Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÉèÖùýʧÓû§ÐÅϢй¶

Ðû²¼Ê±¼ä 2022-08-29
1¡¢Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÉèÖùýʧÓû§ÐÅϢй¶

      

ýÌå8ÔÂ25Èճƣ¬£¬£¬ £¬Ó¡¶Èº½¿Õ¹«Ë¾Akasa Air±¬·¢Êý¾Ýй¶£¬£¬£¬ £¬Î´¾­ÊÚȨµÄСÎÒ˽¼Ò¿É»á¼ûÓû§ÐÅÏ¢¡£ ¡£¡£¡£¡£¸Ãº½¿Õ¹«Ë¾³Æ£¬£¬£¬ £¬8ÔÂ25ÈÕ·¢Ã÷ÁËÒ»¸öÓëµÇ¼ºÍ×¢²áЧÀÍÓйصÄÊÖÒÕÉèÖùýʧÎÊÌ⣬£¬£¬ £¬¿Éй¶ע²áÓû§ÐÅÏ¢£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢ÐԱ𡢵ç×ÓÓʼþµØµãºÍµç»°ºÅÂ룬£¬£¬ £¬ÇÒÕâЩÐÅÏ¢¿ÉÄÜÒѾ­±»Î´¾­ÊÚȨµÄСÎÒ˽¼Ò»á¼û¡£ ¡£¡£¡£¡£¸Ãº½¿Õ¹«Ë¾ÓÚ8ÔÂ7ÈÕ×îÏÈÔËÓª£¬£¬£¬ £¬ÏÖÔÚÒѾʹËÊÂÏòÆä¿Í»§ÖÂǸ£¬£¬£¬ £¬²¢ÏòCERT-In±¨¸æ¡£ ¡£¡£¡£¡£


https://www.telegraphindia.com/business/akasa-air-suffers-data-breach/cid/1883016


2¡¢AtlassianÐÞ¸´BitbucketÖеÄRCEÎó²îCVE-2022-36804 
      

8ÔÂ24ÈÕ£¬£¬£¬ £¬AtlassianÐû²¼Ç徲ͨ¸æ£¬£¬£¬ £¬ÐÞ¸´BitbucketЧÀÍÆ÷ºÍÊý¾ÝÖÐÐĵÄÇå¾²Îó²î£¨CVE-2022-36804£©¡£ ¡£¡£¡£¡£BitbucketÊÇÒ»¸ö»ùÓÚGitµÄ´úÂëÍйܡ¢ÖÎÀíºÍЭ×÷¹¤¾ß£¬£¬£¬ £¬¼¯³ÉÁËJiraºÍTrello¡£ ¡£¡£¡£¡£¸ÃÎó²îÊÇÈí¼þ²úÆ·µÄ¶à¸öAPI¶ËµãÖеÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬ £¬CVSSÆÀ·ÖΪ9.9£¬£¬£¬ £¬¿Éͨ¹ýÌØÖÆµÄHTTPÇëÇóÀ´Ê¹Ó㬣¬£¬ £¬µ¼ÖÂí§Òâ´úÂëµÄÖ´ÐС£ ¡£¡£¡£¡£½¨ÒéÎÞ·¨Ó¦ÓÃÇå¾²¸üеÄÓû§Í¨¹ýÉèÖÃfeature.public.access=false¹Ø±Õ¹«¹²´æ´¢¿âÀ´×÷Ϊ»º½â²½·¥¡£ ¡£¡£¡£¡£


https://thehackernews.com/2022/08/critical-vulnerability-discovered-in.html


3¡¢ÖÇÀû¹ú¼ÒÏûºÄÕßЧÀÍÖÐÐÄSERNACµÄÍøÕ¾±»¹¥»÷ºó¹Ø±Õ

      

¾Ý8ÔÂ27ÈÕ±¨µÀ£¬£¬£¬ £¬ÖÇÀû¹ú¼ÒÏûºÄÕßЧÀÍÖÐÐÄ(SERNAC)ÔÚ±»¹¥»÷ºó¹Ø±Õ¡£ ¡£¡£¡£¡£SERNACÊÇÖÇÀûÈÏÕæÎ¬»¤ºÍÔö½øÏûºÄÕßȨÁ¦µÄ¹«¹²Ð§ÀÍ»ú¹¹£¬£¬£¬ £¬ÔÚ·¢Ã÷¹¥»÷ºóÒѽ«´Ëʱ¨¸æ¸øÉó²é¹Ù°ì¹«ÊÒ¾ÙÐÐÐÌÊÂÊӲ졣 ¡£¡£¡£¡£SERNACÍøÕ¾ÏÔʾ¸ÃÍøÕ¾¼°Æäƽ̨ÕýÔÚά»¤ÖУ¬£¬£¬ £¬ÔÚÍøÕ¾ÎÞ·¨»á¼ûʱÏûºÄÕß¿ÉÒÔµ½SERNACЧÀÍ´¦»òÕßͨ¹ýÖµç»ñµÃЧÀÍ¡£ ¡£¡£¡£¡£ÏÖÔÚÒÑÈ·ÈÏÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ÊÂÎñ£¬£¬£¬ £¬µ«ÖÇÀûÕþ¸®ÉÐδ˵Ã÷ËüÊÇʲôÀàÐ͵ÄÀÕË÷Èí¼þ¡£ ¡£¡£¡£¡£ 

https://www.databreaches.net/sernac-computer-services-hacked-chiles-interior-ministry-assessing-scope-of-cyberattack/


