CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î

Ðû²¼Ê±¼ä 2023-03-03

1¡¢CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î


CiscoÔÚ3ÔÂ1ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆäIP Phone 6800¡¢7800¡¢7900ºÍ8800ϵÁвúÆ·µÄÎó²î¡£¡£¡£¡£ÕâÊÇ»ùÓÚWebµÄÖÎÀí½çÃæÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20078£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚ¶ÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬£¬£¬£¬£¬£¬£¬ÀֳɵÄʹÓôËÎó²î¿ÉÔÚÊÜÓ°Ïì×°±¸µÄµ×²ã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹Åû¶ÁËDoSÎó²î£¨CVE-2023-20079£©£¬£¬£¬£¬£¬£¬£¬Ò²ÊǶÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬£¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´´¥·¢DoSÌõ¼þ¡£¡£¡£¡£


https://thehackernews.com/2023/03/critical-flaw-in-cisco-ip-phone-series.html


2¡¢Exchange Online·ºÆðBugµ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼û


¾ÝýÌå3ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬MicrosoftÕýÔÚÊÓ²ìÈ«ÇòExchange OnlineÓû§ÎÞ·¨»á¼ûÆäÓÊÏäµÄÎÊÌâ¡£¡£¡£¡£´Ó3ÔÂ1ÈÕ1:11 PM UTC×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§ÔÚ·¢ËÍ»òÎüÊÕÓʼþʱ»á¿´µ½"550 5.4.1 Recipient address rejected: Access denied"µÄ¹ýʧÌáÐÑ¡£¡£¡£¡£MicrosoftÔÚ5:22 PM UTC³ÆÒѾ­·¢Ã÷ÁËÒ»¸öDZÔڵĻùÓÚĿ¼µÄ±ßÑØ·â±Õ£¨DBEB£©ÎÊÌâ¡£¡£¡£¡£16:01 EST£¬£¬£¬£¬£¬£¬£¬MicrosoftÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýExchange Online Protection(EOP)Á÷Á¿ÔÚÊÜÓ°ÏìµÄ»ù´¡ÉèÊ©ÖÐÖØÐÂÉèÖ÷ÓÉ£¬£¬£¬£¬£¬£¬£¬½â¾öÁ˸ÃÎÊÌâ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-exchange-online-outage-blocks-access-to-mailboxes-worldwide/


3¡¢eSentireÅû¶Õë¶Ô¶à¸ö״ʦÊÂÎñËùµÄ¹¥»÷»î¶¯µÄÏêÇé


eSentireÓÚ2ÔÂ28ÈÕÅû¶ÁËÔÚ2023Äê1ÔºÍ2ÔÂÕë¶Ô6¼Ò²î±ðµÄ״ʦÊÂÎñËùµÄ¹¥»÷¡£¡£¡£¡£ÕâЩ¹¥»÷Ô´×ÔÁ½¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÔͼÓöñÒâÈí¼þGootLoaderѬȾ״ʦÊÂÎñËùµÄÔ±¹¤£¬£¬£¬£¬£¬£¬£¬ÁíÒ»³¡»î¶¯Ê¹ÓöñÒâÈí¼þSocGholish¹¥»÷״ʦÊÂÎñËùÔ±¹¤ºÍÆäËüÄ¿µÄ¡£¡£¡£¡£GootLoader»î¶¯Ê¹ÓÃËÑË÷ÒýÇæÓÅ»¯(SEO)Öж¾£¬£¬£¬£¬£¬£¬£¬ÆäÈëÇÖÁËÕýµ±µÄWordPressÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óá°Ð­Ò顱µÈÒªº¦×ÖÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£SocGholish»î¶¯Ê¹ÓÃÁË״ʦÊÂÎñËù¾­³£»Ý¹ËµÄÍøÕ¾¾ÙÐÐË®¿Ó¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔÐéαµÄä¯ÀÀÆ÷¸üÐÂΪÓÕ¶üÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£


https://www.esentire.com/blog/hackers-attack-employees-from-six-law-firms-with-the-gootloader-and-socgholish-malware-using-fake-legal-agreements-and-malicious-watering-hole-s-reports-esentire


