°Ä´óÀûÑÇACY֤ȯÅäÖÃÃýÎóй¶³¬¹ý60GBµÄÓû§Êý¾Ý

°ä²¼¹¦·ò 2022-06-06

1¡¢°Ä´óÀûÑÇACY֤ȯÅäÖÃÃýÎóй¶³¬¹ý60GBµÄÓû§Êý¾Ý


ýÌå6ÔÂ4ÈÕ³Æ £¬°Ä´óÀûÑÇACY SecuritiesÊý¾Ý¿âÅäÖÃÃýÎó £¬Ð¹Â¶³¬¹ý60 GBµÄÊý¾Ý¡£¸ÃÊý¾Ý¿âÔ̺¬2020Äê2ÔÂÒÔÀ´µÄÈÕÖ¾ £¬²¢ÇÒÿÃë¶¼ÔÚ¸üÐÂ×îеÄÊý¾Ý¼¯ £¬Éæ¼°ÐÕÃû¡¢ÓÊÕþ±àÂë¡¢µØÖ·¡¢ÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÃÜÂëºÍÂòÂôÐÅÏ¢µÈ¡£´óÎÞÊýÊÜÓ°ÏìÓû§Î»ÓÚÓ¡¶È¡¢Î÷°àÑÀ¡¢°ÍÎ÷¡¢¶íÂÞ˹¡¢°Ä´óÀûÑǺÍÂÞÂíÄáÑǵȹú¡£×êÑÐÈËÔ±ÂÅ´ÎÁªÏµACYºó £¬¸Ã¹«Ë¾ÆÆ·Ñ¼¸Ì칦·ò½â¾öÁËÕâ¸öÎÊÌâ £¬²¢°µÊ¾¸Ã·þÎñÆ÷ÊÇÎ޹ؽôÒªµÄ·þÎñÆ÷¡£


https://www.hackread.com/australian-trading-giant-acy-securities-exposed-data/


2¡¢GitLab°ä²¼¶à¸ö°æ±¾µÄ°²È«¸üР£¬×ܼƽ¨¸´8¸ö·ì϶


¾ÝýÌå6ÔÂ3ÈÕ±¨Â· £¬GitLab°ä²¼ÁËÆä²úÆ·¶à¸ö°æ±¾µÄ°²È«¸üР£¬×ܼƽ¨¸´8¸ö·ì϶¡£ÆäÖÐ×îΪÑϳÁµÄÊǿɱ»ÓÃÀ´ÊÕÊÜÕÊ»§µÄ·ì϶£¨CVE-2022-1680£© £¬CVSSÆÀ·ÖΪ9.9 £¬¸Ã¹«Ë¾°µÊ¾ÔÚÌØ¶¨ÅäÖõÄÊ·ýÉÏ¿ÉÀûÓø÷ì϶ £¬ÕÊ»§Ê¹ÓÃË«³É·ÖÉí·ÝÑéÖ¤(2FA)Äܹ»Ï÷¼õÀÄÓõĿÉÄÜÐÔ¡£´Ë±í £¬»¹½¨¸´ÁËJira¼¯³É×é¼þÖеĿçÕ¾¾ç±¾·ì϶£¨CVE-2022-1940£©ºÍÓÉÓÚ¶ÌȱÊäÈëÑéÖ¤µ¼ÖµÄXSS·ì϶£¨CVE-2022-1948£©µÈ¡£¸Ã¹«Ë¾½¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾¡£


https://securityaffairs.co/wordpress/131928/hacking/gitlab-critical-account-take-over.html


3¡¢KasperskyÅû¶ºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú


6ÔÂ2ÈÕ £¬Kaspersky°ä²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú¡£¸ÃÍÅ»ï×Ô2008ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬ÖØÒªÕë¶Ô±í½»»ú¹¹¡¢Ñ§Êõ½ç¡¢¹ú·À¡¢ÎïÁ÷ºÍµçÐÅÐÐÒµµÈ¡£ÔÚÕâ´Î»î¶¯ÖÐ £¬¹¥»÷ÕßʹÓÃÁËÃûΪWinDealerµÄ¶ñÒâWindows¹¤¾ß¡£ÕâÊÇÒ»¸öÄ£¿é»¯µÄ¶ñÒâÈí¼þƽ̨ £¬Í¨¹ý²éÕÒÓ²±àÂëģʽÀ´¶¨Î»Æä×ÊÔ´ÖеÄǶÈëʽDLLÎļþ²¢Ö´ÐÐ £¬¶øºóʹÓÃ10×Ö½ÚXORÃÜÔ¿¶ÔÆä½øÐнâÂë¡£ÔÚ´Óǰ £¬¸ÃÍÅ»ïÖØÒªÀûÓÃË®¿Ó¹¥»÷À´Ï°È¾ËûÃǵÄÖ¸±ê¡£


