220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶

Ðû²¼Ê±¼ä 2023-06-21

1¡¢220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬CrosswordÔÚ°µÍøÉÏ·¢Ã÷Á˽ü220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤£¬ÆäÖÐ57%ÊôÓÚ24ËùÂÞËؼ¯ÍÅ´óѧ¡£´óѧµÄλÖú͹æÄ£¶Ô鶵ÄˮƽҲÓÐÓ°Ï죬Â׶صÄΣº¦Òª´óµÃ¶à£¬ÓÐ506330(20%)¸öÖ¤Ê鱻й¶£¬Æä´ÎÊǶ«Äϲ¿(334251£¬Õ¼±È13%)ºÍËÕ¸ñÀ¼(306873£¬12%)¡£Ñо¿Ö°Ô±»¹Í¸Â¶£¬Áè¼ÝÒ»°ë£¨54%£©µÄй¿à´×ÔÓµÓÐÑо¿ÉèÊ©µÄÓ¢¹ú´óѧ£¬Õþ¸®×ÊÖúµÄºËÄܺ͹ú·ÀµÈÁìÓòµÄÏîÄ¿¿ÉÄÜÃæÁÙΣº¦¡£


https://www.infosecurity-magazine.com/news/millions-uk-university-credentials/


2¡¢Cyfirma·¢Ã÷DoNotαװ³ÉVPNºÍ̸ÌìÓ¦ÓõÄÌع¤Èí¼þ


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬Cyfirma³ÆÆäÔÚGoogle PlayÉÏ·¢Ã÷ÁË¿ÉÒɵÄÓ¦ÓÃnSure ChatºÍiKHfaa VPN£¬ËüÃǶ¼ÊÇ´ÓSecurITY IndustryÉÏ´«µÄ¡£½øÒ»²½µÄÆÊÎö֤ʵËüÃǾßÓжñÒâÈí¼þÌØÕ÷£¬²¢±»¹éÒòÓÚÓ¡¶ÈÏà¹ØºÚ¿ÍÍÅ»ïDoNot¡£´Ë´Î¹¥»÷Ô˶¯Ö÷ÒªÕë¶Ô°Í»ù˹̹£¬Ö¼ÔÚ´ÓÄ¿µÄ×°±¸ÍøÂçÇ鱨£¬ÀýÈçλÖÃÊý¾ÝºÍÁªÏµÈËÁбí¡£±ðµÄ£¬ÓëÕâÁ½¿îÓ¦ÓÃÀ´×Ôͳһ¿¯ÐÐÉ̵ĵÚÈý¿îÓ¦ÓÃËƺõûÓжñÒ⣬µ«ÈÔ¿ÉÔÚGoogle PlayÉÏʹÓá£


https://www.cyfirma.com/outofband/donot-apt-elevates-its-tactics-by-deploying-malicious-android-apps-on-google-play-store/


3¡¢BitdefenderÅû¶Õë¶ÔmacOSµÄ¹¤¾ß°üµÄ×é¼þµÄϸ½Ú


BitdefenderÔÚ6ÔÂ16ÈÕ͸¶Æä·¢Ã÷ÁËÒ»×é¾ßÓкóÃŹ¦Ð§µÄ¶ñÒâÎļþ£¬²¢ÍƶÏÊÇÕë¶ÔApple macOSϵͳµÄÖش󹤾߰üµÄÒ»²¿·Ö¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬Ñù±¾µÄ´ó²¿·ÖÈÔδ±»·¢Ã÷¡£Ñо¿Ö°Ô±¹²ÆÊÎöÁËÉÏ´«µ½VirusTotalµÄËĸöÑù±¾£¬ÆäÖÐ×îÔçµÄÓÚ4ÔÂ18ÈÕÓÉÄäÃûÓû§ÉÏ´«¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâÎļþ»®·ÖÊÇÒ»¸öͨÓõÄPythonºóÃÅshared.dat£¬Ò»¸öÇ¿Ê¢µÄºóÃÅsh.py£¬ÒÔ¼°Ò»¸öFAT¶þ½øÖÆÎļþxcc¡£Bitdefender½«Python×é¼þ¸ú×ÙΪJokerSpy¡£


