ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß

Ðû²¼Ê±¼ä 2023-05-31

1¡¢ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß


¾ÝýÌå5ÔÂ29ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬±±ÃÀÑÀ¿Æ°ü¹ÜÌṩÉÌMCNA DentalÔâµ½LockbitµÄÀÕË÷¹¥»÷£¬£¬£¬ £¬£¬£¬Ó°ÏìÁË8923662Ãû»¼Õß¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ3ÔÂ6ÈÕÒâʶµ½ÆäϵͳÔâµ½ÁËδ¾­ÊÚȨ»á¼û£¬£¬£¬ £¬£¬£¬ÊÓ²ìÏÔʾºÚ¿ÍÓÚ2ÔÂ26ÈÕÊ״λñµÃÁËMCNAÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£LockBitÉù³ÆÔÚ3ÔÂ7ÈÕ¹¥»÷ÁËMCNA²¢¹ûÕæÁ˵ÚÒ»ÅúÊý¾ÝÑù±¾£¬£¬£¬ £¬£¬£¬»¹ÌåÏÖÈôÊÇMCNA²»½»1000ÍòÃÀÔªµÄÊê½ð£¬£¬£¬ £¬£¬£¬¾Í¹ûÕæÆä700 GBµÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£4ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬LockBitÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËËùÓÐÊý¾Ý£¬£¬£¬ £¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÏÂÔØ¡£¡£¡£¡£¡£


https://securityaffairs.com/146804/data-breach/mcna-data-breach.html


2¡¢WordPressÔÚ½ü500Íò¸öÍøÕ¾×Ô¶¯×°Öòå¼þJetpackµÄ²¹¶¡


 ¾Ý5ÔÂ30ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÊý°ÙÍò¸öÍøÕ¾ÉÏÇ¿ÖÆ×°ÖÃÁËÇå¾²²¹¶¡£¬£¬£¬ £¬£¬£¬ÒÔÐÞ¸´²å¼þJetpackÖеÄÒ»¸öÎó²î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬£¬ÔÚÄÚ²¿Çå¾²Éó¼ÆÊ±´ú·¢Ã÷JetpackµÄAPI±£´æÎó²î£¬£¬£¬ £¬£¬£¬ÍøÕ¾µÄ¿ª·¢Õß¿ÉÒÔʹÓôËÎó²îÀ´¿ØÖÆWordPress×°ÖÃÖеÄí§ÒâÎļþ¡£¡£¡£¡£¡£JetpackÏÖÔÚ×îÏÈ×Ô¶¯ÏòËùÓÐʹÓøòå¼þµÄÍøÕ¾ÍÆËÍÇå¾²²¹¶¡£¬£¬£¬ £¬£¬£¬ÏÖÔÚÒÑÔÚÁè¼Ý413Íò¸öÍøÕ¾ÉϾÙÐÐÁË×°Öᣡ£¡£¡£¡£AutomatticÒѶà´ÎʹÓÃÕâÖÖ×Ô¶¯¸üÐµķ½·¨°²ÅŲ¹¶¡¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites/


3¡¢Ñо¿Ö°Ô±·¢Ã÷±©Á¦ÆÆ½âÊÖ»úÖ¸ÎÆµÄ¹¥»÷·½·¨BrutePrint


ýÌå5ÔÂ29Èճƣ¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪBrutePrintµÄ¹¥»÷·½·¨£¬£¬£¬ £¬£¬£¬¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âÖÇÄÜÊÖ»úÉϵÄÖ¸ÎÆÀ´ÈƹýÓû§Éí·ÝÑéÖ¤¡£¡£¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕʹÓÃÁËÖÇÄÜÊÖ»úÖ¸ÎÆÈÏÖ¤(SFA)¿ò¼ÜÖеÄÁ½¸öÁãÈÕÎó²î£¬£¬£¬ £¬£¬£¬Cancel-After-Match-Fail(CAMF)ºÍMatch-After-Lock(MAL)¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²îʹÓÃÁËÈÏÖ¤¿ò¼ÜÖеÄÂß¼­Îó²î£¬£¬£¬ £¬£¬£¬Ô´ÓÚ¶ÔÖ¸ÎÆ´«¸ÐÆ÷µÄ´®ÐÐÍâÉè½Ó¿Ú£¨SPI£©ÉϵÄÖ¸ÎÆÊý¾Ý±£»£»£»£»£»¤²»Á¦¡£¡£¡£¡£¡£


