ºÚ¿ÍÉù³ÆÒÑÇÔÈ¡µçÐŹ«Ë¾T-MobileÔ¼1ÒÚ¿Í»§µÄÐÅÏ¢£ºFortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú

Ðû²¼Ê±¼ä 2021-08-16

T-Mobile.jpg1.jpg


  ¹¥»÷ÕßÉù³ÆÔÚÁ½ÖÜǰÈëÇÖÁËT-MobileµÄÓÃÓÚÉú²úºÍ¿ª·¢µÄЧÀÍÆ÷£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸ö°üÀ¨Á˿ͻ§ÐÅÏ¢µÄOracleÊý¾Ý¿âЧÀÍÆ÷¡£¡£¡£ ¡£¡£´Ë´Îй¶ÁËT-MobileµÄ1ÒÚ¸ö¿Í»§Ô¼106GBµÄÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨IMSI¡¢IMEI¡¢µç»°ºÅÂë¡¢¿Í»§ÐÕÃû¡¢Çå¾²PIN¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëºÍ³öÉúÈÕÆÚµÈÐÅÏ¢¡£¡£¡£ ¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ£¬£¬£¬£¬£¬´Ë´ÎºÚ¿ÍµÄ¹¥»÷ÐÐΪ¿ÉÄÜÊÇΪÁËÆÆËðÃÀ¹úµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÃÀ¹úÔøÓÚ2019Äê°ó¼Ü²¢ÕÛÄ¥ÁËJohn Erin Binns(CIA Raven-1)¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-data-of-100-million-t-mobile-customers/

FortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú.png


FortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú


  FortbridgeµÄÑо¿Ö°Ô±Åû¶ÁËÍøÂçÍÐ¹ÜÆ½Ì¨cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚÕë¶ÔcPanelºÍWHMµÄºÚºÐÉøÍ¸²âÊÔÖз¢Ã÷ÁËÕâЩÎó²î£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÿÉÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£ ¡£¡£ÆäÖÐÒ»¸öÎó²îΪ¾­ÏúÉÌÕÊ»§ÖеÄXMLÍⲿʵÌå(XXE)Îó²î£¬£¬£¬£¬£¬ÊÇÓÉÓÚ¸ÃÕÊ»§ÓµÓÐÒÔXML»òXLFÃûÌñ༭ºÍÌí¼ÓÇøÓòÉèÖÃȨÏÞµ¼Öµġ£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹Åû¶ÁËÒ»¸ö´æ´¢ÐÍXSSÎó²îºÍCSRFÎó²î¡£¡£¡£ ¡£¡£µ«ÏÖÔÚ£¬£¬£¬£¬£¬¹©Ó¦ÉÌÖ»ÐÞ¸´ÁËXXEÎó²î£¬£¬£¬£¬£¬²¢¾Ü¾øÐÞ¸´ÆäËüÎó²î¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2021/08/14/numerous-vulnerabilities-spotted-in-cpanel-and-whm-web-hosting-platform/


Unit42½üÆÚ·¢Ã÷´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ.png


Unit42½üÆÚ·¢Ã÷´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ


  Unit42µÄÑо¿Ö°Ô±½üÆÚ·¢Ã÷ÁË´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ¡£¡£¡£ ¡£¡£¹¥»÷Õß½«´¹ÂÚÒ³ÃæÒþ²ØÔÚCAPTCHAÖ®ºó¿É±ÜÃâÇå¾²ÅÀ³æ¼ì²âµ½¶ñÒâÄÚÈÝ£¬£¬£¬£¬£¬²¢¿ÉÒÔʹ´¹ÂÚµÇÂ¼Ò³Ãæ¿´ÆðÀ´Ô½·¢Õýµ±¡£¡£¡£ ¡£¡£ËäÈ»Õâ²¢·Ç×îеÄÊÖÒÕ£¬£¬£¬£¬£¬µ«ÔÚ½üÆÚÔ½À´Ô½Ê¢ÐУºÉϸöÔÂUnit42ÔÚ4088¸ö¸¶·ÑµÄÓòÖз¢Ã÷ÁË7572¸ö½ÓÄÉÁË»ìÏýÒªÁìµÄ¶ñÒâURL£¬£¬£¬£¬£¬Ò²¾ÍÊÇ˵ƽ¾ùÌìÌìÓÐ529¸öʹÓÃÁËCAPTCHAµÄ¶ñÒâ URL¡£¡£¡£ ¡£¡£³ýÁË´¹ÂÚ¹¥»÷Ö®Í⣬£¬£¬£¬£¬Ê¹ÓÃCAPTCHAµÄÕ©Æ­»î¶¯Ò²ÔÚÔöÌí¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/captcha-protected-phishing/


