Atomic WalletÔâµ½ºÚ¿Í¹¥»÷ËðʧÁè¼Ý3500ÍòÃÀÔª
Ðû²¼Ê±¼ä 2023-06-061¡¢Atomic WalletÔâµ½ºÚ¿Í¹¥»÷ËðʧÁè¼Ý3500ÍòÃÀÔª
¾ÝýÌå6ÔÂ4ÈÕ±¨µÀ£¬Atomic WalletÔâµ½¹¥»÷£¬Áè¼Ý3500ÍòÃÀÔªµÄ¼ÓÃÜ»õ±Ò±»µÁ¡£ÕâÊÇÒ»¿îÒƶ¯ºÍ×ÀÃæ¼ÓÃÜÇ®°ü£¬¿É´æ´¢ÖÖÖÖ¼ÓÃÜ»õ±Ò¡£6ÔÂ3ÈÕ£¬¸Ã¹«Ë¾ÔÚTwitterÌåÏÖÊÕµ½ÁËÓйØÇ®°ü±»ºÚµÄ³ÂËߣ¬²¢ÒÑ¿ªÊ¼ÊÓ²ì´ËÎÊÌ⡣Ŀǰ£¬¸ÃÍŶÓÕýÔÚÑо¿¿ÉÄܵĹ¥»÷ý½é£¬²¢ÊÕ¼¯¹ØÓÚ±»¹¥»÷Ä¿±êµÄÐÅÏ¢¡£¿ª·¢ÈËÔ±Ò²¹Ø±ÕÁËÏÂÔØ·þÎñÆ÷get.atomicwallet.io£¬ÒÔ·ÀÖ¹½øÒ»²½µÄÁ÷´«¡£Äþ¾²¹«Ë¾Tay³Æ±»µÁ×ʲú×îÔç½»Ò×ʱ¼äÊÇ6ÔÂ2ÈÕ21:45 UTC¡£
https://www.bleepingcomputer.com/news/security/atomic-wallet-hacks-lead-to-over-35-million-in-crypto-stolen/
2¡¢Ó¢¹úº½¿Õ¡¢BBCºÍBootsµÈ¹«Ë¾Ôâµ½¹¥»÷Êý¾Ýй¶
¾Ý6ÔÂ5ÈÕ±¨µÀ£¬Ó¢¹úº½¿Õ¹«Ë¾(BA)¡¢Ó¢¹ú¹ã²¥¹«Ë¾(BBC)ºÍBootsµÈÖªÃû¹«Ë¾Ôâµ½¹¥»÷£¬Ô±¹¤µÄ¸öÈËÐÅÏ¢¿ÉÄÜй¶¡£BA³ÆÆäÈËΪµ¥ÌṩÉÌZellisÔâµ½¹¥»÷£¬Ô´ÓÚÆäʹÓõĵÄÈí¼þMOVEit£¬µ¼ÖÂÔ¼34000ÃûÔ±¹¤µÄÐÅϢй¶¡£ÓëZellisºÏ×÷µÄÆäËü¹«Ë¾Ò²Ôâµ½Á˹¥»÷£¬°üÂÞÓ¢¹úÖªÃûÁ¬ËøÒ©µêBoots£¬Í¸Â¶Æ䲿ÃÅÔ±¹¤µÄÊý¾Ý¿ÉÄÜй¶¡£´ËÍ⣬¹ã²¥¹«Ë¾BBCҲȷÈÏÁË´Ë´ÎÎ¥¹æʼþ¡£Î¢Èí½«¶ÔMOVEitµÄ¹¥»÷¹éÒòÓÚÒ»¸öÃûΪLace TempestµÄÍŻ
https://www.theguardian.com/technology/2023/jun/05/ba-boots-and-bbc-staff-details-targeted-in-russian-linked-cyber-attack
3¡¢IT¹«Ë¾XplainÔâµ½¹¥»÷Ó°ÏìÈðÊ¿µÄ²¿Ãžü¶ÓºÍ¾¯¾Ö
6ÔÂ4ÈÕ±¨µÀ³Æ£¬IT¹«Ë¾XplainÔâµ½¹¥»÷£¬Ó°ÏìÁËÈðÊ¿¼¸¸öÖݵľ¯²ì¡¢¾ü¶Ó¡¢º£¹ØºÍÁª°î¾¯²ì¾ÖµÈ¡£ÀÕË÷ÍÅ»ïPlayÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢Ðû²¼Á˾ݳÆÀ´×ÔÁª°î¾¯²ì¾Ö(Fedpol)ºÍÁª°îº£¹ØÓë½®ÓòÄþ¾²¾Ö(FOCBS)µÄÊý¾Ý¡£µ±µØýÌå³Æ£¬¹¥»÷ÕßÀûÓÃÁ˸ÃIT¹«Ë¾·þÎñÆ÷ÉϵÄÒ»¸ö©¶´¡£FedpolºÍFOCBS֤ʵÁ˴˴ι¥»÷£¬µ«ÊÔͼµ»¯Õâһʼþ¡£Fedpol³Æ¹¥»÷ÕßÖ»ÄÜ·ÃÎÊÓÃÓÚ²âÊÔµÄÄ£ÄâÊý¾Ý£¬FOCBS˵±»µÁÊý¾ÝÀ´×ÔÓëÆä¿Í»§µÄͨÐÅ¡£
