°Ä´óÀûÑÇACY֤ȯÅäÖôíÎóй¶Áè¼Ý60GBµÄÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2022-06-06

1¡¢°Ä´óÀûÑÇACY֤ȯÅäÖôíÎóй¶Áè¼Ý60GBµÄÓû§Êý¾Ý


ýÌå6ÔÂ4Èճƣ¬°Ä´óÀûÑÇACY SecuritiesÊý¾Ý¿âÅäÖôíÎó£¬Ð¹Â¶Áè¼Ý60 GBµÄÊý¾Ý¡£¸ÃÊý¾Ý¿â°üÂÞ2020Äê2ÔÂÒÔÀ´µÄÈÕÖ¾£¬¶øÇÒÿÃ붼ÔÚ¸üÐÂ×îеÄÊý¾Ý¼¯£¬Éæ¼°ÐÕÃû¡¢ÓÊÕþ±àÂë¡¢µØÖ·¡¢ÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÃÜÂëºÍ½»Ò×ÐÅÏ¢µÈ¡£´ó¶àÊýÊÜÓ°ÏìÓû§Î»ÓÚÓ¡¶È¡¢Î÷°àÑÀ¡¢°ÍÎ÷¡¢¶íÂÞ˹¡¢°Ä´óÀûÑǺÍÂÞÂíÄáÑǵȹú¡£Ñо¿ÈËÔ±¶à´ÎÁªÏµACYºó£¬¸Ã¹«Ë¾»¨·Ñ¼¸Ììʱ¼ä½â¾öÁËÕâ¸öÎÊÌ⣬²¢ÌåÏָ÷þÎñÆ÷ÊÇÎ޹ؽôÒªµÄ·þÎñÆ÷¡£


https://www.hackread.com/australian-trading-giant-acy-securities-exposed-data/


2¡¢GitLabÐû²¼¶à¸ö°æ±¾µÄÄþ¾²¸üУ¬×ܼÆÐÞ¸´8¸ö©¶´


¾ÝýÌå6ÔÂ3ÈÕ±¨µÀ£¬GitLabÐû²¼ÁËÆä²úÎï¶à¸ö°æ±¾µÄÄþ¾²¸üУ¬×ܼÆÐÞ¸´8¸ö©¶´¡£ÆäÖÐ×îΪÑÏÖصÄÊǿɱ»ÓÃÀ´½Ó¹ÜÕÊ»§µÄ©¶´£¨CVE-2022-1680£©£¬CVSSÆÀ·ÖΪ9.9£¬¸Ã¹«Ë¾ÌåÏÖÔÚÌض¨ÅäÖõÄʵÀýÉÏ¿ÉÀûÓø鶴£¬ÕÊ»§Ê¹ÓÃË«ÒòËØÉí·ÝÑéÖ¤(2FA)¿ÉÒÔ¼õÉÙÀÄÓõĿÉÄÜÐÔ¡£´ËÍ⣬»¹ÐÞ¸´ÁËJira¼¯³É×é¼þÖеĿçÕ¾½Å±¾Â©¶´£¨CVE-2022-1940£©ºÍÒòΪȱÉÙÊäÈëÑéÖ¤µ¼ÖµÄXSS©¶´£¨CVE-2022-1948£©µÈ¡£¸Ã¹«Ë¾½¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾¡£


https://securityaffairs.co/wordpress/131928/hacking/gitlab-critical-account-take-over.html


3¡¢KasperskyÅû¶ºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú


6ÔÂ2ÈÕ£¬KasperskyÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú¡£¸ÃÍÅ»ï×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Ö÷ÒªÕë¶ÔÍâ½»»ú¹¹¡¢Ñ§Êõ½ç¡¢¹ú·À¡¢ÎïÁ÷ºÍµçÐÅÐÐÒµµÈ¡£Ôڴ˴λÖУ¬¹¥»÷ÕßʹÓÃÁËÃûΪWinDealerµÄ¶ñÒâWindows¹¤¾ß¡£ÕâÊÇÒ»¸öÄ£¿é»¯µÄ¶ñÒâÈí¼þƽ̨£¬Í¨¹ý²éÕÒÓ²±àÂëģʽÀ´¶¨Î»Æä×ÊÔ´ÖеÄǶÈëʽDLLÎļþ²¢Ö´ÐУ¬È»ºóʹÓÃ10×Ö½ÚXORÃÜÔ¿¶ÔÆä½øÐнâÂë¡£ÔÚ¹ýÈ¥£¬¸ÃÍÅ»ïÖ÷ÒªÀûÓÃË®¿Ó¹¥»÷À´Ñ¬È¾ËûÃǵÄÄ¿±ê¡£


