ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖÃÃýÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶

°ä²¼¹¦·ò 2023-02-28

1¡¢ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖÃÃýÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶


¾ÝýÌå2ÔÂ23ÈÕ±¨Â· £¬×êÑÐÈËÔ±·¢ÏÖÃÀ¹ú¹ú·À²¿Ò»¸öÅäÖÃÃýÎóµÄ·þÎñÆ÷ ¡£Â¶³öµÄ·þÎñÆ÷ÍйÜÔÚ΢ÈíµÄAzureÔÆÉÏ £¬¹©¹ú·À²¿¿Í»§Ê¹Óà ¡£ËüÊÇÄÚ²¿ÓÊÏäϵͳµÄÒ»²¿ÃÅ £¬´æ´¢ÁËÔ¼3TB µÄÄÚ²¿µç×ÓÓʼþ £¬ÆäÖкܶàÉæ¼°ÃÀ¹úÌØÖÖ×÷ս˾Á»òUSSOCOM ¡£¸ÃÅäÖÃÃýÎóµÄ·þÎñÆ÷ûÓÐÃÜÂë £¬ÈκÎÈË¿Éͨ¹ýä¯ÀÀÆ÷½Ó¼ûÓÊÏäÊý¾Ý £¬Ö»Ðè֪·ÆäIPµØÖ·¼´¿É ¡£¸Ã·þÎñÆ÷ÓÚ2ÔÂ8ÈÕ³õ´Î±»·¢ÏÖ £¬Ä¿Ç°Òѱ»±£»¤ÆðÀ´ ¡£


https://www.theregister.com/2023/02/23/azure_dod_emails_exposed/


2¡¢LastPass³ÆDevOps¹¤³ÌʦµÄ¼ÒÓõçÄÔ±»Ö²Èë¶ñÒâÈí¼þ


2ÔÂ27ÈÕ±¨Â· £¬ÃÜÂëÖÎÀíÈí¼þ¹«Ë¾LastPass³ÆºÚ¿ÍÔÚµÚ¶þ´Î¹¥»÷ÖÐÈëÇÖÁËDevOps¹¤³ÌʦµÄÓ×ÎÒ¼ÒÓÃÍÆËã»ú ¡£µÚ¶þ´Î¹¥»÷µÄ¹¦·ò¿ç¶È´Ó2022Äê8ÔÂ12ÈÕµ½10ÔÂ26ÈÕ £¬¹¥»÷ÕßѸ¿ìµØÀûÓÃÁ˵ÚÒ»´ÎÊÂÎñÖÐй¶µÄÐÅÏ¢ £¬ÔÚLastPassÍŶÓʵÏÖ³ÁÖÃ֮ǰ´ÓÔÆ´æ´¢×ÊÔ´ÖÐÇÔÈ¡Êý¾Ý ¡£È¡Ö¤·¢ÏÖ £¬Ò»ÃûDevOps¹¤³ÌʦµÄ¼ÒÍ¥µçÄÔ±»ÈëÇÖ £¬¹¥»÷ÕßÀûÓõÚÈý·½Ã½ÌåÈí¼þ°üÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶ £¬ÔÚ¸ÃÔ±¹¤µÄÓ×ÎÒµçÄÔÉÏÖ²ÈëÁ˼üÅ̼ͼ¶ñÒâÈí¼þ £¬²¢²¶»ñÁËËûµÄÖ÷ÃÜÂë ¡£


https://www.securityweek.com/lastpass-says-devops-engineer-home-computer-hacked/


3¡¢News Corpй©ºÚ¿ÍÁ½Äêǰ¾ÍÒÑ»ñµÃÆäϵͳµÄ½Ó¼ûȨ


¾Ý2ÔÂ24ÈÕ±¨Â· £¬¹«¹²´«Ã½ºÍ³ö°æ¹«Ë¾News Corpй© £¬ºÚ¿ÍÔÚÁ½Äêǰ³õ´Î»ñµÃÁËÆäϵͳµÄ½Ó¼ûȨÏÞ ¡£¾Ýµ÷²é £¬ÔÚ2020Äê2ÔÂÖÁ2022Äê1Ô £¬Î´¾­ÊÚȨµÄµÚÈý·½´Ó±»Ó°ÏìϵͳµÄÔ±¹¤ÕË»§ÖлñÈ¡Á˲¿ÃÅóÒ×ÎļþºÍµç×ÓÓʼþ £¬ÆäÖÐһЩÔ̺¬Ó×ÎÒÐÅÏ¢ £¬ÈçÀ¨ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ ¡£Õâ´ÎÊÂÎñÓ°ÏìÁ˸ù«Ë¾µÄ´ó²¿ÃÅÒµÎñ £¬Ô̺¬¡¶»ª¶û½ÖÈÕ±¨¡·ºÍ¡¶Å¦Ô¼Óʱ¨¡·µÈ ¡£


https://www.bleepingcomputer.com/news/security/news-corp-says-state-hackers-were-on-its-network-for-two-years/


