·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
Ðû²¼Ê±¼ä 2023-03-301¡¢·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬·áÌïÒâ´óÀû¹«Ë¾ÒâÍâй¶ÁËÆäÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞ¡£¡£¡£2ÔÂ14ÈÕ£¬£¬£¬CybernewsÍŶÓÔÚ·áÌïÒâ´óÀû¹Ù·½ÍøÕ¾ÉÏ·¢Ã÷ÁËÒ»¸öÇéÐÎÎļþ(.env)¡£¡£¡£Ëü¹ûÕæÁËÆäSalesforce Marketing CloudºÍMapbox APIµÄƾ֤£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áÀÄÓôËÐÅÏ¢À´»ñÈ¡·áÌï¿Í»§µÄµç»°ºÅÂëºÍÓʼþµØµãµÈÐÅÏ¢£¬£¬£¬²¢Ö´Ðд¹ÂÚ¹¥»÷¡£¡£¡£¸ÃÇéÐÎÎļþÓÚ2021Äê5ÔÂ21ÈÕÊ״α»IoTËÑË÷ÒýÇæ±àÈëË÷Òý£¬£¬£¬ÕâÒâζ×ÅËüÒѹûÕæÁËÒ»Äê°ëÒÔÉÏ¡£¡£¡£ÏÖÔÚ£¬£¬£¬Ð¹Â¶Êý¾ÝÒѾ±»±£»£»£»£»£»¤ÆðÀ´¡£¡£¡£
https://cybernews.com/security/toyota-customer-data-leak/
2¡¢QNAPÐû²¼¸üУ¬£¬£¬ÐÞ¸´ÆäNAS×°±¸ÖеÄSudoÌáȨÎó²î
¾Ý3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬QNAPÐÞ¸´ÁË»ùÓÚLinuxµÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸ÖеÄSudoÌáȨÎó²î¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2023-22809£¬£¬£¬±»ÐÎòΪ¡°ÔÚSudo1.9.12p1°æ±¾ÖÐʹÓÃsudoeditÊ±ÈÆ¹ýsudoersÕ½ÂÔ¡±¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«í§ÒâÌõÄ¿Ìí¼Óµ½Òª´¦Öóͷ£µÄÎļþÁбíºó±à¼Î´¾ÊÚȨµÄÎļþÀ´ÌáÉýȨÏÞ¡£¡£¡£¸Ã¹«Ë¾ÒѾ½â¾öÁËQTSºÍQuTS heroƽ̨ÖеÄÎó²î£¬£¬£¬²¢ÔÚÆð¾¢ÌṩQuTScloudºÍQVPÇå¾²¸üС£¡£¡£
https://www.bleepingcomputer.com/news/security/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices/
3¡¢ÃÀ¹ú¹ºÕ®¹«Ë¾NCBÔâµ½¹¥»÷½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬ÃÀ¹ú¹ºÕ®¹«Ë¾NCB Management ServicesÔâµ½¹¥»÷£¬£¬£¬½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶¡£¡£¡£NCBÓÚ2ÔÂ4ÈÕ·¢Ã÷£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½ÓÚ2ÔÂ1ÈÕ»ñµÃÁËNCBϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬²¢ÓÚ3ÔÂ8ÈÕÈ·ÈϿͻ§ÓëÃÀ¹úÒøÐÐÐÅÓÿ¨ÕË»§Ïà¹ØµÄһЩÐÅϢй¶¡£¡£¡£¸ÃÊÂÎñÉæ¼°494969È˵ÄÐÕÃû¡¢¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÅÓÿ¨ºÅÂ롢·ÓɺÅÂë¡¢ÕË»§Óà¶îºÍÕË»§×´Ì¬µÈ¡£¡£¡£ÃÀ¹úÒøÐн«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩExperian IdentityWorksSMÁ½ÄêµÄÉí·Ý͵ÇÔ±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£
