MicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ»ìÏý¹¥»÷£»ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃËÐû²¼2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý

Ðû²¼Ê±¼ä 2021-07-01

1.MicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ»ìÏý¹¥»÷


1.jpg


Ñо¿ÈËÔ±·¢ÏÖMicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ¹ØÏµ»ìÏý¹¥»÷ ¡£Ricardo Iramar dos SantosÔÚÉó¼Æ¿ªÔ´°üSymphonyElectronʱ·¢ÏÖÁ˸ðüʹÓõÄÒ»¸ö¿ÉÒɵÄÒÀÀµÏîswift-search£¬²¢²»´æÔÚÓÚ¹«¹²npmjs.com×¢²á±íÖÐ ¡£Ñо¿ÈËÔ±½«°ü·¢Ë͵½npm×¢²á±íºóÊÕµ½ÁËÀ´×Ô΢Èí·þÎñÆ÷µÄping-back£¬·ÃÎÊhttps://51.141.173.203ʱ£¬SSLÖ¤ÊéµÄCN×Ö¶ÎÖ¸Ïò*.test.svc.halowaypoint.com£¬Õâ½øÒ»²½Ö¤Ã÷ÁË΢Èí·þÎñÆ÷Ôâµ½ÁËÒÀÀµ»ìÏý¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsofts-halo-dev-site-breached-using-dependency-hijacking/


2.Ö´·¨²¿ÃŲé»ñË«ÖØ¼ÓÃÜ·þÎñDoubleVPNµÄ·þÎñÆ÷ºÍÈÕÖ¾


2.jpg


2021Äê6ÔÂ29ÈÕ£¬¶à¹úÖ´·¨²¿ÃÅÀֳɲé»ñÁ˶íÂÞ˹DoubleVPNµÄ·þÎñÆ÷ ¡£DoubleVPN¿É¶ÔÊý¾Ý½øÐÐË«ÖØ¡¢ÈýÖØÉõÖÁËÄÖØ¼ÓÃÜ£¬Í¨³£±»¹¥»÷ÕßÓÃÀ´ÔÚÖ´ÐжñÒâ»î¶¯Ê±Èƹý¼ì²â ¡£´Ë´ÎÐж¯ÊÇÓɵ¹úBKA¡¢ºÉÀ¼ÕþÖξ֡¢Áª°îÊÓ²ì¾Ö¡¢Ó¢¹ú¹ú¼Ò·¸×ï¾Ö¡¢ÃÀ¹úÌØÇھֺͼÓÄôó»Ê¼ÒÆï¾¯µÈ×éÖ¯ÁªºÏ·¢¶¯µÄ£¬ÀֳɻñµÃÁËDoubleVPN·þÎñÆ÷µÄ·ÃÎÊȨ£¬²¢²é»ñÁËÆäËùÓпͻ§µÄ¸öÈËÐÅÏ¢¡¢ÈÕÖ¾ºÍͳ¼ÆÊý¾Ý ¡£Å·ÖÞÐ̾¯×éÖ¯ÌåÏÖÎÞ·¨·ÖÏí¸ü¶àϸ½Ú ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/


3.FacebookÆðËß4¸öÔ½ÄÏºÚ¿Í½Ù³ÖÆä¶à¸öÓû§µÄÕË»§


3.jpg


FacebookÆðËßÁË4¸öÔ½ÄÏºÚ¿Í½Ù³ÖÆäÓû§ÕË»§ ¡£Facebook³ÆÕâÕâЩºÚ¿ÍÀûÓûỰ͵ÇÔ»òcookie͵ÇÔ¼¼Êõ·ÃÎʶà¸ö¹ã¸æºÍÓªÏú¹«Ë¾Ô±¹¤µÄFacebookÕÊ»§£¬²¢Ê¹Óñ»ºÚµÄÕÊ»§Ðû´«ÃûΪAd Manager for FacebookµÄ¶ñÒâAndroidÓ¦Óà ¡£¸ÃÓ¦Ó÷¨Ê½ÍйÜÔÚ¹Ù·½Google PlayÉ̵êÖУ¬ÔÚ2020Äê12ÔÂÖÁ2021Äê5ÔÂÒѱ»°²×°ÁË10000¶à´Î ¡£Facebookͬʱ»¹ÆðËßÁ˼ÓÀû¸£ÄáÑǹ«Ë¾N&J USA Incorporated£¬¸Ã¹«Ë¾ÔÚFacebookÉÏͶ·ÅÁËÓйطþ×°¡¢ÊÖ±íºÍÍæ¾ßµÄÕ©Æ­¹ã¸æ ¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/facebook-sues-four-vietnamese-nationals-for-account-hijacks/


