Cyble·¢ÏÖÀûÓÃαÔìµÄPoC¹¥»÷°²È«×êÑÐÈËÔ±µÄ»î¶¯

°ä²¼¹¦·ò 2022-05-25

1¡¢Cyble·¢ÏÖÀûÓÃαÔìµÄPoC¹¥»÷°²È«×êÑÐÈËÔ±µÄ»î¶¯

      

¾ÝýÌå5ÔÂ23ÈÕ±¨Â·£¬Cyble×êÑÐÈËÔ±·¢ÏÖÁËÀûÓÃαÔìµÄWindows¸ÅÏëÖ¤Ã÷(PoC)·ì϶ÀûÓôúÂëÕë¶ÔinfoSecÉçÇøµÄ¶ñÒâÈí¼þ»î¶¯¡£½üÆÚ£¬¹¥»÷ÕßÔÚÓû§¡°rkxxz¡±µÄGitHub´æ´¢¿âÖа䲼ÁËCVE-2022-24500ºÍCVE-2022-26809µÄÁ½¸öPoC¡£×êÑÐÈËÔ±·ÖÎö·¢ÏÖ£¬ÕâÊÇÒ»¸ö¼Ù×°ÀûÓÃIPµØÖ·µÄ.NETÀûÓ÷¨Ê½¡£Í¨¹ý¸øÑù±¾È¥»ìºÏÄܹ»¿´µ½£¬Õâ¸ö¼ÙµÄPoC»áʹÓÃcmd.exeÖ´ÐÐPowerShell£¬À´×°ÖÃÏÖʵµÄpayload£¬¼´Cobalt-Strike Beacon¡£Õâ²¢²»ÊǵÚÒ»´ÎÕë¶Ô°²È«×êÑÐÈËÔ±ºÍÉøÈë²âÊÔÈËÔ±µÄ¹¥»÷¡£


https://securityaffairs.co/wordpress/131553/intelligence/fake-poc-exploits-attacks.html


2¡¢Clearview AI±»Ó¢¹ú¼à¹Ü»ú¹¹·£¿î³¬¹ý750ÍòÓ¢°÷

      

Ó¢¹úµ±¾ÖÔÚ5ÔÂ23ÈÕ°ä·¢¶ÔÃæ²¿¼ø±ð¹«Ë¾Clearview AI´¦ÒÔ³¬¹ý750ÍòÓ¢°÷µÄ·£¿î£¬²¢ºÅÁîÆäÖÕ³¡ÍøÂçÓйØÓ¢¹ú¾ÓÃñµÄÐÅÏ¢²¢É¾³ýÆäÊý¾Ý¿âÖеÄÒÑÓÐÐÅÏ¢¡£Ó¢¹úÐÅϢרԱ°µÊ¾£¬¸Ã¹«Ë¾²»½öÄܹ»¼ø±ð¾ÓÃñ£¬»¹Äܹ»ÓÐЧ¼à¿ØËûÃǵÄÐÐΪ²¢½«Æä×÷ΪóÒ×·þÎñÌṩ£¬ÕâÊDz»³É½ÓÊܵÄ¡£¾ÝϤ£¬¸Ã¹«Ë¾µÄÊý¾Ý¿âÒѶѼ¯Á˳¬¹ý200ÒÚÕÅͼÏñ£¬°Ä´óÀûÑǺͼÓÄôóÒ²ÔÚÈ¥ÄêºÅÁî¸Ã¹«Ë¾É¾³ý¾ÓÃñµÄÐÅÏ¢¡£


https://therecord.media/clearview-ai-ico-fine-uk-data-delete/


3¡¢PyPI°ü¡°ctx¡±ºÍPHP°ü¡°phpass¡±±»½Ù³ÖÒÔÇÔÈ¡AWSÃÜÔ¿

      

¾Ý5ÔÂ24ÈÕ±¨Â·£¬×êÑÐÈËÔ±ÔÚÕë¶Ô¿ªÔ´Éú̬ϵͳµÄÈí¼þ¹©¸øÁ´¹¥»÷ÖУ¬·¢ÏÖÁËÁ½¸öľÂí»¯µÄPyPI°üºÍPHP°ü¡£ÕâÁ½¸ö¶¼ÊǺܳ¤Ò»¶Î¹¦·òδ¸üеÄÈí¼þ°ü£¬ÆäÖÐctx×îºóÒ»´Î¸üÐÂÔÚ2014Äê12ÔÂ19ÈÕ£¬phpass×Ô2012Äê8ÔÂ31ÒÔÀ´Ã»ÓиüС£ÕâЩ¶ñÒâ°æ±¾ÊÔͼ»ñµÃ»·¾³±äÁ¿£¬ÒÔÇÔÈ¡ÑÇÂíÑ·AWSÃÜÔ¿ºÍƾ֤µÈ£¬×îºó·¢Ë͵½ÃûΪ¡°anti-theft-web.herokuapp[.]com¡±µÄHeroku URL¡£5ÔÂ21ÈÕ£¬PyPI°ü¡°ctx¡±ÒÑ´Ó´æ´¢¿âÖÐɾ³ý¡£


https://thehackernews.com/2022/05/pypi-package-ctx-and-php-library-phpass.html


4¡¢µÂ¿ËÈøË¹Öݽ»Í¨²¿TxDOT¹¤×ÊϵͳµÄÃÅ»§ÍøÕ¾±»ºÚ

      