4¡¢DoorDashÓëÆäµÚÈý·½¹©Ó¦ÉÌÔ⵽ͳһºÚ¿ÍÍÅ»ïµÄ¹¥»÷

      

¾ÝýÌå8ÔÂ26ÈÕ±¨µÀ£¬£¬£¬ £¬Ê³ÎïÅäË͹«Ë¾DoorDashÓйصĿͻ§ºÍÔ±¹¤Êý¾Ýй¶¡£ ¡£¡£¡£¡£DoorDashÌåÏÖ£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÁË´ÓÆäµÚÈý·½¹©Ó¦ÉÌTwilio´¦ÇÔÈ¡µÄƾ֤»ñµÃÁ˶Թ«Ë¾ÄÚ²¿¹¤¾ßµÄ»á¼ûȨÏÞ£¬£¬£¬ £¬À´»á¼û¿Í»§ºÍÔ±¹¤µÄÊý¾Ý¡£ ¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢ÓʼþµØµã¡¢ÅäË͵ص㡢µç»°ºÅÂëÒÔ¼°²¿·ÖÖ§¸¶¿¨µÄºóËÄλ£»£»£»£»£»Ô±¹¤ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµØµã¡£ ¡£¡£¡£¡£²»¾Ãºó£¬£¬£¬ £¬¸Ã¹«Ë¾³ÎÇå´Ë´Î»÷ÊÇÓɹ¥»÷TwilioµÄͳһÍÅ»ï¾ÙÐе쬣¬£¬ £¬µ«²¢·ÇÊÇͨ¹ýTwilio¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hackers/


5¡¢Trend Micro·¢Ã÷Õë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda

      

Trend MicroÔÚ8ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda¡£ ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÓÃÊÇÓÃGOÓïÑÔ¿ª·¢µÄ£¬£¬£¬ £¬Õë¶ÔÓ¡¶ÈÄáÎ÷ÑÇ¡¢É³Ìذ¢À­²®¡¢ÄϷǺÍÌ©¹úµÄÒ½ÁƱ£½¡ºÍ½ÌÓý×éÖ¯¡£ ¡£¡£¡£¡£Agenda¿ÉÒÔÔÚÇ徲ģʽÏÂÖØÐÂÆô¶¯ÏµÍ³£¬£¬£¬ £¬ÊÔͼ×èÖ¹Ðí¶àÌØ¶¨µÄЧÀÍÆ÷Àú³ÌºÍЧÀÍ£¬£¬£¬ £¬²¢ÓжàÖÖģʽ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÍøÂçµÄÿ¸öÀÕË÷Èí¼þµÄÑù±¾¶¼ÊÇÎªÌØ¶¨Ä¿µÄ¶¨ÖƵ쬣¬£¬ £¬°üÀ¨Î¨Ò»µÄ¹«Ë¾IDºÍй¶µÄÕË»§ÐÅÏ¢¡£ ¡£¡£¡£¡£ÆäÊê½ðÒò¹«Ë¾¶øÒ죬£¬£¬ £¬´Ó50000ÃÀÔªµ½800000ÃÀÔª²»µÈ¡£ ¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html


6¡¢Î¢Èí͸¶APT29ʹÓÃеÄMagicWebÐ®ÖÆADFSµÄ¹¥»÷»î¶¯

      

8ÔÂ24ÈÕ£¬£¬£¬ £¬Î¢ÈíÐû²¼Á˹ØÓÚ¶íÂÞ˹APT29½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¹¥»÷ÖÐʹÓõÄжñÒ⹤¾ßMagicWebÊÇFoggyWebµÄÑݱ䣬£¬£¬ £¬¿ÉÓÃÀ´ÇÔÈ¡±»Ñ¬È¾µÄActive DirectoryÁªºÏЧÀÍ(ADFS)ЧÀÍÆ÷µÄÉèÖÃÊý¾Ý¿â£¬£¬£¬ £¬½âÃÜÁîÅÆÊðÃûºÍÁîÅÆ½âÃÜÖ¤Ê飬£¬£¬ £¬²¢Í¨¹ýC2ЧÀÍÆ÷»ñÈ¡ÆäËüµÄpayload¡£ ¡£¡£¡£¡£MagicWeb¿É½«ADFSʹÓõÄÕýµ±DLLÌæ»»Îª¶ñÒâµÄ°æ±¾£¬£¬£¬ £¬À´²Ù¿ØÓû§Éí·ÝÑéÖ¤Ö¤Êé²¢Ð޸ı»Ñ¬È¾Ð§ÀÍÆ÷ÌìÉúµÄÁîÅÆÖÐת´ïµÄÉùÃ÷¡£ ¡£¡£¡£¡£MagicWeb¿ÉÒÔ×ÊÖúAPT29ÔÚWindowsÖÐÒÔËùÓÐÓû§µÄÉí·ÝµÇ¼¡£ ¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/