·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë

Ðû²¼Ê±¼ä 2023-03-30

1¡¢·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë


ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬ £¬·áÌïÒâ´óÀû¹«Ë¾ÒâÍâй¶ÁËÆäÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞ¡£¡£2ÔÂ14ÈÕ£¬£¬£¬ £¬CybernewsÍŶÓÔÚ·áÌïÒâ´óÀû¹Ù·½ÍøÕ¾ÉÏ·¢Ã÷ÁËÒ»¸öÇéÐÎÎļþ(.env)¡£¡£Ëü¹ûÕæÁËÆäSalesforce Marketing CloudºÍMapbox APIµÄƾ֤£¬£¬£¬ £¬¹¥»÷Õß¿ÉÄÜ»áÀÄÓôËÐÅÏ¢À´»ñÈ¡·áÌï¿Í»§µÄµç»°ºÅÂëºÍÓʼþµØµãµÈÐÅÏ¢£¬£¬£¬ £¬²¢Ö´Ðд¹ÂÚ¹¥»÷¡£¡£¸ÃÇéÐÎÎļþÓÚ2021Äê5ÔÂ21ÈÕÊ״α»IoTËÑË÷ÒýÇæ±àÈëË÷Òý£¬£¬£¬ £¬ÕâÒâζ×ÅËüÒѹûÕæÁËÒ»Äê°ëÒÔÉÏ¡£¡£ÏÖÔÚ£¬£¬£¬ £¬Ð¹Â¶Êý¾ÝÒѾ­±»±£»£»¤ÆðÀ´¡£¡£


https://cybernews.com/security/toyota-customer-data-leak/


2¡¢QNAPÐû²¼¸üУ¬£¬£¬ £¬ÐÞ¸´ÆäNAS×°±¸ÖеÄSudoÌáȨÎó²î


¾Ý3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬ £¬QNAPÐÞ¸´ÁË»ùÓÚLinuxµÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸ÖеÄSudoÌáȨÎó²î¡£¡£¸ÃÎó²î×·×ÙΪCVE-2023-22809£¬£¬£¬ £¬±»ÐÎòΪ¡°ÔÚSudo1.9.12p1°æ±¾ÖÐʹÓÃsudoeditÊ±ÈÆ¹ýsudoersÕ½ÂÔ¡±¡£¡£ÀÖ³ÉʹÓøÃÎó²î£¬£¬£¬ £¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«í§ÒâÌõÄ¿Ìí¼Óµ½Òª´¦Öóͷ£µÄÎļþÁбíºó±à¼­Î´¾­ÊÚȨµÄÎļþÀ´ÌáÉýȨÏÞ¡£¡£¸Ã¹«Ë¾ÒѾ­½â¾öÁËQTSºÍQuTS heroƽ̨ÖеÄÎó²î£¬£¬£¬ £¬²¢ÔÚÆð¾¢ÌṩQuTScloudºÍQVPÇå¾²¸üС£¡£


https://www.bleepingcomputer.com/news/security/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices/


3¡¢ÃÀ¹ú¹ºÕ®¹«Ë¾NCBÔâµ½¹¥»÷½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶


¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬ £¬ÃÀ¹ú¹ºÕ®¹«Ë¾NCB Management ServicesÔâµ½¹¥»÷£¬£¬£¬ £¬½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶¡£¡£NCBÓÚ2ÔÂ4ÈÕ·¢Ã÷£¬£¬£¬ £¬Î´¾­ÊÚȨµÄµÚÈý·½ÓÚ2ÔÂ1ÈÕ»ñµÃÁËNCBϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬ £¬²¢ÓÚ3ÔÂ8ÈÕÈ·ÈϿͻ§ÓëÃÀ¹úÒøÐÐÐÅÓÿ¨ÕË»§Ïà¹ØµÄһЩÐÅϢй¶¡£¡£¸ÃÊÂÎñÉæ¼°494969È˵ÄÐÕÃû¡¢¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÅÓÿ¨ºÅÂ롢·ÓɺÅÂë¡¢ÕË»§Óà¶îºÍÕË»§×´Ì¬µÈ¡£¡£ÃÀ¹úÒøÐн«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩExperian IdentityWorksSMÁ½ÄêµÄÉí·Ý͵ÇÔ±£»£»¤Ð§ÀÍ¡£¡£