https://therecord.media/debt-buyer-cyberattack-data-breach
4¡¢ÐÂAPT43ÔÚÒÑÍùµÄ5ÄêÖÐÒ»Ö±¹¥»÷Î÷Å·ÈÕº«µÈµØÇøµÄ×éÖ¯
3ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬£¬Ð·¢Ã÷µÄºÚ¿ÍÍÅ»ïAPT43×Ô2018ÄêÒÔÀ´Ò»Ö±Õë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢ÈÕ±¾ºÍº«¹úµÄÕþ¸®¡¢Ñ§ÊõºÍÖÇÄÒÍÅÏà¹Ø×éÖ¯¡£¡£¡£APT43ʹÓÃÓã²æÊ½´¹ÂÚÓʼþÀ´ÇÔȡĿµÄµÄÕÊ»§Æ¾Ö¤£¬£¬£¬È»ºóÒÔÄ¿µÄÈËÎïµÄÉí·ÝµÇ¼²¢×ÔÐÐÖ´ÐÐÇé±¨ÍøÂç¡£¡£¡£APT43»¹Ê¹ÓöñÒâAndroidÓ¦Ó㬣¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¡£¡£¡£Mandiant±¨¸æËµ£¬£¬£¬ÆäËûÑо¿Ö°Ô±ÔÚÒÑÍùÔø·¢Ã÷ÁËAPT43»î¶¯£¬£¬£¬µ«Í¨³£½«Æä¹éÒòÓÚKimsuky»òThalium¡£¡£¡£
https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage
5¡¢´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐòÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø
3ÔÂ28ÈÕ£¬£¬£¬Kaspersky³ÆÆä·¢Ã÷ÁË´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐò£¬£¬£¬Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø¡£¡£¡£ÕâЩװÖóÌÐò°üÀ¨Ò»¸ö±ê×¼°æ±¾µÄTorä¯ÀÀÆ÷£¬£¬£¬ÒÔ¼°Ò»¸öÌØÁíÍâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬Òþ²ØÔÚÊÜÃÜÂë±£»£»£»£»£»¤µÄRARÖС£¡£¡£Torä¯ÀÀÆ÷ÔÚǰ̨Æô¶¯Ê±£¬£¬£¬¸ÃÎļþÔÚºǫ́ÌáÈ¡¶ñÒâÈí¼þ¡£¡£¡£¸Ã¶ñÒâÈí¼þ»á¼àÊÓ¼ôÌù°åÖпÉʶ±ðµÄ¼ÓÃÜÇ®°üµØµã£¬£¬£¬²¢ÔÚ¼ì²âµ½Ê±½«ÆäÌæ»»Îª¹¥»÷ÕߵļÓÃÜÇ®±ÒµØµã¡£¡£¡£ÔÚ2022Äê8ÔÂÖÁ2023Äê2ÔÂʱ´ú£¬£¬£¬Ñо¿Ö°Ô±ÔÚ52¸ö¹ú¼Ò/µØÇø¼ì²âµ½16000¸ö´ËÀàTor×°ÖóÌÐòµÄ±äÌå¡£¡£¡£
https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
6¡¢µçÐŹ«Ë¾LumenÅû¶Æä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñµÄÏêÇé
3ÔÂ28ÈÕ±¨µÀ£¬£¬£¬µçÐŹ«Ë¾Lumen TechnologiesÅû¶ÁËÆä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñ¡£¡£¡£Ê×ÏÈ£¬£¬£¬¸Ã¹«Ë¾ÔÚÉÏÖÜ·¢Ã÷Æä²¿·ÖÖ§³Ö·Ö¶ÎÍйÜЧÀ͵ÄЧÀÍÆ÷ѬȾÁËÀÕË÷Èí¼þ¡£¡£¡£ÔÚ·¢Ã÷ÀÕË÷¹¥»÷ºó£¬£¬£¬¸Ã¹«Ë¾¼Ó¹ÌÁËÇå¾²Èí¼þ²¢·¢Ã÷ÁËÁíÒ»Æð¹¥»÷ÊÂÎñ¡£¡£¡£ÔÚÕâµÚ¶þ´ÎÊÂÎñÖУ¬£¬£¬¹¥»÷ÕßÈëÇÖÁ˹«Ë¾µÄÄÚ²¿ÐÅÏ¢ÊÖÒÕϵͳ£¬£¬£¬×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£LumenÒѽ«´ËÊÂִ֪ͨ·¨²¿·Ö£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§±¨¸æÁËÕâÒ»ÊÂÎñ¡£¡£¡£
https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html


¾©¹«Íø°²±¸11010802024551ºÅ