CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î

Ðû²¼Ê±¼ä 2023-03-03

1¡¢CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î


CiscoÔÚ3ÔÂ1ÈÕÐû²¼Çå¾²¸üУ¬ £¬£¬£¬ÐÞ¸´Ó°ÏìÆäIP Phone 6800¡¢7800¡¢7900ºÍ8800ϵÁвúÆ·µÄÎó²î¡£¡£¡£ÕâÊÇ»ùÓÚWebµÄÖÎÀí½çÃæÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20078£©£¬ £¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬ £¬£¬£¬ÊÇÓÉÓÚ¶ÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬ £¬£¬£¬ÀֳɵÄʹÓôËÎó²î¿ÉÔÚÊÜÓ°Ïì×°±¸µÄµ×²ã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£±ðµÄ£¬ £¬£¬£¬¸Ã¹«Ë¾»¹Åû¶ÁËDoSÎó²î£¨CVE-2023-20079£©£¬ £¬£¬£¬Ò²ÊǶÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬ £¬£¬£¬¿É±»ÓÃÀ´´¥·¢DoSÌõ¼þ¡£¡£¡£


https://thehackernews.com/2023/03/critical-flaw-in-cisco-ip-phone-series.html


2¡¢Exchange Online·ºÆðBugµ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼û


¾ÝýÌå3ÔÂ1ÈÕ±¨µÀ£¬ £¬£¬£¬MicrosoftÕýÔÚÊÓ²ìÈ«ÇòExchange OnlineÓû§ÎÞ·¨»á¼ûÆäÓÊÏäµÄÎÊÌâ¡£¡£¡£´Ó3ÔÂ1ÈÕ1:11 PM UTC×îÏÈ£¬ £¬£¬£¬ÊÜÓ°ÏìÓû§ÔÚ·¢ËÍ»òÎüÊÕÓʼþʱ»á¿´µ½"550 5.4.1 Recipient address rejected: Access denied"µÄ¹ýʧÌáÐÑ¡£¡£¡£MicrosoftÔÚ5:22 PM UTC³ÆÒѾ­·¢Ã÷ÁËÒ»¸öDZÔڵĻùÓÚĿ¼µÄ±ßÑØ·â±Õ£¨DBEB£©ÎÊÌâ¡£¡£¡£16:01 EST£¬ £¬£¬£¬MicrosoftÌåÏÖ£¬ £¬£¬£¬Í¨¹ýExchange Online Protection(EOP)Á÷Á¿ÔÚÊÜÓ°ÏìµÄ»ù´¡ÉèÊ©ÖÐÖØÐÂÉèÖ÷ÓÉ£¬ £¬£¬£¬½â¾öÁ˸ÃÎÊÌâ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-exchange-online-outage-blocks-access-to-mailboxes-worldwide/


3¡¢eSentireÅû¶Õë¶Ô¶à¸ö״ʦÊÂÎñËùµÄ¹¥»÷»î¶¯µÄÏêÇé


eSentireÓÚ2ÔÂ28ÈÕÅû¶ÁËÔÚ2023Äê1ÔºÍ2ÔÂÕë¶Ô6¼Ò²î±ðµÄ״ʦÊÂÎñËùµÄ¹¥»÷¡£¡£¡£ÕâЩ¹¥»÷Ô´×ÔÁ½¸ö²î±ðµÄ¹¥»÷»î¶¯£¬ £¬£¬£¬ÆäÖÐÖ®Ò»ÊÔͼÓöñÒâÈí¼þGootLoaderѬȾ״ʦÊÂÎñËùµÄÔ±¹¤£¬ £¬£¬£¬ÁíÒ»³¡»î¶¯Ê¹ÓöñÒâÈí¼þSocGholish¹¥»÷״ʦÊÂÎñËùÔ±¹¤ºÍÆäËüÄ¿µÄ¡£¡£¡£GootLoader»î¶¯Ê¹ÓÃËÑË÷ÒýÇæÓÅ»¯(SEO)Öж¾£¬ £¬£¬£¬ÆäÈëÇÖÁËÕýµ±µÄWordPressÍøÕ¾£¬ £¬£¬£¬²¢Ê¹Óá°Ð­Ò顱µÈÒªº¦×ÖÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£SocGholish»î¶¯Ê¹ÓÃÁË״ʦÊÂÎñËù¾­³£»Ý¹ËµÄÍøÕ¾¾ÙÐÐË®¿Ó¹¥»÷£¬ £¬£¬£¬ÒÔÐéαµÄä¯ÀÀÆ÷¸üÐÂΪÓÕ¶üÈö²¥¶ñÒâÈí¼þ¡£¡£¡£


https://www.esentire.com/blog/hackers-attack-employees-from-six-law-firms-with-the-gootloader-and-socgholish-malware-using-fake-legal-agreements-and-malicious-watering-hole-s-reports-esentire


