AzureÔÆÕÊ»§ÒòÉèÖùýʧй¶΢Èí¶à¿î²úÆ·µÄÔ´´úÂ룻£»£»£»£»Microsoft TeamsÓÉÓÚÉèÖøü¸ÄÔÙ´ÎÖÐÖ¹£¬£¬£¬Ó°ÏìÈ«ÇòÓû§
Ðû²¼Ê±¼ä 2021-04-291.AzureÔÆÕÊ»§ÒòÉèÖùýʧй¶΢Èí¶à¿î²úÆ·µÄÔ´´úÂë

vpnMentorÑо¿ÍŶӷ¢Ã÷Ò»¸öÉèÖùýʧµÄMicrosoft Azure BlobÔÆÕÊ»§Ð¹Â¶ÁË΢Èí¶à¿î²úÆ·µÄÔ´´úÂë¡£¡£Ð¹Â¶Êý¾ÝµÄ×ܾÞϸΪ63GB£¬£¬£¬°üÀ¨Áè¼Ý3800¸öÎļþ£¬£¬£¬Éæ¼°Éϰټҹ«Ë¾µÄÈÚ×ÊÑݽ²¸åºÍ10-15ÖÖ²úÆ·µÄÔ´´úÂ룬£¬£¬ÓÚ2021Äê1ÔÂ7ÈÕ±»·¢Ã÷²¢ÒÑÔÚ2021Äê2ÔÂ23ÈÕ»ñµÃ±£»£»£»£»£»¤¡£¡£ÕâЩÎļþΪÖڶ๫˾ÏòMicrosoft Dynamics×ö³öµÄһϵÁÐÉÌÒµÐû´«ºÍ²úƷ˵Ã÷£¬£¬£¬¿ÉÄÜÀ´×Ô΢Èí¹«Ë¾¡£¡£
ÔÎÄÁ´½Ó£º
https://www.vpnmentor.com/blog/report-microsoft-dynamics-leak/
2.ÔÆÌṩÉÌDigitalOcean³ÆÔâµ½¹¥»÷£¬£¬£¬¿Í»§ÕÊ»§ÐÅϢй¶

ÔÆÍйÜÌṩÉÌDigitalOcean³ÆÔâµ½¹¥»÷£¬£¬£¬²¿·Ö¿Í»§µÄÕÊ»§ÐÅϢй¶¡£¡£DigitalOceanÏòÊÜÓ°Ïì¿Í»§·¢ËÍÓʼþ£¬£¬£¬³ÆÔÚ2021Äê4ÔÂ9ÈÕÖÁ2021Äê4ÔÂ22ÈÕÖ®¼ä£¬£¬£¬Î´¾ÊÚȨµÄÓû§Ê¹ÓÃÒ»¸öÎó²î»á¼ûÁ˲¿·ÖÓû§µÄÕ˵¥ÐÅÏ¢£¬£¬£¬ÏÖÔÚ¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÕ˵¥Ãû³Æ¡¢Õ˵¥µØµã¡¢ÐÅÓÿ¨µ½ÆÚʱ¼ä¡¢ÐÅÓÿ¨µÄºóËÄλÊý×ÖÒÔ¼°ÐÅÓÿ¨µÄÒøÐÐÃû³Æ¡£¡£DigitalOceanÔÚÈ¥ÄêÒ²±¬·¢ÁËÊý¾Ýй¶£¬£¬£¬ÊÇÓÉÓÚ¹ûÕæÁ´½ÓÖаüÀ¨Á˿ͻ§ÕÊ»§ÐÅÏ¢µÄÎĵµ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/digitalocean-data-breach-exposes-customer-billing-information/
3.Microsoft TeamsÓÉÓÚÉèÖøü¸ÄÔÙ´ÎÖÐÖ¹£¬£¬£¬Ó°ÏìÈ«ÇòÓû§

Microsoft TeamsÔٴα¬·¢Ð§ÀÍÖÐÖ¹£¬£¬£¬Ó°ÏìÈ«Çò¹æÄ£ÄÚµÄÓû§¡£¡£´Ë´ÎÖÐÖ¹±¬·¢ÔÚ4ÔÂ27ÈÕUTCʱ¼ä9:58ºÍ12:05Ö®¼ä£¬£¬£¬Óû§ÎÞ·¨·¢ËͺÍÎüÊÕÐÂÎÅ¡¢¼ÓÈëÆµµÀ¡¢¼ÓÈë̸ÌìºÍԢĿƵµÀ¡£¡£¾ÊӲ죬£¬£¬MicrosoftÈ·ÈÏÕâÊÇÓÉ×î½üµÄÉèÖøü¸ÄÒýÆðµÄ£¬£¬£¬¸ü¸Äµ¼ÖÂÌØ¶¨¹¦Ð§ÉèÖÃÖеÄÖµ¹ýʧ£¬£¬£¬´Ó¶ø¶ÔЧÀÍÔì³ÉÓ°Ï죬£¬£¬ÎÊÌâÏÖÒÑÐÞ¸´¡£¡£ÔÚ±¾Ô³õ£¬£¬£¬ÓÉÓÚDNSÅÌÎÊÒì³£¼¤ÔöʹAzure DNSЧÀÍÆ÷³¬ÔØ£¬£¬£¬µ¼ÖÂÁËMicrosoft TeamsµÈÖÚ¶àЧÀÍÔÚÈ«Çò¹æÄ£ÄÚÖÐÖ¹¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-worldwide-outage-impacts-user-logins-chats/
4.ArmorbloxÅû¶Õë¶ÔĦ¸ù´óÍ¨ÒøÐпͻ§µÄ´¹ÂÚ¹¥»÷»î¶¯

