MicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ»ìÏý¹¥»÷£»ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃËÐû²¼2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý
Ðû²¼Ê±¼ä 2021-07-011.MicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ»ìÏý¹¥»÷
Ñо¿ÈËÔ±·¢ÏÖMicrosoftµÄHaloÓÎÏ·¿ª·¢ÍøÕ¾Ôâµ½ÒÀÀµ¹ØÏµ»ìÏý¹¥»÷¡£Ricardo Iramar dos SantosÔÚÉó¼Æ¿ªÔ´°üSymphonyElectronʱ·¢ÏÖÁ˸ðüʹÓõÄÒ»¸ö¿ÉÒɵÄÒÀÀµÏîswift-search£¬²¢²»´æÔÚÓÚ¹«¹²npmjs.com×¢²á±íÖС£Ñо¿ÈËÔ±½«°ü·¢Ë͵½npm×¢²á±íºóÊÕµ½ÁËÀ´×Ô΢Èí·þÎñÆ÷µÄping-back£¬·ÃÎÊhttps://51.141.173.203ʱ£¬SSLÖ¤ÊéµÄCN×Ö¶ÎÖ¸Ïò*.test.svc.halowaypoint.com£¬Õâ½øÒ»²½Ö¤Ã÷ÁË΢Èí·þÎñÆ÷Ôâµ½ÁËÒÀÀµ»ìÏý¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsofts-halo-dev-site-breached-using-dependency-hijacking/
2.Ö´·¨²¿ÃŲé»ñË«ÖØ¼ÓÃÜ·þÎñDoubleVPNµÄ·þÎñÆ÷ºÍÈÕÖ¾
2021Äê6ÔÂ29ÈÕ£¬¶à¹úÖ´·¨²¿ÃÅÀֳɲé»ñÁ˶íÂÞ˹DoubleVPNµÄ·þÎñÆ÷¡£DoubleVPN¿É¶ÔÊý¾Ý½øÐÐË«ÖØ¡¢ÈýÖØÉõÖÁËÄÖØ¼ÓÃÜ£¬Í¨³£±»¹¥»÷ÕßÓÃÀ´ÔÚÖ´ÐжñÒâ»î¶¯Ê±Èƹý¼ì²â¡£´Ë´ÎÐж¯ÊÇÓɵ¹úBKA¡¢ºÉÀ¼ÕþÖξ֡¢Áª°îÊÓ²ì¾Ö¡¢Ó¢¹ú¹ú¼Ò·¸×ï¾Ö¡¢ÃÀ¹úÌØÇھֺͼÓÄôó»Ê¼ÒÆï¾¯µÈ×éÖ¯ÁªºÏ·¢¶¯µÄ£¬ÀֳɻñµÃÁËDoubleVPN·þÎñÆ÷µÄ·ÃÎÊȨ£¬²¢²é»ñÁËÆäËùÓпͻ§µÄ¸öÈËÐÅÏ¢¡¢ÈÕÖ¾ºÍͳ¼ÆÊý¾Ý¡£Å·ÖÞÐ̾¯×éÖ¯ÌåÏÖÎÞ·¨·ÖÏí¸ü¶àϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/
3.FacebookÆðËß4¸öÔ½ÄÏºÚ¿Í½Ù³ÖÆä¶à¸öÓû§µÄÕË»§
FacebookÆðËßÁË4¸öÔ½ÄÏºÚ¿Í½Ù³ÖÆäÓû§ÕË»§¡£Facebook³ÆÕâÕâЩºÚ¿ÍÀûÓûỰ͵ÇÔ»òcookie͵ÇÔ¼¼Êõ·ÃÎʶà¸ö¹ã¸æºÍÓªÏú¹«Ë¾Ô±¹¤µÄFacebookÕÊ»§£¬²¢Ê¹Óñ»ºÚµÄÕÊ»§Ðû´«ÃûΪAd Manager for FacebookµÄ¶ñÒâAndroidÓ¦Ó᣸ÃÓ¦Ó÷¨Ê½ÍйÜÔÚ¹Ù·½Google PlayÉ̵êÖУ¬ÔÚ2020Äê12ÔÂÖÁ2021Äê5ÔÂÒѱ»°²×°ÁË10000¶à´Î¡£Facebookͬʱ»¹ÆðËßÁ˼ÓÀû¸£ÄáÑǹ«Ë¾N&J USA Incorporated£¬¸Ã¹«Ë¾ÔÚFacebookÉÏͶ·ÅÁËÓйطþ×°¡¢ÊÖ±íºÍÍæ¾ßµÄÕ©Æ¹ã¸æ¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/facebook-sues-four-vietnamese-nationals-for-account-hijacks/
