Colonial PipelineÒòÎ¥·´°²È«»®¶¨±»·£¿î½ü100ÍòÃÀÔª
°ä²¼¹¦·ò 2022-05-12¾ÝýÌå5ÔÂ10ÈÕ±¨Â·£¬ÒòÎ¥·´Áª¹ú°²È«ÂÉÀý£¬Colonial Pipeline±»ÃÀ¹úÔËÊ䲿¹Ü·ºÍΣÏÕ×ÊÁϰ²È«ÖÎÀí¾Ö(PHMSA)·£¿î986400ÃÀÔª¡£2021Äê5Ô³õ£¬ÃÀ¹ú×î´óȼÁϹÜ·ÔËÓªÉÌColonial PipelineÔâµ½DarkSideµÄÀÕË÷¹¥»÷£¬µ¼ÖÂÌìÈ»Æø¹©¸øÖжϣ¬Ê¹17¸öÖݽøÈ봹Σ״̬¡£PHMSA°µÊ¾¸Ã¹«Ë¾Î´µÐÊÖ¶¯¹Ø¹ØºÍ³ÁÐÂÆô¶¯Æä¹Ü·ϵͳ×öºÃ³ä·ÖµÄ´òË㣬Æä¹Ü·ÔÚ2021Äê5ÔµĹ¥»÷ºóÎÞ·¨Ê¹ÓÃʱ£¬¶ÔÈ«¹úÔì³ÉÁËÑϳÁÓ°Ïì¡£
https://thehackernews.com/2022/05/us-proposes-1-million-fine-on-colonial.html
2¡¢»ÝÆÕ°ä²¼BIOS¸üУ¬½¨¸´Ó°Ïì200¶à¸öÐͺŵķì϶
5ÔÂ11ÈÕ£¬»ÝÆÕ°ä²¼5Ô·ÝBIOS¸üУ¬½¨¸´ÁË2¸öÓ°Ïì´óÁ¿PCºÍ±Ê¼Ç±¾²úÆ·µÄ·ì϶¡£Õâ2¸ö·ì϶±ðÀëΪCVE-2021-3808ºÍCVE-2021-3809£¬CVSSÆÀ·Ö¾ùΪ8.8¡£Ä¿Ç°£¬»ÝÆÕÉÐδÌṩÓйØÕâЩ·ì϶µÄ¼¼Êõϸ½Ú¡£¾Ý×êÑÐÈËԱй©£¬¹¥»÷Õß¿ÉÀûÓ÷ì϶ÒÔÄں˼¶È¨ÏÞ£¨CPL==0£©Ö´ÐУ¬Éý¼¶µ½ÏµÍ³ÖÎÀíģʽ£¨SMM£©¡£ÔÚSMMģʽÏÂÖ´ÐУ¬¹¥»÷ÕßÄܹ»»ñµÃ¶ÔÖ÷»úµÄÈ«ÊýȨÏÞ£¬´Ó¶øÖ´Ç°½øÒ»²½µÄ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/
3¡¢Ô¼2100Íò¸öVPNÓû§µÄÓ×ÎÒÐÅÏ¢ÔÚTelegramÉϱ»¹«¿ª
¾ÝVPNMentorÔÚ5ÔÂ9Èյı¨Â·£¬Ô¼2100Íò¸öVPNÓû§µÄÓ×ÎÒÐÅÏ¢Òѱ»Ð¹Â¶¡£¸ÃSQLת´¢ÓÚ5ÔÂ7ÈÕÔÚTelegramÉϰ䲼£¬´óÓ×Ϊ10 GB£¬Ô̺¬GeckoVPN¡¢SuperVPNºÍChatVPNµÈ¶à¸öVPN·þÎñµÄÓû§µÄÐÅÏ¢£¬Éæ¼°ÓʼþµØÖ·¡¢Óû§Ãû¡¢ÐÕÃû¡¢¹ú¶È¡¢ÃÜÂë×Ö·û´®¡¢½áËãÃ÷ϸºÍ״̬µÈ¡£×êÑÐÈËÔ±Ö¸³ö£¬VPNÓû§¸üÆ÷³ÁÒþÖÔºÍÄäÃûÐÔ£¬Òò¶øËûÃǵÄÊý¾Ý¸üÓмÛÖµ£¬µ±ÆäÓ×ÎÒÐÅϢй¶ʱ£¬ËûÃǸü¿ÉÄÜÔâµ½ÀÕË÷¹¥»÷¡£
https://www.vpnmentor.com/blog/vpns-leaked-on-telegram/
4¡¢NCSC-FI°ä²¼Android¶ñÒâÈí¼þFluBot»î¶¯¼¤ÔöµÄ¹«¸æ
