ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
°ä²¼¹¦·ò 2023-05-311¡¢ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
¾ÝýÌå5ÔÂ29ÈÕ±¨Â·£¬±±ÃÀÑÀ¿Æ±£ÏÕÌṩÉÌMCNA DentalÔâµ½LockbitµÄÀÕË÷¹¥»÷£¬Ó°ÏìÁË8923662Ãû»¼Õß¡£¸Ã¹«Ë¾ÔÚ3ÔÂ6ÈÕÒâʶµ½ÆäϵͳÔâµ½ÁËδ¾ÊÚȨ½Ó¼û£¬µ÷²éÏÔʾºÚ¿ÍÓÚ2ÔÂ26ÈÕ³õ´Î»ñµÃÁËMCNAÍøÂçµÄ½Ó¼ûȨÏÞ¡£LockBitÐû³ÆÔÚ3ÔÂ7ÈÕ¹¥»÷ÁËMCNA²¢¹«¿ªÁ˵ÚÒ»ÅúÊý¾ÝÑù±¾£¬»¹°µÊ¾ÈôÊÇMCNA²»½»1000ÍòÃÀÔªµÄÊê½ð£¬¾Í¹«¿ªÆä700 GBµÄ»úÃÜÐÅÏ¢¡£4ÔÂ7ÈÕ£¬LockBitÔÚÆäÍøÕ¾Éϰ䲼ÁËËùº±¼û¾Ý£¬ÈκÎÈ˶¼Äܹ»ÏÂÔØ¡£
https://securityaffairs.com/146804/data-breach/mcna-data-breach.html
2¡¢WordPressÔÚ½ü500Íò¸öÍøÕ¾×Ô¶¯×°Öòå¼þJetpackµÄ²¹¶¡
¾Ý5ÔÂ30ÈÕ±¨Â·£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÊý°ÙÍò¸öÍøÕ¾ÉÏÇ¿Ôì×°ÖÃÁ˰²È«²¹¶¡£¬ÒÔ½¨¸´²å¼þJetpackÖеÄÒ»¸ö·ì϶¡£×êÑÐÈËÔ±³Æ£¬ÔÚÄÚ²¿°²È«Éó¼ÆÆÚ¼ä·¢ÏÖJetpackµÄAPI´æÔÚ·ì϶£¬ÍøÕ¾µÄ¿ª·¢ÕßÄܹ»Ê¹Óô˷ì϶À´½ÚÔìWordPress×°ÖÃÖеÄËÁÒâÎļþ¡£Jetpack´Ë¿ÌÆðÍ·×Ô¶¯ÏòËùÓÐʹÓøòå¼þµÄÍøÕ¾ÍÆËͰ²È«²¹¶¡£¬Ä¿Ç°ÒÑÔÚ³¬¹ý413Íò¸öÍøÕ¾ÉϽøÐÐÁË×°Öá£AutomatticÒÑÂÅ´ÎʹÓÃÕâÖÖ×Ô¶¯¸üеķ½Ê½²¿Êð²¹¶¡¡£
https://www.bleepingcomputer.com/news/security/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites/
3¡¢×êÑÐÈËÔ±·¢ÏÖ±©Á¦ÆÆ½âÊÖ»úÖ¸ÎÆµÄ¹¥»÷·½Ê½BrutePrint
ýÌå5ÔÂ29Èճƣ¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪBrutePrintµÄ¹¥»÷·½Ê½£¬Äܹ»Í¨¹ý±©Á¦ÆÆ½âÖÇÄÜÊÖ»úÉϵÄÖ¸ÎÆÀ´ÈƹýÓû§Éí·ÝÑéÖ¤¡£¸Ã¹¥»÷¼¼ÊõÀûÓÃÁËÖÇÄÜÊÖ»úÖ¸ÎÆÈÏÖ¤(SFA)¿ò¼ÜÖеÄÁ½¸öÁãÈÕ·ì϶£¬Cancel-After-Match-Fail(CAMF)ºÍMatch-After-Lock(MAL)¡£ÕâÁ½¸ö·ì϶ÀûÓÃÁËÈÏÖ¤¿ò¼ÜÖеÄÂß¼·ì϶£¬Ô´ÓÚ¶ÔÖ¸ÎÆ´«¸ÐÆ÷µÄ´®ÐбíÉè½Ó¿Ú£¨SPI£©ÉϵÄÖ¸ÎÆÊý¾Ý±£»¤²»Á¦¡£
https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html
4¡¢Jimbos ProtocolÔâµ½ÉÁµç´û¹¥»÷Ëðʧ³¬¹ý750ÍòÃÀÔª
