Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬£¬£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹
Ðû²¼Ê±¼ä 2022-03-15Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬£¬£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹
¾ÝýÌå3ÔÂ12ÈÕ±¨µÀ£¬£¬£¬ÊÓÆµÓÎÏ·¿ª·¢ÉÌÓý±Ì£¨Ubisoft £©Ö¤Êµ£¬£¬£¬ËüÔÚÉÏÖÜÔâµ½ÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÍŶÓÕýÔÚÊÓ²ì´ËÎÊÌ⣬£¬£¬ÏÖÒÑÈ·ÈÏûÓÐÊý¾Ýй¶¼£Ï󣬣¬£¬²¢ÇÒÖØÖÃÁËÈ«¹«Ë¾µÄÃÜÂë¡£¡£¡£3ÔÂ4ÈÕ£¬£¬£¬¾ÍÓÐÓû§ÔÚTwitterºÍDowndetectorÉÏÌåÏÖËûÃÇÔÚ»á¼ûÓý±ÌµÄijЩЧÀÍʱ·ºÆðÎÊÌâ¡£¡£¡£ÏÖÔÚÉÐÎÞ¹ØÓڴ˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬£¬µ«Lapsus$Ðû²¼ÁËÐÂÎÅÌåÏÖ´ËÊÂÓëËüÓйء£¡£¡£
https://securityaffairs.co/wordpress/128929/hacking/ubisoft-cyber-security-incident.html
LockBitÉù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾µÄ¹¥»÷ÊÂÎñÈÏÕæ
LockBitÔÚ3ÔÂ11ÈÕÐû²¼ÐÂÎÅ£¬£¬£¬Éù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾£¨Bridgestone Americas£©µÄ¹¥»÷ÊÂÎñÈÏÕæ¡£¡£¡£ÕâÊÇÈ«Çò×î´óµÄÂÖÌ¥ÖÆÔìÉÌÖ®Ò»£¬£¬£¬ÔÚÈ«ÇòÓµÓÐÊýÊ®¸öÉú²úµ¥Î»ºÍÁè¼Ý130000¸öÔ±¹¤¡£¡£¡£ÆÕÀû˾ͨÐû²¼µÄÉùÃ÷³Æ£¬£¬£¬ËûÃÇÔÚ2ÔÂ27ÈÕ¼ì²âµ½Ò»ÆðITÇå¾²ÊÂÎñ£¬£¬£¬ÕýÔÚ¶ÔÊÂÎñµÄ¹æÄ£ºÍÐÔ×ÓÕö¿ªÊӲ졣¡£¡£LockBitÊǵ±½ñ×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò»£¬£¬£¬ÏÖÔÚÉв»ÇåÎúËü´ÓÆÕÀû˾ͨÇÔÈ¡ÁËÄÄЩÊý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/
Ñо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î
¾Ý3ÔÂ11ÈÕ±¨µÀ£¬£¬£¬SonarSourceµÄÑо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î¡£¡£¡£°ü¹ÜÀíÆ÷ÊÇÖ¸ÓÃÓÚ×Ô¶¯×°Öá¢Éý¼¶¡¢ÉèÖÿª·¢Ó¦ÓóÌÐòËùÐèµÄµÚÈý·½ÒÀÀµÏîµÄϵͳ»ò¹¤¾ß£¬£¬£¬±£´æÎó²îµÄÓ¦ÓðüÀ¨Composer¡¢Bundler¡¢Bower¡¢Poetry¡¢Yarn¡¢pnpm¡¢PipºÍPipenv¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´Ö´ÐÐí§Òâ´úÂë²¢´ÓÄ¿µÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬°üÀ¨Ô´´úÂëºÍ»á¼ûÁîÅÆµÈ¡£¡£¡£
