Click StudiosÔ⹩¸øÁ´¹¥»÷£¬²úÆ·¸üзþÎñÆ÷±»½Ù³Ö£»HashiCorpÔâCodecov¹©¸øÁ´¹¥»÷£¬GPGÊðÃûÃÜԿй¶
°ä²¼¹¦·ò 2021-04-251.Click StudiosÔ⹩¸øÁ´¹¥»÷£¬²úÆ·¸üзþÎñÆ÷±»½Ù³Ö

Click Studios֪ͨ¿Í»§ÆäÔâµ½Á˹©¸øÁ´¹¥»÷£¬ÆäPasswordstateµÄ¸üзþÎñÆ÷±»½Ù³Ö¡£PasswordstateÊÇÒ»ÖÖ±¾µØÃÜÂëÖÎÀí½â¾ö¹æ»®£¬Òѱ»È«Çò29000¼Ò¹«Ë¾µÄ370000¶àÃû°²È«ºÍITÈËԱʹÓã¬Éæ¼°µ±¾Ö¡¢¹ú·À¡¢½ðÈÚ¡¢º½¿Õº½Ìì¡¢Ò½ÁƱ£½¡¡¢Ë¾·¨ºÍýÌåµÈÐÐÒµ¡£¸Ã¹«Ë¾³Æ£¬ºÚ¿ÍÔÚPasswordstateµÄÔʼ´úÂëÖÐÔö³¤ÁËÒ»¶ÎÖ¼ÔÚ´ÓC2ÖÐÏÂÔØpayloadµÄ'Loader'´úÂ룬Òò¶øÆä¿Í»§¿ÉÄÜÔÚ4ÔÂ20ÈÕÖÁ4ÔÂ22ÈÕÖ®¼äÏÂÔØÁËÒѱ»´Û¸ÄµÄÉý¼¶·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/passwordstate-password-manager-hacked-in-supply-chain-attack/
2.HashiCorpÔâCodecov¹©¸øÁ´¹¥»÷£¬GPGÊðÃûÃÜԿй¶

¿ªÔ´Èí¼þ¹¤¾ßºÍ»ù´¡ÉèÊ©ÌṩÉÌHashiCorpÔâµ½Codecov¹©¸øÁ´¹¥»÷£¬GPGÊðÃûÃÜԿй¶¡£¾Ýµ÷²é£¬Õâ´Î¹©¸øÁ´¹¥»÷×î³õ·çÏÕ²úÉúÔÚ1ÔÂ31ÈÕ£¬²¢³ÖÐøÁËԼĪÁ½¸öÔ£¬HashiCorpÓÃÓÚÊðÃûÀ´ÑéÖ¤HashiCorpµÄ²úÆ·µÄGPG˽Կ¾ÍÊÇÔÚÕâ¶Î¹¦·òй¶µÄ¡£¸Ã¹«Ë¾³Æ£¬Ä¿Ç°ÉÐδÓÐÖ¤¾ÝÅú×¢ÓÐÈËʹÓÃÁ˸ÃÃÜÔ¿£¬µ«ÔÚ°²È«Æð¼ûÈÔ¶ÔÆä½øÐÐÁ˸ü»»£¬ÏÖÒѰ䲼еÄGPGÃÜÔ¿¶Ô£ºC874 011F 0AB4 0511 0D02 1055 3436 5D94 72D7 468F¡£µ«ÊÇ£¬ÆäTerraform²úÆ·ÉÐδ´ò²¹¶¡À´Ê¹ÓÃеÄGPGÃÜÔ¿¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hashicorp-is-the-latest-victim-of-codecov-supply-chain-attack/
3.°¢¸ùÍ¢µÄ¹È¸èËÑË÷ÒýÇæÒòÓòÃû±»Òâ±íÏúÊÛ¶øÌ±»¾ÊýÓ×ʱ

ÉÏÖÜÈý£¬°¢¸ùÍ¢µÄ¹È¸èËÑË÷ÒýÇæÌ±»¾Á˽üÈý¸öÓ×ʱ¡£Æ¾¾ÝMercoPressµÄ×ÊÁÏÏÔʾ£¬Õâ´ÎÖжϵÄÔÒòÊÇÒ»¸öÃûΪNicolas DavidKuro?aµÄ°¢¸ùÍ¢¹«ÃñÒÔ540°¢¸ùÍ¢±ÈË÷£¨Ô¼ºÏ5.81ÃÀÔª£©µÄ¼ÛÖµ²É°ìÁËgoogle.com.arÓòÃûµÄËùÓÐȨ¡£Kuro?aÔÚµ±ÈÕÍíÉÏ10:45×óÓÒ°ä²¼ÍÆÎݵʾ£¬ËûÊǺϷ¨µÄ²É°ìÁ˸ÃÓòÃû¡£Õâ¸öÓòÃûÖ®ËùÒÔÄܹ»Ê¹Óã¬ÊÇÓÉÓڹȸ谢¸ùÍ¢¹«Ë¾Ã»ÓÐÔÚµ½ÆÚºóÐøÆÚ£¬Ê¹µÃÓû§Äܹ»ºÏ·¨ÇÀ×¢¡£µ«ÊǸÃÓòµÄ¹ýÆÚÈÕÆÚÊÇ7Ô£¬Ä¿Ç°ÉÐδ¹ýÆÚ£¬Òò¶ø¸Ã¹«ÃñÈôºÎºÏ·¨µÄ²É°ìËü³ÉΪÁËÒ»¸öÃÕ¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/google-argentina-domain-bought/
4.ÐÂLinux½©Ê¬ÍøÂçʹÓÃIaCºÍDevOpsµÈ¹¤¾ßÍÚ¾òÃÅÂÞ±Ò

