Microsoft 365ÒòECS°²ÅŹýʧȫÇò¹æÄ£ÄÚÖÐÖ¹5Сʱ
Ðû²¼Ê±¼ä 2022-07-25
¾Ý7ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖܳ¤´ï5СʱµÄMicrosoft 365È«Çò¹æÄ£ÄÚÖÐÖ¹ÊÇÓÉÆóÒµÉèÖÃЧÀÍ(ECS)°²ÅŹýʧµ¼Öµġ£¡£¡£¡£¡£¡£ECSЧÀ͵ݲÅű£´æ´úÂëȱÏÝ£¬£¬£¬£¬£¬Ó°ÏìÁËÆäÏòºó¼æÈÝÐÔ£¬£¬£¬£¬£¬µ¼ÖÂʹÓÃECSµÄЧÀÍ£¬£¬£¬£¬£¬½«ÏòÆäËùÓеÄÏàÖúͬ°é·µ»Ø²»×¼È·µÄÉèÖᣡ£¡£¡£¡£¡£Ò£²âÅú×¢£¬£¬£¬£¬£¬Ô¼ÄªÓÐ30Íò¸öºô½ÐÊܵ½Ó°Ï죬£¬£¬£¬£¬ÓÉÓÚӪҵʱ¼äÓëÓ°Ïì´°¿ÚÏàÎǺϣ¬£¬£¬£¬£¬ÑÇÌ«µØÇøÊܵ½µÄÓ°Ïì×î´ó¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ö±½Ó·ÓɺÍSkype MFAÊÇÊÜÓ°Ïì×î´óµÄЧÀÍ¡£¡£¡£¡£¡£¡£ÖÐÖ¹×îÏÈÓÚ7ÔÂ21ÈÕÆÆÏþ1:05 UTC×îÏÈ£¬£¬£¬£¬£¬µ±ÈÕÔçÉÏ6:00 UTC֮ǰ´ó²¿·ÖÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-faulty-ecs-deployment/
2¡¢¹¥»÷ÕßÔÚ°µÍøÒÔ3ÍòÃÀÔª³öÊÛ540ÍòTwitterÓû§µÄÐÅÏ¢
¾ÝýÌå7ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃûΪdevilµÄºÚ¿Í³ÆÆäʹÓÃÎó²î»á¼ûÁË5485636ÃûTwitterÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬²¢ÒÔÖÁÉÙ30000ÃÀÔªµÄ¼ÛÇ®¾ÙÐгöÊÛ¡£¡£¡£¡£¡£¡£ÓÃÓÚÍøÂçÊý¾ÝµÄÎó²îÓÚ1ÔÂ1±»Åû¶²¢ÓÚ1ÔÂ13ÈÕÐÞ¸´£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤¹¥»÷ÕßÓÃÀ´Í¨¹ýµç»°ºÅÂëºÍÓʼþÀ´»ñÈ¡í§ÒâÓû§µÄTwitter ID¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇÔÚ2021Äê12Ô¾Í×îÏÈʹÓÃÎó²îÍøÂçÊý¾Ý£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓиÐÐËȤµÄÂò¼ÒÓëËûÃǾÙÐÐÁªÏµ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬TwitterÉÐδȷÈÏ´Ë´Îй¶ÊÂÎñ£¬£¬£¬£¬£¬¶øÂô¼ÒÒÑɾ³ý¸Ã¹ã¸æ¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/133593/data-breach/twitter-leaked-data.html
3¡¢Securonix·¢Ã÷APT37ʹÓÃKonni¹¥»÷Å·ÖÞ¶à¹úµÄ»î¶¯
7ÔÂ20ÈÕ£¬£¬£¬£¬£¬Securonix³ÆÆä·¢Ã÷Á˳¯Ïʹ¥»÷ÕßAPT37ʹÓÃKonniÕë¶Ô½Ý¿ËºÍ²¨À¼µÈÅ·ÖÞ¹ú¼ÒµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ôڴ˻ÖУ¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÔ¶³Ì»á¼ûľÂíKonni£¬£¬£¬£¬£¬¹¥»÷ʼÓÚÒ»·â°üÀ¨WordÎĵµ(missile.docx)ºÍWindows¿ì½Ý·½·¨Îļþ(weapons.doc.lnk.lnk)¸½¼þµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£·¿ªLNKºó»áÖ´ÐдúÂëÀ´ÔÚDOCXÎļþÖвéÕÒbase64±àÂëµÄPowerShell¾ç±¾£¬£¬£¬£¬£¬È»ºó½¨ÉèC2ͨѶ²¢ÏÂÔØÁ½¸öÎļþ¡°weapons.doc¡±ºÍ¡°wp.vbs¡±¡£¡£¡£¡£¡£¡£ÕâЩÎļþÖ»ÊÇÓÕ¶ü£¬£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬£¬ºǫ́»á¾²Ä¬µØÔËÐÐVBSÎļþ£¬£¬£¬£¬£¬×îÖÕÏÂÔØKonni¡£¡£¡£¡£¡£¡£
https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
4¡¢Êý×ÖÇå¾²¹«Ë¾EntrustÔâµ½¹¥»÷ºóÄÚ²¿ÏµÍ³Êý¾Ý±»µÁ