https://thehackernews.com/2022/03/multiple-security-flaws-discovered-in.html
¶íÂÞ˹¹ú·À¹«Ë¾RostecÒòÔâµ½DDoS¹¥»÷ÍøÕ¾¹Ø±Õ
3ÔÂ11ÈÕ£¬£¬£¬¶íÂÞ˹¹úÓк½¿Õº½ÌìºÍ¹ú·À¼¯ÍÅRostecÌåÏÖ£¬£¬£¬ÆäÍøÕ¾ÒòÔâµ½ÍøÂç¹¥»÷¶ø±»¹Ø±Õ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬×Ô2ÔÂÏÂÑ®ÒÔÀ´ÆäÍøÕ¾Ò»Ö±ÔâÊÜ×ÅΧ¹¥¡£¡£¡£×îеÄÒ»´Î¹¥»÷ʼÓÚµ±ÈÕÉÏÎç11µã30·Ö£¬£¬£¬À´×ÔÎÚ¿ËÀ¼Ð½¨ÉèµÄIT¾ü¶Ó¡£¡£¡£¸ÃÎÚ¿ËÀ¼×éÖ¯ÔçЩʱ¼äÔÚTelegramÖÐÐû²¼ÐÂÎÅ£¬£¬£¬½«RostecµÄ¶à¸öÓòÈ·ÒÔΪÆäÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷µÄÄ¿µÄ¡£¡£¡£Rostec³ÆÍøÕ¾ºÜ¿ì¾Í»Ö¸´ÁËÕý³£ÔËÐУ¬£¬£¬ÏÖÔÚËùÓÐÐÅÏ¢¾ùÒÑ¿ÉÓᣡ£¡£
https://www.bleepingcomputer.com/news/security/russian-defense-firm-rostec-shuts-down-website-after-ddos-attack/
Anonymousй¶¶íÂÞ˹»ú¹¹RoskomnadzorµÄ820GBÊý¾Ý
¾ÝýÌå3ÔÂ11ÈÕ±¨µÀ£¬£¬£¬AnonymousÉù³ÆÈëÇÖÁ˶íÂÞ˹Ö÷ÒªµÄ¹Ù·½»ú¹¹Roskomnadzor£¨ÓÖÃûÁª°îͨѶ¡¢ÐÅÏ¢ÊÖÒպ͹«¹²Ã½Ìå¼àÊÓ¾Ö£©¡£¡£¡£¸ÃÍÅ»ï×ܹ²Ð¹Â¶ÁËÔ¼820GBµÄÊý¾Ý£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý360000¸öÎļþ£¨536.9 GB£©ºÍ2¸ö°üÀ¨HR³ÌÐòµÄÊý¾Ý¿â£¨290.6 GB£©¡£¡£¡£±ðµÄ£¬£¬£¬AnonymousÔÚ½üÆÚ»¹ÈëÇÖÁ˶íÂÞ˹Լ90%µÄÉèÖùýʧµÄÔÆÊý¾Ý¿â¡£¡£¡£
https://www.hackread.com/anonymous-hacks-roskomnadzor-russia-agency/
¶«Ó³¶¯»¹«Ë¾»òÒòÔâµ½ÀÕË÷¹¥»÷º£ÔôÍõµÈ¶¯ÂþÑÓ²¥
3ÔÂ11ÈÕ£¬£¬£¬ÈÕ±¾¶«Ó³¶¯»¹«Ë¾£¨Toei£©Ðû²¼×îÐÂÐÂÎÅ£¬£¬£¬³ÆÓÉÓÚÍøÂç¹¥»÷µ¼ÖÂÄÚ²¿ÏµÍ³¹Ø±Õ£¬£¬£¬¶¯ÂþµÄÖÆ×÷Òѱ»ÍƳ١£¡£¡£Òò´Ë£¬£¬£¬¡¶ÓÂÕß¶·¶ñÁú´óÍõ½£¡·¡¢¡¶Delicious Party