AzureÔÆÕÊ»§ÒòÅäÖôíÎóй¶΢Èí¶à¿î²úÎïµÄÔ´´úÂë £»Microsoft TeamsÓÉÓÚÅäÖøü¸ÄÔÙ´ÎÖжÏ£¬Ó°ÏìÈ«ÇòÓû§

Ðû²¼Ê±¼ä 2021-04-29

1.AzureÔÆÕÊ»§ÒòÅäÖôíÎóй¶΢Èí¶à¿î²úÎïµÄÔ´´úÂë


1.jpg


vpnMentorÑо¿ÍŶӷ¢ÏÖÒ»¸öÅäÖôíÎóµÄMicrosoft Azure BlobÔÆÕÊ»§Ð¹Â¶ÁË΢Èí¶à¿î²úÎïµÄÔ´´úÂ롣й¶Êý¾ÝµÄ×ܾÞϸΪ63GB£¬°üÂÞÁè¼Ý3800¸öÎļþ£¬Éæ¼°Éϰټҹ«Ë¾µÄÈÚ×ÊÑݽ²¸åºÍ10-15ÖÖ²úÎïµÄÔ´´úÂ룬ÓÚ2021Äê1ÔÂ7ÈÕ±»·¢ÏÖ²¢ÒÑÔÚ2021Äê2ÔÂ23Èյõ½± £»¤¡£ÕâЩÎļþΪÖڶ๫˾ÏòMicrosoft Dynamics×ö³öµÄһϵÁÐÉÌÒµÐû´«ºÍ²úÎï˵Ã÷£¬¿ÉÄÜÀ´×Ô΢Èí¹«Ë¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.vpnmentor.com/blog/report-microsoft-dynamics-leak/


2.ÔÆÌṩÉÌDigitalOcean³ÆÔâµ½¹¥»÷£¬¿Í»§ÕÊ»§ÐÅϢй¶


2.jpg


ÔÆÍйÜÌṩÉÌDigitalOcean³ÆÔâµ½¹¥»÷£¬²¿Ãſͻ§µÄÕÊ»§ÐÅϢй¶¡£DigitalOceanÏòÊÜÓ°Ïì¿Í»§·¢ËÍÓʼþ£¬³ÆÔÚ2021Äê4ÔÂ9ÈÕÖÁ2021Äê4ÔÂ22ÈÕÖ®¼ä£¬Î´¾­ÊÚȨµÄÓû§ÀûÓÃÒ»¸ö©¶´·ÃÎÊÁ˲¿ÃÅÓû§µÄÕ˵¥ÐÅÏ¢£¬ÏÖÔڸé¶´Òѱ»ÐÞ¸´¡£´Ë´Îй¶µÄÐÅÏ¢°üÂÞ¿Í»§µÄÕ˵¥Ãû³Æ¡¢Õ˵¥µØÖ·¡¢ÐÅÓÿ¨µ½ÆÚʱ¼ä¡¢ÐÅÓÿ¨µÄºóËÄλÊý×ÖÒÔ¼°ÐÅÓÿ¨µÄÒøÐÐÃû³Æ¡£DigitalOceanÔÚÈ¥ÄêÒ²·¢ÉúÁËÊý¾Ýй¶£¬ÊÇÓÉÓÚ¹ûÈ»Á´½ÓÖаüÂÞÁ˿ͻ§ÕÊ»§ÐÅÏ¢µÄÎĵµ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/digitalocean-data-breach-exposes-customer-billing-information/    


3.Microsoft TeamsÓÉÓÚÅäÖøü¸ÄÔÙ´ÎÖжÏ£¬Ó°ÏìÈ«ÇòÓû§


3.jpg


Microsoft TeamsÔٴη¢Éú·þÎñÖжÏ£¬Ó°ÏìÈ«Çò·¶Î§ÄÚµÄÓû§¡£´Ë´ÎÖжϷ¢ÉúÔÚ4ÔÂ27ÈÕUTCʱ¼ä9:58ºÍ12:05Ö®¼ä£¬Óû§ÎÞ·¨·¢ËͺͽÓÊÕÏûÏ¢¡¢¼ÓÈëÆµµÀ¡¢¼ÓÈëÁÄÌìºÍԢĿƵµÀ¡£¾­ÊӲ죬MicrosoftÈ·ÈÏÕâÊÇÓÉ×î½üµÄÅäÖøü¸ÄÒýÆðµÄ£¬¸ü¸Äµ¼ÖÂÌØ¶¨¹¦Ð§ÉèÖÃÖеÄÖµ´íÎ󣬴Ӷø¶Ô·þÎñÔì³ÉÓ°Ï죬ÎÊÌâÏÖÒÑÐÞ¸´¡£ÔÚ±¾Ô³õ£¬ÓÉÓÚDNS²éѯÒì³£¼¤ÔöʹAzure DNS·þÎñÆ÷³¬ÔØ£¬µ¼ÖÂÁËMicrosoft TeamsµÈÖÚ¶à·þÎñÔÚÈ«Çò·¶Î§ÄÚÖжÏ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-worldwide-outage-impacts-user-logins-chats/


