¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨¸¶¿î
°ä²¼¹¦·ò 2023-06-271¡¢¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨¸¶¿î
¾Ý6ÔÂ26ÈÕ±¨Â·£¬¼ÓÄôóʯÓ͹«Ë¾(Petro-Canada)¼ÓÓÍÕ¾µÄ¿Í»§ÎÞ·¨Ê¹ÓÃÐÅÓþ¿¨»ò¼Î½±»ý·Ö¸¶¿î£¬Æäĸ¹«Ë¾Suncor Energyй©ËûÃÇÔâµ½Á˹¥»÷¡£Suncor EnergyÊÇÊǼÓÄôó×î´óµÄºÏ³ÉÔÓͳö²úÉÌÖ®Ò»£¬ÄêÊÕÈë´ï310ÒÚÃÀÔª£¬Æä×Ó¹«Ë¾Petro-CanadaÔÚ¼ÓÄôó¸÷µØ¾Óª1500¶à¸ö¼ÓÓÍÕ¾¡£Suncorй©£¬¿Í»§ÎÞ·¨Í¨¹ýÀûÓûòÍøÕ¾µÇ¼ÕÊ»§£¬Ò²ÎÞ·¨ÔÚ¼ÓÓÍʱ»ñµÃ»ý·Ö¡£È»¶ø£¬ÕæÊµÇé¿öËÆºõ±È֪ͨµÄÒªÔã¸â£¬Ä¿Ç°¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶£¬Ö»ÄÜʹÓÃÏÖ½ð£¬Õ¼ÓÐÏ´³µ¼¾¿¨µÄ¿Í»§Ò²ÎÞ·¨ÏíÊÜȨÀû£¬ËûÃÇ´Ë¿ÌÒªÇóÍ˿
https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/
2¡¢iOttieÍøÕ¾±»ÈëÇÖÏßÉϹºÎïÕßµÄÒøÐп¨ºÍÓ×ÎÒÐÅϢй¶
¾ÝýÌå6ÔÂ21ÈÕ±¨Â·£¬Æû³µÖ§¼ÜºÍÒÆ¶¯Åä¼þÔì×÷ÉÌiOttie³Æ£¬ÆäÍøÕ¾ÔÚ½üÁ½¸öÔ±»ÈëÇÖ£¬ÍøÉϹºÎïÕßµÄÐÅÓþ¿¨ºÍÓ×ÎÒÐÅϢй¶¡£iOttie°µÊ¾£¬ËûÃÇÓÚ6ÔÂ13ÈÕ·¢ÏÔìäÔÚÏßÉ̵êÔÚ4ÔÂ12ÈÕÖÁ6ÔÂ2ÈÕÔâµ½¶ñÒâ¾ç±¾¹¥»÷¡£ÕâÖÖÀàÐ͵Ĺ¥»÷³ÆÎªMageCart£¬Ä¿Ç°¶ñÒâ´úÂëÒÑͨ¹ý²å¼þ¸üÐÂɾ³ý£¬µ«¹¥»÷Õß¿ÉÄÜÒѾ»ñµÃÁËÓû§µÄÐÅÓþ¿¨ÐÅÏ¢£¬Éæ¼°Õʺš¢¿¨ºÅ¡¢°²È«Âë¡¢½Ó¼ûÂë¡¢ÃÜÂëºÍPINµÈ¡£¹ÌÈ»iOttieûÓÐй©ËûÃÇÊÇÈôºÎ±»¹¥»÷µÄ£¬µ«ËûÃǵÄÔÚÏßÉ̵êÊÇÒ»¸ö´øÓÐWooCommerce²å¼þµÄWordPressÍøÕ¾¡£
https://www.bleepingcomputer.com/news/security/iottie-discloses-data-breach-after-site-hacked-to-steal-credit-cards/
3¡¢Unit 42·¢ÏÖMuddled LibraÕë¶ÔBPOÐÐÒµµÄ¹¥»÷»î¶¯
Unit 42ÔÚ6ÔÂ21ÈÕÅû¶ÁËMuddled LibraÔÚÕë¶ÔÒµÎñÁ÷³Ì±í°ü(BPO)ÐÐÒµµÄ³ÖÐø¹¥»÷»î¶¯¡£2022Äêµ×£¬Ëæ×Å0ktapus´¹µö¹¤¾ß°üµÄ°ä²¼£¬Muddled LibraµÄ¹¥»÷·ç¸ñ¸¡³öË®Ãæ¡£×êÑÐÈËÔ±µ÷²éÁË2022ÄêÖÐÖÁ2023ËêÊ×µÄ6ÆðÓйØÊÂÎñ£¬·¢ÏÖ¸Ã×éÖ¯µÄÌØµãÊÇʹÓÃ0ktapusÌ×¼þ¡¢¾óÇ¿¡¢¹¥»÷Õ½Êõ½Ã½Ý¡¢Õë¶ÔBPOÐÐÒµ¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°±ÉÈËÓι¥»÷ÖÐʹÓñ»ÈëÇֵĻù´¡ÉèÊ©µÈ¡£´Ë±í£¬¸Ã×éÖ¯µÄÉ繤¹¥»÷¼«¶È³É¹¦£¬ÔÚ¶à¸ö°¸ÀýÖÐ˵·þÁËÖ¸±ê½øÐв»°²È«µÄÐÐΪ¡£
