Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÅäÖÃÃýÎóÓû§ÐÅϢй¶
°ä²¼¹¦·ò 2022-08-29
ýÌå8ÔÂ25Èճƣ¬Ó¡¶Èº½¿Õ¹«Ë¾Akasa Air²úÉúÊý¾Ýй¶£¬Î´¾ÊÚȨµÄÓ×ÎҿɽӼûÓû§ÐÅÏ¢¡£¸Ãº½¿Õ¹«Ë¾³Æ£¬8ÔÂ25ÈÕ·¢ÏÖÁËÒ»¸öÓëµÇ¼ºÍ×¢²á·þÎñÓйصļ¼ÊõÅäÖÃÃýÎóÎÊÌ⣬¿Éй¶ע²áÓû§ÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢ÐԱ𡢵ç×ÓÓʼþµØÖ·ºÍµç»°ºÅÂ룬ÇÒÕâЩÐÅÏ¢¿ÉÄÜÒѾ±»Î´¾ÊÚȨµÄÓ×ÎÒ½Ó¼û¡£¸Ãº½¿Õ¹«Ë¾ÓÚ8ÔÂ7ÈÕÆðÍ·ÔËÓª£¬´Ë¿ÌÒѾʹËÊÂÏòÆä¿Í»§Â·Ç¸£¬²¢ÏòCERT-In»ã±¨¡£
https://www.telegraphindia.com/business/akasa-air-suffers-data-breach/cid/1883016
2¡¢Atlassian½¨¸´BitbucketÖеÄRCE·ì϶CVE-2022-36804
8ÔÂ24ÈÕ£¬Atlassian°ä²¼°²È«²¼¸æ£¬½¨¸´Bitbucket·þÎñÆ÷ºÍÊý¾ÝÖÐÐĵݲȫ·ì϶£¨CVE-2022-36804£©¡£BitbucketÊÇÒ»¸ö»ùÓÚGitµÄ´úÂëÍйܡ¢ÖÎÀíºÍºÏ×÷¹¤¾ß£¬¼¯³ÉÁËJiraºÍTrello¡£¸Ã·ì϶ÊÇÈí¼þ²úÆ·µÄ¶à¸öAPI¶ËµãÖеĺÅÁî×¢Èë·ì϶£¬CVSSÆÀ·ÖΪ9.9£¬¿Éͨ¹ýÌØÔìµÄHTTPÒªÇóÀ´ÀûÓ㬵¼ÖÂËÁÒâ´úÂëµÄÖ´ÐС£½¨ÒéÎÞ·¨ÀûÓð²È«¸üеÄÓû§Í¨¹ýÉèÖÃfeature.public.access=false¹Ø¹Ø¹«¹²´æ´¢¿âÀ´×÷Ϊ»º½â´ëÊ©¡£
https://thehackernews.com/2022/08/critical-vulnerability-discovered-in.html
3¡¢ÖÇÀû¹ú¶ÈÏû·ÑÕß·þÎñÖÐÐÄSERNACµÄÍøÕ¾±»¹¥»÷ºó¹Ø¹Ø
¾Ý8ÔÂ27ÈÕ±¨Â·£¬ÖÇÀû¹ú¶ÈÏû·ÑÕß·þÎñÖÐÐÄ(SERNAC)ÔÚ±»¹¥»÷ºó¹Ø¹Ø¡£SERNACÊÇÖÇÀûÕÆ¹ÜÊØ»¤ºÍÍÆ½øÏû·ÑÕßÈ¨ÊÆµÄ¹«¹²·þÎñ»ú¹¹£¬ÔÚ·¢ÏÖ¹¥»÷ºóÒѽ«´ËÊ»㱨¸ø¼ì²ì¹Ù°ì¹«ÊÒ½øÐÐÐÌʵ÷²é¡£SERNACÍøÕ¾ÏÔʾ¸ÃÍøÕ¾¼°Æäƽ̨ÔÚÊØ»¤ÖУ¬ÔÚÍøÕ¾ÎÞ·¨½Ó¼ûʱÏû·ÑÕßÄܹ»µ½SERNAC´¦Ê´¦»òÕßͨ¹ýÖµç»ñµÃ·þÎñ¡£Ä¿Ç°ÒÑÈ·ÈÏÕâÊÇһ·ÀÕË÷¹¥»÷ÊÂÎñ£¬µ«ÖÇÀûµ±¾ÖÉÐδעÃ÷ËüÊÇʲôÀàÐ͵ÄÀÕË÷Èí¼þ¡£
https://www.databreaches.net/sernac-computer-services-hacked-chiles-interior-ministry-assessing-scope-of-cyberattack/
4¡¢DoorDashÓëÆäµÚÈý·½¹©¸øÉÌÔ⵽ͳһºÚ¿ÍÍÅ»ïµÄ¹¥»÷
