ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß

°ä²¼¹¦·ò 2023-05-31

1¡¢ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß


¾ÝýÌå5ÔÂ29ÈÕ±¨Â· £¬±±ÃÀÑÀ¿Æ±£ÏÕÌṩÉÌMCNA DentalÔâµ½LockbitµÄÀÕË÷¹¥»÷ £¬Ó°ÏìÁË8923662Ãû»¼Õß¡£¸Ã¹«Ë¾ÔÚ3ÔÂ6ÈÕÒâʶµ½ÆäϵͳÔâµ½ÁËδ¾­ÊÚȨ½Ó¼û £¬µ÷²éÏÔʾºÚ¿ÍÓÚ2ÔÂ26ÈÕ³õ´Î»ñµÃÁËMCNAÍøÂçµÄ½Ó¼ûȨÏÞ¡£LockBitÐû³ÆÔÚ3ÔÂ7ÈÕ¹¥»÷ÁËMCNA²¢¹«¿ªÁ˵ÚÒ»ÅúÊý¾ÝÑù±¾ £¬»¹°µÊ¾ÈôÊÇMCNA²»½»1000ÍòÃÀÔªµÄÊê½ð £¬¾Í¹«¿ªÆä700 GBµÄ»úÃÜÐÅÏ¢¡£4ÔÂ7ÈÕ £¬LockBitÔÚÆäÍøÕ¾Éϰ䲼ÁËËùº±¼û¾Ý £¬ÈκÎÈ˶¼Äܹ»ÏÂÔØ¡£


https://securityaffairs.com/146804/data-breach/mcna-data-breach.html


2¡¢WordPressÔÚ½ü500Íò¸öÍøÕ¾×Ô¶¯×°Öòå¼þJetpackµÄ²¹¶¡


 ¾Ý5ÔÂ30ÈÕ±¨Â· £¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÊý°ÙÍò¸öÍøÕ¾ÉÏÇ¿Ôì×°ÖÃÁ˰²È«²¹¶¡ £¬ÒÔ½¨¸´²å¼þJetpackÖеÄÒ»¸ö·ì϶¡£×êÑÐÈËÔ±³Æ £¬ÔÚÄÚ²¿°²È«Éó¼ÆÆÚ¼ä·¢ÏÖJetpackµÄAPI´æÔÚ·ì϶ £¬ÍøÕ¾µÄ¿ª·¢ÕßÄܹ»Ê¹Óô˷ì϶À´½ÚÔìWordPress×°ÖÃÖеÄËÁÒâÎļþ¡£Jetpack´Ë¿ÌÆðÍ·×Ô¶¯ÏòËùÓÐʹÓøòå¼þµÄÍøÕ¾ÍÆËͰ²È«²¹¶¡ £¬Ä¿Ç°ÒÑÔÚ³¬¹ý413Íò¸öÍøÕ¾ÉϽøÐÐÁË×°Öá£AutomatticÒÑÂÅ´ÎʹÓÃÕâÖÖ×Ô¶¯¸üеķ½Ê½²¿Êð²¹¶¡¡£


https://www.bleepingcomputer.com/news/security/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites/


3¡¢×êÑÐÈËÔ±·¢ÏÖ±©Á¦ÆÆ½âÊÖ»úÖ¸ÎÆµÄ¹¥»÷·½Ê½BrutePrint


ýÌå5ÔÂ29ÈÕ³Æ £¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪBrutePrintµÄ¹¥»÷·½Ê½ £¬Äܹ»Í¨¹ý±©Á¦ÆÆ½âÖÇÄÜÊÖ»úÉϵÄÖ¸ÎÆÀ´ÈƹýÓû§Éí·ÝÑéÖ¤¡£¸Ã¹¥»÷¼¼ÊõÀûÓÃÁËÖÇÄÜÊÖ»úÖ¸ÎÆÈÏÖ¤(SFA)¿ò¼ÜÖеÄÁ½¸öÁãÈÕ·ì϶ £¬Cancel-After-Match-Fail(CAMF)ºÍMatch-After-Lock(MAL)¡£ÕâÁ½¸ö·ì϶ÀûÓÃÁËÈÏÖ¤¿ò¼ÜÖеÄÂß¼­·ì϶ £¬Ô´ÓÚ¶ÔÖ¸ÎÆ´«¸ÐÆ÷µÄ´®ÐбíÉè½Ó¿Ú£¨SPI£©ÉϵÄÖ¸ÎÆÊý¾Ý±£»¤²»Á¦¡£


