestamp": "2024-04-05T21:43:54.000000Z"}, {"uuid": "5f8d85ab-c935-4a97-83cf-e4b87397ddc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/LockBitRaasRansomware/20427", "content": "Someone used AI to make Lockbit ransomware groups statement regarding the FBI takedown ... into an anime-like EDM ... ? \n\nYou're all degenerates \ud83d\ude02\ud83d\ude02\ud83d\ude02\n\nWhat happened.\n\nOn February 19, 2024 penetration testing of two of my servers took place, at 06:39 UTC I found an error on the site 502 Bad Gateway, restarted nginx - nothing changed, restarted mysql - nothing changed, restarted PHP - the site worked. I didn't pay much attention to it, because for 5 years of swimming in money I became very lazy, and continued to ride on a yacht with titsy girls. At 20:47 I found that the site gives a new error 404 Not Found nginx, tried to enter the server through SSH and could not, the password did not fit, as it turned out later all the information on the disks was erased.\n\nDue to my personal negligence and irresponsibility I relaxed and did not update PHP in time, the servers had PHP 8.1.2 version installed, which was successfully penetration tested most likely by this CVE https://www.cvedetails.com/cve/CVE-2023-3824/ , as a result of which access was gained to the two main servers where this version of PHP was installed.  I realize that it may not have been this CVE, but something else like 0day for PHP, but I can't be 100% sure, because the version installed on my servers was already known to have a known vulnerability, so this is most likely how the victims' admin and chat panel servers and\n\n#X", "creation_timestamp": "2024-04-22T06:11:14.000000Z"}, {"uuid": "a13c1d6b-1a7d-42e8-bb29-3d98ca211225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/LockBitRaasRansomware/16875", "content": "https://www.cvedetails.com/cve/CVE-2023-3824/", "creation_timestamp": "2024-04-05T21:41:55.000000Z"}, {"uuid": "564fe402-820d-4d7c-997a-f2505b20c8c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/AnonymousEgypt/5586", "content": "Someone used AI to make Lockbit ransomware groups statement regarding the FBI takedown ... into an anime-like EDM ... ? \n\nYou're all degenerates \ud83d\ude02\ud83d\ude02\ud83d\ude02\n\nWhat happened.\n\nOn February 19, 2024 penetration testing of two of my servers took place, at 06:39 UTC I found an error on the site 502 Bad Gateway, restarted nginx - nothing changed, restarted mysql - nothing changed, restarted PHP - the site worked. I didn't pay much attention to it, because for 5 years of swimming in money I became very lazy, and continued to ride on a yacht with titsy girls. At 20:47 I found that the site gives a new error 404 Not Found nginx, tried to enter the server through SSH and could not, the password did not fit, as it turned out later all the information on the disks was erased.\n\nDue to my personal negligence and irresponsibility I relaxed and did not update PHP in time, the servers had PHP 8.1.2 version installed, which was successfully penetration tested most likely by this CVE https://www.cvedetails.com/cve/CVE-2023-3824/ , as a result of which access was gained to the two main servers where this version of PHP was installed.  I realize that it may not have been this CVE, but something else like 0day for PHP, but I can't be 100% sure, because the version installed on my servers was already known to have a known vulnerability, so this is most likely how the victims' admin and chat panel servers and\n\n#X", "creation_timestamp": "2024-04-22T23:34:28.000000Z"}, {"uuid": "64123dd4-183d-417b-9995-95c6fdfe32f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/BhinnekaSec/1641", "content": "Lockbit ransomware group administrative staff have released a lengthy response to the FBI and bystanders.\n\nIn summary: they claim they failed to keep their systems up-to-date because they had become 'lazy', and they had become complacent. They believe they were compromised by CVE-2023-3824, but are not totally sure. They also speculate it could have been a 0day exploit. They also speculate other RaaS groups (their competitors) may have been compromised.\n\nThey also speculate the reason why the FBI took such aggressive action was because a recent ransomware attack performed by one of their affiliates had sensitive information on former President Donald J. Trump. They state they believe their affiliates should target government entities more often to illustrate government vulnerabilities and flaws.\n\nIt is an incredibly long read with lots of speculation and attempts to discredit law enforcement agencies.", "creation_timestamp": "2024-02-28T04:05:57.000000Z"}, {"uuid": "615f4924-bf41-4ad2-809f-3ee60379eaf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/rUIMEoCECIUaxclc8OolC0dceMoJ6gK-ljKtBUPzkrhQ_aY", "content": "", "creation_timestamp": "2025-02-10T22:00:05.000000Z"}, {"uuid": "615ef58c-fcd6-4b64-a0e2-00e2fc848ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "Telegram/9tSKlxV2LGf03XtO-I3nh7JO83WEmd9HbXLgiO9yU6WtVXk", "content": "", "creation_timestamp": "2025-01-11T22:00:06.000000Z"}, {"uuid": "4f4d262d-deb1-4394-93bf-2487a9a84a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38249", "type": "seen", "source": "https://t.me/cibsecurity/72216", "content": "\u203c CVE-2023-38249 \u203c\n\nAdobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead in arbitrary code execution by an admin-privilege authenticated attacker. Exploitation of this issue does not require user interaction and attack complexity is high as it requires knowledge of tooling beyond just using the UI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T12:28:46.000000Z"}, {"uuid": "056f5c81-5242-4ed3-9f1a-dc01c751a1fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38248", "type": "seen", "source": "https://t.me/cibsecurity/68220", "content": "\u203c CVE-2023-38248 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:16:03.000000Z"}, {"uuid": "ff44896a-2eef-4294-a995-86ca331921f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3894", "content": "Lockbit ransomware group administrative staff have released a lengthy response to the FBI and bystanders.\n\nIn summary: they claim they failed to keep their systems up-to-date because they had become 'lazy', and they had become complacent. They believe they were compromised by CVE-2023-3824, but are not totally sure. They also speculate it could have been a 0day exploit. They also speculate other RaaS groups (their competitors) may have been compromised.\n\nThey also speculate the reason why the FBI took such aggressive action was because a recent ransomware attack performed by one of their affiliates had sensitive information on former President Donald J. Trump. They state they believe their affiliates should target government entities more often to illustrate government vulnerabilities and flaws.\n\nIt is an incredibly long read with lots of speculation and attempts to discredit law enforcement agencies.", "creation_timestamp": "2024-02-25T05:19:53.000000Z"}, {"uuid": "974ce497-bf26-47bb-a628-64fc134cdb93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38246", "type": "seen", "source": "Telegram/XtsKjyM54AehaE1ST3JiJ1OAxd91n47B0Yjnz3C0CKN5xBY", "content": "", "creation_timestamp": "2023-11-16T09:43:21.000000Z"}, {"uuid": "7beab1c5-b95b-42de-b1eb-81b53fa49105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/CyberSecurityIL/38342", "content": "\u05d4\u05d4\u05e9\u05d1\u05ea\u05d4 \u05e9\u05dc \u05e7\u05d1\u05d5\u05e6\u05ea Lockbit -\u05e1\u05d9\u05db\u05d5\u05dd \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9\u05dd \u05de\u05de\u05d4 \u05e9\u05d9\u05d3\u05d5\u05e2 \u05e2\u05d3 \u05db\u05d4:\n\n\u05d2\u05d5\u05e8\u05de\u05d9 \u05d0\u05db\u05d9\u05e4\u05d4 \u05de-11 \u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05e9\u05d5\u05e0\u05d5\u05ea \u05d4\u05e9\u05d1\u05d9\u05ea\u05d5 \u05dc\u05de\u05e2\u05dc\u05d4 \u05de-20 \u05d0\u05ea\u05e8\u05d9\u05dd \u05d4\u05e9\u05d9\u05d9\u05db\u05d9\u05dd \u05dc\u05e7\u05d1\u05d5\u05e6\u05ea \u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05d1\u05de\u05d1\u05e6\u05e2 \u05e9\u05e7\u05d9\u05d1\u05dc \u05d0\u05ea \u05e9\u05dd \u05d4\u05e7\u05d5\u05d3 Cronos.