4¡¢°µÍøBidenCashÖÜÄê»î¶¯¹ûÕæ200¶àÍòÕÅÐÅÓÿ¨µÄÐÅÏ¢


¾Ý3ÔÂ2ÈÕ±¨µÀ£¬ £¬£¬£¬Ò»¸ö°µÍøÐÅÓÿ¨Êг¡BidenCash¹ûÕæÁËÁè¼Ý200ÍòÕÅÓÐÓÃÐÅÓÿ¨µÄÐÅÏ¢£¬ £¬£¬£¬×÷ΪÆäÖÜÄê´ÙÏú»î¶¯µÄÒ»²¿·Ö¡£¡£¡£ÕâЩÐÅÓÿ¨À´×ÔÌìϸ÷µØ£¬ £¬£¬£¬ÆäÖд󲿷ÖÊÇÔÚÃÀ¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢¼ÓÄôóºÍÓ¢¹ú¿¯ÐеÄ¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨³Ö¿¨È˵ÄÐÕÃû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢¡¢ÓÐÓÃÆÚ¡¢¿¨ÑéÖ¤Öµ(CVV)¡¢¼ÒͥסַºÍÁè¼Ý500000¸öÓʼþµØµã¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬BidenCashÇÔÊØÐÅÏ¢µÄ·½·¨Éв»Ã÷È·£¬ £¬£¬£¬Õþ¸®ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬ £¬£¬£¬²¢½¨ÒéÊÜÓ°ÏìµÄ³Ö¿¨ÈË¼à¿ØËûÃǵÄÕË»§¡£¡£¡£


https://www.hackread.com/bidencash-leaks-2-million-credit-cards/


5¡¢Ó¢¹úÁãÊÛÊÐËÁWH Smith³ÆÆäÔ±¹¤Êý¾ÝÔâµ½²»·¨»á¼û


ýÌå3ÔÂ2Èճƣ¬ £¬£¬£¬Ó¢¹úÁãÊÛÊÐËÁWH SmithÔâµ½¹¥»÷£¬ £¬£¬£¬ÏÖÔ±¹¤ºÍǰԱ¹¤µÄÐÅϢй¶¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¢¹úı»®×Å1700¸öÊÐËÁ£¬ £¬£¬£¬ÓµÓÐÁè¼Ý12500ÃûÔ±¹¤£¬ £¬£¬£¬2022ÄêµÄÊÕÈëΪ16.7ÒÚÃÀÔª¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬ £¬£¬£¬´Ë´ÎÊÂÎñµ¼Ö¹«Ë¾µÄ²¿·ÖÊý¾Ý±»²»·¨»á¼û£¬ £¬£¬£¬µ«²¢Î´Ó°ÏìÆäÉÌÒµÓªÒµ¡£¡£¡£¿£¿£¿£¿Í»§ÐÅϢûÓÐÊܵ½Ó°Ï죬 £¬£¬£¬ÓÉÓÚÕâЩÐÅÏ¢´æ´¢ÔÚµ¥¶ÀµÄϵͳÉÏ¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬ £¬£¬£¬µ«¿ÉÄÜÊÇÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£ËäȻûÓйØÓÚ¹¥»÷ÈÕÆÚµÄÏêϸÐÅÏ¢£¬ £¬£¬£¬µ«¹¥»÷Ó¦¸ÃÊDZ¬·¢ÔÚ1ÔÂ18ÈÕÖ®ºó¡£¡£¡£


https://www.bleepingcomputer.com/news/security/british-retail-chain-wh-smith-says-data-stolen-in-cyberattack/


6¡¢TrendMicroÐû²¼APT27¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ


3ÔÂ1ÈÕ£¬ £¬£¬£¬Trend MicroÐû²¼ÁËAPT27£¨Iron Tiger£©Linux°æ±¾×Ô½ç˵¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ¡£¡£¡£ºÚ¿ÍÓÚ2022Äê7ÔÂÊ״βâÊÔÁËLinux°æ±¾£¬ £¬£¬£¬È»¶øÖ±µ½2022Äê10Ô£¬ £¬£¬£¬¶à¸öpayload²Å×îÏÈÔÚÒ°ÍâÈö²¥¡£¡£¡£¸ÃLinux±äÌåÊÇÒ»¸öELF¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬Ê¹ÓÃAsio¿âÓÃC++¿ª·¢£¬ £¬£¬£¬Æä¹¦Ð§ÓëWindows°æSysUpdateºÜÊÇÏàËÆ£¬ £¬£¬£¬ÐÂÔöÁËDNSËíµÀ¹¦Ð§¡£¡£¡£Trend MicroÌåÏÖ£¬ £¬£¬£¬Ñ¡ÔñAsio¿âÀ´¿ª·¢Linux°æ±¾µÄSysUpdate¿ÉÄÜÊÇÓÉÓÚËüµÄ¶àƽ̨¿ÉÒÆÖ²ÐÔ£¬ £¬£¬£¬²¢Õ¹ÍûmacOS°æ±¾¿ÉÄܺܿì¾Í»á·ºÆð¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html