4.ArmorbloxÅû¶Õë¶ÔĦ¸ù´óÍ¨ÒøÐпͻ§µÄµöÓã¹¥»÷»î¶¯


4.jpg


ArmorbloxÑо¿ÈËÔ±Åû¶½üÆÚÕë¶ÔĦ¸ù´óÍ¨ÒøÐпͻ§µÄµöÓã¹¥»÷»î¶¯¡£ÕâЩ»î¶¯¶¼½ÓÄÉÁËÉç»á¹¤³Ì¹¥»÷ºÍð³äÆ·ÅÆµÄ¼ÆÄ±£¬²¢ÀûÓÃÁËһϵÁм¼ÊõÀ´Èƹýµç×ÓÓʼþÄþ¾²¹ýÂËÆ÷£¬ÆóͼÇÔÈ¡¿Í»§µÄµÇ¼ƾ¾Ý¡£Ò»²¿ÃŹ¥»÷ð³äJp Morgan Chase£¬ÒÔ¡°ÄúµÄÐÅÓÿ¨¶ÔÕʵ¥ÒÑ×¼±¸¾ÍÐ÷¡±ÎªÌ⣬ÓÕʹĿ±êµã»÷αװ³Éδ֧¸¶Õ˵¥µÄÁ´½Ó²¢ÊäÈëÒøÐÐÆ¾¾Ý¡£ÁíһЩ¹¥»÷ð³äÒøÐеķÀÆÛÕ©²¿ÃÅ£¬ÒÔ¡°½ô¼±£ºÒì³£µÄµÇ¼»î¶¯¡±Îª±êÌâµÄÓʼþÇÔÈ¡ÒøÐÐÆ¾¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/threat-actors-impersonate-chase/


5.Èí¼þ±£Ö¤ÀíÆ÷CocoaPods´æÔÚRCE©¶´£¬300¶àÍò¸öÓ¦ÓÃÊÜÓ°Ïì


5.jpg


Ñо¿Ô±Max Justicz·¢ÏÖÈí¼þ±£Ö¤ÀíÆ÷CocoaPods´æÔÚRCE©¶´£¬¿ÉÄÜÓ°ÏìSignalµÈ300¶àÍò¸öÓ¦Óá£CocoaPodsÊÇʹÓÃRuby¹¹½¨µÄÓ¦Ó÷¨Ê½¼¶ÒÀÀµ¹ØÏµ¹ÜÀíÆ÷£¬ÌṩÁËÒ»Öֳ߶ȸñʽÀ´¹ÜÀíÍⲿ¿â¡£¹¥»÷ÕßÔÚÉÏ´«°üµÄ¹æ¸ñµ½CocoaPodsʱ£¬¿ÉÍêÈ«¿ØÖÆ@specification.source[:git]ºÍref.to_£¬Òò´ËÔÚ¾ßÓÐTrunk key£¨¹æ¸ñ¿â£©µÄCocoaPods·þÎñÆ÷¿ÉÒÔÔ¶³ÌÖ´ÐдúÂë¡£Ñо¿Ô±³Æ¸Ã©¶´ÒѾ­´æÔÚ6Ä꣨Ê״ηºÆðÔÚ2015Äê6ÔÂ4ÈÕ£©£¬Ö±µ½×î½ü²Å±»ÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2021/04/27/cocoapods-rce-vulnerability-could-risk-3-million-mobile-apps-including-signal/


6.CISAºÍNISTÁªºÏÐû²¼ÓйصÖÓùÈí¼þ¹©Ó¦Á´¹¥»÷µÄÖ¸ÄÏ


6.jpg


CISAºÍÃÀ¹ú¹ú¼Ò³ß¶È¼¼ÊõÑо¿Ôº£¨NIST£©ÁªºÏÐû²¼ÁËÓйصÖÓùÈí¼þ¹©Ó¦Á´¹¥»÷µÄÖ¸ÄÏ¡£¸ÃÖ¸ÄϸÅÊöÁËÈí¼þ¹©Ó¦Á´µÄ·çÏÕ£¬ÒÔ¼°Èí¼þ¿Í»§ºÍ¹©Ó¦ÉÌÈçºÎʹÓÃNISTÍøÂ繩ӦÁ´·çÏÕ¹ÜÀí(C-SCRM)¿ò¼ÜºÍÄþ¾²Èí¼þ¿ª·¢¿ò¼Ü(SSDF)À´Ê¶±ð¡¢ÆÀ¹ÀºÍ»º½âÈí¼þ¹©Ó¦Á´·çÏյĽ¨Òé¡£´ËÍ⣬¸ÃÖ¸ÄÏΪÈí¼þ¿Í»§ºÍ¹©Ó¦ÉÌÌṩÁËÔ¤·À¡¢»º½âºÍ»Ö¸´Èí¼þ¹©Ó¦Á´¹¥»÷µÄÒªº¦²½ÖèºÍÉîÈëµÄ½¨Òé¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/04/26/cisa-and-nist-release-new-interagency-resource-defending-against