º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-281¡¢º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
¾ÝýÌå3ÔÂ23ÈÕ±¨µÀ£¬º«¹ú×î´óÃÀ×±ÁìÓòµÄÉ罻ƽ̨PowderRoomÒòÅäÖôíÎóй¶½ü100ÍòÓû§µÄÐÅÏ¢¡£12ÔÂ15ÈÕ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸ö¿É¹ûÈ»·ÃÎʵÄÊý¾Ý¿â£¬ÆäÖаüÂÞ½ü140GBÊý¾Ý¡£Éæ¼°Óû§ÐÕÃû¡¢µç»°ºÅÂëºÍ¼ÒÍ¥µØÖ·£¬ÒÔ¼°ÓÃÓÚ·ÃÎʸÃÍøÕ¾µÄÓû§É豸ºÍä¯ÀÀÆ÷µÄÔªÊý¾Ý¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁËÒ»°ÙÍò¸öÓÃÓÚÉí·ÝÑéÖ¤ºÍ·ÃÎÊÍøÕ¾µÄÁîÅÆ¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾ÝÖ´ÐеöÓã¹¥»÷ºÍÉ豸½Ù³Ö£¬½øÐÐδ¾ÊÚȨµÄ¹ºÖûò¸ú×ÙÓû§¡£Ä¿Ç°£¬Ð¹Â¶µÄÊý¾ÝÒѾ±»±£»¤ÆðÀ´¡£
https://cybernews.com/security/powder-room-data-leak/
2¡¢²¨¶àÀè¸÷PRASAÔâµ½Vice SocietyÍÅ»ïµÄÀÕË÷¹¥»÷
ýÌå3ÔÂ26Èճƣ¬²¨¶àÀè¸÷¶É²ÛºÍÏÂË®µÀ¹ÜÀí¾Ö(PRASA)Ôâµ½ÁËVice SocietyµÄÀÕË÷¹¥»÷¡£¸Ã¹¥»÷ÓÚ3ÔÂ19ÈÕ±»Åû¶£¬¹¥»÷Õß¿ÉÒÔ·ÃÎʿͻ§ºÍÔ±¹¤ÐÅÏ¢¡£¸Ã»ú¹¹Ö¸³ö£¬ÆäÔÚ²¨¶àÀè¸÷¹ÜÀíµÄÒªº¦»ù´¡ÉèÊ©µÄÔËÓª²¢Î´Êܵ½Ó°Ï졣Ŀǰ£¬¸Ã»ú¹¹ÉÐδ͸¶¹¥»÷±³ºóµÄ×éÖ¯Ãû³Æ£¬µ«Vice SocietyÍÅ»ïÒѽ«ÆäÌí¼Óµ½ÍøÕ¾µÄ±»¹¥»÷Ãûµ¥ÖС£¸ÃÀÕË÷ÍÅ»ï¹ûÈ»ÁËÊÜÓ°Ïì¸öÈ˵ϤÕÕ¡¢¼ÝÕÕºÍÆäËüÎļþ¡£PRASAĿǰÕýÔÚFBIºÍCISAµÄ×ÊÖúÏÂÊÓ²ì´Ë´Î¹¥»÷¡£
https://securityaffairs.com/144022/hacking/puerto-rico-aqueduct-and-sewer-authority-attack.html
3¡¢PyPI¶ñÒâ°üonyxproxyʹÓÃUnicode×ÖÌåÀ´Èƹý¼ì²â
PhylumÓÚ3ÔÂ22ÈÕ͸¶Æä×î½üÔÚPyPIÉϼì²âµ½Ò»¸ö¶ñÒâ°üonyxproxy£¬Ö¼ÔÚÊÕ¼¯ºÍй¶ƾ¾ÝµÈÆäËüÃô¸ÐÊý¾Ý¡£¸Ã¶ñÒâ°üÖÐÓÐÒ»¸ösetup.py°ü£¬ÆäÖаüÂÞÊýǧ¸ö»ìºÏʹÓÃUnicode×Ö·ûµÄ¿ÉÒÉ´úÂë×Ö·û´®¡£ËäÈ»ÕâЩÎı¾³ýÁË×ÖÌå²îÒìÖ®Í⣬¿´ÆðÀ´¼¸ºõÊÇÕý³£µÄ£¬µ«¶ÔÓÚPython½âÊÍÆ÷À´Ëµ´æÔÚ¾Þ´óµÄ²îÒ졣ͨ¹ýÕâÖÖ·½Ê½£¬¿ÉÒÔÈÆ¹ý»ùÓÚ×Ö·û´®Æ¥ÅäÉè¼ÆµÄ·ÀÓù´ëÊ©¡£Ä¿Ç°£¬¸Ã¶ñÒâ°üÒÑ´ÓÆ½Ì¨ÉÏɾ³ý¡£
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