4¡¢JamfÅû¶ÀûÓõÁ°æÀûÓÃÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯


JamfÔÚ2ÔÂ23ÈÕÅû¶ÁËÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯ ¡£¸Ã»î¶¯ÀûÓÃÁËľÂí»¯AppleÊÓÆµ±à×ëÈí¼þFinal Cut Pro £¬À´·Ö·¢XMRigÍÚ¿ó·¨Ê½ ¡£×êÑÐÈËÔ±Éî¿Ì·ÖÎöºó·¢ÏÖ £¬¸Ã¶ñÒâÈí¼þ¾­ÀúÁËÈý¸öÖØÒªµÄ·¢Õ¹½×¶Î £¬Ã¿¸ö½×¶Î¶¼Ôö³¤Á˸ü¸´ÔÓµÄÈÆ¹ý¼¼Êõ ¡£´ÓµÚÒ»´úÆðÍ· £¬¸Ã¶ñÒâÈí¼þ¾ÍʹÓÃi2pÍøÂç²ã½øÐÐC2ͨѶÒÔÄäÃû»¯Á÷Á¿£»µÚ¶þ´úÔÚ2021Äê4ÔÂÖÁ10Ô³öÏÖ £¬¶Ô°µ²ØÔÚÀûÓ÷¨Ê½°üÖеĿÉÖ´ÐÐÎļþ½øÐÐbase 64±àÂ룻µÚÈý´ú³öÏÖÓÚ2021Äê10Ô £¬ËüÄܹ»ÔÚSpotlight´ó½«Æä¶ñÒâ¹ý³Ì¼Ù×°³Éϵͳ¹ý³ÌÀ´Èƹý¼ì²â ¡£


https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/


5¡¢ºÚ¿ÍÍÅ»ïCH01Ðû³ÆÆäÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾


ýÌå2ÔÂ26ÈÕ³Æ £¬ºÚ¿ÍÍÅ»ïCH01ÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾ £¬¶øAnonymousҲͨ¹ýÆäTwitter·ÖÏíÁËÕâÒ»ÐÂÎÅ ¡£¹¥»÷²úÉúÔÚÎÚ¿ËÀ¼Õ½ÕùµÄÖÜÄêÁôÏëÈÕ £¬Ä¿Ç°Éв»Ã÷ÏÔ±»¹¥»÷ÍøÕ¾¼òÖ±ÇÐÊýÁ¿ £¬ÒÔ¼°ºÚ¿ÍÊÇÈôºÎ¹¥»÷µÄ ¡£´Ë±í £¬AnonymousÔÚ2ÔÂ23ÈÕ»¹ÈëÇÖÁ˶íÂÞ˹µÄ¶à¸ö¹ã²¥µç̨ £¬Ô̺¬Yumor FM¡¢Relax FM¡¢Comedy Radio¡¢Humor FMºÍAvatoradio £¬²¢°ä²¼¼ÙµÄ¿ÕÏ®¾¯±¨ ¡£


https://securityaffairs.com/142713/hacktivism/ch01-defaced-russian-websites.html


6¡¢Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÆä¼Ó¹¤³§ÁÙʱ¹Ø¹Ø


ýÌå2ÔÂ26ÈÕ³Æ £¬Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÁËÀÕË÷¹¥»÷ ¡£¶¼ÀÖÊÇÊÀ½çÉÏ×î´óµÄË®¹ûºÍÊ߲˳ö²úÉÌÖ®Ò» £¬ÔÚÈ«Çò75¸ö¹ú¶È/µØÓò¹©¸øÔ¼300ÖÖ²úÆ· £¬2021ÄêµÄÊÕÈëΪ65ÒÚÃÀÔª ¡£¸Ã¹«Ë¾³ÆÆäÔâµ½ÀÕË÷¹¥»÷Õý³£ÔËÓªÊܵ½Ó°Ïì £¬µ«ÊÇûÓÐÌṩÓйع¥»÷µÄ¾ßÌåÐÅÏ¢ ¡£·¢Ë͸øÉ̵êµÄ±ã¼ãÌáµ½ £¬¸Ã¹«Ë¾±»ÆÈ¹Ø¹ØÆäÔÚ±±ÃÀµÄϵͳÒÔ¶ôÔì¹¥»÷ ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÊÇ·ñÒÑ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÊý¾Ý ¡£


https://securityaffairs.com/142726/cyber-crime/dole-food-company-ransomware-attack.html