Colonial PipelineÒòÎ¥·´°²È«»®¶¨±»· £¿î½ü100ÍòÃÀÔª

°ä²¼¹¦·ò 2022-05-12
1¡¢Colonial PipelineÒòÎ¥·´°²È«»®¶¨±»· £¿î½ü100ÍòÃÀÔª


¾ÝýÌå5ÔÂ10ÈÕ±¨Â· £¬ÒòÎ¥·´Áª¹ú°²È«ÂÉÀý £¬Colonial Pipeline±»ÃÀ¹úÔËÊ䲿¹Ü·ºÍΣÏÕ×ÊÁϰ²È«ÖÎÀí¾Ö(PHMSA)· £¿î986400ÃÀÔª ¡£2021Äê5Ô³õ £¬ÃÀ¹ú×î´óȼÁϹÜ·ÔËÓªÉÌColonial PipelineÔâµ½DarkSideµÄÀÕË÷¹¥»÷ £¬µ¼ÖÂÌìÈ»Æø¹©¸øÖÐ¶Ï £¬Ê¹17¸öÖݽøÈ봹Σ״̬ ¡£PHMSA°µÊ¾¸Ã¹«Ë¾Î´µÐÊÖ¶¯¹Ø¹ØºÍ³ÁÐÂÆô¶¯Æä¹Ü·ϵͳ×öºÃ³ä·ÖµÄ´òËã £¬Æä¹Ü·ÔÚ2021Äê5ÔµĹ¥»÷ºóÎÞ·¨Ê¹ÓÃʱ £¬¶ÔÈ«¹úÔì³ÉÁËÑϳÁÓ°Ïì ¡£


https://thehackernews.com/2022/05/us-proposes-1-million-fine-on-colonial.html


2¡¢»ÝÆÕ°ä²¼BIOS¸üР£¬½¨¸´Ó°Ïì200¶à¸öÐͺŵķì϶


5ÔÂ11ÈÕ £¬»ÝÆÕ°ä²¼5Ô·ÝBIOS¸üР£¬½¨¸´ÁË2¸öÓ°Ïì´óÁ¿PCºÍ±Ê¼Ç±¾²úÆ·µÄ·ì϶ ¡£Õâ2¸ö·ì϶±ðÀëΪCVE-2021-3808ºÍCVE-2021-3809 £¬CVSSÆÀ·Ö¾ùΪ8.8 ¡£Ä¿Ç° £¬»ÝÆÕÉÐδÌṩÓйØÕâЩ·ì϶µÄ¼¼Êõϸ½Ú ¡£¾Ý×êÑÐÈËԱй© £¬¹¥»÷Õß¿ÉÀûÓ÷ì϶ÒÔÄں˼¶È¨ÏÞ£¨CPL==0£©Ö´ÐÐ £¬Éý¼¶µ½ÏµÍ³ÖÎÀíģʽ£¨SMM£© ¡£ÔÚSMMģʽÏÂÖ´ÐÐ £¬¹¥»÷ÕßÄܹ»»ñµÃ¶ÔÖ÷»úµÄÈ«ÊýȨÏÞ £¬´Ó¶øÖ´Ç°½øÒ»²½µÄ¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/


3¡¢Ô¼2100Íò¸öVPNÓû§µÄÓ×ÎÒÐÅÏ¢ÔÚTelegramÉϱ»¹«¿ª


¾ÝVPNMentorÔÚ5ÔÂ9Èյı¨Â· £¬Ô¼2100Íò¸öVPNÓû§µÄÓ×ÎÒÐÅÏ¢Òѱ»Ð¹Â¶ ¡£¸ÃSQLת´¢ÓÚ5ÔÂ7ÈÕÔÚTelegramÉϰ䲼 £¬´óÓ×Ϊ10 GB £¬Ô̺¬GeckoVPN¡¢SuperVPNºÍChatVPNµÈ¶à¸öVPN·þÎñµÄÓû§µÄÐÅÏ¢ £¬Éæ¼°ÓʼþµØÖ·¡¢Óû§Ãû¡¢ÐÕÃû¡¢¹ú¶È¡¢ÃÜÂë×Ö·û´®¡¢½áËãÃ÷ϸºÍ״̬µÈ ¡£×êÑÐÈËÔ±Ö¸³ö £¬VPNÓû§¸üÆ÷³ÁÒþÖÔºÍÄäÃûÐÔ £¬Òò¶øËûÃǵÄÊý¾Ý¸üÓмÛÖµ £¬µ±ÆäÓ×ÎÒÐÅϢй¶ʱ £¬ËûÃǸü¿ÉÄÜÔâµ½ÀÕË÷¹¥»÷ ¡£


