ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖôíÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶

Ðû²¼Ê±¼ä 2023-02-28

1¡¢ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖôíÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶


¾ÝýÌå2ÔÂ23ÈÕ±¨µÀ £¬Ñо¿ÈËÔ±·¢ÏÖÃÀ¹ú¹ú·À²¿Ò»¸öÅäÖôíÎóµÄ·þÎñÆ÷¡£Ì»Â¶µÄ·þÎñÆ÷ÍйÜÔÚ΢ÈíµÄAzureÔÆÉÏ £¬¹©¹ú·À²¿¿Í»§Ê¹Óá£ËüÊÇÄÚ²¿ÓÊÏäϵͳµÄÒ»²¿ÃÅ £¬´æ´¢ÁËÔ¼3TB µÄÄÚ²¿µç×ÓÓʼþ £¬ÆäÖÐÐí¶àÉæ¼°ÃÀ¹úÌØÖÖ×÷ս˾Á»òUSSOCOM¡£¸ÃÅäÖôíÎóµÄ·þÎñÆ÷ûÓÐÃÜÂë £¬ÈκÎÈË¿Éͨ¹ýä¯ÀÀÆ÷·ÃÎÊÓÊÏäÊý¾Ý £¬Ö»ÐèÖªµÀÆäIPµØÖ·¼´¿É¡£¸Ã·þÎñÆ÷ÓÚ2ÔÂ8ÈÕÊ״α»·¢ÏÖ £¬Ä¿Ç°Òѱ»±£»¤ÆðÀ´¡£


https://www.theregister.com/2023/02/23/azure_dod_emails_exposed/


2¡¢LastPass³ÆDevOps¹¤³ÌʦµÄ¼ÒÓõçÄÔ±»Ö²Èë¶ñÒâÈí¼þ


2ÔÂ27ÈÕ±¨µÀ £¬ÃÜÂë¹ÜÀíÈí¼þ¹«Ë¾LastPass³ÆºÚ¿ÍÔÚµÚ¶þ´Î¹¥»÷ÖÐÈëÇÖÁËDevOps¹¤³ÌʦµÄ¸öÈ˼ÒÓüÆËã»ú¡£µÚ¶þ´Î¹¥»÷µÄʱ¼ä¿ç¶È´Ó2022Äê8ÔÂ12ÈÕµ½10ÔÂ26ÈÕ £¬¹¥»÷ÕßѸËÙµØÀûÓÃÁ˵ÚÒ»´ÎʼþÖÐ鶵ÄÐÅÏ¢ £¬ÔÚLastPassÍŶÓÍê³ÉÖØÖÃ֮ǰ´ÓÔÆ´æ´¢×ÊÔ´ÖÐÇÔÈ¡Êý¾Ý¡£È¡Ö¤·¢ÏÖ £¬Ò»ÃûDevOps¹¤³ÌʦµÄ¼ÒÍ¥µçÄÔ±»ÈëÇÖ £¬¹¥»÷ÕßÀûÓõÚÈý·½Ã½ÌåÈí¼þ°üÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´ £¬ÔÚ¸ÃÔ±¹¤µÄ¸öÈ˵çÄÔÉÏÖ²ÈëÁ˼üÅ̼Ǽ¶ñÒâÈí¼þ £¬²¢²¶×½ÁËËûµÄÖ÷ÃÜÂë¡£


https://www.securityweek.com/lastpass-says-devops-engineer-home-computer-hacked/


3¡¢News Corp͸¶ºÚ¿ÍÁ½ÄêÇ°¾ÍÒÑ»ñµÃÆäϵͳµÄ·ÃÎÊȨ


¾Ý2ÔÂ24ÈÕ±¨µÀ £¬¹«¹²´«Ã½ºÍ³öÊ鹫˾News Corp͸¶ £¬ºÚ¿ÍÔÚÁ½ÄêÇ°Ê״λñµÃÁËÆäϵͳµÄ·ÃÎÊȨÏÞ¡£¾ÝÊÓ²ì £¬ÔÚ2020Äê2ÔÂÖÁ2022Äê1Ô £¬Î´¾­ÊÚȨµÄµÚÈý·½´Ó±»Ó°ÏìϵͳµÄÔ±¹¤ÕË»§ÖлñÈ¡Á˲¿ÃÅÉÌÒµÎļþºÍµç×ÓÓʼþ £¬ÆäÖÐһЩ°üÂÞ¸öÈËÐÅÏ¢ £¬ÈçÀ¨ÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ¡£´Ë´ÎʼþÓ°ÏìÁ˸ù«Ë¾µÄ´ó²¿ÃÅÒµÎñ £¬°üÂÞ¡¶»ª¶û½ÖÈÕ±¨¡·ºÍ¡¶Å¦Ô¼Óʱ¨¡·µÈ¡£


https://www.bleepingcomputer.com/news/security/news-corp-says-state-hackers-were-on-its-network-for-two-years/