¾ÝýÌå8ÔÂ26ÈÕ±¨Â·£¬Ê³Æ·ÅäË͹«Ë¾DoorDashÓйصĿͻ§ºÍÔ±¹¤Êý¾Ýй¶¡£DoorDash°µÊ¾£¬¹¥»÷ÕßÀûÓÃÁË´ÓÆäµÚÈý·½¹©¸øÉÌTwilio´¦ÇÔÈ¡µÄÍ´´¦»ñµÃÁ˶Թ«Ë¾ÄÚ²¿¹¤¾ßµÄ½Ó¼ûȨÏÞ£¬À´½Ó¼û¿Í»§ºÍÔ±¹¤µÄÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢ÓʼþµØÖ·¡¢ÅäË͵ØÖ·¡¢µç»°ºÅÂëÒÔ¼°²¿ÃÅÖ§¸¶¿¨µÄºóËÄλ£»Ô±¹¤ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµØÖ·¡£²»¾Ãºó£¬¸Ã¹«Ë¾³ÎÇåÕâ´Î»÷ÊÇÓɹ¥»÷TwilioµÄͳһÍÅ»ï½øÐе쬵«²¢·ÇÊÇͨ¹ýTwilio¡£
https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hackers/
5¡¢Trend Micro·¢ÏÖÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda
Trend MicroÔÚ8ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda¡£¸ÃÀÕË÷Èí¼þÓÃÊÇÓÃGO˵»°¿ª·¢µÄ£¬Õë¶ÔÓ¡¶ÈÄáÎ÷ÑÇ¡¢É³Ìذ¢À²®¡¢ÄϷǺÍÌ©¹úµÄÒ½ÁƱ£½¡ºÍ½ÌÓý×éÖ¯¡£AgendaÄܹ»ÔÚ°²È«Ä£Ê½Ï³ÁÐÂÆô¶¯ÏµÍ³£¬ÊÔͼÖÕ³¡ºÜ¶àÌØ¶¨µÄ·þÎñÆ÷¹ý³ÌºÍ·þÎñ£¬²¢ÓжàÖÖģʽ¡£×êÑÐÈËÔ±ÍøÂçµÄÿ¸öÀÕË÷Èí¼þµÄÑù±¾¶¼ÊÇÎªÌØ¶¨Ö¸±ê¶¨ÔìµÄ£¬Ô̺¬Î¨Ò»µÄ¹«Ë¾IDºÍй¶µÄÕË»§ÐÅÏ¢¡£ÆäÊê½ðÒò¹«Ë¾¶øÒ죬´Ó50000ÃÀÔªµ½800000ÃÀÔª²»µÈ¡£
https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html
6¡¢Î¢Èíй©APT29ÀûÓÃеÄMagicWeb½Ù³ÖADFSµÄ¹¥»÷»î¶¯
8ÔÂ24ÈÕ£¬Î¢Èí°ä²¼Á˹ØÓÚ¶íÂÞ˹APT29½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£¹¥»÷ÖÐʹÓõÄжñÒ⹤¾ßMagicWebÊÇFoggyWebµÄÑݱ䣬¿ÉÓÃÀ´ÇÔÈ¡±»Ï°È¾µÄActive Directory½áºÏ·þÎñ(ADFS)·þÎñÆ÷µÄÅäÖÃÊý¾Ý¿â£¬½âÃÜÁîÅÆÊðÃûºÍÁîÅÆ½âÃÜÖ¤Ê飬²¢Í¨¹ýC2·þÎñÆ÷»ñÈ¡ÆäËüµÄpayload¡£MagicWeb¿É½«ADFSʹÓõĺϷ¨DLL´úÌæÎª¶ñÒâµÄ°æ±¾£¬À´²Ù¿ØÓû§Éí·ÝÑéÖ¤Ö¤Êé²¢Åú¸Ä±»Ï°È¾·þÎñÆ÷ÌìÉúµÄÁîÅÆÖд«µÝµÄÉêÃ÷¡£MagicWebÄܹ»Ô®ÊÖAPT29ÔÚWindowsÖÐÒÔËùÓÐЧ»§µÄÉí·ÝµÇ¼¡£
https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/


¾©¹«Íø°²±¸11010802024551ºÅ