ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
Ðû²¼Ê±¼ä 2023-05-311¡¢ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
¾ÝýÌå5ÔÂ29ÈÕ±¨µÀ£¬±±ÃÀÑÀ¿Æ°ü¹ÜÌṩÉÌMCNA DentalÔâµ½LockbitµÄÀÕË÷¹¥»÷£¬Ó°ÏìÁË8923662Ãû»¼Õß¡£¸Ã¹«Ë¾ÔÚ3ÔÂ6ÈÕÒâʶµ½ÆäϵͳÔâµ½ÁËδ¾ÊÚȨ»á¼û£¬ÊÓ²ìÏÔʾºÚ¿ÍÓÚ2ÔÂ26ÈÕÊ״λñµÃÁËMCNAÍøÂçµÄ»á¼ûȨÏÞ¡£LockBitÉù³ÆÔÚ3ÔÂ7ÈÕ¹¥»÷ÁËMCNA²¢¹ûÕæÁ˵ÚÒ»ÅúÊý¾ÝÑù±¾£¬»¹ÌåÏÖÈôÊÇMCNA²»½»1000ÍòÃÀÔªµÄÊê½ð£¬¾Í¹ûÕæÆä700 GBµÄÉñÃØÐÅÏ¢¡£4ÔÂ7ÈÕ£¬LockBitÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËËùÓÐÊý¾Ý£¬ÈκÎÈ˶¼¿ÉÒÔÏÂÔØ¡£
https://securityaffairs.com/146804/data-breach/mcna-data-breach.html
2¡¢WordPressÔÚ½ü500Íò¸öÍøÕ¾×Ô¶¯×°Öòå¼þJetpackµÄ²¹¶¡
¾Ý5ÔÂ30ÈÕ±¨µÀ£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÊý°ÙÍò¸öÍøÕ¾ÉÏÇ¿ÖÆ×°ÖÃÁËÇå¾²²¹¶¡£¬ÒÔÐÞ¸´²å¼þJetpackÖеÄÒ»¸öÎó²î¡£Ñо¿Ö°Ô±³Æ£¬ÔÚÄÚ²¿Çå¾²Éó¼Æʱ´ú·¢Ã÷JetpackµÄAPI±£´æÎó²î£¬ÍøÕ¾µÄ¿ª·¢Õß¿ÉÒÔʹÓôËÎó²îÀ´¿ØÖÆWordPress×°ÖÃÖеÄí§ÒâÎļþ¡£JetpackÏÖÔÚ×îÏÈ×Ô¶¯ÏòËùÓÐʹÓøòå¼þµÄÍøÕ¾ÍÆËÍÇå¾²²¹¶¡£¬ÏÖÔÚÒÑÔÚÁè¼Ý413Íò¸öÍøÕ¾ÉϾÙÐÐÁË×°Öá£AutomatticÒѶà´ÎʹÓÃÕâÖÖ×Ô¶¯¸üеķ½·¨°²ÅŲ¹¶¡¡£
https://www.bleepingcomputer.com/news/security/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites/
3¡¢Ñо¿Ö°Ô±·¢Ã÷±©Á¦ÆƽâÊÖ»úÖ¸ÎƵĹ¥»÷·½·¨BrutePrint
ýÌå5ÔÂ29Èճƣ¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪBrutePrintµÄ¹¥»÷·½·¨£¬¿ÉÒÔͨ¹ý±©Á¦ÆƽâÖÇÄÜÊÖ»úÉϵÄÖ¸ÎÆÀ´ÈƹýÓû§Éí·ÝÑéÖ¤¡£¸Ã¹¥»÷ÊÖÒÕʹÓÃÁËÖÇÄÜÊÖ»úÖ¸ÎÆÈÏÖ¤(SFA)¿ò¼ÜÖеÄÁ½¸öÁãÈÕÎó²î£¬Cancel-After-Match-Fail(CAMF)ºÍMatch-After-Lock(MAL)¡£ÕâÁ½¸öÎó²îʹÓÃÁËÈÏÖ¤¿ò¼ÜÖеÄÂß¼Îó²î£¬Ô´ÓÚ¶ÔÖ¸ÎÆ´«¸ÐÆ÷µÄ´®ÐÐÍâÉè½Ó¿Ú£¨SPI£©ÉϵÄÖ¸ÎÆÊý¾Ý±£»¤²»Á¦¡£
https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html
4¡¢Jimbos ProtocolÔâµ½ÉÁµç´û¹¥»÷ËðʧÁè¼Ý750ÍòÃÀÔª
