º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
°ä²¼¹¦·ò 2023-03-281¡¢º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
¾ÝýÌå3ÔÂ23ÈÕ±¨Â·£¬º«¹ú×î´óÃÀ×±ÁìÓòµÄÉ罻ƽ̨PowderRoomÒòÅäÖÃÃýÎóй¶½ü100ÍòÓû§µÄÐÅÏ¢¡£12ÔÂ15ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸ö¿É¹«¿ª½Ó¼ûµÄÊý¾Ý¿â£¬ÆäÖÐÔ̺¬½ü140GBÊý¾Ý¡£Éæ¼°Óû§ÐÕÃû¡¢µç»°ºÅÂëºÍ¼ÒÍ¥µØÖ·£¬ÒÔ¼°ÓÃÓÚ½Ó¼û¸ÃÍøÕ¾µÄÓû§É豸ºÍä¯ÀÀÆ÷µÄÔªÊý¾Ý¡£×êÑÐÈËÔ±»¹·¢ÏÖÁËÒ»°ÙÍò¸öÓÃÓÚÉí·ÝÑéÖ¤ºÍ½Ó¼ûÍøÕ¾µÄÁîÅÆ¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾ÝÖ´Ðд¹µö¹¥»÷ºÍÉ豸½Ù³Ö£¬½øÐÐδ¾ÊÚȨµÄ²É°ì»ò¸ú×ÙÓû§¡£Ä¿Ç°£¬Ð¹Â¶µÄÊý¾ÝÒѾ±»±£»¤ÆðÀ´¡£
https://cybernews.com/security/powder-room-data-leak/
2¡¢²¨¶àÀè¸÷PRASAÔâµ½Vice SocietyÍÅ»ïµÄÀÕË÷¹¥»÷
ýÌå3ÔÂ26Èճƣ¬²¨¶àÀè¸÷¶É²ÛºÍÏÂˮ·ÖÎÀí¾Ö(PRASA)Ôâµ½ÁËVice SocietyµÄÀÕË÷¹¥»÷¡£¸Ã¹¥»÷ÓÚ3ÔÂ19ÈÕ±»Åû¶£¬¹¥»÷ÕßÄܹ»½Ó¼û¿Í»§ºÍÔ±¹¤ÐÅÏ¢¡£¸Ã»ú¹¹Ö¸³ö£¬ÆäÔÚ²¨¶àÀè¸÷ÖÎÀíµÄ¹Ø¼ü»ù´¡ÉèÊ©µÄÔËÓª²¢Î´Êܵ½Ó°Ï졣Ŀǰ£¬¸Ã»ú¹¹ÉÐδй©¹¥»÷±³ºóµÄ×éÖ¯Ãû³Æ£¬µ«Vice SocietyÍÅ»ïÒѽ«ÆäÔö³¤µ½ÍøÕ¾µÄ±»¹¥»÷Ãûµ¥ÖС£¸ÃÀÕË÷ÍŻ﹫¿ªÁËÊÜÓ°ÏìÓ×ÎҵϤÕÕ¡¢¼ÝÕÕºÍÆäËüÎļþ¡£PRASAĿǰÔÚFBIºÍCISAµÄÔ®ÊÖϵ÷²éÕâ´Î¹¥»÷¡£
https://securityaffairs.com/144022/hacking/puerto-rico-aqueduct-and-sewer-authority-attack.html
3¡¢PyPI¶ñÒâ°üonyxproxyʹÓÃUnicode×ÖÌåÀ´Èƹý¼ì²â
PhylumÓÚ3ÔÂ22ÈÕй©Æä×î½üÔÚPyPIÉϼì²âµ½Ò»¸ö¶ñÒâ°üonyxproxy£¬Ö¼ÔÚÍøÂçºÍй¶ʹ´¦µÈÆäËüÃô¸ÐÊý¾Ý¡£¸Ã¶ñÒâ°üÖÐÓÐÒ»¸ösetup.py°ü£¬ÆäÖÐÔ̺¬Êýǧ¸ö»ìºÏʹÓÃUnicode×Ö·ûµÄ¿ÉÒÉ´úÂë×Ö·û´®¡£¹ÌÈ»ÕâЩÎı¾³ýÁË×ÖÌå·ÖÆçÖ®±í£¬¿´ÆðÀ´ÏÕЩÊÇÕý³£µÄ£¬µ«¶ÔÓÚPythonÚ¹ÊÍÆ÷À´Ëµ´æÔÚ¾Þ´óµÄ²î¾à¡£Í¨¹ýÕâÖÖ·½Ê½£¬Äܹ»Èƹý»ùÓÚ×Ö·û´®Æ¥ÅäÉè¼ÆµÄ·ÀÓù´ëÊ©¡£Ä¿Ç°£¬¸Ã¶ñÒâ°üÒÑ´ÓÆ½Ì¨ÉÑþ³Øý¡£
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
4¡¢IntezerÅû¶Bitter APTÍÅ»ïÕë¶ÔºËÄÜÐÐÒµµÄ¹¥»÷»î¶¯
