ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-02-25

ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷


¾ÝýÌå2ÔÂ23Èճƣ¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Çå¾²¾ÖºÍÄÚ¸ó£¬ £¬£¬£¬£¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢±¸ÒøÐÐOschadbank¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ£¬ £¬£¬£¬£¬¹¥»÷»î¶¯µ¼Ö²¿·Öϵͳ²»¿ÉÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇ飬 £¬£¬£¬£¬ËûÃÇÕýÔÚÆð¾¢Ó¦¶Ô¹¥»÷²¢ÍøÂçÆÊÎöÐÅÏ¢¡£¡£¡£¡£¡£ÉÏÖÜ£¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/


DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷25¸ö¶ñÒâµÄJavaScript¿â


¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ£¬ £¬£¬£¬£¬Çå¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷ÁË25¸ö¶ñÒâµÄJavaScript¿â¡£¡£¡£¡£¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉÕýµ±Èí¼þ°ü£¬ £¬£¬£¬£¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ£¬ £¬£¬£¬£¬Ä¿µÄÊÇ´ÓÄ¿µÄϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍÇéÐαäÁ¿¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬ÕâЩJavaScript¿âÒѱ»É¾³ý¡£¡£¡£¡£¡£ÔçÔÚ2021Äê12Ô·Ý£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±¾ÍÔÚNPM¿âÖз¢Ã÷²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü¡£¡£¡£¡£¡£  


https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html


ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧй¶200GBÊý¾Ý


SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶£¬ £¬£¬£¬£¬¶ùͯ´ò°çÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧ¡£¡£¡£¡£¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ£¬ £¬£¬£¬£¬Éæ¼°Ô¼20Íò¸öÓû§¡£¡£¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁË3¸öÊý¾Ý¼¯£¬ £¬£¬£¬£¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢Ö§¸¶·½·¨ºÍËÍ»õÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢Ã÷£¬ £¬£¬£¬£¬Ö±µ½2022Äê2ÔÂ18ÈղŻñµÃ± £»£»£»£»£»¤¡£¡£¡£¡£¡£


https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/


SonarSource·¢Ã÷Horde WebmailÖб£´æ9ÄêµÄXSSÎó²î


SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±±£´æµÄXSSÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÊ¹ÓøÃÎó²î£¬ £¬£¬£¬£¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ£¬ £¬£¬£¬£¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript£¬ £¬£¬£¬£¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬¸ÃÎó²î¿ÉÓÃÀ´Ð®ÖÆÓû§µÄÓʼþÕÊ»§£¬ £¬£¬£¬£¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£×îºó£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÌṩÁËÓйØÔõÑù»º½â´ËÎó²îµÄ½¨Òé¡£¡£¡£¡£¡£


https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/


ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶5Ãû³ÉÔ±


¾Ý2ÔÂ22ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶ÁËÆä5Ãû³ÉÔ±¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸ö´¹ÂÚÍøÕ¾£¬ £¬£¬£¬£¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿µÄ²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£¡£¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾­¼ÃËðʧ£¬ £¬£¬£¬£¬ÏÖÔÚûÊÕÁËÆä200Íò¸ñÀï·òÄÉ¡£¡£¡£¡£¡£±»¾Ð²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿·ÖºÍµÚ190ÌõµÚ3²¿·ÖµÄÐÌÊÂÖ¸¿Ø£¬ £¬£¬£¬£¬×î¸ß¿ÉÅд¦8Äêî¿Ïµ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/


ProofpointÐû²¼2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ


2ÔÂ22ÈÕ£¬ £¬£¬£¬£¬ProofpointÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»´¹ÂÚ¹¥»÷ÈëÇÖ£¬ £¬£¬£¬£¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿µÄ£¬ £¬£¬£¬£¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔöÌí18%£©¡£¡£¡£¡£¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖУ¬ £¬£¬£¬£¬60%Ö§¸¶ÁËÊê½ð£¬ £¬£¬£¬£¬32%»¹ÌØÊâÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬ £¬£¬£¬£¬¹¥»÷µÄÊýÄ¿ºÍÀÖ³ÉÂʵÄÔöÌíÓëתÏò»ìÏýÊÂÇéģʽÓйØ£¬ £¬£¬£¬£¬È¥ÄêÓдó×ÚÔ±¹¤¾ÙÐÐÔ¶³Ì°ì¹«£¬ £¬£¬£¬£¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤¾ÙÐÐÔ¶³ÌÊÂÇéµÄÇå¾²½ÌÓý¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/resources/threat-reports/state-of-phish



Çå¾²¹¤¾ß


Jatayu


ÒþÉí×ÔÁ¦PHP Web Shell£¬ £¬£¬£¬£¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£


https://github.com/SpiderMate/Jatayu


Chain Reactor


ÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬ £¬£¬£¬£¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ¡£¡£¡£¡£¡£


https://github.com/redcanaryco/chain-reactor


Boko


ÊÊÓÃÓÚmacOSµÄÓ¦ÓóÌÐòɨÃè³ÌÐò£¬ £¬£¬£¬£¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylibÐ®ÖÆºÍÈõdylibÎó²î£¬ £¬£¬£¬£¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ»á¼ûµÄ¾ç±¾¡£¡£¡£¡£¡£


https://github.com/bashexplode/boko


Android Disassembler


ÊÇÒ»¿îÄܹ»ÆÊÎö¶àÖÖÀàÐÍÎļþµÄÓ¦ÓóÌÐò£¬ £¬£¬£¬£¬ÆÊÎöÊÖ»úÉϵĶñÒâÓ¦Óᣡ£¡£¡£¡£


https://github.com/KYHSGeekCode/Android-Disassembler


fastfinder


ÇáÁ¿¼¶¹¤¾ß£¬ £¬£¬£¬£¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϾÙÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà¡£¡£¡£¡£¡£


https://github.com/codeyourweb/fastfinder/



Çå¾²ÆÊÎö


GitHubÏòÉçÇø¿ª·ÅÇå¾²Êý¾Ý¿â


https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions


¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉúÑĵÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ


https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/


д¹ÂÚÒªÁìʹÓÃÔ¶³Ì»á¼ûÈí¼þÈÆ¹ýMFA


https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/


Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ°²ÅÅÖ¸ÄÏ


https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/


ÌÀ¼Óº£µ×µçÀÂÐÞ¸´£¬ £¬£¬£¬£¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´


https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/


ASEC×î½ü·¢Ã÷αװ³É Microsoft µÄ´¹ÂÚÓʼþÔöÌí


https://asec.ahnlab.com/en/31994/