¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î

Ðû²¼Ê±¼ä 2023-06-27

1¡¢¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î


¾Ý6ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬£¬¼ÓÄôóʯÓ͹«Ë¾(Petro-Canada)¼ÓÓÍÕ¾µÄ¿Í»§ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨»ò½±Àø»ý·Ö¸¶¿î£¬£¬£¬£¬£¬ £¬£¬£¬Æäĸ¹«Ë¾Suncor Energy͸¶ËûÃÇÔâµ½Á˹¥»÷¡£¡£¡£¡£¡£¡£Suncor EnergyÊÇÊǼÓÄôó×î´óµÄºÏ³ÉÔ­ÓÍÉú²úÉÌÖ®Ò»£¬£¬£¬£¬£¬ £¬£¬£¬ÄêÊÕÈë´ï310ÒÚÃÀÔª£¬£¬£¬£¬£¬ £¬£¬£¬Æä×Ó¹«Ë¾Petro-CanadaÔÚ¼ÓÄôó¸÷µØÄ±»®1500¶à¸ö¼ÓÓÍÕ¾¡£¡£¡£¡£¡£¡£Suncor͸¶£¬£¬£¬£¬£¬ £¬£¬£¬¿Í»§ÎÞ·¨Í¨¹ýÓ¦ÓûòÍøÕ¾µÇ¼ÕÊ»§£¬£¬£¬£¬£¬ £¬£¬£¬Ò²ÎÞ·¨ÔÚ¼ÓÓÍʱ»ñµÃ»ý·Ö¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬£¬£¬ÕæÕæÏàÐÎËÆºõ±È֪ͨµÄÒªÔã¸â£¬£¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚ¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶£¬£¬£¬£¬£¬ £¬£¬£¬Ö»ÄÜʹÓÃÏֽ𣬣¬£¬£¬£¬ £¬£¬£¬ÓµÓÐÏ´³µ¼¾¿¨µÄ¿Í»§Ò²ÎÞ·¨ÏíÊÜÈ¨Òæ£¬£¬£¬£¬£¬ £¬£¬£¬ËûÃÇÏÖÔÚÒªÇóÍ˿¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/


2¡¢iOttieÍøÕ¾±»ÈëÇÖÏßÉϹºÎïÕßµÄÒøÐп¨ºÍСÎÒ˽¼ÒÐÅϢй¶


¾ÝýÌå6ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬£¬Æû³µÖ§¼ÜºÍÒÆ¶¯Åä¼þÖÆÔìÉÌiOttie³Æ£¬£¬£¬£¬£¬ £¬£¬£¬ÆäÍøÕ¾ÔÚ½üÁ½¸öÔ±»ÈëÇÖ£¬£¬£¬£¬£¬ £¬£¬£¬ÍøÉϹºÎïÕßµÄÐÅÓÿ¨ºÍСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£iOttieÌåÏÖ£¬£¬£¬£¬£¬ £¬£¬£¬ËûÃÇÓÚ6ÔÂ13ÈÕ·¢Ã÷ÆäÔÚÏßÊÐËÁÔÚ4ÔÂ12ÈÕÖÁ6ÔÂ2ÈÕÔâµ½¶ñÒâ¾ç±¾¹¥»÷¡£¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵Ĺ¥»÷³ÆÎªMageCart£¬£¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚ¶ñÒâ´úÂëÒÑͨ¹ý²å¼þ¸üÐÂɾ³ý£¬£¬£¬£¬£¬ £¬£¬£¬µ«¹¥»÷Õß¿ÉÄÜÒѾ­»ñµÃÁËÓû§µÄÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬£¬Éæ¼°Õʺš¢¿¨ºÅ¡¢Çå¾²Âë¡¢»á¼ûÂë¡¢ÃÜÂëºÍPINµÈ¡£¡£¡£¡£¡£¡£ËäÈ»iOttieûÓÐ͸¶ËûÃÇÊÇÔõÑù±»¹¥»÷µÄ£¬£¬£¬£¬£¬ £¬£¬£¬µ«ËûÃǵÄÔÚÏßÊÐËÁÊÇÒ»¸ö´øÓÐWooCommerce²å¼þµÄWordPressÍøÕ¾¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/iottie-discloses-data-breach-after-site-hacked-to-steal-credit-cards/


3¡¢Unit 42·¢Ã÷Muddled LibraÕë¶ÔBPOÐÐÒµµÄ¹¥»÷»î¶¯


Unit 42ÔÚ6ÔÂ21ÈÕÅû¶ÁËMuddled LibraÕýÔÚÕë¶ÔÓªÒµÁ÷³ÌÍâ°ü(BPO)ÐÐÒµµÄÒ»Á¬¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£2022Äêµ×£¬£¬£¬£¬£¬ £¬£¬£¬Ëæ×Å0ktapus´¹ÂÚ¹¤¾ß°üµÄÐû²¼£¬£¬£¬£¬£¬ £¬£¬£¬Muddled LibraµÄ¹¥»÷Æø¸Å¸¡³öË®Ãæ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊÓ²ìÁË2022ÄêÖÐÖÁ2023ÄêÍ·µÄ6ÆðÏà¹ØÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬£¬·¢Ã÷¸Ã×éÖ¯µÄÌØµãÊÇʹÓÃ0ktapusÌ×¼þ¡¢ÍçÇ¿¡¢¹¥»÷Õ½ÂÔÎÞа¡¢Õë¶ÔBPOÐÐÒµ¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°ÔÚÏÂÓι¥»÷ÖÐʹÓñ»ÈëÇֵĻù´¡ÉèÊ©µÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬£¬¸Ã×éÖ¯µÄÉ繤¹¥»÷ºÜÊÇÀֳɣ¬£¬£¬£¬£¬ £¬£¬£¬ÔÚ¶à¸ö°¸ÀýÖÐ˵·þÁËÄ¿µÄ¾ÙÐв»Çå¾²µÄÐÐΪ¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/muddled-libra/