https://securelist.com/windealer-dealing-on-the-side/105946/


4¡¢LockBitÐû³Æ¶Ô¸»Ê¿¿µÄ«Î÷¸ç·Ö¹«Ë¾Ôâµ½µÄ¹¥»÷ÕÆ¹Ü


¾Ý6ÔÂ2ÈÕ±¨Â· £¬µç×ÓÔì×÷É̸»Ê¿¿µ³ÆÆäλÓÚÄ«Î÷¸çµÄÒ»¼Ò³ö²ú¹¤³§ÔÚ5ÔÂÏÂÑ®Ôâµ½ÁËÀÕË÷¹¥»÷¡£±»¹¥»÷µÄ¹¤³§Î»ÓÚÄ«Î÷¸çµÙ»ªÄÉ £¬ÊÇÒ»¸öÕ½ÊõÉèÊ© £¬×÷ΪÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖݳÁÒªµÄµç×Ó²úÆ·Ïû·ÑÕߵĹ©¸øÖÐÐÄ¡£ÀÕË÷ÍÅ»ïLockBit°µÊ¾ÆäÔÚ5ÔÂ31ÈÕÌáÒéÁ˹¥»÷ £¬ÈôÊǸ»Ê¿¿µ²»ÔÚ6ÔÂ11ÈÕ֮ǰ¸¶Êê½ð £¬ËûÃǽ«¹«¿ªÇÔÈ¡µÄÊý¾Ý¡£ÕâÒâζ׎»Éæ¿ÉÄÜÉÐδʵÏÖ £¬¹¥»÷ÕßÈÔµ«Ô¸Óë¸Ã¹«Ë¾´ï³ÉºÍ̸¡£


https://www.bleepingcomputer.com/news/security/foxconn-confirms-ransomware-attack-disrupted-production-in-mexico/


5¡¢Î¢Èí·¢ÏÖÒÁÀÊPoloniumÕë¶ÔÒÔÉ«ÁеÄÓã²æÊ½´¹µö¹¥»÷


6ÔÂ2ÈÕ £¬Î¢ÈíÍþвµý±¨ÖÐÐİ䲼Á˹ØÓÚÒÁÀÊÍÅ»ïPoloniumÓã²æÊ½´¹µö¹¥»÷µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö £¬ÔÚ´ÓǰµÄÈý¸öÔÂÀï £¬POLONIUMÒѾ­¹¥»÷ÁË20¶à¸öÒÔÉ«ÁеÄ×éÖ¯ºÍÒ»¸öÀè°ÍÄÛµÄ×éÖ¯ £¬Éæ¼°Ôì×÷Òµ¡¢ITÐÐÒµºÍÁйú·À¹¤Òµ¡£¸ÃÍŻﴴ½¨ºÍʹÓÃÁ˺Ϸ¨µÄOneDriveÕÊ»§ £¬¶øºó½«ÕâЩÕÊ»§ÓÃ×÷C2À´Ö´Ðв¿ÃŹ¥»÷¡£Ä¿Ç° £¬¸Ã»î¶¯Òѱ»Î¢ÈíÊý×Ö·¸×ﲿÃÅ(DCU)³É¹¦×èÖ¹ £¬×ܹ²¹Ø¹ØÁËÕâ´Î»î¶¯ÖÐʹÓõÄ41¸öÓÃÀ´³ÉÁ¢C2ͨѶµÄÓò¡£


https://www.microsoft.com/security/blog/2022/06/02/exposing-polonium-activity-and-infrastructure-targeting-israeli-organizations/


6¡¢×êÑÐÈËÔ±³ÆÆäÔÚ24931¸öÍøÕ¾Éϼì²âµ½47337¸ö¶ñÒâ²å¼þ


ýÌå6ÔÂ1ÈÕ³Æ £¬×êÑÐÈËÔ±ÒÑÔÚ24931¸öÍøÕ¾Éϼì²âµ½ÁË47337¸ö¶ñÒâ²å¼þ £¬ÆäÖеÄ3685¸ö²å¼þÔںϷ¨Êг¡ÉÏÏúÊÛ¡£×êÑÐÈËÔ±°µÊ¾ £¬¹¥»÷ÕßÖØÒªÊǼÙÒâºÏ·¨²å¼þµÄ¿ª·¢Õß £¬Í¨¹ý¶È·¢µÁ°æ²å¼þÀ´´«²¼¶ñÒâÈí¼þ¡£¸Ã×êÑзÖÎöÁË×Ô2012ÄêÒÔÀ´×°ÖÃÔÚ410122̨Web·þÎñÆ÷ÖеÄWordPress²å¼þ £¬·¢ÏÖ½üÄêÀ´ÍøÕ¾É϶ñÒâ²å¼þµÄÊýÁ¿Ò»ÏòÔÚÔö³¤ £¬´ËÀà»î¶¯ÔÚ2020Äê3Ô´ﵽ¶¥·å £¬ÇÒÕâ8ÄêÀ´×°ÖõĶñÒâ²å¼þÖÐÓÐ94%ÖÁ½ñÈÔ´¦Óڻ״̬¡£


https://thehackernews.com/2022/06/yoda-tool-found-47000-malicious.html