Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÅäÖÃÃýÎóÓû§ÐÅϢй¶

°ä²¼¹¦·ò 2022-08-29
1¡¢Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÅäÖÃÃýÎóÓû§ÐÅϢй¶

      

ýÌå8ÔÂ25Èճƣ¬Ó¡¶Èº½¿Õ¹«Ë¾Akasa Air²úÉúÊý¾Ýй¶£¬Î´¾­ÊÚȨµÄÓ×ÎҿɽӼûÓû§ÐÅÏ¢ ¡£¸Ãº½¿Õ¹«Ë¾³Æ£¬8ÔÂ25ÈÕ·¢ÏÖÁËÒ»¸öÓëµÇ¼ºÍ×¢²á·þÎñÓйصļ¼ÊõÅäÖÃÃýÎóÎÊÌ⣬¿Éй¶ע²áÓû§ÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢ÐԱ𡢵ç×ÓÓʼþµØÖ·ºÍµç»°ºÅÂ룬ÇÒÕâЩÐÅÏ¢¿ÉÄÜÒѾ­±»Î´¾­ÊÚȨµÄÓ×ÎÒ½Ó¼û ¡£¸Ãº½¿Õ¹«Ë¾ÓÚ8ÔÂ7ÈÕÆðÍ·ÔËÓª£¬´Ë¿ÌÒѾʹËÊÂÏòÆä¿Í»§Â·Ç¸£¬²¢ÏòCERT-In»ã±¨ ¡£


https://www.telegraphindia.com/business/akasa-air-suffers-data-breach/cid/1883016


2¡¢Atlassian½¨¸´BitbucketÖеÄRCE·ì϶CVE-2022-36804 
      

8ÔÂ24ÈÕ£¬Atlassian°ä²¼°²È«²¼¸æ£¬½¨¸´Bitbucket·þÎñÆ÷ºÍÊý¾ÝÖÐÐĵݲȫ·ì϶£¨CVE-2022-36804£© ¡£BitbucketÊÇÒ»¸ö»ùÓÚGitµÄ´úÂëÍйܡ¢ÖÎÀíºÍºÏ×÷¹¤¾ß£¬¼¯³ÉÁËJiraºÍTrello ¡£¸Ã·ì϶ÊÇÈí¼þ²úÆ·µÄ¶à¸öAPI¶ËµãÖеĺÅÁî×¢Èë·ì϶£¬CVSSÆÀ·ÖΪ9.9£¬¿Éͨ¹ýÌØÔìµÄHTTPÒªÇóÀ´ÀûÓ㬵¼ÖÂËÁÒâ´úÂëµÄÖ´ÐÐ ¡£½¨ÒéÎÞ·¨ÀûÓð²È«¸üеÄÓû§Í¨¹ýÉèÖÃfeature.public.access=false¹Ø¹Ø¹«¹²´æ´¢¿âÀ´×÷Ϊ»º½â´ëÊ© ¡£


https://thehackernews.com/2022/08/critical-vulnerability-discovered-in.html


3¡¢ÖÇÀû¹ú¶ÈÏû·ÑÕß·þÎñÖÐÐÄSERNACµÄÍøÕ¾±»¹¥»÷ºó¹Ø¹Ø

      

¾Ý8ÔÂ27ÈÕ±¨Â·£¬ÖÇÀû¹ú¶ÈÏû·ÑÕß·þÎñÖÐÐÄ(SERNAC)ÔÚ±»¹¥»÷ºó¹Ø¹Ø ¡£SERNACÊÇÖÇÀûÕÆ¹ÜÊØ»¤ºÍÍÆ½øÏû·ÑÕßÈ¨ÊÆµÄ¹«¹²·þÎñ»ú¹¹£¬ÔÚ·¢ÏÖ¹¥»÷ºóÒѽ«´ËÊ»㱨¸ø¼ì²ì¹Ù°ì¹«ÊÒ½øÐÐÐÌʵ÷²é ¡£SERNACÍøÕ¾ÏÔʾ¸ÃÍøÕ¾¼°Æäƽ̨ÔÚÊØ»¤ÖУ¬ÔÚÍøÕ¾ÎÞ·¨½Ó¼ûʱÏû·ÑÕßÄܹ»µ½SERNAC´¦Ê´¦»òÕßͨ¹ýÖµç»ñµÃ·þÎñ ¡£Ä¿Ç°ÒÑÈ·ÈÏÕâÊÇһ·ÀÕË÷¹¥»÷ÊÂÎñ£¬µ«ÖÇÀûµ±¾ÖÉÐδעÃ÷ËüÊÇʲôÀàÐ͵ÄÀÕË÷Èí¼þ ¡£ 

https://www.databreaches.net/sernac-computer-services-hacked-chiles-interior-ministry-assessing-scope-of-cyberattack/


