TruthFinderºÍInstant Checkmateй¶2000¶àÍòÕË»§ÐÅÏ¢
Ðû²¼Ê±¼ä 2023-02-06
¾ÝýÌå2ÔÂ5ÈÕ±¨µÀ£¬£¬PeopleConnectµÄÅä¾°ÊÓ²ìЧÀÍTruthFinderºÍInstant Checkmate±¬·¢Êý¾Ýй¶¡£¡£1ÔÂ21ÈÕ£¬£¬ºÚ¿ÍÂÛ̳BreachedµÄÒ»Ãû³ÉԱй¶ÁË×èÖ¹2019Äê4ÔÂ16ÈÕʹÓÃЧÀ͵Ä2022ÍòTruthFinderºÍInstant Checkmate¿Í»§µÄÊý¾Ý¡£¡£±»µÁÊý¾Ý×÷ΪÁ½¸ö½ö°üÀ¨¿Í»§ÐÅÏ¢µÄ2.9 GB CSVÎļþ¹²Ïí£¬£¬ÌáÈ¡ºóÕû¸öÊý¾Ý¼¯¸ß´ï7 GB£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢ÃÜÂëhashºÍÃÜÂëÖØÖÃÁîÅÆµÈ¡£¡£PeopleConnectÒѶԴËÊÂÕö¿ªÊӲ죬£¬²¢È·ÈϸÃÃûµ¥ÊǼ¸Äêǰ½¨ÉèµÄ£¬£¬Ëƺõ°üÀ¨ÁË2011ÄêÖÁ2019Äêʱ´ú½¨ÉèµÄËùÓÐÕË»§¡£¡£
https://www.hackread.com/instant-checkmate-truthfinder-data-breach/
2¡¢ÐµÄAndroidľÂíPixPirateÖ÷ÒªÕë¶Ô°ÍÎ÷µÄ½ðÈÚ»ú¹¹
2ÔÂ3ÈÕ£¬£¬Cleafy±¨¸æÆäÔÚ2022Äêµ×ÖÁ2023ÄêÍ··¢Ã÷ÁËÒ»ÖÖÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄ¶ñÒâÈí¼þPixPirate¡£¡£PixPirateÊôÓÚ×îÐÂÒ»´úµÄAndroidÒøÐÐľÂí£¬£¬ÓÉÓÚËü¿ÉÒÔÖ´ÐÐATS£¨×Ô¶¯×ªÕËϵͳ£©£¬£¬¹¥»÷ÕßÄܹ»Í¨¹ý¶à¼Ò°ÍÎ÷ÒøÐнÓÄɵļ´Ê±Ö§¸¶Æ½Ì¨Pix×Ô¶¯¾ÙÐжñÒâ»ã¿î¡£¡£³ýÁËÇÔÈ¡Óû§ÔÚÒøÐÐÓ¦ÓÃÉÏÊäÈëµÄÃÜÂëÍ⣬£¬¹¥»÷Õß»¹Ê¹ÓÃAuto.js¿ò¼Ü¾ÙÐдúÂë»ìÏýºÍ¼ÓÃÜÀ´ÈƹýÄæÏò¹¤³ÌµÄÆÊÎö¡£¡£
https://www.cleafy.com/cleafy-labs/pixpirate-a-new-brazilian-banking-trojan
3¡¢Ó¡¶È×î´ó»õÔ˹«Ë¾FR8ЧÀÍÆ÷ÉèÖùýʧй¶140GBÊý¾Ý
ýÌå2ÔÂ4ÈÕ͸¶£¬£¬Ó¡¶È×î´óµÄ¿¨³µÔËÊäЧÀ͹«Ë¾FR8ÒòЧÀÍÆ÷ÉèÖùýʧй¶ÁË140 GBµÄÊý¾Ý¡£¡£1ÔÂ30ÈÕ£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏËÑË÷ÉèÖùýʧµÄÔÆÊý¾Ý¿âʱ·¢Ã÷Á˸ÃЧÀÍÆ÷¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°¿Í»§ºÍÔ±¹¤µÄÐÕÃû¡¢µç»°¡¢·¢Æ±ºÍ¸¶¿îÃ÷ϸµÈÃô¸ÐÐÅÏ¢¡£¡£ÏÖÔÚ£¬£¬¸ÃÉèÖùýʧµÄЧÀÍÆ÷ÈÔ´¦ÓÚ̻¶״̬£¬£¬FR8Ò²²¢Î´»ØÓ¦¸ÃÊÂÎñ¡£¡£ÓÉÓÚЧÀÍÆ÷ÊÇʵʱµÄÇҸù«Ë¾Ò»Ö±Ã»ÓлØÓ¦£¬£¬ÈôÊÇÊý¾ÝÂäÈë¶ñÒâµÄµÚÈý·½ÊÖÖУ¬£¬±»ÎóÓúÍÀÄÓõĿÉÄÜÐԺܴ󡣡£
https://www.hackread.com/india-truck-brokerage-company-data-leak/
4¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔESXiЧÀÍÆ÷µÄ´ó¹æÄ£ESXiArgsÀÕË÷¹¥»÷
