Atomic WalletÔâµ½ºÚ¿Í¹¥»÷Ëðʧ³¬¹ý3500ÍòÃÀÔª
°ä²¼¹¦·ò 2023-06-061¡¢Atomic WalletÔâµ½ºÚ¿Í¹¥»÷Ëðʧ³¬¹ý3500ÍòÃÀÔª
¾ÝýÌå6ÔÂ4ÈÕ±¨Â·£¬Atomic WalletÔâµ½¹¥»÷£¬³¬¹ý3500ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ÕâÊÇÒ»¿îÒÆ¶¯ºÍ×ÀÃæ¼ÓÃÜÇ®°ü£¬¿É´æ´¢¸÷Àà¼ÓÃÜÇ®±Ò¡£6ÔÂ3ÈÕ£¬¸Ã¹«Ë¾ÔÚTwitter°µÊ¾ÊÕµ½ÁËÓйØÇ®°ü±»ºÚµÄ»ã±¨£¬²¢ÒÑÆðÍ·µ÷²é´ËÎÊÌ⡣Ŀǰ£¬¸ÃÍŶÓÔÚ×êÑпÉÄܵĹ¥»÷ý½é£¬²¢ÍøÂç¹ØÓÚ±»¹¥»÷Ö¸±êµÄÐÅÏ¢¡£¿ª·¢ÈËÔ±Ò²¹Ø¹ØÁËÏÂÔØ·þÎñÆ÷get.atomicwallet.io£¬ÒÔÔ¤·À½øÒ»²½µÄ´«²¼¡£°²È«¹«Ë¾Tay³Æ±»µÁ×ʲú×îÔçÂòÂô¹¦·òÊÇ6ÔÂ2ÈÕ21:45 UTC¡£
https://www.bleepingcomputer.com/news/security/atomic-wallet-hacks-lead-to-over-35-million-in-crypto-stolen/
2¡¢Ó¢¹úº½¿Õ¡¢BBCºÍBootsµÈ¹«Ë¾Ôâµ½¹¥»÷Êý¾Ýй¶
¾Ý6ÔÂ5ÈÕ±¨Â·£¬Ó¢¹úº½¿Õ¹«Ë¾(BA)¡¢Ó¢¹ú¹ã²¥¹«Ë¾(BBC)ºÍBootsµÈ³ÛÃû¹«Ë¾Ôâµ½¹¥»÷£¬Ô±¹¤µÄÓ×ÎÒÐÅÏ¢¿ÉÄÜй¶¡£BA³ÆÆä¹¤×ʵ¥ÌṩÉÌZellisÔâµ½¹¥»÷£¬Ô´ÓÚÆäʹÓõĵÄÈí¼þMOVEit£¬µ¼ÖÂÔ¼34000ÃûÔ±¹¤µÄÐÅϢй¶¡£ÓëZellisºÏ×÷µÄÆäËü¹«Ë¾Ò²Ôâµ½Á˹¥»÷£¬Ô̺¬Ó¢¹ú³ÛÃûÁ¬ËøÒ©µêBoots£¬Ð¹Â©Æä²¿ÃÅÔ±¹¤µÄÊý¾Ý¿ÉÄÜй¶¡£´Ë±í£¬¹ã²¥¹«Ë¾BBCҲȷÈÏÁËÕâ´ÎÎ¥¹æÊÂÎñ¡£Î¢Èí½«¶ÔMOVEitµÄ¹¥»÷¹éÒòÓÚÒ»¸öÃûΪLace TempestµÄÍŻ
https://www.theguardian.com/technology/2023/jun/05/ba-boots-and-bbc-staff-details-targeted-in-russian-linked-cyber-attack
3¡¢IT¹«Ë¾XplainÔâµ½¹¥»÷Ó°ÏìÈðÊ¿µÄ²¿Ãžü¶ÓºÍ¾¯¾Ö
6ÔÂ4ÈÕ±¨Â·³Æ£¬IT¹«Ë¾XplainÔâµ½¹¥»÷£¬Ó°ÏìÁËÈðÊ¿¼¸¸öÖݵľ¯Ô±¡¢¾ü¶Ó¡¢º£¹ØºÍÁª¹ú¾¯Ô±¾ÖµÈ¡£ÀÕË÷ÍÅ»ïPlayÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢°ä²¼Á˾ݳÆÀ´×ÔÁª¹ú¾¯Ô±¾Ö(Fedpol)ºÍÁª¹úº£¹ØÓë±ßÚﰲȫ¾Ö(FOCBS)µÄÊý¾Ý¡£±¾µØÃ½Ì峯£¬¹¥»÷ÕßÀûÓÃÁ˸ÃIT¹«Ë¾·þÎñÆ÷ÉϵÄÒ»¸ö·ì϶¡£FedpolºÍFOCBS֤ʵÁËÕâ´Î¹¥»÷£¬µ«ÊÔͼµ»¯ÕâÒ»ÊÂÎñ¡£Fedpol³Æ¹¥»÷ÕßÖ»ÄܽӼûÓÃÓÚ²âÊԵķÂÕÕÊý¾Ý£¬FOCBS˵±»µÁÊý¾ÝÀ´×ÔÓëÆä¿Í»§µÄͨѶ¡£