5ÔÂ29ÈÕ±¨Â·³Æ£¬»ùÓÚArbitrumµÄDeFiÏîÄ¿Jimbos ProtocolÔâµ½ÁËÉÁµç´û¹¥»÷£¬Ëðʧ³¬¹ý7500000ÃÀÔª¡£¹¥»÷²úÉúÔÚ¸ÃÆ½Ì¨Æô¶¯ÆäV2ºÍ̸µÄÈýÌìºó£¬ÆäʱºÜ¶àÈ˸ոÕͶ×Êjimbo´ú±Ò£¬¹¥»÷ÕßÉè·¨ÇÔÈ¡ÁË4090¸öETH´ú±Ò¡£×êÑÐÈËÔ±³Æ£¬Õâ´Î¹¥»÷ÀûÓÃÁËÒ»¸öÓëÁ÷¶¯ÐÔת»»²»×㻬µã½ÚÔìÓйصķì϶¡£ÔÚ±»ÈëÇÖÖ®ºó£¬jimboµÄ¼ÛֵѸ¿ì±©µø£¬´Ó0.238ÃÀÔªµøÖÁ0.0001ÃÀÔª¡£Jimbos ProtocolÒÑÏò¹¥»÷Õß·¢³öÐÅÏ¢£¬ÒªÇóËûÃÇËÍ»¹90%µÄ±»µÁ×ʽð£¬ÒÔ»»È¡²»ºÏÆäÌáÆð˾·¨ËßËϵijÐŵ¡£
https://www.bleepingcomputer.com/news/security/flash-loan-attack-on-jimbos-protocol-steals-over-75-million/
5¡¢AndroidľÂíDogeRAT¼Ù×°³ÉÊ¢ÐÐÀûÓÃÕë¶ÔÓ¡¶È¶à¸öÐÐÒµ
5ÔÂ29ÈÕ£¬CloudSEKÅû¶ÁËAndroid¶ñÒâÈí¼þDogeRATÕë¶ÔÓ¡¶È¶à¸öÐÐÒµµÄ¹¥»÷»î¶¯£¬ÓÈÆäÊÇÒøÐÐÒµºÍÓéÀÖÒµ¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉOpera Mini¡¢OpenAI ChatGOT¡¢YouTube¡¢NetflixºÍInstagramµÄµÈºÏ·¨ÀûÓã¬Í¨¹ýÉ罻ýÌåºÍÐÂÎÅÆ½Ì¨½øÐзַ¢¡£×°Öúó£¬Ëü»á´ÓÖ¸±êÉ豸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈçÁªÏµÈË¡¢ÐÂÎźÍÒøÐÐÆ¾Ö¤¡£»¹¿ÉÓÃÓÚ½ÚÔìÖ¸±êÉ豸ִÐжñÒâ»î¶¯£¬Èç·¢ËÍÀ¬»øÓʼþ¡¢½øÐÐδ¾ÊÚȨµÄÖ§¸¶¡¢Åú¸ÄÎļþºÍ²é¿´Í¨»°¼Í¼£¬ÉõÖÁÄܹ»Í¨¹ýÉ豸µÄÉãÏñÍ·Ô¶³ÌÅÄÕÕ¡£
https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries
6¡¢JPCERTÌáÐÑÐÂÐÍľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯
JPCERTе÷ÖÐÐÄÔÚ5ÔÂ29ÈÕ°ä²¼¹«¸æ£¬ÌáÐÑÐÂÐÍGolangľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯¡£¹¥»÷²úÉúÔÚ2ÔÂ×óÓÒ£¬¹¥»÷ÕßÊ×ÏÈÕë¶ÔÒ»¸öWEBUI¶Ô±íÊ¢¿ªµÄ·ÓÉÆ÷£¬ÀûÓÃÁË·ì϶ִÐнÅÕý±¾×°ÖÃGobRAT¡£¹¥»÷ÕßÔÚÈëÇÖ¶³öµÄ·ÓÉÆ÷ºó£¬»á×°ÖÃÒ»¸ö¼ÓÔØ·¨Ê½¾ç±¾£¬³äÈν»¸¶GobRATµÄ¹Ü·£¬¸Ã¾ç±¾ÔÚÆô¶¯Ê±¼Ù×°³ÉApacheÊØ»¤¹ý³Ì(apached)À´Èƹý¼ì²â¡£´Ë±í£¬GobRATͨ¹ý´«Êä²ã°²È«(TLS)ºÍ̸ÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬À´½Ó¹Ü¶à´ï22ÖÖ·ÖÆçµÄ¼ÓÃܺÅÁî¡£
https://thehackernews.com/2023/05/new-gobrat-remote-access-trojan.html


¾©¹«Íø°²±¸11010802024551ºÅ