220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶

Ðû²¼Ê±¼ä 2023-06-21

1¡¢220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬£¬CrosswordÔÚ°µÍøÉÏ·¢Ã÷Á˽ü220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤£¬£¬£¬ £¬£¬ÆäÖÐ57%ÊôÓÚ24ËùÂÞËØ¼¯ÍÅ´óѧ¡£¡£´óѧµÄλÖú͹æÄ£¶Ôй¶µÄˮƽҲÓÐÓ°Ï죬£¬£¬ £¬£¬Â׶صÄΣº¦Òª´óµÃ¶à£¬£¬£¬ £¬£¬ÓÐ506330(20%)¸öÖ¤Ê鱻й¶£¬£¬£¬ £¬£¬Æä´ÎÊǶ«Äϲ¿(334251£¬£¬£¬ £¬£¬Õ¼±È13%)ºÍËÕ¸ñÀ¼(306873£¬£¬£¬ £¬£¬12%)¡£¡£Ñо¿Ö°Ô±»¹Í¸Â¶£¬£¬£¬ £¬£¬Áè¼ÝÒ»°ë£¨54%£©µÄй¿à´×ÔÓµÓÐÑо¿ÉèÊ©µÄÓ¢¹ú´óѧ£¬£¬£¬ £¬£¬Õþ¸®×ÊÖúµÄºËÄܺ͹ú·ÀµÈÁìÓòµÄÏîÄ¿¿ÉÄÜÃæÁÙΣº¦¡£¡£


https://www.infosecurity-magazine.com/news/millions-uk-university-credentials/


2¡¢Cyfirma·¢Ã÷DoNotαװ³ÉVPNºÍ̸ÌìÓ¦ÓõÄÌØ¹¤Èí¼þ


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ £¬£¬Cyfirma³ÆÆäÔÚGoogle PlayÉÏ·¢Ã÷ÁË¿ÉÒɵÄÓ¦ÓÃnSure ChatºÍiKHfaa VPN£¬£¬£¬ £¬£¬ËüÃǶ¼ÊÇ´ÓSecurITY IndustryÉÏ´«µÄ¡£¡£½øÒ»²½µÄÆÊÎö֤ʵËüÃǾßÓжñÒâÈí¼þÌØÕ÷£¬£¬£¬ £¬£¬²¢±»¹éÒòÓÚÓ¡¶ÈÏà¹ØºÚ¿ÍÍÅ»ïDoNot¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°Í»ù˹̹£¬£¬£¬ £¬£¬Ö¼ÔÚ´ÓÄ¿µÄ×°±¸ÍøÂçÇ鱨£¬£¬£¬ £¬£¬ÀýÈçλÖÃÊý¾ÝºÍÁªÏµÈËÁÐ±í¡£¡£±ðµÄ£¬£¬£¬ £¬£¬ÓëÕâÁ½¿îÓ¦ÓÃÀ´×Ôͳһ¿¯ÐÐÉ̵ĵÚÈý¿îÓ¦ÓÃËÆºõûÓжñÒ⣬£¬£¬ £¬£¬µ«ÈÔ¿ÉÔÚGoogle PlayÉÏʹÓᣡ£


https://www.cyfirma.com/outofband/donot-apt-elevates-its-tactics-by-deploying-malicious-android-apps-on-google-play-store/


3¡¢BitdefenderÅû¶Õë¶ÔmacOSµÄ¹¤¾ß°üµÄ×é¼þµÄϸ½Ú


BitdefenderÔÚ6ÔÂ16ÈÕ͸¶Æä·¢Ã÷ÁËÒ»×é¾ßÓкóÃŹ¦Ð§µÄ¶ñÒâÎļþ£¬£¬£¬ £¬£¬²¢ÍƶÏÊÇÕë¶ÔApple macOSϵͳµÄÖØ´ó¹¤¾ß°üµÄÒ»²¿·Ö¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬ £¬£¬Ñù±¾µÄ´ó²¿·ÖÈÔδ±»·¢Ã÷¡£¡£Ñо¿Ö°Ô±¹²ÆÊÎöÁËÉÏ´«µ½VirusTotalµÄËĸöÑù±¾£¬£¬£¬ £¬£¬ÆäÖÐ×îÔçµÄÓÚ4ÔÂ18ÈÕÓÉÄäÃûÓû§ÉÏ´«¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâÎļþ»®·ÖÊÇÒ»¸öͨÓõÄPythonºóÃÅshared.dat£¬£¬£¬ £¬£¬Ò»¸öǿʢµÄºóÃÅsh.py£¬£¬£¬ £¬£¬ÒÔ¼°Ò»¸öFAT¶þ½øÖÆÎļþxcc¡£¡£Bitdefender½«Python×é¼þ¸ú×ÙΪJokerSpy¡£¡£