\n\n\u05dc\u05e9\u05d5\u05ea\u05e4\u05d9\u05dd \u05e9\u05dc \u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05d7\u05d9\u05db\u05d4 \u05de\u05e1\u05e8 \u05de\u05d2\u05d5\u05e8\u05de\u05d9 \u05d4\u05d0\u05db\u05d9\u05e4\u05d4 \u05d1\u05e4\u05d5\u05e8\u05d8\u05dc \u05d1\u05d5 \u05d4\u05dd \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u05d0\u05ea \u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8, \u05ea\u05de\u05d5\u05e0\u05d4 \u05de\u05e6\"\u05d1.\n\n\u05de\u05e0\u05d4\u05dc \u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05d8\u05d5\u05e2\u05df \u05db\u05d9 \u05d2\u05d5\u05e8\u05de\u05d9 \u05d4\u05d0\u05db\u05d9\u05e4\u05d4 \u05e4\u05d2\u05e2\u05d5 \u05d1\u05db\u05dc \u05d4\u05e9\u05e8\u05ea\u05d9\u05dd \u05e9\u05dc\u05d5 \u05d4\u05e2\u05d5\u05e9\u05d9\u05dd \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1-PHP \u05d5\u05d6\u05d0\u05ea \u05dc\u05d0\u05d7\u05e8 \u05e9\u05d4\u05dd \u05e0\u05d9\u05e6\u05dc\u05d5 \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05ea CVE-2023-3824 \ud83d\ude08\n\n\u05dc\u05d8\u05e2\u05e0\u05ea \u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05db\u05dc \u05e9\u05e8\u05ea\u05d9 \u05d4\u05d2\u05d9\u05d1\u05d5\u05d9 \u05e9\u05d0\u05d9\u05e0\u05dd \u05e2\u05d5\u05e9\u05d9\u05dd \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1-PHP, \u05d5\u05de\u05d7\u05d6\u05d9\u05e7\u05d9\u05dd \u05d1\u05d9\u05df \u05d4\u05d9\u05ea\u05e8 \u05d0\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d2\u05e0\u05d5\u05d1 \u05e9\u05dc \u05d4\u05e7\u05e8\u05d1\u05e0\u05d5\u05ea, \u05e2\u05d3\u05d9\u05df \u05e4\u05e2\u05d9\u05dc\u05d9\u05dd, \u05d5\u05db\u05d9 \u05dc\u05d0\u05d7\u05e8 \u05e9\u05d7\u05d6\u05d5\u05e8 \u05d4\u05e7\u05d1\u05d5\u05e6\u05d4 \u05ea\u05d7\u05d6\u05d5\u05e8 \u05dc\u05e4\u05e2\u05d9\u05dc\u05d5\u05ea.\n\u05db\u05d1\u05e8 \u05e8\u05d0\u05d9\u05e0\u05d5 \u05de\u05e7\u05e8\u05d4 \u05d3\u05d5\u05de\u05d4 \u05e2\u05dd \u05e7\u05d1\u05d5\u05e6\u05ea AlphV \u05e9\u05de\u05d0\u05d6 \"\u05d4\u05d4\u05e9\u05d1\u05ea\u05d4\" \u05e9\u05dc \u05d2\u05d5\u05e8\u05de\u05d9 \u05d4\u05d0\u05db\u05d9\u05e4\u05d4 \u05db\u05d1\u05e8 \u05d7\u05d6\u05e8\u05d4 \u05dc\u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d5\u05e4\u05d2\u05e2\u05d4 \u05d1\u05dc\u05d0 \u05de\u05e2\u05d8 \u05e7\u05e8\u05d1\u05e0\u05d5\u05ea.\n\n\u05d1\u05e9\u05e2\u05d4 13:00 (\u05e9\u05e2\u05d5\u05df \u05d9\u05e9\u05e8\u05d0\u05dc) \u05e6\u05e4\u05d5\u05d9\u05d4 \u05d4\u05db\u05e8\u05d6\u05d4 \u05e9\u05dc \u05d2\u05d5\u05e8\u05de\u05d9 \u05d4\u05d0\u05db\u05d9\u05e4\u05d4 \u05d1\u05e0\u05d5\u05d2\u05e2 \u05dc\u05de\u05d1\u05e6\u05e2 Cronos, \u05d0\u05e2\u05d3\u05db\u05df.\n\nhttps://t.me/CyberSecurityIL/4653\n\n#\u05db\u05d5\u05e4\u05e8", "creation_timestamp": "2024-02-20T07:33:24.000000Z"}, {"uuid": "497bb5e0-236b-455a-ba5e-0c1c7b45d4e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/5453", "content": "\u041a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u0441\u0438\u043b\u043e\u0432\u043e\u0439 \u0443\u0434\u0430\u0440 \u043f\u043e \u0438\u043c\u043f\u0435\u0440\u0438\u0438 LockBit, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0431\u044b\u043b \u043e\u0449\u0443\u0442\u0438\u043c, \u043d\u043e \u043d\u0435 \u043f\u0440\u0438\u0432\u0435\u043b \u043a \u0436\u0435\u043b\u0430\u0435\u043c\u044b\u043c \u0446\u0435\u043b\u044f\u043c: \u0441\u043f\u0443\u0441\u0442\u044f \u043d\u0435\u0434\u0435\u043b\u044e \u0431\u0430\u043d\u0434\u0430 \u0432\u043e\u0437\u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u044e RaaS, \u0443\u0433\u0440\u043e\u0436\u0430\u044f \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u043e\u0447\u0438\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u0441\u0438\u043b\u0438\u0439 \u043d\u0430 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u0445 \u0433\u043e\u0441\u0441\u0435\u043a\u0442\u043e\u0440\u0430.\n\n\u0421\u0432\u043e\u0435 \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u0435 LockBit \u0441\u043e\u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043b\u0438 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u044b\u043c\u0438 \u043e\u0431\u044a\u044f\u0441\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0438 \u0438\u0437\u0432\u0438\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0437\u0430 \u043b\u0438\u0447\u043d\u0430\u044f \u0445\u0430\u043b\u0430\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0431\u0435\u0437\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043a \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 Cronos \u0438 \u0432\u0437\u043b\u043e\u043c\u0443 \u0424\u0411\u0420 \u0434\u0432\u0443\u0445 \u0433\u043b\u0430\u0432\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c PHP 8.1.2, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 CVE-2023-3824.\n\nLockBit \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438 PHP-\u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0435 \u043b\u044e\u0431\u043e\u043c\u0443, \u043a\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438. \u041d\u043e\u0432\u044b\u0439 \u0441\u0430\u0439\u0442 DLS \u0443\u0436\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u0435\u0442 \u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u044f\u0442\u044c \u043d\u043e\u0432\u044b\u0445 \u0436\u0435\u0440\u0442\u0432.\n\n\u0420\u0430\u0441\u0441\u0443\u0436\u0434\u0430\u044f \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u043e\u0431\u0443\u0434\u0438\u043b\u043e \u0424\u0411\u0420 \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u0438\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, LockBit \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0443\u044e\u00a0\u0430\u0442\u0430\u043a\u0443 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u043e\u043a\u0440\u0443\u0433\u0430 \u0424\u0443\u043b\u0442\u043e\u043d\u0430, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b \u0441\u043e\u0437\u0434\u0430\u043d \u0440\u0438\u0441\u043a \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0443\u0442\u0435\u0447\u043a\u0438 \u0441 \u00ab\u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u0432\u0435\u0449\u0435\u0439 \u0438 \u0441\u0443\u0434\u0435\u0431\u043d\u044b\u0445 \u0434\u0435\u043b \u0414\u043e\u043d\u0430\u043b\u044c\u0434\u0430 \u0422\u0440\u0430\u043c\u043f\u0430\u00bb.\n\nLockBit \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0438 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u0440\u0443\u0447\u043d\u043e\u0439 \u0432\u044b\u043f\u0443\u0441\u043a \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u0449\u0438\u043a\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u0442\u044c \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u0443\u044e \u043f\u0430\u043d\u0435\u043b\u044c \u043d\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0432 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u043a\u043e\u043f\u0438\u044f\u043c \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0443\u0440\u043e\u0432\u043d\u044f \u0434\u043e\u0432\u0435\u0440\u0438\u044f.\n\n\u0427\u0442\u043e \u0436\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432, \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u043f\u0430\u0432\u0448\u0438\u0435 \u0432 \u043f\u043e\u043b\u0435 \u0437\u0440\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 \u0431\u043e\u043b\u0435\u0435 500 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u0434\u0440\u0435\u0441\u043e\u0432 LockBit \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 18 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043f\u0440\u043e\u0432\u0435\u0440\u043d\u0443\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 125 \u043c\u043b\u043d. \u0434\u043e\u043b., \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0445 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u044b\u043a\u0443\u043f\u0430 (\u0430 \u0442\u043e\u0447\u043d\u0435\u0435 - \u043b\u0438\u0448\u044c 20%-\u0430\u044f \u043a\u043e\u043c\u0438\u0441\u0441\u0438\u044f). \n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u0447\u0442\u0438 110 \u043c\u043b\u043d. \u043d\u0435 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u043b\u0438\u0447\u0435\u043d\u044b \u0438 \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u0431\u0430\u043b\u0430\u043d\u0441\u0435.