https://www.vpnmentor.com/blog/vpns-leaked-on-telegram/


4¡¢NCSC-FI°ä²¼Android¶ñÒâÈí¼þFluBot»î¶¯¼¤ÔöµÄ¹«¸æ


5ÔÂ10ÈÕ £¬·ÒÀ¼¹ú¶ÈÍøÂ簲ȫÖÐÐÄ(NCSC-FI) °ä²¼¹«¸æ £¬³ÆAndroid¶ñÒâÈí¼þFluBotµÄ»î¶¯¼¤Ôö ¡£FluBotÔËÓªÍÅ»ïʹÓÃÁËÔ̺¬ÓïÒôÓʼþÁ´½Ó¡¢Î´½ÓÀ´µç֪ͨ»òδ֪½ðÈÚÂòÂô¾¯±¨µÄSMSÐÂÎÅ £¬Ö¼ÔÚ½«Ö¸±ê³Á¶¨Ïòµ½ÍйÜFluBot APKµÄÍøÕ¾ ¡£Ö®ºó £¬¹¥»÷Õß»¹»áʹÓÃÖ¸±êµÄÁªÏµÈËÁбí´ÓÒѱ»Ï°È¾É豸ÖÐÍÆË͵ڶþ²¨SMSÐÂÎÅ ¡£×êÑÐÈËÔ±°µÊ¾ £¬ÈôÊÇÉ豸ÒѾ­Ï°È¾ÁËFluBot £¬½«ÏµÍ³³ÁÖÃΪ³ö³§Ä¬ÈÏÉèÖÃÓ¦¸ÃÄܹ»¶Ï¸ù¶ñÒâÈí¼þ ¡£


https://www.bleepingcomputer.com/news/security/flubot-android-malware-targets-finland-in-new-sms-campaigns/


5¡¢JFrogÔÚ½üÆÚ·¢ÏÖÖØÒªÕë¶Ô¹¤¿ØÐÐÒµµÄ¶à¸ö¶ñÒânpm°ü


5ÔÂ10ÈÕ £¬JFrog°ä²¼»ã±¨³ÆÔÚ½üÆÚ·¢ÏÖÁ˶à¸ö¶ñÒânpm°ü ¡£×êÑÐÈËÔ±ÔÚ¶Ôpayload½øÐÐ×êÑÐʱ £¬·¢ÏÖËüÃǸ߶ÈÕë¶ÔµÂ¹úµÄ³ÛÃû¹«Ë¾ ¡£·¢ÏÖµÄ4¸ö¶ñÒâÈí¼þ°üµÄÊØ»¤Õß±ðÀëΪbertelsmannnpm¡¢boschnodemodules¡¢stihlnodemodulesºÍdbschenkernpm ¡£´Ë±í £¬¹¥»÷ÕßʹÓÃÁ˹«¿ªµÄjavascript-obfuscator°ü¶ÔdropperºÍpayload½øÐлìºÏ £¬ÕâÊǺܲ»³£¼ûµÄ ¡£Æ¾¾Ý5ÔÂ11ÈÕµÄ×îÐÂÐÂÎÅ £¬Ò»¼ÒÃûΪCode WhiteµÄÉøÈë²âÊÔ¹«Ë¾Ðû³Æ¶Ô´ËÊÂÕÆ¹Ü ¡£


https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/


6¡¢Check PointÏêÊöÕë¶ÔµÂ¹úÆû³µÐÐÒµ³¤´ïÊýÔµĹ¥»÷»î¶¯


5ÔÂ10ÈÕ £¬Check Point°ä²¼ÁËÕë¶ÔµÂ¹ú³¤´ïÊýÔµĹ¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£¸Ã»î¶¯ÓÚ2021Äê7ÔÂ×óÓÒÆðÍ· £¬Ä¿Ç°ÈÔÔÚ½øÐÐÖÐ £¬ÖØÒªÕë¶ÔµÂ¹úµÄÆû³µÔì×÷ÉÌºÍÆû³µ¾­ÏúÉÌ ¡£´¹µöÓʼþÊÇÓõÂÓïдµÄ £¬ÆäÖÐÔ̺¬Ò»¸ö±êÓÓ×°³µÁ¾·¢Æ±¡±µÄISO¸½¼þ £¬Ö¼ÔÚ·Ö·¢ÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ ¡£¶ñÒâÈí¼þpayload±»ÍйÜÔÚÒÁÀÊ×¢²áµÄÍøÕ¾£¨"bornagroup[.]ir"£©ÉÏ £¬½áºÏͳһע²áÈËµÄÆäËü¹¥»÷»î¶¯ £¬×êÑÐÈËÔ±´§Ä¦Õâ´Î¹¥»÷ÓëÒÁÀÊÓйØ ¡£


https://blog.checkpoint.com/2022/05/10/a-german-car-attack-on-german-vehicle-businesses/