º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-281¡¢º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
¾ÝýÌå3ÔÂ23ÈÕ±¨µÀ£¬£¬º«¹ú×î´óÃÀ×±ÁìÓòµÄÉ罻ƽ̨PowderRoomÒòÉèÖùýʧй¶½ü100ÍòÓû§µÄÐÅÏ¢¡£¡£12ÔÂ15ÈÕ£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄÊý¾Ý¿â£¬£¬ÆäÖаüÀ¨½ü140GBÊý¾Ý¡£¡£Éæ¼°Óû§ÐÕÃû¡¢µç»°ºÅÂëºÍ¼ÒÍ¥µØµã£¬£¬ÒÔ¼°ÓÃÓÚ»á¼û¸ÃÍøÕ¾µÄÓû§×°±¸ºÍä¯ÀÀÆ÷µÄÔªÊý¾Ý¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÒ»°ÙÍò¸öÓÃÓÚÉí·ÝÑéÖ¤ºÍ»á¼ûÍøÕ¾µÄÁîÅÆ¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÊý¾ÝÖ´Ðд¹ÂÚ¹¥»÷ºÍ×°±¸Ð®ÖÆ£¬£¬¾ÙÐÐδ¾ÊÚȨµÄ¹ºÖûò¸ú×ÙÓû§¡£¡£ÏÖÔÚ£¬£¬Ð¹Â¶µÄÊý¾ÝÒѾ±»±£»£»¤ÆðÀ´¡£¡£
https://cybernews.com/security/powder-room-data-leak/
2¡¢²¨¶àÀè¸÷PRASAÔâµ½Vice SocietyÍÅ»ïµÄÀÕË÷¹¥»÷
ýÌå3ÔÂ26Èճƣ¬£¬²¨¶àÀè¸÷¶É²ÛºÍÏÂË®µÀÖÎÀí¾Ö(PRASA)Ôâµ½ÁËVice SocietyµÄÀÕË÷¹¥»÷¡£¡£¸Ã¹¥»÷ÓÚ3ÔÂ19ÈÕ±»Åû¶£¬£¬¹¥»÷Õß¿ÉÒÔ»á¼û¿Í»§ºÍÔ±¹¤ÐÅÏ¢¡£¡£¸Ã»ú¹¹Ö¸³ö£¬£¬ÆäÔÚ²¨¶àÀè¸÷ÖÎÀíµÄÒªº¦»ù´¡ÉèÊ©µÄÔËÓª²¢Î´Êܵ½Ó°Ïì¡£¡£ÏÖÔÚ£¬£¬¸Ã»ú¹¹ÉÐδ͸¶¹¥»÷±³ºóµÄ×éÖ¯Ãû³Æ£¬£¬µ«Vice SocietyÍÅ»ïÒѽ«ÆäÌí¼Óµ½ÍøÕ¾µÄ±»¹¥»÷Ãûµ¥ÖС£¡£¸ÃÀÕË÷ÍÅ»ï¹ûÕæÁËÊÜÓ°ÏìСÎÒ˽¼ÒµÄ»¤ÕÕ¡¢¼ÝÕÕºÍÆäËüÎļþ¡£¡£PRASAÏÖÔÚÕýÔÚFBIºÍCISAµÄ×ÊÖúÏÂÊÓ²ì´Ë´Î¹¥»÷¡£¡£
https://securityaffairs.com/144022/hacking/puerto-rico-aqueduct-and-sewer-authority-attack.html
3¡¢PyPI¶ñÒâ°üonyxproxyʹÓÃUnicode×ÖÌåÀ´Èƹý¼ì²â
PhylumÓÚ3ÔÂ22ÈÕ͸¶Æä×î½üÔÚPyPIÉϼì²âµ½Ò»¸ö¶ñÒâ°üonyxproxy£¬£¬Ö¼ÔÚÍøÂçºÍй¶ƾ֤µÈÆäËüÃô¸ÐÊý¾Ý¡£¡£¸Ã¶ñÒâ°üÖÐÓÐÒ»¸ösetup.py°ü£¬£¬ÆäÖаüÀ¨Êýǧ¸ö»ìÏýʹÓÃUnicode×Ö·ûµÄ¿ÉÒÉ´úÂë×Ö·û´®¡£¡£ËäÈ»ÕâЩÎı¾³ýÁË×ÖÌå²î±ðÖ®Í⣬£¬¿´ÆðÀ´ÏÕЩÊÇÕý³£µÄ£¬£¬µ«¹ØÓÚPythonÚ¹ÊÍÆ÷À´Ëµ±£´æÖØ´óµÄ²î±ð¡£¡£Í¨¹ýÕâÖÖ·½·¨£¬£¬¿ÉÒÔÈÆ¹ý»ùÓÚ×Ö·û´®Æ¥ÅäÉè¼ÆµÄ·ÀÓù²½·¥¡£¡£ÏÖÔÚ£¬£¬¸Ã¶ñÒâ°üÒÑ´ÓÆ½Ì¨ÉÑþ³Øý¡£¡£
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