4.Ñо¿ÈËÔ±Åû¶Google Compute EngineδÐÞ¸´µÄ©¶´
Ñо¿ÈËÔ±Åû¶ÁËÒ»¸öÓ°ÏìGoogle Compute EngineµÄδÐÞ¸´µÄ©¶´¡£Google Compute Engine(GCE)ÊÇGoogle Cloud PlatformµÄ»ù´¡ÉèÊ©¼´·þÎñ(IaaS) ×é¼þ£¬Ê¹Óû§Äܹ»°´Ðè´´½¨ºÍÆô¶¯ÐéÄâ»ú (VM)¡£¸Ã©¶´ÊÇÓÉÓÚISC DHCP¿Í»§¶ËʹÓÃÈõµÄÎ±Ëæ»úÊýµÄµ¼Öµģ¬¹¥»÷ÕßÀûÓÃÕâ¸ö©¶´£¬¿ÉÒÔͨ¹ýSSHÊÚÓè×Ô¼º·ÃÎÊȨÏÞ£¬È»ºóÒÔrootÓû§Éí·ÝµÇ¼¡£¹È¸èÓÚ2020Äê9ÔÂ27ÈÕ»ñϤ¸ÃÎÊÌ⣬µ«ÖÁ½ñÉÐδÐû²¼²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/06/unpatched-virtual-machine-takeover-bug.html
5.ÈÕ±¾¹«Ë¾Airport Refueling³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷
ÈÕ±¾Îª·É»úÌṩ¼ÓÓÍ·þÎñµÄJapan Airport Refueling³ÆÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£¹¥»÷·¢ÉúÔÚ2021Äê6ÔÂ21ÈÕÁ賿£¬¹«Ë¾ÄÚ²¿µÄÍøÂçϵͳ·¢Éú¹ÊÕÏ¡£ÊÓ²ì֤ʵÊÇÀÕË÷Èí¼þ¹¥»÷£¬¸Ã¹«Ë¾ÊÕµ½Á˽âÃÜ·þÎñÆ÷Êý¾ÝµÄÊê½ðÒªÇ󣬵«ËƺõûÓÐÈκÎÊý¾Ý±»Ð¹Â¶¡£¸Ã¹«Ë¾³Æ£¬ÆäÕýÔÚÓ뾯·½ºÏ×÷¶Ô´ËÊÂÕ¹¿ªÊӲ죬¶øÇҴ˴ι¥»÷²¢Î´Ó°ÏìÆä¼ÓÓÍÊÂÇéºÍÆäËûÒµÎñ¡£Ä¿Ç°ÉÐÎÞÓйØÀÕË÷Èí¼þÀàÐͺÍÊÜÓ°ÏìµÄÊý¾ÝÀàÐ͵ÄÏêϸÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/jp-japan-airport-refueling-co-discloses-ransomware-incident-refueling-work-not-impacted/
6.ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃËÐû²¼2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý
ÁªºÏ¹ú¹ú¼ÊµçÐÅÁªÃË (ITU) Ðû²¼ÁË2020ÄêÈ«ÇòÍøÂçÄþ¾²Ö¸Êý(GCI)¡£GCIÊÇÒ»¸öÖµµÃÐÅÀµµÄ²Î¿¼£¬ËüºâÁ¿Á˸÷¹úÔÚÈ«Çò²ãÃæÉ϶ÔÍøÂçÄþ¾²µÄͶÈë£¬Éæ¼°Ðí¶àÐÐÒµºÍ²¿ÃÅ¡£¸ÃÖ¸ÊýÆÀ¹ÀÁË5¸ö·½Ãæ:Ö´·¨´ëÊ©¡¢¼¼Êõ´ëÊ©¡¢×éÖ¯´ëÊ©¡¢ÄÜÁ¦Éú³¤ºÍºÏ×÷£¬È»ºó»ã×ܵóöÒ»¸ö×ۺϷÖÊý¡£³ÂËßÖ¸³ö£¬2020Äê¸ÃÖ¸ÊýµÄÖÐλÊý±È2018Äê¸ß9.5%£¬ÆäÖÐÃÀ¹úÅÅÃûµÚÒ»£¬Ó¢¹úÓëÉ³ÌØ°¢À²®²¢Áеڶþ¡£
ÔÎÄÁ´½Ó£º
https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx