¼ÓÄôó5¼Ò´óÐÍÒøÐÐÒòδ֪Ե¹ÊÔÓÉЧÀÍÖÐÖ¹ÊýСʱ
Ðû²¼Ê±¼ä 2022-02-21¼ÓÄôó5¼Ò´óÐÍÒøÐÐÒòδ֪Ե¹ÊÔÓÉЧÀÍÖÐÖ¹ÊýСʱ
¾ÝýÌå2ÔÂ17ÈÕ±¨µÀ£¬£¬£¬¼ÓÄôó5¼Ò´óÐÍÒøÐÐЧÀÍÖÐÖ¹ÊýСʱ¡£¡£¡£¡£¡£¡£ÖÐÖ¹±¬·¢ÔÚ±¾ÖÜÈýÏÂÖç5µãµ½6µãÖ®¼ä£¬£¬£¬°üÀ¨¼ÓÄôó»Ê¼ÒÒøÐУ¨RBC£©¡¢ÃÉÌØÀû¶ûÒøÐУ¨BMO£©¡¢·áÒµÒøÐС¢µÀÃ÷ÒøÐУ¨TD£©ºÍ¼ÓÄôóµÛ¹úÉÌÒµÒøÐУ¨CIBC£©¡£¡£¡£¡£¡£¡£RBC³ÆÓöµ½ÁËÊÖÒÕÎÊÌ⣬£¬£¬BMOÈ«Çò»ã¿îЧÀÍÈ«Ìì¹Ø±Õ£¬£¬£¬CIBCÉÐδÈÏ¿ÉËûÃǵÄÍøÉÏÒøÐб£´æÎÊÌ⣬£¬£¬TD BankµÄÒÆ¶¯ÒøÐÐÎÞ·¨»á¼ûµ«Ðû²¼ÉùÃ÷³ÆÃ»ÓÐÓöµ½ÈκÎÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÂÎñµÄÔµ¹ÊÔÓÉÉв»Ã÷È·¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/canadas-major-banks-go-offline-in-mysterious-hours-long-outage/
FBI¡¢NSAºÍCISAÐû²¼¶íÂÞ˹ºÚ¿ÍÃé×¼ÃÀ¹ú¹ú·ÀÐÐÒµµÄͨ¸æ
2ÔÂ16ÈÕ£¬£¬£¬ÃÀ¹úFBI¡¢NSAºÍCISAÁªºÏÐû²¼Á˶íÂÞ˹ºÚ¿ÍÃé×¼ÃÀ¹ú¹ú·ÀÐÐÒµµÄͨ¸æ¡£¡£¡£¡£¡£¡£Í¨¸æ³Æ£¬£¬£¬¸Ã»î¶¯×îÏÈÓÚ2020Äê1Ô£¬£¬£¬Ê¹ÓÃÁËÓã²æÊ½ÍøÂç´¹ÂÚ¡¢Æ¾Ö¤ÍøÂç¡¢±©Á¦ÆÆ½âµÈÊÖÒÕºÍ VPN ×°±¸ÖеÄÒÑÖªÎó²î£¬£¬£¬¹¥»÷¹ú¼ÒÅú×¼µÄ¹ú·À³Ð°üÉÌ(CDC)£¬£¬£¬ÒÔ»ñÈ¡Óë¹ú·ÀºÍÇ鱨ÁìÓòÓйصÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÃÓÚ³õʼ»á¼ûºÍȨÏÞÌáÉýµÄÎó²î°üÀ¨CVE-2018-13379¡¢CVE-2020-0688ºÍCVE-2020-17144¡£¡£¡£¡£¡£¡£
https://www.cisa.gov/news/2022/02/16/new-cybersecurity-advisory-protecting-cleared-defense-contractor-networks-against
Egress³Æ×Ô2Ô·Ýð³äLinkedInµÄ´¹ÂÚ¹¥»÷ÔöÌí232%
¾Ý2ÔÂ16ÈÕ±¨µÀ£¬£¬£¬Egress·¢Ã÷×Ô2ÔÂ1ÈÕÒÔÀ´£¬£¬£¬Ã°³äLinkedInµÄ´¹ÂÚ¹¥»÷ÔöÌíÁË232%¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁË¿´ÆðÀ´ºÜÊÇÕæÊµµÄHTMLÄ£°å£¬£¬£¬ÒÔ¼°´øÓÐLinkedInÃû³ÆµÄÓʼþµØµã£¬£¬£¬Ö¼ÔÚÓÕʹÓû§µã»÷´¹ÂÚÁ´½Ó²¢ÊäÈëÆ¾Ö¤¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÓ¢¹úºÍ±±ÃÀµØÇø£¬£¬£¬Ê¹ÓÃÁËOutlook 365ƽ̨£¬£¬£¬²¢¿ÉÒÔÈÆ¹ý¹Å°åµÄµç×ÓÓʼþÇå¾²·ÀÓù»úÖÆ¡£¡£¡£¡£¡£¡£
