¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î

Ðû²¼Ê±¼ä 2023-06-27

1¡¢¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î


¾Ý6ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¼ÓÄôóʯÓ͹«Ë¾(Petro-Canada)¼ÓÓÍÕ¾µÄ¿Í»§ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨»ò½±Àø»ý·Ö¸¶¿î£¬£¬£¬£¬£¬£¬Æäĸ¹«Ë¾Suncor Energy͸¶ËûÃÇÔâµ½Á˹¥»÷¡£¡£¡£¡£¡£Suncor EnergyÊÇÊǼÓÄôó×î´óµÄºÏ³ÉÔ­ÓÍÉú²úÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬ÄêÊÕÈë´ï310ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬Æä×Ó¹«Ë¾Petro-CanadaÔÚ¼ÓÄôó¸÷µØÄ±»®1500¶à¸ö¼ÓÓÍÕ¾¡£¡£¡£¡£¡£Suncor͸¶£¬£¬£¬£¬£¬£¬¿Í»§ÎÞ·¨Í¨¹ýÓ¦ÓûòÍøÕ¾µÇ¼ÕÊ»§£¬£¬£¬£¬£¬£¬Ò²ÎÞ·¨ÔÚ¼ÓÓÍʱ»ñµÃ»ý·Ö¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÕæÕæÏàÐÎËÆºõ±È֪ͨµÄÒªÔã¸â£¬£¬£¬£¬£¬£¬ÏÖÔÚ¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶£¬£¬£¬£¬£¬£¬Ö»ÄÜʹÓÃÏֽ𣬣¬£¬£¬£¬£¬ÓµÓÐÏ´³µ¼¾¿¨µÄ¿Í»§Ò²ÎÞ·¨ÏíÊÜÈ¨Òæ£¬£¬£¬£¬£¬£¬ËûÃÇÏÖÔÚÒªÇóÍ˿¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/


2¡¢iOttieÍøÕ¾±»ÈëÇÖÏßÉϹºÎïÕßµÄÒøÐп¨ºÍСÎÒ˽¼ÒÐÅϢй¶


¾ÝýÌå6ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Æû³µÖ§¼ÜºÍÒÆ¶¯Åä¼þÖÆÔìÉÌiOttie³Æ£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÔÚ½üÁ½¸öÔ±»ÈëÇÖ£¬£¬£¬£¬£¬£¬ÍøÉϹºÎïÕßµÄÐÅÓÿ¨ºÍСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£iOttieÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÓÚ6ÔÂ13ÈÕ·¢Ã÷ÆäÔÚÏßÊÐËÁÔÚ4ÔÂ12ÈÕÖÁ6ÔÂ2ÈÕÔâµ½¶ñÒâ¾ç±¾¹¥»÷¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵Ĺ¥»÷³ÆÎªMageCart£¬£¬£¬£¬£¬£¬ÏÖÔÚ¶ñÒâ´úÂëÒÑͨ¹ý²å¼þ¸üÐÂɾ³ý£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß¿ÉÄÜÒѾ­»ñµÃÁËÓû§µÄÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬Éæ¼°Õʺš¢¿¨ºÅ¡¢Çå¾²Âë¡¢»á¼ûÂë¡¢ÃÜÂëºÍPINµÈ¡£¡£¡£¡£¡£ËäÈ»iOttieûÓÐ͸¶ËûÃÇÊÇÔõÑù±»¹¥»÷µÄ£¬£¬£¬£¬£¬£¬µ«ËûÃǵÄÔÚÏßÊÐËÁÊÇÒ»¸ö´øÓÐWooCommerce²å¼þµÄWordPressÍøÕ¾¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/iottie-discloses-data-breach-after-site-hacked-to-steal-credit-cards/


3¡¢Unit 42·¢Ã÷Muddled LibraÕë¶ÔBPOÐÐÒµµÄ¹¥»÷»î¶¯


Unit 42ÔÚ6ÔÂ21ÈÕÅû¶ÁËMuddled LibraÕýÔÚÕë¶ÔÓªÒµÁ÷³ÌÍâ°ü(BPO)ÐÐÒµµÄÒ»Á¬¹¥»÷»î¶¯¡£¡£¡£¡£¡£2022Äêµ×£¬£¬£¬£¬£¬£¬Ëæ×Å0ktapus´¹ÂÚ¹¤¾ß°üµÄÐû²¼£¬£¬£¬£¬£¬£¬Muddled LibraµÄ¹¥»÷Æø¸Å¸¡³öË®Ãæ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊÓ²ìÁË2022ÄêÖÐÖÁ2023ÄêÍ·µÄ6ÆðÏà¹ØÊÂÎñ£¬£¬£¬£¬£¬£¬·¢Ã÷¸Ã×éÖ¯µÄÌØµãÊÇʹÓÃ0ktapusÌ×¼þ¡¢ÍçÇ¿¡¢¹¥»÷Õ½ÂÔÎÞа¡¢Õë¶ÔBPOÐÐÒµ¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°ÔÚÏÂÓι¥»÷ÖÐʹÓñ»ÈëÇֵĻù´¡ÉèÊ©µÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯µÄÉ繤¹¥»÷ºÜÊÇÀֳɣ¬£¬£¬£¬£¬£¬ÔÚ¶à¸ö°¸ÀýÖÐ˵·þÁËÄ¿µÄ¾ÙÐв»Çå¾²µÄÐÐΪ¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/muddled-libra/