https://securityaffairs.com/147047/data-breach/fedpol-swiss-police-cyber-attack.html
4¡¢VMware³Æ½üÆÚµÄTrueBot»î¶¯ÀûÓÃNetwrix·ì϶À´·Ö·¢
6ÔÂ1ÈÕ£¬VMwareй©´Ó5ÔÂÆðÍ··¢ÏÖTrueBot»î¶¯¼¤Ôö¡£TrueBotÖÁÉÙ´Ó2017ÄêÆðÍ·»îÔ¾£¬ÒÔʹÓöñÒâÓʼþ·Ö·¢¶øÎÅÃû£¬µ«×î½ü±»·¢ÏÖʹÓÃÁËNetwrix auditor·ì϶£¨CVE-2022-31199£©ÒÔ¼°Raspberry RobinÖеÄÒ»¸ö·ì϶×÷ÎªÏ°È¾ÔØÌå¡£¹¥»÷Á´Ê¼ÓÚ´ÓChromeÏÂÔØ¿ÉÖ´ÐÐÎļþupdate.exe¡£ÔËÐкó£¬Ëü»á¼ìË÷²¢ÏÂÔØµÚ¶þ½×¶Î¿ÉÖ´ÐÐÎļþ3ujwy2rz7v.exe£¬ÓÉcmd.exeÆô¶¯¡£¿ÉÖ´ÐÐÎļþÏνӵ½C2Óò²¢´ÓÖ÷»úй¼ûô¸ÐÐÅÏ¢¡£
https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html
5¡¢AkamaiÅû¶½Ù³ÖMagentoµÈºÏ·¨ÍøÕ¾µÄMagecart¹¥»÷
AkamaiÔÚ6ÔÂ1ÈÕ³ÆÆä·¢ÏÖ²¢·ÖÎöÁËһ·ÔÚ½øÐеÄMagecart¹¥»÷»î¶¯£¬Ö¼ÔÚ´ÓµçÉÌÍøÕ¾ÇÔÈ¡PIIºÍÐÅÓþ¿¨ÐÅÏ¢¡£×êÑÐÈËÔ±³Æ¸Ã»î¶¯ÒÑÓ°ÏìÃÀ¹ú¡¢Ó¢¹ú¡¢°Ä´óÀûÑÇ¡¢°ÍÎ÷¡¢ÃØÂ³ºÍ°®É³ÄáÑǵÄ×éÖ¯¡£¹¥»÷ÕßÔڻÆÚ¼äѡȡÁ˶àÖÖÈÆ¹ý¼¼Êõ£¬Ô̺¬Ê¹ÓÃBase64±àÂë»ìºÏskimmer£¬Í¨¹ýÀàËÆÓÚµÚÈý·½·þÎñGoogle Tag Manager»òFacebook PixelµÄ·½Ê½¹¹½¨Æä½á¹¹ÒÔÔ¤·ÀÒýÆðÒÉ»ó¡£´Ë±í£¬ÓëÆäËüMagecart¹¥»÷·ÖÆçµÄÊÇ£¬¹¥»÷Õß½Ù³ÖÁ˺Ϸ¨ÍøÕ¾³äÈÎһʱC2·þÎñÆ÷£¬Í¨¹ýÕâЩŵÑÔÓÅÁ¼µÄºÏ·¨ÍøÕ¾·Ö·¢ÇÔÈ¡·¨Ê½¡£
https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
6¡¢AvastÔÚChromeÍøÉÏÉ̵ê¼ì²âµ½32¸ö¶ñÒâÀ©´ó·¨Ê½
6ÔÂ2ÈÕ£¬Avast³ÆÆäÔÚChromeÍøÉÏÀûÓõêÖмì²âµ½32¸ö¶ñÒâÀ©´ó·¨Ê½£¬×Ü×°ÖÃÁ¿¸ß´ï7500Íò´Î¡£Õâ´Îµ÷²éʼÓÚÒ»Ãû×êÑÐÈËÔ±ÔÚPDF ToolboxÀ©´óÖз¢ÏÖÁ˶ñÒâ´úÂ룬´ÙʹÕë¶Ô¸ÃÎÊÌâ¸üÉî¿ÌµÄ×êÑС£ÕâЩÀ©´óµÄÖ°ÄÜ´Ó¸æ°×À¹½ØÆ÷¡¢ÏÂÔØÆ÷ºÍä¯ÀÀÆ÷Ö÷Ìâµ½¼Í¼Æ÷ºÍÑ¡ÏÖÎÀíÆ÷µÈ¡£ËüÃÇÌṩÁ˺Ϸ¨Ö°ÄÜ£¬Õ§Ò»¿´ËƺõÎÞº¦£¬µ«×îÖÕpayload¿ÉÄÜÊǸæ°×Èí¼þºÍËÑË÷½Ù³Ö·¨Ê½µÈ¡£Ä¿Ç°£¬¹È¸èÒѾ´ÓÆäÍøÉÏÀûÓÃÉ̵êÖÐɾ³ýÁËÕâЩÀ©´ó¡£
https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-with-75m-installs-removed-from-web-store/


¾©¹«Íø°²±¸11010802024551ºÅ