4¡¢DoorDashÓëÆäµÚÈý·½¹©¸øÉÌÔ⵽ͳһºÚ¿ÍÍÅ»ïµÄ¹¥»÷

      

¾ÝýÌå8ÔÂ26ÈÕ±¨Â·£¬Ê³Æ·ÅäË͹«Ë¾DoorDashÓйصĿͻ§ºÍÔ±¹¤Êý¾Ýй¶ ¡£DoorDash°µÊ¾£¬¹¥»÷ÕßÀûÓÃÁË´ÓÆäµÚÈý·½¹©¸øÉÌTwilio´¦ÇÔÈ¡µÄÍ´´¦»ñµÃÁ˶Թ«Ë¾ÄÚ²¿¹¤¾ßµÄ½Ó¼ûȨÏÞ£¬À´½Ó¼û¿Í»§ºÍÔ±¹¤µÄÊý¾Ý ¡£Ð¹Â¶ÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢ÓʼþµØÖ·¡¢ÅäË͵ØÖ·¡¢µç»°ºÅÂëÒÔ¼°²¿ÃÅÖ§¸¶¿¨µÄºóËÄλ£»Ô±¹¤ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµØÖ· ¡£²»¾Ãºó£¬¸Ã¹«Ë¾³ÎÇåÕâ´Î»÷ÊÇÓɹ¥»÷TwilioµÄͳһÍÅ»ï½øÐеÄ£¬µ«²¢·ÇÊÇͨ¹ýTwilio ¡£


https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hackers/


5¡¢Trend Micro·¢ÏÖÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda

      

Trend MicroÔÚ8ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda ¡£¸ÃÀÕË÷Èí¼þÓÃÊÇÓÃGO˵»°¿ª·¢µÄ£¬Õë¶ÔÓ¡¶ÈÄáÎ÷ÑÇ¡¢É³Ìذ¢À­²®¡¢ÄϷǺÍÌ©¹úµÄÒ½ÁƱ£½¡ºÍ½ÌÓý×éÖ¯ ¡£AgendaÄܹ»ÔÚ°²È«Ä£Ê½Ï³ÁÐÂÆô¶¯ÏµÍ³£¬ÊÔͼÖÕ³¡ºÜ¶àÌØ¶¨µÄ·þÎñÆ÷¹ý³ÌºÍ·þÎñ£¬²¢ÓжàÖÖģʽ ¡£×êÑÐÈËÔ±ÍøÂçµÄÿ¸öÀÕË÷Èí¼þµÄÑù±¾¶¼ÊÇÎªÌØ¶¨Ö¸±ê¶¨ÔìµÄ£¬Ô̺¬Î¨Ò»µÄ¹«Ë¾IDºÍй¶µÄÕË»§ÐÅÏ¢ ¡£ÆäÊê½ðÒò¹«Ë¾¶øÒ죬´Ó50000ÃÀÔªµ½800000ÃÀÔª²»µÈ ¡£


https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html


6¡¢Î¢Èíй©APT29ÀûÓÃеÄMagicWeb½Ù³ÖADFSµÄ¹¥»÷»î¶¯

      

8ÔÂ24ÈÕ£¬Î¢Èí°ä²¼Á˹ØÓÚ¶íÂÞ˹APT29½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£¹¥»÷ÖÐʹÓõÄжñÒ⹤¾ßMagicWebÊÇFoggyWebµÄÑݱ䣬¿ÉÓÃÀ´ÇÔÈ¡±»Ï°È¾µÄActive Directory½áºÏ·þÎñ(ADFS)·þÎñÆ÷µÄÅäÖÃÊý¾Ý¿â£¬½âÃÜÁîÅÆÊðÃûºÍÁîÅÆ½âÃÜÖ¤Ê飬²¢Í¨¹ýC2·þÎñÆ÷»ñÈ¡ÆäËüµÄpayload ¡£MagicWeb¿É½«ADFSʹÓõĺϷ¨DLL´úÌæÎª¶ñÒâµÄ°æ±¾£¬À´²Ù¿ØÓû§Éí·ÝÑéÖ¤Ö¤Êé²¢Åú¸Ä±»Ï°È¾·þÎñÆ÷ÌìÉúµÄÁîÅÆÖд«µÝµÄÉêÃ÷ ¡£MagicWebÄܹ»Ô®ÊÖAPT29ÔÚWindowsÖÐÒÔËùÓÐЧ»§µÄÉí·ÝµÇ¼ ¡£


https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/