https://unit42.paloaltonetworks.com/muddled-libra/
4¡¢CERT-UA³Æ¶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷±»ºÚ
ýÌå6ÔÂ21ÈÕ±¨Â·£¬ÎÚ¿ËÀ¼CERT-UAºÍRecorded Future½áºÏµ÷²éÏÔʾ£¬APT28ÈëÇÖÁ˶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷¡£Õâ´Î»î¶¯ÖУ¬¹¥»÷ÕßÒÔ¶íÎÚì¶ÜµÄÐÂÎÅΪµö¶ü·¢ËͶñÒâÓʼþ£¬ÕâЩÓʼþ½«ÀûÓÃRoundcube Webmail·ì϶£¨CVE-2021-44026µÈ£©ÈëÇÖδ´ò²¹¶¡µÄ·þÎñÆ÷¡£¶øºó£¬¹¥»÷Õß»á×°ÖöñÒâ¾ç±¾£¬½«Ö¸±êµÄ´«ÈëÓʼþ³Á¶¨Ïòµ½¹¥»÷ÕߵĵØÖ·£¬»¹ÇÔÈ¡µØÖ·²¾¡¢»á»°cookieÒÔ¼°´æ´¢ÔÚRoundcubeÊý¾Ý¿âÖÐµÄÆäËüÐÅÏ¢¡£¾Ý¹À¼Æ£¬APT28ÔÚÕâЩ¹¥»÷ÖÐʹÓõĻù´¡ÉèʩԼĪ×Ô2021Äê11ÔÂÆð¾ÍÆðÍ·ÔËÐС£
https://securityaffairs.com/147681/apt/apt28-hacked-roundcube-ukraine.html
5¡¢Êý°ÙÍò¸öGitHub´æ´¢¿âÈÝÒ×Ôâµ½RepoJacking¹¥»÷
AquaSecÔÚ6ÔÂ21Èճƣ¬´óÁ¿GitHub´æ´¢¿âÈÝÒ×Ôâµ½ÒÀÀµÏî´æ´¢¿â½Ù³Ö£¨Ò²³ÆÎª¡°RepoJacking¡±£©¹¥»÷£¬¿ÉÄܵ¼Ö¹©¸øÁ´¹¥»÷¡£×êÑÐÈËÔ±·ÖÎöÁË125Íò¸öGitHubÑù±¾£¬·¢ÏÖÔ¼2.95%Ò×ÊÜRepoJacking¹¥»÷¡£½«´Ë°Ù·Ö±ÈÍÆ¹ãµ½GitHub³¬¹ý3ÒڵĴ洢¿â£¬¹À¼Æ¸ÃÎÊÌâÓ°ÏìÁËԼĪ900Íò¸öÏîÄ¿¡£AquaSecɨÃèÁ˳ÛÃû×éÖ¯ÖеĴ洢¿â£¬²¢ÔÚGoogleºÍLyftÖÎÀíµÄ´æ´¢¿âÖз¢ÏÖÁË¿ÉÀûÓõݸÀý¡£²»ÐÒµÄÊÇ£¬RepoJackingÊ®·ÔìÕ±éÇÒÄÑÒÔ»º½â£¬ÏîÄ¿ËùÓÐÕßÓ¦¾¡¿ÉÄÜÏ÷¼õ´Ó±í²¿´æ´¢¿â»ñÈ¡×ÊÔ´¡£
https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking
6¡¢½©Ê¬ÍøÂçCondiͨ¹ýTP-Link·ì϶CVE-2023-1389´«²¼
6ÔÂ20ÈÕ£¬Fortinet³ÆÆä·¢ÏÖÁËÒ»¸öеÄDDoS½©Ê¬ÍøÂçCondi£¬ÖØÒªÕë¶ÔTP-Link Archer AX21 (AX1800)·ÓÉÆ÷¡£¸Ã¶ñÒâÈí¼þÀûÓÃÁË·ÓÉÆ÷WebÖÎÀí½çÃæAPIÖеÄÒ»¸öºÅÁî×¢Èë·ì϶£¨CVE-2023-1389£©£¬¸Ã·ì϶ÒÑÓÚ3Ô·ݱ»½¨¸´¡£Condi»¹»áɱËÀ¾ºÕù¹ØÏµµÄÆäËü½©Ê¬ÍøÂçµÄÓйعý³Ì£¬Ò²»áÖÕ³¡Æä×ÔÉíµÄ¾É°æ±¾¡£¹ØÓÚCondiµÄDDoS¹¥»÷ÄÜÁ¦£¬ÆäÖ§³ÖÓëMiraiÀàËÆµÄ¸÷ÀàTCPºÍUDP¹¥»÷²½Öè¡£
https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389


¾©¹«Íø°²±¸11010802024551ºÅ