×êÑÐÍŶӷ¢ÏÖ¡®keep¡®µÈPyPI°üÖдæÔÚÇÔÈ¡ÃÜÂëµÄľÂí
°ä²¼¹¦·ò 2022-06-141¡¢×êÑÐÍŶӷ¢ÏÖ'keep'µÈPyPI°üÖдæÔÚÇÔÈ¡ÃÜÂëµÄľÂí
¾ÝýÌå6ÔÂ12ÈÕ±¨Â·£¬×êÑÐÍŶÓÔÚPyPI°ü¡°keep¡±¡¢¡°pyanxdns¡±ºÍ¡°api-res-py¡±Öз¢ÏÖÁ˺óÃÅ£¬ËüÃǶ¼Ê¹ÓÃÁ˶ñÒâÒÀÀµÏî¡°request¡±¡£³ö¸ñÊÇ¡°keep¡±°ü£¬Ã¿ÖܵÄÏÂÔØÁ¿¸ß´ï8000ÂŴΡ£ÆäÖдó²¿ÃŰ汾µÄ¡°keep¡±Ê¹ÓÃÁ˺Ϸ¨µÄPythonÄ£¿é¡°requests¡±£¬µ«¡°keep¡±v.1.2ʹÓÃÁËÆ´Ð´ÃýÎóµÄ¡°request¡±¡£¾·ÖÎö£¬¶ñÒâµÄ¡°request¡±ÖÐÔ̺¬Á½¸öURL£¬ÆäÖÐÒ»¸öÖ¸ÏòÌṩRATµÄ¶ñÒâÈí¼þcheck.so£¬¶øÁíÒ»¸öÔòÖ¸Ïòx.pyx£¬Ô̺¬¿ÉÇÔÈ¡ä¯ÀÀÆ÷ÖеǼÃûºÍÃÜÂëµÄ¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/
2¡¢Îڸɴï֤ȯÂòÂôËù£¨USE£©Ð¹Â¶³¬¹ý32 GBµÄÓû§ÐÅÏ¢
¾Ý6ÔÂ13ÈÕ±¨Â·£¬ AnuragÔÚɨÃèShodanÉÏÅäÖÃÃýÎóµÄÊý¾Ý¿â£¬·¢ÏÖÁËһ̨¶³öµÄ·þÎñÆ÷Ô̺¬³¬¹ý32GBµÄÊý¾Ý¡£¾·ÖÎö£¬¸Ã·þÎñÆ÷ÊôÓÚÎڸɴï֤ȯÂòÂôËù£¨USE£©µÄEasy Portal£¬ÕâÊÇÒ»¸öÔÚÏß·þÎñÃÅ»§£¬Óû§¿Éͨ¹ýÆä²é¿´¹ÉƱ¡¢±¨±íºÍ¼à¿ØÕË»§Óà¶î¡£Õâ´Îй¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢Óû§Ãû¡¢µØÖ·¡¢½Ó¼ûÁîÅÆ¡¢µç»°ºÅÂë¡¢Ã÷ÎÄÃÜÂëºÍÒøÐоßÌåÐÅÏ¢µÈ¡£Îڸɴﵱ¾ÖÒ»Ïòδ¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬µ«6ÔÂ12ÈÕ£¬Â¶³öµÄÊý¾Ý´Ó32 GBÏ÷¼õµ½ÁËMBs¡£
https://www.hackread.com/scoop-uganda-security-exchange-leaking-sensitive-records/
3¡¢×êÑÐÈËÔ±½ÒʾÈôºÎ¶ÔÀ¶ÑÀÐźŽøÐÐÖ¸ÎÆ¼ø±ðÀ´¸ú×ÙÊÖ»ú
ýÌå6ÔÂ10Èճƣ¬¼ÓÀû¸£ÄáÑÇ´óѧʥµØÑǸç·ÖУµÄ½øÐеÄÒ»ÏîÐÂ×êÑгõ´Î½ÒʾÁËÀ¶ÑÀÐźÅÄܹ»±»Ö¸ÎƼø±ðÒÔ¸ú×ÙÖÇÄÜÊÖ»ú¡£¸Ã²½ÖèµÄÖ÷ÌâÀûÓÃÀ¶ÑÀоƬ×éÓ²¼þµÄ·ì϶£¬´Ó¶ø²úÉú¡°¹ÖÒìµÄÎïÀí²ãÖ¸ÎÆ¡±¡£ÓÉÓÚÀ¶ÑÀµÍ¹¦ºÄ(BLE)ÐűêÎÞ´¦²»ÔÚ£¬ÏÖ´úÉ豸²»ÐÝ´«ÊäÕâЩÐűêÀ´ÆôÓùؼüÖ°ÄÜ£¬Ê¹µÃ¹¥»÷³ÉΪ¿ÉÄÜ¡£ÁíÒ»·½Ã棬Ӳ¼þÖеķì϶ԴÓÚWiFiºÍµÍ¹¦ºÄÀ¶ÑÀ×é¼þͨ³£¼¯³ÉÔÚһ·£¬Äܹ»Í¨¹ýÔØ²¨ÆµÂÊÆ«ÒƺÍIQÎÞÏßµçÐźŲ»Æ½ºâÀ´ÌìÉú¼ø±ðÖ¸ÎÆ¡£´Ë±í£¬ÒªÖ´ÐÐÎïÀí²ãÖ¸ÎÆ¹¥»÷£¬±ØÐ뽨Éè»ùÓÚÈí¼þµÄÎÞÏßµçÐá̽Æ÷£¬ÕâÊÇÒ»ÖÖ¿ÉÄܼͼÔʼIQÎÞÏßµçÐźŵÄÎÞÏßµç½Ó¹ÜÆ÷¡£
https://thehackernews.com/2022/06/researchers-find-bluetooth-signals-can.html