4¡¢IntezerÅû¶Bitter APTÍÅ»ïÕë¶ÔºËÄÜÐÐÒµµÄ¹¥»÷»î¶¯
IntezerÔÚ3ÔÂ24ÈÕÅû¶ÁËÓëÕë¶ÔÑÇÌ«µØÇøµÄBitter APTÏà¹ØµÄ¹¥»÷»î¶¯¡£¡£´Ë´Î»î¶¯ÖУ¬£¬Bitterαװ³É¼ª¶û¼ªË¹Ë¹Ì¹´óʹ¹Ý£¬£¬ÏòÓëºËÄÜÁìÓòÏà¹ØµÄ¶à¼Ò¹«Ë¾ºÍѧÊõÖ°Ô±·¢Ë͵ç×ÓÓʼþ¡£¡£ÓʼþÔ¼ÇëÊÕ¼þÈ˼ÓÈëÓëËûÃÇÏà¹ØµÄÖ÷Ìâ¾Û»á£¬£¬²¢ÓÕʹÊÕ¼þÈËÏÂÔØ²¢·¿ª°üÀ¨Microsoft±àÒëµÄHTML×ÊÖúÎļþ(CHM)»ò¶ñÒâExcelÎĵµµÄRARÎļþ¡£¡£ÈôÊÇʹÓÃCHM£¬£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇMSI»òPowerShellÎļþ£¬£¬ÈôÊÇʹÓÃExcelÎĵµ£¬£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇEXEÎļþ¡£¡£Intezer³Æ£¬£¬¹¥»÷Õß¿ÉÄܸüϲ»¶CHM payload¡£¡£
https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/
5¡¢WordPressÐÞ¸´WooCommerce²å¼þÖпÉÐ®ÖÆÍøÕ¾µÄÎó²î
¾Ý3ÔÂ23ÈÕ±¨µÀ£¬£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÁè¼Ý50Íò¸öÔËÐÐWooCommerceÖ§¸¶²å¼þµÄÍøÕ¾ÉÏ×Ô¶¯×°ÖÃÁËÒ»¸ö²¹¶¡¡£¡£¸Ã²¹¶¡ÐÞ¸´ÁËÒ»¸ö¿É±»ÓÃÀ´»ñµÃÄ¿µÄÊÐËÁµÄÖÎÀíÔ±»á¼ûȨÏÞµÄÎó²î£¬£¬Ó°ÏìÁ˲å¼þ°æ±¾4.8.0µ½5.6.1¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îð³äÖÎÀíÔ±²¢ÍêÈ«½ÓÊÜÍøÕ¾£¬£¬¶øÎÞÐèÓëÓû§½»»¥¡£¡£ÓÉÓÚ²»ÐèÒªÉí·ÝÑéÖ¤£¬£¬Òò´Ë¸ÃÎó²îºÜ¿ÉÄܻᱻ´ó¹æÄ£Ê¹Óᣡ£¸Ã¸üÐÂÏÖÕýÔÚ×Ô¶¯Íƹ㵽¾¡¿ÉÄܶàµÄÊÐËÁ¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-force-patching-woocommerce-plugin-with-500k-installs/
6¡¢Î¢ÈíÐû²¼¼ì²âOutlookÎó²îCVE-2023-23397ʹÓõÄÖ¸ÄÏ
3ÔÂ24ÈÕ£¬£¬Î¢ÈíÐû²¼Á˹ØÓÚ¼ì²âºÍÊÓ²ìʹÓÃOutlookÎó²îCVE-2023-23397¹¥»÷»î¶¯µÄÖ¸ÄÏ¡£¡£ÕâÊÇÒ»¸öÌáȨÎó²î£¬£¬¹¥»÷ÕßÄܹ»ÔÚNTLMÖмÌÁãµã»÷¹¥»÷ÖÐÎÞÐèÓû§½»»¥¼´¿ÉÇÔÈ¡NTLM hash¡£¡£¸ÃÎó²îÒѱ»Ê¹Ó㬣¬ÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£Ö¸ÄÏÌṩÁËÎó²î¸ÅÊö¡¢Îó²îµÄʹÓó¡¾°¡¢ÔÚ¹¥»÷ÖÐÊӲ쵽µÄʹÓû¡¢È·¶¨Ò»¸ö×éÖ¯ÊÇ·ñÊǸÃÎó²îµÄÄ¿µÄ»ò±»¹¥»÷µÄÊÖÒÕÒÔ¼°·ÀÓù´ËÀ๥»÷µÄ»º½â²½·¥¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/