https://therecord.media/debt-buyer-cyberattack-data-breach


4¡¢ÐÂAPT43ÔÚÒÑÍùµÄ5ÄêÖÐÒ»Ö±¹¥»÷Î÷Å·ÈÕº«µÈµØÇøµÄ×éÖ¯


3ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬£¬ £¬Ð·¢Ã÷µÄºÚ¿ÍÍÅ»ïAPT43×Ô2018ÄêÒÔÀ´Ò»Ö±Õë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢ÈÕ±¾ºÍº«¹úµÄÕþ¸®¡¢Ñ§ÊõºÍÖÇÄÒÍÅÏà¹Ø×éÖ¯¡£¡£APT43ʹÓÃÓã²æÊ½´¹ÂÚÓʼþÀ´ÇÔȡĿµÄµÄÕÊ»§Æ¾Ö¤£¬£¬£¬ £¬È»ºóÒÔÄ¿µÄÈËÎïµÄÉí·ÝµÇ¼²¢×ÔÐÐÖ´ÐÐÇé±¨ÍøÂç¡£¡£APT43»¹Ê¹ÓöñÒâAndroidÓ¦Ó㬣¬£¬ £¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¡£¡£Mandiant±¨¸æËµ£¬£¬£¬ £¬ÆäËûÑо¿Ö°Ô±ÔÚÒÑÍùÔø·¢Ã÷ÁËAPT43»î¶¯£¬£¬£¬ £¬µ«Í¨³£½«Æä¹éÒòÓÚKimsuky»òThalium¡£¡£


https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage


5¡¢´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐòÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø


3ÔÂ28ÈÕ£¬£¬£¬ £¬Kaspersky³ÆÆä·¢Ã÷ÁË´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐò£¬£¬£¬ £¬Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø¡£¡£ÕâЩװÖóÌÐò°üÀ¨Ò»¸ö±ê×¼°æ±¾µÄTorä¯ÀÀÆ÷£¬£¬£¬ £¬ÒÔ¼°Ò»¸öÌØÁíÍâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬ £¬Òþ²ØÔÚÊÜÃÜÂë±£»£»¤µÄRARÖС£¡£Torä¯ÀÀÆ÷ÔÚǰ̨Æô¶¯Ê±£¬£¬£¬ £¬¸ÃÎļþÔÚºǫ́ÌáÈ¡¶ñÒâÈí¼þ¡£¡£¸Ã¶ñÒâÈí¼þ»á¼àÊÓ¼ôÌù°åÖпÉʶ±ðµÄ¼ÓÃÜÇ®°üµØµã£¬£¬£¬ £¬²¢ÔÚ¼ì²âµ½Ê±½«ÆäÌæ»»Îª¹¥»÷ÕߵļÓÃÜÇ®±ÒµØµã¡£¡£ÔÚ2022Äê8ÔÂÖÁ2023Äê2ÔÂʱ´ú£¬£¬£¬ £¬Ñо¿Ö°Ô±ÔÚ52¸ö¹ú¼Ò/µØÇø¼ì²âµ½16000¸ö´ËÀàTor×°ÖóÌÐòµÄ±äÌå¡£¡£


https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/


6¡¢µçÐŹ«Ë¾LumenÅû¶Æä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñµÄÏêÇé


3ÔÂ28ÈÕ±¨µÀ£¬£¬£¬ £¬µçÐŹ«Ë¾Lumen TechnologiesÅû¶ÁËÆä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñ¡£¡£Ê×ÏÈ£¬£¬£¬ £¬¸Ã¹«Ë¾ÔÚÉÏÖÜ·¢Ã÷Æä²¿·ÖÖ§³Ö·Ö¶ÎÍйÜЧÀ͵ÄЧÀÍÆ÷ѬȾÁËÀÕË÷Èí¼þ¡£¡£ÔÚ·¢Ã÷ÀÕË÷¹¥»÷ºó£¬£¬£¬ £¬¸Ã¹«Ë¾¼Ó¹ÌÁËÇå¾²Èí¼þ²¢·¢Ã÷ÁËÁíÒ»Æð¹¥»÷ÊÂÎñ¡£¡£ÔÚÕâµÚ¶þ´ÎÊÂÎñÖУ¬£¬£¬ £¬¹¥»÷ÕßÈëÇÖÁ˹«Ë¾µÄÄÚ²¿ÐÅÏ¢ÊÖÒÕϵͳ£¬£¬£¬ £¬×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£¡£LumenÒѽ«´ËÊÂִ֪ͨ·¨²¿·Ö£¬£¬£¬ £¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§±¨¸æÁËÕâÒ»ÊÂÎñ¡£¡£


https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html