·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
Ðû²¼Ê±¼ä 2023-03-301¡¢·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬·áÌïÒâ´óÀû¹«Ë¾ÒâÍâй¶ÁËÆäÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞ¡£¡£2ÔÂ14ÈÕ£¬£¬£¬£¬CybernewsÍŶÓÔÚ·áÌïÒâ´óÀû¹Ù·½ÍøÕ¾ÉÏ·¢Ã÷ÁËÒ»¸öÇéÐÎÎļþ(.env)¡£¡£Ëü¹ûÕæÁËÆäSalesforce Marketing CloudºÍMapbox APIµÄƾ֤£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áÀÄÓôËÐÅÏ¢À´»ñÈ¡·áÌï¿Í»§µÄµç»°ºÅÂëºÍÓʼþµØµãµÈÐÅÏ¢£¬£¬£¬£¬²¢Ö´Ðд¹ÂÚ¹¥»÷¡£¡£¸ÃÇéÐÎÎļþÓÚ2021Äê5ÔÂ21ÈÕÊ״α»IoTËÑË÷ÒýÇæ±àÈëË÷Òý£¬£¬£¬£¬ÕâÒâζ×ÅËüÒѹûÕæÁËÒ»Äê°ëÒÔÉÏ¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ð¹Â¶Êý¾ÝÒѾ±»±£»£»¤ÆðÀ´¡£¡£
https://cybernews.com/security/toyota-customer-data-leak/
2¡¢QNAPÐû²¼¸üУ¬£¬£¬£¬ÐÞ¸´ÆäNAS×°±¸ÖеÄSudoÌáȨÎó²î
¾Ý3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬QNAPÐÞ¸´ÁË»ùÓÚLinuxµÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸ÖеÄSudoÌáȨÎó²î¡£¡£¸ÃÎó²î×·×ÙΪCVE-2023-22809£¬£¬£¬£¬±»ÐÎòΪ¡°ÔÚSudo1.9.12p1°æ±¾ÖÐʹÓÃsudoeditÊ±ÈÆ¹ýsudoersÕ½ÂÔ¡±¡£¡£ÀÖ³ÉʹÓøÃÎó²î£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«í§ÒâÌõÄ¿Ìí¼Óµ½Òª´¦Öóͷ£µÄÎļþÁбíºó±à¼Î´¾ÊÚȨµÄÎļþÀ´ÌáÉýȨÏÞ¡£¡£¸Ã¹«Ë¾ÒѾ½â¾öÁËQTSºÍQuTS heroƽ̨ÖеÄÎó²î£¬£¬£¬£¬²¢ÔÚÆð¾¢ÌṩQuTScloudºÍQVPÇå¾²¸üС£¡£
https://www.bleepingcomputer.com/news/security/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices/
3¡¢ÃÀ¹ú¹ºÕ®¹«Ë¾NCBÔâµ½¹¥»÷½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹ú¹ºÕ®¹«Ë¾NCB Management ServicesÔâµ½¹¥»÷£¬£¬£¬£¬½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶¡£¡£NCBÓÚ2ÔÂ4ÈÕ·¢Ã÷£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½ÓÚ2ÔÂ1ÈÕ»ñµÃÁËNCBϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬²¢ÓÚ3ÔÂ8ÈÕÈ·ÈϿͻ§ÓëÃÀ¹úÒøÐÐÐÅÓÿ¨ÕË»§Ïà¹ØµÄһЩÐÅϢй¶¡£¡£¸ÃÊÂÎñÉæ¼°494969È˵ÄÐÕÃû¡¢¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÅÓÿ¨ºÅÂ롢·ÓɺÅÂë¡¢ÕË»§Óà¶îºÍÕË»§×´Ì¬µÈ¡£¡£ÃÀ¹úÒøÐн«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩExperian IdentityWorksSMÁ½ÄêµÄÉí·Ý͵ÇÔ±£»£»¤Ð§ÀÍ¡£¡£
https://therecord.media/debt-buyer-cyberattack-data-breach
4¡¢ÐÂAPT43ÔÚÒÑÍùµÄ5ÄêÖÐÒ»Ö±¹¥»÷Î÷Å·ÈÕº«µÈµØÇøµÄ×éÖ¯
3ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ð·¢Ã÷µÄºÚ¿ÍÍÅ»ïAPT43×Ô2018ÄêÒÔÀ´Ò»Ö±Õë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢ÈÕ±¾ºÍº«¹úµÄÕþ¸®¡¢Ñ§ÊõºÍÖÇÄÒÍÅÏà¹Ø×éÖ¯¡£¡£APT43ʹÓÃÓã²æÊ½´¹ÂÚÓʼþÀ´ÇÔȡĿµÄµÄÕÊ»§Æ¾Ö¤£¬£¬£¬£¬È»ºóÒÔÄ¿µÄÈËÎïµÄÉí·ÝµÇ¼²¢×ÔÐÐÖ´ÐÐÇé±¨ÍøÂç¡£¡£APT43»¹Ê¹ÓöñÒâAndroidÓ¦Ó㬣¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¡£¡£Mandiant±¨¸æËµ£¬£¬£¬£¬ÆäËûÑо¿Ö°Ô±ÔÚÒÑÍùÔø·¢Ã÷ÁËAPT43»î¶¯£¬£¬£¬£¬µ«Í¨³£½«Æä¹éÒòÓÚKimsuky»òThalium¡£¡£
https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage
5¡¢´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐòÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø
3ÔÂ28ÈÕ£¬£¬£¬£¬Kaspersky³ÆÆä·¢Ã÷ÁË´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐò£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø¡£¡£ÕâЩװÖóÌÐò°üÀ¨Ò»¸ö±ê×¼°æ±¾µÄTorä¯ÀÀÆ÷£¬£¬£¬£¬ÒÔ¼°Ò»¸öÌØÁíÍâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬Òþ²ØÔÚÊÜÃÜÂë±£»£»¤µÄRARÖС£¡£Torä¯ÀÀÆ÷ÔÚǰ̨Æô¶¯Ê±£¬£¬£¬£¬¸ÃÎļþÔÚºǫ́ÌáÈ¡¶ñÒâÈí¼þ¡£¡£¸Ã¶ñÒâÈí¼þ»á¼àÊÓ¼ôÌù°åÖпÉʶ±ðµÄ¼ÓÃÜÇ®°üµØµã£¬£¬£¬£¬²¢ÔÚ¼ì²âµ½Ê±½«ÆäÌæ»»Îª¹¥»÷ÕߵļÓÃÜÇ®±ÒµØµã¡£¡£ÔÚ2022Äê8ÔÂÖÁ2023Äê2ÔÂʱ´ú£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ52¸ö¹ú¼Ò/µØÇø¼ì²âµ½16000¸ö´ËÀàTor×°ÖóÌÐòµÄ±äÌå¡£¡£
https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
6¡¢µçÐŹ«Ë¾LumenÅû¶Æä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñµÄÏêÇé
3ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬µçÐŹ«Ë¾Lumen TechnologiesÅû¶ÁËÆä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñ¡£¡£Ê×ÏÈ£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÉÏÖÜ·¢Ã÷Æä²¿·ÖÖ§³Ö·Ö¶ÎÍйÜЧÀ͵ÄЧÀÍÆ÷ѬȾÁËÀÕË÷Èí¼þ¡£¡£ÔÚ·¢Ã÷ÀÕË÷¹¥»÷ºó£¬£¬£¬£¬¸Ã¹«Ë¾¼Ó¹ÌÁËÇå¾²Èí¼þ²¢·¢Ã÷ÁËÁíÒ»Æð¹¥»÷ÊÂÎñ¡£¡£ÔÚÕâµÚ¶þ´ÎÊÂÎñÖУ¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÁ˹«Ë¾µÄÄÚ²¿ÐÅÏ¢ÊÖÒÕϵͳ£¬£¬£¬£¬×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£¡£LumenÒѽ«´ËÊÂִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§±¨¸æÁËÕâÒ»ÊÂÎñ¡£¡£
https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html


¾©¹«Íø°²±¸11010802024551ºÅ