¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼µ±¾Ö»ú¹¹°ä²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢£»Ë¼¿ÆÎªCMLºÍVIRL-PE°ä²¼°²È«¸üУ¬½¨¸´SaltStack¿ò¼Ü·ì϶

°ä²¼¹¦·ò 2020-06-01

1.¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼µ±¾Ö»ú¹¹£¬°ä²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


²¨À¼µ±¾Ö°ä·¢¶íÂÞ˹¶ÔÆä½øÐÐÁË´ó¹æÄ£µÄÍøÂç¹¥»÷£¬Ö¼ÔÚ¹¥»÷²¨À¼¾ü¶Ó£¬ÒÔ¼°·ÛË黪ɳºÍ»ªÊ¢¶ÙÖ®¼äµÄ¹ØÏµ¡£¾ÝϤ£¬ºÚ¿ÍÏ®»÷Á˲¨À¼µÄ¶à¸öÕ¾µã£¬ÔÚNiezaleznapl¡¢Olsztyn24com¡¢RadioSzzezecinpl¡¢ePoznanplµÄInternetµÈÍøÕ¾Éϰ䲼Óйر±Ô¼ÑÝϰ¡°2020Äê±£ÎÀÕßÅ·ÖÞ¡±µÄÐéαÐÅÏ¢¡£²¨À¼³ö¸ñ·þÎñµ±¾ÖЭµ÷²¿³¤½²»°ÈËStanislav Zharin°µÊ¾£¬Õâ´Î¹¥»÷Ç¡·ê¡°±£ÎÀÕßÅ·ÖÞ2020¡±ÏÂÒ»½×¶ÎÑÝϰµÄÆðÍ·£¬²¢ÇÒÉæ¼°µ½Á˲¨À¼ÓëÃÀ¹úÖ®¼äµÄ¾üʺÏ×÷£¬ºÚ¿ÍÖ÷ÕÅ¿ÉÄÜÊÇΪÁËÍ»ÆÆ±±Ô¼µÄͳһ£¬ÒÔ¼°ÃÀ¾üºÍ²¨À¼¶ÓÁнáºÏµÄ¿ÉÄÜÐÔ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/05/russian-hackers-attacked-poland-due-to.html


2.˼¿ÆÎªCMLºÍVIRL-PE°ä²¼°²È«¸üУ¬½¨¸´SaltStack¿ò¼Ü·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿Æ°ä²¼Á˰²È«¸üУ¬ÒÔ½¨¸´Cisco Modeling LabsÆóÒµ°æ£¨CML£©ºÍÐé¹¹Internet·Óɳ¢ÊÔÊÒÓ×ÎҰ棨VIRL-PE£©ÖÐSaltStack¿ò¼Ü·ì϶£¬Ô¶³Ì¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶À´½ÚÔìϵͳ¡£Õâ´Î²¹¶¡½¨¸´ÁËÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2020-11651£©£¬ËüÔÊÐíÔ¶³ÌÓû§ÔÚ²»½øÐÐÉí·ÝÑéÖ¤µÄÇé¿öϽӼûmethods£¬²¢Äܹ»´Ósalt master»òsalt minionsÉÏÔËÐÐËÁÒâºÅÁîÀ´¼ìË÷Óû§ÁîÅÆ¡£»¹ÓÐĿ¼±éÀú·ì϶£¨CVE-2020-11652£©£¬ÆäÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÓû§½øÐÐËÁÒâĿ¼½Ó¼û¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2020/05/29/cisco-releases-security-updates-cml-and-virl-pe


3.ÃÀ¹úÌú·¹«Ë¾AmtrakÔâµ½ÈëÇÖµ¼ÖÂÆäÓû§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú¹ú¶ÈÌú·´î¿Í¹«Ë¾AmtrakÓÚ4ÔÂ16ÈÕÍíÉÏÈ·¶¨ÓÐδ֪µÄµÚÈý·½¶ÔÆäÓû§µÄÕÊ»§½øÐÐδ¾­ÊÚȨµÄ½Ó¼û£¬µ¼ÖÂijЩGuest Rewards»áÔ±µÄÓ×ÎÒÐÅϢй¶¡£¸Ã¹«Ë¾µÄ°²È«ÍŶÓÔÚ¼ì²âµ½ÈëÇÖºóµÄ¼¸¸öÓ×ʱÄÚ£¬±ã²ÉÈ¡ÁËÏìÓ¦´ëÊ©£¬×èÖ¹Á˺ڿ͵ĽӼû£¬Ö®ºó³ÁÖÃÁËGuest RewardsÕÊ»§µÄÃÜÂ룬²¢ÎªÊÜÓ°ÏìÓû§ÌṩÁËΪÆÚÒ»ÄêµÄExperianµÄIdentityWorksÉí·ÝµÁÓñ£»¤·þÎñ¡£Amtrak¹«Ë¾²¢Î´Ð¹Â©Õâ´ÎÊÂÎñÓ°ÏìµÄÕÊ»§×ÜÊý»ò¿ÉÄܶ³öµÄÓ×ÎÒÐÅÏ¢ÀàÐÍ£¬µ«°µÊ¾Ã»ÓÐÈκβÆÕþÊý¾Ý¡¢ÐÅÓþ¿¨ÐÅÏ¢»òÉç»á°²È«ºÅÂëй¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/amtrak-resets-user-passwords-after-guest-rewards-data-breach/