Ñо¿ÍŶӷ¢Ã÷AggahÕë¶ÔÑÇÖÞÖÆÔìÒµµÄÓã²æÊ½´¹Âڻ.png


Ñо¿ÍŶӷ¢Ã÷AggahÕë¶ÔÑÇÖÞÖÆÔìÒµµÄÓã²æÊ½´¹Âڻ


  AnomaliµÄÑо¿ÍŶӷ¢Ã÷ÁËʼÓÚ2021Äê7ÔÂÉÏÑ®µÄÓã²æÊ½ÍøÂç´¹Âڻ£¬£¬£¬£¬£¬Õë¶ÔÕû¸öÑÇÖÞµÄÖÆÔìÒµ¡£¡£¡£ ¡£¡£Aggah×îÔçÓÚ2019Äê3ÔÂÓÉUnit 42µÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°¢À­²®ÁªºÏÇõ³¤¹ú(UAE)µÄ×éÖ¯¡£¡£¡£ ¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬£¬¹¥»÷Õßαװ³ÉÓ¢¹úFoodHub.co.uk·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ÓÕʹÓû§µÇ¼Òѱ»ÈëÇÖµÄmail.hoteloscar.in/imagesÍøÕ¾£¬£¬£¬£¬£¬²¢·Ö·¢Warzone RAT¡£¡£¡£ ¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬Aggah×îÐµĹ¥»÷Ä¿µÄ°üÀ¨Öйų́ÍåµÄÖÆÔ칫˾Fon-starºÍ¹¤³Ì¹«Ë¾FomoTech£¬£¬£¬£¬£¬ÒÔ¼°º«¹úµÄµçÁ¦¹«Ë¾ÏÖ´úµçÆø¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry


Check PointÐû²¼ºÚ¿ÍÍÅ»ïIndra¹¥»÷»î¶¯.jpg


Check PointÐû²¼ºÚ¿ÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


  Check PointÐû²¼ÁËÓйغڿÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË2021Äê7ÔÂ9ÈÕÖÁ10ÈÕ¶ÔÒÁÀÊ»ð³µÏµÍ³µÄÍøÂç¹¥»÷Áôϵĺۼ££¬£¬£¬£¬£¬²¢½«´Ë´Î¹¥»÷¹éÒòÓÚÒ»¸ö×Ô³ÆÎªIndraµÄºÚ¿ÍÍŻ¡£¡£ ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬¸ÃÍŻﻹÓë2019ÄêºÍ2020ÄêÕë¶ÔÐðÀûÑǶà¼Ò¹«Ë¾µÄ¹¥»÷ÓйØ£¬£¬£¬£¬£¬°üÀ¨Katerji GroupºÍArfada Petroleum¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÕâЩÄ꿪·¢ÁËÖÁÉÙ3¸ö²î±ð°æ±¾µÄwiper£¬£¬£¬£¬£¬»®·Ö³ÆÎªMeteor¡¢StardustºÍComet£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹ÏêϸÐÎòÁ˹¥»÷ÕßʹÓõŤ¾ßºÍTTPs¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/


KasperskyÐû²¼2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ.jpg


KasperskyÐû²¼2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


  KasperskyÐû²¼ÁË2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¸Ã±¨¸æÆÊÎöÁË2021ÄêQ2µÄ¶à¸öÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯£¬£¬£¬£¬£¬°üÀ¨ÓëCycldekÍÅ»ïÏà¹ØµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬ÔÚÒ°ÍâʹÓÃ×ÀÃæ´°¿ÚÖÎÀíÆ÷ÖÐ0dayµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬TunnelSnakeÐж¯£¬£¬£¬£¬£¬PuzzleMaker»î¶¯ºÍFerocious KittenÍÅ»ïÏà¹Ø»î¶¯µÈ¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬±¨¸æ»¹ÆÊÎöÁ˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þJSWormºÍBlack Kingdom¡¢ÒøÐÐľÂíGootkitºÍBizarro¡¢APKPureÓ¦ÓÃÖжñÒâ´úÂëºÍBrowser lockersµÈ¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º

https://securelist.com/it-threat-evolution-q2-2021/103597/