Microsoft 365ÒòECS°²ÅŹýʧȫÇò¹æÄ£ÄÚÖÐÖ¹5Сʱ
Ðû²¼Ê±¼ä 2022-07-25
¾Ý7ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬Î¢Èí͸¶ÉÏÖܳ¤´ï5СʱµÄMicrosoft 365È«Çò¹æÄ£ÄÚÖÐÖ¹ÊÇÓÉÆóÒµÉèÖÃЧÀÍ(ECS)°²ÅŹýʧµ¼Öµġ£¡£¡£ECSЧÀ͵ݲÅű£´æ´úÂëȱÏÝ£¬£¬£¬£¬Ó°ÏìÁËÆäÏòºó¼æÈÝÐÔ£¬£¬£¬£¬µ¼ÖÂʹÓÃECSµÄЧÀÍ£¬£¬£¬£¬½«ÏòÆäËùÓеÄÏàÖúͬ°é·µ»Ø²»×¼È·µÄÉèÖᣡ£¡£Ò£²âÅú×¢£¬£¬£¬£¬Ô¼ÄªÓÐ30Íò¸öºô½ÐÊܵ½Ó°Ï죬£¬£¬£¬ÓÉÓÚӪҵʱ¼äÓëÓ°Ïì´°¿ÚÏàÎǺϣ¬£¬£¬£¬ÑÇÌ«µØÇøÊܵ½µÄÓ°Ïì×î´ó¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ö±½Ó·ÓɺÍSkype MFAÊÇÊÜÓ°Ïì×î´óµÄЧÀÍ¡£¡£¡£ÖÐÖ¹×îÏÈÓÚ7ÔÂ21ÈÕÆÆÏþ1:05 UTC×îÏÈ£¬£¬£¬£¬µ±ÈÕÔçÉÏ6:00 UTC֮ǰ´ó²¿·ÖÒѱ»ÐÞ¸´¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-faulty-ecs-deployment/
2¡¢¹¥»÷ÕßÔÚ°µÍøÒÔ3ÍòÃÀÔª³öÊÛ540ÍòTwitterÓû§µÄÐÅÏ¢
¾ÝýÌå7ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬ÃûΪdevilµÄºÚ¿Í³ÆÆäʹÓÃÎó²î»á¼ûÁË5485636ÃûTwitterÓû§µÄÐÅÏ¢£¬£¬£¬£¬²¢ÒÔÖÁÉÙ30000ÃÀÔªµÄ¼ÛÇ®¾ÙÐгöÊÛ¡£¡£¡£ÓÃÓÚÍøÂçÊý¾ÝµÄÎó²îÓÚ1ÔÂ1±»Åû¶²¢ÓÚ1ÔÂ13ÈÕÐÞ¸´£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤¹¥»÷ÕßÓÃÀ´Í¨¹ýµç»°ºÅÂëºÍÓʼþÀ´»ñÈ¡í§ÒâÓû§µÄTwitter ID¡£¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇÔÚ2021Äê12Ô¾Í×îÏÈʹÓÃÎó²îÍøÂçÊý¾Ý£¬£¬£¬£¬ÏÖÔÚÒÑÓиÐÐËȤµÄÂò¼ÒÓëËûÃǾÙÐÐÁªÏµ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬TwitterÉÐδȷÈÏ´Ë´Îй¶ÊÂÎñ£¬£¬£¬£¬¶øÂô¼ÒÒÑɾ³ý¸Ã¹ã¸æ¡£¡£¡£
https://securityaffairs.co/wordpress/133593/data-breach/twitter-leaked-data.html
3¡¢Securonix·¢Ã÷APT37ʹÓÃKonni¹¥»÷Å·ÖÞ¶à¹úµÄ»î¶¯
7ÔÂ20ÈÕ£¬£¬£¬£¬Securonix³ÆÆä·¢Ã÷Á˳¯Ïʹ¥»÷ÕßAPT37ʹÓÃKonniÕë¶Ô½Ý¿ËºÍ²¨À¼µÈÅ·ÖÞ¹ú¼ÒµÄ¹¥»÷¡£¡£¡£Ôڴ˻ÖУ¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÔ¶³Ì»á¼ûľÂíKonni£¬£¬£¬£¬¹¥»÷ʼÓÚÒ»·â°üÀ¨WordÎĵµ(missile.docx)ºÍWindows¿ì½Ý·½·¨Îļþ(weapons.doc.lnk.lnk)¸½¼þµÄ´¹ÂÚÓʼþ¡£¡£¡£·¿ªLNKºó»áÖ´ÐдúÂëÀ´ÔÚDOCXÎļþÖвéÕÒbase64±àÂëµÄPowerShell¾ç±¾£¬£¬£¬£¬È»ºó½¨ÉèC2ͨѶ²¢ÏÂÔØÁ½¸öÎļþ¡°weapons.doc¡±ºÍ¡°wp.vbs¡±¡£¡£¡£ÕâЩÎļþÖ»ÊÇÓÕ¶ü£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬ºǫ́»á¾²Ä¬µØÔËÐÐVBSÎļþ£¬£¬£¬£¬×îÖÕÏÂÔØKonni¡£¡£¡£
https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
4¡¢Êý×ÖÇå¾²¹«Ë¾EntrustÔâµ½¹¥»÷ºóÄÚ²¿ÏµÍ³Êý¾Ý±»µÁ