4¡¢CERT-UA³Æ¶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþЧÀÍÆ÷±»ºÚ


ýÌå6ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼CERT-UAºÍRecorded FutureÁªºÏÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬APT28ÈëÇÖÁ˶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÔ¶íÎÚ³åÍ»µÄÐÂÎÅΪÓÕ¶ü·¢ËͶñÒâÓʼþ£¬£¬£¬£¬£¬£¬ÕâЩÓʼþ½«Ê¹ÓÃRoundcube WebmailÎó²î£¨CVE-2021-44026µÈ£©ÈëÇÖδ´ò²¹¶¡µÄЧÀÍÆ÷¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß»á×°ÖöñÒâ¾ç±¾£¬£¬£¬£¬£¬£¬½«Ä¿µÄµÄ´«ÈëÓʼþÖØ¶¨Ïòµ½¹¥»÷Õߵĵص㣬£¬£¬£¬£¬£¬»¹ÇÔÈ¡µØµã²¾¡¢»á»°cookieÒÔ¼°´æ´¢ÔÚRoundcubeÊý¾Ý¿âÖÐµÄÆäËüÐÅÏ¢¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬APT28ÔÚÕâЩ¹¥»÷ÖÐʹÓõĻù´¡ÉèʩԼĪ×Ô2021Äê11ÔÂÆð¾Í×îÏÈÔËÐС£¡£¡£¡£¡£


https://securityaffairs.com/147681/apt/apt28-hacked-roundcube-ukraine.html


5¡¢Êý°ÙÍò¸öGitHub´æ´¢¿âÈÝÒ×Ôâµ½RepoJacking¹¥»÷


 AquaSecÔÚ6ÔÂ21Èճƣ¬£¬£¬£¬£¬£¬´ó×ÚGitHub´æ´¢¿âÈÝÒ×Ôâµ½ÒÀÀµÏî´æ´¢¿âÐ®ÖÆ£¨Ò²³ÆÎª¡°RepoJacking¡±£©¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË125Íò¸öGitHubÑù±¾£¬£¬£¬£¬£¬£¬·¢Ã÷Ô¼2.95%Ò×ÊÜRepoJacking¹¥»÷¡£¡£¡£¡£¡£½«´Ë°Ù·Ö±ÈÍÆ¹ãµ½GitHubÁè¼Ý3ÒڵĴ洢¿â£¬£¬£¬£¬£¬£¬Ô¤¼Æ¸ÃÎÊÌâÓ°ÏìÁËԼĪ900Íò¸öÏîÄ¿¡£¡£¡£¡£¡£AquaSecɨÃèÁË×ÅÃû×éÖ¯ÖеĴ洢¿â£¬£¬£¬£¬£¬£¬²¢ÔÚGoogleºÍLyftÖÎÀíµÄ´æ´¢¿âÖз¢Ã÷ÁË¿ÉʹÓõݸÀý¡£¡£¡£¡£¡£²»ÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬RepoJackingºÜÊÇÆÕ±éÇÒÄÑÒÔ»º½â£¬£¬£¬£¬£¬£¬ÏîÄ¿ËùÓÐÕßÓ¦¾¡¿ÉÄÜïÔÌ­´ÓÍⲿ´æ´¢¿â»ñÈ¡×ÊÔ´¡£¡£¡£¡£¡£


https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking


6¡¢½©Ê¬ÍøÂçCondiͨ¹ýTP-LinkÎó²îCVE-2023-1389Èö²¥


6ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Fortinet³ÆÆä·¢Ã÷ÁËÒ»¸öеÄDDoS½©Ê¬ÍøÂçCondi£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔTP-Link Archer AX21 (AX1800)·ÓÉÆ÷¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÁË·ÓÉÆ÷WebÖÎÀí½çÃæAPIÖеÄÒ»¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2023-1389£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÓÚ3Ô·ݱ»ÐÞ¸´¡£¡£¡£¡£¡£Condi»¹»áɱËÀ¾ºÕù¹ØÏµµÄÆäËü½©Ê¬ÍøÂçµÄÏà¹ØÀú³Ì£¬£¬£¬£¬£¬£¬Ò²»á×èÖ¹Æä×ÔÉíµÄ¾É°æ±¾¡£¡£¡£¡£¡£¹ØÓÚCondiµÄDDoS¹¥»÷ÄÜÁ¦£¬£¬£¬£¬£¬£¬ÆäÖ§³ÖÓëMiraiÀàËÆµÄÖÖÖÖTCPºÍUDP¹¥»÷ÒªÁì¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389