\n\n\u0421\u043c\u0435\u043a\u043d\u0443\u0432, \u0447\u0442\u043e \u0437\u0430\u043f\u0430\u0441 \u043f\u0438\u0430\u0440\u0430 \u0437\u0430\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u0435\u0442\u0441\u044f, \u0430 \u0441\u0443\u0440\u043e\u0432\u044b\u0435 ransomware-\u0431\u0443\u0434\u043d\u0438 \u043d\u043e\u0432\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u043c\u0430\u044f\u0447\u0430\u0442 \u043d\u0430 \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0435, \u0438\u043d\u0438\u0446\u0438\u0430\u0442\u043e\u0440\u044b Cronos \u0432\u043a\u0438\u043d\u0443\u043b\u0438 \u0438\u043d\u0444\u0443 \u043e \u043f\u0440\u0438\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0438 LockBitSupp \u043a \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u0441 \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0441\u0430\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u044b \u0432 \u0440\u0430\u0437\u0433\u043e\u0432\u043e\u0440\u0435 \u0441 VX-Underground \u043e\u043f\u0440\u043e\u0432\u0435\u0440\u0433\u043b\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u0438\u0437 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0440\u0430\u0437\u0434\u0435\u043b\u044f\u044e\u0442 \u0438\u0445 \u043f\u043e\u0437\u0438\u0446\u0438\u044e, \u0432\u0435\u0434\u044c \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435 \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u0439 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u043e\u0440\u0430\u043c \u0431\u044c\u0435\u0442 \u043f\u043e \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u0438, \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e, \u0441\u0430\u043c\u0438\u0445 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431-\u043a\u0443\u0440\u0430\u0442\u043e\u0440\u043e\u0432.\n\n\u041d\u043e \u0432 \u043a\u0435\u0439\u0441\u0435 \u0441 LockBit \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0434\u0440\u0443\u0433\u043e\u0435.\n\n\u041f\u0440\u0438\u0432\u043b\u0435\u0447\u0435\u043d\u043d\u044b\u0435 \u043a \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Trend Micro \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u0430\u043d\u0434\u043e\u0439 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 LockBit-NG-Dev, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u043c \u0434\u043e\u043b\u0436\u043d\u0430 \u0441\u0442\u0430\u0442\u044c LockBit 4.0.\n\n\u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u041f\u041e LockBit \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0430 C/C++, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u043e\u0431\u0440\u0430\u0437\u0435\u0446 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043d\u0435\u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u0443\u044e \u0440\u0430\u0431\u043e\u0442\u0443, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u0443\u044e \u043d\u0430 .NET, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u0441\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u0441\u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e CoreRT \u0438 \u0443\u043f\u0430\u043a\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e MPRESS.\n\n\u041e\u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0442\u0440\u0438 \u0440\u0435\u0436\u0438\u043c\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f (\u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c AES+RSA), \u0430 \u0438\u043c\u0435\u043d\u043d\u043e \u00ab\u0431\u044b\u0441\u0442\u0440\u044b\u0439\u00bb, \u00ab\u043f\u0440\u0435\u0440\u044b\u0432\u0438\u0441\u0442\u044b\u0439\u00bb \u0438 \u00ab\u043f\u043e\u043b\u043d\u044b\u0439\u00bb, \u0438\u043c\u0435\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438\u043b\u0438 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432 \u0438 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u043d\u0434\u043e\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043c\u0435\u043d\u0430 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u043b\u043e\u0436\u043d\u0438\u0442\u044c \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435.\n\n\u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0441\u0430\u043c\u043e\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0444\u0430\u0439\u043b\u0430 LockBit \u043d\u0443\u043b\u0435\u0432\u044b\u043c\u0438 \u0431\u0430\u0439\u0442\u0430\u043c\u0438.\n\n\u041f\u043e\u043b\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 LockBit-NG-Dev \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b Trend Micro \u0432\u00a0\u0443\u0433\u043b\u0443\u0431\u043b\u0435\u043d\u043d\u043e\u043c \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0435.", "creation_timestamp": "2024-02-26T16:30:05.000000Z"}, {"uuid": "18b0f2bf-b5b5-48d6-b25c-111d6696955d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/GhostPrincess/13467", "content": "Lockbit ransomware group administrative staff have released a lengthy response to the FBI and bystanders.\n\nIn summary: they claim they failed to keep their systems up-to-date because they had become 'lazy', and they had become complacent. They believe they were compromised by CVE-2023-3824, but are not totally sure. They also speculate it could have been a 0day exploit. They also speculate other RaaS groups (their competitors) may have been compromised.\n\nLockbit has restored their servers (new Tor domains) and is planning on making a statement to the FBI regarding last weeks takedown.\n\nLockbit has back up with the legendary hacker Saiyan.\n\n#GhostPrincess", "creation_timestamp": "2024-02-26T08:23:13.000000Z"}, {"uuid": "20bb1131-ee03-4779-91d0-495d139595a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/891", "content": "CVE-2023-3824 : PHP &lt; 8.0.30 Buffer overflow and overread in phar_dir_read()\nSummary : \nBuffer mismanagement in phar_dir_read() causes a buffer overflow and a buffer overread later.\nDetails  : \nhttps://github.com/php/php-src/blob/be71cadc2f899bc39fe27098042139392e2187db/ext/phar/dirstream.c#L89C1-L116\nPOC : https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv", "creation_timestamp": "2023-09-02T23:00:03.000000Z"}, {"uuid": "d9a5fe83-889b-456e-a704-b23428085742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/true_secator/5439", "content": "\u034f\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u043e\u0439 NCA \u0435\u0449\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043d\u0430\u0437\u0430\u0434 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u0439 \u0441\u0438\u043b\u043e\u0432\u043e\u0439 Operation Cronos \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 LockBit.\n\n\u041a\u0430\u043a \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0441\u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0443\u0441\u0438\u043b\u0438\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 11 \u0441\u0442\u0440\u0430\u043d \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0447\u0430\u0441\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b LockBit, \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u0432 \u0430\u0434\u043c\u0438\u043d\u043a\u0443 \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u043e\u0439 \u0441\u0435\u0442\u0438 \u0438 \u0434\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0434\u043e \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432.\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0436\u0435 \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u0440\u0435\u0441\u0441-\u0440\u0435\u043b\u0438\u0437\u0430\u043c, \u0432 \u0445\u043e\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0431\u044b\u043b\u043e:\n- \u0437\u0430\u0445\u0432\u0430\u0447\u0435\u043d\u043e 34 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LockBit,\n- \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0430 \u0432\u0430\u0436\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c LockBit,\n- \u0430\u0440\u0435\u0441\u0442\u043e\u0432\u0430\u043d\u043e \u0431\u043e\u043b\u0435\u0435 200 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u043d\u044b\u0445 \u0441\u0447\u0435\u0442\u043e\u0432 \u0441 \u0434\u043e\u0445\u043e\u0434\u0430\u043c\u0438 \u043e\u0442 \u0432\u044b\u043a\u0443\u043f\u043e\u0432,\n- \u0437\u0430\u0434\u0435\u0440\u0436\u0430\u043d\u044b \u0434\u0432\u0430 \u0447\u043b\u0435\u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u041f\u043e\u043b\u044c\u0448\u0435 \u0438 \u0423\u043a\u0440\u0430\u0438\u043d\u0435,\n- \u0437\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043b\u0438\u0447\u043d\u043e\u0441\u0442\u0438 LockbitSupp \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u043d\u0430\u0433\u0440\u0430\u0434\u0430,\n- \u0438\u0437\u044a\u044f\u0442\u043e \u0431\u043e\u043b\u0435\u0435 1000 \u043a\u043b\u044e\u0447\u0435\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0440\u0430\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0439 \u0432 \u0447\u0430\u0442\u0430\u0445 \u0441 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0431\u044b\u043b\u043e \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u043e \u0432\u044b\u0434\u0430\u0442\u044c LockbitSupp, \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0438 \u043f\u043e\u0437\u0430\u0431\u0430\u0432\u0438\u043b\u0438\u0441\u044c \u0438 \u0441 \u0441\u0430\u0439\u0442\u043e\u043c DLS, \u043a\u0443\u0434\u0430 \u0432\u043c\u0435\u0441\u0442\u043e \u0436\u0435\u0440\u0442\u0432 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u043b\u0438 \u0441\u0441\u044b\u043b\u043a\u0438 \u0441 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c\u0438 \u043f\u043e Operation Cronos.