4¡¢JamfÅû¶ÀûÓõÁ°æÓ¦ÓÃÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯


JamfÔÚ2ÔÂ23ÈÕÅû¶ÁËÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËľÂí»¯AppleÊÓƵ±à¼­Èí¼þFinal Cut Pro £¬À´·Ö·¢XMRigÍÚ¿ó·¨Ê½¡£Ñо¿ÈËÔ±ÉîÈë·ÖÎöºó·¢ÏÖ £¬¸Ã¶ñÒâÈí¼þ¾­ÀúÁËÈý¸öÖ÷ÒªµÄÉú³¤½×¶Î £¬Ã¿¸ö½×¶Î¶¼Ìí¼ÓÁ˸üÅÓ´óµÄÈƹý¼¼Êõ¡£´ÓµÚÒ»´ú¿ªÊ¼ £¬¸Ã¶ñÒâÈí¼þ¾ÍʹÓÃi2pÍøÂç²ã½øÐÐC2ͨÐÅÒÔÄäÃû»¯Á÷Á¿£»µÚ¶þ´úÔÚ2021Äê4ÔÂÖÁ10Ô·ºÆ𠣬¶ÔÒþ²ØÔÚÓ¦Ó÷¨Ê½°üÖеĿÉÖ´ÐÐÎļþ½øÐÐbase 64±àÂ룻µÚÈý´ú·ºÆðÓÚ2021Äê10Ô £¬Ëü¿ÉÒÔÔÚSpotlightÉϽ«Æä¶ñÒâ½ø³Ìαװ³Éϵͳ½ø³ÌÀ´Èƹý¼ì²â¡£


https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/


5¡¢ºÚ¿ÍÍÅ»ïCH01Éù³ÆÆäÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾


ýÌå2ÔÂ26ÈÕ³Æ £¬ºÚ¿ÍÍÅ»ïCH01ÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾ £¬¶øAnonymousҲͨ¹ýÆäTwitter·ÖÏíÁËÕâÒ»ÏûÏ¢¡£¹¥»÷·¢ÉúÔÚÎÚ¿ËÀ¼Õ½ÕùµÄÖÜÄê¼ÍÄîÈÕ £¬Ä¿Ç°Éв»Çå³þ±»¹¥»÷ÍøÕ¾¼òÖ±ÇÐÊýÁ¿ £¬ÒÔ¼°ºÚ¿ÍÊÇÈçºÎ¹¥»÷µÄ¡£´ËÍâ £¬AnonymousÔÚ2ÔÂ23ÈÕ»¹ÈëÇÖÁ˶íÂÞ˹µÄ¶à¸ö¹ã²¥µç̨ £¬°üÂÞYumor FM¡¢Relax FM¡¢Comedy Radio¡¢Humor FMºÍAvatoradio £¬²¢Ðû²¼¼ÙµÄ¿ÕÏ®¾¯±¨¡£


https://securityaffairs.com/142713/hacktivism/ch01-defaced-russian-websites.html


6¡¢Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÆä¼Ó¹¤³§ÔÝʱ¹Ø±Õ


ýÌå2ÔÂ26ÈÕ³Æ £¬Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÁËÀÕË÷¹¥»÷¡£¶¼ÀÖÊÇÊÀ½çÉÏ×î´óµÄË®¹ûºÍÊß²ËÉú²úÉÌÖ®Ò» £¬ÔÚÈ«Çò75¸ö¹ú¼Ò/µØÓò¹©Ó¦Ô¼300ÖÖ²úÎï £¬2021ÄêµÄÊÕÈëΪ65ÒÚÃÀÔª¡£¸Ã¹«Ë¾³ÆÆäÔâµ½ÀÕË÷¹¥»÷Õý³£ÔËÓªÊܵ½Ó°Ïì £¬µ«ÊÇûÓÐÌṩÓйع¥»÷µÄÏêϸÐÅÏ¢¡£·¢Ë͸øÉ̵êµÄ±ã¼ãÌáµ½ £¬¸Ã¹«Ë¾±»ÆȹرÕÆäÔÚ±±ÃÀµÄϵͳÒÔÍ£Ö¹¹¥»÷¡£Ä¿Ç°Éв»Çå³þ¹¥»÷ÕßÊÇ·ñÒÑ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÊý¾Ý¡£


https://securityaffairs.com/142726/cyber-crime/dole-food-company-ransomware-attack.html