ArmorbloxÑо¿Ö°Ô±Åû¶½üÆÚÕë¶ÔĦ¸ù´óÍ¨ÒøÐпͻ§µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£ÕâЩ»î¶¯¶¼½ÓÄÉÁËÉç»á¹¤³Ì¹¥»÷ºÍð³äÆ·ÅÆµÄÕ½ÂÔ£¬£¬£¬²¢Ê¹ÓÃÁËһϵÁÐÊÖÒÕÀ´Èƹýµç×ÓÓʼþÇå¾²¹ýÂËÆ÷£¬£¬£¬ÍýÏëÇÔÈ¡¿Í»§µÄµÇ¼ƾ֤¡£¡£Ò»²¿·Ö¹¥»÷ð³äJp Morgan Chase£¬£¬£¬ÒÔ¡°ÄúµÄÐÅÓÿ¨¶ÔÕʵ¥ÒÑ×¼±¸Í£µ±¡±ÎªÌ⣬£¬£¬ÓÕʹĿµÄµã»÷αװ³Éδ֧¸¶Õ˵¥µÄÁ´½Ó²¢ÊäÈëÒøÐÐÆ¾Ö¤¡£¡£ÁíһЩ¹¥»÷ð³äÒøÐеķÀڲƲ¿·Ö£¬£¬£¬ÒÔ¡°½ôÆÈ£ºÒì³£µÄµÇ¼»î¶¯¡±ÎªÎÊÌâµÄÓʼþÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/threat-actors-impersonate-chase/
5.Èí¼þ°ü¹ÜÀíÆ÷CocoaPods±£´æRCEÎó²î£¬£¬£¬300¶àÍò¸öÓ¦ÓÃÊÜÓ°Ïì

Ñо¿Ô±Max Justicz·¢Ã÷Èí¼þ°ü¹ÜÀíÆ÷CocoaPods±£´æRCEÎó²î£¬£¬£¬¿ÉÄÜÓ°ÏìSignalµÈ300¶àÍò¸öÓ¦Óᣡ£CocoaPodsÊÇʹÓÃRuby¹¹½¨µÄÓ¦ÓóÌÐò¼¶ÒÀÀµ¹ØÏµÖÎÀíÆ÷£¬£¬£¬ÌṩÁËÒ»ÖÖ±ê×¼ÃûÌÃÀ´ÖÎÀíÍⲿ¿â¡£¡£¹¥»÷ÕßÔÚÉÏ´«°üµÄ¹æ¸ñµ½CocoaPodsʱ£¬£¬£¬¿ÉÍêÈ«¿ØÖÆ@specification.source[:git]ºÍref.to_£¬£¬£¬Òò´ËÔÚ¾ßÓÐTrunk key£¨¹æ¸ñ¿â£©µÄCocoaPodsЧÀÍÆ÷¿ÉÒÔÔ¶³ÌÖ´ÐдúÂë¡£¡£Ñо¿Ô±³Æ¸ÃÎó²îÒѾ±£´æ6Ä꣨Ê״ηºÆðÔÚ2015Äê6ÔÂ4ÈÕ£©£¬£¬£¬Ö±µ½×î½ü²Å±»ÐÞ¸´¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2021/04/27/cocoapods-rce-vulnerability-could-risk-3-million-mobile-apps-including-signal/
6.CISAºÍNISTÁªºÏÐû²¼ÓйصÖÓùÈí¼þ¹©Ó¦Á´¹¥»÷µÄÖ¸ÄÏ

CISAºÍÃÀ¹ú¹ú¼Ò±ê×¼ÊÖÒÕÑо¿Ôº£¨NIST£©ÁªºÏÐû²¼ÁËÓйصÖÓùÈí¼þ¹©Ó¦Á´¹¥»÷µÄÖ¸ÄÏ¡£¡£¸ÃÖ¸ÄϸÅÊöÁËÈí¼þ¹©Ó¦Á´µÄΣº¦£¬£¬£¬ÒÔ¼°Èí¼þ¿Í»§ºÍ¹©Ó¦ÉÌÔõÑùʹÓÃNISTÍøÂ繩ӦÁ´Î£º¦ÖÎÀí(C-SCRM)¿ò¼ÜºÍÇå¾²Èí¼þ¿ª·¢¿ò¼Ü(SSDF)À´Ê¶±ð¡¢ÆÀ¹À»ººÍ½âÈí¼þ¹©Ó¦Á´Î£º¦µÄ½¨Òé¡£¡£±ðµÄ£¬£¬£¬¸ÃÖ¸ÄÏΪÈí¼þ¿Í»§ºÍ¹©Ó¦ÉÌÌṩÁËÔ¤·À¡¢»º½âºÍ»Ö¸´Èí¼þ¹©Ó¦Á´¹¥»÷µÄÒªº¦°ì·¨ºÍÉîÈëµÄ½¨Òé¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/04/26/cisa-and-nist-release-new-interagency-resource-defending-against


¾©¹«Íø°²±¸11010802024551ºÅ