°Ä´óÀûÑÇACY֤ȯÉèÖùýʧй¶Áè¼Ý60GBµÄÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2022-06-06

1¡¢°Ä´óÀûÑÇACY֤ȯÉèÖùýʧй¶Áè¼Ý60GBµÄÓû§Êý¾Ý


ýÌå6ÔÂ4ÈÕ³Æ £¬ £¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇACY SecuritiesÊý¾Ý¿âÉèÖùýʧ £¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý60 GBµÄÊý¾Ý¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨2020Äê2ÔÂÒÔÀ´µÄÈÕÖ¾ £¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÿÃë¶¼ÔÚ¸üÐÂ×îеÄÊý¾Ý¼¯ £¬ £¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢ÓÊÕþ±àÂë¡¢µØµã¡¢ÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÃÜÂëºÍÉúÒâÐÅÏ¢µÈ¡£¡£¡£´ó´ó¶¼ÊÜÓ°ÏìÓû§Î»ÓÚÓ¡¶È¡¢Î÷°àÑÀ¡¢°ÍÎ÷¡¢¶íÂÞ˹¡¢°Ä´óÀûÑǺÍÂÞÂíÄáÑǵȹú¡£¡£¡£Ñо¿Ö°Ô±¶à´ÎÁªÏµACYºó £¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÆÆ·Ñ¼¸Ììʱ¼ä½â¾öÁËÕâ¸öÎÊÌâ £¬ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖ¸ÃЧÀÍÆ÷ÊÇÎ޹ؽôÒªµÄЧÀÍÆ÷¡£¡£¡£


https://www.hackread.com/australian-trading-giant-acy-securities-exposed-data/


2¡¢GitLabÐû²¼¶à¸ö°æ±¾µÄÇå¾²¸üР£¬ £¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´8¸öÎó²î


¾ÝýÌå6ÔÂ3ÈÕ±¨µÀ £¬ £¬£¬£¬£¬£¬£¬GitLabÐû²¼ÁËÆä²úÆ·¶à¸ö°æ±¾µÄÇå¾²¸üР£¬ £¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´8¸öÎó²î¡£¡£¡£ÆäÖÐ×îΪÑÏÖØµÄÊǿɱ»ÓÃÀ´½Ó»á¼Æ»§µÄÎó²î£¨CVE-2022-1680£© £¬ £¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9 £¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖÔÚÌØ¶¨ÉèÖõÄʵÀýÉÏ¿ÉʹÓøÃÎó²î £¬ £¬£¬£¬£¬£¬£¬ÕÊ»§Ê¹ÓÃË«ÒòËØÉí·ÝÑéÖ¤(2FA)¿ÉÒÔïÔÌ­ÀÄÓõĿÉÄÜÐÔ¡£¡£¡£±ðµÄ £¬ £¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËJira¼¯³É×é¼þÖеĿçÕ¾¾ç±¾Îó²î£¨CVE-2022-1940£©ºÍÓÉÓÚȱÉÙÊäÈëÑéÖ¤µ¼ÖµÄXSSÎó²î£¨CVE-2022-1948£©µÈ¡£¡£¡£¸Ã¹«Ë¾½¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾¡£¡£¡£


https://securityaffairs.co/wordpress/131928/hacking/gitlab-critical-account-take-over.html


3¡¢KasperskyÅû¶ºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú


6ÔÂ2ÈÕ £¬ £¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïLuoYuÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£¸ÃÍÅ»ï×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬ £¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÍâ½»»ú¹¹¡¢Ñ§Êõ½ç¡¢¹ú·À¡¢ÎïÁ÷ºÍµçÐÅÐÐÒµµÈ¡£¡£¡£Ôڴ˴λÖÐ £¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÃûΪWinDealerµÄ¶ñÒâWindows¹¤¾ß¡£¡£¡£ÕâÊÇÒ»¸öÄ£¿£¿£¿é»¯µÄ¶ñÒâÈí¼þƽ̨ £¬ £¬£¬£¬£¬£¬£¬Í¨¹ý²éÕÒÓ²±àÂëģʽÀ´¶¨Î»Æä×ÊÔ´ÖеÄǶÈëʽDLLÎļþ²¢Ö´ÐÐ £¬ £¬£¬£¬£¬£¬£¬È»ºóʹÓÃ10×Ö½ÚXORÃÜÔ¿¶ÔÆä¾ÙÐнâÂë¡£¡£¡£ÔÚÒÑÍù £¬ £¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÖ÷ҪʹÓÃË®¿Ó¹¥»÷À´Ñ¬È¾ËûÃǵÄÄ¿µÄ¡£¡£¡£