4¡¢IntezerÅû¶Bitter APTÍÅ»ïÕë¶ÔºËÄÜÐÐÒµµÄ¹¥»÷»î¶¯
IntezerÔÚ3ÔÂ24ÈÕÅû¶ÁËÓëÕë¶ÔÑÇÌ«µØÓòµÄBitter APTÏà¹ØµÄ¹¥»÷»î¶¯¡£´Ë´Î»î¶¯ÖУ¬Bitterαװ³É¼ª¶û¼ªË¹Ë¹Ì¹´óʹ¹Ý£¬ÏòÓëºËÄÜÁìÓòÏà¹ØµÄ¶à¼Ò¹«Ë¾ºÍѧÊõÈËÔ±·¢Ë͵ç×ÓÓʼþ¡£ÓʼþÑûÇëÊÕ¼þÈ˼ÓÈëÓëËûÃÇÏà¹ØµÄÖ÷Ìâ»áÒ飬²¢ÓÕʹÊÕ¼þÈËÏÂÔØ²¢´ò¿ª°üÂÞMicrosoft±àÒëµÄHTML×ÊÖúÎļþ(CHM)»ò¶ñÒâExcelÎĵµµÄRARÎļþ¡£Èç¹ûʹÓÃCHM£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇMSI»òPowerShellÎļþ£¬Èç¹ûʹÓÃExcelÎĵµ£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇEXEÎļþ¡£Intezer³Æ£¬¹¥»÷Õß¿ÉÄܸüϲ»¶CHM payload¡£
https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/
5¡¢WordPressÐÞ¸´WooCommerce²å¼þÖпɽٳÖÍøÕ¾µÄ©¶´
¾Ý3ÔÂ23ÈÕ±¨µÀ£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÁè¼Ý50Íò¸öÔËÐÐWooCommerceÖ§¸¶²å¼þµÄÍøÕ¾ÉÏ×Ô¶¯°²×°ÁËÒ»¸ö²¹¶¡¡£¸Ã²¹¶¡ÐÞ¸´ÁËÒ»¸ö¿É±»ÓÃÀ´»ñµÃÄ¿±êÉ̵êµÄ¹ÜÀíÔ±·ÃÎÊȨÏ޵ĩ¶´£¬Ó°ÏìÁ˲å¼þ°æ±¾4.8.0µ½5.6.1¡£Ñо¿ÈËÔ±³Æ£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÀûÓøÃ©¶´Ã°³ä¹ÜÀíÔ±²¢ÍêÈ«½Ó¹ÜÍøÕ¾£¬¶øÎÞÐèÓëÓû§½»»¥¡£ÓÉÓÚ²»ÐèÒªÉí·ÝÑéÖ¤£¬Òò´Ë¸Ã©¶´ºÜ¿ÉÄܻᱻ´ó¹æÄ£ÀûÓ᣸øüÐÂÏÖÕýÔÚ×Ô¶¯Íƹ㵽¾¡¿ÉÄܶàµÄÉ̵ꡣ
https://www.bleepingcomputer.com/news/security/wordpress-force-patching-woocommerce-plugin-with-500k-installs/
6¡¢Î¢ÈíÐû²¼¼ì²âOutlook©¶´CVE-2023-23397ÀûÓõÄÖ¸ÄÏ
3ÔÂ24ÈÕ£¬Î¢ÈíÐû²¼Á˹ØÓÚ¼ì²âºÍÊÓ²ìÀûÓÃOutlook©¶´CVE-2023-23397¹¥»÷»î¶¯µÄÖ¸ÄÏ¡£ÕâÊÇÒ»¸öÌáȨ©¶´£¬¹¥»÷ÕßÄܹ»ÔÚNTLMÖмÌÁãµã»÷¹¥»÷ÖÐÎÞÐèÓû§½»»¥¼´¿ÉÇÔÈ¡NTLM hash¡£¸Ã©¶´Òѱ»ÀûÓã¬ÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£Ö¸ÄÏÌṩÁË©¶´¸ÅÊö¡¢Â©¶´µÄÀûÓó¡¾°¡¢ÔÚ¹¥»÷ÖÐÊӲ쵽µÄÀûÓû¡¢È·¶¨Ò»¸ö×éÖ¯ÊÇ·ñÊǸé¶´µÄÄ¿±ê»ò±»¹¥»÷µÄ¼¼ÊõÒÔ¼°·ÀÓù´ËÀ๥»÷µÄ»º½â´ëÊ©¡£
https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/