·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
Ðû²¼Ê±¼ä 2023-03-301¡¢·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬·áÌïÒâ´óÀû¹«Ë¾ÒâÍâй¶ÁËÆäÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞ¡£¡£2ÔÂ14ÈÕ£¬£¬CybernewsÍŶÓÔÚ·áÌïÒâ´óÀû¹Ù·½ÍøÕ¾ÉÏ·¢Ã÷ÁËÒ»¸öÇéÐÎÎļþ(.env)¡£¡£Ëü¹ûÕæÁËÆäSalesforce Marketing CloudºÍMapbox APIµÄƾ֤£¬£¬¹¥»÷Õß¿ÉÄÜ»áÀÄÓôËÐÅÏ¢À´»ñÈ¡·áÌï¿Í»§µÄµç»°ºÅÂëºÍÓʼþµØµãµÈÐÅÏ¢£¬£¬²¢Ö´Ðд¹ÂÚ¹¥»÷¡£¡£¸ÃÇéÐÎÎļþÓÚ2021Äê5ÔÂ21ÈÕÊ״α»IoTËÑË÷ÒýÇæ±àÈëË÷Òý£¬£¬ÕâÒâζ×ÅËüÒѹûÕæÁËÒ»Äê°ëÒÔÉÏ¡£¡£ÏÖÔÚ£¬£¬Ð¹Â¶Êý¾ÝÒѾ±»±£»£»£»£»£»£»¤ÆðÀ´¡£¡£
https://cybernews.com/security/toyota-customer-data-leak/
2¡¢QNAPÐû²¼¸üУ¬£¬ÐÞ¸´ÆäNAS×°±¸ÖеÄSudoÌáȨÎó²î
¾Ý3ÔÂ29ÈÕ±¨µÀ£¬£¬QNAPÐÞ¸´ÁË»ùÓÚLinuxµÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸ÖеÄSudoÌáȨÎó²î¡£¡£¸ÃÎó²î×·×ÙΪCVE-2023-22809£¬£¬±»ÐÎòΪ¡°ÔÚSudo1.9.12p1°æ±¾ÖÐʹÓÃsudoeditÊ±ÈÆ¹ýsudoersÕ½ÂÔ¡±¡£¡£ÀÖ³ÉʹÓøÃÎó²î£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«í§ÒâÌõÄ¿Ìí¼Óµ½Òª´¦Öóͷ£µÄÎļþÁбíºó±à¼Î´¾ÊÚȨµÄÎļþÀ´ÌáÉýȨÏÞ¡£¡£¸Ã¹«Ë¾ÒѾ½â¾öÁËQTSºÍQuTS heroƽ̨ÖеÄÎó²î£¬£¬²¢ÔÚÆð¾¢ÌṩQuTScloudºÍQVPÇå¾²¸üС£¡£
https://www.bleepingcomputer.com/news/security/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices/
3¡¢ÃÀ¹ú¹ºÕ®¹«Ë¾NCBÔâµ½¹¥»÷½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬ÃÀ¹ú¹ºÕ®¹«Ë¾NCB Management ServicesÔâµ½¹¥»÷£¬£¬½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶¡£¡£NCBÓÚ2ÔÂ4ÈÕ·¢Ã÷£¬£¬Î´¾ÊÚȨµÄµÚÈý·½ÓÚ2ÔÂ1ÈÕ»ñµÃÁËNCBϵͳµÄ»á¼ûȨÏÞ£¬£¬²¢ÓÚ3ÔÂ8ÈÕÈ·ÈϿͻ§ÓëÃÀ¹úÒøÐÐÐÅÓÿ¨ÕË»§Ïà¹ØµÄһЩÐÅϢй¶¡£¡£¸ÃÊÂÎñÉæ¼°494969È˵ÄÐÕÃû¡¢¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÅÓÿ¨ºÅÂ롢·ÓɺÅÂë¡¢ÕË»§Óà¶îºÍÕË»§×´Ì¬µÈ¡£¡£ÃÀ¹úÒøÐн«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩExperian IdentityWorksSMÁ½ÄêµÄÉí·Ý͵ÇÔ±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£
https://therecord.media/debt-buyer-cyberattack-data-breach