4.ºÚ¿Íй¶°µÍøÍйÜÌṩÉÌDaniel's HostingÊý¾Ý¿â


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÓÚ5ÔÂ31ÈÕ¹«¿ªÁË×î´óµÄÃâ·Ñ°µÍø·þÎñÍйÜÌṩÉÌDaniel's Hosting£¨DH£©µÄÊý¾Ý¿â¡£¾ÝϤ£¬Õâ´Îй¶²úÉúÔÚ½ñÄêËêÊ×£¬¼´2020Äê3ÔÂ10ÈÕ£¬DHµÄËùÓÐÕßDaniel Winzen°µÊ¾£¬ºÚ¿ÍÈëÇÖÁËËûµÄÍøÕ¾²¢µÁÈ¡ÁËËûµÄÊý¾Ý¿â£¬¶øºó¶Ï¸ùÁËÆäËùÓзþÎñÆ÷¡£ÔÚ¸ÃÊÂÎñ²úÉúµÄ²úÉúÁ½Öܺó£¬3ÔÂ26ÈÕ£¬DHÓÀÔ¶ÐÔµØÖÕ³¡ÁËÆä·þÎñ£¬²¢¶½´ÙÓû§Ç¨áãµ½ÐµİµÍøÍйܷþÎñÌṩÉÌ¡£Õâ´ÎÐÂäį´×ÔºÚ¿ÍKingNull£¬Ð¹Â©ÁË3671¸öµç×ÓÓʼþµØÖ·£¬7205¸öÕÊ»§ÃÜÂëºÍ8580¸ö.onionÓòµÄ˽Կ¡£Íþвµý±¨¹«Ë¾Under Breach·ÖÎö£¬Õâ´Îй©µÄÊý¾Ý¿âÉæ¼°µ½Êýǧ¸öDarknetÓòµÄËùÓÐÕߺÍÓû§µÄÃô¸ÐÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-leaks-database-of-dark-web-hosting-provider/


5.ºÚ¿ÍαÔìWindowsÓÎÏ·ValorantµÄÊÖ»ú°æÒÔ´«²¼¶ñÒâÈí¼þ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍαÔìRiot GamesµÄÓÎÏ·ValorantµÄÊÖ»ú°æÒÔ´«²¼¶ñÒâÈí¼þ¡£2019Äê10Ô£¬Riot Games°ä·¢½«ÓÚ2020Äê6ÔÂÍÆÎÅÃûΪValorantµÄÐÂÓÎÏ·£¬¸ÃÓÎÏ·¿ÉÔÚMicrosoft WindowsÉÏʹÓã¬Ä¿Ç°ÍƳöÁ˲âÊ԰棬¾Ýͳ¼ÆÏÔʾ£¬Ã¿ÌìÓг¬¹ý300ÍòÍæ¼ÒʹÓ᣺ڿʹ˿̾ÍÔÚÀûÓôËÓÎÏ·µÄÈȶÈ£¬Íƹã¼ÙÒâΪÊÖ»ú°æValorantµÄ¶ñÒⲡ¶¾£¬²¢ÔÚYouTubeÉÏ´«²¼¸ÃαÔìµÄÓÎÏ·µÄÓÎÍæÂÄÀú£¬ÒÔÓÕʹÓû§ÏÂÔØ¡£Õâ´Î¹¥»÷Óм¸¸ö·ÖÆç°æ±¾µÄαÔìÓÎÏ·£¬µ«ÎÞÂÛÈôºÎ£¬ ÔÚ×°ÖÃÓÎÏ·ºóÓû§³ÇÊб»³Á¶¨Ïòµ½Ú¿Æ­»î¶¯ÍøÕ¾»ò×°ÖÃÆäËû¶ñÒâÀûÓá£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/fake-mobile-game-version-valorant-malware/


6.еĴ¹µö»î¶¯Í¨¹ý¶È·¢Î±ÔìµÄAWS֪ͨ£¬ÇÔÈ¡Óû§Æ¾Ö¤


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Abnormal SecurityµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ÔÚеĴ¹µö»î¶¯ÖУ¬ºÚ¿Í·Ö·¢Î±ÔìµÄAmazon Web Services£¨AWS£©Í¨Öª£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£Abnormal Security°µÊ¾£¬Õâ´Î¹¥»÷»î¶¯Óкܶà·ÖÆçµÄ°æ±¾£¬Éæ¼°·ÖÆçµÄ·¢¼þÈ˵ç×ÓÓʼþ¡¢¿Í»§¶ËºÍÓÐЧ¸ºÔØ£¬µ«ÊÇÓÐÒ»¸ö¹²Í¬µãÊÇ£¬ÕâЩµç×ÓÓʼþÔ´×Ôͳһ¸öÓÉ·¨¹úµÄVPNÍйÜIPµØÖ·¡£ÕâЩ¹¥»÷ÖеÄÿ¸öÓÐЧ¸ºÔØÁ´½Ó¾ù»áÁ´½Óµ½Î±ÔìµÄAWSƾ֤ÇÔÈ¡ÍøÕ¾£¬Ò»µ©Óû§ÊäÈëÁËÆ¾Ö¤£¬¹¥»÷Õß½«»ñµÃ¶ÔÓû§µÄAWSÕË»§µÄ½Ó¼ûȨÏÞ£¬²¢ÇÒÇÔÈ¡ÆäÃô¸ÐÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/