https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/


4¡¢eSentire¼ì²âµ½Ê¹ÓÃOnlyFansÒ³Ãæ·Ö·¢DcRATµÄÔ˶¯


6ÔÂ15ÈÕ£¬eSentire³ÆÆä¼ì²âµ½ÁËʹÓÃαÔìµÄOnlyFansµÈÓÕ¶ü·Ö·¢DcRATµÄÔ˶¯¡£¸ÃÔ˶¯×Ô1ÔÂÒÔÀ´Ò»Ö±ÔÚ»îÔ¾£¬Èö²¥°üÀ¨VBScript¼ÓÔسÌÐòµÄZIPÎļþ£¬È»ºóÓÕʹĿµÄÊÖ¶¯Ö´ÐС£VBScript¼ÓÔسÌÐòÆô¶¯Ê±£¬»áʹÓÃWMI¼ì²é²Ù×÷ϵͳ¼Ü¹¹²¢ÌìÉú32λÀú³Ì¡£Õâʹ¶ñÒâÈí¼þÄܹ»»á¼ûDynamicWrapperX¡£×îÖÕ£¬ÃûΪBinaryDataµÄpayload»á±»¼ÓÔص½Äڴ棬²¢×¢ÈëRegAsm.exeÀú³Ì¡£×¢ÈëµÄpayloadÊÇDcRAT£¬ËüÊÇAsyncRATµÄÐ޸İ汾£¬¿ÉÔÚGitHubÉÏÃâ·Ñ»ñµÃ¡£


https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content


5¡¢Ñо¿Ö°Ô±Åû¶΢ÈíAzure ADÉí·ÝÑéÖ¤Îó²înOAuth


¾ÝýÌå6ÔÂ20ÈÕ±¨µÀ£¬DescopeÅû¶ÁËMicrosoft Azure AD OAuthÓ¦ÓóÌÐòÖеÄÒ»¸öÑÏÖصĹýʧÉèÖá£Ëü±»³ÆΪnOAuth£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤Îó²î¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÐÞ¸ÄAzure ADÕÊ»§Öеĵç×ÓÓʼþÊôÐÔ£¬²¢Ê¹ÓÃËûÃÇÏëҪð³äµÄÄ¿µÄµÄµç×ÓÓʼþµØµãÀ´Ê¹ÓÃÒ»¼üʽµÄ¡°Ê¹ÓÃMicrosoftµÇ¼¡±¹¦Ð§£¬´Ó¶øÍêÈ«½Ó»á¼Æ»§¡£Microsoft½«¸ÃÎÊÌâÐÎòΪ"Azure ADÓ¦ÓóÌÐòÖÐʹÓõIJ»Çå¾²µÄ·´Ä£Ê½"£¬ÒÑͨ¹ýÐû²¼»º½â²½·¥½â¾öÁËÕâÒ»ÎÊÌâ¡£


https://www.securityweek.com/researchers-flag-account-takeover-flaw-in-microsoft-azure-ad-oauth-apps/


6¡¢Check PointÐû²¼ÏÖÔÚÈÔÔÚ¾ÙÐеĴ¹ÂÚÔ˶¯µÄ±¨¸æ


6ÔÂ19ÈÕ£¬Check Point Research(CPR)Ðû²¼±¨¸æ³Æ¼ì²âµ½ÁËÒ»¸öÕýÔÚ¾ÙÐеĴ¹ÂÚÔ˶¯¡£¸ÃÔ˶¯Ê¹ÓÃÁ˶à¸ö°æ±¾µÄÓʼþºÍһЩ²î±ðµÄHTMLÄ£°å¡£ÎªÁËʹµÇ¼ҳÃæ¿´ÆðÀ´¸üÕýµ±£¬¹¥»÷ÕßÒѾ­ÔÚ±íµ¥ÖÐÌîдÁËÄ¿µÄµÄµç×ÓÓʼþµØµã£¬ÕâÊÇÓ²±àÂëÔÚHTMLÎļþÖеÄ¡£Ò»µ©Ä¿µÄÊäÈëÁËƾ֤²¢ÊÔͼµÇ¼£¬ÕâЩÐÅÏ¢¾Í»áÖ±½Ó·¢Ë͵½¹¥»÷ÕßµÄÓÊÏäÀï¡£±ðµÄ£¬¹¥»÷Õ߶ÔÕýµ±·þÎñµÄʹÓÃÓÐËùÔöÌí£¬ÕâÔöÌíÁ˵ÖÓù´ËÀ๥»÷µÄÄÑÌâ¡£


https://blog.checkpoint.com/security/sign-in-to-continue-and-suffer-attackers-abusing-legitimate-services-for-credential-theft/