https://securelist.com/windealer-dealing-on-the-side/105946/


4¡¢LockBitÉù³Æ¶Ô¸»Ê¿¿µÄ«Î÷¸ç·Ö¹«Ë¾Ôâµ½µÄ¹¥»÷ÂôÁ¦


¾Ý6ÔÂ2ÈÕ±¨µÀ£¬µç×ÓÖÆÔìÉ̸»Ê¿¿µ³ÆÆäλÓÚÄ«Î÷¸çµÄÒ»¼ÒÉú²ú¹¤³§ÔÚ5ÔÂÏÂÑ®Ôâµ½ÁËÀÕË÷¹¥»÷¡£±»¹¥»÷µÄ¹¤³§Î»ÓÚÄ«Î÷¸çµÙ»ªÄÉ£¬ÊÇÒ»¸öÕ½ÂÔÉèÊ©£¬×÷ΪÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖÝÖØÒªµÄµç×Ó²úÎïÏû·ÑÕߵĹ©Ó¦ÖÐÐÄ¡£ÀÕË÷ÍÅ»ïLockBitÌåÏÖÆäÔÚ5ÔÂ31ÈÕÌᳫÁ˹¥»÷£¬Èç¹û¸»Ê¿¿µ²»ÔÚ6ÔÂ11ÈÕ֮ǰ¸¶Êê½ð£¬ËûÃǽ«¹ûÈ»ÇÔÈ¡µÄÊý¾Ý¡£ÕâÒâζ×Å̸ÅпÉÄÜÉÐδ½áÊø£¬¹¥»÷ÕßÈÔÏ£ÍûÓë¸Ã¹«Ë¾¸æ¿¢Ð­Òé¡£


https://www.bleepingcomputer.com/news/security/foxconn-confirms-ransomware-attack-disrupted-production-in-mexico/


5¡¢Î¢Èí·¢ÏÖÒÁÀÊPoloniumÕë¶ÔÒÔÉ«ÁеÄÓã²æʽµöÓã¹¥»÷


6ÔÂ2ÈÕ£¬Î¢ÈíÍþвÇ鱨ÖÐÐÄÐû²¼Á˹ØÓÚÒÁÀÊÍÅ»ïPoloniumÓã²æʽµöÓã¹¥»÷µÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬ÔÚ¹ýÈ¥µÄÈý¸öÔÂÀPOLONIUMÒѾ­¹¥»÷ÁË20¶à¸öÒÔÉ«ÁеÄ×éÖ¯ºÍÒ»¸öÀè°ÍÄÛµÄ×éÖ¯£¬Éæ¼°ÖÆÔìÒµ¡¢ITÐÐÒµºÍÁйú·À¹¤Òµ¡£¸ÃÍŻﴴ½¨ºÍʹÓÃÁ˺Ϸ¨µÄOneDriveÕÊ»§£¬È»ºó½«ÕâЩÕÊ»§ÓÃ×÷C2À´Ö´Ðв¿ÃŹ¥»÷¡£Ä¿Ç°£¬¸Ã»î¶¯Òѱ»Î¢ÈíÊý×Ö·¸×ﲿÃÅ(DCU)ÀÖ³É×èÖ¹£¬×ܹ²¹Ø±ÕÁ˴˴λÖÐʹÓõÄ41¸öÓÃÀ´½¨Á¢C2ͨÐŵÄÓò¡£


https://www.microsoft.com/security/blog/2022/06/02/exposing-polonium-activity-and-infrastructure-targeting-israeli-organizations/


6¡¢Ñо¿ÈËÔ±³ÆÆäÔÚ24931¸öÍøÕ¾Éϼì²âµ½47337¸ö¶ñÒâ²å¼þ


ýÌå6ÔÂ1Èճƣ¬Ñо¿ÈËÔ±ÒÑÔÚ24931¸öÍøÕ¾Éϼì²âµ½ÁË47337¸ö¶ñÒâ²å¼þ£¬ÆäÖеÄ3685¸ö²å¼þÔںϷ¨Êг¡ÉϳöÊÛ¡£Ñо¿ÈËÔ±ÌåÏÖ£¬¹¥»÷ÕßÖ÷ÒªÊÇð³äºÏ·¨²å¼þµÄ¿ª·¢Õߣ¬Í¨¹ý·Ö·¢µÁ°æ²å¼þÀ´Á÷´«¶ñÒâÈí¼þ¡£¸ÃÑо¿·ÖÎöÁË×Ô2012ÄêÒÔÀ´°²×°ÔÚ410122̨Web·þÎñÆ÷ÖеÄWordPress²å¼þ£¬·¢ÏÖ½üÄêÀ´ÍøÕ¾É϶ñÒâ²å¼þµÄÊýÁ¿Ò»Ö±ÔÚÔö¼Ó£¬´ËÀà»î¶¯ÔÚ2020Äê3Ôµ½´ïá۷壬ÇÒÕâ8ÄêÀ´°²×°µÄ¶ñÒâ²å¼þÖÐÓÐ94%ÖÁ½ñÈÔ´¦Óڻ״̬¡£


https://thehackernews.com/2022/06/yoda-tool-found-47000-malicious.html