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043b\u0438\u0446\u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043a\u0440\u0438\u043d\u0448\u043e\u0442\u044b \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u0435\u0439 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 LockBit \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u0443\u0441\u0441\u043e\u0432 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u0432.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u043d\u044b \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0439 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0438, \u0441\u0438\u043b\u0430\u043c\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u0430 \u0443\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows.\n\n\u0423\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0435\u043a\u0442\u0430 No More Ransom.\n\n\u0415\u0449\u0435 \u0438\u0437 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439: \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u0430\u044f LockbitSupp \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-3824 \u0432 PHP, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0431\u0430\u043d\u0434\u044b, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0432\u0440\u044f\u0434 \u043b\u0438 \u044f\u0432\u0438\u043b\u0430\u0441\u044c \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0439 \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u0442\u043e\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0438\u0430\u0441\u043a\u043e, \u0445\u043e\u0442\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430.\n\n\u041a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435, Operation Cronos - \u044d\u0442\u043e \u0443\u0434\u0430\u0440 \u043f\u043e \u0441\u0430\u043c\u043e\u043c\u0443 \u0441\u0435\u0440\u0434\u0446\u0443 LockBit ransomware, \u043d\u043e \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0435 \u0441\u043c\u0435\u0440\u0442\u0435\u043b\u044c\u043d\u044b\u0439.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432, \u0440\u044f\u0434\u044b \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u0441\u043a\u043e\u0440\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0435\u0434\u0435\u0442\u044c, \u0441\u0442\u0430\u0432 \u0431\u0443\u0434\u0443\u0449\u0438\u043c\u0438 \u0446\u0435\u043b\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431.", "creation_timestamp": "2024-02-22T07:46:32.000000Z"}, {"uuid": "7fe36965-3fa4-45fe-a9fa-4229ac237eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/true_secator/5434", "content": "\u034f\u0421\u0438\u043b\u043e\u0432\u0438\u043a\u0438 \u0440\u0430\u043f\u043e\u0440\u0442\u0443\u044e\u0442 \u043e \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u0425\u0440\u043e\u043d\u043e\u0441, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0438\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u0441 2019 \u0433\u043e\u0434\u0430 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Lockbit.\n\n\u0412 \u043c\u0435\u0440\u043e\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u0445, \u043a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u043d\u0430\u0440\u044f\u0434\u0443 \u0441 \u0415\u0432\u0440\u043e\u043f\u043e\u043b\u043e\u043c \u043f\u0440\u0438\u043d\u044f\u043b\u0438 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0432\u043b\u0430\u0441\u0442\u0438 11 \u0441\u0442\u0440\u0430\u043d: \u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u0438, \u041a\u0430\u043d\u0430\u0434\u044b, \u0424\u0438\u043d\u043b\u044f\u043d\u0434\u0438\u0438, \u0424\u0440\u0430\u043d\u0446\u0438\u0438, \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438, \u042f\u043f\u043e\u043d\u0438\u0438, \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u043e\u0432, \u0428\u0432\u0435\u0446\u0438\u0438, \u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u0438, \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438 \u0438 \u0421\u0428\u0410.\n\n\u0421\u0442\u043e\u043b\u044c \u043e\u0448\u0435\u043b\u043e\u043c\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0443\u0441\u043f\u0435\u0445\u0443 \u0441\u043f\u043e\u0441\u043e\u0431\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u043e\u0442\u0447\u0430\u0441\u0442\u0438 \u0441\u0430\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u044b, \u043d\u0435 \u0443\u0433\u043b\u044f\u0434\u0435\u0432\u0448\u0438\u0435 \u0437\u0430 \u0443\u044f\u0432\u0437\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 PHP (CVE-2023-3824\u00a0\u0441 CVSS: 9,8), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0438 \u043e\u0442\u043a\u0440\u044b\u043b\u0430 \u0434\u0432\u0435\u0440\u0438 \u0432 \u0438\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0442\u0435\u043f\u0435\u0440\u044c \u0441\u0430\u0439\u0442 DLS \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0447\u0430\u0441\u0442\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b Lockbit \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u043e\u043d\u0438 \u043a\u043e\u043d\u0444\u0438\u0441\u043a\u043e\u0432\u0430\u043d\u044b \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0435\u0439\u0441\u043a\u043e\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u043f\u043e\u0434 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c NCA \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438 \u0438 \u0424\u0411\u0420 \u0421\u0428\u0410, \u0430 \u0432\u043d\u0443\u0442\u0440\u0438 \u0430\u0434\u043c\u0438\u043d\u043a\u0438 \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0438 \u0432\u043e\u0432\u0441\u044e \u0440\u0430\u0437\u0432\u043b\u0435\u043a\u0430\u044e\u0442\u0441\u044f \u0441 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u0430\u043c\u0438 \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0441\u043a\u043e\u0439 \u0441\u0435\u0442\u0438.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u044f\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0438 \u0434\u043e \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432 LockBit, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e \u0436\u0435\u0440\u0442\u0432\u0430\u0445, \u043f\u0435\u0440\u0435\u0433\u043e\u0432\u043e\u0440\u0430\u0445, \u0441\u0443\u043c\u043c\u0430\u0445 \u0432\u044b\u043a\u0443\u043f\u0430, \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, Lockbit \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0443 \u043d\u0438\u0445 \u0441\u043e\u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0441\u044c \u0432\u0441\u0435 \u0431\u044d\u043a\u0430\u043f\u044b \u0438 \u0441 \u043d\u0438\u043c\u0438 \u0432\u0441\u0451 \u0432 \u043f\u043e\u0440\u044f\u0434\u043a\u0435, \u043f\u043e\u043c\u0438\u043c\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u043d\u0438\u043a\u0442\u043e \u0438\u0437 \u0447\u043b\u0435\u043d\u043e\u0432 \u0431\u0430\u043d\u0434 \u043d\u0435 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u044b \u0431\u0430\u043d\u0434\u044b (\u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0434\u043b\u044f \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445) \u0432\u0441\u0435 \u0435\u0449\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u044e Lockbit \u0441 1700 \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2020 \u0433\u043e\u0434\u0430, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u044b\u0442 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 ALPHV \u0438\u043b\u0438 Hive, \u043d\u0435 \u043e\u0441\u043e\u0431\u043e \u043f\u043e\u0434\u043a\u043e\u0441\u0438\u0432\u0448\u0438\u0445 \u0438\u0445 RaaS-\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c, \u043d\u0435 \u0432\u0441\u0435 \u0442\u0430\u043a \u043e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u0441 \u0425\u0440\u043e\u043d\u043e\u0441.", "creation_timestamp": "2024-02-20T12:30:37.000000Z"}, {"uuid": "f2e51f45-4b55-4bb7-8e3a-fa21dfacee84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/cibsecurity/68327", "content": "\u203c CVE-2023-3824 \u203c\n\nIn PHP version 8.0.