220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÓÐ¹ØµÄÆ¾Ö¤ÔÚ°µÍøÉÏй¶
°ä²¼¹¦·ò 2023-06-211¡¢220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÓÐ¹ØµÄÆ¾Ö¤ÔÚ°µÍøÉÏй¶
¾Ý6ÔÂ19ÈÕ±¨Â·£¬CrosswordÔÚ°µÍøÉÏ·¢ÏÖÁ˽ü220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÓÐ¹ØµÄÆ¾Ö¤£¬ÆäÖÐ57%ÊôÓÚ24ËùÂÞËØ¼¯ÍÅ´óѧ¡£´óѧµÄµØÎ»ºÍ¹æÄ£¶Ôй¶µÄˮƽҲÓÐÓ°Ï죬Â׶صķçÏÕ¶ñ´óµÃ¶à£¬ÓÐ506330(20%)¸öÖ¤Ê鱻й¶£¬Æä´ÎÊǶ«Äϲ¿(334251£¬Õ¼±È13%)ºÍËÕ¸ñÀ¼(306873£¬12%)¡£×êÑÐÈËÔ±»¹Ð¹Â©£¬³¬¹ýÒ»°ë£¨54%£©µÄÐÂäį´×ÔÕ¼ÓÐ×êÑÐÉèÊ©µÄÓ¢¹ú´óѧ£¬µ±¾ÖÔÞÖúµÄºËÄܺ͹ú·ÀµÈÁìÓòµÄÏîÄ¿¿ÉÄÜÃæ¶Ô·çÏÕ¡£
https://www.infosecurity-magazine.com/news/millions-uk-university-credentials/
2¡¢Cyfirma·¢ÏÖDoNot¼Ù×°³ÉVPNºÍ̸ÌìÀûÓõļäµýÈí¼þ
¾Ý6ÔÂ19ÈÕ±¨Â·£¬Cyfirma³ÆÆäÔÚGoogle PlayÉÏ·¢ÏÖÁË¿ÉÒɵÄÀûÓÃnSure ChatºÍiKHfaa VPN£¬ËüÃǶ¼ÊÇ´ÓSecurITY IndustryÉÏ´«µÄ¡£½øÒ»²½µÄ·ÖÎöÖ¤Ã÷ËüÃÇÓµÓжñÒâÈí¼þÌØµã£¬²¢±»¹éÒòÓÚÓ¡¶ÈÓйغڿÍÍÅ»ïDoNot¡£Õâ´Î¹¥»÷»î¶¯ÖØÒªÕë¶Ô°Í»ù˹̹£¬Ö¼ÔÚ´ÓÖ¸±êÉè±¸ÍøÂçµý±¨£¬ÀýÈçµØÎ»Êý¾ÝºÍÁªÏµÈËÁÐ±í¡£´Ë±í£¬ÓëÕâÁ½¿îÀûÓÃÀ´×Ôͳһ¿¯ÐÐÉ̵ĵÚÈý¿îÀûÓÃËÆºõûÓжñÒ⣬µ«ÈÔ¿ÉÔÚGoogle PlayÉÏʹÓá£
https://www.cyfirma.com/outofband/donot-apt-elevates-its-tactics-by-deploying-malicious-android-apps-on-google-play-store/
3¡¢BitdefenderÅû¶Õë¶ÔmacOSµÄ¹¤¾ß°üµÄ×é¼þµÄϸ½Ú
BitdefenderÔÚ6ÔÂ16ÈÕй©Æä·¢ÏÖÁËÒ»×éÓµÓкóÃÅÖ°ÄܵĶñÒâÎļþ£¬²¢´§¶ÈÊÇÕë¶ÔApple macOSϵͳµÄ¸´ÔÓ¹¤¾ß°üµÄÒ»²¿ÃÅ¡£Ä¿Ç°µ÷²éÈÔÔÚ½øÐÐÖУ¬Ñù±¾µÄ´ó²¿ÃÅÈÔδ±»·¢ÏÖ¡£×êÑÐÈËÔ±¹²·ÖÎöÁËÉÏ´«µ½VirusTotalµÄËĸöÑù±¾£¬ÆäÖÐ×îÔçµÄÓÚ4ÔÂ18ÈÕÓÉÄäÃûÓû§ÉÏ´«¡£×êÑÐÈËÔ±·¢ÏֵĶñÒâÎļþ±ðÀëÊÇÒ»¸öͨÓõÄPythonºóÃÅshared.dat£¬Ò»¸ö׳´óµÄºóÃÅsh.py£¬ÒÔ¼°Ò»¸öFAT¶þ½øÔìÎļþxcc¡£Bitdefender½«Python×é¼þ¸ú×ÙΪJokerSpy¡£
https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/
