ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖÃÃýÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶
°ä²¼¹¦·ò 2023-02-281¡¢ÃÀ¹ú¹ú·À²¿·þÎñÆ÷ÅäÖÃÃýÎóÔ¼3TBÄÚ²¿µç×ÓÓʼþй¶
¾ÝýÌå2ÔÂ23ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÃÀ¹ú¹ú·À²¿Ò»¸öÅäÖÃÃýÎóµÄ·þÎñÆ÷¡£Â¶³öµÄ·þÎñÆ÷ÍйÜÔÚ΢ÈíµÄAzureÔÆÉÏ£¬¹©¹ú·À²¿¿Í»§Ê¹Óá£ËüÊÇÄÚ²¿ÓÊÏäϵͳµÄÒ»²¿ÃÅ£¬´æ´¢ÁËÔ¼3TB µÄÄÚ²¿µç×ÓÓʼþ£¬ÆäÖкܶàÉæ¼°ÃÀ¹úÌØÖÖ×÷ս˾Á»òUSSOCOM¡£¸ÃÅäÖÃÃýÎóµÄ·þÎñÆ÷ûÓÐÃÜÂ룬ÈκÎÈË¿Éͨ¹ýä¯ÀÀÆ÷½Ó¼ûÓÊÏäÊý¾Ý£¬Ö»Ðè֪·ÆäIPµØÖ·¼´¿É¡£¸Ã·þÎñÆ÷ÓÚ2ÔÂ8ÈÕ³õ´Î±»·¢ÏÖ£¬Ä¿Ç°Òѱ»±£»¤ÆðÀ´¡£
https://www.theregister.com/2023/02/23/azure_dod_emails_exposed/
2¡¢LastPass³ÆDevOps¹¤³ÌʦµÄ¼ÒÓõçÄÔ±»Ö²Èë¶ñÒâÈí¼þ
2ÔÂ27ÈÕ±¨Â·£¬ÃÜÂëÖÎÀíÈí¼þ¹«Ë¾LastPass³ÆºÚ¿ÍÔÚµÚ¶þ´Î¹¥»÷ÖÐÈëÇÖÁËDevOps¹¤³ÌʦµÄÓ×ÎÒ¼ÒÓÃÍÆËã»ú¡£µÚ¶þ´Î¹¥»÷µÄ¹¦·ò¿ç¶È´Ó2022Äê8ÔÂ12ÈÕµ½10ÔÂ26ÈÕ£¬¹¥»÷ÕßѸ¿ìµØÀûÓÃÁ˵ÚÒ»´ÎÊÂÎñÖÐй¶µÄÐÅÏ¢£¬ÔÚLastPassÍŶÓʵÏÖ³ÁÖÃ֮ǰ´ÓÔÆ´æ´¢×ÊÔ´ÖÐÇÔÈ¡Êý¾Ý¡£È¡Ö¤·¢ÏÖ£¬Ò»ÃûDevOps¹¤³ÌʦµÄ¼ÒÍ¥µçÄÔ±»ÈëÇÖ£¬¹¥»÷ÕßÀûÓõÚÈý·½Ã½ÌåÈí¼þ°üÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¬ÔÚ¸ÃÔ±¹¤µÄÓ×ÎÒµçÄÔÉÏÖ²ÈëÁ˼üÅ̼ͼ¶ñÒâÈí¼þ£¬²¢²¶»ñÁËËûµÄÖ÷ÃÜÂë¡£
https://www.securityweek.com/lastpass-says-devops-engineer-home-computer-hacked/
3¡¢News Corpй©ºÚ¿ÍÁ½Äêǰ¾ÍÒÑ»ñµÃÆäϵͳµÄ½Ó¼ûȨ
¾Ý2ÔÂ24ÈÕ±¨Â·£¬¹«¹²´«Ã½ºÍ³ö°æ¹«Ë¾News Corpй©£¬ºÚ¿ÍÔÚÁ½Äêǰ³õ´Î»ñµÃÁËÆäϵͳµÄ½Ó¼ûȨÏÞ¡£¾Ýµ÷²é£¬ÔÚ2020Äê2ÔÂÖÁ2022Äê1Ô£¬Î´¾ÊÚȨµÄµÚÈý·½´Ó±»Ó°ÏìϵͳµÄÔ±¹¤ÕË»§ÖлñÈ¡Á˲¿ÃÅóÒ×ÎļþºÍµç×ÓÓʼþ£¬ÆäÖÐһЩÔ̺¬Ó×ÎÒÐÅÏ¢£¬ÈçÀ¨ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ¡£Õâ´ÎÊÂÎñÓ°ÏìÁ˸ù«Ë¾µÄ´ó²¿ÃÅÒµÎñ£¬Ô̺¬¡¶»ª¶û½ÖÈÕ±¨¡·ºÍ¡¶Å¦Ô¼Óʱ¨¡·µÈ¡£
https://www.bleepingcomputer.com/news/security/news-corp-says-state-hackers-were-on-its-network-for-two-years/