4¡¢°µÍøBidenCashÖÜÄê»î¶¯¹ûÕæ200¶àÍòÕÅÐÅÓÿ¨µÄÐÅÏ¢


¾Ý3ÔÂ2ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ò»¸ö°µÍøÐÅÓÿ¨Êг¡BidenCash¹ûÕæÁËÁè¼Ý200ÍòÕÅÓÐÓÃÐÅÓÿ¨µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬×÷ΪÆäÖÜÄê´ÙÏú»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£ÕâЩÐÅÓÿ¨À´×ÔÌìϸ÷µØ£¬£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖÊÇÔÚÃÀ¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢¼ÓÄôóºÍÓ¢¹ú¿¯Ðеġ£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨³Ö¿¨È˵ÄÐÕÃû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢¡¢ÓÐÓÃÆÚ¡¢¿¨ÑéÖ¤Öµ(CVV)¡¢¼ÒͥסַºÍÁè¼Ý500000¸öÓʼþµØµã¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬BidenCashÇÔÊØÐÅÏ¢µÄ·½·¨Éв»Ã÷È·£¬£¬£¬£¬£¬£¬£¬Õþ¸®ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÊÜÓ°ÏìµÄ³Ö¿¨ÈË¼à¿ØËûÃǵÄÕË»§¡£¡£¡£¡£


https://www.hackread.com/bidencash-leaks-2-million-credit-cards/


5¡¢Ó¢¹úÁãÊÛÊÐËÁWH Smith³ÆÆäÔ±¹¤Êý¾ÝÔâµ½²»·¨»á¼û


ýÌå3ÔÂ2Èճƣ¬£¬£¬£¬£¬£¬£¬Ó¢¹úÁãÊÛÊÐËÁWH SmithÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔ±¹¤ºÍǰԱ¹¤µÄÐÅϢй¶¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¢¹úı»®×Å1700¸öÊÐËÁ£¬£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý12500ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬2022ÄêµÄÊÕÈëΪ16.7ÒÚÃÀÔª¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñµ¼Ö¹«Ë¾µÄ²¿·ÖÊý¾Ý±»²»·¨»á¼û£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Ó°ÏìÆäÉÌÒµÓªÒµ¡£¡£¡£¡£¿£¿ £¿£¿£¿£¿Í»§ÐÅϢûÓÐÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩÐÅÏ¢´æ´¢ÔÚµ¥¶ÀµÄϵͳÉÏ¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄÜÊÇÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£ËäȻûÓйØÓÚ¹¥»÷ÈÕÆÚµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷Ó¦¸ÃÊDZ¬·¢ÔÚ1ÔÂ18ÈÕÖ®ºó¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/british-retail-chain-wh-smith-says-data-stolen-in-cyberattack/


6¡¢TrendMicroÐû²¼APT27¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ


3ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬Trend MicroÐû²¼ÁËAPT27£¨Iron Tiger£©Linux°æ±¾×Ô½ç˵¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ºÚ¿ÍÓÚ2022Äê7ÔÂÊ״βâÊÔÁËLinux°æ±¾£¬£¬£¬£¬£¬£¬£¬È»¶øÖ±µ½2022Äê10Ô£¬£¬£¬£¬£¬£¬£¬¶à¸öpayload²Å×îÏÈÔÚÒ°ÍâÈö²¥¡£¡£¡£¡£¸ÃLinux±äÌåÊÇÒ»¸öELF¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃAsio¿âÓÃC++¿ª·¢£¬£¬£¬£¬£¬£¬£¬Æä¹¦Ð§ÓëWindows°æSysUpdateºÜÊÇÏàËÆ£¬£¬£¬£¬£¬£¬£¬ÐÂÔöÁËDNSËíµÀ¹¦Ð§¡£¡£¡£¡£Trend MicroÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ñ¡ÔñAsio¿âÀ´¿ª·¢Linux°æ±¾µÄSysUpdate¿ÉÄÜÊÇÓÉÓÚËüµÄ¶àƽ̨¿ÉÒÆÖ²ÐÔ£¬£¬£¬£¬£¬£¬£¬²¢Õ¹ÍûmacOS°æ±¾¿ÉÄܺܿì¾Í»á·ºÆð¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html