4¡¢MyEasyDocsÒò·þÎñÆ÷ÅäÖÃÃýÎóй¶³¬¹ý30 GBµÄÊý¾Ý
6ÔÂ9ÈÕ£¬vpnMentor³ÆÓ¡¶ÈMyEasyDocsµÄMicrosoft Azure·þÎñÆ÷ÅäÖÃÃýÎó£¬Ð¹Â¶30.5 GBµÄÊý¾Ý¡£ÕâÊÇÒ»¸öÔÚÏßÎĵµÑé֤ƽ̨£¬ÖØÒªÓÃÓÚÑéÖ¤ÓëÒøÐÓעѧԺ¡¢´óѧ¡¢µ±¾Ö»ú¹¹ºÍ·¨ÂÉ»ú¹¹ÓйصÄÎļþ¡£Õâ´Îй¶ÁËÀ´×ÔÓ¡¶ÈºÍÒÔÉ«ÁеÄ57000¶à¸öѧÉúµÄÓ×ÎÒÐÅÏ¢ºÍ½ÌÓý¼Í¼£¬Ô̺¬ÐÕÃû¡¢³É¾Í¡¢Éí·ÝÖ¤ºÍ´óѧע²áºÅµÈ¡£Â¶³öµÄ·þÎñÆ÷ÓÚ2022Äê2ÔÂ2ÈÕ³õ´Î±»·¢ÏÖ£¬ÓÚ2ÔÂ14ÈÕ±»±£»¤ÆðÀ´£¬ÊÂÎñµÄϸ½ÚÐÅÏ¢Ö±µ½6ÔÂ9Èղű»Åû¶¡£
https://www.hackread.com/myeasydocs-exposed-30gb-israel-india-students-pii-data/
5¡¢ÐµÄWannaFriendMeͨ¹ýÓÎϷƽ̨RobuxÏúÊÛÆä½âÃÜ·¨Ê½
6ÔÂ9ÈÕ£¬MalwareHunterTeamµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪ¡°WannaFriendMe¡±µÄÐÂÀÕË÷Èí¼þ¡£Ëü·ÂÕÕÁËRyuk£¬µ«ÏÖʵÉÏÊÇChaosµÄ±äÖÖ¡£ÆäÒìºõѰ³£Ö®´¦ÔÚÓÚ£¬ÒªÇóÖ¸±êʹÓÃRobux´ÓRobloxµÄGame PassÉ̵ê²É°ì½âÃÜÆ÷£¬¶ø²»ÊÇʹÓüÓÃÜÇ®±Ò×÷ΪÊê½ð¡£½Ó¼ûRoblox Game PassÉ̵êµÄURLʱ£¬¾ÍÄܹ»¿´µ½ÃûΪ¡°iRazormind¡±µÄÓû§ÔÚÒÔ1499 RobuxµÄ¼ÛÖµÏúÊÛ¡°Ryuk Decrypter¡±£¬×îºóÒ»´Î¸üÐÂÊÇÔÚ6ÔÂ5ÈÕ¡£µ«ÈκδóÓÚ2MBµÄÎļþ¶¼½«±»Ëæ»úÊý¾Ý¸²¸Ç£¬ÕâÒâζ׿´±ãÖ¸±ê²É°ìÏàʼûÜÆ÷£¬Ò²Ö»Äܸ´ÔÓ×ÓÚ2MBµÄÎļþ¡£Ä¿Ç°£¬RobloxÒÑɾ³ýÁËÓйØÕÊ»§¡£
https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/
6¡¢Proofpoint°ä²¼2022Äê¼ÓÃÜÇ®±Ò¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
ProofpointÔÚ6ÔÂ9ÈÕ°ä²¼Á˹ØÓÚ2022Äê¼ÓÃÜÇ®±Ò¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬Õë¶Ô¼ÓÃÜÇ®±ÒµÄ´¹µö¹¥»÷ƾ¾Ý¸ù»ùµÀÀíÄܹ»´óÌå·ÖΪÈýÀࣺ¼ÓÃÜÇ®±ÒÆ¾Ö¤ÍøÂç¡¢¼ÓÃÜÇ®±ÒתÕËÒªÇóºÍÕë¶Ô¼ÓÃÜÇ®±ÒµÄÉÌÆ·ÇÔÈ¡¡£Í¨¹ý´¹µö»î¶¯½øÐеÄÁíÒ»ÖÖ·¸×ï´ó¾ÖÊÇBEC¹¥»÷£¬2022ÄêProofpoint»á¶¨ÆÚ¹Û²ìBEC³¢ÊÔÖеļÓÃÜÇ®±Ò×ªÒÆ£¬°µÊ¾ÈôÊÇûÓмÓÃÜÇ®±Ò£¬BEC·ÖÀàÖеÄÀÕË÷²¿ÃŲ»»áÏñ½ñÌìÕâÑù³É¹¦¡£Proofpoint¾ùÔÈÿÌì»á×èÖ¹100Íò·âÀÕË÷Óʼþ£¬×î¸ßʱ¿É´ïÿÌì½ü200Íò·â£¬´óÎÞÊýÒªÇóÖ¸±êÓüÓÃÜÇ®±Ò¸¶¿î¡£
https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency


¾©¹«Íø°²±¸11010802024551ºÅ