https://www.egress.com/resources/cybersecurity-information/phishing/linkedin-phishing-attacks
ÃÀ¹úÁ½¼ÒÒ½ÔºSSHºÍFCHCй¶½ü15Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢
ýÌå2ÔÂ16Èճƣ¬£¬£¬ÃÀ¹úÒÁÀûŵÒÁÖݽü150000¸öסÃñµÄPHIÐÅϢй¶¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Ô´ÓÚÁ½¼ÒÒ½Ôº£ºÖ¥¼Ó¸çµÄÄϰ¶Ò½Ôº(SSH)³ÆËûÃÇÓÚ2021Äê12ÔÂ10ÈÕ·¢Ã÷¿ÉÒɻ£¬£¬£¬¾ÊÓ²ìÈ·¶¨½ü116000¸ö»¼ÕߺÍÔ±¹¤µÄÐÅϢй¶£»£»£»ÒÁÀûŵÒÁÖݹþάµÄÒ½ÔºFCHCÔÚ2021Äê11ÔÂ18ÈÕ×óÓÒÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µ«Ö±µ½11ÔÂ30Èղŷ¢Ã÷Êý¾Ýй¶£¬£¬£¬Éæ¼°31000¸ö»¼Õß¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬SSH³Æ½«ÎªËùÓÐÊÜÓ°ÏìµÄסÃñÌṩÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/healthcare-data-breaches-impact/
CiscoÐÞ¸´ÆäÓʼþÇå¾²×°±¸ÖÐDoSÎó²îCVE-2022-20653
CiscoÔÚ2ÔÂ16ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´ÆäÓʼþÇå¾²×°±¸ÖÐDoSÎó²î£¨CVE-2022-20653£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚAsyncOSÈí¼þµÄ»ùÓÚDNSµÄÃüÃûʵÌåÉí·ÝÑéÖ¤(DANE)×é¼þÖУ¬£¬£¬ÊÇÓÉÓÚ¶ÔDNSÃû³ÆÆÊÎöµÄ¹ýʧ´¦Öóͷ£È±·¦µ¼Öµġ£¡£¡£¡£¡£¡£CiscoÐû²¼µÄͨ¸æ³Æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÊâÃûÌõĵç×ÓÓʼþÀ´Ê¹ÓôËÎó²î£¬£¬£¬ÀÖ³ÉʹÓÿɵ¼ÖÂÎÞ·¨»á¼ûÖÎÀí½çÃæ»ò´¦Öóͷ£ÌØÁíÍâÓʼþÐÂÎÅ£¬£¬£¬´Ó¶ø´¥·¢DoS¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisco-bug-can-let-hackers-crash-cisco-secure-email-gateways/
CrowdStrikeÐû²¼2021ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
2ÔÂ15ÈÕ£¬£¬£¬CrowdStrikeÐû²¼ÁË2021ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÓëÀÕË÷Èí¼þÏà¹ØµÄÊý¾Ýй¶ÔÚ2021Äêͬ±ÈÔöÌíÁË82%£¬£¬£¬´Ó1474ÆðÉÏÉýµ½2686Æð£»£»£»62% µÄ¹¥»÷ûÓÐʹÓõ½¶ñÒâÈí¼þ£»£»£»×îÒýÈËעĿµÄÎó²îÊÇLog4Shell£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÆä×¢ÈëJava´úÂ룻£»£»Ê¹ÓÃÔÆÐ§À͵Ĺ¥»÷»î¶¯Ôö¶à£»£»£»Ð·ºÆðÁË21¸öºÚ¿ÍÍŻ£»£»½»»¥ÈëÇֻÔöÌí45%£»£»£»¹©Ó¦µÄƽ¾ùʱ³¤Îª1Сʱ38·ÖÖÓ¡£¡£¡£¡£¡£¡£