IntezerÔÚ3ÔÂ24ÈÕÅû¶ÁËÓëÕë¶ÔÑÇÌ«µØÓòµÄBitter APTÓйصĹ¥»÷»î¶¯¡£Õâ´Î»î¶¯ÖУ¬Bitter¼Ù×°³É¼ª¶û¼ªË¹Ë¹Ì¹´óʹ¹Ý£¬ÏòÓëºËÄÜÁìÓòÓйصĶà¼Ò¹«Ë¾ºÍѧÊõÈËÔ±·¢Ë͵ç×ÓÓʼþ¡£ÓʼþÔ¼ÇëÊÕ¼þÈ˲ÎÓëÓëËûÃÇÓйصÄÖ÷Ìâ»áÒ飬²¢ÓÕʹÊÕ¼þÈËÏÂÔØ²¢´ò¿ªÔ̺¬Microsoft±àÒëµÄHTMLÔ®ÊÖÎļþ(CHM)»ò¶ñÒâExcelÎĵµµÄRARÎļþ¡£ÈôÊÇʹÓÃCHM£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇMSI»òPowerShellÎļþ£¬ÈôÊÇʹÓÃExcelÎĵµ£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇEXEÎļþ¡£Intezer³Æ£¬¹¥»÷Õß¿ÉÄܸüϲ»¶CHM payload¡£
https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/
5¡¢WordPress½¨¸´WooCommerce²å¼þÖпɽٳÖÍøÕ¾µÄ·ì϶
¾Ý3ÔÂ23ÈÕ±¨Â·£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚ³¬¹ý50Íò¸öÔËÐÐWooCommerceÖ§¸¶²å¼þµÄÍøÕ¾ÉÏ×Ô¶¯×°ÖÃÁËÒ»¸ö²¹¶¡¡£¸Ã²¹¶¡½¨¸´ÁËÒ»¸ö¿É±»ÓÃÀ´»ñµÃÖ¸±êÉ̵êµÄÖÎÀíÔ±½Ó¼ûȨÏ޵ķì϶£¬Ó°ÏìÁ˲å¼þ°æ±¾4.8.0µ½5.6.1¡£×êÑÐÈËÔ±³Æ£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÀûÓø÷ì϶¼ÙÒâÖÎÀíÔ±²¢ÆëÈ«ÊÕÊÜÍøÕ¾£¬¶øÎÞÐèÓëÓû§½»»¥¡£ÓÉÓÚ²»±ØÒªÉí·ÝÑéÖ¤£¬Òò¶ø¸Ã·ì϶ºÜ¿ÉÄܻᱻ´ó¹æÄ£ÀûÓ᣸øüÐÂÈç½ñ×Ô¶¯Íƹ㵽¾¡¿ÉÄܶàµÄÉ̵ꡣ
https://www.bleepingcomputer.com/news/security/wordpress-force-patching-woocommerce-plugin-with-500k-installs/
6¡¢Î¢Èí°ä²¼¼ì²âOutlook·ì϶CVE-2023-23397ÀûÓõÄÖ¸ÄÏ
3ÔÂ24ÈÕ£¬Î¢Èí°ä²¼Á˹ØÓÚ¼ì²âºÍµ÷²éÀûÓÃOutlook·ì϶CVE-2023-23397¹¥»÷»î¶¯µÄÖ¸ÄÏ¡£ÕâÊÇÒ»¸öÌáȨ·ì϶£¬¹¥»÷Õß¿ÉÄÜÔÚNTLMÖмÌÁãµã»÷¹¥»÷ÖÐÎÞÐèÓû§½»»¥¼´¿ÉÇÔÈ¡NTLM hash¡£¸Ã·ì϶Òѱ»ÀûÓã¬ÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡Öн¨¸´¡£Ö¸ÄÏÌṩÁË·ì϶¸ÅÊö¡¢·ì϶µÄÀûÓó¡¾°¡¢ÔÚ¹¥»÷Öй۲쵽µÄÀûÓû¡¢È·¶¨Ò»¸ö×éÖ¯ÊÇ·ñÊǸ÷ì϶µÄÖ¸±ê»ò±»¹¥»÷µÄ¼¼ÊõÒÔ¼°·ÀÓù´ËÀ๥»÷µÄ»º½â´ëÊ©¡£
https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/


¾©¹«Íø°²±¸11010802024551ºÅ