Dr.Web·¢ÏÖÀûÓÃWin10 ISOºÍEFI·Ö·Ö±æ·¢ClipperµÄ»î¶¯
°ä²¼¹¦·ò 2023-06-151¡¢Dr.Web·¢ÏÖÀûÓÃWin10 ISOºÍEFI·Ö·Ö±æ·¢ClipperµÄ»î¶¯
Dr.WebÔÚ6ÔÂ13ÈÕ³ÆÆäÔÚһЩµÁ°æWindows 10 ISOÖз¢ÏÖÁ˼ÓÃÜÇ®±Ò½Ù³Ö·¨Ê½£¬¹¥»÷Õßͨ¹ýTorrent tracker·Ö·¢ËüÃÇ¡£Õâ¸öľÂí±»³ÆÎªTrojan.Clipper.231£¬¿É½«¼ôÌù°åÖеļÓÃÜÇ®±ÒÇ®°üµØÖ·´úÌæ³É¹¥»÷ÕߵĵØÖ·¡£½ØÖÁĿǰ£¬¹¥»÷ÕßÒѳɹ¦ÇÔÈ¡Á˼ÛÖµÔ¼19000ÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¸Ã»î¶¯»¹Ê¹ÓÃEFI£¨¿ÉÀ©´ó¹Ì¼þ½Ó¿Ú£©·ÖÇø×÷ΪClipper×é¼þµÄ°²È«´æ´¢¿Õ¼ä£¬Ö¼ÔÚÈÆ¹ý¶ñÒâÈí¼þ¼ì²â¡£×êÑÐÈËÔ±½¨Òé²»ÒªÏÂÔØµÁ°æ²Ù×÷ϵͳ¡£
https://news.drweb.com/show/?i=14712&lng=en
2¡¢ÄÏ·Ç¿ª·¢ÒøÐÐй©Æä·þÎñÆ÷ºÍÎļþµÈ±»AkiraÍÅ»ï¼ÓÃÜ
¾ÝýÌå6ÔÂ14ÈÕ±¨Â·£¬ÄÏ·Ç¿ª·¢ÒøÐУ¨DBSA£©Ôâµ½ÁËAkiraÍÅ»ïµÄÀÕË÷¹¥»÷¡£Õâ¼Ò¹úÓÐÒøÐÐй©£¬¹¥»÷ʼÓÚ5ÔÂ21ÈÕ×óÓÒ£¬Æä·þÎñÆ÷¡¢ÈÕÖ¾ÎļþºÍÎļþ±»¼ÓÃÜ¡£²¿ÃÅÐÅÏ¢¿ÉÄÜÒѱ»·¸·¨½Ó¼û£¬Éæ¼°¶Êº͹ɶ«µÄÓ×ÎÒÐÅÏ¢£¬ÓëDBSA´æÔÚóÒ×»ò¹ÍÓ¶¹ØÏµµÄ¾ßÌåÐÅÏ¢£¬ÒÔ¼°ÀûÒæÓйØÕߵIJÆÕþÐÅÏ¢¡£Ä¿Ç°£¬¸ÃÊÂÎñÈÔÔÚµ÷²éÖУ¬DBSAÒѾ¿ÉÄܸ´ÔÆäITϵͳ£¬²¢½«ÀÕË÷Èí¼þ×é¼þ´ÓÆäϵͳÖÐɾ³ý¡£
https://therecord.media/development-bank-of-southern-africa-akira-ransomware-attack
3¡¢Mandiant°ä²¼UNC3886ÀûÓÃVMware ESXi·ì϶µÄ¼¼Êõϸ½Ú
6ÔÂ13ÈÕ£¬Mandiant°ä²¼Á˹ØÓÚUNC3886ÀûÓÃVMware ESXiÖÐÁãÈÕ·ì϶µÄ¼¼Êõϸ½Ú¡£ÕâÊÇVMware ToolsµÄvgauthÄ£¿éÖеÄÒ»¸öÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2023-20867£©£¬ÒÑÓÚ6ÔÂ13ÈÕ±»½¨¸´¡£Õâ´Î»î¶¯ÖУ¬¹¥»÷ÕßÀûÓÃÕâÒ»·ì϶ÔÚÖ¸±êESXiÖ÷»úµÄguest VMÉϲ¿ÊðVirtualPitaºÍVirtualPieºóÃÅ£¬²¢½«È¨ÏÞÉý¼¶µ½root¡£×êÑÐÈËÔ±»¹·¢ÏÖµÚÈýÖÖ¶ñÒâÈí¼þ±äÖÖ(VirtualGate)×÷Ϊһ¸ömemory-only dropper£¬¶Ô±»½Ù³ÖÐé¹¹»úÉϵĵڶþ½×¶ÎDLL payload½øÐÐÈ¥»ìºÏ´¦Öá£
https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass
4¡¢SpotifyÒòÎ¥·´GDPR±»Èðµäµ±¾Ö·£¿î540ÍòÃÀÔª
¾Ý6ÔÂ14ÈÕ±¨Â·£¬ÒôÀÖÁ÷ýÌ幫˾SpotifyÒòδÕýÈ··î¸æÓû§ÆäÍøÂçµÄÊý¾ÝÊÇÈôºÎ±»Ê¹Óõ쬱»ÈðµäÒþÖÔ±£»¤¾Ö(IMY)·£¿î5800ÍòÈðµä¿ËÀÊ£¨Ô¼ºÏ540ÍòÃÀÔª£©¡£¸Ã¼à¹Ü»ú¹¹Ö¸³ö£¬Æ¾¾ÝGDPRµÄ»®¶¨£¬Óû§ÓÐȨÏàʶ¹«Ë¾Õ¼ÓйØÓÚÓ×ÎÒµÄÄÄЩÊý¾ÝÒÔ¼°ÕâЩÊý¾ÝµÄʹÓ÷½Ê½¡£µ«ÓÉÓÚSpotifyÌṩµÄÐÅÏ¢Ò»Ïò²»Ã÷È·£¬Ó×ÎÒºÜÄÑÏàʶËûÃǵÄÊý¾ÝÊÇÈôºÎ±»´¦Öõģ¬Ò²ºÜÄѲ鳴¦ÖÃÊÇ·ñºÏ·¨¡£IMY»¹³Æ£¬×ܵÄÀ´Ëµ£¬¸ÃÎÊÌâ±»ÒÔΪÊǽϵÍÑϳÁÐԵġ£Spotify°µÊ¾´òËã¶Ô¸Ã¾ö¶¨Ìá³öÉÏËß¡£
https://www.securityweek.com/spotify-fined-5-million-for-breaching-eu-data-rules/
5¡¢×êÑÐÈËÔ±¹«¿ªWPÖ§¸¶²å¼þÖеķì϶CVE-2023-34000
ýÌå6ÔÂ13Èճƣ¬×êÑÐÈËÔ±Åû¶ÁËWordPressµÄWooCommerce Stripe Gateway²å¼þÖеķì϶£¨CVE-2023-34000£©¡£ÕâÊǵçÉÌÍøÕ¾µÄÖ§¸¶Íø¹Ø²å¼þ£¬Ä¿Ç°Óг¬¹ý900000µÄ×°ÖÃÁ¿¡£¸Ã·ì϶ÊÇδ¾Éí·ÝÑéÖ¤µÄ²»°²È«Ö±½Ó¶ÔÏóÒýÓÃ(IDOR)·ì϶£¬»áÓ°Ïì7.4.0¼°ÒÔϰ汾£¬ÒÑÓÚ5ÔÂ30ÈÕ±»½¨¸´¡£·ì϶ԴÓÚ¶©µ¥¶ÔÏóµÄ²»°²È«´¦ÖÃÒÔ¼°²å¼þµÄjavascript_paramsºÍpayment_fieldsº¯ÊýÖв»×ãÊʵ±µÄ½Ó¼û½ÚÔì´ëÊ©£¬¿É±»¹¥»÷ÕßÓÃÀ´ÈƹýÊÚȨ²¢½Ó¼ûÃô¸ÐÐÅÏ¢¡£
https://patchstack.com/articles/unauthenticated-idor-to-pii-disclosure-vulnerability-in-woocommerce-stripe-gateway-plugin/
6¡¢BolsterÅû¶Õë¶ÔÉϰٸö·þ×°Æ·ÅÆµÄ´ó¹æÄ£´¹µö»î¶¯
6ÔÂ13ÈÕ£¬BolsterÅû¶Õë¶ÔÉϰٸö·þ×°Æ·ÅÆµÄ´ó¹æÄ£´¹µö»î¶¯£¬Ö¼ÔÚÇÔȡָ±êµÄÕË»§Æ¾Ö¤ºÍ²ÆÕþÐÅÏ¢¡£¸Ã»î¶¯×Ô2022Äê6ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬ÔÚ2022Äê11ÔÂÖÁ2023Äê2Ô´ﵽ·åÖµ¡£´¹µöÍøÕ¾¼ÙÒâµÄÆ·ÅÆÔ̺¬ÄͿˡ¢±ëÂí¡¢Íò˹¡¢°¢µÏ´ï˹¡¢¸çÂ×±ÈÑÇ¡¢ºÍ¿¨Î÷Å·µÈ£¬Bolster³ÆÒѼø±ð³ö3000¶à¸ö»îÔ¾µÄÓòÃû¡£Óë´Ë»î¶¯ÓйصÄÓòÃû±»×·Òäµ½×ÔÖ÷ϵͳ±àºÅAS48950£¬ÓÉÁ½¸öÌØ¶¨µÄ»¥ÁªÍø·þÎñÌṩÉÌPacket Exchange LimitedºÍGlobal Colocation LimitedÍйܡ£
https://bolster.ai/blog/brand-impersonation-scam


¾©¹«Íø°²±¸11010802024551ºÅ