https://www.crowdstrike.com/global-threat-report/
Çå¾²¹¤¾ß
Unredacter
¸Ã¹¤¾ß¿É´ÓÄ£ºýµÄÏñËØ»¯Í¼ÏñÖÐÖØÐÞÎı¾¡£¡£¡£¡£¡£¡£
https://github.com/bishopfox/unredacter
Macrome
ÓÃÓÚºì¶ÓºÍÆÊÎöʦµÄ Excel ºêÎĵµÔĶÁÆ÷/±àдÆ÷¡£¡£¡£¡£¡£¡£
https://github.com/michaelweber/Macrome
FakeLogonScreen
ÊÇÒ»¸öαÔì Windows µÇ¼ÆÁÄ»ÒÔ»ñÈ¡Óû§ÃÜÂëµÄÊÊÓóÌÐò¡£¡£¡£¡£¡£¡£
https://github.com/bitsadmin/fakelogonscreen
WELA
Windows ÊÂÎñÈÕÖ¾ÆÊÎöÆ÷£¬£¬£¬×î´ó¹¦Ð§Êǽ¨ÉèÒ×ÓÚÆÊÎöµÄµÇ¼ʱ¼äÏߣ¬£¬£¬ÒÔ×ÊÖú¿ìËÙȡ֤ºÍÊÂÎñÏìÓ¦¡£¡£¡£¡£¡£¡£
https://github.com/Yamato-Security/WELA/
jwt-hack
ÊÇÓÃÓÚ¶ÔJWT¾ÙÐкڿÍ/Çå¾²²âÊԵŤ¾ß¡£¡£¡£¡£¡£¡£
https://github.com/hahwul/jwt-hack/
Çå¾²ÆÊÎö
Mozilla ÖÒÑÔ Chrome¡¢Firefox '100' Óû§ÊðÀí¿ÉÄÜ»áÆÆËðÍøÕ¾
https://www.bleepingcomputer.com/news/software/mozilla-warns-chrome-firefox-100-user-agents-may-break-sites/
Å·ÃËÒþ˽î¿Ïµ»ú¹¹Ï£Íûեȡ Pegasus ÌØ¹¤Èí¼þ
https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/
FBI ÖÒÑÔ BEC ¹¥»÷ÕßÔÚÐéÄâ¾Û»áÖÐð³ä CEO
https://www.bleepingcomputer.com/news/security/fbi-warns-of-bec-attackers-impersonating-ceos-in-virtual-meetings/
Á¢ÌÕÍðºÍ²¨À¼Ðû²¼ÍøÂç¹¥»÷ÖÒÑÔ
https://www.infosecurity-magazine.com/news/lithuania-poland-cyber-attack/
¹ú¼ÊºìÊ®×ÖίԱ»áÌåÏÖºÚ¿ÍʹÓà Zoho Îó²îÈëÇÖÆäÍøÂç
https://www.bleepingcomputer.com/news/security/red-cross-state-hackers-breached-our-network-using-zoho-bug/
Microsoft£ºÇø¿éÁ´Éϵġ°Ice phishing¡±
https://www.microsoft.com/security/blog/2022/02/16/ice-phishing-on-the-blockchain/