https://securityaffairs.com/147047/data-breach/fedpol-swiss-police-cyber-attack.html
4¡¢VMware³Æ½üÆÚµÄTrueBot»î¶¯ÀûÓÃNetwrix©¶´À´·Ö·¢
6ÔÂ1ÈÕ£¬VMware͸¶´Ó5Ô¿ªÊ¼·¢ÏÖTrueBot»î¶¯¼¤Ôö¡£TrueBotÖÁÉÙ´Ó2017Ä꿪ʼ»îÔ¾£¬ÒÔʹÓöñÒâÓʼþ·Ö·¢¶øÎÅÃû£¬µ«×î½ü±»·¢ÏÖʹÓÃÁËNetwrix auditor©¶´£¨CVE-2022-31199£©ÒÔ¼°Raspberry RobinÖеÄÒ»¸ö©¶´×÷ΪѬȾÔØÌå¡£¹¥»÷Á´Ê¼ÓÚ´ÓChromeÏÂÔØ¿ÉÖ´ÐÐÎļþupdate.exe¡£ÔËÐкó£¬Ëü»á¼ìË÷²¢ÏÂÔصڶþ½×¶Î¿ÉÖ´ÐÐÎļþ3ujwy2rz7v.exe£¬ÓÉcmd.exeÆô¶¯¡£¿ÉÖ´ÐÐÎļþÁ¬½Óµ½C2Óò²¢´ÓÖ÷»úй¶Ãô¸ÐÐÅÏ¢¡£
https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html
5¡¢AkamaiÅû¶½Ù³ÖMagentoµÈºÏ·¨ÍøÕ¾µÄMagecart¹¥»÷
AkamaiÔÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖ²¢·ÖÎöÁËÒ»ÆðÕýÔÚ½øÐеÄMagecart¹¥»÷»î¶¯£¬Ö¼ÔÚ´ÓµçÉÌÍøÕ¾ÇÔÈ¡PIIºÍÐÅÓÿ¨ÐÅÏ¢¡£Ñо¿ÈËÔ±³Æ¸Ã»î¶¯ÒÑÓ°ÏìÃÀ¹ú¡¢Ó¢¹ú¡¢°Ä´óÀûÑÇ¡¢°ÍÎ÷¡¢ÃسºÍ°®É³ÄáÑǵÄ×éÖ¯¡£¹¥»÷ÕßÔڻÆÚ¼ä½ÓÄÉÁ˶àÖÖÈƹý¼¼Êõ£¬°üÂÞʹÓÃBase64±àÂë»ìÏýskimmer£¬Í¨¹ýÀàËÆÓÚµÚÈý·½·þÎñGoogle Tag Manager»òFacebook PixelµÄ·½Ê½¹¹½¨Æä½á¹¹ÒÔÖÆÖ¹ÒýÆð»³ÒÉ¡£´ËÍ⣬ÓëÆäËüMagecart¹¥»÷²îÒìµÄÊÇ£¬¹¥»÷Õß½Ù³ÖÁ˺Ϸ¨ÍøÕ¾³äµ±ÁÙʱC2·þÎñÆ÷£¬Í¨¹ýÕâЩÐÅÓþÁ¼ºÃµÄºÏ·¨ÍøÕ¾·Ö·¢ÇÔÈ¡·¨Ê½¡£
https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
6¡¢AvastÔÚChromeÍøÉÏÉ̵ê¼ì²âµ½32¸ö¶ñÒâÀ©Õ¹·¨Ê½
6ÔÂ2ÈÕ£¬Avast³ÆÆäÔÚChromeÍøÉÏÓ¦ÓõêÖмì²âµ½32¸ö¶ñÒâÀ©Õ¹·¨Ê½£¬×Ü°²×°Á¿¸ß´ï7500Íò´Î¡£´Ë´ÎÊÓ²ìʼÓÚÒ»ÃûÑо¿ÈËÔ±ÔÚPDF ToolboxÀ©Õ¹Öз¢ÏÖÁ˶ñÒâ´úÂ룬´ÙʹÕë¶Ô¸ÃÎÊÌâ¸üÉîÈëµÄÑо¿¡£ÕâЩÀ©Õ¹µÄ¹¦Ð§´Ó¹ã¸æÀ¹½ØÆ÷¡¢ÏÂÔØÆ÷ºÍä¯ÀÀÆ÷Ö÷Ìâµ½¼Ç¼Æ÷ºÍÑ¡Ï¹ÜÀíÆ÷µÈ¡£ËüÃÇÌṩÁ˺Ϸ¨¹¦Ð§£¬Õ§Ò»¿´ËƺõÎÞº¦£¬µ«×îÖÕpayload¿ÉÄÜÊǹã¸æÈí¼þºÍËÑË÷½Ù³Ö·¨Ê½µÈ¡£Ä¿Ç°£¬¹È¸èÒѾ´ÓÆäÍøÉÏÓ¦ÓÃÉ̵êÖÐɾ³ýÁËÕâЩÀ©Õ¹¡£
https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-with-75m-installs-removed-from-web-store/