* before 8.0.30,\u00c2\u00a0 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.\u00c2\u00a0\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T12:30:21.000000Z"}, {"uuid": "2cc8b213-25a8-4e18-b73f-c561a22dc22a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38247", "type": "seen", "source": "https://t.me/cibsecurity/68219", "content": "\u203c CVE-2023-38247 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:16:02.000000Z"}, {"uuid": "77fc8324-a57e-41eb-bc97-5430c03ebe76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38241", "type": "seen", "source": "https://t.me/cibsecurity/68217", "content": "\u203c CVE-2023-38241 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:16:00.000000Z"}, {"uuid": "1ea63b2c-2708-45c1-ad59-eab10f895ec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38245", "type": "seen", "source": "https://t.me/cibsecurity/68225", "content": "\u203c CVE-2023-38245 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:16:08.000000Z"}, {"uuid": "c5415edd-b0c7-4502-8be3-48f2953da6af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38242", "type": "seen", "source": "https://t.me/cibsecurity/68222", "content": "\u203c CVE-2023-38242 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:16:05.000000Z"}, {"uuid": "96e4935c-3987-45e0-a5d7-096dcfac07e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38243", "type": "seen", "source": "https://t.me/cibsecurity/68208", "content": "\u203c CVE-2023-38243 \u203c\n\nAdobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T18:15:47.000000Z"}, {"uuid": "9a3cc9a2-541a-40e5-ade1-44cc1aeeabcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/vxunderground/3627", "content": "Lockbit ransomware group administration claims that law enforcement agencies compromised them by exploiting CVE-2023-3824\n\nMore information: https://nvd.nist.gov/vuln/detail/CVE-2023-3824", "creation_timestamp": "2024-02-20T01:13:33.000000Z"}, {"uuid": "3c0fb355-6df9-438f-bb68-5d9fd1887de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/Russian_OSINT/3700", "content": "\u0417\u0430\u043f\u0430\u0434\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u044b \u0432 \u043b\u0438\u0446\u0435 \u0424\u0411\u0420 \u0438 \u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u0431\u043e\u0440\u044c\u0431\u0435 \u0441 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c\u044e \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u043e\u0432 LockBit. \u0423\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u23f3\"\u041a\u0440\u043e\u043d\u043e\u0441\" \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b\u0438 \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0438\u0437 11 \u0441\u0442\u0440\u0430\u043d. \n\nVX \u043f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u043c\u043e\u0433\u043b\u0430 \u0441\u0442\u0430\u0442\u044c CVE-2023-3824 \u0438 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u0430 \u0431\u044b\u043b\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 PHP.\n\n\u270b @Russian_OSINT", "creation_timestamp": "2024-02-20T05:52:30.000000Z"}, {"uuid": "b4f177d4-c129-4c58-8b0e-30eea1bdda2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/Russian_OSINT/3723", "content": "\u034f\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u043e\u0439 NCA \u0435\u0449\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043d\u0430\u0437\u0430\u0434 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u0439 \u0441\u0438\u043b\u043e\u0432\u043e\u0439 Operation Cronos \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 LockBit.\n\n\u041a\u0430\u043a \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0441\u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0443\u0441\u0438\u043b\u0438\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 11 \u0441\u0442\u0440\u0430\u043d \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0447\u0430\u0441\u0442\u044c \u0441\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b LockBit, \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u0432 \u0430\u0434\u043c\u0438\u043d\u043a\u0443 \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u043e\u0439 \u0441\u0435\u0442\u0438 \u0438 \u0434\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0434\u043e \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432.\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0436\u0435 \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u0440\u0435\u0441\u0441-\u0440\u0435\u043b\u0438\u0437\u0430\u043c, \u0432 \u0445\u043e\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0431\u044b\u043b\u043e:\n- \u0437\u0430\u0445\u0432\u0430\u0447\u0435\u043d\u043e 34 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LockBit,\n- \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0430 \u0432\u0430\u0436\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c LockBit,\n- \u0430\u0440\u0435\u0441\u0442\u043e\u0432\u0430\u043d\u043e \u0431\u043e\u043b\u0435\u0435 200 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u043d\u044b\u0445 \u0441\u0447\u0435\u0442\u043e\u0432 \u0441 \u0434\u043e\u0445\u043e\u0434\u0430\u043c\u0438 \u043e\u0442 \u0432\u044b\u043a\u0443\u043f\u043e\u0432,\n- \u0437\u0430\u0434\u0435\u0440\u0436\u0430\u043d\u044b \u0434\u0432\u0430 \u0447\u043b\u0435\u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u041f\u043e\u043b\u044c\u0448\u0435 \u0438 \u0423\u043a\u0440\u0430\u0438\u043d\u0435,\n- \u0437\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043b\u0438\u0447\u043d\u043e\u0441\u0442\u0438 LockbitSupp \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u043d\u0430\u0433\u0440\u0430\u0434\u0430,\n- \u0438\u0437\u044a\u044f\u0442\u043e \u0431\u043e\u043b\u0435\u0435 1000 \u043a\u043b\u044e\u0447\u0435\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0440\u0430\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0439 \u0432 \u0447\u0430\u0442\u0430\u0445 \u0441 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0431\u044b\u043b\u043e \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u043e \u0432\u044b\u0434\u0430\u0442\u044c LockbitSupp, \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0438 \u043f\u043e\u0437\u0430\u0431\u0430\u0432\u0438\u043b\u0438\u0441\u044c \u0438 \u0441 \u0441\u0430\u0439\u0442\u043e\u043c DLS, \u043a\u0443\u0434\u0430 \u0432\u043c\u0435\u0441\u0442\u043e \u0436\u0435\u0440\u0442\u0432 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u043b\u0438 \u0441\u0441\u044b\u043b\u043a\u0438 \u0441 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c\u0438 \u043f\u043e Operation Cronos.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043b\u0438\u0446\u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043a\u0440\u0438\u043d\u0448\u043e\u0442\u044b \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u0435\u0439 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 LockBit \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u0443\u0441\u0441\u043e\u0432 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u0432.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u043d\u044b \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0439 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0438, \u0441\u0438\u043b\u0430\u043c\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u0430 \u0443\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows.\n\n\u0423\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0435\u043a\u0442\u0430 No More Ransom.\n\n\u0415\u0449\u0435 \u0438\u0437 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439: \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u0430\u044f LockbitSupp \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-3824 \u0432 PHP, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0431\u0430\u043d\u0434\u044b, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0432\u0440\u044f\u0434 \u043b\u0438 \u044f\u0432\u0438\u043b\u0430\u0441\u044c \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0439 \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u0442\u043e\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0438\u0430\u0441\u043a\u043e, \u0445\u043e\u0442\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430.