¾Ý5ÔÂ23ÈÕ±¨Â·£¬µÂ¿ËÈøË¹Öݽ»Í¨²¿(TxDOT)Ϊ³Ð°üÉÌÌṩµÄÈÏÖ¤¹¤×ÊϵͳµÄÃÅ»§ÍøÕ¾±»ºÚ¡£ÉÏÖÜÄ©£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳Éϰ䲼Ìû×Ó£¬³ÆÆäÒÑÈëÇÖTxDOT²¢ÇÔȡԱ¹¤Êý¾Ý£¬»¹¹«¿ªÁ˲¿ÃÅÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¡¢µÇ¼ʹ´¦ºÍÍøÖ·ÒÔ¼°³Ð°üÉ̵ÄÏîÄ¿Áбí¡£¾Ý¹¥»÷Õ߳ƣ¬Êý¾ÝºÜ¿ì¾Í»á±»ÏúÊÛ¡£µ«µ±±»Îʵ½ÓÐûÓÐÁªÏµTxDOTÊÔͼÀÕË÷ʱ£¬ËûÃǰµÊ¾²»»áΪÁ˽ðÇ®»òڲƭÀÕË÷¶ø×öÈκÎʼþ£¬ÕâÖ»ÊÇΪÁËÐû´«²¢Åú×¢ËûÃǵݲȫÐԺܲî¡£


https://www.databreaches.net/another-texas-state-agency-data-breach-this-time-its-the-department-of-transportation/


5¡¢Sekoia·¢ÏÖ¶íÂÞ˹TurlaÕë¶Ô±±Ô¼×éÖ¯µÄ¿úËŻ

      

ýÌå5ÔÂ23ÈÕ£¬SekoiaÔÚ½üÆÚ·¢ÏÖÁ˶íÂÞ˹µÄAPT×éÖ¯TurlaÕë¶Ô°ÂµØÀû¾­¼ÃÉ̻ᡢ±±Ô¼µç×Ó½ø½¨Æ½Ì¨ºÍ²¨Â޵ĺ£¹ú·ÀѧԺµÄеÄÒ»ÂÖ¿úËŻ¡£¹¥»÷ÕßʹÓÃÁË·ÂðµÄÓòÃû£¬²¢ÔÚÆäÖÐÍйÜÁËÃûΪ¡°War Bulletin 19.00 CET 27.04.docx¡±µÄ¶ñÒâ Word Îĵµ£¬´ËÎļþÔ̺¬Ò»¸öǶÈëµÄPNG(logo.png)¡£ÓÉÓÚWordÎļþ²»Ô̺¬ÈκζñÒâÐÐΪ£¬×êÑÐÈËÔ±ÒÔΪPNG±»ÓÃÓÚÖ´ÐпúËÅ¡£´Ë±í£¬Turla»¹½Ó¼ûÖ¸±êµÄIPµØÖ·£¬ÕâÓÐÖúÓÚºóÐøµÄ¹¥»÷½×¶Î¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-perform-reconnaissance-against-austria-estonia/


6¡¢Î¢Èí°ä²¼¹ØÓÚweb skimming»î¶¯±ä¶¯Ç÷ÏòµÄ»ã±¨

      

5ÔÂ23ÈÕ£¬Î¢Èí°ä²¼»ã±¨³Æ£¬½üÆÚµÄweb skimming»î¶¯´Ë¿ÌѡȡÁ˶àÖÖ»ìºÏ¼¼ÊõÀ´´«µÝºÍ°µ²Ø¶ñÒâ¾ç±¾¡£ÕâÓëÆð³õ¹¥»÷Õßͨ¹ý·ì϶ÀûÓý«¶ñÒâ¾ç±¾×¢ÈëµçÉÌÆ½Ì¨ºÍCMSµÄÕ½Êõ·ÖÆç£¬´ËÖÖÍþв¸üÈÝÒ×ÈÆ¹ý´«Í³°²È«½â¾ö¹æ»®¡£ÔÚÒ»¸ö»î¶¯ÖУ¬¹¥»÷Õßͨ¹ýÓÃPHP±àÂëÀ´»ìºÏ¾ç±¾£¬¶øPHPÓÖ±»Ç¶Èëµ½Ò»¸öͼÏñÎļþÖУ»»¹ÓлÔÚÍøÂçÀûÓÃÖÐ×¢Èë¶ñÒâµÄJavaScript£¬½«Æä¼Ù×°³ÉGoogle AnalyticsºÍMeta Pixel¾ç±¾¡£¸Ã»ã±¨ÏêÊöÁ˽üÆÚ»î¶¯ÖлìºÏ¼¼ÊõµÄϸ½Ú£¬²¢Îª·ÀÓùÕßÌṩÁËÕмܴËÀ๥»÷µÄ²½Öè¡£


https://www.microsoft.com/security/blog/2022/05/23/beneath-the-surface-uncovering-the-shift-in-web-skimming/