4¡¢JamfÅû¶ÀûÓõÁ°æÀûÓÃÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯
JamfÔÚ2ÔÂ23ÈÕÅû¶ÁËÕë¶ÔmacOSµÄ¶ñÒâÍÚ¿ó»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËľÂí»¯AppleÊÓÆµ±à×ëÈí¼þFinal Cut Pro£¬À´·Ö·¢XMRigÍÚ¿ó·¨Ê½¡£×êÑÐÈËÔ±Éî¿Ì·ÖÎöºó·¢ÏÖ£¬¸Ã¶ñÒâÈí¼þ¾ÀúÁËÈý¸öÖØÒªµÄ·¢Õ¹½×¶Î£¬Ã¿¸ö½×¶Î¶¼Ôö³¤Á˸ü¸´ÔÓµÄÈÆ¹ý¼¼Êõ¡£´ÓµÚÒ»´úÆðÍ·£¬¸Ã¶ñÒâÈí¼þ¾ÍʹÓÃi2pÍøÂç²ã½øÐÐC2ͨѶÒÔÄäÃû»¯Á÷Á¿£»µÚ¶þ´úÔÚ2021Äê4ÔÂÖÁ10Ô³öÏÖ£¬¶Ô°µ²ØÔÚÀûÓ÷¨Ê½°üÖеĿÉÖ´ÐÐÎļþ½øÐÐbase 64±àÂ룻µÚÈý´ú³öÏÖÓÚ2021Äê10Ô£¬ËüÄܹ»ÔÚSpotlight´ó½«Æä¶ñÒâ¹ý³Ì¼Ù×°³Éϵͳ¹ý³ÌÀ´Èƹý¼ì²â¡£
https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/
5¡¢ºÚ¿ÍÍÅ»ïCH01Ðû³ÆÆäÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾
ýÌå2ÔÂ26Èճƣ¬ºÚ¿ÍÍÅ»ïCH01ÒÑÈëÇÖÖÁÉÙ32¸ö¶íÂÞ˹µÄÍøÕ¾£¬¶øAnonymousҲͨ¹ýÆäTwitter·ÖÏíÁËÕâÒ»ÐÂÎÅ¡£¹¥»÷²úÉúÔÚÎÚ¿ËÀ¼Õ½ÕùµÄÖÜÄêÁôÏëÈÕ£¬Ä¿Ç°Éв»Ã÷ÏÔ±»¹¥»÷ÍøÕ¾¼òÖ±ÇÐÊýÁ¿£¬ÒÔ¼°ºÚ¿ÍÊÇÈôºÎ¹¥»÷µÄ¡£´Ë±í£¬AnonymousÔÚ2ÔÂ23ÈÕ»¹ÈëÇÖÁ˶íÂÞ˹µÄ¶à¸ö¹ã²¥µç̨£¬Ô̺¬Yumor FM¡¢Relax FM¡¢Comedy Radio¡¢Humor FMºÍAvatoradio£¬²¢°ä²¼¼ÙµÄ¿ÕÏ®¾¯±¨¡£
https://securityaffairs.com/142713/hacktivism/ch01-defaced-russian-websites.html
6¡¢Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÆä¼Ó¹¤³§ÁÙʱ¹Ø¹Ø
ýÌå2ÔÂ26Èճƣ¬Ê³Æ·¹«Ë¾¶¼ÀÖÔâµ½ÁËÀÕË÷¹¥»÷¡£¶¼ÀÖÊÇÊÀ½çÉÏ×î´óµÄË®¹ûºÍÊ߲˳ö²úÉÌÖ®Ò»£¬ÔÚÈ«Çò75¸ö¹ú¶È/µØÓò¹©¸øÔ¼300ÖÖ²úÆ·£¬2021ÄêµÄÊÕÈëΪ65ÒÚÃÀÔª¡£¸Ã¹«Ë¾³ÆÆäÔâµ½ÀÕË÷¹¥»÷Õý³£ÔËÓªÊܵ½Ó°Ï죬µ«ÊÇûÓÐÌṩÓйع¥»÷µÄ¾ßÌåÐÅÏ¢¡£·¢Ë͸øÉ̵êµÄ±ã¼ãÌáµ½£¬¸Ã¹«Ë¾±»ÆÈ¹Ø¹ØÆäÔÚ±±ÃÀµÄϵͳÒÔ¶ôÔì¹¥»÷¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÊÇ·ñÒÑ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÊý¾Ý¡£
https://securityaffairs.com/142726/cyber-crime/dole-food-company-ransomware-attack.html


¾©¹«Íø°²±¸11010802024551ºÅ