https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html


4¡¢Jimbos ProtocolÔâµ½ÉÁµç´û¹¥»÷Ëðʧ³¬¹ý750ÍòÃÀÔª


5ÔÂ29ÈÕ±¨Â·³Æ £¬»ùÓÚArbitrumµÄDeFiÏîÄ¿Jimbos ProtocolÔâµ½ÁËÉÁµç´û¹¥»÷ £¬Ëðʧ³¬¹ý7500000ÃÀÔª¡£¹¥»÷²úÉúÔÚ¸ÃÆ½Ì¨Æô¶¯ÆäV2ºÍ̸µÄÈýÌìºó £¬ÆäʱºÜ¶àÈ˸ոÕͶ×Êjimbo´ú±Ò £¬¹¥»÷ÕßÉè·¨ÇÔÈ¡ÁË4090¸öETH´ú±Ò¡£×êÑÐÈËÔ±³Æ £¬Õâ´Î¹¥»÷ÀûÓÃÁËÒ»¸öÓëÁ÷¶¯ÐÔת»»²»×㻬µã½ÚÔìÓйصķì϶¡£ÔÚ±»ÈëÇÖÖ®ºó £¬jimboµÄ¼ÛֵѸ¿ì±©µø £¬´Ó0.238ÃÀÔªµøÖÁ0.0001ÃÀÔª¡£Jimbos ProtocolÒÑÏò¹¥»÷Õß·¢³öÐÅÏ¢ £¬ÒªÇóËûÃÇËÍ»¹90%µÄ±»µÁ×ʽ𠣬ÒÔ»»È¡²»ºÏÆäÌáÆð˾·¨ËßËϵijÐŵ¡£


https://www.bleepingcomputer.com/news/security/flash-loan-attack-on-jimbos-protocol-steals-over-75-million/


5¡¢AndroidľÂíDogeRAT¼Ù×°³ÉÊ¢ÐÐÀûÓÃÕë¶ÔÓ¡¶È¶à¸öÐÐÒµ


5ÔÂ29ÈÕ £¬CloudSEKÅû¶ÁËAndroid¶ñÒâÈí¼þDogeRATÕë¶ÔÓ¡¶È¶à¸öÐÐÒµµÄ¹¥»÷»î¶¯ £¬ÓÈÆäÊÇÒøÐÐÒµºÍÓéÀÖÒµ¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉOpera Mini¡¢OpenAI ChatGOT¡¢YouTube¡¢NetflixºÍInstagramµÄµÈºÏ·¨ÀûÓà £¬Í¨¹ýÉ罻ýÌåºÍÐÂÎÅÆ½Ì¨½øÐзַ¢¡£×°Öúó £¬Ëü»á´ÓÖ¸±êÉ豸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢ £¬ÀýÈçÁªÏµÈË¡¢ÐÂÎźÍÒøÐÐÆ¾Ö¤¡£»¹¿ÉÓÃÓÚ½ÚÔìÖ¸±êÉ豸ִÐжñÒâ»î¶¯ £¬Èç·¢ËÍÀ¬»øÓʼþ¡¢½øÐÐδ¾­ÊÚȨµÄÖ§¸¶¡¢Åú¸ÄÎļþºÍ²é¿´Í¨»°¼Í¼ £¬ÉõÖÁÄܹ»Í¨¹ýÉ豸µÄÉãÏñÍ·Ô¶³ÌÅÄÕÕ¡£


https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries


6¡¢JPCERTÌáÐÑÐÂÐÍľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯


JPCERTЭµ÷ÖÐÐÄÔÚ5ÔÂ29ÈÕ°ä²¼¹«¸æ £¬ÌáÐÑÐÂÐÍGolangľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯¡£¹¥»÷²úÉúÔÚ2ÔÂ×óÓÒ £¬¹¥»÷ÕßÊ×ÏÈÕë¶ÔÒ»¸öWEBUI¶Ô±íÊ¢¿ªµÄ·ÓÉÆ÷ £¬ÀûÓÃÁË·ì϶ִÐнÅÕý±¾×°ÖÃGobRAT¡£¹¥»÷ÕßÔÚÈëÇÖ¶³öµÄ·ÓÉÆ÷ºó £¬»á×°ÖÃÒ»¸ö¼ÓÔØ·¨Ê½¾ç±¾ £¬³äÈν»¸¶GobRATµÄ¹Ü· £¬¸Ã¾ç±¾ÔÚÆô¶¯Ê±¼Ù×°³ÉApacheÊØ»¤¹ý³Ì(apached)À´Èƹý¼ì²â¡£´Ë±í £¬GobRATͨ¹ý´«Êä²ã°²È«(TLS)ºÍ̸ÓëÔ¶³Ì·þÎñÆ÷ͨѶ £¬À´½Ó¹Ü¶à´ï22ÖÖ·ÖÆçµÄ¼ÓÃܺÅÁî¡£


https://thehackernews.com/2023/05/new-gobrat-remote-access-trojan.html