\n\n\u041a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435, Operation Cronos - \u044d\u0442\u043e \u0443\u0434\u0430\u0440 \u043f\u043e \u0441\u0430\u043c\u043e\u043c\u0443 \u0441\u0435\u0440\u0434\u0446\u0443 LockBit ransomware, \u043d\u043e \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0435 \u0441\u043c\u0435\u0440\u0442\u0435\u043b\u044c\u043d\u044b\u0439.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432, \u0440\u044f\u0434\u044b \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u0441\u043a\u043e\u0440\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0435\u0434\u0435\u0442\u044c, \u0441\u0442\u0430\u0432 \u0431\u0443\u0434\u0443\u0449\u0438\u043c\u0438 \u0446\u0435\u043b\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431.", "creation_timestamp": "2024-02-22T07:24:34.000000Z"}, {"uuid": "4abaa8aa-ada2-4679-8c0a-6bfabdfe93a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/S_E_Reborn/4531", "content": "Lockbit ransomware group administration claims that law enforcement agencies compromised them by exploiting CVE-2023-3824\n\nMore information: https://nvd.nist.gov/vuln/detail/CVE-2023-3824", "creation_timestamp": "2024-02-20T20:05:29.000000Z"}, {"uuid": "2ed52265-bf66-4504-b496-4726d798a452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/S_E_Reborn/4536", "content": "\u034f\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u043e\u0439 NCA \u0435\u0449\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043d\u0430\u0437\u0430\u0434 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u0439 \u0441\u0438\u043b\u043e\u0432\u043e\u0439 Operation Cronos \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 LockBit.\n\n\u041a\u0430\u043a \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0441\u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0443\u0441\u0438\u043b\u0438\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 11 \u0441\u0442\u0440\u0430\u043d \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0447\u0430\u0441\u0442\u044c \u0441\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b LockBit, \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u0432 \u0430\u0434\u043c\u0438\u043d\u043a\u0443 \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u043e\u0439 \u0441\u0435\u0442\u0438 \u0438 \u0434\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0434\u043e \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432.\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0436\u0435 \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u0440\u0435\u0441\u0441-\u0440\u0435\u043b\u0438\u0437\u0430\u043c, \u0432 \u0445\u043e\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0431\u044b\u043b\u043e:\n- \u0437\u0430\u0445\u0432\u0430\u0447\u0435\u043d\u043e 34 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LockBit,\n- \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0430 \u0432\u0430\u0436\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043f\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c LockBit,\n- \u0430\u0440\u0435\u0441\u0442\u043e\u0432\u0430\u043d\u043e \u0431\u043e\u043b\u0435\u0435 200 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u043d\u044b\u0445 \u0441\u0447\u0435\u0442\u043e\u0432 \u0441 \u0434\u043e\u0445\u043e\u0434\u0430\u043c\u0438 \u043e\u0442 \u0432\u044b\u043a\u0443\u043f\u043e\u0432,\n- \u0437\u0430\u0434\u0435\u0440\u0436\u0430\u043d\u044b \u0434\u0432\u0430 \u0447\u043b\u0435\u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u041f\u043e\u043b\u044c\u0448\u0435 \u0438 \u0423\u043a\u0440\u0430\u0438\u043d\u0435,\n- \u0437\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043b\u0438\u0447\u043d\u043e\u0441\u0442\u0438 LockbitSupp \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u043d\u0430\u0433\u0440\u0430\u0434\u0430,\n- \u0438\u0437\u044a\u044f\u0442\u043e \u0431\u043e\u043b\u0435\u0435 1000 \u043a\u043b\u044e\u0447\u0435\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0440\u0430\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0439 \u0432 \u0447\u0430\u0442\u0430\u0445 \u0441 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0431\u044b\u043b\u043e \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u043e \u0432\u044b\u0434\u0430\u0442\u044c LockbitSupp, \u0441\u0438\u043b\u043e\u0432\u0438\u043a\u0438 \u043f\u043e\u0437\u0430\u0431\u0430\u0432\u0438\u043b\u0438\u0441\u044c \u0438 \u0441 \u0441\u0430\u0439\u0442\u043e\u043c DLS, \u043a\u0443\u0434\u0430 \u0432\u043c\u0435\u0441\u0442\u043e \u0436\u0435\u0440\u0442\u0432 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u043b\u0438 \u0441\u0441\u044b\u043b\u043a\u0438 \u0441 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c\u0438 \u043f\u043e Operation Cronos.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043b\u0438\u0446\u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043a\u0440\u0438\u043d\u0448\u043e\u0442\u044b \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u0435\u0439 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 LockBit \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u0443\u0441\u0441\u043e\u0432 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u0432.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u043d\u044b \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0439 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0438, \u0441\u0438\u043b\u0430\u043c\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u0430 \u0443\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 Windows.\n\n\u0423\u0442\u0438\u043b\u0438\u0442\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0435\u043a\u0442\u0430 No More Ransom.\n\n\u0415\u0449\u0435 \u0438\u0437 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439: \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u0430\u044f LockbitSupp \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-3824 \u0432 PHP, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0431\u0430\u043d\u0434\u044b, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0432\u0440\u044f\u0434 \u043b\u0438 \u044f\u0432\u0438\u043b\u0430\u0441\u044c \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0439 \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u0442\u043e\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0438\u0430\u0441\u043a\u043e, \u0445\u043e\u0442\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430.\n\n\u041a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435, Operation Cronos - \u044d\u0442\u043e \u0443\u0434\u0430\u0440 \u043f\u043e \u0441\u0430\u043c\u043e\u043c\u0443 \u0441\u0435\u0440\u0434\u0446\u0443 LockBit ransomware, \u043d\u043e \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0435 \u0441\u043c\u0435\u0440\u0442\u0435\u043b\u044c\u043d\u044b\u0439.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432, \u0440\u044f\u0434\u044b \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u0441\u043a\u043e\u0440\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0435\u0434\u0435\u0442\u044c, \u0441\u0442\u0430\u0432 \u0431\u0443\u0434\u0443\u0449\u0438\u043c\u0438 \u0446\u0435\u043b\u044f\u043c\u0438 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431.", "creation_timestamp": "2024-02-22T13:53:54.000000Z"}, {"uuid": "77e7f270-d795-419f-a01d-5ecb484eab24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/S_E_Reborn/4559", "content": "\u041a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u0441\u0438\u043b\u043e\u0432\u043e\u0439 \u0443\u0434\u0430\u0440 \u043f\u043e \u0438\u043c\u043f\u0435\u0440\u0438\u0438 LockBit, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0431\u044b\u043b \u043e\u0449\u0443\u0442\u0438\u043c, \u043d\u043e \u043d\u0435 \u043f\u0440\u0438\u0432\u0435\u043b \u043a \u0436\u0435\u043b\u0430\u0435\u043c\u044b\u043c \u0446\u0435\u043b\u044f\u043c: \u0441\u043f\u0443\u0441\u0442\u044f \u043d\u0435\u0434\u0435\u043b\u044e \u0431\u0430\u043d\u0434\u0430 \u0432\u043e\u0437\u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u044e RaaS, \u0443\u0433\u0440\u043e\u0436\u0430\u044f \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u043e\u0447\u0438\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u0441\u0438\u043b\u0438\u0439 \u043d\u0430 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u0445 \u0433\u043e\u0441\u0441\u0435\u043a\u0442\u043e\u0440\u0430.