ýÌå7ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬Entrust³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÄÚ²¿ÏµÍ³ÖеÄÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£EntrustÊÇÒ»¼ÒרעÓÚÔÚÏßÐÅÈκÍÉí·ÝÖÎÀíµÄÇå¾²¹«Ë¾£¬£¬£¬£¬£¬Ìṩ°üÀ¨¼ÓÃÜͨѶ¡¢Çå¾²Êý×ÖÖ§¸¶ºÍÉí·Ý֤ʵ½â¾ö¼Æ»®µÈЧÀÍ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ18ÈÕ£¬£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Ïàʶµ½Ò»¸öÖøÃûµÄÀÕË÷ÍÅ»ïÊÇÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£¡£±»µÁÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜ»áÓ°Ïì´ó×ÚʹÓÃEntrust¾ÙÐÐÉí·ÝÖÎÀíºÍÉí·ÝÑéÖ¤µÄ×éÖ¯£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹úÕþ¸®»ú¹¹£¬£¬£¬£¬£¬ÈçÄÜÔ´²¿¡¢ÁìÍÁÇå¾²²¿¡¢²ÆÎñ²¿¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿¡¢ÍËÎéÎäÊ¿ÊÂÎñ²¿ºÍũҵ²¿µÈµÈ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
5¡¢Cisco͸¶Õë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷µÄϸ½Ú
CiscoÔÚ7ÔÂ21ÈÕÅû¶ÁËÕë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£¡£¡£¡£Õâ¼ÒÈí¼þ¹«Ë¾Éú²úµÄÈí¼þ¹©ÎÚ¿ËÀ¼¶à¸ö¹ú¼Ò»ú¹¹ËùʹÓ㬣¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄÜÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬ÒԸù«Ë¾ÎªÄ¿µÄÍýÏë·¢¶¯¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËÒ»¸öÃûΪGoMetµÄ¿ªÔ´ºóÃŵÄ×Ô½ç˵±äÌ壬£¬£¬£¬£¬Ö»ÓÐÁ½Æð¼Í¼ÔÚ°¸µÄ»î¶¯Ê¹Óùý¸ÃºóÃÅ£º2020Äê¹¥»÷ÕßʹÓÃF5 BIG-IPÖÐÎó²î£¨CVE-2020-5902£©ÈëÇÖϵͳ²¢×°ÖÃÕâ¸öºóÃÅ£»£»½üÆÚ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚʹÓÃSophos FirewallÖÐÎó²î£¨CVE-2022-1040£©ºó×°ÖúóÃÅ¡£¡£¡£¡£¡£¡£
https://blog.talosintelligence.com/2022/07/attackers-target-ukraine-using-gomet.html
6¡¢SonicWalÐû²¼SQL×¢ÈëÎó²îCVE-2022-22280µÄÇ徲ͨ¸æ
SonicWallÔÚ7ÔÂ22ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬ÌáÐÑÓ°ÏìGMS£¨È«ÇòÖÎÀíϵͳ£©ºÍAnalytics On-Prem²úÆ·µÄSQL×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-22280£¬£¬£¬£¬£¬ÊǶÔSQLÏÂÁîÖÐʹÓõÄÌØÊâÔªËØµÄ²»×¼È·Öк͵¼Öµģ¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.4£¬£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤»òÓû§½»»¥¼´¿ÉʹÓᣡ£¡£¡£¡£¡£SonicWallÌåÏÖ˵£¬£¬£¬£¬£¬¸ÃÎó²îÉÐδ±»ÔÚҰʹÓ㬣¬£¬£¬£¬Ò²Ã»ÓÐÕë¶Ô´ËÎó²îµÄ¿´·¨Ö¤Êµ(PoC)¡£¡£¡£¡£¡£¡£´ËÎó²îûÓпÉÓõĽâ¾öÒªÁ죬£¬£¬£¬£¬Òò´ËSonicWallÇ¿ÁÒ½¨ÒéʹÓÃÊÜÓ°Ïì²úÆ·µÄ×éÖ¯Á¬Ã¦Éý¼¶µ½ÏìÓ¦µÄÐÞ¸´°æ±¾¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-patch-critical-sql-injection-bug-immediately/