CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î

Ðû²¼Ê±¼ä 2023-03-03

1¡¢CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î


CiscoÔÚ3ÔÂ1ÈÕÐû²¼Çå¾²¸üУ¬£¬ £¬£¬£¬ £¬£¬ÐÞ¸´Ó°ÏìÆäIP Phone 6800¡¢7800¡¢7900ºÍ8800ϵÁвúÆ·µÄÎó²î¡£¡£¡£¡£¡£ÕâÊÇ»ùÓÚWebµÄÖÎÀí½çÃæÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20078£©£¬£¬ £¬£¬£¬ £¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬£¬£¬ £¬£¬ÊÇÓÉÓÚ¶ÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼Öµģ¬£¬ £¬£¬£¬ £¬£¬ÀֳɵÄʹÓôËÎó²î¿ÉÔÚÊÜÓ°Ïì×°±¸µÄµ×²ã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬ £¬£¬¸Ã¹«Ë¾»¹Åû¶ÁËDoSÎó²î£¨CVE-2023-20079£©£¬£¬ £¬£¬£¬ £¬£¬Ò²ÊǶÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼Öµģ¬£¬ £¬£¬£¬ £¬£¬¿É±»ÓÃÀ´´¥·¢DoSÌõ¼þ¡£¡£¡£¡£¡£


https://thehackernews.com/2023/03/critical-flaw-in-cisco-ip-phone-series.html


2¡¢Exchange Online·ºÆðBugµ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼û


¾ÝýÌå3ÔÂ1ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ £¬£¬MicrosoftÕýÔÚÊÓ²ìÈ«ÇòExchange OnlineÓû§ÎÞ·¨»á¼ûÆäÓÊÏäµÄÎÊÌâ¡£¡£¡£¡£¡£´Ó3ÔÂ1ÈÕ1:11 PM UTC×îÏÈ£¬£¬ £¬£¬£¬ £¬£¬ÊÜÓ°ÏìÓû§ÔÚ·¢ËÍ»òÎüÊÕÓʼþʱ»á¿´µ½"550 5.4.1 Recipient address rejected: Access denied"µÄ¹ýʧÌáÐÑ¡£¡£¡£¡£¡£MicrosoftÔÚ5:22 PM UTC³ÆÒѾ­·¢Ã÷ÁËÒ»¸öDZÔڵĻùÓÚĿ¼µÄ±ßÑØ·â±Õ£¨DBEB£©ÎÊÌâ¡£¡£¡£¡£¡£16:01 EST£¬£¬ £¬£¬£¬ £¬£¬MicrosoftÌåÏÖ£¬£¬ £¬£¬£¬ £¬£¬Í¨¹ýExchange Online Protection(EOP)Á÷Á¿ÔÚÊÜÓ°ÏìµÄ»ù´¡ÉèÊ©ÖÐÖØÐÂÉèÖ÷ÓÉ£¬£¬ £¬£¬£¬ £¬£¬½â¾öÁ˸ÃÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-exchange-online-outage-blocks-access-to-mailboxes-worldwide/


3¡¢eSentireÅû¶Õë¶Ô¶à¸ö״ʦÊÂÎñËùµÄ¹¥»÷»î¶¯µÄÏêÇé


eSentireÓÚ2ÔÂ28ÈÕÅû¶ÁËÔÚ2023Äê1ÔºÍ2ÔÂÕë¶Ô6¼Ò²î±ðµÄ״ʦÊÂÎñËùµÄ¹¥»÷¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ô´×ÔÁ½¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬ £¬£¬£¬ £¬£¬ÆäÖÐÖ®Ò»ÊÔͼÓöñÒâÈí¼þGootLoaderѬȾ״ʦÊÂÎñËùµÄÔ±¹¤£¬£¬ £¬£¬£¬ £¬£¬ÁíÒ»³¡»î¶¯Ê¹ÓöñÒâÈí¼þSocGholish¹¥»÷״ʦÊÂÎñËùÔ±¹¤ºÍÆäËüÄ¿µÄ¡£¡£¡£¡£¡£GootLoader»î¶¯Ê¹ÓÃËÑË÷ÒýÇæÓÅ»¯(SEO)Öж¾£¬£¬ £¬£¬£¬ £¬£¬ÆäÈëÇÖÁËÕýµ±µÄWordPressÍøÕ¾£¬£¬ £¬£¬£¬ £¬£¬²¢Ê¹Óá°Ð­Ò顱µÈÒªº¦×ÖÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£SocGholish»î¶¯Ê¹ÓÃÁË״ʦÊÂÎñËù¾­³£»Ý¹ËµÄÍøÕ¾¾ÙÐÐË®¿Ó¹¥»÷£¬£¬ £¬£¬£¬ £¬£¬ÒÔÐéαµÄä¯ÀÀÆ÷¸üÐÂΪÓÕ¶üÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£


https://www.esentire.com/blog/hackers-attack-employees-from-six-law-firms-with-the-gootloader-and-socgholish-malware-using-fake-legal-agreements-and-malicious-watering-hole-s-reports-esentire


