Atomic WalletÔâµ½ºÚ¿Í¹¥»÷ËðʧÁè¼Ý3500ÍòÃÀÔª
Ðû²¼Ê±¼ä 2023-06-061¡¢Atomic WalletÔâµ½ºÚ¿Í¹¥»÷ËðʧÁè¼Ý3500ÍòÃÀÔª
¾ÝýÌå6ÔÂ4ÈÕ±¨µÀ£¬Atomic WalletÔâµ½¹¥»÷£¬Áè¼Ý3500ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ÕâÊÇÒ»¿îÒƶ¯ºÍ×ÀÃæ¼ÓÃÜÇ®°ü£¬¿É´æ´¢ÖÖÖÖ¼ÓÃÜÇ®±Ò¡£6ÔÂ3ÈÕ£¬¸Ã¹«Ë¾ÔÚTwitterÌåÏÖÊÕµ½ÁËÓйØÇ®°ü±»ºÚµÄ±¨¸æ£¬²¢ÒÑ×îÏÈÊÓ²ì´ËÎÊÌâ¡£ÏÖÔÚ£¬¸ÃÍŶÓÕýÔÚÑо¿¿ÉÄܵĹ¥»÷Ç°ÑÔ£¬²¢ÍøÂç¹ØÓÚ±»¹¥»÷Ä¿µÄµÄÐÅÏ¢¡£¿ª·¢Ö°Ô±Ò²¹Ø±ÕÁËÏÂÔØ·þÎñÆ÷get.atomicwallet.io£¬ÒÔ±ÜÃâ½øÒ»²½µÄÈö²¥¡£Çå¾²¹«Ë¾Tay³Æ±»µÁ×ʲú×îÔçÉúÒâʱ¼äÊÇ6ÔÂ2ÈÕ21:45 UTC¡£
https://www.bleepingcomputer.com/news/security/atomic-wallet-hacks-lead-to-over-35-million-in-crypto-stolen/
2¡¢Ó¢¹úº½¿Õ¡¢BBCºÍBootsµÈ¹«Ë¾Ôâµ½¹¥»÷Êý¾Ýй¶
¾Ý6ÔÂ5ÈÕ±¨µÀ£¬Ó¢¹úº½¿Õ¹«Ë¾(BA)¡¢Ó¢¹ú¹ã²¥¹«Ë¾(BBC)ºÍBootsµÈ×ÅÃû¹«Ë¾Ôâµ½¹¥»÷£¬Ô±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜй¶¡£BA³ÆÆäÈËΪµ¥ÌṩÉÌZellisÔâµ½¹¥»÷£¬Ô´ÓÚÆäʹÓõĵÄÈí¼þMOVEit£¬µ¼ÖÂÔ¼34000ÃûÔ±¹¤µÄÐÅϢй¶¡£ÓëZellisÏàÖúµÄÆäËü¹«Ë¾Ò²Ôâµ½Á˹¥»÷£¬°üÀ¨Ó¢¹ú×ÅÃûÁ¬ËøÒ©µêBoots£¬Í¸Â¶Æ䲿·ÖÔ±¹¤µÄÊý¾Ý¿ÉÄÜй¶¡£±ðµÄ£¬¹ã²¥¹«Ë¾BBCҲȷÈÏÁË´Ë´ÎÎ¥¹æÊÂÎñ¡£Î¢Èí½«¶ÔMOVEitµÄ¹¥»÷¹éÒòÓÚÒ»¸öÃûΪLace TempestµÄÍŻ
https://www.theguardian.com/technology/2023/jun/05/ba-boots-and-bbc-staff-details-targeted-in-russian-linked-cyber-attack
3¡¢IT¹«Ë¾XplainÔâµ½¹¥»÷Ó°ÏìÈðÊ¿µÄ²¿·Ö¾ü¶ÓºÍ¾¯¾Ö
6ÔÂ4ÈÕ±¨µÀ³Æ£¬IT¹«Ë¾XplainÔâµ½¹¥»÷£¬Ó°ÏìÁËÈðÊ¿¼¸¸öÖݵľ¯Ô±¡¢¾ü¶Ó¡¢º£¹ØºÍÁª°î¾¯Ô±¾ÖµÈ¡£ÀÕË÷ÍÅ»ïPlayÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕ棬²¢Ðû²¼Á˾ݳÆÀ´×ÔÁª°î¾¯Ô±¾Ö(Fedpol)ºÍÁª°îº£¹ØÓëÁìÍÁÇå¾²¾Ö(FOCBS)µÄÊý¾Ý¡£ÍâµØýÌå³Æ£¬¹¥»÷ÕßʹÓÃÁ˸ÃIT¹«Ë¾·þÎñÆ÷ÉϵÄÒ»¸öÎó²î¡£FedpolºÍFOCBS֤ʵÁ˴˴ι¥»÷£¬µ«ÊÔͼµ»¯ÕâÒ»ÊÂÎñ¡£Fedpol³Æ¹¥»÷ÕßÖ»ÄÜ»á¼ûÓÃÓÚ²âÊÔµÄÄ£ÄâÊý¾Ý£¬FOCBS˵±»µÁÊý¾ÝÀ´×ÔÓëÆä¿Í»§µÄͨѶ¡£