Precure¡·¡¢¡¶ÊýÂë·ÏÎïÓÄÁéÓÎÏ·¡·ºÍ¡¶º£ÔôÍõ¡·Ð¾缯µÄ²¥³ö½«ÑÓ³Ù£¬£¬£¬Ö±ÖÁÁíÐÐ֪ͨ¡£¡£¡£ÕâÁÔôÍõµÄ·ÛË¿ÃǺÜÊÇʧÍû£¬£¬£¬ËûÃÇÕýÆÚ´ý¸ÃϵÁеÚ1000ÕµÄÐû²¼¡£¡£¡£Æ¾Ö¤ToeiµÄͨ¸æ£¬£¬£¬ÆäÔÚ3ÔÂ6ÈÕ¼ì²âµ½Î´¾ÊÚȨµÄ»á¼û£¬£¬£¬²¢ÔÚÔ½ÈչرÕÁËËùÓеÄÄÚ²¿ÏµÍ³£¬£¬£¬¶Ô´ËÊÂÕö¿ªÊӲ졣¡£¡£ÖÖÖÖ¼£ÏóÅú×¢ÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ÊÂÎñ£¬£¬£¬µ«ÏÖÔÚÑо¿Ö°Ô±»¹ÎÞ·¨Ö¤ÊµÕâÒ»µã¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-one-piece-anime-episodes-delayed-after-toei-cyberattack/
Çå¾²¹¤¾ß
ASSAMEE
Anonfiles µÄÃâ·Ñ¸ß¼¶¼ÓÃÜÆ÷£¬£¬£¬Ê¹Óø߼¶¼ÓÃÜÒªÁìʹÓà AES-256 ¼ÓÃÜĿ¼¡£¡£¡£
https://github.com/samhaxr/ASSAMEE
Scanmycode Ce
ËüÊÇÒ»ÖÖ´úÂëɨÃè/SAST/¾²Ì¬ÆÊÎö/Linting ½â¾ö¼Æ»®£¬£¬£¬Ê¹ÓÃÐí¶à¹¤¾ß/ɨÃèÒǺÍÒ»¸ö±¨¸æ¡£¡£¡£
https://github.com/marcinguy/scanmycode-ce
Oh365UserFinder
ÓÃÓÚʶ±ðÓÐÓÃµÄ o365 ÕÊ»§ºÍÓò£¬£¬£¬¶ø²»±£´æÕÊ»§Ëø¶¨µÄΣº¦¡£¡£¡£
https://github.com/dievus/Oh365UserFinder
ADExplorerSnapshot.py
ÊÇAD Explorer ¿ìÕÕÆÊÎöÆ÷£¬£¬£¬×÷Ϊ BloodHound µÄ ingestor£¬£¬£¬»¹Ö§³Ö½«ÍêÕû¹¤¾ßת´¢µ½ NDJSON¡£¡£¡£
https://github.com/c3c/ADExplorerSnapshot.py
Çå¾²ÆÊÎö
AnonymousÈëÇÖÁ˶íÂÞ˹µÄ 400 ¸öÇå¾²ÉãÏñÍ·
https://www.hackread.com/anonymous-sent-texts-to-russians-hacked-security-cams/
Riverbed Èí¼þÖб£´æµÄ4¸öÑÏÖØµÄÎó²î
https://www.theregister.com/2022/03/11/riverbed_vulnerabilities/
ͨ¹ýËÙÂÊÏÞÖÆ RDP ±©Á¦¹¥»÷
https://blog.malwarebytes.com/explained/2022/03/blunting-rdp-brute-force-attacks-with-rate-limiting/
Kali Linux ΪÂã»ú×°ÖÃÌí¼ÓÁËÀàËÆ VM µÄ¿ìÕÕ¹¦Ð§
https://www.bleepingcomputer.com/news/linux/kali-linux-adds-vm-like-snapshot-feature-to-bare-metal-installs/
Å·Ä·Áú PLC ±à³ÌÈí¼þÖÐÐÞ²¹µÄ¸ßΣÎó²î
https://www.securityweek.com/high-severity-vulnerabilities-patched-omron-plc-programming-software


¾©¹«Íø°²±¸11010802024551ºÅ