4¡¢CERT-UA³Æ¶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþЧÀÍÆ÷±»ºÚ


ýÌå6ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬£¬ÎÚ¿ËÀ¼CERT-UAºÍRecorded FutureÁªºÏÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ £¬£¬£¬APT28ÈëÇÖÁ˶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÒÔ¶íÎÚ³åÍ»µÄÐÂÎÅΪÓÕ¶ü·¢ËͶñÒâÓʼþ£¬£¬£¬£¬£¬ £¬£¬£¬ÕâЩÓʼþ½«Ê¹ÓÃRoundcube WebmailÎó²î£¨CVE-2021-44026µÈ£©ÈëÇÖδ´ò²¹¶¡µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß»á×°ÖöñÒâ¾ç±¾£¬£¬£¬£¬£¬ £¬£¬£¬½«Ä¿µÄµÄ´«ÈëÓʼþÖØ¶¨Ïòµ½¹¥»÷Õߵĵص㣬£¬£¬£¬£¬ £¬£¬£¬»¹ÇÔÈ¡µØµã²¾¡¢»á»°cookieÒÔ¼°´æ´¢ÔÚRoundcubeÊý¾Ý¿âÖÐµÄÆäËüÐÅÏ¢¡£¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬ £¬£¬£¬APT28ÔÚÕâЩ¹¥»÷ÖÐʹÓõĻù´¡ÉèʩԼĪ×Ô2021Äê11ÔÂÆð¾Í×îÏÈÔËÐС£¡£¡£¡£¡£¡£


https://securityaffairs.com/147681/apt/apt28-hacked-roundcube-ukraine.html


5¡¢Êý°ÙÍò¸öGitHub´æ´¢¿âÈÝÒ×Ôâµ½RepoJacking¹¥»÷


 AquaSecÔÚ6ÔÂ21Èճƣ¬£¬£¬£¬£¬ £¬£¬£¬´ó×ÚGitHub´æ´¢¿âÈÝÒ×Ôâµ½ÒÀÀµÏî´æ´¢¿âÐ®ÖÆ£¨Ò²³ÆÎª¡°RepoJacking¡±£©¹¥»÷£¬£¬£¬£¬£¬ £¬£¬£¬¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË125Íò¸öGitHubÑù±¾£¬£¬£¬£¬£¬ £¬£¬£¬·¢Ã÷Ô¼2.95%Ò×ÊÜRepoJacking¹¥»÷¡£¡£¡£¡£¡£¡£½«´Ë°Ù·Ö±ÈÍÆ¹ãµ½GitHubÁè¼Ý3ÒڵĴ洢¿â£¬£¬£¬£¬£¬ £¬£¬£¬Ô¤¼Æ¸ÃÎÊÌâÓ°ÏìÁËԼĪ900Íò¸öÏîÄ¿¡£¡£¡£¡£¡£¡£AquaSecɨÃèÁË×ÅÃû×éÖ¯ÖеĴ洢¿â£¬£¬£¬£¬£¬ £¬£¬£¬²¢ÔÚGoogleºÍLyftÖÎÀíµÄ´æ´¢¿âÖз¢Ã÷ÁË¿ÉʹÓõݸÀý¡£¡£¡£¡£¡£¡£²»ÐÒµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬£¬RepoJackingºÜÊÇÆÕ±éÇÒÄÑÒÔ»º½â£¬£¬£¬£¬£¬ £¬£¬£¬ÏîÄ¿ËùÓÐÕßÓ¦¾¡¿ÉÄÜïÔÌ­´ÓÍⲿ´æ´¢¿â»ñÈ¡×ÊÔ´¡£¡£¡£¡£¡£¡£


https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking


6¡¢½©Ê¬ÍøÂçCondiͨ¹ýTP-LinkÎó²îCVE-2023-1389Èö²¥


6ÔÂ20ÈÕ£¬£¬£¬£¬£¬ £¬£¬£¬Fortinet³ÆÆä·¢Ã÷ÁËÒ»¸öеÄDDoS½©Ê¬ÍøÂçCondi£¬£¬£¬£¬£¬ £¬£¬£¬Ö÷ÒªÕë¶ÔTP-Link Archer AX21 (AX1800)·ÓÉÆ÷¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁË·ÓÉÆ÷WebÖÎÀí½çÃæAPIÖеÄÒ»¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2023-1389£©£¬£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÒÑÓÚ3Ô·ݱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£Condi»¹»áɱËÀ¾ºÕù¹ØÏµµÄÆäËü½©Ê¬ÍøÂçµÄÏà¹ØÀú³Ì£¬£¬£¬£¬£¬ £¬£¬£¬Ò²»á×èÖ¹Æä×ÔÉíµÄ¾É°æ±¾¡£¡£¡£¡£¡£¡£¹ØÓÚCondiµÄDDoS¹¥»÷ÄÜÁ¦£¬£¬£¬£¬£¬ £¬£¬£¬ÆäÖ§³ÖÓëMiraiÀàËÆµÄÖÖÖÖTCPºÍUDP¹¥»÷ÒªÁì¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389