5ÔÂ10ÈÕ£¬·ÒÀ¼¹ú¶ÈÍøÂ簲ȫÖÐÐÄ(NCSC-FI) °ä²¼¹«¸æ£¬³ÆAndroid¶ñÒâÈí¼þFluBotµÄ»î¶¯¼¤Ôö¡£FluBotÔËÓªÍÅ»ïʹÓÃÁËÔ̺¬ÓïÒôÓʼþÁ´½Ó¡¢Î´½ÓÀ´µç֪ͨ»òδ֪½ðÈÚÂòÂô¾¯±¨µÄSMSÐÂÎÅ£¬Ö¼ÔÚ½«Ö¸±ê³Á¶¨Ïòµ½ÍйÜFluBot APKµÄÍøÕ¾¡£Ö®ºó£¬¹¥»÷Õß»¹»áʹÓÃÖ¸±êµÄÁªÏµÈËÁбí´ÓÒѱ»Ï°È¾É豸ÖÐÍÆË͵ڶþ²¨SMSÐÂÎÅ¡£×êÑÐÈËÔ±°µÊ¾£¬ÈôÊÇÉ豸ÒѾϰȾÁËFluBot£¬½«ÏµÍ³³ÁÖÃΪ³ö³§Ä¬ÈÏÉèÖÃÓ¦¸ÃÄܹ»¶Ï¸ù¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/flubot-android-malware-targets-finland-in-new-sms-campaigns/
5¡¢JFrogÔÚ½üÆÚ·¢ÏÖÖØÒªÕë¶Ô¹¤¿ØÐÐÒµµÄ¶à¸ö¶ñÒânpm°ü
5ÔÂ10ÈÕ£¬JFrog°ä²¼»ã±¨³ÆÔÚ½üÆÚ·¢ÏÖÁ˶à¸ö¶ñÒânpm°ü¡£×êÑÐÈËÔ±ÔÚ¶Ôpayload½øÐÐ×êÑÐʱ£¬·¢ÏÖËüÃǸ߶ÈÕë¶ÔµÂ¹úµÄ³ÛÃû¹«Ë¾¡£·¢ÏÖµÄ4¸ö¶ñÒâÈí¼þ°üµÄÊØ»¤Õß±ðÀëΪbertelsmannnpm¡¢boschnodemodules¡¢stihlnodemodulesºÍdbschenkernpm¡£´Ë±í£¬¹¥»÷ÕßʹÓÃÁ˹«¿ªµÄjavascript-obfuscator°ü¶ÔdropperºÍpayload½øÐлìºÏ£¬ÕâÊǺܲ»³£¼ûµÄ¡£Æ¾¾Ý5ÔÂ11ÈÕµÄ×îÐÂÐÂÎÅ£¬Ò»¼ÒÃûΪCode WhiteµÄÉøÈë²âÊÔ¹«Ë¾Ðû³Æ¶Ô´ËÊÂÕÆ¹Ü¡£
https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/
6¡¢Check PointÏêÊöÕë¶ÔµÂ¹úÆû³µÐÐÒµ³¤´ïÊýÔµĹ¥»÷»î¶¯
5ÔÂ10ÈÕ£¬Check Point°ä²¼ÁËÕë¶ÔµÂ¹ú³¤´ïÊýÔµĹ¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£¸Ã»î¶¯ÓÚ2021Äê7ÔÂ×óÓÒÆðÍ·£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖУ¬ÖØÒªÕë¶ÔµÂ¹úµÄÆû³µÔì×÷ÉÌºÍÆû³µ¾ÏúÉÌ¡£´¹µöÓʼþÊÇÓõÂÓïдµÄ£¬ÆäÖÐÔ̺¬Ò»¸ö±êÓÓ×°³µÁ¾·¢Æ±¡±µÄISO¸½¼þ£¬Ö¼ÔÚ·Ö·¢ÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¶ñÒâÈí¼þpayload±»ÍйÜÔÚÒÁÀÊ×¢²áµÄÍøÕ¾£¨"bornagroup[.]ir"£©ÉÏ£¬½áºÏͳһע²áÈËµÄÆäËü¹¥»÷»î¶¯£¬×êÑÐÈËÔ±´§Ä¦Õâ´Î¹¥»÷ÓëÒÁÀÊÓйء£
https://blog.checkpoint.com/2022/05/10/a-german-car-attack-on-german-vehicle-businesses/


¾©¹«Íø°²±¸11010802024551ºÅ