\n\n\u0421\u0432\u043e\u0435 \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u0435 LockBit \u0441\u043e\u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043b\u0438 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u044b\u043c\u0438 \u043e\u0431\u044a\u044f\u0441\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0438 \u0438\u0437\u0432\u0438\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0437\u0430 \u043b\u0438\u0447\u043d\u0430\u044f \u0445\u0430\u043b\u0430\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0431\u0435\u0437\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043a \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 Cronos \u0438 \u0432\u0437\u043b\u043e\u043c\u0443 \u0424\u0411\u0420 \u0434\u0432\u0443\u0445 \u0433\u043b\u0430\u0432\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c PHP 8.1.2, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 CVE-2023-3824.\n\nLockBit \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438 PHP-\u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0435 \u043b\u044e\u0431\u043e\u043c\u0443, \u043a\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438. \u041d\u043e\u0432\u044b\u0439 \u0441\u0430\u0439\u0442 DLS \u0443\u0436\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u0435\u0442 \u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u044f\u0442\u044c \u043d\u043e\u0432\u044b\u0445 \u0436\u0435\u0440\u0442\u0432.\n\n\u0420\u0430\u0441\u0441\u0443\u0436\u0434\u0430\u044f \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u043e\u0431\u0443\u0434\u0438\u043b\u043e \u0424\u0411\u0420 \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u0438\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, LockBit \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0443\u044e\u00a0\u0430\u0442\u0430\u043a\u0443 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u043e\u043a\u0440\u0443\u0433\u0430 \u0424\u0443\u043b\u0442\u043e\u043d\u0430, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b \u0441\u043e\u0437\u0434\u0430\u043d \u0440\u0438\u0441\u043a \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0443\u0442\u0435\u0447\u043a\u0438 \u0441 \u00ab\u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u0432\u0435\u0449\u0435\u0439 \u0438 \u0441\u0443\u0434\u0435\u0431\u043d\u044b\u0445 \u0434\u0435\u043b \u0414\u043e\u043d\u0430\u043b\u044c\u0434\u0430 \u0422\u0440\u0430\u043c\u043f\u0430\u00bb.\n\nLockBit \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0438 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u0440\u0443\u0447\u043d\u043e\u0439 \u0432\u044b\u043f\u0443\u0441\u043a \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u0449\u0438\u043a\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u0442\u044c \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0441\u043a\u0443\u044e \u043f\u0430\u043d\u0435\u043b\u044c \u043d\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0432 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u043a\u043e\u043f\u0438\u044f\u043c \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0443\u0440\u043e\u0432\u043d\u044f \u0434\u043e\u0432\u0435\u0440\u0438\u044f.\n\n\u0427\u0442\u043e \u0436\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432, \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u043f\u0430\u0432\u0448\u0438\u0435 \u0432 \u043f\u043e\u043b\u0435 \u0437\u0440\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431 \u0431\u043e\u043b\u0435\u0435 500 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u0434\u0440\u0435\u0441\u043e\u0432 LockBit \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 18 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043f\u0440\u043e\u0432\u0435\u0440\u043d\u0443\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 125 \u043c\u043b\u043d. \u0434\u043e\u043b., \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0445 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u044b\u043a\u0443\u043f\u0430 (\u0430 \u0442\u043e\u0447\u043d\u0435\u0435 - \u043b\u0438\u0448\u044c 20%-\u0430\u044f \u043a\u043e\u043c\u0438\u0441\u0441\u0438\u044f). \n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u0447\u0442\u0438 110 \u043c\u043b\u043d. \u043d\u0435 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u043b\u0438\u0447\u0435\u043d\u044b \u0438 \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u0431\u0430\u043b\u0430\u043d\u0441\u0435.\n\n\u0421\u043c\u0435\u043a\u043d\u0443\u0432, \u0447\u0442\u043e \u0437\u0430\u043f\u0430\u0441 \u043f\u0438\u0430\u0440\u0430 \u0437\u0430\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u0435\u0442\u0441\u044f, \u0430 \u0441\u0443\u0440\u043e\u0432\u044b\u0435 ransomware-\u0431\u0443\u0434\u043d\u0438 \u043d\u043e\u0432\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u043c\u0430\u044f\u0447\u0430\u0442 \u043d\u0430 \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0435, \u0438\u043d\u0438\u0446\u0438\u0430\u0442\u043e\u0440\u044b Cronos \u0432\u043a\u0438\u043d\u0443\u043b\u0438 \u0438\u043d\u0444\u0443 \u043e \u043f\u0440\u0438\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0438 LockBitSupp \u043a \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u0441 \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0441\u0430\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u044b \u0432 \u0440\u0430\u0437\u0433\u043e\u0432\u043e\u0440\u0435 \u0441 VX-Underground \u043e\u043f\u0440\u043e\u0432\u0435\u0440\u0433\u043b\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u0438\u0437 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0440\u0430\u0437\u0434\u0435\u043b\u044f\u044e\u0442 \u0438\u0445 \u043f\u043e\u0437\u0438\u0446\u0438\u044e, \u0432\u0435\u0434\u044c \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435 \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u0439 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u043e\u0440\u0430\u043c \u0431\u044c\u0435\u0442 \u043f\u043e \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u0438, \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e, \u0441\u0430\u043c\u0438\u0445 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431-\u043a\u0443\u0440\u0430\u0442\u043e\u0440\u043e\u0432.\n\n\u041d\u043e \u0432 \u043a\u0435\u0439\u0441\u0435 \u0441 LockBit \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0434\u0440\u0443\u0433\u043e\u0435.\n\n\u041f\u0440\u0438\u0432\u043b\u0435\u0447\u0435\u043d\u043d\u044b\u0435 \u043a \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Trend Micro \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u0430\u043d\u0434\u043e\u0439 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 LockBit-NG-Dev, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u043c \u0434\u043e\u043b\u0436\u043d\u0430 \u0441\u0442\u0430\u0442\u044c LockBit 4.0.\n\n\u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u041f\u041e LockBit \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0430 C/C++, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u043e\u0431\u0440\u0430\u0437\u0435\u0446 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043d\u0435\u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u0443\u044e \u0440\u0430\u0431\u043e\u0442\u0443, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u0443\u044e \u043d\u0430 .NET, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u0441\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u0441\u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e CoreRT \u0438 \u0443\u043f\u0430\u043a\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e MPRESS.\n\n\u041e\u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0442\u0440\u0438 \u0440\u0435\u0436\u0438\u043c\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f (\u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c AES+RSA), \u0430 \u0438\u043c\u0435\u043d\u043d\u043e \u00ab\u0431\u044b\u0441\u0442\u0440\u044b\u0439\u00bb, \u00ab\u043f\u0440\u0435\u0440\u044b\u0432\u0438\u0441\u0442\u044b\u0439\u00bb \u0438 \u00ab\u043f\u043e\u043b\u043d\u044b\u0439\u00bb, \u0438\u043c\u0435\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438\u043b\u0438 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432 \u0438 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u043d\u0434\u043e\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043c\u0435\u043d\u0430 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u043b\u043e\u0436\u043d\u0438\u0442\u044c \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435.