¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨¸¶¿î

°ä²¼¹¦·ò 2023-06-27

1¡¢¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨¸¶¿î


¾Ý6ÔÂ26ÈÕ±¨Â· £¬¼ÓÄôóʯÓ͹«Ë¾(Petro-Canada)¼ÓÓÍÕ¾µÄ¿Í»§ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨»ò¼Î½±»ý·Ö¸¶¿î £¬Æäĸ¹«Ë¾Suncor Energyй©ËûÃÇÔâµ½Á˹¥»÷¡£Suncor EnergyÊÇÊǼÓÄôó×î´óµÄºÏ³ÉÔ­Óͳö²úÉÌÖ®Ò» £¬ÄêÊÕÈë´ï310ÒÚÃÀÔª £¬Æä×Ó¹«Ë¾Petro-CanadaÔÚ¼ÓÄôó¸÷µØ¾­Óª1500¶à¸ö¼ÓÓÍÕ¾¡£Suncorй© £¬¿Í»§ÎÞ·¨Í¨¹ýÀûÓûòÍøÕ¾µÇ¼ÕÊ»§ £¬Ò²ÎÞ·¨ÔÚ¼ÓÓÍʱ»ñµÃ»ý·Ö¡£È»¶ø £¬ÕæÊµÇé¿öËÆºõ±È֪ͨµÄÒªÔã¸â £¬Ä¿Ç°¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶ £¬Ö»ÄÜʹÓÃÏֽ𠣬ռÓÐÏ´³µ¼¾¿¨µÄ¿Í»§Ò²ÎÞ·¨ÏíÊÜȨÀû £¬ËûÃÇ´Ë¿ÌÒªÇóÍ˿


https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/


2¡¢iOttieÍøÕ¾±»ÈëÇÖÏßÉϹºÎïÕßµÄÒøÐп¨ºÍÓ×ÎÒÐÅϢй¶


¾ÝýÌå6ÔÂ21ÈÕ±¨Â· £¬Æû³µÖ§¼ÜºÍÒÆ¶¯Åä¼þÔì×÷ÉÌiOttie³Æ £¬ÆäÍøÕ¾ÔÚ½üÁ½¸öÔ±»ÈëÇÖ £¬ÍøÉϹºÎïÕßµÄÐÅÓþ¿¨ºÍÓ×ÎÒÐÅϢй¶¡£iOttie°µÊ¾ £¬ËûÃÇÓÚ6ÔÂ13ÈÕ·¢ÏÔìäÔÚÏßÉ̵êÔÚ4ÔÂ12ÈÕÖÁ6ÔÂ2ÈÕÔâµ½¶ñÒâ¾ç±¾¹¥»÷¡£ÕâÖÖÀàÐ͵Ĺ¥»÷³ÆÎªMageCart £¬Ä¿Ç°¶ñÒâ´úÂëÒÑͨ¹ý²å¼þ¸üÐÂɾ³ý £¬µ«¹¥»÷Õß¿ÉÄÜÒѾ­»ñµÃÁËÓû§µÄÐÅÓþ¿¨ÐÅÏ¢ £¬Éæ¼°Õʺš¢¿¨ºÅ¡¢°²È«Âë¡¢½Ó¼ûÂë¡¢ÃÜÂëºÍPINµÈ¡£¹ÌÈ»iOttieûÓÐй©ËûÃÇÊÇÈôºÎ±»¹¥»÷µÄ £¬µ«ËûÃǵÄÔÚÏßÉ̵êÊÇÒ»¸ö´øÓÐWooCommerce²å¼þµÄWordPressÍøÕ¾¡£


https://www.bleepingcomputer.com/news/security/iottie-discloses-data-breach-after-site-hacked-to-steal-credit-cards/


3¡¢Unit 42·¢ÏÖMuddled LibraÕë¶ÔBPOÐÐÒµµÄ¹¥»÷»î¶¯


Unit 42ÔÚ6ÔÂ21ÈÕÅû¶ÁËMuddled LibraÔÚÕë¶ÔÒµÎñÁ÷³Ì±í°ü(BPO)ÐÐÒµµÄ³ÖÐø¹¥»÷»î¶¯¡£2022Äêµ× £¬Ëæ×Å0ktapus´¹µö¹¤¾ß°üµÄ°ä²¼ £¬Muddled LibraµÄ¹¥»÷·ç¸ñ¸¡³öË®Ãæ¡£×êÑÐÈËÔ±µ÷²éÁË2022ÄêÖÐÖÁ2023ËêÊ×µÄ6ÆðÓйØÊÂÎñ £¬·¢ÏÖ¸Ã×éÖ¯µÄÌØµãÊÇʹÓÃ0ktapusÌ×¼þ¡¢¾óÇ¿¡¢¹¥»÷Õ½Êõ½Ã½Ý¡¢Õë¶ÔBPOÐÐÒµ¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°±ÉÈËÓι¥»÷ÖÐʹÓñ»ÈëÇֵĻù´¡ÉèÊ©µÈ¡£´Ë±í £¬¸Ã×éÖ¯µÄÉ繤¹¥»÷¼«¶È³É¹¦ £¬ÔÚ¶à¸ö°¸ÀýÖÐ˵·þÁËÖ¸±ê½øÐв»°²È«µÄÐÐΪ¡£