https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/


4¡¢eSentire¼ì²âµ½Ê¹ÓÃOnlyFansÒ³Ãæ·Ö·¢DcRATµÄ»î¶¯


6ÔÂ15ÈÕ£¬£¬£¬ £¬£¬eSentire³ÆÆä¼ì²âµ½ÁËʹÓÃαÔìµÄOnlyFansµÈÓÕ¶ü·Ö·¢DcRATµÄ»î¶¯¡£¡£¸Ã»î¶¯×Ô1ÔÂÒÔÀ´Ò»Ö±ÔÚ»îÔ¾£¬£¬£¬ £¬£¬Èö²¥°üÀ¨VBScript¼ÓÔØ³ÌÐòµÄZIPÎļþ£¬£¬£¬ £¬£¬È»ºóÓÕʹĿµÄÊÖ¶¯Ö´ÐС£¡£VBScript¼ÓÔØ³ÌÐòÆô¶¯Ê±£¬£¬£¬ £¬£¬»áʹÓÃWMI¼ì²é²Ù×÷ϵͳ¼Ü¹¹²¢ÌìÉú32λÀú³Ì¡£¡£Õâʹ¶ñÒâÈí¼þÄܹ»»á¼ûDynamicWrapperX¡£¡£×îÖÕ£¬£¬£¬ £¬£¬ÃûΪBinaryDataµÄpayload»á±»¼ÓÔØµ½Äڴ棬£¬£¬ £¬£¬²¢×¢ÈëRegAsm.exeÀú³Ì¡£¡£×¢ÈëµÄpayloadÊÇDcRAT£¬£¬£¬ £¬£¬ËüÊÇAsyncRATµÄÐ޸İ汾£¬£¬£¬ £¬£¬¿ÉÔÚGitHubÉÏÃâ·Ñ»ñµÃ¡£¡£


https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content


5¡¢Ñо¿Ö°Ô±Åû¶΢ÈíAzure ADÉí·ÝÑéÖ¤Îó²înOAuth


¾ÝýÌå6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬ £¬£¬DescopeÅû¶ÁËMicrosoft Azure AD OAuthÓ¦ÓóÌÐòÖеÄÒ»¸öÑÏÖØµÄ¹ýʧÉèÖᣡ£Ëü±»³ÆÎªnOAuth£¬£¬£¬ £¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤Îó²î¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÐÞ¸ÄAzure ADÕÊ»§Öеĵç×ÓÓʼþÊôÐÔ£¬£¬£¬ £¬£¬²¢Ê¹ÓÃËûÃÇÏëҪð³äµÄÄ¿µÄµÄµç×ÓÓʼþµØµãÀ´Ê¹ÓÃÒ»¼üʽµÄ¡°Ê¹ÓÃMicrosoftµÇ¼¡±¹¦Ð§£¬£¬£¬ £¬£¬´Ó¶øÍêÈ«½Ó»á¼Æ»§¡£¡£Microsoft½«¸ÃÎÊÌâÐÎòΪ"Azure ADÓ¦ÓóÌÐòÖÐʹÓõIJ»Çå¾²µÄ·´Ä£Ê½"£¬£¬£¬ £¬£¬ÒÑͨ¹ýÐû²¼»º½â²½·¥½â¾öÁËÕâÒ»ÎÊÌâ¡£¡£


https://www.securityweek.com/researchers-flag-account-takeover-flaw-in-microsoft-azure-ad-oauth-apps/


6¡¢Check PointÐû²¼ÏÖÔÚÈÔÔÚ¾ÙÐеĴ¹ÂڻµÄ±¨¸æ


6ÔÂ19ÈÕ£¬£¬£¬ £¬£¬Check Point Research(CPR)Ðû²¼±¨¸æ³Æ¼ì²âµ½ÁËÒ»¸öÕýÔÚ¾ÙÐеĴ¹Âڻ¡£¡£¸Ã»î¶¯Ê¹ÓÃÁ˶à¸ö°æ±¾µÄÓʼþºÍһЩ²î±ðµÄHTMLÄ£°å¡£¡£ÎªÁËʹµÇÂ¼Ò³Ãæ¿´ÆðÀ´¸üÕýµ±£¬£¬£¬ £¬£¬¹¥»÷ÕßÒѾ­ÔÚ±íµ¥ÖÐÌîдÁËÄ¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬ £¬£¬ÕâÊÇÓ²±àÂëÔÚHTMLÎļþÖеġ£¡£Ò»µ©Ä¿µÄÊäÈëÁËÆ¾Ö¤²¢ÊÔͼµÇ¼£¬£¬£¬ £¬£¬ÕâЩÐÅÏ¢¾Í»áÖ±½Ó·¢Ë͵½¹¥»÷ÕßµÄÓÊÏäÀï¡£¡£±ðµÄ£¬£¬£¬ £¬£¬¹¥»÷Õß¶ÔÕýµ±Ð§À͵ÄʹÓÃÓÐËùÔöÌí£¬£¬£¬ £¬£¬ÕâÔöÌíÁ˵ÖÓù´ËÀ๥»÷µÄÄÑÌâ¡£¡£


https://blog.checkpoint.com/security/sign-in-to-continue-and-suffer-attackers-abusing-legitimate-services-for-credential-theft/