https://securityaffairs.com/147047/data-breach/fedpol-swiss-police-cyber-attack.html
4¡¢VMware³Æ½üÆÚµÄTrueBotÔ˶¯Ê¹ÓÃNetwrixÎó²îÀ´·Ö·¢
6ÔÂ1ÈÕ£¬VMware͸¶´Ó5ÔÂ×îÏÈ·¢Ã÷TrueBotÔ˶¯¼¤Ôö¡£TrueBotÖÁÉÙ´Ó2017Äê×îÏÈ»îÔ¾£¬ÒÔʹÓöñÒâÓʼþ·Ö·¢¶øÖøÃû£¬µ«×î½ü±»·¢Ã÷ʹÓÃÁËNetwrix auditorÎó²î£¨CVE-2022-31199£©ÒÔ¼°Raspberry RobinÖеÄÒ»¸öÎó²î×÷ΪѬȾÔØÌå¡£¹¥»÷Á´Ê¼ÓÚ´ÓChromeÏÂÔØ¿ÉÖ´ÐÐÎļþupdate.exe¡£ÔËÐкó£¬Ëü»á¼ìË÷²¢ÏÂÔصڶþ½×¶Î¿ÉÖ´ÐÐÎļþ3ujwy2rz7v.exe£¬ÓÉcmd.exeÆô¶¯¡£¿ÉÖ´ÐÐÎļþÅþÁ¬µ½C2Óò²¢´ÓÖ÷»úй¶Ãô¸ÐÐÅÏ¢¡£
https://blogs.vmware.com/security/2023/06/carbon-blacks-truebot-detection.html
5¡¢AkamaiÅû¶ЮÖÆMagentoµÈÕýµ±ÍøÕ¾µÄMagecart¹¥»÷
AkamaiÔÚ6ÔÂ1ÈÕ³ÆÆä·¢Ã÷²¢ÆÊÎöÁËÒ»ÆðÕýÔÚ¾ÙÐеÄMagecart¹¥»÷Ô˶¯£¬Ö¼ÔÚ´ÓµçÉÌÍøÕ¾ÇÔÈ¡PIIºÍÐÅÓÿ¨ÐÅÏ¢¡£Ñо¿Ö°Ô±³Æ¸ÃÔ˶¯ÒÑÓ°ÏìÃÀ¹ú¡¢Ó¢¹ú¡¢°Ä´óÀûÑÇ¡¢°ÍÎ÷¡¢ÃسºÍ°®É³ÄáÑǵÄ×éÖ¯¡£¹¥»÷ÕßÔÚÔ˶¯Ê±´ú½ÓÄÉÁ˶àÖÖÈƹýÊÖÒÕ£¬°üÀ¨Ê¹ÓÃBase64±àÂë»ìÏýskimmer£¬Í¨¹ýÀàËÆÓÚµÚÈý·½·þÎñGoogle Tag Manager»òFacebook PixelµÄ·½·¨¹¹½¨Æä½á¹¹ÒÔ×èÖ¹ÒýÆðÏÓÒÉ¡£±ðµÄ£¬ÓëÆäËüMagecart¹¥»÷²î±ðµÄÊÇ£¬¹¥»÷ÕßЮÖÆÁËÕýµ±ÍøÕ¾³äµ±ÔÝʱC2·þÎñÆ÷£¬Í¨¹ýÕâЩÐÅÓþÓÅÒìµÄÕýµ±ÍøÕ¾·Ö·¢ÇÔÈ¡³ÌÐò¡£
https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
6¡¢AvastÔÚChromeÍøÉÏÊÐËÁ¼ì²âµ½32¸ö¶ñÒâÀ©Õ¹³ÌÐò
6ÔÂ2ÈÕ£¬Avast³ÆÆäÔÚChromeÍøÉÏÓ¦ÓõêÖмì²âµ½32¸ö¶ñÒâÀ©Õ¹³ÌÐò£¬×Ü×°ÖÃÁ¿¸ß´ï7500Íò´Î¡£´Ë´ÎÊÓ²ìʼÓÚÒ»ÃûÑо¿Ö°Ô±ÔÚPDF ToolboxÀ©Õ¹Öз¢Ã÷Á˶ñÒâ´úÂ룬´ÙʹÕë¶Ô¸ÃÎÊÌâ¸üÉîÈëµÄÑо¿¡£ÕâЩÀ©Õ¹µÄ¹¦Ð§´Ó¹ã¸æ×èµ²Æ÷¡¢ÏÂÔØÆ÷ºÍä¯ÀÀÆ÷Ö÷Ìâµ½¼Í¼Æ÷ºÍÑ¡ÏÖÎÀíÆ÷µÈ¡£ËüÃÇÌṩÁËÕýµ±¹¦Ð§£¬Õ§Ò»¿´ËƺõÎÞº¦£¬µ«×îÖÕpayload¿ÉÄÜÊǹã¸æÈí¼þºÍËÑË÷ЮÖƳÌÐòµÈ¡£ÏÖÔÚ£¬¹È¸èÒѾ´ÓÆäÍøÉÏÓ¦ÓÃÊÐËÁÖÐɾ³ýÁËÕâЩÀ©Õ¹¡£
https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-with-75m-installs-removed-from-web-store/