220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶
Ðû²¼Ê±¼ä 2023-06-211¡¢220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶
¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬CrosswordÔÚ°µÍøÉÏ·¢Ã÷Á˽ü220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤£¬£¬£¬£¬£¬£¬ÆäÖÐ57%ÊôÓÚ24ËùÂÞËØ¼¯ÍÅ´óѧ¡£¡£¡£´óѧµÄλÖú͹æÄ£¶Ôй¶µÄˮƽҲÓÐÓ°Ï죬£¬£¬£¬£¬£¬Â׶صÄΣº¦Òª´óµÃ¶à£¬£¬£¬£¬£¬£¬ÓÐ506330(20%)¸öÖ¤Ê鱻й¶£¬£¬£¬£¬£¬£¬Æä´ÎÊǶ«Äϲ¿(334251£¬£¬£¬£¬£¬£¬Õ¼±È13%)ºÍËÕ¸ñÀ¼(306873£¬£¬£¬£¬£¬£¬12%)¡£¡£¡£Ñо¿Ö°Ô±»¹Í¸Â¶£¬£¬£¬£¬£¬£¬Áè¼ÝÒ»°ë£¨54%£©µÄй¿à´×ÔÓµÓÐÑо¿ÉèÊ©µÄÓ¢¹ú´óѧ£¬£¬£¬£¬£¬£¬Õþ¸®×ÊÖúµÄºËÄܺ͹ú·ÀµÈÁìÓòµÄÏîÄ¿¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£
https://www.infosecurity-magazine.com/news/millions-uk-university-credentials/
2¡¢Cyfirma·¢Ã÷DoNotαװ³ÉVPNºÍ̸ÌìÓ¦ÓõÄÌØ¹¤Èí¼þ
¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Cyfirma³ÆÆäÔÚGoogle PlayÉÏ·¢Ã÷ÁË¿ÉÒɵÄÓ¦ÓÃnSure ChatºÍiKHfaa VPN£¬£¬£¬£¬£¬£¬ËüÃǶ¼ÊÇ´ÓSecurITY IndustryÉÏ´«µÄ¡£¡£¡£½øÒ»²½µÄÆÊÎö֤ʵËüÃǾßÓжñÒâÈí¼þÌØÕ÷£¬£¬£¬£¬£¬£¬²¢±»¹éÒòÓÚÓ¡¶ÈÏà¹ØºÚ¿ÍÍÅ»ïDoNot¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°Í»ù˹̹£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÄ¿µÄ×°±¸ÍøÂçÇ鱨£¬£¬£¬£¬£¬£¬ÀýÈçλÖÃÊý¾ÝºÍÁªÏµÈËÁÐ±í¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓëÕâÁ½¿îÓ¦ÓÃÀ´×Ôͳһ¿¯ÐÐÉ̵ĵÚÈý¿îÓ¦ÓÃËÆºõûÓжñÒ⣬£¬£¬£¬£¬£¬µ«ÈÔ¿ÉÔÚGoogle PlayÉÏʹÓᣡ£¡£
https://www.cyfirma.com/outofband/donot-apt-elevates-its-tactics-by-deploying-malicious-android-apps-on-google-play-store/
3¡¢BitdefenderÅû¶Õë¶ÔmacOSµÄ¹¤¾ß°üµÄ×é¼þµÄϸ½Ú
BitdefenderÔÚ6ÔÂ16ÈÕ͸¶Æä·¢Ã÷ÁËÒ»×é¾ßÓкóÃŹ¦Ð§µÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬²¢ÍƶÏÊÇÕë¶ÔApple macOSϵͳµÄÖØ´ó¹¤¾ß°üµÄÒ»²¿·Ö¡£¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬Ñù±¾µÄ´ó²¿·ÖÈÔδ±»·¢Ã÷¡£¡£¡£Ñо¿Ö°Ô±¹²ÆÊÎöÁËÉÏ´«µ½VirusTotalµÄËĸöÑù±¾£¬£¬£¬£¬£¬£¬ÆäÖÐ×îÔçµÄÓÚ4ÔÂ18ÈÕÓÉÄäÃûÓû§ÉÏ´«¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâÎļþ»®·ÖÊÇÒ»¸öͨÓõÄPythonºóÃÅshared.dat£¬£¬£¬£¬£¬£¬Ò»¸öǿʢµÄºóÃÅsh.py£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸öFAT¶þ½øÖÆÎļþxcc¡£¡£¡£Bitdefender½«Python×é¼þ¸ú×ÙΪJokerSpy¡£¡£¡£
https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/
4¡¢eSentire¼ì²âµ½Ê¹ÓÃOnlyFansÒ³Ãæ·Ö·¢DcRATµÄ»î¶¯
6ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬eSentire³ÆÆä¼ì²âµ½ÁËʹÓÃαÔìµÄOnlyFansµÈÓÕ¶ü·Ö·¢DcRATµÄ»î¶¯¡£¡£¡£¸Ã»î¶¯×Ô1ÔÂÒÔÀ´Ò»Ö±ÔÚ»îÔ¾£¬£¬£¬£¬£¬£¬Èö²¥°üÀ¨VBScript¼ÓÔØ³ÌÐòµÄZIPÎļþ£¬£¬£¬£¬£¬£¬È»ºóÓÕʹĿµÄÊÖ¶¯Ö´ÐС£¡£¡£VBScript¼ÓÔØ³ÌÐòÆô¶¯Ê±£¬£¬£¬£¬£¬£¬»áʹÓÃWMI¼ì²é²Ù×÷ϵͳ¼Ü¹¹²¢ÌìÉú32λÀú³Ì¡£¡£¡£Õâʹ¶ñÒâÈí¼þÄܹ»»á¼ûDynamicWrapperX¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬ÃûΪBinaryDataµÄpayload»á±»¼ÓÔØµ½Äڴ棬£¬£¬£¬£¬£¬²¢×¢ÈëRegAsm.exeÀú³Ì¡£¡£¡£×¢ÈëµÄpayloadÊÇDcRAT£¬£¬£¬£¬£¬£¬ËüÊÇAsyncRATµÄÐ޸İ汾£¬£¬£¬£¬£¬£¬¿ÉÔÚGitHubÉÏÃâ·Ñ»ñµÃ¡£¡£¡£
https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content
5¡¢Ñо¿Ö°Ô±Åû¶΢ÈíAzure ADÉí·ÝÑéÖ¤Îó²înOAuth
¾ÝýÌå6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬DescopeÅû¶ÁËMicrosoft Azure AD OAuthÓ¦ÓóÌÐòÖеÄÒ»¸öÑÏÖØµÄ¹ýʧÉèÖᣡ£¡£Ëü±»³ÆÎªnOAuth£¬£¬£¬£¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤Îó²î¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÐÞ¸ÄAzure ADÕÊ»§Öеĵç×ÓÓʼþÊôÐÔ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃËûÃÇÏëҪð³äµÄÄ¿µÄµÄµç×ÓÓʼþµØµãÀ´Ê¹ÓÃÒ»¼üʽµÄ¡°Ê¹ÓÃMicrosoftµÇ¼¡±¹¦Ð§£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«½Ó»á¼Æ»§¡£¡£¡£Microsoft½«¸ÃÎÊÌâÐÎòΪ"Azure ADÓ¦ÓóÌÐòÖÐʹÓõIJ»Çå¾²µÄ·´Ä£Ê½"£¬£¬£¬£¬£¬£¬ÒÑͨ¹ýÐû²¼»º½â²½·¥½â¾öÁËÕâÒ»ÎÊÌâ¡£¡£¡£
https://www.securityweek.com/researchers-flag-account-takeover-flaw-in-microsoft-azure-ad-oauth-apps/
6¡¢Check PointÐû²¼ÏÖÔÚÈÔÔÚ¾ÙÐеĴ¹ÂڻµÄ±¨¸æ
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Check Point Research(CPR)Ðû²¼±¨¸æ³Æ¼ì²âµ½ÁËÒ»¸öÕýÔÚ¾ÙÐеĴ¹Âڻ¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁ˶à¸ö°æ±¾µÄÓʼþºÍһЩ²î±ðµÄHTMLÄ£°å¡£¡£¡£ÎªÁËʹµÇÂ¼Ò³Ãæ¿´ÆðÀ´¸üÕýµ±£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾÔÚ±íµ¥ÖÐÌîдÁËÄ¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬ÕâÊÇÓ²±àÂëÔÚHTMLÎļþÖеġ£¡£¡£Ò»µ©Ä¿µÄÊäÈëÁËÆ¾Ö¤²¢ÊÔͼµÇ¼£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¾Í»áÖ±½Ó·¢Ë͵½¹¥»÷ÕßµÄÓÊÏäÀï¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¶ÔÕýµ±Ð§À͵ÄʹÓÃÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬ÕâÔöÌíÁ˵ÖÓù´ËÀ๥»÷µÄÄÑÌâ¡£¡£¡£
https://blog.checkpoint.com/security/sign-in-to-continue-and-suffer-attackers-abusing-legitimate-services-for-credential-theft/


¾©¹«Íø°²±¸11010802024551ºÅ