\n\n\u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0441\u0430\u043c\u043e\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0444\u0430\u0439\u043b\u0430 LockBit \u043d\u0443\u043b\u0435\u0432\u044b\u043c\u0438 \u0431\u0430\u0439\u0442\u0430\u043c\u0438.\n\n\u041f\u043e\u043b\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 LockBit-NG-Dev \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b Trend Micro \u0432\u00a0\u0443\u0433\u043b\u0443\u0431\u043b\u0435\u043d\u043d\u043e\u043c \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0435.", "creation_timestamp": "2024-02-26T16:40:01.000000Z"}, {"uuid": "5b188bc6-417e-49b9-a784-6bff9eb280d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/SecLabNews/14892", "content": "\u041a\u043e\u043d\u0435\u0446 LockBit: \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u043b\u0438 \u0441\u0430\u0439\u0442 \u0438 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u043e\u0432 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \n\n\ud83d\udd75\ufe0f\u200d\u2642\ufe0f \u0412 \u0445\u043e\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 Cronos, \u043f\u043e\u0434 \u044d\u0433\u0438\u0434\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u043e\u043b\u0430, \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u044b 11 \u0441\u0442\u0440\u0430\u043d \u0432\u0437\u044f\u043b\u0438 \u043f\u043e\u0434 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0432\u0435\u0431-\u0441\u0430\u0439\u0442 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 LockBit.\n \n\ud83d\udca3\u041d\u0430 \u0441\u0430\u0439\u0442\u0435 \u0443\u0442\u0435\u0447\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 LockBit \u0442\u0435\u043f\u0435\u0440\u044c \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0430\u0435\u0442\u0441\u044f \u0431\u0430\u043d\u043d\u0435\u0440 \u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0435 \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u043e\u0440\u0433\u0430\u043d\u0430\u043c\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043b\u0438\u043a\u0432\u0438\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0430\u0440\u0442\u043d\u0435\u0440\u043e\u0432 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438, \u0433\u0434\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0441\u044c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f, \u0447\u0430\u0442\u044b \u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0436\u0435\u0440\u0442\u0432\u0430\u0445. \n\n\ud83d\udd77\u0425\u043e\u0442\u044f \u0441\u0430\u0439\u0442 \u0443\u0442\u0435\u0447\u043a\u0438 LockBit \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u044b \u0433\u0440\u0443\u043f\u043f\u044b \u0432 \u0434\u0430\u0440\u043a\u043d\u0435\u0442\u0435 \u0432\u0441\u0435 \u0435\u0449\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0442, \u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u0424\u0411\u0420 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0447\u0435\u0440\u0435\u0437 CVE-2023-3824 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432  PHP.\n\n#LockBit #OperationCronos #Ransomware @SecLabNews", "creation_timestamp": "2024-02-20T12:43:32.000000Z"}, {"uuid": "2b6854d2-0b95-441c-9bd7-887551fdfcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/CyberSachok/1685", "content": "\u0424\u0411\u0420 \u0438 \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0440\u044f\u0434\u0430 \u0441\u0442\u0440\u0430\u043d \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0430\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b Lockbit. \u041f\u0440\u0438\u0447\u0435\u043c \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 PHP, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432 \u043f\u0440\u043e\u0442\u0438\u0432 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0445 \u0436\u0435 \u043e\u0440\u0443\u0436\u0438\u0435 \u2014 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-3824. \n\n\u0425\u043e\u0447\u0435\u0442\u0441\u044f \u0432\u0441\u043f\u043e\u043c\u043d\u0438\u0442\u044c \u0432\u0435\u043b\u0438\u043a\u0438\u0435 \u0446\u0438\u0442\u0430\u0442\u044b \u0427\u0435\u043b\u044f\u0431\u0438\u043d\u0441\u043a\u0438\u0445 \u0444\u0438\u043b\u043e\u0441\u043e\u0444\u043e\u0432: \u00ab\u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u043a\u0430\u0437\u0430\u043d\u043e, \u043d\u0435 \u0435\u0431*\u0442, \u0447\u0442\u043e \u0441\u043a\u0430\u0437\u0430\u043d\u043e\u00bb. \u041e\u0434\u043d\u0430\u043a\u043e \u0424\u0411\u0420 \u044d\u0442\u043e \u0432\u0440\u044f\u0434 \u043b\u0438 \u0432\u043e\u043b\u043d\u0443\u0435\u0442, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043e\u043a\u043a\u0443\u043f\u0430\u0446\u0438\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u043b\u044e\u0434\u0435\u0439, \u043d\u0435 \u043e\u0431\u044a\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0443\u0434\u043e\u043c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438, \u043d\u043e\u0440\u043c. \n\n\u0411\u043e\u043b\u044c\u0448\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0437\u0434\u0435\u0441\u044c: https://nvd.nist.gov/vuln/detail/CVE-2023-3824\n\n@cybersachok", "creation_timestamp": "2024-02-20T05:37:26.000000Z"}, {"uuid": "5275280d-63bf-4752-aabe-4fbd06614e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "seen", "source": "https://t.me/vxunderground/3666", "content": "Lockbit ransomware group administrative staff have released a lengthy response to the FBI and bystanders.\n\nIn summary: they claim they failed to keep their systems up-to-date because they had become 'lazy', and they had become complacent. They believe they were compromised by CVE-2023-3824, but are not totally sure. They also speculate it could have been a 0day exploit. They also speculate other RaaS groups (their competitors) may have been compromised.\n\nThey also speculate the reason why the FBI took such aggressive action was because a recent ransomware attack performed by one of their affiliates had sensitive information on former President Donald J. Trump. They state they believe their affiliates should target government entities more often to illustrate government vulnerabilities and flaws.\n\nIt is an incredibly long read with lots of speculation and attempts to discredit law enforcement agencies.\n\nYou can read the full post here:  https://samples.vx-underground.org/tmp/Lockbit_Statement_2024-02-24.txt", "creation_timestamp": "2024-02-24T22:40:40.000000Z"}, {"uuid": "6de93696-bcd1-41c5-adcd-1172c2a2f312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3824", "type": "exploited", "source": "https://t.me/vxunderground/3996", "content": "Someone used AI to make Lockbit ransomware groups statement regarding the FBI takedown ... into an anime-like EDM ... ? \n\nYou're all degenerates \ud83d\ude02\ud83d\ude02\ud83d\ude02\n\nWhat happened.\n\nOn February 19, 2024 penetration testing of two of my servers took place, at 06:39 UTC I found an error on the site 502 Bad Gateway, restarted nginx - nothing changed, restarted mysql - nothing changed, restarted PHP - the site worked. I didn't pay much attention to it, because for 5 years of swimming in money I became very lazy, and continued to ride on a yacht with titsy girls. At 20:47 I found that the site gives a new error 404 Not Found nginx, tried to enter the server through SSH and could not, the password did not fit, as it turned out later all the information on the disks was erased.\n\nDue to my personal negligence and irresponsibility I relaxed and did not update PHP in time, the servers had PHP 8.1.2 version installed, which was successfully penetration tested most likely by this CVE https://www.cvedetails.com/cve/CVE-2023-3824/ , as a result of which access was gained to the two main servers where this version of PHP was installed.  I realize that it may not have been this CVE, but something else like 0day for PHP, but I can't be 100% sure, because the version installed on my servers was already known to have a known vulnerability, so this is most likely how the victims' admin and chat panel servers and", "creation_timestamp": "2024-04-22T05:51:33.000000Z"}]}