https://securelist.com/windealer-dealing-on-the-side/105946/


4¡¢LockBitÉù³Æ¶Ô¸»Ê¿¿µÄ«Î÷¸ç·Ö¹«Ë¾Ôâµ½µÄ¹¥»÷ÈÏÕæ


¾Ý6ÔÂ2ÈÕ±¨µÀ £¬ £¬£¬£¬£¬£¬£¬µç×ÓÖÆÔìÉ̸»Ê¿¿µ³ÆÆäλÓÚÄ«Î÷¸çµÄÒ»¼ÒÉú²ú¹¤³§ÔÚ5ÔÂÏÂÑ®Ôâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£±»¹¥»÷µÄ¹¤³§Î»ÓÚÄ«Î÷¸çµÙ»ªÄÉ £¬ £¬£¬£¬£¬£¬£¬ÊÇÒ»¸öÕ½ÂÔÉèÊ© £¬ £¬£¬£¬£¬£¬£¬×÷ΪÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖÝÖ÷ÒªµÄµç×Ó²úÆ·ÏûºÄÕߵũӦÖÐÐÄ¡£¡£¡£ÀÕË÷ÍÅ»ïLockBitÌåÏÖÆäÔÚ5ÔÂ31ÈÕÌᳫÁ˹¥»÷ £¬ £¬£¬£¬£¬£¬£¬ÈôÊǸ»Ê¿¿µ²»ÔÚ6ÔÂ11ÈÕ֮ǰ¸¶Êê½ð £¬ £¬£¬£¬£¬£¬£¬ËûÃǽ«¹ûÕæÇÔÈ¡µÄÊý¾Ý¡£¡£¡£ÕâÒâζ×Å̸ÅпÉÄÜÉÐδ¿¢Ê £¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔÏ£ÍûÓë¸Ã¹«Ë¾¸æ¿¢Ð­Òé¡£¡£¡£


https://www.bleepingcomputer.com/news/security/foxconn-confirms-ransomware-attack-disrupted-production-in-mexico/


5¡¢Î¢Èí·¢Ã÷ÒÁÀÊPoloniumÕë¶ÔÒÔÉ«ÁеÄÓã²æÊ½´¹ÂÚ¹¥»÷


6ÔÂ2ÈÕ £¬ £¬£¬£¬£¬£¬£¬Î¢ÈíÍþвÇ鱨ÖÐÐÄÐû²¼Á˹ØÓÚÒÁÀÊÍÅ»ïPoloniumÓã²æÊ½´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö £¬ £¬£¬£¬£¬£¬£¬ÔÚÒÑÍùµÄÈý¸öÔÂÀï £¬ £¬£¬£¬£¬£¬£¬POLONIUMÒѾ­¹¥»÷ÁË20¶à¸öÒÔÉ«ÁеÄ×éÖ¯ºÍÒ»¸öÀè°ÍÄÛµÄ×éÖ¯ £¬ £¬£¬£¬£¬£¬£¬Éæ¼°ÖÆÔìÒµ¡¢ITÐÐÒµºÍÁйú·À¹¤Òµ¡£¡£¡£¸ÃÍŻィÉèºÍʹÓÃÁËÕýµ±µÄOneDriveÕÊ»§ £¬ £¬£¬£¬£¬£¬£¬È»ºó½«ÕâЩÕÊ»§ÓÃ×÷C2À´Ö´Ðв¿·Ö¹¥»÷¡£¡£¡£ÏÖÔÚ £¬ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯Òѱ»Î¢ÈíÊý×Ö·¸·¨²¿·Ö(DCU)ÀÖ³É×èÖ¹ £¬ £¬£¬£¬£¬£¬£¬×ܹ²¹Ø±ÕÁ˴˴λÖÐʹÓõÄ41¸öÓÃÀ´½¨ÉèC2ͨѶµÄÓò¡£¡£¡£


https://www.microsoft.com/security/blog/2022/06/02/exposing-polonium-activity-and-infrastructure-targeting-israeli-organizations/


6¡¢Ñо¿Ö°Ô±³ÆÆäÔÚ24931¸öÍøÕ¾Éϼì²âµ½47337¸ö¶ñÒâ²å¼þ


ýÌå6ÔÂ1ÈÕ³Æ £¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÑÔÚ24931¸öÍøÕ¾Éϼì²âµ½ÁË47337¸ö¶ñÒâ²å¼þ £¬ £¬£¬£¬£¬£¬£¬ÆäÖеÄ3685¸ö²å¼þÔÚÕýµ±Êг¡ÉϳöÊÛ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÊÇð³äÕýµ±²å¼þµÄ¿ª·¢Õß £¬ £¬£¬£¬£¬£¬£¬Í¨Ì«¹ý·¢µÁ°æ²å¼þÀ´Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¸ÃÑо¿ÆÊÎöÁË×Ô2012ÄêÒÔÀ´×°ÖÃÔÚ410122̨WebЧÀÍÆ÷ÖеÄWordPress²å¼þ £¬ £¬£¬£¬£¬£¬£¬·¢Ã÷½üÄêÀ´ÍøÕ¾É϶ñÒâ²å¼þµÄÊýĿһֱÔÚÔöÌí £¬ £¬£¬£¬£¬£¬£¬´ËÀà»î¶¯ÔÚ2020Äê3ÔµִïáÛ·å £¬ £¬£¬£¬£¬£¬£¬ÇÒÕâ8ÄêÀ´×°ÖõĶñÒâ²å¼þÖÐÓÐ94%ÖÁ½ñÈÔ´¦Óڻ״̬¡£¡£¡£


https://thehackernews.com/2022/06/yoda-tool-found-47000-malicious.html