4¡¢eSentire¼ì²âµ½ÀûÓÃOnlyFansÒ³Ãæ·Ö·¢DcRATµÄ»î¶¯
6ÔÂ15ÈÕ£¬eSentire³ÆÆä¼ì²âµ½ÁËÀûÓÃαÔìµÄOnlyFansµÅ×Õ¶ü·Ö·¢DcRATµÄ»î¶¯¡£¸Ã»î¶¯×Ô1ÔÂÒÔÀ´Ò»ÏòÔÚ»îÔ¾£¬´«²¼Ô̺¬VBScript¼ÓÔØ·¨Ê½µÄZIPÎļþ£¬¶øºóÓÕʹָ±êÊÖ¶¯Ö´ÐС£VBScript¼ÓÔØ·¨Ê½Æô¶¯Ê±£¬»áʹÓÃWMI²é³²Ù×÷ϵͳ¼Ü¹¹²¢ÌìÉú32λ¹ý³Ì¡£Õâʹ¶ñÒâÈí¼þ¿ÉÄܽӼûDynamicWrapperX¡£×îÖÕ£¬ÃûΪBinaryDataµÄpayload»á±»¼ÓÔØµ½Äڴ棬²¢×¢ÈëRegAsm.exe¹ý³Ì¡£×¢ÈëµÄpayloadÊÇDcRAT£¬ËüÊÇAsyncRATµÄÅú¸Ä°æ±¾£¬¿ÉÔÚGitHubÉÏÃâ·Ñ»ñµÃ¡£
https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content
5¡¢×êÑÐÈËÔ±Åû¶΢ÈíAzure ADÉí·ÝÑéÖ¤·ì϶nOAuth
¾ÝýÌå6ÔÂ20ÈÕ±¨Â·£¬DescopeÅû¶ÁËMicrosoft Azure AD OAuthÀûÓ÷¨Ê½ÖеÄÒ»¸öÑϳÁµÄÃýÎóÅäÖá£Ëü±»³ÆÎªnOAuth£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤·ì϶¡£¹¥»÷ÕßÄܹ»Í¨¹ýÅú¸ÄAzure ADÕÊ»§Öеĵç×ÓÓʼþÊôÐÔ£¬²¢Ê¹ÓÃËûÃÇÏëÒª¼ÙÒâµÄÖ¸±êµÄµç×ÓÓʼþµØÖ·À´ÀûÓÃÒ»¼üʽµÄ¡°Ê¹ÓÃMicrosoftµÇ¼¡±Ö°ÄÜ£¬´Ó¶øÆëÈ«ÊÕÊÜÕÊ»§¡£Microsoft½«¸ÃÎÊÌâÃèÊöΪ"Azure ADÀûÓ÷¨Ê½ÖÐʹÓõIJ»°²È«µÄ·´Ä£Ê½"£¬ÒÑͨ¹ý°ä²¼»º½â´ëÊ©½â¾öÁËÕâÒ»ÎÊÌâ¡£
https://www.securityweek.com/researchers-flag-account-takeover-flaw-in-microsoft-azure-ad-oauth-apps/
6¡¢Check Point°ä²¼Ä¿Ç°ÈÔÔÚ½øÐеĴ¹µö»î¶¯µÄ»ã±¨
6ÔÂ19ÈÕ£¬Check Point Research(CPR)°ä²¼»ã±¨³Æ¼ì²âµ½ÁËÒ»¸öÔÚ½øÐеĴ¹µö»î¶¯¡£¸Ã»î¶¯Ê¹ÓÃÁ˶à¸ö°æ±¾µÄÓʼþºÍһЩ·ÖÆçµÄHTMLÄ£°å¡£ÎªÁËʹµÇÂ¼Ò³Ãæ¿´ÆðÀ´¸üºÏ·¨£¬¹¥»÷ÕßÒѾÔÚ±íµ¥ÖÐÌîдÁËÖ¸±êµÄµç×ÓÓʼþµØÖ·£¬ÕâÊÇÓ²±àÂëÔÚHTMLÎļþÖеġ£Ò»µ©Ö¸±êÊäÈëÁËÆ¾Ö¤²¢ÊÔͼµÇ¼£¬ÕâЩÐÅÏ¢¾Í»áÖ±½Ó·¢Ë͵½¹¥»÷ÕßµÄÓÊÏäÀï¡£´Ë±í£¬¹¥»÷Õ߶ԺϷ¨·þÎñµÄʹÓÃÓÐËùÔö³¤£¬ÕâÔö³¤ÁËÕмܴËÀ๥»÷µÄÄÑÌâ¡£
https://blog.checkpoint.com/security/sign-in-to-continue-and-suffer-attackers-abusing-legitimate-services-for-credential-theft/


¾©¹«Íø°²±¸11010802024551ºÅ