https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html


4¡¢Jimbos ProtocolÔâµ½ÉÁµç´û¹¥»÷ËðʧÁè¼Ý750ÍòÃÀÔª


5ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬ £¬£¬£¬»ùÓÚArbitrumµÄDeFiÏîÄ¿Jimbos ProtocolÔâµ½ÁËÉÁµç´û¹¥»÷£¬£¬£¬ £¬£¬£¬ËðʧÁè¼Ý7500000ÃÀÔª¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ¸ÃÆ½Ì¨Æô¶¯ÆäV2ЭÒéµÄÈýÌìºó£¬£¬£¬ £¬£¬£¬ÆäʱÐí¶àÈ˸ոÕͶ×Êjimbo´ú±Ò£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÏë·¨ÇÔÈ¡ÁË4090¸öETH´ú±Ò¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷ʹÓÃÁËÒ»¸öÓëÁ÷¶¯ÐÔת»»È±·¦»¬µã¿ØÖÆÏà¹ØµÄÎó²î¡£¡£¡£¡£¡£ÔÚ±»ÈëÇÖÖ®ºó£¬£¬£¬ £¬£¬£¬jimboµÄ¼ÛǮѸËÙ±©µø£¬£¬£¬ £¬£¬£¬´Ó0.238ÃÀÔªµøÖÁ0.0001ÃÀÔª¡£¡£¡£¡£¡£Jimbos ProtocolÒÑÏò¹¥»÷Õß·¢³öÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÒªÇóËûÃÇËÍ»¹90%µÄ±»µÁ×ʽ𣬣¬£¬ £¬£¬£¬ÒÔ»»È¡²î³ØÆäÌáÆðÖ´·¨ËßËϵÄÔÊÐí¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/flash-loan-attack-on-jimbos-protocol-steals-over-75-million/


5¡¢AndroidľÂíDogeRATαװ³ÉÊ¢ÐÐÓ¦ÓÃÕë¶ÔÓ¡¶È¶à¸öÐÐÒµ


5ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬CloudSEKÅû¶ÁËAndroid¶ñÒâÈí¼þDogeRATÕë¶ÔÓ¡¶È¶à¸öÐÐÒµµÄ¹¥»÷»î¶¯£¬£¬£¬ £¬£¬£¬ÓÈÆäÊÇÒøÐÐÒµºÍÓéÀÖÒµ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉOpera Mini¡¢OpenAI ChatGOT¡¢YouTube¡¢NetflixºÍInstagramµÄµÈÕýµ±Ó¦Ó㬣¬£¬ £¬£¬£¬Í¨¹ýÉ罻ýÌåºÍÐÂÎÅÆ½Ì¨¾ÙÐзַ¢¡£¡£¡£¡£¡£×°Öú󣬣¬£¬ £¬£¬£¬Ëü»á´ÓÄ¿µÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÀýÈçÁªÏµÈË¡¢ÐÂÎźÍÒøÐÐÆ¾Ö¤¡£¡£¡£¡£¡£»£»£»£»£»¹¿ÉÓÃÓÚ¿ØÖÆÄ¿µÄ×°±¸Ö´ÐжñÒâ»î¶¯£¬£¬£¬ £¬£¬£¬Èç·¢ËÍÀ¬»øÓʼþ¡¢¾ÙÐÐδ¾­ÊÚȨµÄÖ§¸¶¡¢ÐÞ¸ÄÎļþºÍÉó²éͨ»°¼Í¼£¬£¬£¬ £¬£¬£¬ÉõÖÁ¿ÉÒÔͨ¹ý×°±¸µÄÉãÏñÍ·Ô¶³ÌÕÕÏà¡£¡£¡£¡£¡£


https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries


6¡¢JPCERTÌáÐÑÐÂÐÍľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯


JPCERTЭµ÷ÖÐÐÄÔÚ5ÔÂ29ÈÕÐû²¼Í¨¸æ£¬£¬£¬ £¬£¬£¬ÌáÐÑÐÂÐÍGolangľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2ÔÂ×óÓÒ£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÊ×ÏÈÕë¶ÔÒ»¸öWEBUI¶ÔÍ⿪·ÅµÄ·ÓÉÆ÷£¬£¬£¬ £¬£¬£¬Ê¹ÓÃÁËÎó²îÖ´ÐнÅÔ­À´×°ÖÃGobRAT¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÈëÇÖ̻¶µÄ·ÓÉÆ÷ºó£¬£¬£¬ £¬£¬£¬»á×°ÖÃÒ»¸ö¼ÓÔØ³ÌÐò¾ç±¾£¬£¬£¬ £¬£¬£¬³äµ±½»¸¶GobRATµÄ¹ÜµÀ£¬£¬£¬ £¬£¬£¬¸Ã¾ç±¾ÔÚÆô¶¯Ê±Î±×°³ÉApacheÊØ»¤Àú³Ì(apached)À´Èƹý¼ì²â¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬GobRATͨ¹ý´«Êä²ãÇå¾²(TLS)ЭÒéÓëÔ¶³ÌЧÀÍÆ÷ͨѶ£¬£¬£¬ £¬£¬£¬À´ÎüÊÕ¶à´ï22ÖÖ²î±ðµÄ¼ÓÃÜÏÂÁî¡£¡£¡£¡£¡£


https://thehackernews.com/2023/05/new-gobrat-remote-access-trojan.html