https://unit42.paloaltonetworks.com/muddled-libra/


4¡¢CERT-UA³Æ¶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷±»ºÚ


ýÌå6ÔÂ21ÈÕ±¨Â· £¬ÎÚ¿ËÀ¼CERT-UAºÍRecorded Future½áºÏµ÷²éÏÔʾ £¬APT28ÈëÇÖÁ˶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷¡£Õâ´Î»î¶¯ÖÐ £¬¹¥»÷ÕßÒÔ¶íÎÚì¶ÜµÄÐÂÎÅΪµö¶ü·¢ËͶñÒâÓʼþ £¬ÕâЩÓʼþ½«ÀûÓÃRoundcube Webmail·ì϶£¨CVE-2021-44026µÈ£©ÈëÇÖδ´ò²¹¶¡µÄ·þÎñÆ÷¡£¶øºó £¬¹¥»÷Õß»á×°ÖöñÒâ¾ç±¾ £¬½«Ö¸±êµÄ´«ÈëÓʼþ³Á¶¨Ïòµ½¹¥»÷ÕߵĵØÖ· £¬»¹ÇÔÈ¡µØÖ·²¾¡¢»á»°cookieÒÔ¼°´æ´¢ÔÚRoundcubeÊý¾Ý¿âÖÐµÄÆäËüÐÅÏ¢¡£¾Ý¹À¼Æ £¬APT28ÔÚÕâЩ¹¥»÷ÖÐʹÓõĻù´¡ÉèʩԼĪ×Ô2021Äê11ÔÂÆð¾ÍÆðÍ·ÔËÐС£


https://securityaffairs.com/147681/apt/apt28-hacked-roundcube-ukraine.html


5¡¢Êý°ÙÍò¸öGitHub´æ´¢¿âÈÝÒ×Ôâµ½RepoJacking¹¥»÷


 AquaSecÔÚ6ÔÂ21ÈÕ³Æ £¬´óÁ¿GitHub´æ´¢¿âÈÝÒ×Ôâµ½ÒÀÀµÏî´æ´¢¿â½Ù³Ö£¨Ò²³ÆÎª¡°RepoJacking¡±£©¹¥»÷ £¬¿ÉÄܵ¼Ö¹©¸øÁ´¹¥»÷¡£×êÑÐÈËÔ±·ÖÎöÁË125Íò¸öGitHubÑù±¾ £¬·¢ÏÖÔ¼2.95%Ò×ÊÜRepoJacking¹¥»÷¡£½«´Ë°Ù·Ö±ÈÍÆ¹ãµ½GitHub³¬¹ý3ÒڵĴ洢¿â £¬¹À¼Æ¸ÃÎÊÌâÓ°ÏìÁËԼĪ900Íò¸öÏîÄ¿¡£AquaSecɨÃèÁ˳ÛÃû×éÖ¯ÖеĴ洢¿â £¬²¢ÔÚGoogleºÍLyftÖÎÀíµÄ´æ´¢¿âÖз¢ÏÖÁË¿ÉÀûÓõݸÀý¡£²»ÐÒµÄÊÇ £¬RepoJackingÊ®·ÔìÕ±éÇÒÄÑÒÔ»º½â £¬ÏîÄ¿ËùÓÐÕßÓ¦¾¡¿ÉÄÜÏ÷¼õ´Ó±í²¿´æ´¢¿â»ñÈ¡×ÊÔ´¡£


https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking


6¡¢½©Ê¬ÍøÂçCondiͨ¹ýTP-Link·ì϶CVE-2023-1389´«²¼


6ÔÂ20ÈÕ £¬Fortinet³ÆÆä·¢ÏÖÁËÒ»¸öеÄDDoS½©Ê¬ÍøÂçCondi £¬ÖØÒªÕë¶ÔTP-Link Archer AX21 (AX1800)·ÓÉÆ÷¡£¸Ã¶ñÒâÈí¼þÀûÓÃÁË·ÓÉÆ÷WebÖÎÀí½çÃæAPIÖеÄÒ»¸öºÅÁî×¢Èë·ì϶£¨CVE-2023-1389£© £¬¸Ã·ì϶ÒÑÓÚ3Ô·ݱ»½¨¸´¡£Condi»¹»áɱËÀ¾ºÕù¹ØÏµµÄÆäËü½©Ê¬ÍøÂçµÄÓйعý³Ì £¬Ò²»áÖÕ³¡Æä×ÔÉíµÄ¾É°æ±¾¡£¹ØÓÚCondiµÄDDoS¹¥»÷ÄÜÁ¦ £¬ÆäÖ§³ÖÓëMiraiÀàËÆµÄ¸÷ÀàTCPºÍUDP¹¥»÷²½Öè¡£


https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389