4¡¢ÐÂAPT43ÔÚÒÑÍùµÄ5ÄêÖÐÒ»Ö±¹¥»÷Î÷Å·ÈÕº«µÈµØÇøµÄ×éÖ¯
3ÔÂ28ÈÕ±¨µÀ³Æ£¬£¬Ð·¢Ã÷µÄºÚ¿ÍÍÅ»ïAPT43×Ô2018ÄêÒÔÀ´Ò»Ö±Õë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢ÈÕ±¾ºÍº«¹úµÄÕþ¸®¡¢Ñ§ÊõºÍÖÇÄÒÍÅÏà¹Ø×éÖ¯¡£¡£APT43ʹÓÃÓã²æÊ½´¹ÂÚÓʼþÀ´ÇÔȡĿµÄµÄÕÊ»§Æ¾Ö¤£¬£¬È»ºóÒÔÄ¿µÄÈËÎïµÄÉí·ÝµÇ¼²¢×ÔÐÐÖ´ÐÐÇé±¨ÍøÂç¡£¡£APT43»¹Ê¹ÓöñÒâAndroidÓ¦Ó㬣¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¡£¡£Mandiant±¨¸æËµ£¬£¬ÆäËûÑо¿Ö°Ô±ÔÚÒÑÍùÔø·¢Ã÷ÁËAPT43»î¶¯£¬£¬µ«Í¨³£½«Æä¹éÒòÓÚKimsuky»òThalium¡£¡£
https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage
5¡¢´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐòÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø
3ÔÂ28ÈÕ£¬£¬Kaspersky³ÆÆä·¢Ã÷ÁË´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐò£¬£¬Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø¡£¡£ÕâЩװÖóÌÐò°üÀ¨Ò»¸ö±ê×¼°æ±¾µÄTorä¯ÀÀÆ÷£¬£¬ÒÔ¼°Ò»¸öÌØÁíÍâ¿ÉÖ´ÐÐÎļþ£¬£¬Òþ²ØÔÚÊÜÃÜÂë±£»£»£»£»£»£»¤µÄRARÖС£¡£Torä¯ÀÀÆ÷ÔÚǰ̨Æô¶¯Ê±£¬£¬¸ÃÎļþÔÚºǫ́ÌáÈ¡¶ñÒâÈí¼þ¡£¡£¸Ã¶ñÒâÈí¼þ»á¼àÊÓ¼ôÌù°åÖпÉʶ±ðµÄ¼ÓÃÜÇ®°üµØµã£¬£¬²¢ÔÚ¼ì²âµ½Ê±½«ÆäÌæ»»Îª¹¥»÷ÕߵļÓÃÜÇ®±ÒµØµã¡£¡£ÔÚ2022Äê8ÔÂÖÁ2023Äê2ÔÂʱ´ú£¬£¬Ñо¿Ö°Ô±ÔÚ52¸ö¹ú¼Ò/µØÇø¼ì²âµ½16000¸ö´ËÀàTor×°ÖóÌÐòµÄ±äÌå¡£¡£
https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
6¡¢µçÐŹ«Ë¾LumenÅû¶Æä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñµÄÏêÇé
3ÔÂ28ÈÕ±¨µÀ£¬£¬µçÐŹ«Ë¾Lumen TechnologiesÅû¶ÁËÆä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñ¡£¡£Ê×ÏÈ£¬£¬¸Ã¹«Ë¾ÔÚÉÏÖÜ·¢Ã÷Æä²¿·ÖÖ§³Ö·Ö¶ÎÍйÜЧÀ͵ÄЧÀÍÆ÷ѬȾÁËÀÕË÷Èí¼þ¡£¡£ÔÚ·¢Ã÷ÀÕË÷¹¥»÷ºó£¬£¬¸Ã¹«Ë¾¼Ó¹ÌÁËÇå¾²Èí¼þ²¢·¢Ã÷ÁËÁíÒ»Æð¹¥»÷ÊÂÎñ¡£¡£ÔÚÕâµÚ¶þ´ÎÊÂÎñÖУ¬£¬¹¥»÷ÕßÈëÇÖÁ˹«Ë¾µÄÄÚ²¿ÐÅÏ¢ÊÖÒÕϵͳ£¬£¬×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£¡£LumenÒѽ«´ËÊÂִ֪ͨ·¨²¿·Ö£¬£¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§±¨¸æÁËÕâÒ»ÊÂÎñ¡£¡£
https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html