5ÔÂ29ÈÕ±¨µÀ³Æ£¬»ùÓÚArbitrumµÄDeFiÏîÄ¿Jimbos ProtocolÔâµ½ÁËÉÁµç´û¹¥»÷£¬ËðʧÁè¼Ý7500000ÃÀÔª¡£¹¥»÷±¬·¢ÔÚ¸Ãƽ̨Æô¶¯ÆäV2ÐÒéµÄÈýÌìºó£¬ÆäʱÐí¶àÈ˸ոÕͶ×Êjimbo´ú±Ò£¬¹¥»÷ÕßÏë·¨ÇÔÈ¡ÁË4090¸öETH´ú±Ò¡£Ñо¿Ö°Ô±³Æ£¬´Ë´Î¹¥»÷ʹÓÃÁËÒ»¸öÓëÁ÷¶¯ÐÔת»»È±·¦»¬µã¿ØÖÆÏà¹ØµÄÎó²î¡£ÔÚ±»ÈëÇÖÖ®ºó£¬jimboµÄ¼ÛǮѸËÙ±©µø£¬´Ó0.238ÃÀÔªµøÖÁ0.0001ÃÀÔª¡£Jimbos ProtocolÒÑÏò¹¥»÷Õß·¢³öÐÅÏ¢£¬ÒªÇóËûÃÇËÍ»¹90%µÄ±»µÁ×ʽð£¬ÒÔ»»È¡²î³ØÆäÌáÆðÖ´·¨ËßËϵÄÔÊÐí¡£
https://www.bleepingcomputer.com/news/security/flash-loan-attack-on-jimbos-protocol-steals-over-75-million/
5¡¢AndroidľÂíDogeRATαװ³ÉÊ¢ÐÐÓ¦ÓÃÕë¶ÔÓ¡¶È¶à¸öÐÐÒµ
5ÔÂ29ÈÕ£¬CloudSEKÅû¶ÁËAndroid¶ñÒâÈí¼þDogeRATÕë¶ÔÓ¡¶È¶à¸öÐÐÒµµÄ¹¥»÷Ô˶¯£¬ÓÈÆäÊÇÒøÐÐÒµºÍÓéÀÖÒµ¡£¸Ã¶ñÒâÈí¼þαװ³ÉOpera Mini¡¢OpenAI ChatGOT¡¢YouTube¡¢NetflixºÍInstagramµÄµÈÕýµ±Ó¦Óã¬Í¨¹ýÉ罻ýÌåºÍÐÂÎÅƽ̨¾ÙÐзַ¢¡£×°Öúó£¬Ëü»á´ÓÄ¿µÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈçÁªÏµÈË¡¢ÐÂÎźÍÒøÐÐƾ֤¡£»¹¿ÉÓÃÓÚ¿ØÖÆÄ¿µÄ×°±¸Ö´ÐжñÒâÔ˶¯£¬Èç·¢ËÍÀ¬»øÓʼþ¡¢¾ÙÐÐδ¾ÊÚȨµÄÖ§¸¶¡¢ÐÞ¸ÄÎļþºÍÉó²éͨ»°¼Í¼£¬ÉõÖÁ¿ÉÒÔͨ¹ý×°±¸µÄÉãÏñÍ·Ô¶³ÌÕÕÏà¡£
https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries
6¡¢JPCERTÌáÐÑÐÂÐÍľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷Ô˶¯
JPCERTе÷ÖÐÐÄÔÚ5ÔÂ29ÈÕÐû²¼Í¨¸æ£¬ÌáÐÑÐÂÐÍGolangľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷Ô˶¯¡£¹¥»÷±¬·¢ÔÚ2ÔÂ×óÓÒ£¬¹¥»÷ÕßÊ×ÏÈÕë¶ÔÒ»¸öWEBUI¶ÔÍ⿪·ÅµÄ·ÓÉÆ÷£¬Ê¹ÓÃÁËÎó²îÖ´ÐнÅÔÀ´×°ÖÃGobRAT¡£¹¥»÷ÕßÔÚÈëÇÖ̻¶µÄ·ÓÉÆ÷ºó£¬»á×°ÖÃÒ»¸ö¼ÓÔسÌÐò¾ç±¾£¬³äµ±½»¸¶GobRATµÄ¹ÜµÀ£¬¸Ã¾ç±¾ÔÚÆô¶¯Ê±Î±×°³ÉApacheÊØ»¤Àú³Ì(apached)À´Èƹý¼ì²â¡£±ðµÄ£¬GobRATͨ¹ý´«Êä²ãÇå¾²(TLS)ÐÒéÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬À´ÎüÊÕ¶à´ï22ÖÖ²î±ðµÄ¼ÓÃÜÏÂÁî¡£
https://thehackernews.com/2023/05/new-gobrat-remote-access-trojan.html