Ç÷Ïò¿Æ¼¼µÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öеÄLinux½©Ê¬ÍøÂ磬ʹÓÃÁË»ù´¡¼Ü¹¹´úÂ루IaC£©¹¤¾ß¡¢Tor´úÀíºÍºÏ·¨µÄDevOps¹¤¾ßÀ´ÍÚ¾òXMRig Monero¡£¸ÃLinux½©Ê¬ÍøÂç´ÓTorÍøÂçÏÂÔØËüËùÐèµÄËùÓÐÎļþ£¬Ô̺¬ss¡¢psºÍcurlµÈºÏ·¨µÄ¶þ½øÔìÎļþ£¬»¹Ê¹ÓÃÁËShell¾ç±¾ºÍUnixϵͳÉè¼ÆÖ´ÐÐHTTPÒªÇó£¬ÒÔ»ñÈ¡ÓйØÊÜϰȾϵͳµÄ¸ü¶àÐÅÏ¢¡£´Ë±í£¬×êÑÐÈËÔ±³ÆÕâÊǵÚÒ»¸öÀûÓÃÁË»ù´¡¼Ü¹¹´úÂ루IaC£©¹¤¾ß£¬ÖîÈçAnsible¡¢ChefºÍSalt Stack½øÐд«²¼µÄ½©Ê¬ÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117155/malware/linux-botnet-emerging-techniques.html
5.д¹µö»î¶¯¼Ù×°³ÉÁÔÍ·¹«Ë¾Michael Page·Ö·¢Ursnif

ÐÂÒ»ÂÖ´¹µö»î¶¯¼Ù×°³ÉÖ°Òµ½éÉÜËùMichael Page·Ö·¢Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þUrsnif¡£Michael PageµÄÒµÎñ±é¼°ÃÀÖÞ¡¢Ó¢¹ú¡¢Å·Ö޴󽡢ÑÇÌ«µØÓòºÍ·ÇÖÞ£¬ÊÇÓ¢¹úµÄPageGroupµÄ×Ó¹«Ë¾¡£PageGroup³Æ£¬ÆäITϵͳ²¢Î´Ôâµ½¹¥»÷£¬ÕâЩ´¹µöÓʼþÊÇÀûÓù«¿ªÐÅÏ¢ÌìÉúµÄ¶øºóËæ»ú·¢Ë͸øÖ¸±êµÄ¡£ÕâЩÓʼþÀûÓÃǶÈëʽÁ´½Ó½«Êܺ¦Õß³Á¶¨Ïòµ½ÓµÓÐGeoIPºÍ·´»úеÈ˲é³Ö°ÄܵĴ¹µöÒ³Ãæ£¬¶øºó£¬ÒªÇóÆäÏÂÔØÆôÓÃÁ˺êµÄXSLMÎļþ²¢ÓµÓÐDocuSignÏóÕ÷µÄÎĵµ£¬×îºóÏÂÔØUrsnif¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-impersonates-global-recruitment-firm-to-push-malware/
6.×êÑÐÈËÔ±Åû¶Homebrew Cask´æ´¢¿âÖеĴúÂëÖ´Ðзì϶

ÈÕ±¾°²È«×êÑÐÈËÔ±RyotaKÓÚ4ÔÂ18ÈÕÅû¶Homebrew Cask´æ´¢¿âÖдæÔÚ´úÂëÖ´Ðзì϶¡£HomebrewÊÇÒ»¸ö¿ªÔ´Èí¼þ°üÖÎÀíÆ÷½â¾ö¹æ»®£¬¿ÉÔÚAppleµÄmacOS²Ù×÷ϵͳºÍLinuxÉÏ×°ÖÃÈí¼þ¡£¸Ã·ì϶ÊÇÓÉÓÚreview- cask -pr GitHub ActionµÄgit_diffÖÐÓÃÓÚ½âÎöpullÒªÇóµÄdiffÒÀÀµÏî´æÔÚȱµã£¬Òò¶ø½âÎöÆ÷¿ÉÄܻᱻºýŪ¶øºË×¼¶ñÒâµÄpullÒªÇ󣬿ɱ»ÓÃÀ´½«ËÁÒâ´úÂë×¢Èëµ½ÈÝÆ÷ÖС£Ä¿Ç°£¬¸Ã·ì϶ÒÑÓÚ4ÔÂ19ÈÕ±»½¨¸´¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/04/critical-rce-bug-found-in-homebrew.html


¾©¹«Íø°²±¸11010802024551ºÅ