4¡¢°µÍøBidenCashÖÜÄê»î¶¯¹ûÕæ200¶àÍòÕÅÐÅÓÿ¨µÄÐÅÏ¢


¾Ý3ÔÂ2ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ £¬£¬Ò»¸ö°µÍøÐÅÓÿ¨Êг¡BidenCash¹ûÕæÁËÁè¼Ý200ÍòÕÅÓÐÓÃÐÅÓÿ¨µÄÐÅÏ¢£¬£¬ £¬£¬£¬ £¬£¬×÷ΪÆäÖÜÄê´ÙÏú»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£ÕâЩÐÅÓÿ¨À´×ÔÌìϸ÷µØ£¬£¬ £¬£¬£¬ £¬£¬ÆäÖд󲿷ÖÊÇÔÚÃÀ¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢¼ÓÄôóºÍÓ¢¹ú¿¯ÐеÄ¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨³Ö¿¨È˵ÄÐÕÃû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢¡¢ÓÐÓÃÆÚ¡¢¿¨ÑéÖ¤Öµ(CVV)¡¢¼ÒͥסַºÍÁè¼Ý500000¸öÓʼþµØµã¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬ £¬£¬BidenCashÇÔÊØÐÅÏ¢µÄ·½·¨Éв»Ã÷È·£¬£¬ £¬£¬£¬ £¬£¬Õþ¸®ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬ £¬£¬£¬ £¬£¬²¢½¨ÒéÊÜÓ°ÏìµÄ³Ö¿¨ÈË¼à¿ØËûÃǵÄÕË»§¡£¡£¡£¡£¡£


https://www.hackread.com/bidencash-leaks-2-million-credit-cards/


5¡¢Ó¢¹úÁãÊÛÊÐËÁWH Smith³ÆÆäÔ±¹¤Êý¾ÝÔâµ½²»·¨»á¼û


ýÌå3ÔÂ2Èճƣ¬£¬ £¬£¬£¬ £¬£¬Ó¢¹úÁãÊÛÊÐËÁWH SmithÔâµ½¹¥»÷£¬£¬ £¬£¬£¬ £¬£¬ÏÖÔ±¹¤ºÍǰԱ¹¤µÄÐÅϢй¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¢¹úı»®×Å1700¸öÊÐËÁ£¬£¬ £¬£¬£¬ £¬£¬ÓµÓÐÁè¼Ý12500ÃûÔ±¹¤£¬£¬ £¬£¬£¬ £¬£¬2022ÄêµÄÊÕÈëΪ16.7ÒÚÃÀÔª¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬ £¬£¬´Ë´ÎÊÂÎñµ¼Ö¹«Ë¾µÄ²¿·ÖÊý¾Ý±»²»·¨»á¼û£¬£¬ £¬£¬£¬ £¬£¬µ«²¢Î´Ó°ÏìÆäÉÌÒµÓªÒµ¡£¡£¡£¡£¡£¿£¿£¿Í»§ÐÅϢûÓÐÊܵ½Ó°Ï죬£¬ £¬£¬£¬ £¬£¬ÓÉÓÚÕâЩÐÅÏ¢´æ´¢ÔÚµ¥¶ÀµÄϵͳÉÏ¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬£¬ £¬£¬£¬ £¬£¬µ«¿ÉÄÜÊÇÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£ËäȻûÓйØÓÚ¹¥»÷ÈÕÆÚµÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬ £¬£¬µ«¹¥»÷Ó¦¸ÃÊDZ¬·¢ÔÚ1ÔÂ18ÈÕÖ®ºó¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/british-retail-chain-wh-smith-says-data-stolen-in-cyberattack/


6¡¢TrendMicroÐû²¼APT27¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ


3ÔÂ1ÈÕ£¬£¬ £¬£¬£¬ £¬£¬Trend MicroÐû²¼ÁËAPT27£¨Iron Tiger£©Linux°æ±¾×Ô½ç˵¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ºÚ¿ÍÓÚ2022Äê7ÔÂÊ״βâÊÔÁËLinux°æ±¾£¬£¬ £¬£¬£¬ £¬£¬È»¶øÖ±µ½2022Äê10Ô£¬£¬ £¬£¬£¬ £¬£¬¶à¸öpayload²Å×îÏÈÔÚÒ°ÍâÈö²¥¡£¡£¡£¡£¡£¸ÃLinux±äÌåÊÇÒ»¸öELF¿ÉÖ´ÐÐÎļþ£¬£¬ £¬£¬£¬ £¬£¬Ê¹ÓÃAsio¿âÓÃC++¿ª·¢£¬£¬ £¬£¬£¬ £¬£¬Æä¹¦Ð§ÓëWindows°æSysUpdateºÜÊÇÏàËÆ£¬£¬ £¬£¬£¬ £¬£¬ÐÂÔöÁËDNSËíµÀ¹¦Ð§¡£¡£¡£¡£¡£Trend MicroÌåÏÖ£¬£¬ £¬£¬£¬ £¬£¬Ñ¡ÔñAsio¿âÀ´¿ª·¢Linux°æ±¾µÄSysUpdate¿ÉÄÜÊÇÓÉÓÚËüµÄ¶àƽ̨¿ÉÒÆÖ²ÐÔ£¬£¬ £¬£¬£¬ £¬£¬²¢Õ¹ÍûmacOS°æ±¾¿ÉÄܺܿì¾Í»á·ºÆð¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html