ýÌå7ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬Entrust³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ÄÚ²¿ÏµÍ³ÖеÄÊý¾Ý±»µÁ¡£¡£¡£EntrustÊÇÒ»¼ÒרעÓÚÔÚÏßÐÅÈκÍÉí·ÝÖÎÀíµÄÇå¾²¹«Ë¾£¬£¬£¬£¬Ìṩ°üÀ¨¼ÓÃÜͨѶ¡¢Çå¾²Êý×ÖÖ§¸¶ºÍÉí·Ý֤ʵ½â¾ö¼Æ»®µÈЧÀÍ¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ18ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Ïàʶµ½Ò»¸öÖøÃûµÄÀÕË÷ÍÅ»ïÊÇÄ»ºóºÚÊÖ¡£¡£¡£±»µÁÊý¾ÝÏÔʾ£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜ»áÓ°Ïì´ó×ÚʹÓÃEntrust¾ÙÐÐÉí·ÝÖÎÀíºÍÉí·ÝÑéÖ¤µÄ×éÖ¯£¬£¬£¬£¬°üÀ¨ÃÀ¹úÕþ¸®»ú¹¹£¬£¬£¬£¬ÈçÄÜÔ´²¿¡¢ÁìÍÁÇå¾²²¿¡¢²ÆÎñ²¿¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿¡¢ÍËÎéÎäÊ¿ÊÂÎñ²¿ºÍũҵ²¿µÈµÈ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
5¡¢Cisco͸¶Õë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷µÄϸ½Ú
CiscoÔÚ7ÔÂ21ÈÕÅû¶ÁËÕë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£Õâ¼ÒÈí¼þ¹«Ë¾Éú²úµÄÈí¼þ¹©ÎÚ¿ËÀ¼¶à¸ö¹ú¼Ò»ú¹¹ËùʹÓ㬣¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄÜÓë¶íÂÞ˹Óйأ¬£¬£¬£¬ÒԸù«Ë¾ÎªÄ¿µÄÍýÏë·¢¶¯¹©Ó¦Á´¹¥»÷¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËÒ»¸öÃûΪGoMetµÄ¿ªÔ´ºóÃŵÄ×Ô½ç˵±äÌ壬£¬£¬£¬Ö»ÓÐÁ½Æð¼Í¼ÔÚ°¸µÄ»î¶¯Ê¹Óùý¸ÃºóÃÅ£º2020Äê¹¥»÷ÕßʹÓÃF5 BIG-IPÖÐÎó²î£¨CVE-2020-5902£©ÈëÇÖϵͳ²¢×°ÖÃÕâ¸öºóÃÅ£»£»£»½üÆÚ£¬£¬£¬£¬¹¥»÷ÕßÔÚʹÓÃSophos FirewallÖÐÎó²î£¨CVE-2022-1040£©ºó×°ÖúóÃÅ¡£¡£¡£
https://blog.talosintelligence.com/2022/07/attackers-target-ukraine-using-gomet.html
6¡¢SonicWalÐû²¼SQL×¢ÈëÎó²îCVE-2022-22280µÄÇ徲ͨ¸æ
SonicWallÔÚ7ÔÂ22ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬ÌáÐÑÓ°ÏìGMS£¨È«ÇòÖÎÀíϵͳ£©ºÍAnalytics On-Prem²úÆ·µÄSQL×¢ÈëÎó²î¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-22280£¬£¬£¬£¬ÊǶÔSQLÏÂÁîÖÐʹÓõÄÌØÊâÔªËØµÄ²»×¼È·Öк͵¼Öµģ¬£¬£¬£¬CVSSÆÀ·ÖΪ9.4£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤»òÓû§½»»¥¼´¿ÉʹÓᣡ£¡£SonicWallÌåÏÖ˵£¬£¬£¬£¬¸ÃÎó²îÉÐδ±»ÔÚҰʹÓ㬣¬£¬£¬Ò²Ã»ÓÐÕë¶Ô´ËÎó²îµÄ¿´·¨Ö¤Êµ(PoC)¡£¡£¡£´ËÎó²îûÓпÉÓõĽâ¾öÒªÁ죬£¬£¬£¬Òò´ËSonicWallÇ¿ÁÒ½¨ÒéʹÓÃÊÜÓ°Ïì²úÆ·µÄ×éÖ¯Á¬Ã¦Éý¼¶µ½ÏìÓ¦µÄÐÞ¸´°æ±¾¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-patch-critical-sql-injection-bug-immediately/


¾©¹«Íø°²±¸11010802024551ºÅ