¾Ý2ÔÂ3ÈÕ±¨µÀ£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËʹÓÃVMware ESXiЧÀÍÆ÷ÖÐδÐÞ¸´µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î×°ÖÃÐÂÀÕË÷Èí¼þESXiArgsµÄ»î¶¯¡£¡£Îó²î×·×ÙΪCVE-2021-21974£¬£¬ÓÉOpenSLPЧÀÍÖеĶÑÒç³öÒýÆð£¬£¬¿É±»ÓÃÀ´Ö´ÐеÍÖØÆ¯ºó¹¥»÷¡£¡£OVHcloud͸¶£¬£¬¸Ã»î¶¯Í¨¹ýOpenSLP¶Ë¿Ú(427)Õë¶Ô7.0 U3i֮ǰ°æ±¾µÄESXiЧÀÍÆ÷¡£¡£Æ¾Ö¤ShodanËÑË÷µÄÊý¾Ý£¬£¬È«ÇòÖÁÉÙÓÐ120̨VMware ESXiЧÀÍÆ÷ÒÑÔâµ½¹¥»÷¡£¡£Õë¶Ô¸Ã»î¶¯µÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£
https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
5¡¢ÒÁÀʺڿÍÍÅ»ïOilRigʹÓÃкóÃŹ¥»÷Öж«µÄÕþ¸®»ú¹¹
Trend MicroÔÚ2ÔÂ2ÈÕÅû¶ÁËÒÁÀÊOilRigÕë¶ÔÖж«Õþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£2022Äê12Ô£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö¿ÉÖ´ÐÐÎļþ£¨¼ì²âΪTrojan.MSIL.REDCAP.AD£©ÒÑÔÚ¶ą̀ÅÌËã»úÉÏ·Ö·¢²¢Ö´ÐС£¡£ÆÊÎö·¢Ã÷¸Ã»î¶¯ÓëAPT×éÖ¯OilRig£¨APT34£©Óйأ¬£¬Ö÷ҪĿµÄÊÇÇÔÈ¡Óû§µÄƾ֤¡£¡£¸Ã»î¶¯Ê¼ÓÚÒ»¸ö»ùÓÚ.NETµÄÖ²Èë³ÌÐò£¬£¬ÆäʹÃüÊÇ·Ö·¢Ëĸö²î±ðµÄÎļþ¡£¡£µÚ¶þ½×¶Î»¹Ê¹ÓÃÁËÒ»¸öDLLÎļþ£¬£¬ÄÜ´ÓÓòÓû§ºÍÍâµØÕÊ»§Öлñȡƾ֤¡£¡£±ðµÄ£¬£¬´Ë´Î»î¶¯ÖеĺóÃÅ¿ÉʹÓñ»Ñ¬È¾µÄÓÊÏäÕÊ»§½«ÇÔÈ¡µÄÊý¾Ý´ÓÄÚ²¿ÓÊÏä·¢Ë͵½¹¥»÷ÕßµÄÓʼþÕÊ»§¡£¡£
https://www.trendmicro.com/en_us/research/23/b/new-apt34-malware-targets-the-middle-east.html
6¡¢CiscoÐÞ¸´IOxÓ¦ÓÃÖеÄÏÂÁî×¢ÈëÎó²îCVE-2023-20076
2ÔÂ3ÈÕ£¬£¬CiscoÐû²¼Çå¾²¸üУ¬£¬ÐÞ¸´ÁËIOxÓ¦ÓóÌÐòÍйÜÇéÐÎÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20076£©¡£¡£¸ÃÎó²îÊÇÓÉÓÚ¼¤»îÓ¦ÓóÌÐòʱ´«ÈëµÄ²ÎÊýδ»ñµÃÍêÈ«µÄ¾»»¯µ¼Öµģ¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆµÄ¼¤»îpayloadÎļþÔÚCisco IOxÓ¦ÓóÌÐòÍйÜÇéÐÎÖÐ×°Öúͼ¤»îÓ¦ÓóÌÐòÀ´Ê¹ÓôËÎó²î¡£¡£ÀÖ³ÉʹÓøÃÎó²îºó£¬£¬¿ÉÒÔÔڵײãÖ÷»ú²Ù×÷ϵͳÉÏÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¸ÃÎó²îÓ°ÏìÁËÆôÓÃCisco IOx¹¦Ð§²¢ÇÒ²»Ö§³Ö±¾»ú dockerµÄ×°±¸¡£¡£
https://securityaffairs.com/141743/security/cisco-bug-iox-application-hosting-environment.html


¾©¹«Íø°²±¸11010802024551ºÅ