4.Ñо¿ÈËÔ±Åû¶Google Compute EngineδÐÞ¸´µÄ©¶´


4.jpg


Ñо¿ÈËÔ±Åû¶ÁËÒ»¸öÓ°ÏìGoogle Compute EngineµÄδÐÞ¸´µÄ©¶´ ¡£Google Compute Engine(GCE)ÊÇGoogle Cloud PlatformµÄ»ù´¡ÉèÊ©¼´·þÎñ(IaaS) ×é¼þ£¬Ê¹Óû§Äܹ»°´Ðè´´½¨ºÍÆô¶¯ÐéÄâ»ú (VM) ¡£¸Ã©¶´ÊÇÓÉÓÚISC DHCP¿Í»§¶ËʹÓÃÈõµÄÎ±Ëæ»úÊýµÄµ¼ÖµÄ£¬¹¥»÷ÕßÀûÓÃÕâ¸ö©¶´£¬¿ÉÒÔͨ¹ýSSHÊÚÓè×Ô¼º·ÃÎÊȨÏÞ£¬È»ºóÒÔrootÓû§Éí·ÝµÇ¼ ¡£¹È¸èÓÚ2020Äê9ÔÂ27ÈÕ»ñϤ¸ÃÎÊÌ⣬µ«ÖÁ½ñÉÐδÐû²¼²¹¶¡ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/06/unpatched-virtual-machine-takeover-bug.html


5.ÈÕ±¾¹«Ë¾Airport Refueling³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷


5.jpg


ÈÕ±¾Îª·É»úÌṩ¼ÓÓÍ·þÎñµÄJapan Airport Refueling³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ ¡£¹¥»÷·¢ÉúÔÚ2021Äê6ÔÂ21ÈÕÁ賿£¬¹«Ë¾ÄÚ²¿µÄÍøÂçϵͳ·¢Éú¹ÊÕÏ ¡£ÊÓ²ì֤ʵÊÇÀÕË÷Èí¼þ¹¥»÷£¬¸Ã¹«Ë¾ÊÕµ½Á˽âÃÜ·þÎñÆ÷Êý¾ÝµÄÊê½ðÒªÇ󣬵«ËƺõûÓÐÈκÎÊý¾Ý±»Ð¹Â¶ ¡£¸Ã¹«Ë¾³Æ£¬ÆäÕýÔÚÓ뾯·½ºÏ×÷¶Ô´ËÊÂÕ¹¿ªÊӲ죬¶øÇҴ˴ι¥»÷²¢Î´Ó°ÏìÆä¼ÓÓÍÊÂÇéºÍÆäËûÒµÎñ ¡£Ä¿Ç°ÉÐÎÞÓйØÀÕË÷Èí¼þÀàÐͺÍÊÜÓ°ÏìµÄÊý¾ÝÀàÐ͵ÄÏêϸÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/jp-japan-airport-refueling-co-discloses-ransomware-incident-refueling-work-not-impacted/


6.ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃËÐû²¼2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý


6.jpg


ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃË (ITU) Ðû²¼ÁË2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý(GCI) ¡£GCIÊÇÒ»¸öÖµµÃÐÅÀµµÄ²Î¿¼£¬ËüºâÁ¿Á˸÷¹úÔÚÈ«Çò²ãÃæÉ϶ÔÍøÂçÄþ¾²µÄͶÈë£¬Éæ¼°Ðí¶àÐÐÒµºÍ²¿ÃÅ ¡£¸ÃÖ¸ÊýÆÀ¹ÀÁË5¸ö·½Ãæ:Ö´·¨´ëÊ©¡¢¼¼Êõ´ëÊ©¡¢×éÖ¯´ëÊ©¡¢ÄÜÁ¦Éú³¤ºÍºÏ×÷£¬È»ºó»ã×ܵóöÒ»¸ö×ۺϷÖÊý ¡£³ÂËßÖ¸³ö£¬2020Äê¸ÃÖ¸ÊýµÄÖÐλÊý±È2018Äê¸ß9.5%£¬ÆäÖÐÃÀ¹úÅÅÃûµÚÒ»£¬Ó¢¹úÓëÉ³ÌØ°¢À­²®²¢Áеڶþ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx