ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖôíÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶
Ðû²¼Ê±¼ä 2023-02-281¡¢ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖôíÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶
¾ÝýÌå2ÔÂ23ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±·¢ÏÖÃÀ¹ú¹ú·À²¿Ò»¸öÅäÖôíÎóµÄ·þÎñÆ÷¡£Ì»Â¶µÄ·þÎñÆ÷ÍйÜÔÚ΢ÈíµÄAzureÔÆÉÏ£¬¹©¹ú·À²¿¿Í»§Ê¹Óá£ËüÊÇÄÚ²¿ÓÊÏäϵͳµÄÒ»²¿ÃÅ£¬´æ´¢ÁËÔ¼3TB µÄÄÚ²¿µç×ÓÓʼþ£¬ÆäÖÐÐí¶àÉæ¼°ÃÀ¹úÌØÖÖ×÷ս˾Á»òUSSOCOM¡£¸ÃÅäÖôíÎóµÄ·þÎñÆ÷ûÓÐÃÜÂ룬ÈκÎÈË¿Éͨ¹ýä¯ÀÀÆ÷·ÃÎÊÓÊÏäÊý¾Ý£¬Ö»ÐèÖªµÀÆäIPµØÖ·¼´¿É¡£¸Ã·þÎñÆ÷ÓÚ2ÔÂ8ÈÕÊ״α»·¢ÏÖ£¬Ä¿Ç°Òѱ»±£»¤ÆðÀ´¡£
https://www.theregister.com/2023/02/23/azure_dod_emails_exposed/
2¡¢LastPass³ÆDevOps¹¤³ÌʦµÄ¼ÒÓõçÄÔ±»Ö²Èë¶ñÒâÈí¼þ
2ÔÂ27ÈÕ±¨µÀ£¬ÃÜÂë¹ÜÀíÈí¼þ¹«Ë¾LastPass³ÆºÚ¿ÍÔÚµÚ¶þ´Î¹¥»÷ÖÐÈëÇÖÁËDevOps¹¤³ÌʦµÄ¸öÈ˼ÒÓüÆËã»ú¡£µÚ¶þ´Î¹¥»÷µÄʱ¼ä¿ç¶È´Ó2022Äê8ÔÂ12ÈÕµ½10ÔÂ26ÈÕ£¬¹¥»÷ÕßѸËÙµØÀûÓÃÁ˵ÚÒ»´ÎʼþÖÐ鶵ÄÐÅÏ¢£¬ÔÚLastPassÍŶÓÍê³ÉÖØÖÃ֮ǰ´ÓÔÆ´æ´¢×ÊÔ´ÖÐÇÔÈ¡Êý¾Ý¡£È¡Ö¤·¢ÏÖ£¬Ò»ÃûDevOps¹¤³ÌʦµÄ¼ÒÍ¥µçÄÔ±»ÈëÇÖ£¬¹¥»÷ÕßÀûÓõÚÈý·½Ã½ÌåÈí¼þ°üÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬ÔÚ¸ÃÔ±¹¤µÄ¸öÈ˵çÄÔÉÏÖ²ÈëÁ˼üÅ̼Ǽ¶ñÒâÈí¼þ£¬²¢²¶×½ÁËËûµÄÖ÷ÃÜÂë¡£
https://www.securityweek.com/lastpass-says-devops-engineer-home-computer-hacked/
3¡¢News Corp͸¶ºÚ¿ÍÁ½ÄêÇ°¾ÍÒÑ»ñµÃÆäϵͳµÄ·ÃÎÊȨ
¾Ý2ÔÂ24ÈÕ±¨µÀ£¬¹«¹²´«Ã½ºÍ³öÊ鹫˾News Corp͸¶£¬ºÚ¿ÍÔÚÁ½ÄêÇ°Ê״λñµÃÁËÆäϵͳµÄ·ÃÎÊȨÏÞ¡£¾ÝÊӲ죬ÔÚ2020Äê2ÔÂÖÁ2022Äê1Ô£¬Î´¾ÊÚȨµÄµÚÈý·½´Ó±»Ó°ÏìϵͳµÄÔ±¹¤ÕË»§ÖлñÈ¡Á˲¿ÃÅÉÌÒµÎļþºÍµç×ÓÓʼþ£¬ÆäÖÐһЩ°üÂÞ¸öÈËÐÅÏ¢£¬ÈçÀ¨ÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ¡£´Ë´ÎʼþÓ°ÏìÁ˸ù«Ë¾µÄ´ó²¿ÃÅÒµÎñ£¬°üÂÞ¡¶»ª¶û½ÖÈÕ±¨¡·ºÍ¡¶Å¦Ô¼Óʱ¨¡·µÈ¡£
https://www.bleepingcomputer.com/news/security/news-corp-says-state-hackers-were-on-its-network-for-two-years/
4¡¢JamfÅû¶ÀûÓõÁ°æÓ¦ÓÃÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯
JamfÔÚ2ÔÂ23ÈÕÅû¶ÁËÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËľÂí»¯AppleÊÓƵ±à¼Èí¼þFinal Cut Pro£¬À´·Ö·¢XMRigÍÚ¿ó·¨Ê½¡£Ñо¿ÈËÔ±ÉîÈë·ÖÎöºó·¢ÏÖ£¬¸Ã¶ñÒâÈí¼þ¾ÀúÁËÈý¸öÖ÷ÒªµÄÉú³¤½×¶Î£¬Ã¿¸ö½×¶Î¶¼Ìí¼ÓÁ˸üÅÓ´óµÄÈƹý¼¼Êõ¡£´ÓµÚÒ»´ú¿ªÊ¼£¬¸Ã¶ñÒâÈí¼þ¾ÍʹÓÃi2pÍøÂç²ã½øÐÐC2ͨÐÅÒÔÄäÃû»¯Á÷Á¿£»µÚ¶þ´úÔÚ2021Äê4ÔÂÖÁ10Ô·ºÆ𣬶ÔÒþ²ØÔÚÓ¦Ó÷¨Ê½°üÖеĿÉÖ´ÐÐÎļþ½øÐÐbase 64±àÂ룻µÚÈý´ú·ºÆðÓÚ2021Äê10Ô£¬Ëü¿ÉÒÔÔÚSpotlightÉϽ«Æä¶ñÒâ½ø³Ìαװ³Éϵͳ½ø³ÌÀ´Èƹý¼ì²â¡£
https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/
5¡¢ºÚ¿ÍÍÅ»ïCH01Éù³ÆÆäÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾
ýÌå2ÔÂ26Èճƣ¬ºÚ¿ÍÍÅ»ïCH01ÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾£¬¶øAnonymousҲͨ¹ýÆäTwitter·ÖÏíÁËÕâÒ»ÏûÏ¢¡£¹¥»÷·¢ÉúÔÚÎÚ¿ËÀ¼Õ½ÕùµÄÖÜÄê¼ÍÄîÈÕ£¬Ä¿Ç°Éв»Çå³þ±»¹¥»÷ÍøÕ¾¼òÖ±ÇÐÊýÁ¿£¬ÒÔ¼°ºÚ¿ÍÊÇÈçºÎ¹¥»÷µÄ¡£´ËÍ⣬AnonymousÔÚ2ÔÂ23ÈÕ»¹ÈëÇÖÁ˶íÂÞ˹µÄ¶à¸ö¹ã²¥µç̨£¬°üÂÞYumor FM¡¢Relax FM¡¢Comedy Radio¡¢Humor FMºÍAvatoradio£¬²¢Ðû²¼¼ÙµÄ¿ÕÏ®¾¯±¨¡£
https://securityaffairs.com/142713/hacktivism/ch01-defaced-russian-websites.html
6¡¢Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÆä¼Ó¹¤³§ÔÝʱ¹Ø±Õ
ýÌå2ÔÂ26Èճƣ¬Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÁËÀÕË÷¹¥»÷¡£¶¼ÀÖÊÇÊÀ½çÉÏ×î´óµÄË®¹ûºÍÊß²ËÉú²úÉÌÖ®Ò»£¬ÔÚÈ«Çò75¸ö¹ú¼Ò/µØÓò¹©Ó¦Ô¼300ÖÖ²úÎ2021ÄêµÄÊÕÈëΪ65ÒÚÃÀÔª¡£¸Ã¹«Ë¾³ÆÆäÔâµ½ÀÕË÷¹¥»÷Õý³£ÔËÓªÊܵ½Ó°Ï죬µ«ÊÇûÓÐÌṩÓйع¥»÷µÄÏêϸÐÅÏ¢¡£·¢Ë͸øÉ̵êµÄ±ã¼ãÌáµ½£¬¸Ã¹«Ë¾±»ÆȹرÕÆäÔÚ±±ÃÀµÄϵͳÒÔÍ£Ö¹¹¥»÷¡£Ä¿Ç°Éв»Çå³þ¹¥»÷ÕßÊÇ·ñÒÑ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÊý¾Ý¡£
https://securityaffairs.com/142726/cyber-crime/dole-food-company-ransomware-attack.html